Installation of Profil3r!
As profil3r only requires python as prerequisite, it can be installed in any device like Linux, Termux, Windows, etc
-> git clone https://github.com/Rog3rSm1th/Profil3r.git
-> cd to profil3r directory
-> cd Profil3r/
//Run the setup.py file
-> python3 setup.py install
Now installation of profil3r done ✅
Its time to run⚡
-> python3 profil3r.py cyberagent
Note : you can take username as per your requirement we take our fav (cyberagent)
⚡Only for educational purpose ⚡
~ @geekcode ❤️
As profil3r only requires python as prerequisite, it can be installed in any device like Linux, Termux, Windows, etc
-> git clone https://github.com/Rog3rSm1th/Profil3r.git
-> cd to profil3r directory
-> cd Profil3r/
//Run the setup.py file
-> python3 setup.py install
Now installation of profil3r done ✅
Its time to run⚡
-> python3 profil3r.py cyberagent
Note : you can take username as per your requirement we take our fav (cyberagent)
⚡Only for educational purpose ⚡
~ @geekcode ❤️
#helpline #DemandYourCourse
Need any specific course realted to hacking & programming contact us here: @geekserverbot
Need any specific course realted to hacking & programming contact us here: @geekserverbot
#AI #facebook
⚡Facebook is introducing Dynaboard, an evaluation-as-a-service platform for conducting comprehensive evaluations of NLP models.
Link: https://ai.facebook.com/blog/dynaboard-moving-beyond-accuracy-to-holistic-model-evaluation-in-nlp
It enables dynamic, apples-to-apples comparisons dynamically, overcoming some of the key challenges in AI evaluation today! 😎
~ @geekcode
⚡Facebook is introducing Dynaboard, an evaluation-as-a-service platform for conducting comprehensive evaluations of NLP models.
Link: https://ai.facebook.com/blog/dynaboard-moving-beyond-accuracy-to-holistic-model-evaluation-in-nlp
It enables dynamic, apples-to-apples comparisons dynamically, overcoming some of the key challenges in AI evaluation today! 😎
~ @geekcode
Collection of resources realted to ANDROID, SOFTWARE SECURITY & other professional guide's ⚡
https://github.com/ashishb/android-security-awesome
~ @geekcode
https://github.com/ashishb/android-security-awesome
~ @geekcode
Forwarded from Cyber Agents
Have I been Pwned goes open source
Want to find out if someone's stolen your user IDs and passwords? Then you can use "Have I Been Pwned," and now the code behind it is being open sourced.
https://www.zdnet.com/article/have-i-been-pwned-goes-open-source/
@cyberagents X @geekcode
Want to find out if someone's stolen your user IDs and passwords? Then you can use "Have I Been Pwned," and now the code behind it is being open sourced.
https://www.zdnet.com/article/have-i-been-pwned-goes-open-source/
@cyberagents X @geekcode
How Scareware Comes in Used?
Typically through pop-up ads from rogue security providers that may sound legitimate but are fake. For example, rogue scareware or fake software names to watch out for include Advanced Cleaner, System Defender, and Ultimate Cleaner.
Scareware ads, which pop up in front of open applications and browsers, aim to scare computer users into thinking they have a major problem with their device. The hacker uses pop-up warnings to tell them their computer has been infected with dangerous viruses that could cause it to malfunction or crash. Some scareware ads also purport to be scanning the user’s device, then showing them hundreds of viruses that are supposedly present but are actually fake results. Typically, the more menacing or shocking an ad pop-up sounds, the more likely the claims being made are scareware.
Another key feature of scareware is urgency. Hackers attempt to convince users that the supposed device problem requires immediate action and then prompt them to install the program as quickly as possible. Therefore, always be careful with any ad that demands the user to act immediately. It is most likely scareware.
For query : @geekcode
~ @geekcode
Typically through pop-up ads from rogue security providers that may sound legitimate but are fake. For example, rogue scareware or fake software names to watch out for include Advanced Cleaner, System Defender, and Ultimate Cleaner.
Scareware ads, which pop up in front of open applications and browsers, aim to scare computer users into thinking they have a major problem with their device. The hacker uses pop-up warnings to tell them their computer has been infected with dangerous viruses that could cause it to malfunction or crash. Some scareware ads also purport to be scanning the user’s device, then showing them hundreds of viruses that are supposedly present but are actually fake results. Typically, the more menacing or shocking an ad pop-up sounds, the more likely the claims being made are scareware.
Another key feature of scareware is urgency. Hackers attempt to convince users that the supposed device problem requires immediate action and then prompt them to install the program as quickly as possible. Therefore, always be careful with any ad that demands the user to act immediately. It is most likely scareware.
For query : @geekcode
~ @geekcode