GeekCode
798 subscribers
452 photos
3 videos
7 files
942 links
๐ŸCyber Security โค๏ธ
๐ŸHacking Resources ๐Ÿ‘จโ€๐Ÿ’ป

Providing knowledge to people's๐Ÿฅ€
Nobody gets smaller by sharing knowledge
You can also share your knowledge with us...๐Ÿ™‚๐Ÿ™‚

๐Ÿ“ฐPromotion/Query - @geekcodevipbot
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
Google VS DuckDuckGoโšก

For query :
@geekserverbot

~
@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
Collection of resources realted to ANDROID, SOFTWARE SECURITY & other professional guide's โšก

https://github.com/ashishb/android-security-awesome

~ @geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
Google hacking Cheat Sheet โšก

For query :
@geekserverbot

~
@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Cyber Agents
Have I been Pwned goes open source

Want to find out if someone's stolen your user IDs and passwords? Then you can use "Have I Been Pwned," and now the code behind it is being open sourced.

https://www.zdnet.com/article/have-i-been-pwned-goes-open-source/

@cyberagents X @geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
How Scareware Comes in Used?

Typically through pop-up ads from rogue security providers that may sound legitimate but are fake. For example, rogue scareware or fake software names to watch out for include Advanced Cleaner, System Defender, and Ultimate Cleaner.

Scareware ads, which pop up in front of open applications and browsers, aim to scare computer users into thinking they have a major problem with their device. The hacker uses pop-up warnings to tell them their computer has been infected with dangerous viruses that could cause it to malfunction or crash. Some scareware ads also purport to be scanning the userโ€™s device, then showing them hundreds of viruses that are supposedly present but are actually fake results. Typically, the more menacing or shocking an ad pop-up sounds, the more likely the claims being made are scareware.

Another key feature of scareware is urgency. Hackers attempt to convince users that the supposed device problem requires immediate action and then prompt them to install the program as quickly as possible. Therefore, always be careful with any ad that demands the user to act immediately. It is most likely scareware.

For query : @geekcode

~ @geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
Bug Hunting strategy ๐Ÿ‘€โšก

For query :
@geekserverbot

~
@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
These Codes have 5 different ranges from 1ร—ร— - 5ร—ร—โšก

1ร—ร— โ€“ Informational
2ร—ร— โ€“ Success
3ร—ร— โ€“ Redirection
4ร—ร— โ€“ Client error
5ร—ร— โ€“ Server error

Some Important HTTP STATUS CODES:

100: Continue
101: Switching Protocols
102: Processing
103: Checkpoint

200: OK / Success
201: Created
202: Accepted
207: Multi-Status

301: Moved Permanently
302: Found
307: Temporary Redirect
308: Permanent Redirect

400: Bad Request
401: Unauthorized
402: Payment Required
403: Forbidden
404: Not Found
408: Request Timeout
410: Gone
451: Unavailable for Legal Reasons

500: Internal Server Error
503: Service Unavailable
504: Gateway Timeout

For query : @geekserverbot

~ @geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
What is Social Engineering?

The social engineering as an art of extracting sensitive information from peoples. Social engineers keep themselves undetected people are unware and careless and share their valuable information. This information is related to the type of social engineering.

For query : @geekserverbot

~ @geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Cyber Agents