GeekCode
798 subscribers
452 photos
3 videos
7 files
942 links
🍁Cyber Security ❤️
🍁Hacking Resources 👨‍💻

Providing knowledge to people's🥀
Nobody gets smaller by sharing knowledge
You can also share your knowledge with us...🙂🙂

📰Promotion/Query - @geekcodevipbot
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
What is proof of concept (PoC) exploit?

A proof of concept (PoC) exploit is a non-harmful attack against a computer or network. PoC exploits are not meant to cause harm, but to show security weaknesses within software. Identifying issues allows companies to patch vulnerabilities and protect itself against attacks.

For query : @geekserverbot

~ @geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
How POC exploits work?

Basically, POC exploits are done by a vendor working for the company. By simulating an actual attack, it allows the company to patch the security hole without systems or data being compromised. The code developed for the test is known as (a proof of concept code) will likely be used in the future to test the software and make sure the new security measures work.

Thanks alot @geekcode army ❤️

For query : @geekserverbot

~ @geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
#CyberSecurityTALKS

How can my account details get hacked?👀

Every year, billions of login details from hundreds of websites are taken in hacker attacks. These stolen email addresses, passwords, and other account details are then exposed on the dark web or sold on the black market, where criminals pay to gain access to your sensitive data. Companies or organizations you do business with can also leak or publish their users’ sensitive information by accident.

If criminals get a hold of one of your accounts, they can potentially impersonate you, message your contacts, access your cloud storage, steal your money, and even jump to your other accounts. That’s why we take password safety so seriously.


~ @geekcode ❤️
This media is not supported in your browser
VIEW IN TELEGRAM
Password Manager Software For Hackers

Note: If you are currently using a password manager software like 1Password, LastPass, Roboform, or iCloud keychain you should pick an alternative here.

🔹Bitwarden - Cloud/Self-host
Site: https://bitwarden.com/

🔹KeePassXC - Local
Site: https://keepassxc.org/

🔹LessPass - Browser
Site: https://lesspass.com/
This media is not supported in your browser
VIEW IN TELEGRAM
#hellohackers

Try to Learn hacking by real life examples it can be very helpful for your skills❤️

~geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
What is Keylogger?

A keylogger is a type of spyware that can be used to track and log the keys you strike on your keyboard, capturing any information typed. Keyloggers are insidious because you don’t know they’re there, watching and recording everything you type.

How its useful for bad guys(Hackers)?


The data captured by keylogger can include your personal and financial information, PIN codes and account numbers, credit card numbers, usernames, passwords, and other sensitive data — all of which can used to commit fraud or identity theft.


~ @geekcode
How can we protect our computer from such kind of spyware & keyloggers ?

Keylogger can be difficult to detect but there is some common signs for detecting keylogger -:

🔹 Computer getting slower
🔹 Abnormal delays on starting the programs
🔹 New icons & files on desktop
🔹 Excessive Hard Drive
🔹 Network activity
🔹 Unwanted pop-ups

Thanks for asking your questions I like it when you guys ask questions❤️

~ @geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
GeekCode
Networking for newbies
Geekcode working on Networking for newbies ebook or physical book you can get all this series content at one place ❤️

Thanks for supporting us 💙

Keep supporting like this and keep gaining knowledge with us
~ @geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Cyber Agents
Join us @cyberagents for more content like this ♥️