GeekCode
794 subscribers
452 photos
3 videos
7 files
942 links
🍁Cyber Security ❀️
🍁Hacking Resources πŸ‘¨β€πŸ’»

Providing knowledge to people'sπŸ₯€
Nobody gets smaller by sharing knowledge
You can also share your knowledge with us...πŸ™‚πŸ™‚

πŸ“°Promotion/Query - @geekcodevipbot
Download Telegram
[Udemy] Practical Cisco Networking Labs [10 Hours]

Claim It Before Expired Coupon Code πŸ‘‡
πŸ”—Link:-
https://bit.ly/2NRPLgL πŸ”—

Coupon Code =
FREEBIESGLOBAL.COM

#share & #supportus

πŸ“ @geekcode πŸ“

Don't forget to join us πŸ‘‡πŸ»
[Udemy] Fundamentals of Machine Learning [Hindi][Python] [3 Hours]

Claim It Before Expired Coupon Code πŸ‘‡
πŸ”—Link:-
https://bit.ly/3f3VQCs πŸ”—

Coupon Code = FREE4ALL

#share & #supportus

πŸ“ @geekcodeπŸ“

Don't forget to join us πŸ‘‡πŸ»
#technews

​​Visual Studio by Microsoft is one of the top integrated development environments (IDEs). It enables developers to integrate their existing development suite with other applications, adding a lot of features in the process to boost your productivity. As a part of Microsoft’s efforts to open source their code, Visual Studio is available as free and open-source software.

⏱ 7 min read

#share & #supportus

πŸ“ @geekcode πŸ“

Don't forget to join us πŸ‘‡πŸ»
[Udemy] Certified Ethical Hacker (CEH) Practice Exams

Claim It Before Expired Coupon Code πŸ‘‡
πŸ”—Link:-
https://bit.ly/2ZW1T63 πŸ”—

Coupon Code = JULYHOLIDAYS

#share & #supportus

πŸ“ @geekcode πŸ“

Don't forget to join us πŸ‘‡πŸ»
πŸ”° Exploit Development on Windows (W38) πŸ”°

Price: $219

Source:-
https://pentestmag.com/course/exploit-development-windows-w38/

#share & #supportus

πŸ“ @geekcodeπŸ“

Don't forget to join us πŸ‘‡πŸ»
This media is not supported in your browser
VIEW IN TELEGRAM
WhiteSur kde is a MacOS big sur like theme for KDE Plasma desktop πŸ‘¨β€πŸŽ¨
πŸ”ΉRepo ->
github.com/vinceliuice/WhiteSur-kde


#share & #supportus

πŸ“ @geekcode πŸ“

Don't forget to join us πŸ‘‡πŸ»
πŸ”° Cryptanalysis for pentesters (W39) πŸ”°

Price: $239

Source:-
https://pentestmag.com/course/cryptanalysis-pentesters-w39/curriculum/

#share & #supportus

πŸ“ @geekcode πŸ“

Don't forget to join us πŸ‘‡πŸ»
#Enroll
x64dbg Debugger for Reverse Engineering Beginners
Learn how to reverse engineer and debug programs with x64dbg in 1 hour

https://courses.perfectmafia.com/2020/07/100-off-x64dbg-debugger-for-reverse-engineering-beginners.html

#share & #supportus

πŸ“ @geekcode πŸ“

Don't forget to join us πŸ‘‡πŸ»
Database Engines Crash Course

Description: MyISAM, Aria, InnoDB, XtraDB, LevelDB & RocksDB

Enroll Now:
https://coursemania.xyz/course.html?id=523608

#share & #supportus

πŸ“ @geekcode πŸ“

Don't forget to join us πŸ‘‡πŸ»
πŸ”° Exploiting IoT Devices (W44) πŸ”°

Ⓜ️ The Internet of Things is one of β€œthe” most upcoming trends. Every month, there are hundreds of thousands of smart devices being connected to the internet and potentially being exposed to malicious attackers because there are a number of privacy and security concerns in those smart devices. There are roughly 8 billion devices connected to the internet as of now and by early 2020, it's estimated that there will be 25 to 35 billion IoT devices worldwide, however, little additional attention is being paid to the device's security. Exploitation:

Pentest of IoT Devices
Firmware static and dynamic analysis
Breaking Firmware encryption standard
BLE exploitation tools hcitool and gatttool
Sniffing BLE Packets using BLE sniffer/ubertooth
Hardware exploitation technique UART, JTAG, I2C and JTAG
Analyzing the security of the IoT communication protocol

πŸ“Source :

https://hakin9.org/course/exploiting-iot-devices-w44/

#share & #supportus
πŸ“ @geekcodeπŸ“
Don't forget to join us πŸ‘‡
πŸ”₯ MalwareBytes Key Generator With Latest Pattern πŸ”₯

https://anonfiles.com/n7Oc4eCeo3/gen\_exe%5C

It generates 100K Keys in Seconds , it will save all Keya in Generated.txt , you need to check those keys to get Free , Premium , Blacklisted hits... Will Update Checker as i get ...

#share & #supportus

πŸ“ @geekcode πŸ“

Don't forget to join us πŸ‘‡πŸ»
πŸ”° Bug Bounty PoC videos πŸ”°

Download :
https://drive.google.com/drive/mobile/folders/14zlqgin6rUfr6jQRBCLbbP8P8Vdypz7x

#share & #supportus

πŸ“ @geekcode πŸ“

Don't forget to join us πŸ‘‡πŸ»
#technews

Following vulnerability disclosure in the Mitron app, another viral TikTok clone in India has now been found vulnerable to a critical but easy-to-exploit authentication bypass vulnerability, allowing anyone to hijack any user account and tamper with their information, content, and even upload unauthorized videos. The Indian video sharing app, called Chingari, is available for Android and iOSMedia

https://thehackernews.com/2020/07/hack-chingari-app-account.html

#share & #supportus

πŸ“ @geekcode πŸ“

Don't forget to join us πŸ‘‡πŸ»