GeekCode
794 subscribers
452 photos
3 videos
7 files
942 links
🍁Cyber Security ❀️
🍁Hacking Resources πŸ‘¨β€πŸ’»

Providing knowledge to people'sπŸ₯€
Nobody gets smaller by sharing knowledge
You can also share your knowledge with us...πŸ™‚πŸ™‚

πŸ“°Promotion/Query - @geekcodevipbot
Download Telegram
Website Hosting for beginners cPanel with Siteground account

Description: Explore how you can get online create your first Website Hosting and get your own website URL using common cPanel

Enroll Now:
https://www.udemy.com/course/website-hosting-cpanel/

#share & #supportus

πŸ“ @geekcode πŸ“

Don't forget to join us πŸ‘‡πŸ»
#techspicy #technews

Microsoft open-sources fuzzing tool it uses in-house to keep Windows so very secure

https://go.theregister.com/feed/www.theregister.com/2020/09/16/microsoft\_open\_sources\_fuzzing\_tool/

#share & #supportus

πŸ“ @geekcode πŸ“

Don't forget to join us πŸ‘‡πŸ»

πŸ“
@geekcode πŸ“
Game Development for beginners with Python

Description πŸ“ƒ : Create a clone of the popular Flappy Bird game using Python from scratch

Course Category πŸ“° : Development

Course Length πŸ“ : 3 hours

Enroll Now πŸ‘‰ :
https://www.udemy.com/course/game-development-for-beginners-with-python/?source=coursemania.xyz&couponCode=8F84C76C24BA740CB6C3

#share & #supportus

πŸ“ @geekcodeπŸ“

Don't forget to join us πŸ‘‡πŸ»
GeekCode pinned a photo
#COURSE

Learn Android Application Development

Description πŸ“ƒ : A beginner course on Android Application development

Course Category πŸ“° : Development

Course Length πŸ“ : 27 hours

Enroll Now πŸ‘‰ :
https://www.udemy.com/course/learn-android-application-development-y/?source=coursemania.xyz&couponCode=null

#share & #supportus

πŸ“ @geekcode πŸ“

Don't forget to join us πŸ‘‡πŸ»
GeekCode pinned a photo
πŸ”° How to unsubscribe All YouTube Channel at Single click πŸ”°

.......... Follow this Steps ...........

1. Click or type this link in web browser
https://www.youtube.com/feed/channels (in pc only)

2. right click there and click on inspect and go to console section

3. copy and paste this code πŸ‘‡

Code:
var i = 0;
var count = document.querySelectorAll("ytd-channel-renderer:not(.ytd-item-section-renderer)");

myTimer();

function myTimer () {
if (count == 0) return;

el = document.querySelector('.ytd-subscribe-button-renderer');
el.click();

setTimeout(function () {
var unSubBtn = document.getElementById("confirm-button").click();
i++;
count--;

console.log(i + " unsubscribed");
console.log(count + " remaining");

setTimeout(function () {
el = document.querySelector("ytd-channel-renderer");
el.parentNode.removeChild(el);

myTimer();
}, 250);
}, 250);
}

4. Now Hit Enter

5. Congratulation you Successfully Unsubscribe All your youtube channel.
What Is A Keylogger And How Does It Work?
━━━━━━━━━━━━━
A keylogger is a type of spyware that can be used to track and log the keys you strike on your keyboard, capturing any information typed. Keyloggers are insidious because you don’t know they’re there, watching and recording everything you type.

How do keylogging activities benefit cybercriminals? The data captured can include your personal and financial information, PIN codes and account numbers, credit card numbers, usernames, passwords, and other sensitive data β€” all of which can used to commit fraud or identity theft.

Keyloggers can be software or hardware. Software is more common. The majority of keyloggers are used to capture payment card data you might enter online with a device. Once captured, your data can be retrieved by the person on the other end of the keylogger program.

Many keyloggers have root-kit functionality. That means they’re hiding in your system. These so-called Trojan-spy programs can track user activity β€” including keystrokes and screenshots β€”save the data to your hard disk, and forward the information to cybercriminals.

An example of a hardware-based keylogger is the keyboard overlay on an ATM. Every time a bank customer presses the buttons on the criminal’s fake keypad β€” thinking it’s the legitimate ATM keypad β€” the keylogger records the keystrokes and forwards the information to the cybercriminal.

#share & #supportus

πŸ“
@geekcode πŸ“
GeekCode pinned Β«What Is A Keylogger And How Does It Work? ━━━━━━━━━━━━━ A keylogger is a type of spyware that can be used to track and log the keys you strike on your keyboard, capturing any information typed. Keyloggers are insidious because you don’t know they’re there…»
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
Burp Bounty Pro detect possible SQL Injection vulnerable parameter? Smart Scan launch attacks for SQL injection only for this parameter. All this automatic, while you browse the web.

Here is the rule that makes it possible

#share & #supportus

@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
How to Remove a Virus Using Command Prompt

Dear Spyboy app readers today I am going to tell you How to Remove a Virus Using Command Prompt
Virus is a computer program that can copy itself and infect your computer. These viruses can spread via USB/flash drive or from one computer to other computer by few written codes. There are many antivirus software available to remove viruses from computer. But there are some viruses or suspicious files which can’t be removed by any antivirus software. Some suspicious files such as autorun.inf initiate all the viruses in pc. These files must be removed for safe operation of your pc, because they may lead to data loss, software damages etc. Such viruses and files can be removed by using cmd. In this article we will discuss how to remove a virus using command prompt. Following steps can be used to remove a virus using command prompt from your computer.
Go to start menu and type β€œcmd” in the search box or Start>all programs>accessories>command prompt.

Open the infected drive such as write , g: to go to G drive.
Now type dir/w/a . It will show all the files of the drive including hidden files.
Locate AUTORUN.INF or any Virus and other suspicious files in the directory.
there was no virus in my drive so only autorun.inf is been highlighted.

Type command attrib -r –a –s –h to remove attributes of corresponding file.
Type del autorun.inf to delete autorun.inf file.

Now type del virus name.exe t delete it, eg : del newfolder.exe .
(You can also delete viruses by using following steps:

When you find an Autorun.inf file or any other unusual .exe file just rename it.
Syntax for rename is (rename filename.extension new name , for example: (rename autorun.inf virus) to rename autorun.inf file. Here I have renamed it by β€œvirus”.

Now you can access the defected drive without affecting the virus.
To delete the renamed file go to the defected drive and select the file you renamed.
Now delete the harmful renamed files.)

You have deleted that virus successfully but sometimes virus resides in the Recycler folder.To locate this folder:

Type cd recycler command.
Again type dir/w/a to locate all file of the folder.
Identify malicious files and delete them using above commands.
Follow the above steps carefully and i think this information is enough to remove a virus using command prompt easily.

Important: Make sure that no other processes being running while performing these actions. Best of luck.

#share & #supportus

@geekcode
This media is not supported in your browser
VIEW IN TELEGRAM
#COURSE

Fundamentals of Network Security
Concept on network Security, OSI model, Network Attack and protection

To identify information security threats
To identify the OSI Model layer
To identify Network Attack
To identify Network Protection Method

Enroll now ->
https://bit.ly/3iGYQqn

#share & #supportus

πŸ“ @geekcode πŸ“

Don't forget to join us πŸ‘‡πŸ»