Hack Worm
8.19K subscribers
862 photos
43 videos
27 files
1.21K links
πŸ”° Learn Ethical Hacking From Scratch πŸ”°

βœ” Premium Hacking Video Tutorial
βœ” Premium Hacking Software
βœ” Black Hat Techniques & much more
Download Telegram
Learning Shell Scripting: How to Automate Your Tasks
Learn how to Automate Your Tasks using shell programming and solve real-world problems using Bash Scripting

Wirte your first Shell Script
Use Shell Script to Automate Tasks. Such as Collect thousands of Developer Emails from Github
Solving real-world problems with shell scripts,
Deep knowledge of linux command


http://bit.ly/2DoSSb1
Enroll as soon as possible
Media is too big
VIEW IN TELEGRAM
πŸ”° How criminals can clone your cards πŸ”°
Be aware of this ‼️
Stay safe‼️

βž– @HackWormAdminβž–
Group Rules ❗️

No Spamming 🚫

Only Discussions and No Arguments 🀝

No Foul Words and No Abusing Any Individual/Group/Organisation/Institution/Ethnicity or Nationality 😷

Feel free to ask doubts about Hacking here πŸ˜‡

No External Link/URL
No Self Promotion

No Warning Direct Ban

Keep the Group Clean πŸ˜€

https://t.me/joinchat/GOkdVVS7nueAfF3uMFghBg
Hack Worm pinned Β«Group Rules ❗️ No Spamming 🚫 Only Discussions and No Arguments 🀝 No Foul Words and No Abusing Any Individual/Group/Organisation/Institution/Ethnicity or Nationality 😷 Feel free to ask doubts about Hacking here πŸ˜‡ No External Link/URL No Self Promotion…»
COMMAND INJECTION PRIMER

Command injection is a type of attack in which arbitrary operating system commands are executed on the host via a vulnerable web application. Usually, this occurs when an application passes unsafe user input from a form to the server, but this can also happen with cookies, HTTP headers, and other sources of data.

This type of vulnerability is especially dangerous because of the intrinsic power of system commands. Depending on the level of privilege an application is running with, command injection can lead to an attacker owning an entire system.
Information Gathering Tool

git clone https://github.com/Moham3dRiahi/Th3inspector.git

cd Th3inspector

chmod +x install.sh && ./install.sh
πŸ”° How to Get Almost All Udemy Courses for Free [Tested] πŸ”°

1. Firstly go to http://dislooks.com/wgpwx

2. Search for your Course, or just look around.

3. There will be many courses with 100% discount, get one of those or any if you want.

4. Select your course.

5. Click on "Get Coupon".

6. And you will be redirected to Udemy's website and a coupon will be applied automatically.

πŸŒ€That's it! Enjoy your free Courses!πŸŒ€

βž– @ElliotMalek βž–
git clone https://github.com/skavngr/rapidscan.git

Once the tool is installed, it can be launched using the following command.

./rapidscan.py <target website>

😈 @HackWormAdmin 😈
This media is not supported in your browser
VIEW IN TELEGRAM
Steps to use ilinkshortx.com

**For Those who aren't able to use ilinkshortx.com
Social Engineering for Absolute Beginners (no coding!)
The most common social engineering attacks every manager should know, because every hacker does!

Identify the most common social engineering attacks (no coding!)
Explain the threat, impact and remediation for the most common attacks
Strengthen your personal firewall!

Coupon Link
https://dislooks.com/YKwWjb


πŸ“Education That MattersπŸ“
Dehash password using Termux

Its purpose is to encode your desired hash text.

Encode & Decode as follows:
1. md5 [encode]
2. sha1 [encode]
3. sha224 [encode]
4. sha256 [encode]
5. sha384 [encode]
6. sha512 [encode]
7. base64 [encode/decode]
8. binary [encode/decode]
9. hexa decimal [encode/decode]
10. cipher of cesar [encode/decode]
11. reverse text
12. reverse words

πŸ”°Requirements :- β€’ python 3.x

How to Install
$ apt install git
$ apt install python
$ git clone https://github.com/Sup3r-Us3r/HashCode
How to use
RUN:
$ cd HashCode
$ chmod +x *
$ python3 hashcode-en.py

Change Language:
$ ./hashcode-pt.py // For portuguese - mode text
$ ./hashcode-en.py / For english - mode text

Open GUI:
$ ./hashcodegui.py
Installation

$ apt-get install git python

$ git clone https://github.com/jaxBCD/Zeebsploit.git

$ cd Zeebsploit

$ python -m pip install -r requirements.txt

$ python zsf.py

$ * and follow instruction


exploits 17
scanners 11
footprinting 10

-- @ElliotMalek --
Channel photo removed
Hack Worm pinned Deleted message
🌏 PhishX –Spear Phishing Tool for Capturing Credentials 🌏

PhishX is a python tool that can capture user credentials using a spear phishing attack. Spear phishing is a targeted form of phishing attack that is launched against specific individuals. Therefore, some information about an individual is required in order to launch such an attack. Since PhishX is used to capture user’s credentials, the tool generates fake pages and adds target information to said pages. The pages are shared with the target users. If the users share any data on the fake pages, the information is captured by the interface on the attacker’s machine. The pages that can be used (cloned) for spear phishing attack include Facebook, Google, Twitter, Instagram, LinkedIn, Pinterest, Quora, and Steam. All the available pages support the mobile version except LinkedIn.
Learn Penetration Testing
From Beginner to Advance

http://bit.ly/2V8meAl
DW SITES LVL4.txt
10.7 KB
πŸ”° Deep Web Site List [Lvl 4 or above] πŸ”°
#Repost
πŸ”° FaceBook Phishing Page πŸ”°

http://bit.ly/2Q1AD0j

Password : HackWorm

Don't Change AnyThing. Directly Upload on Web Hosting.
πŸ”₯ Udemy -
REAL World Website Hacking and Penetration (101% Practical)
πŸ”₯

http://bit.ly/2WDZycM