PixelDrive
186 subscribers
50 photos
12 videos
11 files
31 links
Primarily hacking the cyber world, but we also play around with design and code
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
Chinese gamer, addicted to video games, holed in a hotel for 2 yrs without leaving - food delivered via apps
โค2๐Ÿ˜2
Forwarded from Dan Browns The Lost Symbol via @imdbot
โ€‹๏ธTitle: The Lost Symbol [2021]
Also Known As: Dan Brown's the Lost Symbol
Rating โญ๏ธ: 6.3 / 10
(6.3 based on 11,017 user ratings) | TV-PG | |
Release Info: September 16, 2021 (United States)
Genre: #Action ๐ŸŒ‹ #Adventure ๐ŸŽญ #Drama
Language: #English
Country of Origin: ๐Ÿ‡บ๐Ÿ‡ธ #United_States
Story Line: Based on the 2009 Dan Brown novel of the same name, The Lost Symbol is the story of a young Robert Langdon (Ashley Zukerman) being tasked by the CIA to solve a number of puzzles when his mentor (Eddie Izzard) is taken.
Stars Ashley Zukerman Eddie Izzard Valorie Curry
โค1
Autocorrect has caused more misunderstandings than any language barrier in human history
๐Ÿ”ฅ3๐Ÿ‘2
You just cant miss this if you dont know.

Cisco have free courses under different fields. sign up, complete, then get ur certs

https://www.netacad.com/catalogs/learn/
๐Ÿ‘3
๐Ÿดโ€โ˜  XSS exploting (Cross-Site Scripting)

๐Ÿ Why It Matters?
XSS is one of the most common and impactful bugs in bug bounty programs.
It allows attackers to run malicious JavaScript in a victimโ€™s browser โ†’ leading to:
โžก๏ธ Cookie Theft
โžก๏ธ Account hijack
โžก๏ธ Phishing Attacks

๐ŸŒฉ Types of XSS

๐Ÿ“ Reflected XSS โ†’ Script runs immediately via malicious URL

๐Ÿ“ฆ Stored XSS โ†’ Payload saved in database (most dangerous)

๐Ÿ” DOM-Based XSS โ†’ Exploit inside client-side JavaScript

๐Ÿ›  Testing Payloads
<script>alert(1)</script>
"><img src=x onerror=alert(1)>

๐ŸŽฏ Bug Hunter Insight
Start with alert(1) to confirm the bug.
Then, escalate by testing cookies, localStorage, or session hijacking for higher impact.

#BugBounty #XSS #WebSecurity #EthicalHacking #AppSec #CyberSecurity #pixeldrive
โšก3๐Ÿ‘1๐Ÿฅฐ1
๐Ÿฐ HOW TO GET ALL IP RANGES FROM DATACENTERS ๐Ÿฐ

1๏ธโƒฃ Get the ASN from a give IP. To do this visit https://ip-api.com/ and paste the IP :

https://i.imgur.com/6YRtJdv.png

2๏ธโƒฃ Install whois if it is not installed on your PC :

Linux :
sudo apt install whois

In Windows it should be pre-installed on command line

3๏ธโƒฃ Get the ASN for example : AS13335

4๏ธโƒฃ Scrape IP Ranges :

whois -h whois.radb.net -- '-i origin ASN_NUMBER' | grep 'route:'

My Command :

whois -h whois.radb.net -- '-i origin AS13335' | grep 'route:'

And there you go. You can also install cmder.net to use grep as command which is recommended.

๐Ÿ”ปSHARE AND SUPPORT CHANNEL๐Ÿ”ป
๐Ÿ‘1
This media is not supported in your browser
VIEW IN TELEGRAM
The body (velocity of a bulletร— mass of the bullet) / bodyfat [tissue resistance] times the bio constant 1- pi it's possible
๐Ÿคช2๐Ÿฅฐ1
โ€œLegacy code is not broken  itโ€™s speaking.
Every hack, shortcut, and forgotten comment is a story of someone solving a problem yesterday.
Your job isnโ€™t to curse it. itโ€™s to translate it, to understand the language of entropy.
Refactoring is not cleaning up; itโ€™s reading history and shaping the future.
In software, clarity is the ultimate superpower.โ€
Join --->> @pixeldrive
โค1๐Ÿ‘1
๐Ÿ˜2๐Ÿ‘1
๐Ÿ˜3๐Ÿ‘1
แŠฅแŠ•แŠณแŠ• แˆˆแŒŒแ‰ณแ‰ฝแŠ• แˆˆแˆ˜แ‹ตแˆƒแŠ’แ‰ณแ‰ฝแŠ• แˆˆแŠขแ‹จแˆฑแˆต แŠญแˆญแˆตแ‰ถแˆต แ‹จแˆแ‹ฐแ‰ต แ‰ แ‹“แˆ แŠ แ‹ฐแˆจแˆณแ‰ฝแˆ!

"แŠฅแАแˆ†แฅ แˆˆแˆ•แ‹แ‰ก แˆแˆ‰ แ‹จแˆšแˆ†แŠ• แ‰ณแˆ‹แ‰… แ‹ฐแˆตแ‰ณ แ‹จแˆแˆฅแˆซแ‰ฝ แŠฅแАแŒแˆซแ‰ฝแŠ‹แˆˆแˆแŠ“ แŠ แ‰ตแแˆฉแค แ‹›แˆฌ แ‰ แ‹ณแ‹Šแ‰ต แŠจแ‰ฐแˆ› แˆ˜แ‹ตแŠƒแŠ’แ‰ต แŠฅแˆญแˆฑแˆ แŠญแˆญแˆตแ‰ถแˆต แŒŒแ‰ณ แ‹จแˆ†แА แ‰ฐแ‹ˆแˆแ‹ถแˆ‹แ‰ฝแŠ‹แˆแŠ“แข"
แ‹ฐแˆตแ‰ณ แˆˆแŠ แˆˆแˆ

แˆ‰แ‰ƒ 2:10-11
โค4๐Ÿ‘3๐Ÿ‘Ž2
Most Common Pentesting Methodologies:

1, MITRE ATT&CK

2, OWASP WSTG

3, NIST SP 800-115

4, OSSTMM

5, PTES

6, ISSAF

#Methodologies #Tips #Tackticks
@MelexIT @MelexTech
๐Ÿค4๐Ÿ‘1
So, speed is already in Ethiopia and is being scammed live from merchants.
๐Ÿ‘1๐Ÿ˜1๐Ÿฅฑ1
๐Ÿ˜ญ๐Ÿ˜ญ
๐Ÿ‘1
Post-1 FUNDAMENTALS OF DATABASE

Databases Are Not Storage Systems (And Never Were)

Most people, including experienced developers, are subconsciously convinced that a database is โ€œa place where data lives.
This is a fundamentally flawed belief, and one which the book sorts out in a way that most modern tutorials never do.
A database system exists to deal with states of reality over time.
Elmasri doesnโ€™t define a database as โ€œdata.โ€
He defines it as a model of a miniworld an intentionally restricted, conventionally delineated piece of the real world.
Why this matters:
- Your system is not storing users
It's caching assumptions about identity
- Not orders, but contracts
Legal and temporal rather than transaction commitments
This is why:
Changing business rules breaks databases
-โ€œJust add a columnโ€ is never just a column

Schema changes are organizational decisions, not technical ones.

What realworld fact does your current database fail to represent even though the business depends on it?

#DatabaseTheory #SoftwareArchitecture #Backend
@pixeldrive
๐Ÿ”ฅ2๐Ÿ‘1
Post-2 Series FUNDAMENTALS OF DATABASE
Why File Systems Failed (The Semantic Coupling Crisis)

โ€‹The usual explanation is "redundancy". The real explanation is Semantic Coupling.
โ€‹โ€‹Elmasri
In the file system era, the semantics of the data being worked with remained deeply embedded in the code of the applications. If you modified the format of the data, you had to break all the programs that worked with that data.
โ€‹The Industry Insight:
All of these problems are being repeated today in the area of Microservices.
"When services share data through JSON but don't have a schema, the 'meaning' of a field such as status is repeated across 10 different code bases."
โ€‹The Result: You have successfully implemented a file system that would have been found in the 1970s

The DBMS is to Enforce Meaning independent of programs. Without knowledge of what your data means, you can't have a DBMS; what you'll have is an expensive bit bucket.

โ€‹#Microservices #DataEngineering #LegacySystems #ComputerScience
@pixeldrive
๐Ÿ‘4๐Ÿค”1
Reminder: The human species wonโ€™t go extinct in your lifetime.

#unsolicitedadvice
@pixeldrive
๐Ÿ‘2๐Ÿ˜1
Forwarded from Meriii ใƒชใƒ™ใƒณใ‚ธ
PyHTools:

Features:
=> For Networks
1. Network Scanner
2. Mac changer
3. ARP Spoofing
4. DNS spoofing
5. Downloads Replacer
6. Network Jammer
7. Pkt Sniffer
8. Code Injector
=> For Websites
1. Login Guesser (Login Bruteforcer)
2. Web Spider
3. Web crawler (detects dirs | subdomains)
4. Web Vulnerablity Scanner
=> Detectors
1. ARP Spoof Detector
=> Malwares/Trojans/Payloads
1. Email Sender (reporter)
2. Downloader
3. Wireless Password Harvester
4. Credential Harvester
5. Keylogger (dlogs)
6. Reverse TCP Backdoor
7. Download and Execute

Download Link
https://github.com/dmdhrumilmistry/pyhtools
๐Ÿ‘1๐Ÿ‘1