This media is not supported in your browser
VIEW IN TELEGRAM
Chinese gamer, addicted to video games, holed in a hotel for 2 yrs without leaving - food delivered via apps
โค2๐2
Forwarded from Dan Browns The Lost Symbol via @imdbot
โ๏ธTitle: The Lost Symbol [2021]
Also Known As: Dan Brown's the Lost Symbol
Rating โญ๏ธ: 6.3 / 10
(
Release Info: September 16, 2021 (United States)
Genre: #Action ๐ #Adventure ๐ญ #Drama
Language: #English
Country of Origin: ๐บ๐ธ #United_States
Story Line: Based on the 2009 Dan Brown novel of the same name, The Lost Symbol is the story of a young Robert Langdon (Ashley Zukerman) being tasked by the CIA to solve a number of puzzles when his mentor (Eddie Izzard) is taken.
Stars Ashley Zukerman Eddie Izzard Valorie Curry
Also Known As: Dan Brown's the Lost Symbol
Rating โญ๏ธ: 6.3 / 10
(
6.3 based on 11,017 user ratings) | TV-PG | |Release Info: September 16, 2021 (United States)
Genre: #Action ๐ #Adventure ๐ญ #Drama
Language: #English
Country of Origin: ๐บ๐ธ #United_States
Story Line: Based on the 2009 Dan Brown novel of the same name, The Lost Symbol is the story of a young Robert Langdon (Ashley Zukerman) being tasked by the CIA to solve a number of puzzles when his mentor (Eddie Izzard) is taken.
Stars Ashley Zukerman Eddie Izzard Valorie Curry
โค1
Autocorrect has caused more misunderstandings than any language barrier in human history
๐ฅ3๐2
You just cant miss this if you dont know.
Cisco have free courses under different fields. sign up, complete, then get ur certs
https://www.netacad.com/catalogs/learn/
Cisco have free courses under different fields. sign up, complete, then get ur certs
https://www.netacad.com/catalogs/learn/
๐3
๐ดโโ XSS exploting (Cross-Site Scripting)
๐ Why It Matters?
XSS is one of the most common and impactful bugs in bug bounty programs.
It allows attackers to run malicious JavaScript in a victimโs browser โ leading to:
โก๏ธ Cookie Theft
โก๏ธ Account hijack
โก๏ธ Phishing Attacks
๐ฉ Types of XSS
๐ Reflected XSS โ Script runs immediately via malicious URL
๐ฆ Stored XSS โ Payload saved in database (most dangerous)
๐ DOM-Based XSS โ Exploit inside client-side JavaScript
๐ Testing Payloads
<script>alert(1)</script>
"><img src=x onerror=alert(1)>
๐ฏ Bug Hunter Insight
Start with alert(1) to confirm the bug.
Then, escalate by testing cookies, localStorage, or session hijacking for higher impact.
#BugBounty #XSS #WebSecurity #EthicalHacking #AppSec #CyberSecurity #pixeldrive
๐ Why It Matters?
XSS is one of the most common and impactful bugs in bug bounty programs.
It allows attackers to run malicious JavaScript in a victimโs browser โ leading to:
โก๏ธ Cookie Theft
โก๏ธ Account hijack
โก๏ธ Phishing Attacks
๐ฉ Types of XSS
๐ Reflected XSS โ Script runs immediately via malicious URL
๐ฆ Stored XSS โ Payload saved in database (most dangerous)
๐ DOM-Based XSS โ Exploit inside client-side JavaScript
๐ Testing Payloads
<script>alert(1)</script>
"><img src=x onerror=alert(1)>
๐ฏ Bug Hunter Insight
Start with alert(1) to confirm the bug.
Then, escalate by testing cookies, localStorage, or session hijacking for higher impact.
#BugBounty #XSS #WebSecurity #EthicalHacking #AppSec #CyberSecurity #pixeldrive
โก3๐1๐ฅฐ1
๐ฐ HOW TO GET ALL IP RANGES FROM DATACENTERS ๐ฐ
1๏ธโฃ Get the ASN from a give IP. To do this visit https://ip-api.com/ and paste the IP :
https://i.imgur.com/6YRtJdv.png
2๏ธโฃ Install whois if it is not installed on your PC :
Linux :
3๏ธโฃ Get the ASN for example : AS13335
4๏ธโฃ Scrape IP Ranges :
๐ปSHARE AND SUPPORT CHANNEL๐ป
1๏ธโฃ Get the ASN from a give IP. To do this visit https://ip-api.com/ and paste the IP :
https://i.imgur.com/6YRtJdv.png
2๏ธโฃ Install whois if it is not installed on your PC :
Linux :
sudo apt install whois
In Windows it should be pre-installed on command line3๏ธโฃ Get the ASN for example : AS13335
4๏ธโฃ Scrape IP Ranges :
whois -h whois.radb.net -- '-i origin ASN_NUMBER' | grep 'route:'
My Command :whois -h whois.radb.net -- '-i origin AS13335' | grep 'route:'
And there you go. You can also install cmder.net to use grep as command which is recommended.๐ปSHARE AND SUPPORT CHANNEL๐ป
Ip-Api
IP-API.com - Geolocation API
Free IP Geolocation API - lookup any IP address
๐1
This media is not supported in your browser
VIEW IN TELEGRAM
The body (velocity of a bulletร mass of the bullet) / bodyfat [tissue resistance] times the bio constant 1- pi it's possible
๐คช2๐ฅฐ1
โLegacy code is not broken itโs speaking.
Every hack, shortcut, and forgotten comment is a story of someone solving a problem yesterday.
Your job isnโt to curse it. itโs to translate it, to understand the language of entropy.
Refactoring is not cleaning up; itโs reading history and shaping the future.
In software, clarity is the ultimate superpower.โ
Join --->> @pixeldrive
Every hack, shortcut, and forgotten comment is a story of someone solving a problem yesterday.
Your job isnโt to curse it. itโs to translate it, to understand the language of entropy.
Refactoring is not cleaning up; itโs reading history and shaping the future.
In software, clarity is the ultimate superpower.โ
Join --->> @pixeldrive
โค1๐1
แฅแแณแ แแแณแฝแ แแแตแแแณแฝแ แแขแจแฑแต แญแญแตแถแต แจแแฐแต แ แแ แ แฐแจแณแฝแ!
"แฅแแแฅ แแแแก แแ แจแแแ แณแแ แฐแตแณ แจแแฅแซแฝ แฅแแแซแฝแแแแ แ แตแแฉแค แแฌ แ แณแแต แจแฐแ แแตแแแต แฅแญแฑแ แญแญแตแถแต แแณ แจแแ แฐแแแถแแฝแแแแข"
แฐแตแณ แแ แแ
แแ 2:10-11
"แฅแแแฅ แแแแก แแ แจแแแ แณแแ แฐแตแณ แจแแฅแซแฝ แฅแแแซแฝแแแแ แ แตแแฉแค แแฌ แ แณแแต แจแฐแ แแตแแแต แฅแญแฑแ แญแญแตแถแต แแณ แจแแ แฐแแแถแแฝแแแแข"
แฐแตแณ แแ แแ
แแ 2:10-11
โค4๐3๐2
Forwarded from โฎ ๐ ๐๐๐๐ซ ๐๐งยฎ โฏ (๐ ๐ฒ๐น๐ฎ)
Most Common Pentesting Methodologies:
1, MITRE ATT&CK
2, OWASP WSTG
3, NIST SP 800-115
4, OSSTMM
5, PTES
6, ISSAF
#Methodologies #Tips #Tackticks
@MelexIT @MelexTech
1, MITRE ATT&CK
2, OWASP WSTG
3, NIST SP 800-115
4, OSSTMM
5, PTES
6, ISSAF
#Methodologies #Tips #Tackticks
@MelexIT @MelexTech
๐ค4๐1
So, speed is already in Ethiopia and is being scammed live from merchants.
๐1๐1๐ฅฑ1
Post-1 FUNDAMENTALS OF DATABASE
Most people, including experienced developers, are subconsciously convinced that a database is โa place where data lives.
This is a fundamentally flawed belief, and one which the book sorts out in a way that most modern tutorials never do.
A database system exists to deal with states of reality over time.
Elmasri doesnโt define a database as โdata.โ
He defines it as a model of a miniworld an intentionally restricted, conventionally delineated piece of the real world.
Why this matters:
- Your system is not storing users
It's caching assumptions about identity
- Not orders, but contracts
Legal and temporal rather than transaction commitments
This is why:
Changing business rules breaks databases
-โJust add a columnโ is never just a column
Schema changes are organizational decisions, not technical ones.
What realworld fact does your current database fail to represent even though the business depends on it?
#DatabaseTheory #SoftwareArchitecture #Backend
@pixeldrive
Databases Are Not Storage Systems (And Never Were)Most people, including experienced developers, are subconsciously convinced that a database is โa place where data lives.
This is a fundamentally flawed belief, and one which the book sorts out in a way that most modern tutorials never do.
A database system exists to deal with states of reality over time.
Elmasri doesnโt define a database as โdata.โ
He defines it as a model of a miniworld an intentionally restricted, conventionally delineated piece of the real world.
Why this matters:
- Your system is not storing users
It's caching assumptions about identity
- Not orders, but contracts
Legal and temporal rather than transaction commitments
This is why:
Changing business rules breaks databases
-โJust add a columnโ is never just a column
Schema changes are organizational decisions, not technical ones.
What realworld fact does your current database fail to represent even though the business depends on it?
#DatabaseTheory #SoftwareArchitecture #Backend
@pixeldrive
๐ฅ2๐1
Post-2 Series FUNDAMENTALS OF DATABASE
โThe usual explanation is "redundancy". The real explanation is Semantic Coupling.
โโElmasri
In the file system era, the semantics of the data being worked with remained deeply embedded in the code of the applications. If you modified the format of the data, you had to break all the programs that worked with that data.
โThe Industry Insight:
All of these problems are being repeated today in the area of Microservices.
"When services share data through JSON but don't have a schema, the 'meaning' of a field such as status is repeated across 10 different code bases."
โThe Result: You have successfully implemented a file system that would have been found in the 1970s
The DBMS is to Enforce Meaning independent of programs. Without knowledge of what your data means, you can't have a DBMS; what you'll have is an expensive bit bucket.
โ#Microservices #DataEngineering #LegacySystems #ComputerScience
@pixeldrive
Why File Systems Failed (The Semantic Coupling Crisis)โThe usual explanation is "redundancy". The real explanation is Semantic Coupling.
โโElmasri
In the file system era, the semantics of the data being worked with remained deeply embedded in the code of the applications. If you modified the format of the data, you had to break all the programs that worked with that data.
โThe Industry Insight:
All of these problems are being repeated today in the area of Microservices.
"When services share data through JSON but don't have a schema, the 'meaning' of a field such as status is repeated across 10 different code bases."
โThe Result: You have successfully implemented a file system that would have been found in the 1970s
The DBMS is to Enforce Meaning independent of programs. Without knowledge of what your data means, you can't have a DBMS; what you'll have is an expensive bit bucket.
โ#Microservices #DataEngineering #LegacySystems #ComputerScience
@pixeldrive
๐4๐ค1
๐2๐1
Forwarded from Meriii ใชใใณใธ
PyHTools:
Features:
=> For Networks
1. Network Scanner
2. Mac changer
3. ARP Spoofing
4. DNS spoofing
5. Downloads Replacer
6. Network Jammer
7. Pkt Sniffer
8. Code Injector
=> For Websites
1. Login Guesser (Login Bruteforcer)
2. Web Spider
3. Web crawler (detects dirs | subdomains)
4. Web Vulnerablity Scanner
=> Detectors
1. ARP Spoof Detector
=> Malwares/Trojans/Payloads
1. Email Sender (reporter)
2. Downloader
3. Wireless Password Harvester
4. Credential Harvester
5. Keylogger (dlogs)
6. Reverse TCP Backdoor
7. Download and Execute
Download Link
https://github.com/dmdhrumilmistry/pyhtools
Features:
=> For Networks
1. Network Scanner
2. Mac changer
3. ARP Spoofing
4. DNS spoofing
5. Downloads Replacer
6. Network Jammer
7. Pkt Sniffer
8. Code Injector
=> For Websites
1. Login Guesser (Login Bruteforcer)
2. Web Spider
3. Web crawler (detects dirs | subdomains)
4. Web Vulnerablity Scanner
=> Detectors
1. ARP Spoof Detector
=> Malwares/Trojans/Payloads
1. Email Sender (reporter)
2. Downloader
3. Wireless Password Harvester
4. Credential Harvester
5. Keylogger (dlogs)
6. Reverse TCP Backdoor
7. Download and Execute
Download Link
https://github.com/dmdhrumilmistry/pyhtools
๐1๐1