PROGRAMMERS TECH
66 subscribers
93 photos
123 videos
33 files
214 links
If you learn here you are going to hack any account and you are gonna be programmer
Contact us @Programhack_bot
Download Telegram
Media is too big
VIEW IN TELEGRAM
Telegram bots hacked by using Termux
Media is too big
VIEW IN TELEGRAM
The Lazy Script - Kali Linux 2017.1 - Make Hacking Simple!
Media is too big
VIEW IN TELEGRAM
how to hack telegram for real in Amharic | simple codes
ለ Ethical Hacking የሚሆኑ ምርጥ አሪፍ ቱሎች!
..............................................

ወደ Ethical Hacking በጥልቀት ከመሄዳችን በፊት ስለ አንዳንድ ቱሎቹ ቴክኖሎጂ ምንነት እንጀምር።
የሳይበር ደህንነት ተጠቃሚዎችን ከሳይበር ጥቃት የሚከላከል ከሆነ፣ ሀከር ደሞ የተጠቀሚዎችን ግላዊ ዳታ ወይም ሚስጥር ለመውሰድ ሰብሮ የሚገባ ነው። ግን አዚህ ጋር እንዳትሳሳት #hacking ሁሌም መጥፎ ነገር ብቻ የሚሰራበት አይደለም። ጥሩ ጎኑን ለማሳየት "ethical" የሚለው ቃል ከፊቱ የተጨመረበት ለዛ ነው።
#ethical_hacker የአንድን መስሪያ ቤት ወይም ድርጅት በኮምፒዩተር ሲስተማቸው ብሎም ኔትወርካቸው ውስጥ ያለውን ክፍተት (vulnerabilities) በማጣራት የሳይበር ደህንነታቸውን ለማስጠበቅ የሚሰራ ግለሰብ ነው። በአጭር አገላለጽ፣ አንድ ሰው ቤሄራዊ ደህንነት ለማስጠበቅ የግድ መከላኪያ መግባት አይጠበቅበትም፣ #ethical_hacker ም ሆኖ የሀገሩን የሳይበር ደህንነት ከሌሎች ሀገር የተቃጣ የሳይበር ጥቃት መከላከል ይችላል።

ልምድ ያላቸው ሰዎች በስፋት የሚጠቀሙትን ቱሎች እንያ እስቲ..

💠1. Nmap
Nmap (ወይም Network Mapped)፣ ፈጣንና አስተማማኝ የኔትወረክና ፖርት ስካኒንግ ቱል ነው፣ የተፈጠረው በ #GordonLyon ሲሆን፣ የመጀመሪያው የተለቀቀው በ1997 አመተ ምህረት ነበር።
Nmap ለደህንነት ብሎም የተለያዩ ክፍተቶችን ስካን ማድረግ የሚችል ሀይለኛ ቱል ነው!
ዛሬ በጣም ጠቃሚ የሆኑ ድረገፆችን (Websites) እንጠቁማቹ።

🔺 የትምህርታዊ ድረገፆች
◽️ www.khanacademy.org
◽️ www.academicearths.org
◽️ www.coursera.com
◽️ www.edx.org
◽️ www.open2study.com
◽️ www.academicjournals.org
◽️ codeacademy.org

🔺የመፀሀፍት ድረገፆች
◽️ www.bookboon.com
◽️ http://ebookee.org
◽️ http://sharebookfree.com
◽️ http://m.freebooks.com
◽️ www.obooko.com
◽️ www.manybooks.net
◽️ www.epubbud.com
◽️ www.bookyards.com
◽️ www.getfreeebooks.com
◽️ freecomputerbooks.com
◽️ www.essays.se
◽️ www.sparknotes.com
◽️ www.pink.monkey.com

🔺Online ትምህርታዊ ድጋፎች
◽️ www.ocwconsortium.org
◽️ www.ocwconsortium.org
◽️ http://ocw.tufts.edu
◽️ http://ocw.upm.es
◽️ http://www.open.edu
◽️ http://ocw.usu.edu/
◽️ http://open.umich.edu/
◽️ http://ocw.nd.edu/

🔺የጥያቄዎች ምላሽ
www.ehow.com
www.whatis.com
www.howstuffwork.com
www.webopedia.com
www.plagtracker.com
www.answers.com

🔺መፈለጊያ (Search) ድረገፆች
www.about.com
www.alltheweb.com
www.altavista.com
www.askjeeves.com
www.excite.com
www.hotbot.com
www.looksmart.com
www.lycos.com
www.dmoz.org
www.google.com
www.mamma.com
www.webcrawler.com
www.aol.com
www.dogpile.com
www.10pht.com

🔺የአፋልጉኝ ድረገፆች
www.anywho.com
www.infospace.com
www.switchboard.com
www.whitepages.com
www.whowhere.lycos.com

🔺የዜና ድረገፆች
www.abcnews.com
www.cbsnews.com
www.cnn.com
www.foxnews.com
www.msnbc.com
www.nytimes.com
www.usatoday.com

🔺ስፖርታዊ መረጃዎች
www.sportsmangist.com
www.sportsline.com
sportsillustrated.com
espn.go.com
foxsports.lycos.com
www.nbcsports.com
www.sportingnews.com

🔺የህክምና ትምህርቶች
www.healthatoz.com
www.kidsdoctor.com
www.medexplorer.com
www.medicinenet.com
www.nlm.nih.gov
www.planetwellness.com
my.webmd.com

🔺ጋዜጦች
www.indexcopernicus.com
www.ajol.info
www.doaj.org
◽️ www.sabinet.co.za
◽️ www.oajse.com
◽️ www.lub.lu.se/en.html
◽️ www.copernicus.org

💠Best websites for games and softwares

📌 PC GAMES
🔰http://oceanofgames.com/
🔰http://www.ovagames.com/
🔰http://fitgirl-repacks.site/
🔰http://skidrowgamez.net/
🔰http://full-pcgames.com/
🔰http://www.xfullgames.com/
🔰http://www.newgamesbox.com/
🔰http://www.y8.com/

📌 SOFTWARES
🔰http://getintopc.com/
🔰https://fullstuff.co/
🔰http://www.piratecity.net/
🔰http://gigahax.com/en/
🔰http://karanpc.com/
🔰http://www.mixhax.com/
🔰http://www.novahax.com/
🔰http://full-pcsoftware.com/
🔰http://dl.par30dl.com/Software/
🔰http://s0ft4pc.com/
🔰http://filehippo.com/
🔰http://www.fileeagle.com/
🔰http://softfunda.com/
🔰https://www.freewaresys.com/
┈┈┈┈••●◉❖◉●••┈┈┈
Media is too big
VIEW IN TELEGRAM
Editing YOUR Photos in Photoshop!
Media is too big
VIEW IN TELEGRAM
How to Remove Green Screen in Adobe Premiere cc (Chroma Key, Remove Background) Tutorial
🔰The difference between KL and RAT🔰

🌀 RAT= Remote Administrative Tool.
It gives a hacker full control over a victims computer.Webcam,Microphone,And what not.RAT's violate a whole heck of Cyber laws that is why FBI puts heat on them and they get caught,Mainly because blackmailing or using their personnel information against them

🌀 KL= Keylogging/Keylogger.
It sends keystrokes and Stealer logs containing username,password and website link typed and/or visited by a victim to the hacker that made it.

@the_cyber_geeks
This media is not supported in your browser
VIEW IN TELEGRAM
What Happens When Hacker From Anonymous Meets FBI Agent In Interview...
Best hacker movie ☝️☝️☝️☝️
Top 10 Best Hacking 👁 Movies That You Must Watch Right Now👨‍💻

#1 Blackhat
#2 ALGORITHM: THE HACKER MOVIE (2014)
#3 SNOWDEN
#4 NERVE (2016)
#5 EAGLE EYE (2008)
#6 Trackdown (2000)
#7 THE FIFTH ESTATE
#8 HACKERS (1995)
#9 WAR GAMES (1983)
#10 Cybergeddon

@programingandhacking
Media is too big
VIEW IN TELEGRAM
How to install Ubuntu on your Android device
Media is too big
VIEW IN TELEGRAM
Ethiopia: ወይኔ የአራዳ ልጅ 5 ሙሉ ፊልም - Wayne Yarada Lij 5 Full Movie 2020

#copy_with_credit
@programingandhacking
Media is too big
VIEW IN TELEGRAM
How to CLONE any WEBSITE ? How to copy any website ? Web Development Tutorial
📢 በአዲሱ የቴሌግራም ፖሊሲ መሠረት ይህን ቻናል #MUTE የሚያደርጉ አባላት ‹ቻናሉ ላይ እንደሌሉ› ይቆጠራሉ ፡፡ ቻናሉን #MUTE ማድረግ የሚፖሰቱትን መረጃዎች #VIEW ይቀንሰዋል።

ምንም እንኳን የምንፖስተውን እየተመለከቱ ቢሆንም ቻናሉን #MUTE ካደረጉት አይቆጠርም።

እስኪ ቻናሉን #UNMUTE ያድርጉት እና አንድ ላይ ትልቅ እንሁን💪

እኛ ማንም “ቻናሉ ላይ እንደሌለ” እንዲታሰብ አንፈልግም ስለዚህ በደግነት ከቻናሉ ስር #UNMUTE የሚለውን ይጫኑት።
UNMUTE ያድርጉ

ስለ ትብብርዎ እናመሰግናለን🙏
@programingandhacking
How To Install Advphishing Tool?
To install UserRecon in your android you need to download Termux on your phone.

Just follow us STEP-BY-STEP

Step 1: Open Termux terminal on your phone and update and ugrade the packages befor installing any other packages.

apt update && apt upgrade -y

Step 2: Open Termux terminal on your phone and install git.

type command apt install git





Step 3: Clone the Advphishing package from github

type command: git clone https://github.com/Ignitetch/AdvPhishing.git





Step 4: Change the current directory to Advphishing directory.

type command: cd AdvPhishing





Step 5: Give the executable permission to start.sh file

type command: chmod +x start.sh





Step 6: Run the bash script (start.sh)

type command: ./start.sh

It will download and install the required ngrok package, which we will help you to host your phishing websites.



If Ask Do you want to continue(y/n) please type Y

Step 7: Enter the ngrok AUTH TOKEN

It will we be followed by /.ngrok authtoken "12hgashkhdfahAFHjndnjkshdk_Ahsjh" ( this is the sample auth code it will not work )





Step 8: To get the ngrok auth token login to the ngrok and copy the auth code

Step 9: Run the bash script (An-Advphishing)

type command: ./An-AdvPhishing





Step 10: Enter the number from the given list to make the running desired phishing page.





Step 11: After selecting the desired option you will get the URL, send your URL to the victim and wait for his/her login.





Social engineering is one of the simplest methods to gather information with the help of social engineering, you can collect sensitive information.

Once the victim logins through your phishing URL you will get the victim's IP, Username, Password, and OTP under the ++ logs++

And the best part is this once the victim enter his/her details it will redirect the victims to the original website.



That's it for this blog hope you like this, Keep learning & keep sharing.

See you in the next blog...Thanks for visit have a nice day

Note:
To make this tool working you need to enable your hotspot, else URL will not get generated.