PROGRAMMERS TECH
66 subscribers
93 photos
123 videos
33 files
214 links
If you learn here you are going to hack any account and you are gonna be programmer
Contact us @Programhack_bot
Download Telegram
Ethio astronomy๐Ÿ‡ช๐Ÿ‡น๐Ÿ’“
This group is the official Ethiopian space
And physics researchers and lovers.
Now,u can talk ever things u wanna want to talk.

For Amharic version join our sister group
@etsus
@mdyam
https://t.me/yotorastronomy
๐Ÿ˜ Linux Programing Collection ๐Ÿ˜

......... @blackhat_hacking .........

Download link:-
https://drive.google.com/folderview?id=10t5eCEjq4VcdfoDwW_F5u9pCCa8YBIUl

โค๏ธJoin us for more expensiv & Powerfull Updates for free of costโค๏ธ

โž–@BlackHat_Hacking โž–
Media is too big
VIEW IN TELEGRAM
How To Crack windows Password

โž–@BlackHat_Hacking โž–
๐ŸŽฏ10 แˆแˆญแŒฅ แ‹จ hacking os แ‹จแˆšแ‰ฃแˆ‰แ‰ต๐Ÿ‘‡๐Ÿ‘‡๐Ÿ‘‡

1. Kali linux:-

๐ŸŽฏ แŠซแˆŠ แˆŠแŠ‘แŠญแˆต แ‹จแˆ‹แ‰€ แ‹จแ”แŠ•แ‰ดแˆฌแ‰ฒแŠ•แŒ แแ‰ฐแˆป แŠฅแŠ“ แ‹จแ‹ฐแˆ…แŠ•แАแ‰ต แˆ›แˆจแŒ‹แŒˆแŒซ แŠฆแ แˆดแ‰ฐแˆฎแ‰ฝแŠ• แˆ˜แˆ แˆจแ‰ต แ‹ซแ‹ฐแˆจแŒˆ Debian แˆ˜แˆฐแˆจแ‰ต แ‹ซแ‹ฐแˆจแŒˆ แ‹จLinux แˆตแˆญแŒญแ‰ต แАแ‹. แŠซแˆŠ แˆˆแ‰ แˆญแŠซแ‰ณ แ‹จแˆ˜แˆจแŒƒ แ‹ฐแˆ…แŠ•แАแ‰ต แ‰ฐแŒแ‰ฃแˆซแ‰ต แˆ›แˆˆแ‰ตแˆ แŠฅแŠ•แ‹ฐ penetration testing, แ‹จแ‹ฐแˆ…แŠ•แАแ‰ต แˆแˆญแˆแˆญ, แŠฎแˆแ•แ‹ฉแŠ’แŠฌแˆฝแŠ• แŠฅแŠ“ แ‹จแ‰ฐแˆซแ‰€แ‰€ แŠขแŠ•แŒ‚แАแˆชแŠ•แŒ แ‹ซแˆ‰ แ‰ แˆญแŠซแ‰ณ แˆ˜แ‰ถ แˆ˜แˆณแˆชแ‹ซแ‹Žแ‰ฝแŠ• แ‹ญแ‹Ÿแˆ !

2. Black box

๐ŸŽฏ BackBox แŠ”แ‰ตแ‰กแŠญแŠ• แˆ˜แˆฐแˆจแ‰ต แ‹ซแ‹ฐแˆจแŒˆ แ‹จLinux แˆตแˆญแŒญแ‰ต แŠฅแŠ“ แ‹จแŠ”แ‰ตแ‹ˆแˆญแŠญ แŠฅแŠ“ แŠขแŠ•แŽแˆญแˆœแˆฝแŠ• แˆตแˆญแ‹“แ‰ถแ‰ฝ แ‰ตแŠ•แ‰ณแŠ” แˆ˜แˆณแˆชแ‹ซแ‹Žแ‰ฝแŠ• แ‹จแˆšแ‹ซแ‰€แˆญแ‰ฅ แ‹จแ‹ณแˆฐแˆณ แŒฅแŠ“แ‰ต แŠฅแŠ“ แ‹จแ‹ฐแˆ…แŠ•แАแ‰ต แŒแˆแŒˆแˆ› แАแ‹. แˆˆแ‹ฐแˆ…แŠ•แАแ‰ต แˆแˆญแˆ˜แˆซแ‹Žแ‰ฝ แ‹จแˆšแ‹ซแˆตแˆแˆแŒ‰แ‰ตแŠ• แ‹จแ‰ฐแˆŸแˆ‹ แˆ˜แˆณแˆชแ‹ซแ‹Žแ‰ฝ แ‹ซแŠซแ‰ตแ‰ณแˆ.


3. Parrot security

๐ŸŽฏ parrot linux แŠฎแˆแ’แ‹แ‰ฐแˆญ แŒฅแ‰ แ‰ƒ แˆ‹แ‹ญ แ‰ตแŠฉแˆจแ‰ต แ‰ แˆ›แ‹ตแˆจแŒ แ‹จแ‹ฐแ‰ขแ‹ซแŠ• แˆตแˆญแŒญแ‰ต แˆตแˆญ แАแ‹. แˆˆแ‹ณแˆฐแˆณ แˆ™แŠจแˆซ, แ‰ฐแŒ‹แˆ‹แŒญแАแ‰ต แŒแˆแŒˆแˆ› แŠฅแŠ“ แˆ›แ‰ƒแˆˆแ‹ซ, แŠฎแˆแ’แ‹ฉแ‰ฒแŠ• แŒ แŠ•แ‰‹แ‹ฎแ‰ฝ แŠฅแŠ“ แˆตแˆ-แŠ แˆแ‰ฃ แ‹จแ‹ตแˆญ แŠ แˆฐแˆณ แ‰ฐแ‰ฅแˆŽ แ‹จแ‰ฐแ‹˜แŒ‹แŒ€ แАแ‹.

4. DEFT linux

๐ŸŽฏ แ‹ฒแ‹แ‹ญ (แ‹ฒแŒ‚แ‰ณแˆ แŠแ‹ญแŠ“แˆšแˆ แŠคแŠ•แ‹ต แŠแŠญแˆตแˆตแˆต แ‰ฑแˆแŠชแ‰ต/toolkit) แ‹จแ‹ฒแŠคแแŠคแˆต (Duplicum for Digital Evidence & Forensics Toolkit) แˆˆแŠฎแˆแ’แ‹แ‰ฐแˆญ แŠฎแˆแ’แ‹ฉแ‰ฒแŠ•แˆฒแˆต แ‹จแ‰ฐแˆฐแˆซแŒจ แˆ›แŠจแ‹แˆแ‹ซ แАแ‹. แ‹ญแˆ… แˆตแˆญแ‹“แ‰ฑ แ‰ แˆ‚แ‹ฐแ‰ต แˆ‹แ‹ญ แ‹ซแˆˆ แˆตแˆญแŒญแ‰ต แ‹ˆแ‹ญแˆ แ‰ฅแˆแˆน แˆ˜แˆณแˆชแ‹ซ (แ‰ตแŠ•แŠ•แˆฝ แ‹ฒแˆตแŠฎแ‰ฝ, แ‹ˆแ‹˜แ‰ฐ ... แ‹ˆแ‹˜แ‰ฐ ...) . แ‹จ DEFT แˆตแˆญแ‹“แ‰ต แ‰ แŒ‚.แŠค.แŠ•.แ‹ฉ linux แˆ‹แ‹ญ แ‹จแ‰ฐแˆ˜แˆ แˆจแ‰ฐ แАแ‹, แ‰ แ‰€แŒฅแ‰ณ แˆ›แŒซแ‹ˆแ‰ต แ‹ญแ‰ฝแˆ‹แˆ (แ‰ แ‹ฒแ‰ชแ‹ฒ แˆ›แŒซแ‹ˆแ‰ป แ‰ แŠฉแˆ แ‹ˆแ‹ญแˆ แ‰  USB pendrive แ‰ แŠฉแˆ), แ‰  VMware แ‹ˆแ‹ญแˆ แ‰จแˆญแ‰นแ‹‹แˆ แ‰จแˆญแ‰ฝแ‹‹แˆ แˆ‹แ‹ญ แŠฅแŠ•แ‹ฐ แ‰จแˆญแ‰นแ‹‹แˆ แ‘แˆแŠชแ‰ต/Toolkit แ‰ฐแŒญแŠ– แ‹ญแˆ แˆซแˆ.

๐ŸŽฏ DEFT L.X.D.E แŠ• แŠฅแŠ•แ‹ฐ แ‹ดแˆตแŠญแ‰ถแ• แˆแŠ”แ‰ณ แ‹ญแŒ แ‰€แˆ›แˆ แŠฅแŠ“ แ‰  Linux แ‹ŠแŠ•แ‹ถแ‹แˆต แ‰ linux แˆตแˆญแ‹“แ‰ฐ-แˆ˜แ‰ฐแŒแ‰ แˆชแ‹ซแŠ• แˆˆแˆ˜แ‰ฐแŒแ‰ แˆญ W.I.N.E. แˆˆแˆ˜แˆณแˆชแ‹ซ แŠ แˆตแ‰ฐแ‹ณแ‹ฐแˆญ แŠ แˆ˜แ‰บ แ‹จแˆ›แˆณแ‹ซ แŠ แ‰€แŠ“แ‰ฃแˆช แŠ แˆˆแ‹.



5. Samurai web testing frame work

๐ŸŽฏ แ‹จsamurai web-testing framework. แ‹จSamurai แ‹ตแˆ…แˆจ แˆ˜แˆ˜แˆญแˆ˜แˆชแ‹ซ แˆ›แ‹•แ‰€แ แŠฅแŠ•แ‹ฐ แ‹Œแ‰ฅ แ”แŠ•-แˆ˜แˆ˜แˆญแ‹ซ(pen-testing) แŠ แŠซแ‰ฃแ‰ข แˆˆแˆ˜แ‰ฐแŒแ‰ แˆญ แ‰…แ‹ตแˆ˜-แˆ˜แ‹‹แ‰…แˆญ แ‰  แ‰จแˆญแ‰นแ‹‹แˆ แ‰ฆแŠญแˆต แŠฅแŠ“ แ‰ช.แŠค.แˆ แ‹Œแˆญ แ‹จแ‰ฐแ‹ฐแŒˆแˆ แˆแŠ“แ‰ฃแ‹Š แˆ›แˆฝแŠ• แАแ‹แข

๐ŸŽฏ แ‰ช.แŠค.แˆ แˆแˆญแŒฅ แˆแŠ•แŒญ แŠฅแŠ“ แАแƒ แ‹ตแˆญ แŒฃแ‰ขแ‹ซแ‹Žแ‰ฝแŠ• แ‰ แˆ˜แˆžแŠจแˆญ แŠฅแŠ“ แ‹ตแˆญ แŒฃแ‰ขแ‹ซแ‹Žแ‰ฝ แˆ‹แ‹ญ แ‹จแˆšแ‹ซแ‰ฐแŠฉแˆฉ แАแŒป แˆ˜แˆณแˆชแ‹ซแ‹Žแ‰ฝแŠ• แ‹ญแ‹Ÿแˆ.


6. network security toolkit

๐ŸŽฏ แ‹จแŠ แ‹แ‰ณแˆจ แˆ˜แˆจแ‰ฅ แ‹ฐแˆ…แŠ•แАแ‰ต แˆ˜แˆฃแˆชแ‹ซ แˆตแ‰ฅแˆตแ‰ฅ (NST) แˆ˜แ‹ฐแ‰ แŠ›แ‹แŠ• แ‹ฐแˆ…แŠ•แАแ‰ต แŠฅแŠ“ แŠ แ‹แ‰ณแˆจ แˆ˜แˆจแ‰ฅ แˆแˆญแˆ˜แˆซ แŠฅแŠ“ แ‰แŒฅแŒฅแˆญ แ‰ฐแŒแ‰ฃแˆฎแ‰ฝแŠ• แˆˆแˆ›แŠจแŠ“แ‹ˆแŠ• แАแŒป แŠฅแŠ“ แŠญแแ‰ต แˆแŠ•แŒญ แ‹จแŠฎแˆแ’แ‰ฐแˆญ แ‹ฐแˆ…แŠ•แАแ‰ต แŠฅแŠ“ แŠ แ‹แ‰ณแˆจ แˆ˜แˆจแ‰ฅ แˆ˜แˆณแˆชแ‹ซแ‹Žแ‰ฝแŠ• แ‹จแˆšแ‹ซแ‰€แˆญแ‰ฅ แˆŠแАแŠญแˆต แˆŠแŠ–แˆจแŠ• แ‹จแˆšแ‰ฝแˆ แ‹จแ‰€แŒฅแ‰ณ แ‹ฒแ‰ชแ‹ฒ / แ‹ฉแŠคแˆตแ‰ข แแˆ‹แˆฝ แŠ แŠ•แŒปแˆญ แАแ‹.

๐ŸŽฏ แˆตแˆญแŒญแ‰ฑ แŠฅแŠ•แ‹ฐ แŠ”แ‰ต machinesแŠ• แˆฐแˆญแ‰จแˆญ (Server) แŠ แˆตแ‰ฐแŠ“แŒ‹แŒ… แ‰ แˆ†แŠ‘ แŠ แ‹แ‰ณแˆจแˆ˜แˆจแ‰ฅ แˆดแŠชแ‹ฉแˆชแ‰ฒ แ‰ตแŠ•แ‰ฐแŠ“, แˆ›แˆจแŒ‹แŒˆแŒซ แŠฅแŠ“ แ‰แŒฅแŒฅแˆญ แˆ˜แˆณแˆชแ‹ซ แˆ˜แŒ แ‰€แˆ แ‹ญแ‰ปแˆ‹แˆ.


7. Black Arch

๐ŸŽฏ BlackArch แŠจแแ‰ฐแŠ› แˆ˜แŒ แŠ• แ‹ซแˆ‹แ‰ธแ‹ แ‹จแˆณแ‹ญแ‰ แˆญ แ‹ฐแˆ…แŠ•แАแ‰ต แˆ˜แˆณแˆชแ‹ซแ‹Žแ‰ฝแŠ• แ‰ Arch linux แˆ‹แ‹ญ แ‰ แˆ˜แˆ˜แˆญแŠฎแ‹ แ‹จแŒแŒฅแˆ แŒฃแˆแ‰ƒแŒˆแ‰ฅแАแ‰ต แˆตแˆญแŒญแ‰ต แˆตแˆญแŒญแ‰ต แАแ‹. แˆˆแˆตแˆˆแˆ‹ แˆ™แŠจแˆซแ‹Žแ‰ฝ แŠฅแŠ“ แˆˆแ‹ฐแˆ…แŠ•แАแ‰ต แ‰ฐแˆ˜แˆซแˆ›แˆชแ‹Žแ‰ฝ แ‹จแ‰ฐแˆแŒ แˆจ แŠญแแ‰ต แˆแŠ•แŒญ แˆ›แˆฐแˆซแŒซ แАแ‹แข


8. cyborg hawk linux


๐ŸŽฏCyborg Hawk Linux แ‰  unbuntu แˆ‹แ‹ญ แ‹จแ‰ฐแˆ˜แˆ แˆจแ‰ฐ แ‹จแˆŠแŠ•แŠญแˆต Hacking Distro แŠฅแŠ•แ‹ฐ แ”แŠ•แ‰ณแˆตแ‰ฒแŠ• แˆŠแŠ•แŠญแˆต cyborg แŠ แ‹แ‰ณแˆญ แ‰ฐแ‰ฅแˆŽแˆ แ‹ญแ‰ณแ‹ˆแ‰ƒแˆแข
๐ŸŽฏ Cyberg Hawk Distro แˆˆแŠ”แ‰ตแ‹ˆแˆญแŠญ แ‹ฐแˆ…แŠ•แАแ‰ต แŠฅแŠ“ แˆˆแŒแˆแŒˆแˆ› แŒฅแ‰…แˆ แˆ‹แ‹ญ แˆŠแ‹แˆ แ‹ญแ‰ฝแˆ‹แˆ แ‰ แ‰ฐแŒจแˆ›แˆชแˆ แˆˆแ‹ฒแŒ‚แ‰ณแˆ แ‹จแ‹ˆแŠ•แŒ€แˆ แˆแˆญแˆ˜แˆซแ‹Žแ‰ฝ.

9. Gnack track

๐ŸŽฏ Gnack track แ‹จแ‰…แŒฅแ‹ซแ‹ แˆ™แŠจแˆซ แˆ˜แˆณแˆชแ‹ซแ‹Žแ‰ฝแŠ• แŠฅแŠ“ แ‹จแŒ‚แŠ–แˆ แ‹ดแˆตแŠญแ‰ถแ•แŠ• แˆˆแˆ›แ‹‹แˆƒแ‹ต แŠญแแ‰ต แŠฅแŠ“ แАแƒ แ•แˆฎแŒ€แŠญแ‰ต แАแ‹. GnackTrack แˆˆแ”แŠ”แ‰ตแ‰ดแˆฝแŠ• แˆ™แŠจแˆซ แ‹จแ‰ฐแ‰€แˆจแ€ แŠฅแŠ“ แ‰ unbuntu แˆ‹แ‹ญ แ‹จแ‰ฐแˆ˜แˆ แˆจแ‰ฐ แ‹จแ‰€แŒฅแ‰ณ (แˆŠแŒซแŠ• แ‹จแˆšแ‰ฝแˆ) แˆตแˆญแŒญแ‰ต แАแ‹แข


10. NodeZero

๐ŸŽฏ NodeZero แŠฅแŠ•แ‹ฐ แ‹จแ‹ฒแŠ•แ•แˆแ‰ฒแŠ•แŒ แแ‰ฐแˆป แˆŠแ‹ซแŒˆแˆˆแŒแˆ แ‹ญแ‰ฝแˆ‹แˆ แ‹ญแˆ…แˆ แŠฅแŠ•แ‹ฐ แˆ™แˆ‰ แˆตแˆญแ‹“แ‰ต (แŠขแŠ•แ‰ฐแˆญแˆตแ‰ฒ) แ‹จแ‰ฐแˆ แˆซแ‹ unbuntu แˆ˜แˆฐแˆจแ‰ต แАแ‹แข

๐ŸŽฏ NodeZero แˆตแˆญแ‹“แ‰ตแ‹Ž แˆแˆแŒŠแ‹œ แ‹จแ‹˜แˆ˜แА แˆ†แŠ– แŠฅแŠ•แ‹ฒแ‰€แŒฅแˆ แ‹จแ‹ฉแ‰กแ‹ฑแŠ• แ‹จแ‹แˆ‚แ‰ฅ แˆ›แŠจแˆ›แ‰ปแ‹Žแ‰ฝแŠ• แ‹ญแŒ แ‰€แˆ›แˆ. NodeZero แŠจแˆŒแˆŽแ‰ฝ แ‹จแŠ•แ‹‘แˆต แˆแ‹ตแ‰ฅ, แ‹จแŠ แ‹แ‰ณแˆจ แˆ˜แˆจแ‰ฅ แŠฅแŠ“ แ‰ แ‹ญแАแˆ˜แˆจแ‰ฅ แˆแ‹ตแ‰ฅ แАแƒ แˆถแแ‰ตแ‹Œแˆญ แАแ‹แข
________
๐Ÿšฉ10 แ‹จแˆ€แŠชแŠ•แŒ แŠ แ‹ญแАแ‰ถแ‰ฝ แŠ แˆ‰ แŠฅแАแˆฑแˆ:-

1. Bait and switch

2. Cookie theft

3. click jacking attack

4. virus, Trojan

5. Phishing

6. Eaves Dropping (Passive attacks)

7. Fake WAP

8. Water hole attacks

9. Denial of service(Dos) and Distributed Denial Of Service(DDOS). แŠฅแŠ“

10. Keylogger แŠ“แ‰ธแ‹ !
๐Ÿ‘จโ€๐Ÿ’ปแ‹จแˆ€แŠจแˆญ แŠ แ‹ญแАแ‰ถแ‰ฝ|Types of Hackers๐Ÿ‘‡

๐Ÿ‘จโ€๐Ÿ’ปแˆ€แŠจแˆฎแ‰ฝ | hackers แ‰ แˆถแˆตแ‰ต แ‹ˆแˆณแŠ แŠ แ‹ญแАแ‰ถแ‰ฝ แ‹ญแŠจแˆแˆ‹แˆ‰ แŠฅแАแˆฑแˆ๐Ÿ‘‡

๐ŸŽฏ white hat
๐ŸŽฏ black hat and
๐ŸŽฏ Grey hat แŠ“แ‰ธแ‹ !



๐ŸšฉWhite Hat Hackers๐Ÿ‘จโ€๐Ÿ’ป :- แŠฅแАแ‹šแˆ… แˆ€แŠจแˆฎแ‰ฝ แ‹จแˆ€แŠชแŠ•แŒ แŠฅแ‹‰แ‰€แ‰ณแ‰ธแ‹‰แŠ• แ‰ฐแŒ แ‰…แˆ˜แ‹‰ แˆ…แŒ‹แ‹Š แ‹จแˆ˜แˆจแŒƒ แ‰ฅแˆญแ‰ แˆซ แ‹จแˆšแ‹ซแ‹ฐแˆญแŒ‰ แŠ“แ‰ธแ‹‰ แˆตแˆˆแ‹šแˆ… แŒฅแˆฉ แˆ€แŠจแˆฎแ‰ฝ แАแ‹‰ แ‹จแˆšแ‰ฃแˆ‰แ‰ต แŠฅแŠ•แ‹ฒแˆแˆ Security expert แ‰ แˆ˜แ‰ฃแˆ แ‹ญแ‰ณแ‹ˆแ‰ƒแˆ‰แข

๐ŸšฉBlack Hat Hackers๐Ÿ‘จโ€๐Ÿ’ป :- แ‹จแАแ‹šแˆ… แŠ แ‹ญแАแ‰ต แˆ€แŠจแˆฎแ‰ฝ แ‰ฅแ‹™ แŒŠแ‹œ crackers แ‹ญแ‰ฃแˆ‹แˆ‰แข

๐Ÿ‘‰ แŠฅแАแ‹šแˆ… แˆ€แŠจแˆฎแ‰ฝ แ‹จแˆ€แŠชแŠ•แŒ แŠฅแ‹‰แ‰€แ‰ณแ‰ธแ‹‰แŠ• แ‰ฐแŒ แ‰…แˆ˜แ‹‰ แˆ…แŒˆแ‹ˆแŒฅ แ‰ฐแŒแ‰ฃแˆซแ‰ตแŠ• แ‹ซแŠจแŠ“แ‹‰แŠ“แˆ‰แข

๐Ÿ‘‰แˆˆแˆแˆณแˆŒ แˆแŠญ แŠฅแАแ‹ฐ credit card แ‹˜แˆจแ‹แฃแ‰ฃแŠ•แŠฎแ‰ฝแŠ• แˆ€แŠญแฃแŠ แˆตแˆแˆ‹แŒŠ แˆ˜แˆจแŒƒ แˆตแˆญแ‰†แ‰ต แ‹ˆ.แ‹˜.แ‰ฐ!

๐Ÿ‘‰ แ‰ แ‰ฐแŒจแˆ›แˆชแˆ แŠญแˆฌแ‹ฒแ‰ต แŠซแˆญแ‹ต แ‹˜แˆจแ‹ แˆ‹แ‹ญ แ‹จแˆšแˆณแ‰ฐแ‰ แˆ€แŠจแˆฎแ‰ฝ แŠซแˆญแ‹ฐแˆญ/carder แ‰ แˆ˜แ‰ฃแˆ แ‹ญแ‰ณแ‹ˆแ‰ƒแˆ‰ !

๐ŸšฉGrey Hat Hackers๐Ÿ‘จโ€๐Ÿ’ป :- Grey hat แ‹จแˆแŠ•แˆ‹แ‰ธแ‹‰ แ‰ white hat แŠฅแŠ“ แ‰ black hat แˆ˜แŠซแŠจแˆ แ‹จแˆšแŒˆแŠ™ แ‰…แˆแ‰…แˆ แŠ“แ‰ธแ‹‰แข

๐ŸŽฏ แˆ›แˆˆแ‰ตแˆ Grey hat แˆ€แŠจแˆฎแ‰ฝ แˆฒแ‹ซแˆฐแŠ›แ‰ธแ‹ black hat แ‹ˆแ‹ญแˆ แ‹ฐแŒแˆž white hat แ‹ญแˆ†แŠ“แˆ‰ !

๐ŸŽฏ๐ŸŽฏ๐ŸŽฏ๐ŸŽฏ๐ŸŽฏ๐ŸŽฏ๐ŸŽฏ๐ŸŽฏ๐ŸŽฏ๐ŸŽฏ๐ŸŽฏ๐ŸŽฏ๐ŸŽฏ๐ŸŽฏ

๐Ÿ‘‡ ๐Ÿ‘จโ€๐Ÿ’ปแ‹จแˆ€แŠจแˆฎแ‰ฝ แ‹ฐแˆจแŒƒ๐Ÿ‘จโ€๐Ÿ’ป๐Ÿ‘‡

๐ŸŽฏ ๐Ÿค“Script kiddie๐Ÿค“ :- แŠฅแАแ‹šแˆ… แ‹จแˆ€แŠชแŠ•แŒ แˆแˆแ‹ต แ‹จแˆŒแˆ‹แ‰ธแ‹‰ แŒแˆˆแˆฐแ‰ฆแ‰ฝ แˆฒแˆ†แŠ‘ แˆ€แŠจแˆญ แˆ˜แˆ†แŠ• แ‹จแˆšแˆแˆแŒ‰ แŠ“แ‰ธแ‹‰ แˆ€แŠญ แˆˆแˆ›แ‹ตแˆจแŒ แ‹จแˆšแŒ แ‰€แˆ™แ‰ตแˆ  แ‹จแ‰ฐแ‹˜แŒ‹แŒ€ แˆถแแ‰ตแ‹Œแˆญ แАแ‹‰!
๐Ÿ‘‰ แ‰ฅแ‹™ แŒŠแ‹œแˆ แˆแˆแ‹ต แˆตแˆˆแˆŒแˆ‹แ‰ธแ‹‰ แŠฅแˆซแˆณแ‰ธแ‹‰แŠ• harm แ‹ซแ‹ฐแˆญแŒ‹แˆ‰แข

๐ŸŽฏ Intermediate๐Ÿ‘จโ€๐Ÿ’ปhackers๐Ÿ‘Œ :-

แŠจ๐Ÿค“script kiddies๐Ÿค“ แ‹จแ‰ แˆˆแŒ  แ‹จแˆ€แŠชแŠ•แŒ แˆแˆแ‹ต แŠฅแŠ•แ‹ฒแˆแˆ แŠฅแ‹‰แ‰€แ‰ต แ‹ซแˆ‹แ‰ธแ‹‰ แˆ€แŠจแˆฎแ‰ฝ แŠ“แ‰ธแ‹‰แข

๐Ÿ‘‰แŒแŠ• แ‹จแˆซแˆณแ‰ธแ‹‰แŠ• แ‹จแˆ€แŠชแŠ•แŒ แˆถแแ‰ตแ‹Œแˆญ แˆ˜แˆตแˆซแ‰ต แŠ แ‹ญแ‰ฝแˆ‰แˆ แАแŒˆแˆญแŒแŠ• แŒฅแˆฉ๐Ÿ‘Œ แˆแˆแ‹ต แ‹ซแˆ‹แ‰ธแ‹‰ แˆ€แŠจแˆฎแ‰ฝ แŠ“แ‰ธแ‹‰แข


๐ŸŽฏ ๐Ÿ˜ŽProfessional or Elite hackers๐Ÿ‘จโ€๐Ÿ’ป :-

๐ŸšฉแŠฅแАแ‹šแˆ… แŠ แˆชแ แˆแˆแ‹ต แ‹ซแˆ‹แ‰ธแ‹‰ แˆ€แŠจแˆฎแ‰ฝ แ‹จแˆซแˆณแ‰ธแ‹‰แŠ• แ‹จแˆ€แŠชแŠ•แŒ แˆถแแ‰ตแ‹Œแˆญ แˆ˜แˆตแˆซแ‰ต แ‹ญแ‰ฝแˆ‹แˆ‰แคแˆตแˆˆแˆ†แАแˆ แ‹จแ‰ตแŠ›แ‹‰แˆ แŠ แ‹ญแАแ‰ต system แˆฐแ‰ฅแˆจแ‹‰ แˆ˜แŒแ‰ฃแ‰ตแŠ“ แˆซแˆณแ‰ธแ‹‰แŠ• แ‹จแˆ˜แ‹ฐแ‰ แ‰… แˆแˆแ‹ต แŠ แˆ‹แ‰ธแ‹‰แข๐Ÿ‘Œ
๐Ÿ‘ฅ REFERRAL SYSTEM

โ–ซ Earnings: เธฟ0.00000000
โ–ซ Referrals: 0
โ–ซ Active Referrals: 0
โ–ซ Commission: 10% of referrals earnings.
โ–ซ Bonus: เธฟ0.00010000 for every referrals.
โ–ซ Link: https://t.me/BTC_Miner_ag_bot?start=1260937189
unidentified flying objects (UFO)
Here we study and share info related as UFOS or Alians So you can share whatever you got about them by @Killererr
https://t.me/UFOOF
๐Ÿ‘†๐Ÿ‘† the above web is used to develope your programing knowledge
KitPloit - PenTest Tools!
SwiftBelt - A macOS Enumeration Tool Inspired By Harmjoy'S Windows-based Seatbelt Enumeration Tool

https://1.bp.blogspot.com/-1WFiHYKtay8/X30kM0PVpwI/AAAAAAAAT_s/dyQASqeGfjgaJ9tfITAwrPrg1x8hF6G0gCNcBGAsYHQ/w640-h282/SwiftBelt_1_swiftbelt2.png SwiftBelt is a macOS enumerator inspired by @harmjoy's Windows-based Seatbelt enumeration tool. SwiftBelt does not utilize any command line utilities and instead uses Swift code (leveraging the Cocoa Framework, Foundation libraries, OSAKit libraries, etc.) to perform system enumeration. This can be leveraged on the offensive side to perform enumeration once you gain access to a macOS host. I intentionally did not include any functions that cause pop-ups (ex: keychain enumeration).

Thanks Ramos04 for contributing code to look for various Objective See tools and mattreduce for contributing code for zshell history as well as azure creds.
Steps

You can run the included SwiftBelt mach-o binary in the root directory of this repo or you can edit the Swift code and rebuild a new binary.

To use the included mach-o:

1. Note: I did not sign the included mach-o. Therefore you will need to take these steps to remove the quarantine attribute in order to run: Once downloaded, copy to the desired host and clear the quarantine attribute ($ xattr -c SwiftBelt) and set as executable ($ chmod +x SwiftBelt)
2. To see the help menu: ./SwiftBelt -h

Help menu:

SwiftBelt Options:

-SecurityTools --> Check for the presence of common macOS security tools (at least the ones I am familiar with)

-SystemInfo --> Pull back system info (wifi SSID info, open directory node info, internal IPs, ssh/aws/gcloud/azure-cli cred info, basic system info). If present on the host, this tool will display the contents of ssh keys, known hosts file, aws cred files, and gcloud token info

-Clipboard --> Dump clipboard contents

-RunningApps --> List all running apps

-ListUsers --> List local user accounts

-LaunchAgents --> List launch agents, launch daemons, and configuration profile files

-BrowserHistory --> Attempt to pull Safari, Firefox, Chrome, and Quarantine history (note as FYI: if Chrome or Firefox is actively running, the tool will not be able to read the locked database to extract info)

-SlackExtract --> Check if Slack is present and if so read cookie, downloads, and workspaces info (leverages research done by Cody Thomas)

-ShellHistory --> Read shell (Bash or Zsh) history content

-Bookmarks --> Read Chrome saved bookmarks

Usage:

To run all options: ./SwiftBelt

To specify certain options: ./SwiftBelt [option1] [option2] [option3]...

Example: ./SwiftBelt -SystemInfo -Clipboard -SecurityTools ...

To edit the Swift code and rebuild your own mach-o:

1.
Open the xcodeproj file for SwiftBelt in Xcode

2.
Edit the code in main.swift code as needed in Xcode

3.
From a terminal cd into the SwiftBelt directory and run: "swift build" to generate the binary. The binary will be dropped in the .build/debug folder inside of the SwiftBelt folder and will be named SwiftBelt

4.
Copy to the desired host and clear the quarantine attribute ($ xattr -c SwiftBelt) and set as executable ($ chmod +x SwiftBelt)

5.
Execute
Detection

Though this tool does not use any command line utilities (which are easy to detect), this tool does read from several files on the system which can be detected by any tools that leverage the Endpoint Security Framework (these file reads in particular are captured by ES_EVENT_TYPE_NOTIFY_OPEN events within ESF). Download SwiftBelt
The Hacker News
55 New Security Flaws Reported in Apple Software and Services

A team of five security researchers analyzed several Apple online services for three months and found as many as 55 vulnerabilities, 11 of which are critical in severity.
The flaws โ€” including 29 high severity, 13 medium severity, and 2 low severity vulnerabilities โ€” could have allowed an attacker to "fully compromise both customer and employee applications, launch a worm capable of
๐Ÿ“กแ‰ แ‹š๐Ÿ…ƒ๐Ÿ„ด๐Ÿ„ฒ๐Ÿ„ทแ‰ปแŠ“แˆ แ‹แˆตแŒฅ๐Ÿ”ฐ

โžฅ แ‰ แŒฃแˆ แŒฅแˆฉ แ‹จแˆ†แŠ‘ แ‹จpc & android app
โžฅ แˆตแˆˆ social media Hacking
โžฅแ‰ฐแ‹ˆแ‹ณแŒ… แŠฅแŠ“ แˆแˆญแŒฅ Web แŒฅแ‰†แˆ›
โžฅแŒ แ‰ƒแˆšแŠ“ แŠ แ‹ฒแˆต TechINFร˜ แˆ˜แˆจแŒƒ
โžฅแŒ แ‰ƒแˆš แ‹จtelegram bot
โžฅแ‰ แŒฃแˆแŒ แ‰ƒแˆš APP
โžฒแŠ แАแ‹šแˆ… แŠ“ แˆŒแˆŽแ‰ฝ แŒ แ‰ƒแˆš แ‰ตแˆแˆ…แˆญแ‰ถแ‰ฝแŠ• แ‹ซแŒˆแŠ™แ‰ แ‰ณแˆ๐Ÿ‡ช๐Ÿ‡น
cross promo @annonyem
แˆ€แˆณแ‰ฅแฃแŠ แˆตแ‰ฐแ‹ซแ‹จแ‰ต @luelkbot
Button post @LuelmBot
https://t.me/Lhacker1