Forwarded from Team ETF (1'M GR00T)
Simple OS command injection tutorial :
If you find useful, follow and like my postπ
https://sankethj.medium.com/command-injection-tutorial-ef622cb51896
Further doubts ask in group
If you find useful, follow and like my postπ
https://sankethj.medium.com/command-injection-tutorial-ef622cb51896
Further doubts ask in group
Medium
Command injection tutorial
Command injection is a type of web vulnerability that allows attackers to execute arbitrary operating system commands on the server, whereβ¦
Forwarded from Team ETF (Groot)
Watcher CTF walkthrough :
You can learn
1. Python library hijacking
2. Exploiting Cronjob
3. LFI exploiting
And many more......
https://sankethj.medium.com/watcher-tryhackme-walkthrough-317fe4e502ef
Further doubts ask in grp
You can learn
1. Python library hijacking
2. Exploiting Cronjob
3. LFI exploiting
And many more......
https://sankethj.medium.com/watcher-tryhackme-walkthrough-317fe4e502ef
Further doubts ask in grp
Medium
Watcher tryhackme walkthrough
Thankyou for creating this wonderful room @rushisec .
Forwarded from Team ETF (1'M GR00T)
Bug_Bounty_Automation_With_Python_The_secrets_of_bug_hunting_by.pdf
1.1 MB
Forwarded from CS
THOSE WHO WANT TO CRACK CEH AND OSCP AND BUG BOUNTY AND COMPTIA PENTEST+ AND OTHER CYBER SECURITY EXAMS
CLICK HERE TO JOIN
UNDER EXPERTS GUIDANCE U CAN CRACK OR U CAN ASK DOUBTS SUGGESTIONS AND CLEAR UR PATHS
FREE TRAINING AND TIPS WILL BE PROVIDED THERE
CLICK HERE TO JOIN
UNDER EXPERTS GUIDANCE U CAN CRACK OR U CAN ASK DOUBTS SUGGESTIONS AND CLEAR UR PATHS
FREE TRAINING AND TIPS WILL BE PROVIDED THERE
Forwarded from Team ETF (1'M GR00T < offline />)
burp-loader-keygen.jar
63.7 KB
π°Burp Suite Professional 1.7.37 Keygen & Loaderπ°
βSo the keygen released by Surferxyz over at Exetools forum still works with v1.7.37
Just required to be patched to look for 1.7.37 instead of 1.7.31
So here's a bundle with the patched software and keygen included.
βSo the keygen released by Surferxyz over at Exetools forum still works with v1.7.37
Just required to be patched to look for 1.7.37 instead of 1.7.31
So here's a bundle with the patched software and keygen included.
Forwarded from burpsuite (not official)
burp_suite_pro_v2021.3.2.zip
378.6 MB
pass: 311138
README inside, plz read it before run BS.
Happy Hacking! π₯³
README inside, plz read it before run BS.
Happy Hacking! π₯³
Forwarded from Team ETF (1'M GR00T < offline />)
As per the poll, we will be starting with pentesting and bug bounty from April 4 or earlier.
Requirements :- ( provided above )
1. Any linux distro
2. Install Burpsuite ( 1.7.xx are good, but u can also use new recent version of it, I basically suggest pro version.)
3. Hackbar with cyberfox ( if needed )
4. Install Sqlmap too. ( we will go through automation stuffs too )
5.
Stay tuned π₯
#Team_ETF
πOur channel isn't growing from last 2 months, bcz I stopped doing promosπ€.
If u find our channel useful suggest to ur frnds.
Together we learn..... π
#Team_ETF
Our group is private now, u can discuss with ur mates, here:-
https://t.me/joinchat/VSfpL7vrHeayFsXl
Requirements :- ( provided above )
1. Any linux distro
2. Install Burpsuite ( 1.7.xx are good, but u can also use new recent version of it, I basically suggest pro version.)
3. Hackbar with cyberfox ( if needed )
4. Install Sqlmap too. ( we will go through automation stuffs too )
5.
Stay tuned π₯
#Team_ETF
πOur channel isn't growing from last 2 months, bcz I stopped doing promosπ€.
If u find our channel useful suggest to ur frnds.
Together we learn..... π
#Team_ETF
Our group is private now, u can discuss with ur mates, here:-
https://t.me/joinchat/VSfpL7vrHeayFsXl
Forwarded from BLACK HAT KINGDOM
Complete Ethical Hacking With Termux Android Tutorial 2019.zip
337.5 MB
π’ Complete Ethical Hacking With Termux Android Tutorial 2019 π’
A complete course explaining how to build a virtual hacking environment, attack networks, and break passwords using Android and termux
#termux #ethicalhacking
π’Copy With Creditsπ’
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACKHAT_BEAST β
A complete course explaining how to build a virtual hacking environment, attack networks, and break passwords using Android and termux
#termux #ethicalhacking
π’Copy With Creditsπ’
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACKHAT_BEAST β
Forwarded from BLACK HAT KINGDOM
Learn_Hacking_and_use_your_Android_as_a_Hacking_Machine.rar
456 MB
Learn_Hacking_and_use_your_Android_as_a_Hacking_Machine.rar
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACKHAT_BEAST β
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACKHAT_BEAST β
Forwarded from BLACK HAT KINGDOM
Complete_Course_Of_Android_Hacking.rar
1.9 GB
Complete_Course_Of_Android_Hacking.rar
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACKHAT_BEAST β
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACKHAT_BEAST β
Forwarded from BLACK HAT KINGDOM
Exclusive_Cracking_Pack_2020_100+_Cracking_Tools_and_Configs_and.zip
483.5 MB
β Exclusive Cracking pack of 2020 available β
Some stuff from pack:
1. Apple valid email checker
2. Udemy accounts checker
3. Spotify checker
4. Steam checker
5. AIO checker
6. Axenta Fortnite Cracker
7. Blackbullet editions (cracked)
8. Ebay Register and account checker
9. Pinterest Account Checker
10. Findmyhash
11. Duperemover
12. Dork Searcher and Generator
13. Keyword Scrapper
14. Joker Combo Leecher
15. Steam.loli
16. Tidal.anon
17. Spotify.anon
18. Gorillas Scrapper
19. Haba proxy scrapper
20. Red Proxy checker
21. Proxy Finder, Grabber and Checker
.........&& Many More!
Β©οΈ
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACK_HAT_ARMY β
Its including 100+ exclusive cracking tools, checkers & configsSome stuff from pack:
1. Apple valid email checker
2. Udemy accounts checker
3. Spotify checker
4. Steam checker
5. AIO checker
6. Axenta Fortnite Cracker
7. Blackbullet editions (cracked)
8. Ebay Register and account checker
9. Pinterest Account Checker
10. Findmyhash
11. Duperemover
12. Dork Searcher and Generator
13. Keyword Scrapper
14. Joker Combo Leecher
15. Steam.loli
16. Tidal.anon
17. Spotify.anon
18. Gorillas Scrapper
19. Haba proxy scrapper
20. Red Proxy checker
21. Proxy Finder, Grabber and Checker
.........&& Many More!
Β©οΈ
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACK_HAT_ARMY β
Forwarded from BLACK HAT KINGDOM
βLearn Nodejs by building 10 projectsβ
πSource :
https://www.udemy.com/course/learn-nodejs-by-building-10-projects/
βοΈUploading BelowβοΈ
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACK_HAT_ARMY β
πSource :
https://www.udemy.com/course/learn-nodejs-by-building-10-projects/
βοΈUploading BelowβοΈ
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACK_HAT_ARMY β
Forwarded from BLACK HAT KINGDOM
learn-nodejs-by-building-10-projects.part1.rar
1.5 GB
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACK_HAT_ARMY β
β @BLACK_HAT_ARMY β
Forwarded from BLACK HAT KINGDOM
learn-nodejs-by-building-10-projects.part2.rar
854.6 MB
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACK_HAT_ARMY β
β @BLACK_HAT_ARMY β
Forwarded from BLACK HAT KINGDOM
π°Disable ads on your Android smartphoneπ°
You can find out the version of the android by going to the system settings by opening the item "About device" or "About phone". The Android version field will indicate the currently installed version.
Now let's move on directly to disabling ads. Note that on different devices, the item names may differ:
Let's get started:
We will block it using DNS AdGuard
β That's it, there are no more ads.
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACK_HAT_ARMY β
The method described below works on Android, starting from version 9.0, however, if your device has an Android version lower than the required one, you can alternatively use the AdGuard ad blocker You can find out the version of the android by going to the system settings by opening the item "About device" or "About phone". The Android version field will indicate the currently installed version.
Now let's move on directly to disabling ads. Note that on different devices, the item names may differ:
Let's get started:
1. Open settings> wireless networks (Network and Internet)
2. We see the item Private DNS. (You may have it in a separate menu "Other settings")
3. In the field that opens, enter "dns.AdGuard.com"
That's it, close the settings and enjoy the absence of ads.
You can also disable advertising through a router - then all devices on the network will work without advertising.
This method works on all devices connected to the router PC, laptop, phone, etc.We will block it using DNS AdGuard
1. We enter the settings of the router through the browser, drive in the line 192.168.0.1 , or 192.168.1.1 the password and login, if you have not changed admin
2. We find the DNS settings, on each router in different ways.
3. We drive in these addresses:
176.103.130.130
176.103.130.131
β That's it, there are no more ads.
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACK_HAT_ARMY β
Forwarded from BLACK HAT KINGDOM
π BUG BOUNTY π¨βπ»
β³οΈ A bug bounty program is a deal offered by many websites, organizations and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities.
β³οΈ These programs allow the developers to discover and resolve bugs before the general public is aware of them, preventing incidents of widespread abuse. Bug bounty programs have been implemented by a large number of organizations, including Mozilla,Facebook, Yahoo!,Google, Reddit, Square, Microsoft and the Internet bug bounty.
β³οΈ Companies outside the technology industry, including traditionally conservative organizations like the United States Department of Defense, have started using bug bounty programs. The Pentagonβs use of bug bounty programs is part of a posture shift that has seen several US Government Agencies reverse course from threatening white hat hackers with legal recourse to inviting them to participate as part of a comprehensive vulnerability disclosure framework or policy.
β³οΈ So briefly, If u report a valid bug then u will be rewarded with cash price.
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACK_HAT_ARMY β
β³οΈ A bug bounty program is a deal offered by many websites, organizations and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities.
β³οΈ These programs allow the developers to discover and resolve bugs before the general public is aware of them, preventing incidents of widespread abuse. Bug bounty programs have been implemented by a large number of organizations, including Mozilla,Facebook, Yahoo!,Google, Reddit, Square, Microsoft and the Internet bug bounty.
β³οΈ Companies outside the technology industry, including traditionally conservative organizations like the United States Department of Defense, have started using bug bounty programs. The Pentagonβs use of bug bounty programs is part of a posture shift that has seen several US Government Agencies reverse course from threatening white hat hackers with legal recourse to inviting them to participate as part of a comprehensive vulnerability disclosure framework or policy.
β³οΈ So briefly, If u report a valid bug then u will be rewarded with cash price.
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACK_HAT_ARMY β
Forwarded from BLACK HAT KINGDOM
π¨βπ»BlueSmack Attack - Bluetooth Hackingπ¨βπ»
β‘What is bluesmack Attack?
β‘Procedure For The Attack
β‘How to Avoid Such Attack
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACK_HAT_ARMY β
β‘What is bluesmack Attack?
Bluesmack is a cyber attack done on bluetooth enabled devices. The attack uses L2CAP (Logic Link Control And Adaptation Protocol) layer to transfer an oversized packet to the Bluetooth enabled devices, resulting in the Denial of Service (DoS) attack.
The attack can be performed in a very limited range, usually around 10 meters for the smartphones. For laptops, it can reach up to the 100 meters with powerful transmitters.β‘Procedure For The Attack
The hacker first uses the standard tools such as l2ping that come with Linux Bluex utils package.
The I2ping tool further allows a hacker to specify the packet length with some commands. Due to this, the Bluetooth enabled devices are overwhelmed by the malicious requests from the hacker, causing the device to be inoperable by the victim.
The attack atlast affects the regular operation of the victim device and can even degrades the performance of the device.β‘How to Avoid Such Attack
Turn the Bluetooth off when not in use. Do not store the permanent pairing PIN code on the device. Keep the Bluetooth off in public places, including restaurants, stores, airports, shopping malls, train stations, etc. If anything unusual is seen on the device, users can move to a new location to avoid this type of attack. When using Bluetooth, set the device to the hidden, or the non-discoverable mode.
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACK_HAT_ARMY β