7 subscribers
34 photos
6 videos
29 files
29 links
Backup
Download Telegram
Forwarded from Team ETF (1'M GR00T < offline />)
Cyberfox, sqlmap ; u will get easily, just search for those
Forwarded from Team ETF (1'M GR00T < offline />)
As per the poll, we will be starting with pentesting and bug bounty from April 4 or earlier.

Requirements :- ( provided above )
1. Any linux distro
2. Install Burpsuite ( 1.7.xx are good, but u can also use new recent version of it, I basically suggest pro version.)
3. Hackbar with cyberfox ( if needed )
4. Install Sqlmap too. ( we will go through automation stuffs too )
5.

Stay tuned πŸ”₯
#Team_ETF


πŸ’”Our channel isn't growing from last 2 months, bcz I stopped doing promosπŸ–€.
If u find our channel useful suggest to ur frnds.
Together we learn..... πŸ’
#Team_ETF

Our group is private now, u can discuss with ur mates, here:-
https://t.me/joinchat/VSfpL7vrHeayFsXl
Forwarded from BLACK HAT KINGDOM
Complete Ethical Hacking With Termux Android Tutorial 2019.zip
337.5 MB
πŸ’’ Complete Ethical Hacking With Termux Android Tutorial 2019 πŸ’’

A complete course explaining how to build a virtual hacking environment, attack networks, and break passwords using Android and termux

#termux #ethicalhacking

πŸ’’Copy With CreditsπŸ’’

πŸ”Ίπ•Ύπ–π–†π–—π–Š 𝕬𝖓𝖉 π•Ύπ–šπ–•π–•π–”π–—π–™ πŸ”»
βž–
@BLACKHAT_BEAST βž–
Forwarded from BLACK HAT KINGDOM
Learn_Hacking_and_use_your_Android_as_a_Hacking_Machine.rar
456 MB
Learn_Hacking_and_use_your_Android_as_a_Hacking_Machine.rar

πŸ”Ίπ•Ύπ–π–†π–—π–Š 𝕬𝖓𝖉 π•Ύπ–šπ–•π–•π–”π–—π–™ πŸ”»
βž–
@BLACKHAT_BEAST βž–
Forwarded from BLACK HAT KINGDOM
Complete_Course_Of_Android_Hacking.rar
1.9 GB
Complete_Course_Of_Android_Hacking.rar

πŸ”Ίπ•Ύπ–π–†π–—π–Š 𝕬𝖓𝖉 π•Ύπ–šπ–•π–•π–”π–—π–™ πŸ”»
βž–
@BLACKHAT_BEAST βž–
Forwarded from BLACK HAT KINGDOM
Exclusive_Cracking_Pack_2020_100+_Cracking_Tools_and_Configs_and.zip
483.5 MB
β™‹ Exclusive Cracking pack of 2020 available β™‹

Its including 100+ exclusive cracking tools, checkers & configs

Some stuff from pack:

1. Apple valid email checker
2. Udemy accounts checker
3. Spotify checker
4. Steam checker
5. AIO checker
6. Axenta Fortnite Cracker
7. Blackbullet editions (cracked)
8. Ebay Register and account checker
9. Pinterest Account Checker
10. Findmyhash
11. Duperemover
12. Dork Searcher and Generator
13. Keyword Scrapper
14. Joker Combo Leecher
15. Steam.loli
16. Tidal.anon
17. Spotify.anon
18. Gorillas Scrapper
19. Haba proxy scrapper
20. Red Proxy checker
21. Proxy Finder, Grabber and Checker

.........&& Many More!


©️

πŸ”Ίπ•Ύπ–π–†π–—π–Š 𝕬𝖓𝖉 π•Ύπ–šπ–•π–•π–”π–—π–™ πŸ”»
βž–
@BLACK_HAT_ARMY βž–
Forwarded from BLACK HAT KINGDOM
⚜Learn Nodejs by building 10 projects⚜

πŸ“ŒSource :
https://www.udemy.com/course/learn-nodejs-by-building-10-projects/

⭕️Uploading Below⭕️

πŸ”Ίπ•Ύπ–π–†π–—π–Š 𝕬𝖓𝖉 π•Ύπ–šπ–•π–•π–”π–—π–™ πŸ”»
βž–
@BLACK_HAT_ARMY βž–
Forwarded from BLACK HAT KINGDOM
learn-nodejs-by-building-10-projects.part1.rar
1.5 GB
πŸ”Ίπ•Ύπ–π–†π–—π–Š 𝕬𝖓𝖉 π•Ύπ–šπ–•π–•π–”π–—π–™ πŸ”»
βž–
@BLACK_HAT_ARMY βž–
Forwarded from BLACK HAT KINGDOM
learn-nodejs-by-building-10-projects.part2.rar
854.6 MB
πŸ”Ίπ•Ύπ–π–†π–—π–Š 𝕬𝖓𝖉 π•Ύπ–šπ–•π–•π–”π–—π–™ πŸ”»
βž–
@BLACK_HAT_ARMY βž–
Forwarded from BLACK HAT KINGDOM
πŸ”°Disable ads on your Android smartphoneπŸ”°

The method described below works on Android, starting from version 9.0, however, if your device has an Android version lower than the required one, you can alternatively use the AdGuard ad blocker

You can find out the version of the android by going to the system settings by opening the item "About device" or "About phone". The Android version field will indicate the currently installed version.

Now let's move on directly to disabling ads. Note that on different devices, the item names may differ:

Let's get started:

1. Open settings> wireless networks (Network and Internet)

2. We see the item Private DNS. (You may have it in a separate menu "Other settings")

3. In the field that opens, enter "dns.AdGuard.com"


That's it, close the settings and enjoy the absence of ads.


You can also disable advertising through a router - then all devices on the network will work without advertising.

This method works on all devices connected to the router PC, laptop, phone, etc.



We will block it using DNS AdGuard


1. We enter the settings of the router through the browser, drive in the line 192.168.0.1 , or 192.168.1.1 the password and login, if you have not changed admin

2. We find the DNS settings, on each router in different ways.

3. We drive in these addresses:

176.103.130.130

176.103.130.131


βœ…That's it, there are no more ads.

πŸ”Ίπ•Ύπ–π–†π–—π–Š 𝕬𝖓𝖉 π•Ύπ–šπ–•π–•π–”π–—π–™ πŸ”»
βž–
@BLACK_HAT_ARMY βž–
Forwarded from BLACK HAT KINGDOM
πŸ—ƒ BUG BOUNTY πŸ‘¨β€πŸ’»

✳️ A bug bounty program is a deal offered by many websites, organizations and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities.

✳️ These programs allow the developers to discover and resolve bugs before the general public is aware of them, preventing incidents of widespread abuse. Bug bounty programs have been implemented by a large number of organizations, including Mozilla,Facebook, Yahoo!,Google, Reddit, Square, Microsoft and the Internet bug bounty.

✳️ Companies outside the technology industry, including traditionally conservative organizations like the United States Department of Defense, have started using bug bounty programs. The Pentagon’s use of bug bounty programs is part of a posture shift that has seen several US Government Agencies reverse course from threatening white hat hackers with legal recourse to inviting them to participate as part of a comprehensive vulnerability disclosure framework or policy.

✳️ So briefly, If u report a valid bug then u will be rewarded with cash price.


πŸ”Ίπ•Ύπ–π–†π–—π–Š 𝕬𝖓𝖉 π•Ύπ–šπ–•π–•π–”π–—π–™ πŸ”»
βž–
@BLACK_HAT_ARMY βž–
Forwarded from BLACK HAT KINGDOM
πŸ‘¨β€πŸ’»BlueSmack Attack - Bluetooth HackingπŸ‘¨β€πŸ’»

⚑What is bluesmack Attack?

Bluesmack is a cyber attack done on bluetooth enabled devices. The attack uses L2CAP (Logic Link Control And Adaptation Protocol) layer to transfer an oversized packet to the Bluetooth enabled devices, resulting in the Denial of Service (DoS) attack.
The attack can be performed in a very limited range, usually around 10 meters for the smartphones. For laptops, it can reach up to the 100 meters with powerful transmitters
.

⚑Procedure For The Attack

The hacker first uses the standard tools such as l2ping that come with Linux Bluex utils package.
The I2ping tool further allows a hacker to specify the packet length with some commands. Due to this, the Bluetooth enabled devices are overwhelmed by the malicious requests from the hacker, causing the device to be inoperable by the victim.
The attack atlast affects the regular operation of the victim device and can even degrades the performance of the device.


⚑How to Avoid Such Attack

Turn the Bluetooth off when not in use. Do not store the permanent pairing PIN code on the device. Keep the Bluetooth off in public places, including restaurants, stores, airports, shopping malls, train stations, etc. If anything unusual is seen on the device, users can move to a new location to avoid this type of attack. When using Bluetooth, set the device to the hidden, or the non-discoverable mode.

πŸ”Ίπ•Ύπ–π–†π–—π–Š 𝕬𝖓𝖉 π•Ύπ–šπ–•π–•π–”π–—π–™ πŸ”»
βž–
@BLACK_HAT_ARMY βž–
Forwarded from BLACK HAT KINGDOM
πŸ”°HACKER'S DICTIONARYπŸ”°

Are you new to the realm of hacking?

Do you feel dumb when you don't know the meaning of a certain term?Well, then this will certainly help you out! . If you are ever unsure about anything, simply scroll down and find that specific word, then read the definition.

Anything includes: Abbreviations, Phrases, Words, and Techniques.*The list is in alphabetical order for convenience!*

βž–ABBREVITIONSβž–

DDoS = Distributed Denial of Service

DrDoS = Distributed Reflected Denial of Service Attack, uses a list of reflection servers or other methods such as DNS to spoof an attack to look like it's coming from multiple ips. Amplification of power in the attack COULD occur.

FTP =File Transfer Protocol. Used for transferring files over an FTP server.

FUD = Fully Undetectable

Hex =In computer science, hexadecimal refers to base-16 numbers. These are numbers that use digits in the range: 0123456789ABCDEF. In the C programming language (as well as Java, JavaScript, C++, and other places), hexadecimal numbers are prefixed by a 0x. In this manner, one can tell that the number 0x80 is equivalent to 128 decimal, not 80 decimal.

HTTP =Hyper Text Transfer Protocol. The foundation of data communication for the World Wide Web.

IRC = Internet Relay Chat. Transmiting text messages in real time between online users.

JDB =Java drive-by, a very commonly used web-based exploit which allows an attacker to download and execute malicious code locally on a slave's machine through a widely known java vulnerability.

Malware =Malicious Software

UNix = Unix based operating system, usually refered to here when refering to DoS'ing.

POP3 =This is the most popular protocol for picking up e-mail from a server.

R.A.T = Remote Administration Tool

SDB = Silent drive-by, using a zero day web-based exploit to hiddenly and un-detectably download and execute malicious code on a slave's system. (similar to a JDB however no notification or warning is given to the user)

SE = Social Engineering

SKID =Script Kid/Script Kiddie

SMTP =A TCP/IP protocol used in sending and receiving e-mail.

SQL =Structured Query Language. It's a programming language, that used to communicate with databases and DBMS. Can go along with a word after it, such as "SQL Injection."

SSH =Secure Shell, used to connect to Virtual Private Servers.

TCP = Transmission Control Protocol, creates connections and exchanges packets of data.

UDP =User Datagram Protocol, An alternative data transport to TCP used for DNS, Voice over IP, and file sharing.

VPN =Virtual Private Network

VPS =Virtual Private Server

XSS (CSS) = Cross Site Scripting

βž–WORDSβž–

Algorithm = A series of steps specifying which actions to take in which order.

ANSI Bomb = ANSI.SYS key-remapping commands consist of cryptic-looking text that specifies, using ansi numeric codes to redefine keys.

Back Door = Something a hacker leaves behind on a system in order to be able to get back in at a later time.

Binary = A numbering system in which there are only two possible values for each digit: 0 and 1.

Black Hat = A hacker who performs illegal actions to do with hacking online. (Bad guy, per se)

Blue Hat =A blue hat hacker is someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term BlueHat to represent a series of security briefing events.

Bot = A piece of malware that connects computer to an attacker commonly using the HTTP or IRC protocal to await malicous instructions.

Botnet = Computers infected by worms or Trojans and taken over by hackers and brought into networks to send spam, more viruses, or launch denial of service attacks.

Buffer Overflow = A classic exploit that sends more data than a programmer expects to receive. Buffer overflows are one of the most common programming errors, and the ones most likely to slip through quality assurance testing.

Cracker = A specific type of hacker who decrypts passwords or breaks software

πŸ”Ίπ•Ύπ–π–†π–—π–Š 𝕬𝖓𝖉 π•Ύπ–šπ–•π–•π–”π–—π–™ πŸ”»
βž–
@BLACK_HAT_ARMY βž–
Forwarded from BLACK HAT KINGDOM
Start Using Wireshark to Hack like a Pro.zip
531.4 MB
πŸ”°Start Using Wireshark to Hack like a ProπŸ”°#Wireshark

πŸ”Ίπ•Ύπ–π–†π–—π–Š 𝕬𝖓𝖉 π•Ύπ–šπ–•π–•π–”π–—π–™ πŸ”»
βž–
@BLACKHAT_BEAST βž–
Forwarded from BLACK HAT KINGDOM
Reverse_Engineering_Course_–_The_Hacks_Behind_Cracking_By_DedSec.rar
1.2 GB
⬛DEDSEC Reverse Engineering Course – The Hacks Behind cracking⬛

Credits - Unknown

πŸ”Ίπ•Ύπ–π–†π–—π–Š 𝕬𝖓𝖉 π•Ύπ–šπ–•π–•π–”π–—π–™ πŸ”»
βž–
@BLACKHAT_BEAST βž–
Forwarded from BLACK HAT KINGDOM
SQL Injection.zip
932.9 MB
πŸ“‚ File Name: SQL Injection.zip

πŸ’Ύ File Size: 932.93 MiB

πŸ”Ίπ•Ύπ–π–†π–—π–Š 𝕬𝖓𝖉 π•Ύπ–šπ–•π–•π–”π–—π–™ πŸ”»
βž–
@BLACKHAT_BEAST βž–
Forwarded from Vincent T
So let’s warm up with our very first question

Q1: Can you tell us about the market pie you are trying to conquer, your competitors and your SWOT analysis for your offerings? What sectors that your team are disrupting now ?
Forwarded from Vincent T
So let move to Q2 : Security, scalability, and data privacy are three aspects that are very important. I would like to know How the team Tokocrypto resolves if there is an unfortunate security problem? Will there be a security fund to protect user assets?
Forwarded from Vincent T
So adding to it,

Q3: What security system does Tokocrypto have to prevent counterfeiting and attempted fraud? What is the security mechanism of Tokocrypto to ensure user assets do not become the target of hackers?
Forwarded from Vincent T
Thank you for your question. Moving on a little bit, yield farming and lending are currently one of the hottest topics among crypto space,

Q4: Do Tokocrypto have financial investment tools such as Lending, Yield farming ? Do you have a plan to develop it? And will the exchange's profits be divided among TKO token holders?
Forwarded from Yildirim β–ͺ️
1st Question by @k_pejuang

What is the ultimate vision that TapSwap is trying to achieve within the cryptocurrencies market? Obviously the whole space will experience huge growth in the upcoming years, but what role would you like TapSwap play in this?