Forwarded from Team ETF (1'M GR00T < offline />)
As per the poll, we will be starting with pentesting and bug bounty from April 4 or earlier.
Requirements :- ( provided above )
1. Any linux distro
2. Install Burpsuite ( 1.7.xx are good, but u can also use new recent version of it, I basically suggest pro version.)
3. Hackbar with cyberfox ( if needed )
4. Install Sqlmap too. ( we will go through automation stuffs too )
5.
Stay tuned π₯
#Team_ETF
πOur channel isn't growing from last 2 months, bcz I stopped doing promosπ€.
If u find our channel useful suggest to ur frnds.
Together we learn..... π
#Team_ETF
Our group is private now, u can discuss with ur mates, here:-
https://t.me/joinchat/VSfpL7vrHeayFsXl
Requirements :- ( provided above )
1. Any linux distro
2. Install Burpsuite ( 1.7.xx are good, but u can also use new recent version of it, I basically suggest pro version.)
3. Hackbar with cyberfox ( if needed )
4. Install Sqlmap too. ( we will go through automation stuffs too )
5.
Stay tuned π₯
#Team_ETF
πOur channel isn't growing from last 2 months, bcz I stopped doing promosπ€.
If u find our channel useful suggest to ur frnds.
Together we learn..... π
#Team_ETF
Our group is private now, u can discuss with ur mates, here:-
https://t.me/joinchat/VSfpL7vrHeayFsXl
Forwarded from BLACK HAT KINGDOM
Complete Ethical Hacking With Termux Android Tutorial 2019.zip
337.5 MB
π’ Complete Ethical Hacking With Termux Android Tutorial 2019 π’
A complete course explaining how to build a virtual hacking environment, attack networks, and break passwords using Android and termux
#termux #ethicalhacking
π’Copy With Creditsπ’
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACKHAT_BEAST β
A complete course explaining how to build a virtual hacking environment, attack networks, and break passwords using Android and termux
#termux #ethicalhacking
π’Copy With Creditsπ’
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACKHAT_BEAST β
Forwarded from BLACK HAT KINGDOM
Learn_Hacking_and_use_your_Android_as_a_Hacking_Machine.rar
456 MB
Learn_Hacking_and_use_your_Android_as_a_Hacking_Machine.rar
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACKHAT_BEAST β
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACKHAT_BEAST β
Forwarded from BLACK HAT KINGDOM
Complete_Course_Of_Android_Hacking.rar
1.9 GB
Complete_Course_Of_Android_Hacking.rar
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACKHAT_BEAST β
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACKHAT_BEAST β
Forwarded from BLACK HAT KINGDOM
Exclusive_Cracking_Pack_2020_100+_Cracking_Tools_and_Configs_and.zip
483.5 MB
β Exclusive Cracking pack of 2020 available β
Some stuff from pack:
1. Apple valid email checker
2. Udemy accounts checker
3. Spotify checker
4. Steam checker
5. AIO checker
6. Axenta Fortnite Cracker
7. Blackbullet editions (cracked)
8. Ebay Register and account checker
9. Pinterest Account Checker
10. Findmyhash
11. Duperemover
12. Dork Searcher and Generator
13. Keyword Scrapper
14. Joker Combo Leecher
15. Steam.loli
16. Tidal.anon
17. Spotify.anon
18. Gorillas Scrapper
19. Haba proxy scrapper
20. Red Proxy checker
21. Proxy Finder, Grabber and Checker
.........&& Many More!
Β©οΈ
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACK_HAT_ARMY β
Its including 100+ exclusive cracking tools, checkers & configsSome stuff from pack:
1. Apple valid email checker
2. Udemy accounts checker
3. Spotify checker
4. Steam checker
5. AIO checker
6. Axenta Fortnite Cracker
7. Blackbullet editions (cracked)
8. Ebay Register and account checker
9. Pinterest Account Checker
10. Findmyhash
11. Duperemover
12. Dork Searcher and Generator
13. Keyword Scrapper
14. Joker Combo Leecher
15. Steam.loli
16. Tidal.anon
17. Spotify.anon
18. Gorillas Scrapper
19. Haba proxy scrapper
20. Red Proxy checker
21. Proxy Finder, Grabber and Checker
.........&& Many More!
Β©οΈ
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACK_HAT_ARMY β
Forwarded from BLACK HAT KINGDOM
βLearn Nodejs by building 10 projectsβ
πSource :
https://www.udemy.com/course/learn-nodejs-by-building-10-projects/
βοΈUploading BelowβοΈ
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACK_HAT_ARMY β
πSource :
https://www.udemy.com/course/learn-nodejs-by-building-10-projects/
βοΈUploading BelowβοΈ
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACK_HAT_ARMY β
Forwarded from BLACK HAT KINGDOM
learn-nodejs-by-building-10-projects.part1.rar
1.5 GB
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACK_HAT_ARMY β
β @BLACK_HAT_ARMY β
Forwarded from BLACK HAT KINGDOM
learn-nodejs-by-building-10-projects.part2.rar
854.6 MB
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACK_HAT_ARMY β
β @BLACK_HAT_ARMY β
Forwarded from BLACK HAT KINGDOM
π°Disable ads on your Android smartphoneπ°
You can find out the version of the android by going to the system settings by opening the item "About device" or "About phone". The Android version field will indicate the currently installed version.
Now let's move on directly to disabling ads. Note that on different devices, the item names may differ:
Let's get started:
We will block it using DNS AdGuard
β That's it, there are no more ads.
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACK_HAT_ARMY β
The method described below works on Android, starting from version 9.0, however, if your device has an Android version lower than the required one, you can alternatively use the AdGuard ad blocker You can find out the version of the android by going to the system settings by opening the item "About device" or "About phone". The Android version field will indicate the currently installed version.
Now let's move on directly to disabling ads. Note that on different devices, the item names may differ:
Let's get started:
1. Open settings> wireless networks (Network and Internet)
2. We see the item Private DNS. (You may have it in a separate menu "Other settings")
3. In the field that opens, enter "dns.AdGuard.com"
That's it, close the settings and enjoy the absence of ads.
You can also disable advertising through a router - then all devices on the network will work without advertising.
This method works on all devices connected to the router PC, laptop, phone, etc.We will block it using DNS AdGuard
1. We enter the settings of the router through the browser, drive in the line 192.168.0.1 , or 192.168.1.1 the password and login, if you have not changed admin
2. We find the DNS settings, on each router in different ways.
3. We drive in these addresses:
176.103.130.130
176.103.130.131
β That's it, there are no more ads.
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACK_HAT_ARMY β
Forwarded from BLACK HAT KINGDOM
π BUG BOUNTY π¨βπ»
β³οΈ A bug bounty program is a deal offered by many websites, organizations and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities.
β³οΈ These programs allow the developers to discover and resolve bugs before the general public is aware of them, preventing incidents of widespread abuse. Bug bounty programs have been implemented by a large number of organizations, including Mozilla,Facebook, Yahoo!,Google, Reddit, Square, Microsoft and the Internet bug bounty.
β³οΈ Companies outside the technology industry, including traditionally conservative organizations like the United States Department of Defense, have started using bug bounty programs. The Pentagonβs use of bug bounty programs is part of a posture shift that has seen several US Government Agencies reverse course from threatening white hat hackers with legal recourse to inviting them to participate as part of a comprehensive vulnerability disclosure framework or policy.
β³οΈ So briefly, If u report a valid bug then u will be rewarded with cash price.
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACK_HAT_ARMY β
β³οΈ A bug bounty program is a deal offered by many websites, organizations and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities.
β³οΈ These programs allow the developers to discover and resolve bugs before the general public is aware of them, preventing incidents of widespread abuse. Bug bounty programs have been implemented by a large number of organizations, including Mozilla,Facebook, Yahoo!,Google, Reddit, Square, Microsoft and the Internet bug bounty.
β³οΈ Companies outside the technology industry, including traditionally conservative organizations like the United States Department of Defense, have started using bug bounty programs. The Pentagonβs use of bug bounty programs is part of a posture shift that has seen several US Government Agencies reverse course from threatening white hat hackers with legal recourse to inviting them to participate as part of a comprehensive vulnerability disclosure framework or policy.
β³οΈ So briefly, If u report a valid bug then u will be rewarded with cash price.
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACK_HAT_ARMY β
Forwarded from BLACK HAT KINGDOM
π¨βπ»BlueSmack Attack - Bluetooth Hackingπ¨βπ»
β‘What is bluesmack Attack?
β‘Procedure For The Attack
β‘How to Avoid Such Attack
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACK_HAT_ARMY β
β‘What is bluesmack Attack?
Bluesmack is a cyber attack done on bluetooth enabled devices. The attack uses L2CAP (Logic Link Control And Adaptation Protocol) layer to transfer an oversized packet to the Bluetooth enabled devices, resulting in the Denial of Service (DoS) attack.
The attack can be performed in a very limited range, usually around 10 meters for the smartphones. For laptops, it can reach up to the 100 meters with powerful transmitters.β‘Procedure For The Attack
The hacker first uses the standard tools such as l2ping that come with Linux Bluex utils package.
The I2ping tool further allows a hacker to specify the packet length with some commands. Due to this, the Bluetooth enabled devices are overwhelmed by the malicious requests from the hacker, causing the device to be inoperable by the victim.
The attack atlast affects the regular operation of the victim device and can even degrades the performance of the device.β‘How to Avoid Such Attack
Turn the Bluetooth off when not in use. Do not store the permanent pairing PIN code on the device. Keep the Bluetooth off in public places, including restaurants, stores, airports, shopping malls, train stations, etc. If anything unusual is seen on the device, users can move to a new location to avoid this type of attack. When using Bluetooth, set the device to the hidden, or the non-discoverable mode.
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACK_HAT_ARMY β
Forwarded from BLACK HAT KINGDOM
π°HACKER'S DICTIONARYπ°
Are you new to the realm of hacking?
Do you feel dumb when you don't know the meaning of a certain term?Well, then this will certainly help you out! . If you are ever unsure about anything, simply scroll down and find that specific word, then read the definition.
Anything includes: Abbreviations, Phrases, Words, and Techniques.*The list is in alphabetical order for convenience!*
βABBREVITIONSβ
DDoS = Distributed Denial of Service
DrDoS = Distributed Reflected Denial of Service Attack, uses a list of reflection servers or other methods such as DNS to spoof an attack to look like it's coming from multiple ips. Amplification of power in the attack COULD occur.
FTP =File Transfer Protocol. Used for transferring files over an FTP server.
FUD = Fully Undetectable
Hex =In computer science, hexadecimal refers to base-16 numbers. These are numbers that use digits in the range: 0123456789ABCDEF. In the C programming language (as well as Java, JavaScript, C++, and other places), hexadecimal numbers are prefixed by a 0x. In this manner, one can tell that the number 0x80 is equivalent to 128 decimal, not 80 decimal.
HTTP =Hyper Text Transfer Protocol. The foundation of data communication for the World Wide Web.
IRC = Internet Relay Chat. Transmiting text messages in real time between online users.
JDB =Java drive-by, a very commonly used web-based exploit which allows an attacker to download and execute malicious code locally on a slave's machine through a widely known java vulnerability.
Malware =Malicious Software
UNix = Unix based operating system, usually refered to here when refering to DoS'ing.
POP3 =This is the most popular protocol for picking up e-mail from a server.
R.A.T = Remote Administration Tool
SDB = Silent drive-by, using a zero day web-based exploit to hiddenly and un-detectably download and execute malicious code on a slave's system. (similar to a JDB however no notification or warning is given to the user)
SE = Social Engineering
SKID =Script Kid/Script Kiddie
SMTP =A TCP/IP protocol used in sending and receiving e-mail.
SQL =Structured Query Language. It's a programming language, that used to communicate with databases and DBMS. Can go along with a word after it, such as "SQL Injection."
SSH =Secure Shell, used to connect to Virtual Private Servers.
TCP = Transmission Control Protocol, creates connections and exchanges packets of data.
UDP =User Datagram Protocol, An alternative data transport to TCP used for DNS, Voice over IP, and file sharing.
VPN =Virtual Private Network
VPS =Virtual Private Server
XSS (CSS) = Cross Site Scripting
βWORDSβ
Algorithm = A series of steps specifying which actions to take in which order.
ANSI Bomb = ANSI.SYS key-remapping commands consist of cryptic-looking text that specifies, using ansi numeric codes to redefine keys.
Back Door = Something a hacker leaves behind on a system in order to be able to get back in at a later time.
Binary = A numbering system in which there are only two possible values for each digit: 0 and 1.
Black Hat = A hacker who performs illegal actions to do with hacking online. (Bad guy, per se)
Blue Hat =A blue hat hacker is someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term BlueHat to represent a series of security briefing events.
Bot = A piece of malware that connects computer to an attacker commonly using the HTTP or IRC protocal to await malicous instructions.
Botnet = Computers infected by worms or Trojans and taken over by hackers and brought into networks to send spam, more viruses, or launch denial of service attacks.
Buffer Overflow = A classic exploit that sends more data than a programmer expects to receive. Buffer overflows are one of the most common programming errors, and the ones most likely to slip through quality assurance testing.
Cracker = A specific type of hacker who decrypts passwords or breaks software
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACK_HAT_ARMY β
Are you new to the realm of hacking?
Do you feel dumb when you don't know the meaning of a certain term?Well, then this will certainly help you out! . If you are ever unsure about anything, simply scroll down and find that specific word, then read the definition.
Anything includes: Abbreviations, Phrases, Words, and Techniques.*The list is in alphabetical order for convenience!*
βABBREVITIONSβ
DDoS = Distributed Denial of Service
DrDoS = Distributed Reflected Denial of Service Attack, uses a list of reflection servers or other methods such as DNS to spoof an attack to look like it's coming from multiple ips. Amplification of power in the attack COULD occur.
FTP =File Transfer Protocol. Used for transferring files over an FTP server.
FUD = Fully Undetectable
Hex =In computer science, hexadecimal refers to base-16 numbers. These are numbers that use digits in the range: 0123456789ABCDEF. In the C programming language (as well as Java, JavaScript, C++, and other places), hexadecimal numbers are prefixed by a 0x. In this manner, one can tell that the number 0x80 is equivalent to 128 decimal, not 80 decimal.
HTTP =Hyper Text Transfer Protocol. The foundation of data communication for the World Wide Web.
IRC = Internet Relay Chat. Transmiting text messages in real time between online users.
JDB =Java drive-by, a very commonly used web-based exploit which allows an attacker to download and execute malicious code locally on a slave's machine through a widely known java vulnerability.
Malware =Malicious Software
UNix = Unix based operating system, usually refered to here when refering to DoS'ing.
POP3 =This is the most popular protocol for picking up e-mail from a server.
R.A.T = Remote Administration Tool
SDB = Silent drive-by, using a zero day web-based exploit to hiddenly and un-detectably download and execute malicious code on a slave's system. (similar to a JDB however no notification or warning is given to the user)
SE = Social Engineering
SKID =Script Kid/Script Kiddie
SMTP =A TCP/IP protocol used in sending and receiving e-mail.
SQL =Structured Query Language. It's a programming language, that used to communicate with databases and DBMS. Can go along with a word after it, such as "SQL Injection."
SSH =Secure Shell, used to connect to Virtual Private Servers.
TCP = Transmission Control Protocol, creates connections and exchanges packets of data.
UDP =User Datagram Protocol, An alternative data transport to TCP used for DNS, Voice over IP, and file sharing.
VPN =Virtual Private Network
VPS =Virtual Private Server
XSS (CSS) = Cross Site Scripting
βWORDSβ
Algorithm = A series of steps specifying which actions to take in which order.
ANSI Bomb = ANSI.SYS key-remapping commands consist of cryptic-looking text that specifies, using ansi numeric codes to redefine keys.
Back Door = Something a hacker leaves behind on a system in order to be able to get back in at a later time.
Binary = A numbering system in which there are only two possible values for each digit: 0 and 1.
Black Hat = A hacker who performs illegal actions to do with hacking online. (Bad guy, per se)
Blue Hat =A blue hat hacker is someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term BlueHat to represent a series of security briefing events.
Bot = A piece of malware that connects computer to an attacker commonly using the HTTP or IRC protocal to await malicous instructions.
Botnet = Computers infected by worms or Trojans and taken over by hackers and brought into networks to send spam, more viruses, or launch denial of service attacks.
Buffer Overflow = A classic exploit that sends more data than a programmer expects to receive. Buffer overflows are one of the most common programming errors, and the ones most likely to slip through quality assurance testing.
Cracker = A specific type of hacker who decrypts passwords or breaks software
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACK_HAT_ARMY β
Forwarded from BLACK HAT KINGDOM
Start Using Wireshark to Hack like a Pro.zip
531.4 MB
π°Start Using Wireshark to Hack like a Proπ°#Wireshark
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACKHAT_BEAST β
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACKHAT_BEAST β
Forwarded from BLACK HAT KINGDOM
Reverse_Engineering_Course_β_The_Hacks_Behind_Cracking_By_DedSec.rar
1.2 GB
β¬DEDSEC Reverse Engineering Course β The Hacks Behind crackingβ¬
Credits - Unknown
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACKHAT_BEAST β
Credits - Unknown
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACKHAT_BEAST β
Forwarded from BLACK HAT KINGDOM
SQL Injection.zip
932.9 MB
π File Name:
πΎ File Size: 932.93 MiB
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACKHAT_BEAST β
SQL Injection.zipπΎ File Size: 932.93 MiB
πΊπΎππππ π¬ππ πΎππππππ π»
β @BLACKHAT_BEAST β
Forwarded from Vincent T
Thank you for your question. Moving on a little bit, yield farming and lending are currently one of the hottest topics among crypto space,
Q4: Do Tokocrypto have financial investment tools such as Lending, Yield farming ? Do you have a plan to develop it? And will the exchange's profits be divided among TKO token holders?
Q4: Do Tokocrypto have financial investment tools such as Lending, Yield farming ? Do you have a plan to develop it? And will the exchange's profits be divided among TKO token holders?
Forwarded from Yildirim βͺοΈ
1st Question by @k_pejuang
What is the ultimate vision that TapSwap is trying to achieve within the cryptocurrencies market? Obviously the whole space will experience huge growth in the upcoming years, but what role would you like TapSwap play in this?
What is the ultimate vision that TapSwap is trying to achieve within the cryptocurrencies market? Obviously the whole space will experience huge growth in the upcoming years, but what role would you like TapSwap play in this?