05.06.202411:10
Hack
Databases With Metasploit03.06.202406:04
✔️Payment Gateway Bypass Course ✔️
PAYU BUG EXPLOIT
RAZORPAY BUG EXPLOIT
CASHFREE BUG EXPLOIT
ZAAKPAY BUG EXPLOIT
PRICE TAMPERING BY BUY NOW OPTION
PRICE TAMPERING IN CART OPTION
Posted by @TheGodEye✅️
PAYU BUG EXPLOIT
RAZORPAY BUG EXPLOIT
CASHFREE BUG EXPLOIT
ZAAKPAY BUG EXPLOIT
PRICE TAMPERING BY BUY NOW OPTION
PRICE TAMPERING IN CART OPTION
Posted by @TheGodEye✅️
31.05.202409:42
🔹How to set up your own VPN Server🔹
Topic covered
What are the benefits of setting up your own VPN server instead of using a commercial VPN service?
Posted by :- @TheGodEye
Topic covered
How to setup own vpn server.
Monitor vpn server traffic.
What are the benefits of setting up your own VPN server instead of using a commercial VPN service?
Increased control over who has access to your network and data.
Complete control over the configuration and settings of your VPN.
No third-party involvement in handling your personal data or logs.
Ability to use advanced encryption protocols to protect your traffic.
Better protection against potential data breaches or security.
vulnerabilities within commercial VPN services.
Posted by :- @TheGodEye
29.05.202406:03
⭐️Bash Scripting from Beginner to Pro⭐️
Bash scripting is an important part of process automation in Linux. Scripting helps you write a sequence of commands in a file and then execute them.
This saves you time because you don't have to write certain commands again and again. You can perform daily tasks efficiently and even schedule them for automatic execution. You can also use it in developing unique solutions , automating processes
Posted by @TheGodEye
Bash scripting is an important part of process automation in Linux. Scripting helps you write a sequence of commands in a file and then execute them.
This saves you time because you don't have to write certain commands again and again. You can perform daily tasks efficiently and even schedule them for automatic execution. You can also use it in developing unique solutions , automating processes
Posted by @TheGodEye
27.05.202404:39
❤️BELOW ARE SOME SITES WHERE YOU CAN FIND ALMOST ANY BOOK 😣
http://PDFDrive.com - Books
http://OceanofPDF.com - Books / Comics
http://pdfroom.com - Books / Comics
http://Pdfgeni.com - Books
http://PDFGrab.com - Books
http://EbookPDF.com - Books
http://KuPDF.net - Books
http://ePDF.pub - Books
http://PDFCookie.com - Books
http://SoPDF.com - Books
http://PDFSearches.com - Books
http://OiiPDF.com - Books
http://FindPDFDoc.com - Books
http://PDFSlide.net - Books
http://EDoc.site - Books
http://PDFDuck.com - Books
http://pdforigin.info - Books
http://LargePDF.com - Books
http://PDFStop.com - Books
http://freepdfbook.com - Books
http://PDFSearchEngine.info - PDF Search Engine
Amazonaws - Amazon PDF Search
https://1lib.in/
gen.lib.rus.ec
b-ok.org
forum.mobilism.org
booksc.org
filechef.co
audiobookbay.pl
pdf-giant.com
magazinelib.com
ebook3000.com
magzus.com
ebook3000.biz
magzter.com
pdfmagazines.club
nulledpremium.com
https://read-any-book.com/
ebookscart.com
epubdrive.com
hotaudiobooks.com
ebookpdf.com
sci-hub.tw
gutenberg.org
www.free-ebooks.net
manybooks.net
ibiblio.org
authorama.com
bartleby.com
bibliomania.com
readprint.com
ebookdirectory.com
getfreeebooks.com
bookyards.com
digital.library.upenn.edu
b-ok.org
ebook777.com
8freebooks.net
bookflare.org
dlfeb.com
allitebooks.org
wowebook.co
pdfdrive.net
mirknig.su - Russian
uloz.to - Extensive collection
Posted by @TheGodEye
http://PDFDrive.com - Books
http://OceanofPDF.com - Books / Comics
http://pdfroom.com - Books / Comics
http://Pdfgeni.com - Books
http://PDFGrab.com - Books
http://EbookPDF.com - Books
http://KuPDF.net - Books
http://ePDF.pub - Books
http://PDFCookie.com - Books
http://SoPDF.com - Books
http://PDFSearches.com - Books
http://OiiPDF.com - Books
http://FindPDFDoc.com - Books
http://PDFSlide.net - Books
http://EDoc.site - Books
http://PDFDuck.com - Books
http://pdforigin.info - Books
http://LargePDF.com - Books
http://PDFStop.com - Books
http://freepdfbook.com - Books
http://PDFSearchEngine.info - PDF Search Engine
Amazonaws - Amazon PDF Search
https://1lib.in/
gen.lib.rus.ec
b-ok.org
forum.mobilism.org
booksc.org
filechef.co
audiobookbay.pl
pdf-giant.com
magazinelib.com
ebook3000.com
magzus.com
ebook3000.biz
magzter.com
pdfmagazines.club
nulledpremium.com
https://read-any-book.com/
ebookscart.com
epubdrive.com
hotaudiobooks.com
ebookpdf.com
sci-hub.tw
gutenberg.org
www.free-ebooks.net
manybooks.net
ibiblio.org
authorama.com
bartleby.com
bibliomania.com
readprint.com
ebookdirectory.com
getfreeebooks.com
bookyards.com
digital.library.upenn.edu
b-ok.org
ebook777.com
8freebooks.net
bookflare.org
dlfeb.com
allitebooks.org
wowebook.co
pdfdrive.net
mirknig.su - Russian
uloz.to - Extensive collection
Posted by @TheGodEye
25.05.202404:24
The Art of Reverse Engineering with Radare 2
Password:-
Radare2 is a powerful and versatile open-source reverse engineering toolkit. It can be used to analyze, disassemble and debug a wide range of executable formats including native applications, firmware, and even proprietary file formats.
Posted by @TheGodEye
Password:-
@TheGodEye
Radare2 is a powerful and versatile open-source reverse engineering toolkit. It can be used to analyze, disassemble and debug a wide range of executable formats including native applications, firmware, and even proprietary file formats.
Posted by @TheGodEye
04.06.202411:30
Nmap Tutorial For Beginners | How to Scan Your Network Using Nmap | Ethical Hacking Tool
Below are the list of topics along with their timestamps:
0:15 What is Nmap?
1:09 Installation
1:50 IP Scans
3:38 Scanning Multiple Hosts
6:30 Scanning from input file
8:02 Port Scanning
10:00 Agressive Scanning
11:20 Version Detection
11:51 OS Detection
12:33 Packet Route Discovery
13:35 Writing Results to a LOG File
14:49 Verbose Scans
Below are the list of topics along with their timestamps:
0:15 What is Nmap?
1:09 Installation
1:50 IP Scans
3:38 Scanning Multiple Hosts
6:30 Scanning from input file
8:02 Port Scanning
10:00 Agressive Scanning
11:20 Version Detection
11:51 OS Detection
12:33 Packet Route Discovery
13:35 Writing Results to a LOG File
14:49 Verbose Scans
02.06.202404:33
❤ 7 Certifications to take your career to the next level ❤
1. Computer Science
https://pll.harvard.edu/course/cs50-introduction-computer-science
2. JavaScript
https://freecodecamp.org/learn/javascript-algorithms-and-data-structures/
3. Python
https://cs50.harvard.edu/python/2022/
4. Digital Marketing
https://learndigital.withgoogle.com/digitalgarage/course/digital-marketing
5. Project Management
https://msicertified.com/project-management/project-management-essentials-certified/
6. Six Sigma White Belt Certification
https://www.msicertified.com/six-sigma-certifications/lean-six-sigma-white-belt-certification/
7. Machine Learning
https://www.freecodecamp.org/learn/machine-learning-with-python/
Posted by @TheGodEye
1. Computer Science
https://pll.harvard.edu/course/cs50-introduction-computer-science
2. JavaScript
https://freecodecamp.org/learn/javascript-algorithms-and-data-structures/
3. Python
https://cs50.harvard.edu/python/2022/
4. Digital Marketing
https://learndigital.withgoogle.com/digitalgarage/course/digital-marketing
5. Project Management
https://msicertified.com/project-management/project-management-essentials-certified/
6. Six Sigma White Belt Certification
https://www.msicertified.com/six-sigma-certifications/lean-six-sigma-white-belt-certification/
7. Machine Learning
https://www.freecodecamp.org/learn/machine-learning-with-python/
Posted by @TheGodEye
30.05.202413:44
😈 how to Up A Free RDP Service In Linux💃
28.05.202411:35
🐋Awesome Hackers Search Engines🐋
Online tools for search info about:
- exploit
- vulnerabilities
- people
- emails
- phone numbers
- domains
- certificates
and more.
https://github.com/edoardottt/awesome-hacker-search-engines
Online tools for search info about:
- exploit
- vulnerabilities
- people
- emails
- phone numbers
- domains
- certificates
and more.
https://github.com/edoardottt/awesome-hacker-search-engines
26.05.202404:17
Python Ethical Hacking
24.05.202411:22
🚬 Awesome security hardening.🚬
• A large collection of different materials on the topic of increasing security. From detailed guidelines to basic tools and metrics:🩸
• Security Hardening Guides and Best Practices;
— Hardening Guide Collections;
— GNU/Linux;
- Red Hat Enterprise Linux - RHEL;
- CentOS;
- SUSE;
- Ubuntu;
— Windows;
— macOS;
— Network Devices;
- Switches;
- Routers;
- IPv6;
- Firewalls;
— Virtualization - VMware;
— Containers - Docker - Kubernetes;
— Services;
- SSH;
- TLS/SSL;
- Web Servers;
- Mail Servers;
- FTP Servers;
- Database Servers;
- Active Directory;
- ADFS;
- Kerberos;
- LDAP;
- DNS;
- NTP;
- NFS;
- CUPS;
— Authentication - Passwords;
— Hardware - CPU - BIOS - UEFI;
— Cloud;
• Tools;
— Tools to check security hardening;
- GNU/Linux;
- Windows;
- Network Devices;
- TLS/SSL;
- SSH;
- Hardware - CPU - BIOS - UEFI;
- Docker;
- Cloud;
— Tools to apply security hardening;
- GNU/Linux;
- Windows;
- TLS/SSL;
- Cloud;
— Password Generators;
• Books;
• Other Awesome Lists;
— Other Awesome Security Lists.
Posted by @TheGodEye
• A large collection of different materials on the topic of increasing security. From detailed guidelines to basic tools and metrics:🩸
• Security Hardening Guides and Best Practices;
— Hardening Guide Collections;
— GNU/Linux;
- Red Hat Enterprise Linux - RHEL;
- CentOS;
- SUSE;
- Ubuntu;
— Windows;
— macOS;
— Network Devices;
- Switches;
- Routers;
- IPv6;
- Firewalls;
— Virtualization - VMware;
— Containers - Docker - Kubernetes;
— Services;
- SSH;
- TLS/SSL;
- Web Servers;
- Mail Servers;
- FTP Servers;
- Database Servers;
- Active Directory;
- ADFS;
- Kerberos;
- LDAP;
- DNS;
- NTP;
- NFS;
- CUPS;
— Authentication - Passwords;
— Hardware - CPU - BIOS - UEFI;
— Cloud;
• Tools;
— Tools to check security hardening;
- GNU/Linux;
- Windows;
- Network Devices;
- TLS/SSL;
- SSH;
- Hardware - CPU - BIOS - UEFI;
- Docker;
- Cloud;
— Tools to apply security hardening;
- GNU/Linux;
- Windows;
- TLS/SSL;
- Cloud;
— Password Generators;
• Books;
• Other Awesome Lists;
— Other Awesome Security Lists.
Posted by @TheGodEye
03.06.202411:09
Join and send screenshot to @TheGodEye to win Netflix account
01.06.202410:37
💀How To Make Account Checker In Python😘
Posted by @TheGodEye
Posted by @TheGodEye
30.05.202403:33
30 Tips how to use OSINT for bug hunting:
1. Use Google Dorks to find vulnerabilities in web applications.
2. Use Shodan to find vulnerable IoT devices.
3. Use Whois to find information about domain names.
4. Use Maltego to visualize relationships between entities.
5. Use the Wayback Machine to find old versions of websites.
6. Use social media to gather information about targets.
7. Use LinkedIn to gather information about employees.
8. Use GitHub to find sensitive information in code repositories.
9. Use Google Alerts to monitor for mentions of your target.
10. Use DNSDumpster to map out a target's infrastructure.
11. Use Recon-ng to automate OSINT tasks.
12. Use theHarvester to gather email addresses and other information.
13. Use SpiderFoot to automate OSINT tasks and gather intelligence.
14. Use FOCA (Fingerprinting Organizations with Collected Archives) to gather metadata from documents.
15. Use VirusTotal to scan files for malware.
16. Use Censys to find vulnerable systems on the internet.
17. Use Foca Pro to extract metadata from documents and analyze it.
18. Use FOCA Online to extract metadata from documents and analyze it in the cloud.
19. Use FOCA Free Edition for basic metadata extraction from documents.
20. Use Metagoofil to extract metadata from documents and analyze it.
21. Use Datasploit for automated OSINT tasks and data mining.
22. Use Google Hacking Database (GHDB) for advanced Google searches.
23. Use Google Custom Search Engine (CSE) for targeted searches on specific websites or domains.
24. Use Google Advanced Search for advanced searches on Google.
25. Use Google Trends to monitor trends related to your target or industry.
26. Use Google Analytics to gather information about website traffic and user behavior.
27. Use Google AdWords Keyword Planner for keyword research related to your target or industry.
28. Use Google PageSpeed Insights to analyze website performance and identify vulnerabilities.
29. Use Google Search Console (formerly Webmaster Tools) for website analytics and vulnerability identification.
30. Use Google My Business for local SEO optimization.
1. Use Google Dorks to find vulnerabilities in web applications.
2. Use Shodan to find vulnerable IoT devices.
3. Use Whois to find information about domain names.
4. Use Maltego to visualize relationships between entities.
5. Use the Wayback Machine to find old versions of websites.
6. Use social media to gather information about targets.
7. Use LinkedIn to gather information about employees.
8. Use GitHub to find sensitive information in code repositories.
9. Use Google Alerts to monitor for mentions of your target.
10. Use DNSDumpster to map out a target's infrastructure.
11. Use Recon-ng to automate OSINT tasks.
12. Use theHarvester to gather email addresses and other information.
13. Use SpiderFoot to automate OSINT tasks and gather intelligence.
14. Use FOCA (Fingerprinting Organizations with Collected Archives) to gather metadata from documents.
15. Use VirusTotal to scan files for malware.
16. Use Censys to find vulnerable systems on the internet.
17. Use Foca Pro to extract metadata from documents and analyze it.
18. Use FOCA Online to extract metadata from documents and analyze it in the cloud.
19. Use FOCA Free Edition for basic metadata extraction from documents.
20. Use Metagoofil to extract metadata from documents and analyze it.
21. Use Datasploit for automated OSINT tasks and data mining.
22. Use Google Hacking Database (GHDB) for advanced Google searches.
23. Use Google Custom Search Engine (CSE) for targeted searches on specific websites or domains.
24. Use Google Advanced Search for advanced searches on Google.
25. Use Google Trends to monitor trends related to your target or industry.
26. Use Google Analytics to gather information about website traffic and user behavior.
27. Use Google AdWords Keyword Planner for keyword research related to your target or industry.
28. Use Google PageSpeed Insights to analyze website performance and identify vulnerabilities.
29. Use Google Search Console (formerly Webmaster Tools) for website analytics and vulnerability identification.
30. Use Google My Business for local SEO optimization.
28.05.202408:10
🦋15 BEST INFOMATION GATHERING TOOLS🦋
• Network Map (nmap) - https://github.com/nmap/nmap
•Dracnmap - https://github.com/Screetsec/Dracnmap
•Xerosploit - https://github.com/LionSec/xerosploit
•RED HAWK (All In One Scanning) - https://github.com/Tuhinshubhra/RED_HAWK
•ReconSpider(For All Scaning) - https://github.com/bhavsec/reconspider
•IsItDown (Check Website Down/Up)
Infoga - Email OSINT - https://github.com/m4ll0k/Infoga
•ReconDog - https://github.com/s0md3v/ReconDog
•Striker - https://github.com/s0md3v/Striker
•SecretFinder (like API & etc) - https://github.com/m4ll0k/SecretFinder
•Find Info Using Shodan - https://github.com/m4ll0k/Shodanfy.py
•Port Scanner - rang3r - https://github.com/floriankunushevci/rang3r
•Breacher - https://github.com/s0md3v/Breacher
Posted by @TheGodEye
• Network Map (nmap) - https://github.com/nmap/nmap
•Dracnmap - https://github.com/Screetsec/Dracnmap
•Xerosploit - https://github.com/LionSec/xerosploit
•RED HAWK (All In One Scanning) - https://github.com/Tuhinshubhra/RED_HAWK
•ReconSpider(For All Scaning) - https://github.com/bhavsec/reconspider
•IsItDown (Check Website Down/Up)
Infoga - Email OSINT - https://github.com/m4ll0k/Infoga
•ReconDog - https://github.com/s0md3v/ReconDog
•Striker - https://github.com/s0md3v/Striker
•SecretFinder (like API & etc) - https://github.com/m4ll0k/SecretFinder
•Find Info Using Shodan - https://github.com/m4ll0k/Shodanfy.py
•Port Scanner - rang3r - https://github.com/floriankunushevci/rang3r
•Breacher - https://github.com/s0md3v/Breacher
Posted by @TheGodEye
Пераслаў з:
⏤͟͞𝙈𝙮𝙩𝙝𝙎𝙚𝙘

Не змаглі атрымаць доступ
да медыяконтэнту
да медыяконтэнту
25.05.202409:19
📣 PRESENTING OUR NETWORK
TheMythSec Network 📊📣
👑🗣Kɴᴏᴡʟᴇᴅɢᴇ Iꜱ Mᴇᴀɴᴛ Fʀᴇᴇ Fᴏʀ Eᴠᴇʀyᴏɴᴇ Eᴠᴇʀyᴛɪɴɢ ꜱʜᴀʀᴇD FoR EducationaL PurPosE 0nLY ..👨💻
💎 🔠🔠🔠🔠🔠🔠🔠 📌
┃➤ Reverse Engineers
┃➤ GreyGlitch
┃➤ OsintGramin
┃➤ Hackertypoh
🌟 🔠🔠🔠🔠🔠🔠🔠 📌
┃➤ EraOfHackers
┃➤ RealmOfHackers
┃➤ Coding insight(🚩🚩🚩🚩)
┃➤ CyberPustak
🆕 🅰️🔤🔤 🔤🔤🔤 📌
┃➤ BitenTech
🔪 🚩🚩🚩🚩🚩🚩 📌
┃➤ Glitch discuss
┃➤ Eraofhacker
┃➤ HackersLeech
┃➤ RealmOfHacker
┃➤ HackersChat
┃➤ OsinterChat
➡️📌 Tap here to Join all channel at a Time :- https://t.me/addlist/-du_PDmQ51c2YWY1 ✔️
💲
👑 𝙄𝙛 𝙔𝙤𝙪 𝙇𝙞𝙠𝙚 𝙈𝙮 𝙒𝙤𝙧𝙠 𝙏𝙝𝙚𝙣 𝘿𝙧𝙤𝙥 𝘼 𝙍𝙚𝙖𝙘𝙩𝙞𝙤𝙣 😘
TheMythSec Network 📊📣
👑🗣Kɴᴏᴡʟᴇᴅɢᴇ Iꜱ Mᴇᴀɴᴛ Fʀᴇᴇ Fᴏʀ Eᴠᴇʀyᴏɴᴇ Eᴠᴇʀyᴛɪɴɢ ꜱʜᴀʀᴇD FoR EducationaL PurPosE 0nLY ..👨💻
💎 🔠🔠🔠🔠🔠🔠🔠 📌
┃➤ Reverse Engineers
┃➤ GreyGlitch
┃➤ OsintGramin
┃➤ Hackertypoh
🌟 🔠🔠🔠🔠🔠🔠🔠 📌
┃➤ EraOfHackers
┃➤ RealmOfHackers
┃➤ Coding insight(🚩🚩🚩🚩)
┃➤ CyberPustak
🆕 🅰️🔤🔤 🔤🔤🔤 📌
┃➤ BitenTech
🔪 🚩🚩🚩🚩🚩🚩 📌
┃➤ Glitch discuss
┃➤ Eraofhacker
┃➤ HackersLeech
┃➤ RealmOfHacker
┃➤ HackersChat
┃➤ OsinterChat
➡️📌 Tap here to Join all channel at a Time :- https://t.me/addlist/-du_PDmQ51c2YWY1 ✔️
💲
Contact for paid promotion/advertisement:-
@Reversable 🥳👑 𝙄𝙛 𝙔𝙤𝙪 𝙇𝙞𝙠𝙚 𝙈𝙮 𝙒𝙤𝙧𝙠 𝙏𝙝𝙚𝙣 𝘿𝙧𝙤𝙥 𝘼 𝙍𝙚𝙖𝙘𝙩𝙞𝙤𝙣 😘
24.05.202403:15
🔪Hack Like a Pro Mastering Burp Suite from Scratch🔪
Password
Posted by @TheGodEye📺
Password
@TheGodEye
Posted by @TheGodEye📺
Не змаглі атрымаць доступ
да медыяконтэнту
да медыяконтэнту
03.06.202411:02
Win 2GB FREE Residential Proxies from ☄️ LightningProxies!
LightningProxies offers a variety of high-speed proxy servers, including Residential, Datacenter, ISP, IPv6, HTTP, and SOCKS5, all with exceptional IP quality. To celebrate our partnership, they are generously offering 🤧 2GB of FREE Residential Proxies to any user who joins their Discord server.
🔵 Join their Discord Server Here and Get Free 2GB Residential Proxies.
❓ To claim your Free 2GB Residential Proxies:
● Join their Discord server.
● Check the "generate-code" channel.
● Use the code on their Website Dashboard
Don’t miss out on this fantastic opportunity!
✈️Telegram: @lightningproxies
🖥Website: https://lightningproxies.net
☄️Guide: https://lightningproxies.net/how-to-use-gift
LightningProxies offers a variety of high-speed proxy servers, including Residential, Datacenter, ISP, IPv6, HTTP, and SOCKS5, all with exceptional IP quality. To celebrate our partnership, they are generously offering 🤧 2GB of FREE Residential Proxies to any user who joins their Discord server.
🔵 Join their Discord Server Here and Get Free 2GB Residential Proxies.
❓ To claim your Free 2GB Residential Proxies:
● Join their Discord server.
● Check the "generate-code" channel.
● Use the code on their Website Dashboard
Don’t miss out on this fantastic opportunity!
✈️Telegram: @lightningproxies
🖥Website: https://lightningproxies.net
☄️Guide: https://lightningproxies.net/how-to-use-gift
01.06.202404:27
🧸Penetration Testing 101 Firewall Evasion🧸
Firewall evasion allows attackers to bypass the initial barrier and potentially access sensitive information or systems within a network often by exploiting vulnerabilities or manipulating network traffic..🕷
File password
Posted by @TheGodEye🕷
Firewall evasion allows attackers to bypass the initial barrier and potentially access sensitive information or systems within a network often by exploiting vulnerabilities or manipulating network traffic..🕷
File password
@TheGodEye
Posted by @TheGodEye🕷
29.05.202418:28
👉HOW TO INSTALL AUTO-CORRECT IN TERMUX👈
Today we will install an Auto-Correct In termux and it will give you an indication whether you are typing the right command or not.
We are gonna use Fish in termux and will change the look of your shell as well as it will help you to use termux faster than the normal user.
~STEPS TO FOLLOW~
👉STEP 1: To install Auto-Correct in termux we will use fish, and to install fish - Just type the below command and fish will be installed.
"pkg install fish -y"
👉STEP 2: Now, whenever you want to autocorrect you have to type fish in your termux.
"fish"
THAT'S IT!! TRY IT AND STAY TUNED FOR MORE AMAZING TRICKS AND TECHNIQUES!!!
😎 Hope you guys liked this information consider sharing our channel with your loved ones and help us grow 📈
Today we will install an Auto-Correct In termux and it will give you an indication whether you are typing the right command or not.
We are gonna use Fish in termux and will change the look of your shell as well as it will help you to use termux faster than the normal user.
~STEPS TO FOLLOW~
👉STEP 1: To install Auto-Correct in termux we will use fish, and to install fish - Just type the below command and fish will be installed.
"pkg install fish -y"
👉STEP 2: Now, whenever you want to autocorrect you have to type fish in your termux.
"fish"
THAT'S IT!! TRY IT AND STAY TUNED FOR MORE AMAZING TRICKS AND TECHNIQUES!!!
😎 Hope you guys liked this information consider sharing our channel with your loved ones and help us grow 📈
27.05.202416:55
Search for data on vulnerabilities and indicators of compromise Search for data on vulnerabilities and indicators of compromise
🫠 Online services
😎 MITRE CVE — is a search engine, database and generally accepted classifier of vulnerabilities.
😎 NIST NVD — search the official American government vulnerability database.
😎 GitHub Advisory Database — a database of vulnerabilities that includes CVEs and security recommendations.
😎 CVEDetails, osv.dev, VulDB, maltiverse — a number of other sources of data on vulnerabilities and indicators of compromise.
😎 opencve.io — CVE search engine with built-in alerts new threats.
😎 security.snyk.io и Mend Vulnerability Database, Vulncode-DB — open source vulnerability databases.
Posted by @TheGodEye
🫠 Online services
😎 MITRE CVE — is a search engine, database and generally accepted classifier of vulnerabilities.
😎 NIST NVD — search the official American government vulnerability database.
😎 GitHub Advisory Database — a database of vulnerabilities that includes CVEs and security recommendations.
😎 CVEDetails, osv.dev, VulDB, maltiverse — a number of other sources of data on vulnerabilities and indicators of compromise.
😎 opencve.io — CVE search engine with built-in alerts new threats.
😎 security.snyk.io и Mend Vulnerability Database, Vulncode-DB — open source vulnerability databases.
Posted by @TheGodEye
25.05.202405:57
How To Create User/Profile In RDP
23.05.202410:28
LEARN C++ PROGRAMMING - BEGINNER TO ADVANCED 100% OFF | ENROLL NOW
https://www.udemy.com/course/learn-cpp-programming-beginner-to-advanced/?couponCode=9D9EDDFBAB1DE404B3D7
https://www.udemy.com/course/learn-cpp-programming-beginner-to-advanced/?couponCode=9D9EDDFBAB1DE404B3D7
Паказана 1 - 24 з 25
Увайдзіце, каб разблакаваць больш функцый.