Мир сегодня с "Юрий Подоляка"
Мир сегодня с "Юрий Подоляка"
Труха⚡️Україна
Труха⚡️Україна
Николаевский Ванёк
Николаевский Ванёк
Мир сегодня с "Юрий Подоляка"
Мир сегодня с "Юрий Подоляка"
Труха⚡️Україна
Труха⚡️Україна
Николаевский Ванёк
Николаевский Ванёк
Hacking Free | Paid Course | Hacking content avatar
Hacking Free | Paid Course | Hacking content
Hacking Free | Paid Course | Hacking content avatar
Hacking Free | Paid Course | Hacking content
05.06.202411:10
Hack Databases With Metasploit
03.06.202406:04
✔️Payment Gateway Bypass Course ✔️


PAYU BUG EXPLOIT
RAZORPAY BUG EXPLOIT
CASHFREE BUG EXPLOIT
ZAAKPAY BUG EXPLOIT
PRICE TAMPERING BY BUY NOW OPTION
PRICE TAMPERING IN CART OPTION

Posted by @TheGodEye✅️
31.05.202409:42
🔹How to set up your own VPN Server🔹

Topic covered

How to setup own vpn server.
Monitor vpn server traffic.


What are the benefits of setting up your own VPN server instead of using a commercial VPN service?


Increased control over who has access to your network and data.

Complete control over the configuration and settings of your VPN.

No third-party involvement in handling your personal data or logs.

Ability to use advanced encryption protocols to protect your traffic.

Better protection against potential data breaches or security.
vulnerabilities within commercial VPN services.


Posted by :- @TheGodEye
29.05.202406:03
⭐️Bash Scripting from Beginner to Pro⭐️

Bash scripting is an important part of process automation in Linux. Scripting helps you write a sequence of commands in a file and then execute them.
This saves you time because you don't have to write certain commands again and again. You can perform daily tasks efficiently and even schedule them for automatic execution.
You can also use it in developing unique solutions , automating processes

Posted by @TheGodEye
25.05.202404:24
The Art of Reverse Engineering with Radare 2

Password:- @TheGodEye

Radare2 is a powerful and versatile open-source reverse engineering toolkit. It can be used to analyze, disassemble and debug a wide range of executable formats including native applications, firmware, and even proprietary file formats.

Posted by @TheGodEye
04.06.202411:30
Nmap Tutorial For Beginners | How to Scan Your Network Using Nmap | Ethical Hacking Tool

Below are the list of topics along with their timestamps:

0:15 What is Nmap?
1:09 Installation
1:50 IP Scans
3:38 Scanning Multiple Hosts
6:30 Scanning from input file
8:02 Port Scanning
10:00 Agressive Scanning
11:20 Version Detection
11:51 OS Detection
12:33 Packet Route Discovery
13:35 Writing Results to a LOG File
14:49 Verbose Scans
30.05.202413:44
😈 how to Up A Free RDP Service In Linux💃
28.05.202411:35
🐋Awesome Hackers Search Engines🐋

Online tools for search info about:
- exploit
- vulnerabilities
- people
- emails
- phone numbers
- domains
- certificates

and more.

https://github.com/edoardottt/awesome-hacker-search-engines
26.05.202404:17
Python Ethical Hacking
24.05.202411:22
🚬 Awesome security hardening.🚬

• A large collection of different materials on the topic of increasing security. From detailed guidelines to basic tools and metrics:🩸

Security Hardening Guides and Best Practices;
Hardening Guide Collections;
GNU/Linux;
- Red Hat Enterprise Linux - RHEL;
- CentOS;
- SUSE;
- Ubuntu;
Windows;
macOS;
Network Devices;
- Switches;
- Routers;
- IPv6;
- Firewalls;
— Virtualization - VMware;
— Containers - Docker - Kubernetes;
— Services;
- SSH;
- TLS/SSL;
- Web Servers;
- Mail Servers;
- FTP Servers;
- Database Servers;
- Active Directory;
- ADFS;
- Kerberos;
- LDAP;
- DNS;
- NTP;
- NFS;
- CUPS;
— Authentication - Passwords;
— Hardware - CPU - BIOS - UEFI;
— Cloud;
• Tools;
— Tools to check security hardening;
- GNU/Linux;
- Windows;
- Network Devices;
- TLS/SSL;
- SSH;
- Hardware - CPU - BIOS - UEFI;
- Docker;
- Cloud;
— Tools to apply security hardening;
- GNU/Linux;
- Windows;
- TLS/SSL;
- Cloud;
— Password Generators;
• Books;
• Other Awesome Lists;
— Other Awesome Security Lists.

Posted by
@TheGodEye
03.06.202411:09
Join and send screenshot to @TheGodEye to win Netflix account
01.06.202410:37
💀How To Make Account Checker In Python😘

Posted by @TheGodEye
30.05.202403:33
30 Tips how to use OSINT for bug hunting:

1. Use Google Dorks to find vulnerabilities in web applications.
2. Use Shodan to find vulnerable IoT devices.
3. Use Whois to find information about domain names.
4. Use Maltego to visualize relationships between entities.
5. Use the Wayback Machine to find old versions of websites.
6. Use social media to gather information about targets.
7. Use LinkedIn to gather information about employees.
8. Use GitHub to find sensitive information in code repositories.
9. Use Google Alerts to monitor for mentions of your target.
10. Use DNSDumpster to map out a target's infrastructure.
11. Use Recon-ng to automate OSINT tasks.
12. Use theHarvester to gather email addresses and other information.
13. Use SpiderFoot to automate OSINT tasks and gather intelligence.
14. Use FOCA (Fingerprinting Organizations with Collected Archives) to gather metadata from documents.
15. Use VirusTotal to scan files for malware.
16. Use Censys to find vulnerable systems on the internet.
17. Use Foca Pro to extract metadata from documents and analyze it.
18. Use FOCA Online to extract metadata from documents and analyze it in the cloud.
19. Use FOCA Free Edition for basic metadata extraction from documents.
20. Use Metagoofil to extract metadata from documents and analyze it.
21. Use Datasploit for automated OSINT tasks and data mining.
22. Use Google Hacking Database (GHDB) for advanced Google searches.
23. Use Google Custom Search Engine (CSE) for targeted searches on specific websites or domains.
24. Use Google Advanced Search for advanced searches on Google.
25. Use Google Trends to monitor trends related to your target or industry.
26. Use Google Analytics to gather information about website traffic and user behavior.
27. Use Google AdWords Keyword Planner for keyword research related to your target or industry.
28. Use Google PageSpeed Insights to analyze website performance and identify vulnerabilities.
29. Use Google Search Console (formerly Webmaster Tools) for website analytics and vulnerability identification.
30. Use Google My Business for local SEO optimization.
28.05.202408:10
🦋15 BEST INFOMATION GATHERING TOOLS🦋

• Network Map (nmap) - https://github.com/nmap/nmap

•Dracnmap - https://github.com/Screetsec/Dracnmap

•Xerosploit - https://github.com/LionSec/xerosploit

•RED HAWK (All In One Scanning) - https://github.com/Tuhinshubhra/RED_HAWK

•ReconSpider(For All Scaning) - https://github.com/bhavsec/reconspider

•IsItDown (Check Website Down/Up)
Infoga - Email OSINT - https://github.com/m4ll0k/Infoga

•ReconDog - https://github.com/s0md3v/ReconDog

•Striker - https://github.com/s0md3v/Striker

•SecretFinder (like API & etc) - https://github.com/m4ll0k/SecretFinder

•Find Info Using Shodan - https://github.com/m4ll0k/Shodanfy.py

•Port Scanner - rang3r - https://github.com/floriankunushevci/rang3r

•Breacher - https://github.com/s0md3v/Breacher

Posted by @TheGodEye
📣 PRESENTING OUR NETWORK
          TheMythSec Network 📊📣

👑🗣Kɴᴏᴡʟᴇᴅɢᴇ Iꜱ Mᴇᴀɴᴛ Fʀᴇᴇ Fᴏʀ Eᴠᴇʀyᴏɴᴇ Eᴠᴇʀyᴛɪɴɢ ꜱʜᴀʀᴇD FoR EducationaL PurPosE 0nLY ..👨‍💻

💎 🔠🔠🔠🔠🔠🔠🔠 📌
        ┃➤ Reverse Engineers
        ┃➤ GreyGlitch
        ┃➤ OsintGramin
┃➤ Hackertypoh

🌟 🔠🔠🔠🔠🔠🔠🔠 📌
        ┃➤ EraOfHackers
        ┃➤ RealmOfHackers
        ┃➤ Coding insight(🚩🚩🚩🚩)
┃➤ CyberPustak

🆕 🅰️🔤🔤 🔤🔤🔤 📌
        ┃➤ BitenTech

🔪 🚩🚩🚩🚩🚩🚩 📌
        ┃➤ Glitch discuss
        ┃➤ Eraofhacker
┃➤ HackersLeech
┃➤ RealmOfHacker
┃➤ HackersChat
┃➤ OsinterChat

➡️📌 Tap here to Join all channel at a Time :- https://t.me/addlist/-du_PDmQ51c2YWY1 ✔️

💲 Contact for paid promotion/advertisement:- @Reversable 🥳

👑 𝙄𝙛 𝙔𝙤𝙪 𝙇𝙞𝙠𝙚 𝙈𝙮 𝙒𝙤𝙧𝙠 𝙏𝙝𝙚𝙣 𝘿𝙧𝙤𝙥 𝘼 𝙍𝙚𝙖𝙘𝙩𝙞𝙤𝙣 😘
24.05.202403:15
🔪Hack Like a Pro Mastering Burp Suite from Scratch🔪

Password @TheGodEye

Posted by @TheGodEye📺
Win 2GB FREE Residential Proxies from ☄️ LightningProxies!

LightningProxies offers a variety of high-speed proxy servers, including Residential, Datacenter, ISP, IPv6, HTTP, and SOCKS5, all with exceptional IP quality. To celebrate our partnership, they are generously offering 🤧 2GB of FREE Residential Proxies to any user who joins their Discord server.

🔵 Join their Discord Server Here and Get Free 2GB Residential Proxies.

To claim your Free 2GB Residential Proxies:

● Join their Discord server.
● Check the "generate-code" channel.
● Use the code on their Website Dashboard

Don’t miss out on this fantastic opportunity!

✈️Telegram: @lightningproxies
🖥Website: https://lightningproxies.net
☄️Guide: https://lightningproxies.net/how-to-use-gift
01.06.202404:27
🧸Penetration Testing 101 Firewall Evasion🧸

Firewall evasion allows attackers to bypass the initial barrier and potentially access sensitive information or systems within a network often by exploiting vulnerabilities or manipulating network traffic..🕷
File password @TheGodEye

Posted by @TheGodEye🕷
29.05.202418:28
👉HOW TO INSTALL AUTO-CORRECT IN TERMUX👈

Today we will install an Auto-Correct In termux and it will give you an indication whether you are typing the right command or not.

We are gonna use Fish in termux and will change the look of your shell as well as it will help you to use termux faster than the normal user.

~STEPS TO FOLLOW~

👉STEP 1: To install Auto-Correct in termux we will use fish, and to install fish - Just type the below command and fish will be installed.

"pkg install fish -y"

👉STEP 2: Now, whenever you want to autocorrect you have to type fish in your termux.

"fish"

THAT'S IT!! TRY IT AND STAY TUNED FOR MORE AMAZING TRICKS AND TECHNIQUES!!!

😎 Hope you guys liked this information consider sharing our channel with your loved ones and help us grow 📈
27.05.202416:55
Search for data on vulnerabilities and indicators of compromise Search for data on vulnerabilities and indicators of compromise

🫠 Online services

😎 MITRE CVE — is a search engine, database and generally accepted classifier of vulnerabilities.

😎 NIST NVD — search the official American government vulnerability database.

😎 GitHub Advisory Database — a database of vulnerabilities that includes CVEs and security recommendations.

😎 CVEDetails, osv.dev, VulDB, maltiverse — a number of other sources of data on vulnerabilities and indicators of compromise.

😎 opencve.io CVE search engine with built-in alerts new threats.

😎 security.snyk.io и Mend Vulnerability Database, Vulncode-DB — open source vulnerability databases.

Posted by @TheGodEye
25.05.202405:57
How To Create User/Profile In RDP
23.05.202410:28
Паказана 1 - 24 з 25
Увайдзіце, каб разблакаваць больш функцый.