Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
How to analyze and Decrypt hash values? | Hashing tutorial in cyber security | Educational Purposes
video link : https://youtu.be/LBStRFbiXOI
like share subscribe support our channel
credits : @cybertrickzone
video link : https://youtu.be/LBStRFbiXOI
like share subscribe support our channel
credits : @cybertrickzone
YouTube
How to analyze and Decrypt hash values? | Hashing tutorial in cyber security | Educational Purposes
How to analyze and Decrypt hash values? | Hashing tutorial in cyber security | Educational Purposes??
In this video i m going to teach how to decrypt a hash values online with using pc or smartphone. If you have any suggestions query regarding to this video.โฆ
In this video i m going to teach how to decrypt a hash values online with using pc or smartphone. If you have any suggestions query regarding to this video.โฆ
Forwarded from OSINT AMBITION (Dheeraj Yadav)
New Blog in OSINT Ambition Publication
How to find unprotected databases with Netlas.io?
https://publication.osintambition.org/how-to-find-unprotected-databases-with-netlas-io-2bf186e9fc2d
Join @osintambition for more.
#osint #cybersec #infosec #cybersecurity #database #dorking #pentest #bugbounty #penetrationtesting
How to find unprotected databases with Netlas.io?
https://publication.osintambition.org/how-to-find-unprotected-databases-with-netlas-io-2bf186e9fc2d
Join @osintambition for more.
#osint #cybersec #infosec #cybersecurity #database #dorking #pentest #bugbounty #penetrationtesting
Medium
How to find unprotected databases with Netlas.io?
Databases accessible from the Internet are an attractive target for attackers. How to make sure you are invulnerable?
Forwarded from Cybertix
๐๐ฒ๐ฎ๐ฟ๐ป๐๐๐ฟ๐ฝ๐๐๐ถ๐๐ฒ ๐๐ฎ๐บ๐ฑ๐ฎ ๐ฅ๐
๐๐ถ๐ป๐ธ: https://youtu.be/-EPQwO7xunQ?si=A3TDQHt34rJCq9FJ
Make sure your Like & Subscribe to our YouTube Channelโบ๏ธโจ
๐๐ถ๐ป๐ธ: https://youtu.be/-EPQwO7xunQ?si=A3TDQHt34rJCq9FJ
Make sure your Like & Subscribe to our YouTube Channelโบ๏ธโจ
YouTube
04 Understanding Burpsuite Bamda ๐คฏ๐ฅ #cybersecurity #bounty #money #freelancing #technology #hacker
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: : https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ:โฆ
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: : https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ:โฆ
https://www.linkedin.com/posts/shashankmaurya_nasa-bugbounty-halloffame-activity-7150151229027868677-R6RX?utm_source=share&utm_medium=member_android
Show Love & Support Brother's On LinkedIn โค๏ธ
Show Love & Support Brother's On LinkedIn โค๏ธ
Linkedin
Shashank Maurya on LinkedIn: #nasa #bugbounty #halloffame #linkedinlearning #bounty #cybersecurityโฆ
Hall Of Fame in NASA
NASA - National Aeronautics and Space Administration , Bugcrowd LinkedIn CyberDost
#nasa #bugbounty #halloffame #linkedinlearningโฆ
NASA - National Aeronautics and Space Administration , Bugcrowd LinkedIn CyberDost
#nasa #bugbounty #halloffame #linkedinlearningโฆ
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
๐๐๐๐๐ ๐๐๐๐๐๐๐๐ ๐๐๐๐ ๐๐๐๐๐๐ ๐๐๐๐๐
๐ฏ 1. Zeek: https://zeek.org/ Network Security Monitoring
๐ฏ 2. ClamAV: https://www.clamav.net/ Antivirus
๐ฏ 3. OpenVAS: https://www.openvas.org/ Vulnerability Scanner
๐ฏ 4. TheHive: https://lnkd.in/e7aVCRUZ Incident Response
๐ฏ 5. PFSense: https://www.pfsense.org/ Security appliance (firewall/VPN/router)
๐ฏ 6. Elastic: https://www.elastic.co/de/ Analytics
๐ฏ 7. Osquery: https://www.osquery.io/ Endpoint visibility
๐ฏ 8. Arkime: https://arkime.com/ Packet capture and search
๐ฏ 9. Wazuh: https://wazuh.com/ XDR and SIEM
๐ฏ 10. Alien Vault Ossim: https://lnkd.in/eShQt29h SIEM
๐ฏ 11. Velociraptor: https://lnkd.in/eYehEaNa Forensic and IR
๐ฏ 12. MISP project: https://lnkd.in/emaSrT57 Information sharing and Threat Intelligence
๐ฏ 13. Kali: https://www.kali.org/ Security OS
๐ฏ 14. Parrot: https://www.parrotsec.org/ Security OS
๐ฏ 15. OpenIAM: https://www.openiam.com/ IAM
๐ฏ 16. Yara: https://lnkd.in/eEJegEak Patterns
๐ฏ 17. Wireguard: https://www.wireguard.com/ VPN
๐ฏ 18. OSSEC: https://www.ossec.net/ HIDS
๐ฏ 19. Suricata: https://suricata.io/ IDS/IPS
๐ฏ 20. Shuffler: https://shuffler.io/ SOAR
๐ฏ 21. Phish Report: https://phish.report/ Anti Phishing
๐ฏ 22. Graylog: https://lnkd.in/eAFuUmuw Logmanagement
๐ฏ 23. Trivy: https://lnkd.in/e7JxXStY DevOps/IaC Scanning
๐ฏ 24. OpenEDR: https://openedr.com/ EDR
๐ฏ 25. Metasploit: https://lnkd.in/e4ECX-py Pentest
๐ฏ 26. NMAP: https://nmap.org/ Old but gold
Credits: Seyed Arshia Ahmadi
#cybersecurity #cybersecuritytools #opensource
๐ฏ 1. Zeek: https://zeek.org/ Network Security Monitoring
๐ฏ 2. ClamAV: https://www.clamav.net/ Antivirus
๐ฏ 3. OpenVAS: https://www.openvas.org/ Vulnerability Scanner
๐ฏ 4. TheHive: https://lnkd.in/e7aVCRUZ Incident Response
๐ฏ 5. PFSense: https://www.pfsense.org/ Security appliance (firewall/VPN/router)
๐ฏ 6. Elastic: https://www.elastic.co/de/ Analytics
๐ฏ 7. Osquery: https://www.osquery.io/ Endpoint visibility
๐ฏ 8. Arkime: https://arkime.com/ Packet capture and search
๐ฏ 9. Wazuh: https://wazuh.com/ XDR and SIEM
๐ฏ 10. Alien Vault Ossim: https://lnkd.in/eShQt29h SIEM
๐ฏ 11. Velociraptor: https://lnkd.in/eYehEaNa Forensic and IR
๐ฏ 12. MISP project: https://lnkd.in/emaSrT57 Information sharing and Threat Intelligence
๐ฏ 13. Kali: https://www.kali.org/ Security OS
๐ฏ 14. Parrot: https://www.parrotsec.org/ Security OS
๐ฏ 15. OpenIAM: https://www.openiam.com/ IAM
๐ฏ 16. Yara: https://lnkd.in/eEJegEak Patterns
๐ฏ 17. Wireguard: https://www.wireguard.com/ VPN
๐ฏ 18. OSSEC: https://www.ossec.net/ HIDS
๐ฏ 19. Suricata: https://suricata.io/ IDS/IPS
๐ฏ 20. Shuffler: https://shuffler.io/ SOAR
๐ฏ 21. Phish Report: https://phish.report/ Anti Phishing
๐ฏ 22. Graylog: https://lnkd.in/eAFuUmuw Logmanagement
๐ฏ 23. Trivy: https://lnkd.in/e7JxXStY DevOps/IaC Scanning
๐ฏ 24. OpenEDR: https://openedr.com/ EDR
๐ฏ 25. Metasploit: https://lnkd.in/e4ECX-py Pentest
๐ฏ 26. NMAP: https://nmap.org/ Old but gold
Credits: Seyed Arshia Ahmadi
#cybersecurity #cybersecuritytools #opensource
Zeek
The Zeek Network Security Monitor
Zeek (formerly Bro) is the worldโs leading platform for network security monitoring. Flexible, open source, and powered by defenders.
Forwarded from Cybertix
๐๐๐ ๐๐ค๐จ๐ฉ ๐ผ๐๐ซ. ๐ฟ๐ค๐ข๐๐๐ฃ ๐๐ฃ๐ช๐ข๐๐ง๐๐ฉ๐๐ค๐ฃ ๐๐ค๐ค๐ก ๐ฑ๐ฅ
๐๐ค๐ค๐ก ๐๐ฎ: Sanjai Kumar
๐ง๐ผ๐ฝ๐ถ๐ฐ ๐๐ผ๐๐ฒ๐ฟ๐ฒ๐ฑ:
๐ญ.Efficiency Test with other Tools. โก
๐ฎ.Configuring with API Keys๐
๐ฏ. Notifying the Domain Enumeration ๐
๐๐๐ฉ๐๐ ๐๐ค๐ฌ, ๐ฉ๐ค ๐๐๐ฉ ๐ข๐ค๐ง๐ ๐๐๐ง๐๐๐ฉ๐จ๐ค๐๐ป
๐๐๐ฃ๐ : https://youtu.be/lWPukbNMl70?si=k6_j6byPCrZDG8Zc
๐ฃ๐น๐ฒ๐ฎ๐๐ฒ ๐๐ถ๐ธ๐ฒ & ๐ฆ๐๐ฏ๐๐ฐ๐ฟ๐ถ๐ฏ๐ฒ ๐๐ผ ๐ผ๐๐ฟ ๐ฌ๐ผ๐๐ง๐๐ฏ๐ฒ ๐ฐ๐ต๐ฎ๐ป๐ป๐ฒ๐นโบ๏ธ
๐๐ค๐ค๐ก ๐๐ฎ: Sanjai Kumar
๐ง๐ผ๐ฝ๐ถ๐ฐ ๐๐ผ๐๐ฒ๐ฟ๐ฒ๐ฑ:
๐ญ.Efficiency Test with other Tools. โก
๐ฎ.Configuring with API Keys๐
๐ฏ. Notifying the Domain Enumeration ๐
๐๐๐ฉ๐๐ ๐๐ค๐ฌ, ๐ฉ๐ค ๐๐๐ฉ ๐ข๐ค๐ง๐ ๐๐๐ง๐๐๐ฉ๐จ๐ค๐๐ป
๐๐๐ฃ๐ : https://youtu.be/lWPukbNMl70?si=k6_j6byPCrZDG8Zc
๐ฃ๐น๐ฒ๐ฎ๐๐ฒ ๐๐ถ๐ธ๐ฒ & ๐ฆ๐๐ฏ๐๐ฐ๐ฟ๐ถ๐ฏ๐ฒ ๐๐ผ ๐ผ๐๐ฟ ๐ฌ๐ผ๐๐ง๐๐ฏ๐ฒ ๐ฐ๐ต๐ฎ๐ป๐ป๐ฒ๐นโบ๏ธ
YouTube
The Most Advance Domain Enumeration ๐ฑ#bugbounty #bugbountytips #cybersecurity #automation #hacking
๐๐๐๐๐
๐ค๐๐๐๐๐๐ค๐:
https://github.com/sanjai-AK47/Subdominator
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/โฆ
https://github.com/sanjai-AK47/Subdominator
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/โฆ
Forwarded from Cybertix
๐๐บ๐ฝ๐ฟ๐ผ๐ฝ๐ฒ๐ฟ ๐๐ฐ๐ฐ๐ฒ๐๐ ๐๐ผ๐ป๐๐ฟ๐ผ๐น ๐ถ๐ป ๐๐ถ๐๐น๐ฎ๐ฏ ๐
๐๐ผ๐๐ป๐๐: ๐ฏ๐ฌ๐ฌ๐ฌ$
๐ฉ๐ถ๐ฑ๐ฒ๐ผ ๐ฃ๐ผ๐: https://youtu.be/PRwUK00Uhsk?si=ifCw2dnJhBD3QgOr
๐๐ผ๐๐ป๐๐: ๐ฏ๐ฌ๐ฌ๐ฌ$
๐ฉ๐ถ๐ฑ๐ฒ๐ผ ๐ฃ๐ผ๐: https://youtu.be/PRwUK00Uhsk?si=ifCw2dnJhBD3QgOr
YouTube
Improper Access Control in Gitlab | Got Bounty of $ 3,000 ๐ฑ#bugbounty #bugbountytips #cybersecurity
๐๐๐๐๐๐๐๐ค๐๐ ๐๐๐ฅ๐๐ง๐:
https://hackerone.com/reports/819821
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง:โฆ
https://hackerone.com/reports/819821
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง:โฆ
Forwarded from Cybertix
๐๐
๐ฝ๐น๐ผ๐ถ๐๐ถ๐ป๐ด ๐จ๐ป๐ธ๐ป๐ผ๐๐ป ๐๐ฉ๐'๐
Tool Link given in Description
Please Like & Subscribe to our YouTube Channel.
๐๐ถ๐ป๐ธ: https://youtu.be/Z-OBQWbqIoM?si=eph9sSISKRGy2XGk
Tool Link given in Description
Please Like & Subscribe to our YouTube Channel.
๐๐ถ๐ป๐ธ: https://youtu.be/Z-OBQWbqIoM?si=eph9sSISKRGy2XGk
YouTube
Exploiting Unknown CVE's with PoC Bomber๐ฒ#bugbounty #bugbountytips #cybersecurity #bollywood #hacker
๐๐๐๐พ ๐ฉ๐ค๐๐๐๐ง ๐๐๐ค๐:
https://github.com/tr0uble-mAker/POC-bomber
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/โฆ
https://github.com/tr0uble-mAker/POC-bomber
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/โฆ
Forwarded from Cybertix
๐๐๐๐ผ๐บ๐ฎ๐๐ถ๐ป๐ด ๐ซ๐ฆ๐ฆ ๐๐ต๐ฟ๐ผ๐๐ด๐ต ๐ข๐ป๐ฒ ๐๐ถ๐ป๐ฒ๐ฟ ๐ฆ๐ฐ๐ฟ๐ถ๐ฝ๐ - ๐๐๐ฏ๐ฒ๐ฟ๐ซ๐ฆ
๐โจ
๐๐ถ๐ป๐ธ: https://youtu.be/p4V-4N1oSaA?si=tSBhZ3ijzChRd0wP
๐๐ถ๐ธ๐ฒ & ๐ฆ๐๐ฏ๐๐ฐ๐ฟ๐ถ๐ฏ๐ฒ ๐๐ผ ๐ผ๐๐ฟ ๐ฌ๐ผ๐๐ง๐๐ฏ๐ฒ ๐ฐ๐ต๐ฎ๐ป๐ป๐ฒ๐น๐
๐โจ
๐๐ถ๐ป๐ธ: https://youtu.be/p4V-4N1oSaA?si=tSBhZ3ijzChRd0wP
๐๐ถ๐ธ๐ฒ & ๐ฆ๐๐ฏ๐๐ฐ๐ฟ๐ถ๐ฏ๐ฒ ๐๐ผ ๐ผ๐๐ฟ ๐ฌ๐ผ๐๐ง๐๐ฏ๐ฒ ๐ฐ๐ต๐ฎ๐ป๐ป๐ฒ๐น๐
YouTube
XSS Automation ๐ #bugbounty #bugbountytips #cybersecurity #ai #technology #india #bug #hacker #short
๐๐ช๐ฎ๐๐๐๐๐บ ๐ฎ๐๐๐๐๐ ๐๐๐ฃ๐:
https://github.com/thecybertix/CyberXS
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/โฆ
https://github.com/thecybertix/CyberXS
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/โฆ
Forwarded from Cybertix
๐๐ซ๐๐ง๐ซ๐๐๐ฌ ๐ค๐ ๐๐๐ ๐๐๐ ๐ผ๐ฉ๐ฉ๐๐๐ ๐๐ป๐ค
๐๐๐ฃ๐ : https://youtube.com/shorts/niLSFLVXGlo?si=_2CrgNiW1ebd24Z1
๐๐๐ฃ๐ : https://youtube.com/shorts/niLSFLVXGlo?si=_2CrgNiW1ebd24Z1
YouTube
Web LLM Attack ๐ #bugbounty #bugbountytips #cybersecurity #ai #technology #india #bug #hacker #short
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ : ๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H๐ด๐๐๐ก๐๐๐๐๐https://t.me/thecybertix๐ด ...
Forwarded from Cybertix
๐ฃ๐ฎ๐๐ต ๐ง๐ฟ๐ฎ๐๐ฒ๐ฟ๐๐ฎ๐น ๐ฉ๐๐น๐ป๐ฒ๐ฟ๐ฎ๐ฏ๐ถ๐น๐ถ๐๐ ๐ฆ๐๐บ๐บ๐ฎ๐ฟ๐๐๐ป๐๐๐ป
๐๐ถ๐ป๐ธ : https://youtube.com/shorts/_z844fd8F2Q?si=IdzlxiPcxSGQkhAo
๐๐ถ๐ป๐ธ : https://youtube.com/shorts/_z844fd8F2Q?si=IdzlxiPcxSGQkhAo
YouTube
Path Traversal ๐ #bugbounty #bugbountytips #cybersecurity #ai #technology #india #bug #hacker #short
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ : ๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H๐ด๐๐๐ก๐๐๐๐๐https://t.me/thecybertix๐ด ...
Forwarded from Cybertix
๐๐ป๐๐ฐ๐ฐ๐ฒ๐๐ ๐๐ผ๐ป๐๐ฟ๐ผ๐น ๐๐๐๐๐ฒ ๐๐ป
๐๐ถ๐ป๐ธ: https://youtube.com/shorts/KWVxhMhNZ_I?si=z2JR_pXqXkK1-CqM
๐๐ถ๐ป๐ธ: https://youtube.com/shorts/KWVxhMhNZ_I?si=z2JR_pXqXkK1-CqM
YouTube
Access Control Issue #bugbounty #bugbountytips #cybersecurity #technology #india #bug #hacker #short
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ : ๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H๐ด๐๐๐ก๐๐๐๐๐https://t.me/thecybertix๐ด ...
Forwarded from Cybertix
๐ฆ๐๐ผ๐ฟ๐ฒ๐ฑ ๐ซ๐ฆ๐ฆ ๐ถ๐ป ๐ฆ๐๐ฎ๐ฟ๐ฏ๐๐ฐ๐ธ๐๐คฉ
In this Video, the researcher has show how to find and Exploit it from Basic instead of giving XSS Prompt๐คโจ
๐๐ผ๐๐ป๐๐: ๐ฑ๐ฌ๐ฌ$
๐๐ต๐ฒ๐ฐ๐ธ ๐๐ฎ๐ฐ๐ธ๐ฒ๐ฟ๐ผ๐ป๐ฒ ๐ฅ๐ฒ๐ฝ๐ผ๐ฟ๐ ๐ถ๐ป ๐ฑ๐ฒ๐๐ฐ๐ฟ๐ถ๐ฝ๐๐ถ๐ผ๐ป
๐๐ถ๐ป๐ธ: https://youtu.be/6p9kjfEIcbI?si=78TANUBV60BVwRdA
๐๐ก๐๐๐จ๐ ๐ก๐๐ ๐ & ๐๐ช๐๐จ๐๐ง๐๐๐ ๐ฉ๐ค ๐ค๐ช๐ง ๐๐ค๐ช๐๐ช๐๐ ๐๐๐๐ฃ๐ฃ๐๐ก๐๐ป๐
In this Video, the researcher has show how to find and Exploit it from Basic instead of giving XSS Prompt๐คโจ
๐๐ผ๐๐ป๐๐: ๐ฑ๐ฌ๐ฌ$
๐๐ต๐ฒ๐ฐ๐ธ ๐๐ฎ๐ฐ๐ธ๐ฒ๐ฟ๐ผ๐ป๐ฒ ๐ฅ๐ฒ๐ฝ๐ผ๐ฟ๐ ๐ถ๐ป ๐ฑ๐ฒ๐๐ฐ๐ฟ๐ถ๐ฝ๐๐ถ๐ผ๐ป
๐๐ถ๐ป๐ธ: https://youtu.be/6p9kjfEIcbI?si=78TANUBV60BVwRdA
๐๐ก๐๐๐จ๐ ๐ก๐๐ ๐ & ๐๐ช๐๐จ๐๐ง๐๐๐ ๐ฉ๐ค ๐ค๐ช๐ง ๐๐ค๐ช๐๐ช๐๐ ๐๐๐๐ฃ๐ฃ๐๐ก๐๐ป๐
YouTube
Stored XSS on Starbucks | Got Bounty of $500 ๐ฑ #bugbounty #cybersecurity #india #technology #hacker
๐๐๐๐๐๐๐๐ค๐๐ ๐ง๐๐ฅ๐๐ง๐:https://hackerone.com/reports/507957๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ : ๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel...
Forwarded from Jeetendra Joshi
## Test For SQL Injection
[ ] Test SQL Injection on authentication forms
[ ] Test SQL Injection on the search bar
[ ] Test SQL Injection on editable characteristics
[ ] Try to find SQL keywords or entry point detections
[ ] Try to inject SQL queries
[ ] Use tools like SQLmap or Hackbar
[ ] Use Google dorks to find the SQL keywords
[ ] Try GET based SQL Injection
[ ] Try POST based SQL Injection
[ ] Try COOKIE based SQL Injection
[ ] Try HEADER based SQL Injection
[ ] Try SQL Injection with null bytes before the SQL query
[ ] Try SQL Injection with URL encoding
[ ] Try SQL Injection with both lower and upper cases
[ ] Try SQL Injection with SQL Tamper scripts
[ ] Try SQL Injection with SQL Time delay payloads
[ ] Try SQL Injection with SQL Conditional delays
[ ] Try SQL Injection with Boolean based SQL
[ ] Try SQL Injection with Time based SQL
Follow on Twitter(X) : twitter.com/SH3lLH4CK3R
Join Telegram : t.me/Sh3llh4ck3r_Seโฆ
Subscribe YouTube : youtube.com/@newbiehackers
Follow on Instagram : instagram.com/sh3llh4ck3r
#bugbounty #ethicalhacking #hackforgood #infosec #cybersec #cybersecurity #informationsecurity
#smartcontract #blockchain #hacking #Web3Community #web3security #bugbounty #bugbountytips #sqlinjection
#Ethereum #howtohack #hackerone #immunefy #opensource #bugcrowd #solidity #programming
[ ] Test SQL Injection on authentication forms
[ ] Test SQL Injection on the search bar
[ ] Test SQL Injection on editable characteristics
[ ] Try to find SQL keywords or entry point detections
[ ] Try to inject SQL queries
[ ] Use tools like SQLmap or Hackbar
[ ] Use Google dorks to find the SQL keywords
[ ] Try GET based SQL Injection
[ ] Try POST based SQL Injection
[ ] Try COOKIE based SQL Injection
[ ] Try HEADER based SQL Injection
[ ] Try SQL Injection with null bytes before the SQL query
[ ] Try SQL Injection with URL encoding
[ ] Try SQL Injection with both lower and upper cases
[ ] Try SQL Injection with SQL Tamper scripts
[ ] Try SQL Injection with SQL Time delay payloads
[ ] Try SQL Injection with SQL Conditional delays
[ ] Try SQL Injection with Boolean based SQL
[ ] Try SQL Injection with Time based SQL
Follow on Twitter(X) : twitter.com/SH3lLH4CK3R
Join Telegram : t.me/Sh3llh4ck3r_Seโฆ
Subscribe YouTube : youtube.com/@newbiehackers
Follow on Instagram : instagram.com/sh3llh4ck3r
#bugbounty #ethicalhacking #hackforgood #infosec #cybersec #cybersecurity #informationsecurity
#smartcontract #blockchain #hacking #Web3Community #web3security #bugbounty #bugbountytips #sqlinjection
#Ethereum #howtohack #hackerone #immunefy #opensource #bugcrowd #solidity #programming
X (formerly Twitter)
Jeetendra Joshi ๐ฎ๐ณ (@SH3lLH4CK3R) on X
๐๐Bug Hunter | Smart Contract Security | CTF Player | Exploit Developer | Python Developer | Web Application Security | Solidity Developer |
Forwarded from Cybertix
๐๐๐๐ผ๐บ๐ฎ๐๐ถ๐ป๐ด ๐๐น๐ถ๐ป๐ฑ ๐ซ๐ฆ๐ฆ ๐ผ๐ป ๐๐ฒ๐ฎ๐ฑ๐ฒ๐ฟ ๐ฏ๐ฎ๐๐ฒ๐ฑ ๐๐ฅ
๐๐ถ๐ป๐ธ: https://youtu.be/KgEwfY3ZENE?si=TXMCAD1cBs7Ghwtk
๐ฃ๐น๐ฒ๐ฎ๐๐ฒ ๐ฑ๐ผ ๐น๐ถ๐ธ๐ฒ & ๐ฆ๐๐ฏ๐๐ฐ๐ฟ๐ถ๐ฏ๐ฒ ๐๐ผ ๐ผ๐๐ฟ ๐ฌ๐ผ๐๐ง๐๐ฏ๐ฒ ๐ฐ๐ต๐ฎ๐ป๐ป๐ฒ๐น๐๐ป
๐๐ถ๐ป๐ธ: https://youtu.be/KgEwfY3ZENE?si=TXMCAD1cBs7Ghwtk
๐ฃ๐น๐ฒ๐ฎ๐๐ฒ ๐ฑ๐ผ ๐น๐ถ๐ธ๐ฒ & ๐ฆ๐๐ฏ๐๐ฐ๐ฟ๐ถ๐ฏ๐ฒ ๐๐ผ ๐ผ๐๐ฟ ๐ฌ๐ผ๐๐ง๐๐ฏ๐ฒ ๐ฐ๐ต๐ฎ๐ป๐ป๐ฒ๐น๐๐ป
YouTube
Automating Blind XSS ๐ #bugbounty #bugbountytips #cybersecurity #ai #technology #india #bug #hacker
๐๐
๐๐๐ ๐ป๐ง๐๐๐๐๐๐๐:https://tryhackme.com/signup?referrer=60fe467cd3ab6f004ac8b758๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ : ๐ด๐๐๐๐๐จ๐๐ฅ๐: https:...
Forwarded from Cybertix
๐๐ผ๐บ๐บ๐ฎ๐ป๐ฑ ๐๐ป๐ท๐ฒ๐ฐ๐๐ถ๐ผ๐ป ๐ฆ๐๐บ๐บ๐ฎ๐ฟ๐ โจ๐ฅ
๐๐ถ๐ป๐ธ: https://youtube.com/shorts/LXW_V7oaZxk?si=j6DqeEexYNHOgmCB
๐๐ถ๐ป๐ธ: https://youtube.com/shorts/LXW_V7oaZxk?si=j6DqeEexYNHOgmCB
YouTube
Command Injection ๐ #bugbounty #bugbountytips #cybersecurity #ai #technology #india #bug #hacker #1k
๐๐
๐๐๐ ๐ป๐ง๐๐๐๐๐๐๐:https://tryhackme.com/signup?referrer=60fe467cd3ab6f004ac8b758๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ : ๐ด๐๐๐๐๐จ๐๐ฅ๐: https:...
Forwarded from OSINT AMBITION (Cyber Crime And OSINT researcher.)
https://www.linkedin.com/posts/swayamsopnic_osint-cti-cybersecurity-activity-7194210129200742400-HVkU?utm_source=combined_share_message&utm_medium=member_desktop
Here is the list of Some prominent Free certifications about OSINT and Cyber Threat Intelligence. So please Like, Share and utilize the resources.
Here is the list of Some prominent Free certifications about OSINT and Cyber Threat Intelligence. So please Like, Share and utilize the resources.
Linkedin
Swayam Sopnic on LinkedIn: #osint #cti #cybersecurity #infosec #upskilling #darkweb #threathuntingโฆ | 39 comments
Here is the list of top Free Courses on OSINT and Threat Intelligence which will help you to upskill your Intelligence and Research skills:โ
1. Introductionโฆ | 39 comments on LinkedIn
1. Introductionโฆ | 39 comments on LinkedIn
Forwarded from Cybertix
๐ฆ๐ฆ๐ฅ๐ ๐ถ๐ป ๐๐ถ๐๐น๐ฎ๐ฏ
๐๐ผ๐๐ป๐๐: 10,000 $๐๐ฅ
๐ฉ๐ถ๐ฑ๐ฒ๐ผ ๐ฃ๐ผ๐: https://youtu.be/lyhsBr7aYCw?si=c7QcS8F84TzKRbjA
๐๐ผ๐๐ป๐๐: 10,000 $๐๐ฅ
๐ฉ๐ถ๐ฑ๐ฒ๐ผ ๐ฃ๐ผ๐: https://youtu.be/lyhsBr7aYCw?si=c7QcS8F84TzKRbjA
YouTube
SSRF on project import on a Note | Got Bounty of $10,000 ๐ฑ #cybersecurity #india #technology #hacker
๐๐๐๐๐๐๐๐ค๐๐ ๐๐๐ฅ๐๐ง๐:https://hackerone.com/reports/826361๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ : ๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel...
Forwarded from Cybertix
๐ฆ๐ฆ๐ง๐ ๐ฉ๐๐น๐ป๐ฒ๐ฟ๐ฎ๐ฏ๐ถ๐น๐ถ๐๐ ๐๐
๐ฝ๐น๐ฎ๐ถ๐ป๐ฒ๐ฑ ๐๐ฅ
๐ง๐ผ๐ฝ๐ถ๐ฐ๐ ๐๐ผ๐๐ฒ๐ฟ๐ฒ๐ฑ๐๐ป
๐ญ.What are Template Engine?
๐ฎ. What is SSTI Vulnerability?
๐ฏ. Practically Exploiting on live websites ๐ซจ
๐๐๐ฉ๐๐ ๐๐ค๐ฌ ๐๐ป
https://youtu.be/ml5LXJFxaQY?si=tLbVA1qlscbHSkL5
๐๐ก๐๐๐จ๐ ๐๐๐ ๐ ๐๐ป, ๐๐๐๐ง๐ ๐ค, & ๐๐ช๐๐จ๐๐ง๐๐๐โถ๏ธ
๐๐ค ๐ค๐ช๐ง ๐๐ค๐ช๐๐ช๐๐ ๐๐๐๐ฃ๐ฃ๐๐ก, ๐๐ค๐ง ๐๐๐๐ ๐๐๐ช๐๐๐ฉ๐๐ค๐ฃ๐๐ป
๐ง๐ผ๐ฝ๐ถ๐ฐ๐ ๐๐ผ๐๐ฒ๐ฟ๐ฒ๐ฑ๐๐ป
๐ญ.What are Template Engine?
๐ฎ. What is SSTI Vulnerability?
๐ฏ. Practically Exploiting on live websites ๐ซจ
๐๐๐ฉ๐๐ ๐๐ค๐ฌ ๐๐ป
https://youtu.be/ml5LXJFxaQY?si=tLbVA1qlscbHSkL5
๐๐ก๐๐๐จ๐ ๐๐๐ ๐ ๐๐ป, ๐๐๐๐ง๐ ๐ค, & ๐๐ช๐๐จ๐๐ง๐๐๐โถ๏ธ
๐๐ค ๐ค๐ช๐ง ๐๐ค๐ช๐๐ช๐๐ ๐๐๐๐ฃ๐ฃ๐๐ก, ๐๐ค๐ง ๐๐๐๐ ๐๐๐ช๐๐๐ฉ๐๐ค๐ฃ๐๐ป
YouTube
SSTI Explained ๐ #bugbounty #bugbountytips #cybersecurity #ai #technology #india #bug #hacker
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: : https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ:โฆ
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: : https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ:โฆ