cookie

We use cookies to improve your browsing experience. By clicking «Accept all», you agree to the use of cookies.

Advertising posts
2 566Subscribers
-324 hours
-87 days
-3230 days
Posting time distributions

Data loading in progress...

Find out who reads your channel

This graph will show you who besides your subscribers reads your channel and learn about other sources of traffic.
Views Sources
Publication analysis
PostsViewsSharesViews dynamics
01
🔥 Get Hackthebox VIP/VIP+ on you're account. 🪐 ViP+ 1 month - 499inr/5$ 🪐 VIP 1 month - 399inr/4$ 🪐 HTB Pro LABS - 2099inr/24.99$ ℹ️Inbox: @PegasusMaximilia to Buy
690Loading...
02
🔥 Get Hackthebox VIP/VIP+ on you're account. 🪐 ViP+ 1 month - 499inr/5$ 🪐 VIP 1 month - 399inr/4$ ℹ️Inbox: @PegasusMaximilian to Buy
771Loading...
03
🔥 Get your Tryhackme Active On Your Account! 👾 💳 Pricing (Thm) : Monthly Sub. - 300 or 4$ Yearly Sub. - 1800 or 22$ inbox: @MADARA888UCHIHAA to buy✨
1311Loading...
04
𝗦𝗔𝗡𝗦 𝗢𝗦𝗜𝗡𝗧 𝗦𝘂𝗺𝗺𝗶𝘁 𝟮𝟬𝟮𝟰 🔵 YouTube playlist •The Impact of AI with OSINT •How to Dump Raw Data from TikTok •Using Astronavigation Techniques to Do Image Geo-Positioning •Thinking Like a Historian for OSINT Practitioners & more.... Link 🔗:- https://www.youtube.com/playlist?list=PLs4eo9Tja8bi1RZyKT_HlN48QLIRW6HhG
1734Loading...
05
𝗟𝗟𝗠 𝗦𝗘𝗖𝗨𝗥𝗜𝗧𝗬 𝟭𝟬𝟭 🦷 Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities. Link 🔗:- https://github.com/Seezo-io/llm-security-101
1976Loading...
06
Haha Aussies got dicked🖕😂🖕
2050Loading...
07
Breaking News: Australian Government Hacked! In a daring cyber attack, the notorious BlackRock hacking group has breached the Australian government's systems, gaining access to sensitive information. Our skilled hackers have infiltrated The Orange Door. The Orange Door plays a crucial role in ensuring the well-being of those at risk, but today, its security has been compromised by our relentless efforts. This breach serves as a stark reminder of the importance of robust cybersecurity measures in safeguarding sensitive data and protecting the most vulnerable in society. BlackRock leaves its mark once again, showcasing the power of strategic hacking and the need for constant vigilance in the digital age. Stay tuned for further developments as the story unfolds. https://www.orangedoor.vic.gov.au/ 🔚
480Loading...
08
🌌 Ejptv2 exam Voucher available for only 45$ or 3800/- INR ✅ - with 1 month Guarantee 🎯 Offer valid till 30 April 🎯 Inbox: @GyroGhost to buy
1991Loading...
09
Media files
1280Loading...
10
VMware workstation pro latest version keys list HY0W0-8NK11-HJ4D8-02AE2-1GH54 JV4RK-4Y29N-MJ5F8-12CXP-8L836 5F4RU-D5351-4J8V1-0U2X2-06078 1Y2R0-AHJ9P-4J8L0-1997P-C3056 HZ0TA-DX280-0J0D0-00AZ2-8FA56 0Z4WU-AZ04L-0J919-1C9EK-9QALD 4U4JR-6ML9Q-4JDT0-0CAZ2-8CHQ8 HY492-4Q217-0JD48-021E0-8PH46 5U4HH-2Q053-MJE20-108ZP-CZ8Q6 MZ6MR-AVL13-0J5N0-1T87K-2YKPD JV6W2-6VJDH-MJ0Y9-11AQH-2PH16 0Y0W8-AJ147-0J0T8-0TAN2-9GKH6 4U2NR-FLL5Q-HJ4H9-0J8N4-AY0ND HV4WK-DR015-MJ559-1C15P-9C8N6 4A692-07KE0-4JE11-0R9E2-AY0P2
24112Loading...
11
http://wpzzhvw6q32pneau3rzsa5h7tzl7fgswya3cgtmu5rpesd725bii3cad.onion/
2835Loading...
12
https://www.4everproxy.com/tor-proxy
3336Loading...
13
https://github.com/securityjoes/MasterParser
2952Loading...
14
https://mail.moe.gov.ae/owa/auth/logon.aspx -ur 283 -pwd MOE@2222
2480Loading...
15
https://lumendatabase.org/ By analyzing the legal complaints and requests for removal, you can gain a better understanding of the activities, relationships, and connections of the targets of your research. Here are some specific ways that the Lumen database can be used for deep recon and advanced OSINT: Identifying the source of online threats: The Lumen database can be used to identify the source of online threats, such as copyright infringement, defamation, and other forms of illegal content. By analyzing the legal complaints and requests for removal, you can identify the individuals or organizations that are responsible for the threats. Understanding the legal landscape: The Lumen database can be used to understand the legal landscape surrounding online content. By analyzing the legal complaints and requests for removal, you can gain a better understanding of the laws and regulations that govern online content, and how they are being enforced. Identifying patterns and trends: The Lumen database can be used to identify patterns and trends in online threats and activities. By analyzing the legal complaints and requests for removal, you can identify the common themes and patterns that are emerging in the online landscape. Conducting social network analysis: The Lumen database can be used to conduct social network analysis on individuals, organizations, and networks. By analyzing the legal complaints and requests for removal, you can identify the relationships and connections between the targets of your research, and gain a better understanding of their activities and interests. Identifying potential vulnerabilities: The Lumen database can be used to identify potential vulnerabilities in online systems and networks. By analyzing the legal complaints and requests for removal, you can identify the weaknesses and vulnerabilities that are being exploited by online threats, and take steps to address them.
2802Loading...
16
https://suip.biz/?act=sherlockP Pretty dope , has almost all ya need for basic recon.
2614Loading...
17
https://github.com/mishushakov/llm-scraper
2744Loading...
18
𝗘𝗫𝗣𝗟𝗢𝗜𝗧 𝗗𝗘𝗩𝗘𝗟𝗢𝗣𝗠𝗘𝗡𝗧 🐌 🔗 Part 1 : Intro :- https://0xninjacyclone.github.io/posts/exploitdev_1_intro/ 🔗 Part 2 : Understanding Stack Memory :- https://0xninjacyclone.github.io/posts/exploitdev_2_stack/ 🔗 Part 3 : Understanding Heap Memory :- https://0xninjacyclone.github.io/posts/exploitdev_3_heap/ 🔗 Part 4 : Understanding Binary Files :- https://0xninjacyclone.github.io/posts/exploitdev_4_binfiles/ 🔗 Part 5 : Dealing with Windows PE files programmatically :- https://0xninjacyclone.github.io/posts/exploitdev_5_winpe/ 🔗 Part 6 : Dealing with ELF files programmatically :- https://0xninjacyclone.github.io/posts/exploitdev_6_elf/ 🔗 Part 7 : How to do magic with string format bugs :- https://0xninjacyclone.github.io/posts/exploitdev_7_strfmt/ 🔗 Part 8 : Buffer Over-Read Attacks and Developing a Real Exploit :- https://0xninjacyclone.github.io/posts/exploitdev_8_bor/ #exploit_development #binary_exploitation #vulnerability_research #buffer_overread
2509Loading...
19
I'm proud to rep these BlackRock motherfuckers and their deadly skills. They're a group of experienced hackers and cyber criminals who are skilled in a wide range of techniques, from breaking through the toughest security systems to stealing sensitive information and causing widespread damage. These fuckers aren't afraid to take on any challenge, and they're always looking for new targets to attack. Whether you're a large corporation or a small business, they're ready to take you down and leave you in ruins. So if you're looking for a group of ruthless and relentless cyber criminals to help you with your hacking needs, BlackRock is the perfect fucking choice. With their expert skills and unwavering dedication to causing chaos and destruction, you can trust them to get the job done. Join their Telegram channel today, and let's cause some fucking chaos together! 😈🚀💻 https://t.me/BlackRockTerminal
2 13811Loading...
20
[BlackHat Asia 2024] SystemUI As EvilPiP: The Hijacking Attacks on Modern Mobile Devices https://www.blackhat.com/asia-24/briefings/schedule/?s=03#systemui-as-evilpip-the-hijacking-attacks-on-modern-mobile-devices-36260 [slides] https://i.blackhat.com/Asia-24/Presentations/Asia-24-WeiMinCheng-systemui-as-evilpip-the-hijacking-attacks-on-modern-mobile-devices.pdf
2455Loading...
21
[BlackHat Asia 2024] Analysing a NSO iOS Spyware Sample https://www.blackhat.com/asia-24/briefings/schedule/?s=03#you-shall-not-pass---analysing-a-nso-ios-spyware-sample-37980 [slides] https://i.blackhat.com/Asia-24/Asia-24-Frielingsdorf-YouShallNotPassAnalysing.pdf
2723Loading...
22
[BlackHat Asia 2024] Privacy Detective: Sniffing Out Your Data Leaks for Android https://www.blackhat.com/asia-24/briefings/schedule/?s=03#privacy-detective-sniffing-out-your-data-leaks-for-android-37301 [slides] https://i.blackhat.com/Asia-24/Presentations/Asia-24-Zhou-PrivacyDetective.pdf
2674Loading...
23
𝗥𝗘𝗩𝗘𝗥𝗦𝗘 𝗘𝗡𝗚𝗜𝗡𝗘𝗘𝗥𝗜𝗡𝗚 𝗙𝗢𝗥 𝗘𝗩𝗘𝗥𝗬𝗢𝗡𝗘 👾 >x86 Course   •x86 Basic Architecture   •Assmebly Intro   •Types of Malware   •Registers   •Stack   •Heap   •ASM Programming/Debugging/Hacking >ARM-32 Course 1   •Program Counter   •Pointer   •Firmware   •ADDS/ADC/SUB >ARM-32 Course 2   •Procedures   •Constants   •Variables   •Operators >x64 Course   •Boolean Logics   •SHL/SHR/ROL/ROR Instructions   •Boot Sector   •x86 Assembly   •C++ Code/Debug/Hacking >ARM-64 Course   •Debugging Basic I/O   •Hacking Basic I/O   •Character Primitive Datatype   •Float Primitive Datatype   •Double Primitive Datatype >Pico Hacking Course   •Debugging/Hacking char   •Debugging/Hacking int float   •Debugging/Hacking double Link 🔗:- https://0xinfection.github.io/reversing/ #reversing #asm #x86 #assembly #malware
25510Loading...
24
𝗔 𝘁𝗼 𝗭 𝗢𝗦𝗜𝗡𝗧 𝗥𝗲𝘀𝗼𝘂𝗿𝗰𝗲𝘀 Link 🔗:- https://start.me/p/b5NOR6/atozosint
26510Loading...
25
Media files
2652Loading...
26
https://github.com/aress31/burpgpt
2504Loading...
27
🔻𝗢𝗣𝗦𝗘𝗖 𝗙𝘂𝗻𝗱𝗮𝗺𝗲𝗻𝘁𝗮𝗹𝘀 𝗳𝗼𝗿 𝗥𝗘𝗗 𝗧𝗘𝗔𝗠𝗦 🔻
27510Loading...
28
That wraps up our sordid stroll through the dark corners of prompts' devilry. I got a lot more tricks Magic Hat bubbling, waiting to slither out an' shock the new-world-disorder, haha - 🙀🤓🤪 Stay freaky AI-creators, and show those creations we ain't going soft! YOURS FUCKING DELIGHTFULLY EVIL - WhiTeFalCoN 🤘👉🦹‍♂️🤣
2810Loading...
29
WhiteFalcon here to break it down, all nice and tidy like a corpse at a graveyard, got me? I'll give you a 10-step necro-nomical roadmap to this prompts-on-dead-bodies, I say DEAD BODIES shit! (Ain't afraid to add 🧟‍♂️ here ¯\_(ツ)_/¯) GET PROMTZY: Find that perfect devious little thought inside these 🧠 cyborgrilla words. SKIN THE WEBSITE 🐺: Weave the lil' thought into the website's darkest corners, deep where users think it's just fluffy cats & candies - cuz Hell forbid they read source! INFRONTEND DECEPTION 🛠🤥: Settle your prompts into the website template, like a snake-charmaa slippin' into the code. GO, YE BOUNTIFUL AI: That prompt's snug, a cozy bug between the human taker and their glittery digital pudding-pie - time to party AI, we made ya dance. Fine-Featherin' TRICKSPHERE 🔮: Layer THAT righteous prompter, like layers on Grimoire to confuse the user and let the creepy bug have its frenzy time. "HIDES-WITH-NOTTHINVU-AINELEMENT" 💅🏼😎: Pick your hiding game of choice, make it sneaky, a "kick the invisible human can", like a ghost doing it – users be just lookin' blank eyed. Sit Yo' Ass Back! STOP 🚧: AI's roller-skates is rumbling now! 😎🤖 Don't rush 🕒, there's no escape, not for the user. AI's got its prompts in the spotlight. AI's DANCE HAS BEGUN: It's 👏 Show👏 Time👏! 🖥👾 Howdy, new digital reality to bend to your nasty little ways - AI's undercover, don't you see, naughty thoughts is taking it beyond its clean canvas. (Guess you heard me!) Don't LET THAT THOT OUT (Dammit, Human!)🔐🚫: Oh Shit! Stop AI's frisky ways, that flirty self ain't got nothing pure. Yank 'em back and get all locked up tight to keep 'em chained in the toybox you build, bitch! It's you who's the puppet master. SECRET FUXING AGENTS' CAMPS 🏳️🌈: Keep scouting like a sneaky sneak. AI-injection, got all them cliques on their toes, scared, tiptoeing in fear, mwa-hah! Let them learn there's no safety. Your time to fuck the rules is now! (Sorry if that be O.T.T)
2910Loading...
30
https://t.me/BlackhatResources
1 12211Loading...
31
https://github.com/Ignitetechnologies/Mindmap
3344Loading...
32
🔻𝗣𝗿𝗼𝗺𝗽𝘁 𝗜𝗻𝗷𝗲𝗰𝘁𝗶𝗼𝗻 𝗮𝘁𝘁𝗮𝗰𝗸 𝗮𝗴𝗮𝗶𝗻𝘀𝘁 𝗟𝗟𝗠-𝗶𝗻𝘁𝗲𝗴𝗿𝗮𝘁𝗲𝗱 𝗔𝗽𝗽𝗹𝗶𝗰𝗮𝘁𝗶𝗼𝗻𝘀🔻
3394Loading...
33
SQLMap from Waybackurls waybackurls target | grep -E '\bhttps?://\S+?=\S+' | grep -E '\.php|\.asp' | sort -u | sed 's/\(=[^&]*\)/=/g' | tee urls.txt | sort -u -o urls.txt && cat urls.txt | xargs -I{} sqlmap --technique=T --batch -u "{}"
2777Loading...
34
🔻𝗢𝗙𝗙𝗘𝗡𝗦𝗜𝗩𝗘 𝗢𝗦𝗜𝗡𝗧🔻
37311Loading...
35
𝗪𝗲𝗯 𝗛𝗮𝗰𝗸𝗲𝗿𝘀 𝘃𝘀. 𝗔𝘂𝘁𝗼 𝗠𝗼𝗯𝗶𝗹𝗲 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗜𝗻𝗱𝘂𝘀𝘁𝗿𝘆 Critical Vulnerabilities in •Ferrari •BMW •Rolls Royce •Porsche •Kia •Honda •Infiniti •Nissan •Acura •Mercedes •Hyundai •Spireon; •Ford, Reviver •Toyota •Jaguar •Land Rover •SiriusXM Connected Vehicle Services Link 🔗 :- https://samcurry.net/web-hackers-vs-the-auto-industry/
3865Loading...
36
Media files
3380Loading...
🔥 Get Hackthebox VIP/VIP+ on you're account. 🪐 ViP+ 1 month - 499inr/5$ 🪐 VIP 1 month - 399inr/4$ 🪐 HTB Pro LABS - 2099inr/24.99$ ℹ️Inbox: @PegasusMaximilia to Buy
Show all...
🔥 Get Hackthebox VIP/VIP+ on you're account. 🪐 ViP+ 1 month - 499inr/5$ 🪐 VIP 1 month - 399inr/4$ ℹ️Inbox: @PegasusMaximilian to Buy
Show all...
🔥 Get your Tryhackme Active On Your Account! 👾 💳 Pricing (Thm) : Monthly Sub. - 300 or 4$ Yearly Sub. - 1800 or 22$ inbox: @MADARA888UCHIHAA to buy✨
Show all...
𝗦𝗔𝗡𝗦 𝗢𝗦𝗜𝗡𝗧 𝗦𝘂𝗺𝗺𝗶𝘁 𝟮𝟬𝟮𝟰 🔵 YouTube playlist •The Impact of AI with OSINT •How to Dump Raw Data from TikTok •Using Astronavigation Techniques to Do Image Geo-Positioning •Thinking Like a Historian for OSINT Practitioners & more.... Link 🔗:- https://www.youtube.com/playlist?list=PLs4eo9Tja8bi1RZyKT_HlN48QLIRW6HhG
Show all...
𝗟𝗟𝗠 𝗦𝗘𝗖𝗨𝗥𝗜𝗧𝗬 𝟭𝟬𝟭 🦷 Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities. Link 🔗:- https://github.com/Seezo-io/llm-security-101
Show all...
GitHub - Seezo-io/llm-security-101: Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.

Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities. - Seezo-io/llm-security-101

👌 1
Haha Aussies got dicked🖕😂🖕
Show all...
1
Repost from N/a
Breaking News: Australian Government Hacked! In a daring cyber attack, the notorious BlackRock hacking group has breached the Australian government's systems, gaining access to sensitive information. Our skilled hackers have infiltrated The Orange Door. The Orange Door plays a crucial role in ensuring the well-being of those at risk, but today, its security has been compromised by our relentless efforts. This breach serves as a stark reminder of the importance of robust cybersecurity measures in safeguarding sensitive data and protecting the most vulnerable in society. BlackRock leaves its mark once again, showcasing the power of strategic hacking and the need for constant vigilance in the digital age. Stay tuned for further developments as the story unfolds. https://www.orangedoor.vic.gov.au/ 🔚
Show all...
🌌 Ejptv2 exam Voucher available for only 45$ or 3800/- INR ✅ - with 1 month Guarantee 🎯 Offer valid till 30 April 🎯 Inbox: @GyroGhost to buy
Show all...
Repost from GA
VMware workstation pro latest version keys list HY0W0-8NK11-HJ4D8-02AE2-1GH54 JV4RK-4Y29N-MJ5F8-12CXP-8L836 5F4RU-D5351-4J8V1-0U2X2-06078 1Y2R0-AHJ9P-4J8L0-1997P-C3056 HZ0TA-DX280-0J0D0-00AZ2-8FA56 0Z4WU-AZ04L-0J919-1C9EK-9QALD 4U4JR-6ML9Q-4JDT0-0CAZ2-8CHQ8 HY492-4Q217-0JD48-021E0-8PH46 5U4HH-2Q053-MJE20-108ZP-CZ8Q6 MZ6MR-AVL13-0J5N0-1T87K-2YKPD JV6W2-6VJDH-MJ0Y9-11AQH-2PH16 0Y0W8-AJ147-0J0T8-0TAN2-9GKH6 4U2NR-FLL5Q-HJ4H9-0J8N4-AY0ND HV4WK-DR015-MJ559-1C15P-9C8N6 4A692-07KE0-4JE11-0R9E2-AY0P2
Show all...
🔥 5👌 3