1 942Subscribers
No data24 hours
No data7 days
No data30 days
- Subscribers
- Post coverage
- ER - engagement ratio
Data loading in progress...
Subscriber growth rate
Data loading in progress...
🔥🔥If you want to become a hacker, it is essential to always be knowledgeable about what steps to do. 🔍❤️
1-Network Plus
2-CEH
3-Linux Commands
4-Cmd Commands
5-Windows Tools
6-Kali Linux Tools
7-Learning Php
8-Learning Python
9-Learning Ruby
10-Learning Perl
...
#exploithub
1-DDoS
2-Forensics
3-Programming
4-Exploitation
5-Phone Hacking
6-Server Hacking
7-Client Hacking
8-Website Hacking
9-Network Hacking
10-Wireless Hacking
11-Reverse Engeenering
12-Information Gathering
#DDoS
1-MDK3
2-LOIC
3-HULK
4-DDOSIM
5-Ufonet
6-Hping3
7-Xerxes
8-Hammer
9-Slowloris
10-Websploit
11-GoldenEye
12-Metasploit
13-Aireplay-ng
14-Slowhttptest
#Forensics
1-COFEE
2-Volafox
3-Autopsy
4-Foremost
5-Hashdeep
6-Binwalk
#Programming
1-Notepad++
2-Visual Studio
3-Text Editor
#Exploitation
1-Metasploit
2-Sqlmap
3-Core Imact
4-W3af
5-BeEF
6-Dradis
#Phone_Hacking
1-Metasploit
2-Apktool
3-Droidjack
4-AndroRAT
5-Spynote
#Server_Hacking
1-SQLmap
2-Jsql
3-Havij
4-Hydra
5-Metasploit
6-Armitage
7-Brupsuite
8-Owasp-ZAP
9-Netsparker
10-Acunetix
11-OpenVAS
#Client_Hacking
1-Darkcomet
2-FatRat
3-Veil-Evasion
4-Shallter
5-Unicorn
6-Setoolkit
7-Armitage
8-BeEF-Framework
9-EmPyre
10-FakeImageExploiter
11-Pupy
12-DFU-Programmer
13-Cobalt Strike
14-Exploitpack
15-Gcat
16-Crowbar
#Website_Hacking
1-Sn1per
2-Owasp-ZAP
3-Brupsuite
4-Netsparker
5-Acunetix
6-SQLmap
7-Xsser
8-WPScan
9-Joomrra
10-Joomscan
11-WPSeku
12-XSStrike
13-Kadimus
14-jexboss
15-CMSmap
16-brut3k1t
17-0d1n
18-CloudFail
19-Arachni
20-Nikto
21-Webscarab
22-Nmap
23-Vbscan
24-Sentry MBA
#Network_Hacking
1-MITMf
2-Bettercap
3-Ettercap
4-Tcpdump
5-Wireshark
6-Driftnet
7-SSLstrip
8-Armitage
9-Metasploit
10-Xerosploit
11-Sparta
12-Hydra
#Wireless_Hacking
1-Wifite
2-Airodump-ng
3-Aireplay-ng
4-Wash
5-WiFi Pumpkin
6-Wifiphisher
7-Fluxion
8-Infernal Twin
9-WPSpin
#Reverse_Engeenering
1-OWASP-ZSC
2-OllyDBG
3-Apktool
#Information_Gathering
1-Enum
2-Recon
3-Whois
4-Email Contact
5-Phone Contact
6-Service Status
7-Protocol Analysis
26480
⭐ANDROID FAKER
Its a simple Xposed module which will help you to spoof your device ids so you can save your real ids from malicious software and prohibit malicious software from accessing mobile phone data.
🔻Compatibility:
This Module will Support Android 8.1+
🔻Features:
-> Edit\Random Value.
-> Random All Value by 1 Click
-> Beautiful Material Design UI
-> Backup/Restore Feature
🔻Module Can Spoof These Ids:
-> Imei
-> Hardware Id
-> Mac Address
-> Mac Bssid
-> Mac Ssid
-> Bluetooth Mac
-> Android Id
-> Sim Serial Id
-> Sim Sub Ids
-> Mobile No
-> GSF ID
-> MediaDrm ID
-> Advertisement ID
🔻REQUIREMENT
-> Rooted Device
-> Xposed Framework Installed
🔻Download:-
Download From Github
16010
🇦🇿Google Dorks For Penetration Testing🇦🇿
👺How is Google dorking used by hackers?
:-Hacker utilize Google Dorks to uncover exposed data for example log files with usernames and passwords or cameras, etc.
👺𝗠𝗔𝗞𝗘 @TheGodEye 𝗔𝗗𝗠𝗜𝗡 𝗜𝗡 𝗬𝗢𝗨𝗥 𝗖𝗛𝗔𝗡𝗡𝗘𝗟 𝗙𝗢𝗥 𝗔𝗠𝗔𝗭𝗜𝗡𝗚 𝗣𝗢𝗦𝗧𝗦 𝗧𝗛𝗔𝗧 𝗛𝗘𝗟𝗣𝗦 𝗧𝗢 🖥𝗚𝗥𝗢𝗪 𝗬𝗢𝗨𝗥 𝗖𝗛𝗔𝗡𝗡𝗘𝗟 𝟭𝟬𝟭%⭐️
17750
⭐ FREE / WEB-BASED AI CODE GENERATORS ⭐
➡️http://codeshare.io/
➡️https://ai.controllino.com/
➡️https://aicode-weld.vercel.app/
➡️https://aicodeconvert.com/
➡️https://aicodeplayground.com/
➡️https://app.gitwit.dev/
➡️https://chat2code.dev/components
➡️https://code-generator.pytorch-ignite.ai/
➡️https://codeium.com/playground
➡️https://codepal.ai/
➡️https://codesnippets.ai/
➡️https://coding-guru-liart.vercel.app/
➡️https://contter.com/
➡️https://debugcode.ai/
➡️https://deepai.org/code-assistant
by @TheGodEye
17830
Hacker's Dictionary✔️
Are you new to the realm of hacking?🐰
Do you feel dumb when you don't know the meaning of a certain term?Well, then this will certainly help you out! . If you are ever unsure about anything, simply scroll down and find that specific word, then read the definition.
Anything includes: Abbreviations, Phrases, Words, and Techniques.*The list is in alphabetical order for convenience!*
Abbreviations
? DDoS = Distributed Denial of Service
? DrDoS = Distributed Reflected Denial of Service Attack, uses a list of reflection servers or other methods such as DNS to spoof an attack to look like it's coming from multiple ips. Amplification of power in the attack COULD occur.
? FTP =File Transfer Protocol. Used for transferring files over an FTP server.
? FUD = Fully Undetectable
? Hex =In computer science, hexadecimal refers to base-16 numbers. These are numbers that use digits in the range: 0123456789ABCDEF. In the C programming language (as well as Java, JavaScript, C++, and other places), hexadecimal numbers are prefixed by a 0x. In this manner, one can tell that the number 0x80 is equivalent to 128 decimal, not 80 decimal.
? HTTP =Hyper Text Transfer Protocol. The foundation of data communication for the World Wide Web.
? IRC = Internet Relay Chat. Transmiting text messages in real time between online users.
? JDB =Java drive-by, a very commonly used web-based exploit which allows an attacker to download and execute malicious code locally on a slave's machine through a widely known java vulnerability.
? Malware =Malicious Software
? Nix = Unix based operating system, usually refered to here when refering to DoS'ing.
? POP3 =This is the most popular protocol for picking up e-mail from a server.
? R.A.T = Remote Administration Tool
? SDB = Silent drive-by, using a zero day web-based exploit to hiddenly and un-detectably download and execute malicious code on a slave's system. (similar to a JDB however no notification or warning is given to the user)
? SE = Social Engineering
? Skid =Script Kid/Script Kiddie
? SMTP =A TCP/IP protocol used in sending and receiving e-mail.
? SQL =Structured Query Language. It's a programming language, that used to communicate with databases and DBMS. Can go along with a word after it, such as "SQL Injection."
? SSH =Secure Shell, used to connect to Virtual Private Servers.
? TCP = Transmission Control Protocol, creates connections and exchanges packets of data.
? UDP =User Datagram Protocol, An alternative data transport to TCP used for DNS, Voice over IP, and file sharing.
? VPN =Virtual Private Network
? VPS =Virtual Private Server
? XSS (CSS) = Cross Site Scripting
Words
?Algorithm = A series of steps specifying which actions to take in which order.
?ANSI Bomb = ANSI.SYS key-remapping commands consist of cryptic-looking text that specifies, using ansi numeric codes to redefine keys.
?Back Door = Something a hacker leaves behind on a system in order to be able to get back in at a later time.
?Binary = A numbering system in which there are only two possible values for each digit: 0 and 1.
?Black Hat = A hacker who performs illegal actions to do with hacking online. (Bad guy, per se)
?Blue Hat =A blue hat hacker is someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term BlueHat to represent a series of security briefing events.
?Bot = A piece of malware that connects computer to an attacker commonly using the HTTP or IRC protocal to await malicous instructions
?Botnet = Computers infected by worms or Trojans and taken over by hackers and brought into networks to send spam, more viruses, or launch denial of service attacks.
?Buffer Overflow = A classic exploit that sends more data than a programmer expects to receive. Buffer overflows are one of the most common programming errors, and the ones most likely to slip through quality assurance testing.
Posted by 💎@TheGodEye💎
16850
TORCH SEARCH ENGINE -
http://torchdeedp3i2jigzjdmfpn5ttjhthh5wbmda2rr3jvqjg5p77c54dqd.onion/
A PORTMANTEAU OF TOR + SEARCH, THE TORCH SEARCH ENGINE IS THE OLDEST SEARCH ENGINE ON THE TOR NETWORK. TORCH INDEXES A RANGE OF DARK WEB SITES AND LINKS.
13300
⚙️Some Useful Website Collection⚙️
****
1. www.codecademy.com
2. www.lynda.com
3. www.udemy.com
4. www.udacity.com
5. www.coursera.org
6. www.w3schools.com
7. www.thenewboston.org
8. www.programmr.com
9. www.codeavengers.com
10. www.codeschool.com
11. www.learnstreet.com
12. www.teamtreehouse.com
13. www.sqlzoo.net
14. www.codehs.com
15. www.teamtreehouse.com
16. www.html5rocks.com
17. www.codepen.io
18. www.sitepoint.com
19. www.tutorialspoint.com
20. www.javatpoint.com
21. www.cplusplus.com
22. www.learncpp.com
23. www.tutorialspoint.com
24. www.cprogramming.com
25. www.stackoverflow.com
26. www.learncodethehardway.org
27. www.bloc.io
28. www.howtocode.io
29. www.edx.org
30. www.instructables.com
31. www.developer.apple.com
32. www.developer.android.com
33. www.developers.google.com
34. www.developer.mozilla.org
35. www.msdn.microsoft.com
36. www.decom pera.com
37. www.www.developphp.com
38. www.quackit.com
39. www.htmlite.com
40. www.siteduzero.com
41. www.dreamincode.net
42. www.phpbuddy.com
43. www.php.net
44. www.microsoftvirtualacademy.com
45. www.professormesser.com .
❤️Photoshop and Graphics❤️
***
1. www.adobe.com
2. www.adobeknowhow.com
3. www.pixel2life.com
4. www.photoshopessentials.com
5. www.photoshop-tutorials.deviantart.com
6. www.phlearn.com
7. www.design.tutsplus.com
8. www.practicalphotoshopmag.com
9. www.tutorial9.net
10. www.pshero.com
11. www.psdlearning.com
12. www.alison.com .
🖼️Programing and Other IT Projects🖼️
*
1. www.freeprojectscode.com
2. www.sourcecodesworld.com
3. www.freecode.com
4. www.codeproject.com
5. www.freestudentprojects.com
6. www.programmersheaven.com
7. www.code.google.com
8. www.planet-source-code.com
9. www.dzone.com
10. www.thefreecountry.com
11. www.sourceforge.net
12. www.creately.com/diagram-examples
13. www.freewebsitetemplates.com 14. www.templatemo.com
15. www.oswd.org
16. www.designrazzi.net/2014/free-css3-html5-templates 17. www.html5up.net
18. www.freehtml5templates.com
19. www.themesbase.com/WordPress-Templates
20. www.templaty.com
21. www.arblogger-templates.com
22. www.templates.ssdaa.com .
.
🍏Create a Prefessional CV Online🍏
****
1. www.khamsat.com
2. www.fiverr.com
3. www.odesk.com
4. www.elance.com
5. www.99designs.com
6. www.freelancer.com
7. www.guru.com
8. www.jobs.smashingmagazine.com
9. www.freelanced.com
10. www.ifreelance.com
11. www.peopleperhour.com
12 www.peopleperhour.com.
.
🕸Very Good Sites for Freelancers🕸
****
1. www.khamsat.com
2. www.fiverr.com
3. www.odesk.com
4. www.elance.com
5. www.99designs.com
6. www.freelancer.com
7. www.guru.com
8. www.jobs.smashingmagazine.com
9. www.freelanced.com
10. www.ifreelance.com
11. www.peopleperhour.com
12 www.peopleperhour.com
Posted by 💎@TheGodEye💎
Custom-Built Diagram Templates for All Organizational Functions | Creately
Explore thousands of professionally-made, scenario-based templates for multiple organizational functions, from marketing to education. Easily export them and add to PowerPoint, Google Slides, Word and more.
17170
List of Cryptography Tools used in CTFs :
Decoder 1: www.dcode.fr/
symbols-ciphers
Decoder 2: cryptii.com
Dedcoder 3: gchq.github.io/CyberChef
Decoder 4: crackstation.net
Rot Decoder: theblob.org/rot.cgi
Twin Hex: www.calcresult.com/misc/cyphers/twin-hex.html
dCode - Solveurs, Crypto, Maths, Codes, Calculs en Ligne
dCode est le site universel pour déchiffrer des messages codés, tricher aux jeux de lettres, résoudre des énigmes, géocaches et chasses au trésor, etc.
16530