ᴀꜱꜱᴀꜱꜱɪɴ ʜᴀᴄᴋᴇʀ
ʜᴀᴄᴋᴇʀ | ᴅᴀʀᴋ ᴡᴇʙ | ᴛᴇʀᴍᴜx | ᴄᴏᴜʀꜱᴇ
Mostrar más8
Suscriptores
Sin datos24 horas
Sin datos7 días
Sin datos30 días
- Suscriptores
- Cobertura postal
- ER - ratio de compromiso
Carga de datos en curso...
Tasa de crecimiento de suscriptores
Carga de datos en curso...
Learn The Linux Command Line Basic Commands Free Course
https://www.ecoursefree.com/learn-the-linux-command-line-basic-commands-free-course/
@andythehacker
Learn The Linux Command Line Basic Commands Free Course - Ecoursefree
100% Off Udemy Coupon Code Learn The Linux Command Line Basic Commands Free Course: Get Started with the Unix Command-Line. The command line is an incredibly
😍 BTC 120 million Email:pass 😍
Download link:-
https://bit.ly/34zenCK
Posted by @RoshanHacker_Bot
GPlinks is a completely free tool where you can create short links, which apart from being free, you get paid! So, now you can make money from home when managing and protecting your links.
Google repels DDoS attack with a capacity of 2.54 TB / sec
This week, the Google Cloud team spoke about a previously unknown DDoS attack that targeted a Google service back in September 2017 and peaked at 2.54 TB / s, making it the most powerful recorded attack ever.
Soon analysts from the Google Threat Analysis Group (TAG) published their report on the incident, in which they said that "government hackers" were responsible for the attack. According to TAG, the attack originated from China, from the networks of four specific providers: ASN 4134, 4837, 58453 and 9394.
The researchers write that 2.54 TB / sec was the culmination of a six-month long campaign against Google, during which attackers used various attack methods and tried to undermine the company's server infrastructure. It was not reported which services the hackers were targeting.
“Attackers used multiple networks to spoof 167,000,000 packets per second into 180,000 open CLDAP, DNS and SMTP servers, which then sent huge responses to us,” wrote Google engineers. "This demonstrates the scale that well-resourced criminals can achieve: four times the record 623 Gbps attack carried out by the Mirai botnet a year earlier in 2016."
It is also worth noting that the incident described by Google surpasses even the attack on Amazon AWS that occurred in February of this 2020, the capacity of which was 2.3 TB / sec. That is, the record for DDoS attacks has once again been broken.
1) cp /usr/share/wordlists/rockyou.txt.gz .
2) gunzip rockyou.txt.gz
3) cat rockyou.txt | sort | uniq | pw-inspector -m 8 -M 63 > newrockyou.txt
If i did a mistake unknowingly forgive me and if i did a mistake knowingly take it as a challenge to find.lmao
After starting, wait a few minutes until the program collects information bout available access points:
When the information is sufficient,
press the CTRL + the C .
We will be asked to enter the access point numbers we want to hack.
You can select all(you need to enter all),
you can select individual APs, listing them separated by commas,
you can select ranges by listing them with a hyphen:
Then the program will do everything itself.
Possible error i have seen:
If you thought that the program is too got stuck on any access point or attack for a long time, then press once CTRL + C to go to the next step. They will ask us - we want to leave immediately or continue
👍We get VCC for free. (Not CIS)
1. Go to http://www.e-coin.io/ and create an account. You can use fake credentials.
2. Download the WireX app to your smartphone (Playstore / appstore).
3. Log in to the application using your E-Coin.io account.
(I used all the fake information when I did this.)
4. Create a new USD card in the WireX app. USD VCC (virtual credit card).
5. Return to E-Coin.io or the WireX app.
Select Send CVV (CC number, date and CVV numbers will be emailed to you)
You now have a virtual credit card that you can use to top up using BTS or any other service that requires it.
Use textnow if it ask for a phone number
Download textnow from here
https://textnow-free-text-calls.en.softonic.com/android/download
Download TextNow APK for Android - free - latest version
Free texting and calling app
👍Amazon Gift Cards 2020 (for beginners to understand the mythodology)
We need:
1 CC
2 RDP / 911
3 Jet Cleaner / CCleaner
Once you've purchased your CC, then you're ready to get started.
Connect RDP / 911 / VPN.
Please note that you must connect to an IP address that matches the owner's address.
Example: If you are using CC and the owner is from New Jersey, use the New Jersey IP address.
Then, clear your history and cookies. There are tools out there to help you clear your cookies.
I personally use jet cleaner and Ccleaner.
Another step is to create an email address. Would be suspicious of using a disposable email, I will suggest creating an outlook email address.
Use the same name as the card.
By following the procedures described above, you have almost reached the Promised Land.
Now is the time to create an Amazon account.
Go to Amazon and create an account with the same details as the cc owner using the email address you created.
After that, try to join amazon prime with him.
Link cc to Amazon and order an item below $ 50, leave it for 48 hours before taking the next step.
You need to leave your item in your cart because Amazon is strict about new accounts. If you are in a hurry, they may cancel your order and return the money to the owner.
After 48 hours, log in to Amazon with the same IP address.
Check the product cart. Be sure to enter your billing address as your shipping address and it must be the real address of the owner cc.
It simply means that you are buying things for the owner. It will look real and Amazon will confirm your order almost immediately.
After confirmation, we warm up the Amaz.
Your gift card is almost complete.
Now visit Amazon e-giftcards and select an e-gift card amount below $ 300.
Email the gift card to your email address, which is the outlook you created.
Viola! Your gift card will be delivered to your email address.
You can either sell it or use it to buy bitcoin on paxful.com
XSS
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/xss.md
https://github.com/ismailtasdelen/xss-payload-list
SQLi
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/sqli.md
SSRF
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/ssrf.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Request%20Forgery
CRLF
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/crlf.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/CRLF%20Injection
CSV-Injection
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/csv-injection.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/CSV%20Injection
Command Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Command%20Injection
Directory Traversal
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Directory%20Traversal
LFI
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/lfi.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/File%20Inclusion
XXE
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/xxe.md
Open-Redirect
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/open-redirect.md
RCE
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/rce.md
Crypto
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/crypto.md
Template Injection
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/template-injection.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Template%20Injection
XSLT
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/xslt.md
Content Injection
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/content-injection.md
LDAP Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/LDAP%20Injection
NoSQL Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/NoSQL%20Injection
CSRF Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/CSRF%20Injection
GraphQL Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/GraphQL%20Injection
IDOR
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Insecure%20Direct%20Object%20References
ISCM
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Insecure%20Source%20Code%20Management
LaTex Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/LaTeX%20Injection
OAuth
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/OAuth
XPATH Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/XPATH%20Injection
Bypass Upload Tricky
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Upload%20Insecure%20Files
EdOverflow/bugbounty-cheatsheet
A list of interesting payloads, tips and tricks for bug bounty hunters. - EdOverflow/bugbounty-cheatsheet
Wi-Fi Automated Hacking in WiFiteTo do this, the WiFite program needs to be launched with two additional options:
▪️ - -crack says that you need to perform dictionary cracking
▪️ --dict ~ / newrockyou.txt indicates which dictionary to use
Elige un Plan Diferente
Tu plan actual sólo permite el análisis de 5 canales. Para obtener más, elige otro plan.