cookie

Utilizamos cookies para mejorar tu experiencia de navegación. Al hacer clic en "Aceptar todo", aceptas el uso de cookies.

avatar

INDIANS HACKERS COMMUNITY ™️

INDIAN HACKERs COMMUNITY. IT'S A COMMUNITY. SHARE YOUR KNOWLEDGE. GET KNOWLEDGE. ASK & ANSWER QUESTIONS. Join group for discussion - t.me/IHCGROUP Share your contain At @IHCF_bot

Mostrar más
El país no está especificadoEl idioma no está especificadoLa categoría no está especificada
Publicaciones publicitarias
415
Suscriptores
Sin datos24 horas
Sin datos7 días
Sin datos30 días

Carga de datos en curso...

Tasa de crecimiento de suscriptores

Carga de datos en curso...

The phones of 50,000 individuals, including human rights activists and journalists, have been targeted by surveillance tools that were used by numerous governments. These tools can hack any iOS and Android phone, and there is no way to protect your device from it. It doesn't matter which apps you use, because the system is breached on a deeper level. According to the Snowden revelations from 2013, both Apple and Google are part of the global surveillance program that implies that these companies have to, among other things, implement backdoors into their mobile operating systems. These backdoors, usually disguised as security bugs, allow US agencies to access information on any smartphone in the world. The problem with such backdoors is that they are never exclusive to just one party. Anybody can exploit them. So if a US security agency can hack an iOS or Android phone, any other organization that uncovers these backdoors can do the same. Unsurprisingly, this is exactly what has been taking place: an Israeli company called NSO Group has been selling access to the spying tools that allowed third parties to hack tens of thousands of phones. Since at least 2018, I have been aware that one of my phone numbers was included in a list of potential targets of such surveillance tools (although a source from the NSO Group denies it). Personally, I wasn't worried: since 2011, when I was still living in Russia, I’ve got used to assuming that all my phones were compromised. Anyone who gains access to my private data will be utterly disappointed – they will have to go through thousands of concept designs for Telegram features and millions of messages related to our product development process. They won't find any important information there. However, these surveillance tools are also used against people far more prominent than me. For example, they were employed to spy on 14 heads of state. The existence of backdoors in crucial infrastructure and software creates a huge challenge for humanity. That's why I have been calling upon the governments of the world to start acting against the Apple-Google duopoly in the smartphone market and to force them to open their closed ecosystems and allow for more competition. So far, even though the current market monopolization increases costs and violates privacy and freedom of speech of billions, government officials have been very slow to act. I hope the news that they themselves have been targeted by these surveillance tools will prompt politicians to change their minds. By telegram CEO
Mostrar todo...
Revealed: leak uncovers global abuse of cyber-surveillance weapon

Spyware sold to authoritarian regimes used to target activists, politicians and journalists, data suggests

WSL: Run Linux GUI Apps | Tabs vs Spaces | Channel 9 https://channel9.msdn.com/Shows/Tabs-vs-Spaces/WSL-2-Run-Linux-GUI-Apps
Mostrar todo...
Linux apps on Windows with WSLg

Learn how to run Linux GUI apps on Windows with WSL 2!

​​🔰The Complete Ethical Hacking Course.🔰 🔺Are you a beginner? And wanted to become a penetration tester?, But don't know from where to start?..... Don't worry this course is going to help you. Learn ethical hacking from beginner to advanced.🔻 🔗Link : https://mega.nz/folder/CPxUiAAS#GVXzHzu_kUyfpHM1jMPPIQ
Mostrar todo...

Mostrar todo...
Leaked data of Dominos India users now available on search engine created by hacker 

As per security experts, the data of 18 crore Dominos orders are available on the dark web.

Linux kernel vulnerability exposes stack memory, causes data leaks https://www.zdnet.com/article/linux-kernel-vulnerability-exposes-stack-memory/
Mostrar todo...
Linux kernel vulnerability exposes stack memory, causes data leaks

The bug could also be used as a conduit for more severe attacks.

Just some useful websites that can help you with info gathering Username or Alias Checkers: http://namechk.com/ http://knowem.com/ http://www.namecheckr.com/ http://checkusernames.com/ http://usersherlock.com/ https://www.usersearch.org/ Archive Tools: https://archive.org/index.php https://www.archive-it.org/ http://aad.archives…st.jsp?cat=GS29 Social Networks and People Finders: http://www.yasni.com/ http://socialmention.com/ http://www.whostalkin.com/ http://www.linkedin.com/ http://www.formspring.me/ http://foursquare.com/ https://about.me/ https://profiles.google.com/ http://blogger.com https://twitter.com/ http://www.facebook.com/ https://deviantart.com http://xanga.com/ http://tumblr.com/ http://myspace.com/ http://www.photobucket.com/ http://www.quora.com/ http://www.stumbleupon.com/ http://www.reddit.com http://www.digg.com http://www.plixi.com http://pulse.yahoo.com/ http://www.flickr.com/ Phone Number Lookup: http://www.freecellpctorylookup.com http://www.numberway.com/ http://www.fonefinder.net http://www.whitepage…/reverse-lookup http://www.anywho.com/reverse-lookup http://www.yellowpag…ersephonelookup http://www.spydialer.com/ http://www.intelius…one-lookup.html IP Address Info: http://www.infosniper.net/ http://ip-lookup.net/ https://www.whatismy…p-whois-lookup/ http://whatstheirip.com http://getthierip.com Skype Resolvers: http://skypegrab.net/resolver.php http://www.skresolver.com/index.php http://resolvethem.com/ https://www.hanzresolver.com/skype2 https://skype-resolver.org/ http://mostwantedhf.info/ http://orcahub.com/skyperesolver.php https://booter.xyz/skype-resolver/ http://cstress.net/skype-resolver/ http://iskyperesolve.com/ https://ddosclub.com…olver/index.php WHOIS / Website Recon: https://www.whois.net/ http://whois.icann.org/en https://who.is/ http://www.whois.com/whois http://www.whois.com/ http://www.statsinfinity.com/ Image Lookup: http://www.tineye.com/ http://saucenao.com/ http://www.photobucket.com/ https://images.google.com/?gws_rd=ssl IP2Skype: http://skypegrab.net/ip2skype.php https://resolvethem.com/ip2skype.php http://www.skresolve…ip-to-skype.php http://mostwantedhf.info/ip2skype.php https://www.hanzresolver.com/ip2skype http://skype2ip.ninja/ip2skype.php https://pkresolver.nl/ip2skype.php http://www.chromeres…fo/IP2Skype.php Email2Skype: http://mostwantedhf.info/email.php http://www.skresolve…il-to-skype.php https://www.hanzreso …com/emaillookup https://resolvethem.com/email.php http://freetool.tk/email2skype.php http://skypegrab.net/email2skype.php Skype2Lan: http://www.skresolve…kype-to-lan.php Skype2Email: http://skypegrab.net/skype2email.php https://pkresolver.nl/skype2email.php MAC Address Lookup: http://www.coffer.com/mac_find/ http://www.whatsmyip…address-lookup/ http://www.macvendorlookup.com/ http://macaddresslookup.org/ http://aruljohn.com/mac.pl Location: (Latitude / Longitude) http://www.latlong.net/ http://itouchmap.com/latlong.html http://stevemorse.org/jcal/latlon.php EXIF Data: http://regex.info/exif.cgi http://exif-viewer.com/ http://metapicz.com/#landing http://www.verexif.com/en/ http://www.findexif.com/ http://www.prodraw.n…exif-viewer.php http://exifdata.com/ IP Loggers: http://BannedWebsite/ http://blasze.com/ Other: (Not Organized Yet) http://wink.com/ http://www.abika.com/ http://www.freeality.com/ http://radaris.com/ http://twoogel.com/ http://www.advancedbroundchecks.com http://www.spokeo.com/ http://www.pipl.com/ http://wink.com/ http://www.peekyou.com/ http://yoname.com/ https://www.linkedin.com/ http://search.yahoo.com/ https://google.com/ https://bing.com/ https://reddit.com/ http://www.yellowpagesgoesgreen.org/ http://aad.archives…st.jsp?cat=GS29 http://www.numberway.com/uk/ https://www.vinelink…link/initMap.do http://www.jailbase…ources/fl-lcso/ http://publicrecords…nesearches.com/ https://www.Intelius.com/ http://www.zoominfo.com/s/#search http://skipease.com/ https://www.advancedroundchecks.com http://www.PublicRecordsNow.com
Mostrar todo...
❤️If you have any material which can help peoples then share with us and get Credits No promotion No Other Group Forwarded ( Copy Past can be considered ) Using this bot ☑️ @IHCF_bot
Mostrar todo...
2021 CEH COURSE Skills Required for becoming CEH -Identify loopholes -Knowledge of penetration testing -Addresses risk of transitioning to the cloud -Prepares for a real-time attack -Uses real hacking tools carry out the attack -Reduces loss in the case of an incident COURSE https://mega.nz/folder/rlYU0KBC#xE3EQgXWTPq1z8D6qvAdRA
Mostrar todo...
11.95 GB folder on MEGA

225 files and 25 subfolders

🔰 CertNexus CyberSec First Responder 🔰 Prepare for the CertNexus CyberSec First Responder Exam... COURSE LINK :- https://mega.nz/folder/qlIR2KYD#at9gzDqF-_IcT4EbL5yH3A SHARED BY : @anonymous_ib 🔺𝕾𝖍𝖆𝖗𝖊 𝕬𝖓𝖉 𝕾𝖚𝖕𝖕𝖔𝖗𝖙 🔻
Mostrar todo...
4.38 GB folder on MEGA

47 files

Mostrar todo...
Video: Hackers demand $50 million from Acer in ransomware attack

A ransomware group is reportedly giving the Taiwanese computer maker until Sunday to pay up or its stolen data will be leaked.

Elige un Plan Diferente

Tu plan actual sólo permite el análisis de 5 canales. Para obtener más, elige otro plan.