cookie

Utilizamos cookies para mejorar tu experiencia de navegación. Al hacer clic en "Aceptar todo", aceptas el uso de cookies.

avatar

ꜱᴏʟᴏ ᴄʏʙᴇʀ ᴏꜰꜰɪᴄɪᴀʟ

Publicaciones publicitarias
2 826
Suscriptores
Sin datos24 horas
-17 días
-1230 días

Carga de datos en curso...

Tasa de crecimiento de suscriptores

Carga de datos en curso...

Silk road to Bug Hunting ⚙️This is a road map that will almost lead to professionalism, and in the end, everyone has a style and method of learning https://drive.google.com/file/d/1UYsZGqD5GVftQF7Y7r29uUDhBhrf3U76/view?usp=sharing Windows Fundamentals • Learn how use computer • How to use the Internet • How to Searching for information in search engines professionally • How to Use Chat GBT to obtain information on a specific topic A+ Certification https://mega.nz/folder/zSpnzKKD#UPhqD2NZBoM3ImhvMsx9qA Network • Network Concepts • Network Protocols • Network Topologies • Network Devices • IP Addressing and Subnetting • Network Security • Network Troubleshooting • Wireless Networking Network+ Cert https://mega.nz/folder/fC5njSyR#NMw88ZzRaYhDTSmYewodXA Linux • Ways to use tools in a system • Linux command line https://learn.microsoft.com/en-us/training/paths/shell/ Programming Languages C++  ) You need to learn this language because it helps you learn other languages ( • Syntax and Basic Structure • Data Types • Variables and Constants • Operators • Control Flow • Functions • Arrays and Vectors • Pointers and References • Object-Oriented Programming (OOP) • File I/O • Exception Handling https://elzero.org/study/cplusplus-study-plan/ HTML + CSS  ) You need them to understand how the website is designed( https://elzero.org/study/html-2021-study-plan/ https://elzero.org/study/css-2021-study-plan/ JavaScript  • DOM Manipulation • XSS ( R , S , Dom ) • Client-Side Validation • AJAX and Web APIs • Event Handling • JavaScript Security Headers • Browser Security Features • JavaScript Obfuscation Techniques • Client-Side Storage https://mega.nz/folder/ya5W0Lxa#Ocx3Gbtkv8PqSzzSpG6PfA https://mega.nz/folder/ub40ARZD#TmsUGA1MK4_-lVbRvJG-QQ JSON • JSON Injection • Input Validation • JSON Schema Validation • Data Encoding and Escaping • Client-Side JSON Handlin • Server-Side JSON Processing • JSON Web Tokens (JWT) • Secure JSON APIs • Security Testing Techniques PHP & Laravel • Authentication and Authorization • Input Validation • Route Protection • Database Security • Error Handling and Logging • Session Management • File Upload Security • Security Headers and Middleware • Third-Party Package Security https://elzero.org/study/php-bootcamp-2022-study-plan/ MYSQL • SQL Injection (SQLi) • Input Validation and Prepared Statements • Privilege Escalation • Database Configuration • Data Encryption and Hashing • Security Vulnerability Assessment Tools https://mega.nz/folder/wswGEIhb#tsqUggTZyfy5HyRWUkV9sg/folder/FgQRyaqb Bash script ) You can learn it at any time with the other languages above( • Command Line Basics • Shell Scripting Basics • File System Operations • Text Processing • System Administration Tasks • System Configuration Analysis • Log Analysis • Network Monitoring and Analysis https://mega.nz/folder/CGBj3S5S#UT2y_zzEcV8MybIEHvhpGQ Also after that you can increase your experience in important languages • Python • Ruby • Graphql Web Application Security • Security Vulnerabilities ) XSS , CSRF , IDOR , SQLI , authentication bypass, … ETC ) • Concurrency and Race Conditions • Memory Leaks and Memory Corruption Hackfreaks official • Buffer Overflows and Underflows • Logic Errors • Input Validation and Sanitization • Resource Leaks • Performance and Scalability Issues • ETC ….. Start Hack • Select your goal • Learn How to Enumeration • Learn how to recon ) Active & Passive Reconnaissance ) • Learn how to search for site files & folder • Record your notes as you work • Find out what dangerous information is being leaked and can report it • Learn how to extract visible and hidden parameters • Learn how to exploit the security vulnerability • Try to escalate the vulnerability to the maximum extent possible • Learn how to understand the severity status of any vulnerability • Learn how to write a report correctly Whenever you learn, always know that you are a beginner, so expand your knowledge credit: Hack Freaks (Aasr12)
Mostrar todo...
OSINT Virtual machines and distributions for Practice • Osintux : http://www.osintux.org/ • BackBox : https://www.backbox.org/ • osintBOX : https://github.com/Dimaslg/osintBOX • CSI Linux : https://csilinux.com/ • Kali Linux : https://www.kali.org/get-kali/ • ArchStrike : https://archstrike.org/ • Offen Osint : https://github.com/Double2Sky/OffenOsint • Huron Osint : https://github.com/HuronOsint/OsintDistro • Septor Linux : https://septor.sourceforge.io/ • Pentoo Linux : https://www.pentoo.ch/ • Tsurugi Linux : https://tsurugi-linux.org/downloads.php • BlackArch Linux : https://www.blackarch.org/ • Falcon Arch Linux : https://sourceforge.net/projects/falcon-archlinux/ • Fedora Security Lab : https://labs.fedoraproject.org/security/download/index.html • TraceLabs OSINT VM. : https://www.tracelabs.org/initiatives/osint-vm Credits - unknown
Mostrar todo...
GitHub - Dimaslg/osintBOX: Script to modify a Parrot OS distro with the most popular OSINT tools

Script to modify a Parrot OS distro with the most popular OSINT tools - Dimaslg/osintBOX

Repost from Vendors . Emporium
Photo unavailableShow in Telegram
😀 VERIFIED VENDOR'S 😀 Doc - The Verifier Of The Verified 🔺 USERNAME: @DocTheSystem 🔺 USER ID: 1720325842 🔺 NAME: Doc 🔺 TRUSTED: 😀 🔺 VERIFIED: 😀 🔺 ADMIN STATUS: 😀 🔺 ID PROOF/CONTACT: 😀 🔺 ESCROW: 😀 🔺 Customer Quality Vouch: 😀 Anyone wanting to Apply to become a Verified Vendor for The Federation Needs To Contact [CONSIGLIER] 𝐍𝐄𝐄𝐃 100 𝐕𝐎𝐓𝐄𝐒 𝐀𝐓𝐋𝐄𝐀𝐒𝐓 𝐓𝐎 𝐕𝐄𝐑𝐈𝐅𝐘 𝐘𝐎𝐔. 𝗜𝗙 𝗠𝗢𝗥𝗘 𝗧𝗛𝗔𝗡 𝟰𝟬 𝗗𝗢𝗪𝗡𝗩𝗢𝗧𝗘𝗦, 𝗪𝗘 𝗥𝗘𝗠𝗢𝗩𝗘 THE FEDERATIONS V𝗘𝗥𝗜𝗙𝗜𝗖𝗔𝗧𝗜𝗢𝗡. 😀 DON'T USE SMM. 😀😀😀😀😀😀🏪😀😀🤑😀 Owner of The Federation Want To Link Your Group To The Federation: /Joinfed 03c9d12a-1b21-41bd-9549-b66e383f9b67 Already Part Of A Federation: /Subfed 03c9d12a-1b21-41bd-9549-b66e383f9b67 Verified Vendors Personal Service/Product Tag's Begin After This [POST]
Mostrar todo...
Photo unavailableShow in Telegram
📝Bug Bounty Guide📝 Bug Bounty is based on finding vulnerabilities in certain software.‍To claim the bounty, bugs must be original and previously unreported ❇️Bug Bounty Platforms❇️ 🍎HackerOne
https://www.hackerone.com
🍎Bugcrowd
https://www.bugcrowd.com
🍎Synack
https://www.synack.com
🍎Detectify
https://cs.detectify.com
🍎Cobalt
https://cobalt.io
🍎Open Bug Bounty
https://www.openbugbounty.org
🍎Zero Copter
https://www.zerocopter.com
🍎Yes We Hack
https://www.yeswehack.com
🍎Hacking Guide
https://t.me/its_me_kali
🍎Vulnerability Lab
https://www.vulnerability-lab.com
🍎Fire Bounty
https://firebounty.com
🍎Bug Bounty
https://bugbounty.jp/
🍎Anti Hack
https://antihack.me
🍎Intigrity
https://intigrity.com/
🍎Safe Hats
https://safehats.com
🍎Red Storm
https://www.redstorm.io/
🍎Cyber Army
https://www.cyberarmy.id
🍎Yogosha
https://yogosha.com
🌴Course on Bugbounty🌴
https://mega.nz/folder/zjZ0FT6R#ZWDYwuL1fH2EIqrW-Mg6xA
☘Regards : @Majorkali ♡ ㅤ    ❍ㅤ    ⎙ㅤ  ⌲           ˡᶦᵏᵉ  ᶜᵒᵐᵐᵉⁿᵗ  ˢᵃᵛᵉ  ˢʰᵃʳᵉ
Mostrar todo...
Photo unavailableShow in Telegram
📝IOT Hacking Guide📝 
𝐓𝐡𝐞 𝐈𝐧𝐭𝐞𝐫𝐧𝐞𝐭 𝐨𝐟 𝐓𝐡𝐢𝐧𝐠𝐬, 𝐨𝐫 𝐈𝐨𝐓, 𝐢𝐬 𝐚 𝐭𝐞𝐫𝐦 𝐮𝐬𝐞𝐝 𝐭𝐨 𝐝𝐞𝐬𝐜𝐫𝐢𝐛𝐞 𝐝𝐞𝐯𝐢𝐜𝐞𝐬 𝐜𝐨𝐧𝐧𝐞𝐜𝐭𝐢𝐧𝐠 𝐭𝐨 𝐭𝐡𝐞 𝐢𝐧𝐭𝐞𝐫𝐧𝐞𝐭 𝐭𝐡𝐚𝐭 𝐚𝐫𝐞𝐧'𝐭 𝐩𝐫𝐢𝐦𝐚𝐫𝐢𝐥𝐲 𝐜𝐨𝐦𝐩𝐮𝐭𝐞𝐫𝐬 -- 𝐚𝐧𝐲𝐭𝐡𝐢𝐧𝐠 𝐟𝐫𝐨𝐦 𝐚 𝐡𝐲𝐝𝐫𝐨𝐞𝐥𝐞𝐜𝐭𝐫𝐢𝐜 𝐭𝐮𝐫𝐛𝐢𝐧𝐞 𝐭𝐨 𝐚 𝐭𝐨𝐚𝐬𝐭𝐞𝐫. 𝐀𝐬 𝐦𝐨𝐛𝐢𝐥𝐞 𝐝𝐞𝐯𝐢𝐜𝐞𝐬 𝐩𝐫𝐨𝐥𝐢𝐟𝐞𝐫𝐚𝐭𝐞𝐝 𝐢𝐧 𝐭𝐡𝐞 𝐩𝐚𝐬𝐭 𝐝𝐞𝐜𝐚𝐝𝐞, 𝐡𝐚𝐜𝐤𝐞𝐫𝐬𝐡𝐚𝐯𝐞 𝐟𝐨𝐜𝐮𝐬𝐞𝐬 𝐨𝐧 𝐭𝐫𝐲𝐢𝐧𝐠 𝐭𝐨 𝐠𝐚𝐢𝐧 𝐚𝐜𝐜𝐞𝐬𝐬.
 
𝐈𝐨𝐓 𝐜𝐨𝐧𝐧𝐞𝐜𝐭𝐬 𝐚 𝐯𝐚𝐫𝐢𝐞𝐭𝐲 𝐨𝐟 𝐬𝐞𝐧𝐬𝐨𝐫𝐬, 𝐚𝐥𝐚𝐫𝐦𝐬, 𝐜𝐚𝐦𝐞𝐫𝐚𝐬, 𝐥𝐢𝐠𝐡𝐭𝐬, 𝐚𝐧𝐝 𝐦𝐢𝐜𝐫𝐨𝐩𝐡𝐨𝐧𝐞𝐬 𝐭𝐨 𝐩𝐫𝐨𝐯𝐢𝐝𝐞 𝟐𝟒/𝟕/𝟑𝟔𝟓 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲—𝐚𝐥𝐥 𝐨𝐟 𝐰𝐡𝐢𝐜𝐡 𝐜𝐚𝐧 𝐛𝐞 𝐜𝐨𝐧𝐭𝐫𝐨𝐥𝐥𝐞𝐝 𝐟𝐫𝐨𝐦 𝐚 𝐬𝐦𝐚𝐫𝐭 𝐩𝐡𝐨𝐧𝐞. 𝐅𝐨𝐫 𝐞𝐱𝐚𝐦𝐩𝐥𝐞, 𝐭𝐡𝐞 𝐑𝐢𝐧𝐠 𝐝𝐨𝐨𝐫𝐛𝐞𝐥𝐥 𝐜𝐚𝐦𝐞𝐫𝐚 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐬𝐲𝐬𝐭𝐞𝐦 𝐚𝐥𝐥𝐨𝐰𝐬 𝐮𝐬𝐞𝐫𝐬 𝐭𝐨 𝐬𝐞𝐞, 𝐡𝐞𝐚𝐫, 𝐚𝐧𝐝 𝐬𝐩𝐞𝐚𝐤 𝐭𝐨 𝐯𝐢𝐬𝐢𝐭𝐨𝐫𝐬 𝐚𝐭 𝐭𝐡𝐞𝐢𝐫 𝐝𝐨𝐨𝐫 𝐯𝐢𝐚 𝐚 𝐜𝐨𝐦𝐩𝐮𝐭𝐞𝐫, 𝐭𝐚𝐛𝐥𝐞𝐭, 𝐨𝐫 𝐦𝐨𝐛𝐢𝐥𝐞 𝐩𝐡𝐨𝐧𝐞.
🍍𝙂𝙪𝙞𝙙𝙚 🍍 https://telegra.ph/IOT-HACKING-BY-IMK-07-26 ☘Regards : @Majorkali ♡ ㅤ    ❍ㅤ    ⎙ㅤ  ⌲           ˡᶦᵏᵉ  ᶜᵒᵐᵐᵉⁿᵗ  ˢᵃᵛᵉ  ˢʰᵃʳᵉ
Mostrar todo...
Mostrar todo...
Federation Official Dealer's Scheme

The Federation, the world's most renowned e-commerce organization, which includes a dynamic and expanding team of neural network developers, is on the hunt for proactive and committed p2p dealers! Your primary responsibility will involve handling the sale of our bot's internal currency, namely credits. You'll engage with customers who reach out to you, process their payments through your account, distribute the credits, and promptly secure your commission. Rest assured, we'll ensure a steady flow of customers for you. This role is perfect for those who are frequently online, keen to monetize their time, and eager to contribute to a one-of-a-kind project! Here's what we offer: Lucrative earning prospects: Earn a percentage on each transaction you handle. Flexible working hours: All we require is for you to have sufficient free time and to be consistently reachable. Potential monthly income of over $1000, contingent on your preferred payment acceptance methods from customers. Qualifications: Proficient in…

ℹ️ Info : Export Telegram Group @SoloCyber1 #OSINT
Mostrar todo...
ExGroups v1.2.zip41.21 MB
✔️ Export Telegram Group ✔️ This tool is a private script that targets Telegram groups based on the Telegram API, identifying and extracting sufficient information to identify hidden individuals and admins in the groups. Installation and execution: Please install Python 3 on your virtual server or Windows. We have used the Telegram API, so you need to visit https://my.telegram.org/ and create an api_id and api_hash. Don't use VPN for that and paste link as "https://my.telegram.org/" Place your api_id and api_hash in the Exploit_Prv8.json file. After completing the installation and configuration, run the script and enjoy. 💎 Script features: 👉 Extract information from public and private groups. 👉 Identify bots, admins, and users in groups. 👉 Determine group creation time, date, and day. 👉 Count participants in groups. 👉 Retrieve user IDs of admins, bots, and users. 👉 Retrieve message IDs and sender names. 👉 Identify uploaded messages and media types. 👉 Retrieve file information sent by members. @SoloCyber1
Mostrar todo...

🎁SAVE🎁 ⏳ 𝙳𝚊𝚝𝚎 2024 3️⃣ → Connect up to 25 leading exchanges 4️⃣ → All PRO features are available to everyone for 30 days 5️⃣ → SOLVE, TABLE 6️⃣ → LEDGER, DEMAND 7️⃣ → BALANCE, MIGRATE, ACCOUNT 8️⃣ → STRATEGY, USERBASE, TRANSACT • Contact Admin to join the investment team (password available for all official partners) or the bot development crew. 🏠 𝙲𝚑𝚊𝚗𝚗𝚎𝚕: https://t.me/InternationalCryptoInvestment
Mostrar todo...
CryptoTradingBOT(Ze_PRO).rar5.64 MB
👍 1