cookie

ما از کوکی‌ها برای بهبود تجربه مرور شما استفاده می‌کنیم. با کلیک کردن بر روی «پذیرش همه»، شما با استفاده از کوکی‌ها موافقت می‌کنید.

avatar

☠ 𝙃𝙖𝙘𝙠𝙚𝙧'𝙨 𝙈𝙖𝙩𝙚™(🇮🇳)

🚩 Channel was restricted by Telegram

نمایش بیشتر
کشور مشخص نشده استزبان مشخص نشده استدسته بندی مشخص نشده است
پست‌های تبلیغاتی
1 371
مشترکین
اطلاعاتی وجود ندارد24 ساعت
اطلاعاتی وجود ندارد7 روز
اطلاعاتی وجود ندارد30 روز

در حال بارگیری داده...

معدل نمو المشتركين

در حال بارگیری داده...

Please note that our moderators had to block the following messages in your channel @W_HAT_H due to copyright infringement: https://t.me/c/1219644958/8178
نمایش همه...
Modded bot dm
نمایش همه...
🌺Find out the IP address via Telegram🌺 No iploggers or anything else. Call only, telegram and wireshark: 1. Download wireshark, open it and in the filter we must specify the protocol we need - STUN 2. Click on the "magnifying glass" (Find a package) and see how we will have a new line with parameters and a search line. There we select the parameter String 3. In the line we write XDR-MAPPED-ADDRESS 4. Turn on wireshark and call via Telegram. As soon as the user answers the call, we will immediately start displaying data and among them will be the IP address of the user who was called. 5. To understand what kind of IP we need, click on the already configured search engine Find, look in the line XDR-MAPPED-ADDRESS and what comes after it is the IP we need. Use wisely. Or don't use it, but at least protect yourself by disabling the ability to receive calls in the settings, or by transferring all "important" conversations to secret chats. 👌‌ What traces do we leave on the web. What traces do we leave on the web. When visiting any site, we leave a lot of data about ourselves, starting with the IP address and ending with digital prints, which are formed from all available data about the system, browser and plugins. These fingerprints are called “fingerprints” .it They are unique identifiers of 32 characters and are formed from several types of data: language settings, fonts installed on the system, time zone, browser plugins, screen resolution, etc. Thus, it is possible to identify a specific user simply by comparing the fingerprints obtained by the site. At the same time, changing the IP address does not affect the print in any way! About 90% of all browsers are unique! And the only thing we can do is get into the largest category possible. If you have a standard browser installed, without extensions, etc., then you will be identical to about 800 thousand users! Each next add-on makes you more unique. For example, installing the NoScript plugin reduces the uniqueness by 50%. All information about the system is hidden in the TOR browser, but this backfires and makes the user stand out from the rest, although it provides a minimum of information to sites. For example, when JS is enabled, the site can see your screen resolution (you may have seen a warning pop up in the browser itself, which is open in full screen). Here is a list of the main fingerprints: • Canvas fingerprint - obtained using JavaScript. Different systems and browsers render images in different ways. Based on this, a unique imprint is formed; • Screen Size and Color Depth - screen resolution; • Browser Plugin Details - information about installed plugins; • Time Zone - Time zone; • ETag - identifier that is formed from the contents of the browser cache; • Language - system language; • Hash of WebGL fingerprint - information about 3-D graphics. Contains information about the video card, etc. • Font Fingerprints - fonts, installed on the system; How to protect yourself from identification? • Disable JavaScript (we will immediately remove Canvas prints, WebTRC); • Disable saving cookies and cache; • To change information about the browser, for example, there is a plug-in Random Agent Spoofer; • Use a clean browser without unnecessary add-ons. Sites where you can view your prints:http://ipleak.com/ BrowserLeaks.com - Web Browser Security Checklist for Identity Theft Protection How to find and check IP address. https://telegra.ph/GHOST-FRAMEWORK-09-29 🍎Regards:@KALINGRAAJ
نمایش همه...
GHOST FRAMEWORK

Ghost Framework -- Control Android Devices Remotely Ghost Framework is an Android post-exploitation framework that uses an Android Debug Bridge to remotely access and control devices Ghost Framework gives us the power and convenience of remote Android device administration.

🈂️ Cracking passwords from the core Network 🈂️ The best place to intercept passwords is in the core of the network, where traffic of all users goes to closed resources (for example, mail) or in front of the router to access the Internet, when registering with external resources. We set up a mirror and we are ready to feel like a hacker. Happy reading! 📖 Read article https://hackfreaks.medium.com/cracking-passwords-from-the-core-network-868aeb98df1e 📖 Let's intercept Network 😎 👤 Author : @Aasr12| #keylogger #keylogging Share and support our channel ❤️
نمایش همه...
Cracking passwords from the core Network

we’ll Intercept passwords is in the core of the network. Now, then sit down more comfortably Freaks, we begin.

نمایش همه...
How To Bypass Web Application Firewall?

⭕🔱🇰‌🇦‌🇱‌🇮™🔱⭕ Web application firewall or WAF for short is becoming an essential part of your personal or client’s website. It is important that your WAF is up-to-date with the latest cyber threats and methods as there are new methods and threats coming out on a daily basis. Websites are prime targets in cyber attacks and because of one overlooked issue, the business and reputation can be ruined. There are three WAF operation models that can be categorized in: Whitelist (accepts known good) Blacklist (reject…