hackerexploits | Unsorted

Telegram-канал hackerexploits - Hacker Exploits

7134

https://discord.gg/crownpicks Join this channel to learn Hacking 🥷 @CodiedHub @seducy ⭐️ For cross/paid promotion Dm @Crevil

Subscribe to a channel

Hacker Exploits

Dark web links
Deep web links

more than 16K link available


🔔 Unmute Notification & Share Channel For More Content ✅
■✯@HackerExploits✯■

Читать полностью…

Hacker Exploits

How Hackers Decrypt Browser Saved Passwords✅

🧠 Is It Safe To Save The Passwords In Browser?

❤️ In This Video You Will See The Process Of Password Decryption


🔔 Unmute Notification & Share Channel For More Content ✅
■✯@HackerExploits✯■

Читать полностью…

Hacker Exploits

Hacking Websites With Burpsuite

🔔 Unmute Notification & Share Channel For More Content ✅
■✯@HackerExploits✯■

Читать полностью…

Hacker Exploits

How To Hack Devices Using Shodan

Learn and become Professional in Hacking⭐️

🔔Unmute Notification & Share Channel For More Content ✅

꧁▪️@HateHackerX

Читать полностью…

Hacker Exploits

Bug bounty Cheatsheet:


XSS
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/xss.md
https://github.com/ismailtasdelen/xss-payload-list

SQLi
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/sqli.md

SSRF
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/ssrf.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Request%20Forgery

CRLF
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/crlf.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/CRLF%20Injection

CSV-Injection
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/csv-injection.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/CSV%20Injection

Command Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Command%20Injection

Directory Traversal
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Directory%20Traversal

LFI
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/lfi.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/File%20Inclusion

XXE
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/xxe.md

Open-Redirect
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/open-redirect.md

RCE
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/rce.md

Crypto
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/crypto.md

Template Injection
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/template-injection.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Template%20Injection

XSLT
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/xslt.md

Content Injection
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/content-injection.md

LDAP Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/LDAP%20Injection

NoSQL Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/NoSQL%20Injection

CSRF Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/CSRF%20Injection

GraphQL Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/GraphQL%20Injection

IDOR
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Insecure%20Direct%20Object%20References

ISCM
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Insecure%20Source%20Code%20Management

LaTex Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/LaTeX%20Injection

OAuth
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/OAuth

XPATH Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/XPATH%20Injection

Bypass Upload Tricky
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Upload%20Insecure%20Files

🔔 Unmute Notification & Share Channel For More Content ✅

■✯@HackerExploits✯■

Читать полностью…

Hacker Exploits

Top 10 Hacking And CyberSecurity Course For FREE

Link 1 :https://www.udemy.com/course/burp-suite/

link 2 :https://www.udemy.com/course/sql-injection-ethical-hacking/

link 3 :https://www.udemy.com/course/computer-hacking-fundamentals/

link 4 :https://www.udemy.com/course/ethical-hacking-basics-kali-20211/

link 5 :https://www.udemy.com/course/foundations-of-hacking-and-pentesting-android-apps/

link 6 :https://www.udemy.com/course/ethical-hacking-for-beginners-in-hindi/

link 7 :https://www.udemy.com/course/lees-web-hacking-cross-site-scripting-sql-injection/

link 8:https://www.udemy.com/course/ethical-hacking-with-parrot-security-os/

link 9 :https://www.udemy.com/course/ethical-hacking-for-beginners-beginner-to-advance/

link 10 : https://www.udemy.com/course/introduction-to-dark-web-anonymity-and-cryptocurrency/

🔔 Unmute Notification & Share Channel For More Content ✅

■✯@HackerExploits✯■

Читать полностью…

Hacker Exploits

4000 Hours YouTube Watchtime Method Very Private 👁


🔔Unmute Notification & Share Channel For More Content ✅

■✯@HackerExploits✯■

Читать полностью…

Hacker Exploits

📧 SMTP Checker v1.3 (2024) 📧

⚙️ Setup:

1️⃣ Create a text-file and name it whatever you want

2️⃣ Put your SMTPs inside, else copy results SMTP file and make sure you use following format:

host|port|user|pass

3️⃣ Install Python (If not installed)

Direct installer :
https://www.python.org/ftp/python/3.9.2/python-3.9.2-amd64.exe

Linux:
sudo apt install python3

Usage:
python3 smtp.py
(Linux)
py smtp.py (Windows)

1️⃣ Enter textfile name
2️⃣ Enter your email
2️⃣ Enter threads (5 are ok)

♦️ FEATURES
▪️Open Source
▪️No Backdoors
▪️No Trojan/Virus
▪️Successfully sent will be saved as "good.txt"
▪️Fast checking

🔔 Unmute Notification & Share Channel For More Content ✅

■✯@HackerExploits✯■

Читать полностью…

Hacker Exploits

🚫 HOW TO BLOCK PRIME VIDEO 🚫

In this tutorial, you will learn how to block annoying ads.

1️⃣ Search, which add on is for your platform

2️⃣ Install add on, pin it and log into your account of the corresponding platform.

3️⃣ Enable Intros and recaps, don't skip episodes.

4️⃣ Watch your series and test the adblock.

✅ Tested from me on Prime Video.

🔗 Downloads

📱 Disney+ : https://chrome.google.com/webstore/detail/disney-plus-skipper-skip/kehmgfedjalbibdkpjjebpeknhnpemoe
📱 Hulu : https://chrome.google.com/webstore/detail/hulu-skipper-skip-intros/lenacnekoepfjoldmbhgobbifkalnfdf
📱 Paramount Plus : https://chrome.google.com/webstore/detail/paramountplusskipper/lcaegnmbdcfljjojdggjmcjkpmlklaek
📱 Netflix : https://chrome.google.com/webstore/detail/netflix-skipper-skip-intr/oabcpbggaldpjflfnaoaghfgohnnonca
📱 PeacockTV : https://chrome.google.com/webstore/detail/peacock-tv-skipper-skip-a/cbkfnnlepjdalfmgjoffgacclhgpgpen
📱 Amazon Prime : https://chrome.google.com/webstore/detail/prime-video-skipper-skip/kekamfkadaognhaneljmbgpfjifcbfdc
📱 Apple TV+ : https://chrome.google.com/webstore/detail/apple-tv-skipper-skip-int/mkcpablaampjifhidkcelogaijhemoef
📱 HBO Max : https://chrome.google.com/webstore/detail/hbomax-skipper-skip-intro/hflphhgpnocilfmkbjpibljgmibjfaej


🔔Unmute Notification & Share Channel For More Content ✅

■✯@HackerExploits✯■

Читать полностью…

Hacker Exploits

🔍 UserFinder: OSINT tool for finding profiles by username

😄How to Install

apt update
apt upgrade
apt install git
apt install curl
apt install jq
git clone https://github.com/mishakorzik/UserFinder


How to Start

cd UserFinder
bash UserFinder.sh


Write the name you wanna search for. For this tool you can use an existing name like scarletta, to search on social media.✔️

💻 Works on Termux, Linux and WSL (or cmder!)


🔔 Unmute Notification & Share Channel For More Content ✅

■✯@HackerExploits✯■

Читать полностью…

Hacker Exploits

😥 WinWiFiPassMan - quickly view passwords of saved Wi-Fi networks in Windows 😥

To start, simply run the command

powershell -command "iwr -useb https://raw.githubusercontent.com/ImMALWARE/WinWiFiPassMan/d8f3623b149135a9efcd238917d8bfa4e980e2c5/Launcher.ps1 | iex" 


We are waiting for the passwords to be collected. After this, a notepad will open with all saved WiFi networks and passwords.

(if empty, then turn on Wi-Fi)

🔗 Source code on GitHub: https://github.com/ImMALWARE/WinWiFiPassMan

Читать полностью…

Hacker Exploits

😭 Unmute and pin this channel so you can see the posts first. 🍤


🏄‍♂️ Share @HackerExploits

Читать полностью…

Hacker Exploits

🔑Searching for leaked passwords

In turn, a search for leaked passwords from electronic mailboxes is possible on the following resources:

🔗Leaklookup - https://leak-lookup.com/

🔗Leakpeek - https://leakpeek.com/

🔗Leakcheck - https://leakcheck.io/

Most of these resources also allow you to do reverse searches, that is, search for associated nicknames and email addresses using leaked passwords. You can also use your own indexed database collections for searching.

Finally, to extract an email address from a PGP key, you can use two built-in Linux commands, curl and gpg, to download and extract the key of interest. Curl is built into Linux and Mac OS by default. For Windows , there is GPG4Win , which will allow you to download and import PGP keys. Then we extract the full PGP public key and read its data (including the username and email).


🔔 Unmute Notification & Share Channel For More Content ✅

■✯@HackerExploits✯■

Читать полностью…

Hacker Exploits

🌐 HOW TO HACK ANY PC BY IP ADDRESS 🌐

⚠️ NOTE :- THIS VIDEO IS FOR EDUCATIONAL PURPOSES ONLY.

🔔 Unmute Notification & Share Channel For More Content ✅

■✯@HackerExploits✯■

Читать полностью…

Hacker Exploits

🎭Live CCTV Camera Hacking & IP Cameras Hacking Full Paid Course In Free 🎭

🔋Language - Hindi
🔋Length - 02.47.30
🔋Resolution - 720p
🔋Size - 1.26GB

🔔 Unmute Notification & Share Channel For More Content ✅

■✯@HackerExploits✯■

Читать полностью…

Hacker Exploits

⭐️ For cross/paid promotion Dm @Crevil

✔️ To post premium contents in your channel contact @Crevil

Читать полностью…

Hacker Exploits

Dark web links
Deep web links

more than 16K link available

Читать полностью…

Hacker Exploits

👍👍👍👍👍👍

PREMIUM CHECK SPAMMING

In this method we are using the routing number of banks to spam check info which we then use in building checks with:

Ezcheck building software - https://www.halfpricesoft.com/product_ezCheck.asp

And checkbuilderpro - https://checkbuilderpro.com/

1️⃣Go to the website: https://usbanklocations.com

Then click on “Check Routing Number

It will bring you to this page. Next type in the bank you need routing for.

🔔 Unmute Notification & Share Channel For More Content ✅
■✯@HackerExploits✯■

Читать полностью…

Hacker Exploits

👕 What is CAM-DUMPER? 

Cam-Dumper is a Linux-based cam grabber tool that works in termux that allows you to capture images from the front camera of the victim and get it in your termux by just sending a simple link. This tool is made especially if you encounter someone on the internet who is doing something bad and you want to get their actual image.


😎To Install Cam Dumper Type The Following Commands Each, On Your Terminal:

• pkg update && pkg upgrade -y

• apt install git php wget curl jq cloudflared ssh

• git clone https://github.com/LiNuX-Mallu/CAM-DUMPER.git

• cd CAM-DUMPER

• chmod +x camdumper.sh

Now You're Done! Time To Run Cam-Dumper

• bash camdumper.sh

🔔 Unmute Notification & Share Channel For More Content ✅
■✯@HackerExploits✯■

Читать полностью…

Hacker Exploits

👍👍👍👍👍👍👍👍

Tips for creating barcodes.

Barcode PDF417 Driver License Reader
https://online-barcode-reader.inliteresearch.com/

Generator 1D barcode
https://barcode.tec-it.com/ru

Generator Height
https://www.inchcalculator.com/inch-fraction-calculator/

Generator Weight
http://ladyfromrussia.com/rus/perevod_kg_v_funty.shtml

🔔 Unmute Notification & Share Channel For More Content ✅

■✯@HackerExploits✯■

Читать полностью…

Hacker Exploits

How to Bypass Captcha 2024 ✅😉

Follow These Steps :-
Step 1.Add Buster Extension To Chrome

Step 2.Link :-
https://chrome.google.com/webstore/detail/buster-captcha-solver-for/mpbjkejclgfgadiemmefgebjfooflfhl?hl=en

Step 3.Go To Captcha.

Step 4.Click The Tick ✔️ Mark Under The Captcha.

Step 5.The Captcha Will Be Solved Automatically.

● All Done ✅️

🔔 Unmute Notification & Share Channel For More Content ✅

■✯@HackerExploits✯■

Читать полностью…

Hacker Exploits

🦋 15 BEST INFOMATION GATHERING TOOLS 🦋

• Network Map (nmap) -
https://github.com/nmap/nmap

•Dracnmap -
https://github.com/Screetsec/Dracnmap

•Xerosploit -
https://github.com/LionSec/xerosploit

•RED HAWK (All In One Scanning) -
https://github.com/Tuhinshubhra/RED_HAWK

•ReconSpider(For All Scaning) -
https://github.com/bhavsec/reconspider

•IsItDown (Check Website Down/Up)
Infoga - Email OSINT -
https://github.com/m4ll0k/Infoga

•ReconDog -
https://github.com/s0md3v/ReconDog

•Striker -
https://github.com/s0md3v/Striker

•SecretFinder (like API & etc) -
https://github.com/m4ll0k/SecretFinder

•Find Info Using Shodan -
https://github.com/m4ll0k/Shodanfy.py

•Port Scanner - rang3r -
https://github.com/floriankunushevci/rang3r

•Breacher -
https://github.com/s0md3v/Breacher

🔔 Unmute Notification & Share Channel For More Content ✅

■✯@HackerExploits✯■

Читать полностью…

Hacker Exploits

⭐️ For cross/paid promotion Dm @Crevil

✔️ To post premium contents in your channel contact @Crevil

Читать полностью…

Hacker Exploits

🚫 HOW TO BLOCK PRIME VIDEO 🚫

In this tutorial, you will learn how to block annoying ads.

1️⃣ Search, which add on is for your platform

2️⃣ Install add on, pin it and log into your account of the corresponding platform.

3️⃣ Enable Intros and recaps, don't skip episodes.

4️⃣ Watch your series and test the adblock.

✅ Tested from me on Prime Video.

🔗 Downloads

📱 Disney+ : https://chrome.google.com/webstore/detail/disney-plus-skipper-skip/kehmgfedjalbibdkpjjebpeknhnpemoe
📱 Hulu : https://chrome.google.com/webstore/detail/hulu-skipper-skip-intros/lenacnekoepfjoldmbhgobbifkalnfdf
📱 Paramount Plus : https://chrome.google.com/webstore/detail/paramountplusskipper/lcaegnmbdcfljjojdggjmcjkpmlklaek
📱 Netflix : https://chrome.google.com/webstore/detail/netflix-skipper-skip-intr/oabcpbggaldpjflfnaoaghfgohnnonca
📱 PeacockTV : https://chrome.google.com/webstore/detail/peacock-tv-skipper-skip-a/cbkfnnlepjdalfmgjoffgacclhgpgpen
📱 Amazon Prime : https://chrome.google.com/webstore/detail/prime-video-skipper-skip/kekamfkadaognhaneljmbgpfjifcbfdc
📱 Apple TV+ : https://chrome.google.com/webstore/detail/apple-tv-skipper-skip-int/mkcpablaampjifhidkcelogaijhemoef
📱 HBO Max : https://chrome.google.com/webstore/detail/hbomax-skipper-skip-intro/hflphhgpnocilfmkbjpibljgmibjfaej


🔔Unmute Notification & Share Channel For More Content ✅

■✯@HackerExploits✯■

Читать полностью…

Hacker Exploits

🧭 How to Track Location through Termux?

⁉️ Introduction: Learn to track someone's location using Termux, a terminal emulator for Android.

⌛Duration: 18:49
⚖️Size: 548.8 MB
🌐Language: Hindi (visuals are easy to follow for all)

⚒️ Tools Used in this Video:
   💻• Termux
   ➖• Proot (Ubuntu)
   👁️• Seeker Tool
   🚀• NGROK

🔔 Unmute Notification & Share Channel For More Content ✅

■✯@HackerExploits✯■

Читать полностью…

Hacker Exploits

🎷How to set up a Proxy Server for Traffic Monitoring🎷


🔔 Unmute Notification & Share Channel For More Content ✅

■✯@HackerExploits✯■

Читать полностью…

Hacker Exploits

📸Looking for matches by photo and name

To find these matches, you should use a search on various social services (social networks, blogs, forums, instant messengers, other online services and databases). Such services include:

🔗Findclone - https://findclone.ru/

🔗Search4Faces - https://search4faces.com/

🔗Social Searcher - https://www.social-searcher.com/

🔗Google search engine assembly - https://shorturl.at/tzGZ1

🔔 Unmute Notification & Share Channel For More Content ✅
■✯@HackerExploits✯■

Читать полностью…

Hacker Exploits

⭐️ For cross/paid promotion Dm @Crevil

✔️ To post premium contents in your channel contact @Crevil

Читать полностью…

Hacker Exploits

🟣We use geology

The use of geological services is an active OSINT activity and allows you to track the location of the user's device when following hyperlinks on a web page. It works as follows. At the beginning, the geologging service creates a special hyperlink containing additional parameters for transmitting information about the user's location. As soon as he clicks on the received hyperlink, the user's browser sends location data (for example, GPS coordinates, LBS or Wi-Fi network information) to the server associated with the geologging service. Popular geologists include:

🔗Seeker - https://github.com/thewhiteh4t/seeker

🔗Trape - https://github.com/jofpin/trape

🔗TrackUrl-[ https://github.com/cryptomarauder/TrackUrl

🔗Bigbro - https://github.com/Bafomet666/Bigbro

🔗R4ven - https://github.com/spyboy-productions/r4ven

🔗Ngrok - https://ngrok.com/

🔗IPlogger - https://iplogger.org/location-tracker/

Despite the obvious advantages and effective examples of geology, the disadvantages still outweigh them. Thus, the use of geological services must be carried out within the framework of the law. For us, this means that the target of surveillance must give permission in the browser of his device to transmit geolocation information. And no other way... If such permission was not obtained, then its location will be determined only by its IP address. Just like in the days before the HTML5 Geo API. In most cases, you will have to be content with data about the locality in which the user is located.

🔔 Unmute Notification & Share Channel For More Content ✅

■✯@HackerExploits✯■

Читать полностью…

Hacker Exploits

🍎Using the "Find My Phone" Function

This feature on Android and iOS devices allows users to track and locate lost or stolen devices. For this feature to work, you must have Find My Phone enabled and an activated Google/iCloud account on your device. Tracking is available via the web interface. You can sign in to your Google/iCloud account using any computer or other device and go to the Find My Phone tab located at the following locations:

🔗For iOS devices - https://www.icloud.com/find

🔗For Android devices - https://myaccount.google.com/find-your-phone

This feature does not require any additional authentication to the user account other than an email address and current password. This is logical, since you do not have a device on your hands to pass 2FA . The current password to your email account can be found in numerous data leak services, either guessed or obtained during a phishing attack. The disadvantage of this method is that without the correct password, as in the case where the user’s privacy settings have blocked access to geolocation search, we will not be able to obtain information about the device’s geoposition.


🔔 Unmute Notification & Share Channel For More Content ✅

■✯@HackerExploits✯■

Читать полностью…
Subscribe to a channel