malwarehell | Unsorted

Telegram-ะบะฐะฝะฐะป malwarehell - ๐™ˆ๐™–๐™ก๐™ฌ๐™–๐™ง๐™š ๐™ƒ๐™š๐™ก๐™ก ๐™“

-

โš ๏ธ Warning: Many users reported this account as a scam or a fake account. Please be careful, especially if it asks you for money.

Subscribe to a channel

๐™ˆ๐™–๐™ก๐™ฌ๐™–๐™ง๐™š ๐™ƒ๐™š๐™ก๐™ก ๐™“

I added almost all things of our channel in notes
To see notes type - /notes
To get any one type - /get
Or
Use #

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐™ˆ๐™–๐™ก๐™ฌ๐™–๐™ง๐™š ๐™ƒ๐™š๐™ก๐™ก ๐™“

๐Ÿ”ฅ Mobile Security: Reverse Engineer Android Apps From Scratch ๐Ÿ”ฅ

๐Ÿ“Œ Learn Android reverse engineering in less than 4 hours

๐Ÿ‘‰ TOPICS :

๐Ÿ‘‰ Course prerequisites
๐Ÿ‘‰ Intro to Android
๐Ÿ‘‰ Course/Lab setup
๐Ÿ‘‰ Developing a basic Android App
๐Ÿ‘‰ Analysing Android Apps
๐Ÿ‘‰ Case study: Analyzing real ransomware and developing a decryption tool

๐Ÿ”ฅ Course Content :-
6 Sections โ€ข 46 Lectures โ€ข 3h 10m Duration
๐Ÿ”œ Size - 1.41 GB

Password:- @hackertypo

#โƒฃ YOUR ONE REACTION MOTIVATE US #โƒฃ

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐™ˆ๐™–๐™ก๐™ฌ๐™–๐™ง๐™š ๐™ƒ๐™š๐™ก๐™ก ๐™“

Type /notes in grp to get all topic I posted on our channel

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐™ˆ๐™–๐™ก๐™ฌ๐™–๐™ง๐™š ๐™ƒ๐™š๐™ก๐™ก ๐™“

REVERSE ENGINEERING ROADMAP

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐™ˆ๐™–๐™ก๐™ฌ๐™–๐™ง๐™š ๐™ƒ๐™š๐™ก๐™ก ๐™“

๐ŸฅŒPDF Exploit + Tutorial

๐ŸŽ—๏ธHack PC by PDF

๐Ÿ’ขExploit:W32/PDF-Payload. Gen is a universal detection for Portable Document Format (PDF) documents that try to take advantage of vulnerabilities in the famous Adobe Acrobat Reader program. Security packages use accepted detections that seem to be for wide patterns of code or conduct to perceive comparable applications or files.

๐Ÿ“How do hackers use PDF files?

๐Ÿ’ขOpening a malicious PDF can launch malware that will begin up anything system the hacker has in mind. That is, by way of clicking on and opening a PDF or different file, a consumer additionally unknowingly begins up a predator program. Such assaults are technically feasible today, however much less common.


๐ŸŽˆNote: All our tutorial & files is only for educational purposes not to harm anyone

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐™ˆ๐™–๐™ก๐™ฌ๐™–๐™ง๐™š ๐™ƒ๐™š๐™ก๐™ก ๐™“

moz-extension://1a72efe7-0c96-451a-9d38-4f81a167a5b7/cookies.html?parent_url=

Extension to use cookies

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐™ˆ๐™–๐™ก๐™ฌ๐™–๐™ง๐™š ๐™ƒ๐™š๐™ก๐™ก ๐™“

I said reactions givee fast af

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐™ˆ๐™–๐™ก๐™ฌ๐™–๐™ง๐™š ๐™ƒ๐™š๐™ก๐™ก ๐™“

/channel/addlist/lFBWo9wurV0yZTI0


Here are our small family add our Channells

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐™ˆ๐™–๐™ก๐™ฌ๐™–๐™ง๐™š ๐™ƒ๐™š๐™ก๐™ก ๐™“

/channel/BitenTech/247

Needs a full fledged course on this topic ?๐Ÿ‘†๐Ÿ‘†

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐™ˆ๐™–๐™ก๐™ฌ๐™–๐™ง๐™š ๐™ƒ๐™š๐™ก๐™ก ๐™“

BreakDev - Evilginx Mastery Bootcamp

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐™ˆ๐™–๐™ก๐™ฌ๐™–๐™ง๐™š ๐™ƒ๐™š๐™ก๐™ก ๐™“

Tell me what u want I will try my hard to give u that thing

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐™ˆ๐™–๐™ก๐™ฌ๐™–๐™ง๐™š ๐™ƒ๐™š๐™ก๐™ก ๐™“

Sorry sorry guys I had some network issues
Class will be tommorow now

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐™ˆ๐™–๐™ก๐™ฌ๐™–๐™ง๐™š ๐™ƒ๐™š๐™ก๐™ก ๐™“

Price Tampering (Free Shopping )

1.What is price tampering?
=> Basically price tampering is manipulation of price during checkout of product.

2.What We Can Get With Price Tampering?
=>We Can Reduce The Price Of Product Ex. If product price is 5000inr we can make it 1 Orย  as per our desire.

3.Is It Safe?
=> Basically It's not Safe Way but we can make it safe by making a report when company Call us for anything just show that you are doing bug hunting and some testing to report them that's all.

4. Is it very hard?
=> no it's not hard but there is very low chance that you get website of price tampering and there is also low chance that your product will be delivered or not.

5. How to do it?
=> by changing the request of website.. If you need tutorial just say in comment(pytha we need tut)

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐™ˆ๐™–๐™ก๐™ฌ๐™–๐™ง๐™š ๐™ƒ๐™š๐™ก๐™ก ๐™“

๐Ÿ”… Convert Video Files to a Gif in Python

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐™ˆ๐™–๐™ก๐™ฌ๐™–๐™ง๐™š ๐™ƒ๐™š๐™ก๐™ก ๐™“

Code = Z5CPFE23FTWL79
Code = Z5CPFE239R78ZP
Code = Z5CPFE23X1W9FU
Code = Z5CPFE23WF72L1

Enjoy nd send ss

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐™ˆ๐™–๐™ก๐™ฌ๐™–๐™ง๐™š ๐™ƒ๐™š๐™ก๐™ก ๐™“

Concept of binning in English

Paas :- @hackertypo

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐™ˆ๐™–๐™ก๐™ฌ๐™–๐™ง๐™š ๐™ƒ๐™š๐™ก๐™ก ๐™“

#req ur meterials in chat

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐™ˆ๐™–๐™ก๐™ฌ๐™–๐™ง๐™š ๐™ƒ๐™š๐™ก๐™ก ๐™“

1. Learn c/ c++/ python (this will come handy)

2. Learn assembly

3. Start decompiling programs in disassemblers

4. start solving crackmes (you will learn most of the reverse engineering here, start with easy crackmes, donโ€™t be afraid to look at tutorials and write-ups or even ask proper detailed questions to us)

4. Start competing in CTFโ€™s and other competitions and find teammates who will contribute to your skill development.

Resources Go through each link and make notes if possible when you do a course, read books, solve reversing challenges and samples. (Please read this and learn to google) How to use google effectively(https://www.google.com/search?q=how+to+use+google+search+engine+effectively+reddit)

1. (Has everything you need) reverse-engineering-resources-beginners-to-intermediate-guide-links(https://bbinfosec.medium.com/reverse-engineering-resources-beginners-to-intermediate-guide-links-f64c207505ed)

2. begin.re(https://www.begin.re/)

3. where-to-find-free-training-in-reverse-engineering(https://reverseengineering.stackexchange.com/questions/265/where-to-find-free-training-in-reverse-engineering/267#267)

4. (Must for beginners) https://p.ost2.fyi/courses - start with Arch1001(https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+Arch1001_x86-64_Asm+2021_v1/about) โ€“> Arch2001 (https://p.ost2.fyi/courses/course-v1:OpenSecurityTraining2+Arch2001_x86-64_OS_Internals+2021_v1/about)

5. Z0FCourse_ReverseEngineering (https://github.com/0xZ0F/Z0FCourse_ReverseEngineering)

6. https://crackmes.one/

7. https://asmtutor.com/

9. malwareunicorn.org Workshop (https://malwareunicorn.org/workshops/re101.html#0)

10. awesome reverse engineering (https://github.com/wtsxDev/reverse-engineering)

11. pwn.college (https://pwn.college/)

Things a beginner should google to get in depth knowledge of reverse engineering:

1. How to start out in reverse engineering?

2. How to start out in reverse engineering Reddit

3. beginners reverse engineering Reddit

4. reverse engineering tutorials

5. Assembly tutorials

6. c tutorials

7. ida pro tutorials

8. ghidra tutorial

9. radare tutorial

10. Reverse engineering environment setup

11. search all the above on YouTube for video guides/tutorials/advice

12. Learn how to ask proper questions. We donโ€™t want to hear your hi hello, just ask the question: https://www.nohello.com/

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐™ˆ๐™–๐™ก๐™ฌ๐™–๐™ง๐™š ๐™ƒ๐™š๐™ก๐™ก ๐™“

Dm to buy this channel
Escrow accepted
Ib - @its_love0_0

Price cheapest in whole Market

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐™ˆ๐™–๐™ก๐™ฌ๐™–๐™ง๐™š ๐™ƒ๐™š๐™ก๐™ก ๐™“

Before learning reverse engineering, it is important to have a solid understanding of fundamental programming concepts and computer architecture. Here are some essential basics:

1. Programming: You should have a deep knowledge of at least one programming language such as C, C++, Java, or Python. Understanding data structures, algorithms, and object-oriented programming principles is also crucial.

2. Operating Systems: A thorough understanding of how operating systems like Windows, Linux, or macOS work is necessary to understand how programs execute and interact with hardware.

3. Assembly: Knowledge of assembly is essential to understand machine language and how instructions are executed by a processor. It is recommended to become familiar with x86 (or x64) architecture and learn how to read and write assembly code.

4. Networking:

5. Computer Security: Having a basic knowledge of computer security will help you understand common vulnerabilities in software and identify potential flaws during reverse engineering.

6. Debugging: Learning how to use a debugger such as GDB (for Linux) or WinDbg (for Windows) is essential for analyzing and understanding program behavior during execution.

7. Cryptography.

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐™ˆ๐™–๐™ก๐™ฌ๐™–๐™ง๐™š ๐™ƒ๐™š๐™ก๐™ก ๐™“

SO NOW TODAY WE WILL SHOW YOU PRACTICAL ON COOKIES
1. HOW WE CAN LOGIN COOKIES
2.HOW WE CAN USE THAT COOKIES
3.HOW WE CAN BYPASS OTP THROUGH COOKIES

CLASS TIMMING- 4:30PM

Language - Hinglish

On - @reverse_engineers

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐™ˆ๐™–๐™ก๐™ฌ๐™–๐™ง๐™š ๐™ƒ๐™š๐™ก๐™ก ๐™“

Zsecurity Masterclass Course


https://zsecurity.org/courses/masterclass-membership/

Needed ?
Give 20+ reactions

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐™ˆ๐™–๐™ก๐™ฌ๐™–๐™ง๐™š ๐™ƒ๐™š๐™ก๐™ก ๐™“

๐Ÿ‡ฎ๐Ÿ‡ณbigbasket.com database - INDIA

Compressed Size: 3.5GB
Uncompressed Size:15.5GB

Record: 20.000.000

CONTENTS:

- Dates of birth
- Email addresses
- IP addresses
- Names
- Passwords
- Phone numbers
- Physical addresses

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐™ˆ๐™–๐™ก๐™ฌ๐™–๐™ง๐™š ๐™ƒ๐™š๐™ก๐™ก ๐™“

I am gonna fill up this channel with some begginer to advance level courses...
I am gonna fill a format through begginer level ... Mediate lvl and advance level in hacking so be ready

Here - /channel/TheEra0fHacking

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐™ˆ๐™–๐™ก๐™ฌ๐™–๐™ง๐™š ๐™ƒ๐™š๐™ก๐™ก ๐™“

#req stuff in comments guys

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐™ˆ๐™–๐™ก๐™ฌ๐™–๐™ง๐™š ๐™ƒ๐™š๐™ก๐™ก ๐™“

Congratulations guys

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐™ˆ๐™–๐™ก๐™ฌ๐™–๐™ง๐™š ๐™ƒ๐™š๐™ก๐™ก ๐™“

Soo guys today...
We are gonna take a live claas on Android hacking basics
Language - English
Timing - 8:00 pm
Only on -
@reverse_engineers

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐™ˆ๐™–๐™ก๐™ฌ๐™–๐™ง๐™š ๐™ƒ๐™š๐™ก๐™ก ๐™“

๐Ÿ‘ How To Make FUD Malware Using C Language Video Tutorial ๐Ÿ˜ณ๐Ÿ”ฅ

โœ…Build FUD Malware
๐ŸŽš๏ธUsing C Language
โž–โž–โž–โž–โž–โž–โž–โž–โž–โž–

๐Ÿ”บSHARE AND SUPPORT US๐Ÿ”ป

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐™ˆ๐™–๐™ก๐™ฌ๐™–๐™ง๐™š ๐™ƒ๐™š๐™ก๐™ก ๐™“

Tutorial of resolution changerโœ…

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…

๐™ˆ๐™–๐™ก๐™ฌ๐™–๐™ง๐™š ๐™ƒ๐™š๐™ก๐™ก ๐™“

100% work ha

No risk + if u say risk use orginal files from play storeโœ…๐Ÿ˜š

ะงะธั‚ะฐั‚ัŒ ะฟะพะปะฝะพัั‚ัŒัŽ…
Subscribe to a channel