3. How To Create _ Connect To RDP Instances In Amazon AWS Using Digital Card or Debit Card โ Part 2
ะงะธัะฐัั ะฟะพะปะฝะพัััั…Android hacking class basics to advance
Topic coverd-
โข About rat
โข port forwarding
โข spreading
โข payload modification
โข black screen restrictions bypaas
Tools -
Apk easy tool
Apk editor
Java jdk 8
Credits - @EraOfHacking and @Lightbringer_Luciifer
Give credits before leaching it .....
CSS Cascade Layers Tutorials
1.) /channel/reverse_engineers/1504
2.)/channel/reverse_engineers/1505
3.) /channel/reverse_engineers/1506
4.)/channel/reverse_engineers/1507
Anyone wants this channel?
Give me something in exchange and take this
Offer something
โก๏ธ๐จ๐ฑ๐ฒ๐บ๐ - ๐ ๐ฎ๐๐๐ฒ๐ฟ๐ ๐ถ๐ป ๐๐๐ต๐ถ๐ฐ๐ฎ๐น ๐๐ฎ๐ฐ๐ธ๐ถ๐ป๐ด ๐๐ถ๐๐ต ๐๐ป๐ฑ๐ฟ๐ผ๐ถ๐ฑโก๏ธ
Cอกอoอกอuอกอrอกอsอกอeอกอ cอกอoอกอnอกอtอกอeอกอnอกอtอกอ oอกอvอกอeอกอrอกอvอกอiอกอeอกอwอกอ
โป๏ธIntroduction
โป๏ธIntroduction to Termux
โป๏ธInstalling Termux Application on Android Phone
โป๏ธHacker Keyboard Installation
โป๏ธTop Commands
โป๏ธMiscellaneous
โป๏ธSending SMS
โป๏ธMake Call
โป๏ธCreating Storage
โป๏ธProgramming
โป๏ธC Programming
โป๏ธc ++ Programming
โป๏ธPython Programming
โป๏ธMetasploit
โป๏ธInstallation Metasploit Framework
โป๏ธAndroid Phone Hacking
โป๏ธAccessing the Files and Contacts of Android Phone
โป๏ธHacking Windows
โป๏ธAUXILIRY MODULES METASPLOIT
โป๏ธHttp enum_wayback auxiliary scanner
โป๏ธEndpoint_mapper โ Scanner DCERPC Auxiliary Modules
โป๏ธAutopwn โ auxiliary scanner
โป๏ธEmail harvesting Using Metasploit
โป๏ธSSH version Scanner
โป๏ธFTP Version Scanning
โป๏ธHeartbleed Vulnerability(openssl scanner)
โป๏ธNmap
โป๏ธChecking the status of target Machine
โป๏ธMiscellaneous Hacking
โป๏ธDDOS Attack
โป๏ธSQL mapping
โป๏ธFinding Location
โป๏ธWeb Scanning
โป๏ธPhishing Attack
โป๏ธBrute Force Attack
โป๏ธInstallation SEtoolkit
Special thanks to @Lightbringer_Luciifer
For a wonderful class ๐โค๏ธ
Give reactions if u want recording
Here - @EraOfHacking
It's all about Android hacking from basics to toe.....
What is rat
What is port forwarding and how to do it
How to spread your viruses
How to modify payload ..
Language - Hindi
Live claas timing - 6 pmย
Only on -
/channel/EraOfHacking
/channel/EraOfHacking
/channel/EraOfHacking
โ๏ธAndrew Tate - All Course Bundle
โกIncludes:
โญ PHD Program
โญ Iron Mind Program
โญ Fitness Program
โญ Hustlers University
โญ Only Fans Fortune
โญ Master Chess
โญ Body Language
โญ Network Brilliance
โญ BROADCAST TATES MILLION DOLLAR SYSTEM (Webcam)
โญGodMode - The Elite Playboy Tactics of Tristan Tate
By - @BitenTech
โญ HACK ANY COMPUTER WITH AN IP USING MetaSploit โญ
I am here to show you this magical tool called Metasploit that allows you to hack ANYunpatched computer with only it's IP. Lets begin...
โญFirst you need to download Metasploit. The most up-to-date version is FREE at metasploit.com.
โญYou need PostgrSQL for your database. Download here: postgresql.org.
Make sure you use all the defaults or Metasploit woun't work!
โญNow lets get down to buisness...
After installing both tools, open up the PostgrSQL admin gui (start -> all programs -> PostgreSQL 9.0 -> pgAdmin III). Then right-click on your server (in the left hand box) and click connect. Remember to keep this window open the whole time. You will also need the pass you chose to use in step 5...
โญTime for some hacking! Go to start -> all programs -> Metasploit Framework, and then open the Metasploit gui.
โญNow, in the window type:
db_connect postgres:ThePassYouChose@localhost:5432
The first time you do this you will see lots of text flash buy. Don't wory, this is normal.
โญType db_host to make sure you are connected correctly.
โญNow type this:
db_nmap 000.000.000.000
Make sure you put the ip of the computer you are trying to hack in the place of 000.000.000.000...
โญNow we get to the fun part; the automatic exploitation. Just type db_autopwn -t -p -e -s -b , watch the auto-exploitation start, go play Halo for a while, and then come back...
โญAfter the exploitation is done, type sessions -l to see what the scanner found. If all went well, you should see a list of exploits.
โญNow we get to use the exploits to hack the computer! If you will notice, all of the exploits are numbered, and they all have obvious names (i. e., reverseScreen_tcp). In order to use an exploit, type this:
sessions -i ExploitNumber
For this method you can see their screen, control their mouse, see what they type, see them, etc ,Works only in kali !!
Disney+
meichellej@gmail.com:Bahtche82!
dannycox513@gmail.com:Temple65
taylornkunkel@gmail.com:Iphone2014!
kristiprochaska@gmail.com:Shortee32!
josh.ethridge86@gmail.com:Idlewild13
jenerbhp@yahoo.com:October41997!
acevedoj6@icloud.com:Chingate12
toddrikke@gmail.com:c@@Per2005
cfeeney776@gmail.com:Nicdanjoe3#
Send ss in comments. No ss no more giveaways๐
๐ฅ Russian ๐ท๐บ People Info Leak ๐ฅ
Headers:
phone_number, type, gibdd2_car_plate_number, gibdd2_car_model, gibdd2_car_color, gibdd2_car_year, gibdd2_base_name, gibdd2_dateofbirth, gibdd2_passport, gibdd2_passport_address, gibdd2_name, cdek_full_name, deliveryp_type, deliveryp_password, lnmatch_last_name, gibdd2_old_car_plate_number, miltor_fio, miltor_name, miltor_email, gibdd2_car_vin, gibdd2_address, vk_first_name, vk_last_name, vk_email, vk_password, beeline_full_name, beeline_address_city, beeline_address_street, beeline_address_house, beeline_address_entrance_count, beeline_address_floors_count, beeline_address_appt, beeline_inet_info, beeline_latitude, beeline_longitude, rfcont_name, rfcont_email, fb_profile_id, fb_full_name, avito_user_name, avito_ad_title, avito_ad_pdate, beeline_address_house_2, delivery_name, delivery_created, delivery_address, delivery_comment, delivery_lat, delivery_long, delivery_amount_rub, delivery_total_rub, vtb_user, beeline_inet_mbps, cdek_email, yandex_name, yandex_created_at, yandex_place_id, yandex_address_city, yandex_address_street, yandex_address_house, yandex_address_entrance, yandex_address_floor, yandex_address_office, yandex_region_id, yandex_latitude, yandex_longitude, yandex_amount_rub, yandex_sum_orders, yandex_user_agent, pikabu_username, pikabu_email, yandex_address_doorcode, fb_address1, delivery2_name, delivery2_order_id, delivery2_promocode, delivery2_created_at, delivery2_products, delivery2_vendor_name, delivery2_price_vendor_rub, delivery2_price_client_rub, delivery2_user_id, delivery2_address_full, delivery2_address_street, delivery2_address_building, delivery2_address_flat_number, delivery2_address_floor, delivery2_address_city, delivery2_latitude, delivery2_longitude, delivery2_ip, delivery2_timezone, delivery2_pricetotal_rub, avito_user_location, avito_price, avito_city, wildberries_name, wildberries_comment, wildberries_email, wildberries_lat, wildberries_lon, wildberries_address, gibdd_plate_number, gibdd_car_model, gibdd_name, yandex_address_comment, fb_work, yandex_place_name, mailru_email, mailru_full_name, mailru_age, mailru_dateofbirth, mailru_profile, mailru_avatar, fb_address2, mailru_education, delivery2_address_entrance, delivery2_address_intercom, delivery2_address_instructions, linkedin_link, linkedin_email, linkedin_name, sushi_name, sushi_date, sushi_address_city, sushi_address_street, sushi_address_home, sushi_address_apartment, sushi_address_entrance, sushi_address_floor, sushi_lat, sushi_long, sushi_amount_rub, sushi_total_rub, sushi_address_doorphone, okrug_pib, okrug_birth, okrug_nazvobl, okrug_nameokrug, delivery2_email, sushi_address_housing, okrug_age, mailru_career
Link - /channel/reverse_engineers/1484?single
Zip Size 5.5GB (Three Parts)
CSV Size 51.9GB