Bypassing OTP via brut force
Using burpsuite and fuff
Also explain the part of rate limit
SQLI endpoint are most likely vulnerable:
.php:
1. index.php?category=<SQLi payload>
2. product.php?id=<SQLi payload>
3. news.php?article_id=<SQLi payload>
4. user.php?username=<SQLi payload>
5. login.php?username=<SQLi payload>&password=<SQLi payload>
6. search.php?q=<SQLi payload>
7. blog.php?post_id=<SQLi payload>
8. forum.php?thread_id=<SQLi payload>
9. profile.php?user_id=<SQLi payload>
10. admin.php?username=<SQLi payload>&password=<SQLi payload>
.asp:
1. default.asp?catid=<SQLi payload>
2. product.asp?id=<SQLi payload>
3. news.asp?newsid=<SQLi payload>
4. login.asp?username=<SQLi payload>&password=<SQLi payload>
5. search.asp?q=<SQLi payload>
6. blog.asp?postid=<SQLi payload>
7. forum.asp?threadid=<SQLi payload>
8. profile.asp?userid=<SQLi payload>
9. admin.asp?username=<SQLi payload>&password=<SQLi payload>
10. register.asp?username=<SQLi payload>&password=<SQLi payload>
.aspx:
1. default.aspx?catid=<SQLi payload>
2. product.aspx?id=<SQLi payload>
3. news.aspx?newsid=<SQLi payload>
4. login.aspx?username=<SQLi payload>&password=<SQLi payload>
5. search.aspx?q=<SQLi payload>
6. blog.aspx?postid=<SQLi payload>
7. forum.aspx?threadid=<SQLi payload>
8. profile.aspx?userid=<SQLi payload>
9. admin.aspx?username=<SQLi payload>&password=<SQLi payload>
10. register.aspx?username=<SQLi payload>&password=<SQLi payload>
.cfm:
1. index.cfm?catid=<SQLi payload>
2. product.cfm?id=<SQLi payload>
3. news.cfm?newsid=<SQLi payload>
4. login.cfm?username=<SQLi payload>&password=<SQLi payload>
5. search.cfm?q=<SQLi payload>
6. blog.cfm?postid=<SQLi payload>
7. forum.cfm?threadid=<SQLi payload>
8. profile.cfm?userid=<SQLi payload>
9. admin.cfm?username=<SQLi payload>&password=<SQLi payload>
10. register.cfm?username=<SQLi payload>&password=<SQLi payload>
.jsp:
1. index.jsp?catid=<SQLi payload>
2. product.jsp?id=<SQLi payload>
3. news.jsp?newsid=<SQLi payload>
4. login.jsp?username=<SQLi payload>&password=<SQLi payload>
5. search.jsp?q=<SQLi payload>
6. blog.jsp?postid=<SQLi payload>
7. forum.jsp?threadid=<SQLi payload>
8. profile.jsp?userid=<SQLi payload>
9. admin.jsp?username=<SQLi payload>&password=<SQLi payload>
10. register.jsp?username=<SQLi payload>&password=<SQLi payload>
Cyber Security Awareness for Remote Workers (8.2024 ) | #Threats_Analyst
information : https://www.udemy.com/course/cybersecurity-awareness-for-remote-workers
Bug Bounty Make Simple
Checklist โ
Master Plan From Recon to Reporting Bug
Bug Bounty
VAPT
RED TEAM
React kaha h bhai๐
Master Python Hacking: 15+ Projects from Beginner to Expert ( 9.2024 ) | #Python
information : https://www.udemy.com/course/python3-for-ethical-hacking-malware-dev-from-scratch
OSINT Tools for the Dark Web /
Dark Web Search Engine Tools - Hackers Factory
Katana - https://github.com/TebbaaX/Katana
OnionSearch - https://github.com/megadose/OnionSearch
Darkdump - https://github.com/josh0xA/darkdump
Ahmia Search Engine - https://ahmia.fi/,ย https://github.com/ahmia/ahmia-site
Darkus - github.com/Lucksi/Darkus
Tools to get onion links
Hunchly - hunch.ly/darkweb-osint/
Tor66 - http://tor66sewebgixwhcqfnp5inzp5x5uohhdy3kvtnyfxc2e5mxiuh34iid.onion/fresh
Darkweblink - darkweblink.com,
http://dwltorbltw3tdjskxn23j2mwz2f4q25j4ninl5bdvttiy4xb6cqzikid.onion/
Tools to scan onion links
Onionscan - github.com/s-rah/onionscan
Onioff - github.com/k4m4/onioff
Onion-nmap - https://github.com/milesrichardson/docker-onion-nmap
Tools to crawl data from the Dark Web
TorBot - https://github.com/DedSecInside/TorBot
TorCrawl - https://github.com/MikeMeliz/TorCrawl.py
VigilantOnion - https://github.com/andreyglauzer/VigilantOnion
OnionIngestor - https://github.com/danieleperera/OnionIngestor
Darc - github.com/JarryShaw/darc
Midnight Sea - https://github.com/RicYaben/midnight_sea
Prying Deep - https://github.com/iudicium/pryingdeep
Miscellaneous
DeepDarkCTI - https://github.com/fastfire/deepdarkCTI
Reference- https://github.com/apurvsinghgautam/dark-web-osint-tools
Top 50 Digital Forensics Tools
Network Forensic Tools
- Nmap
- Wireshark
- Xplico
- Snort
- TCPDump
- The Slueth Kit
Mobile Forensics Tools
- Elcomspoft iOS Forensic Toolkit
- Mobile Verification Toolkit
- Oxygen Forensic
- MOBILedit
- Cellebrite UFED
- MSAB XRY
Malware Analysis Tools
- Wireshark
- YARA
- Malwarebytes
- VirusTotal
- Cuckoo Sandbox
- IDA Pro
Data Recovery Tools
- Recuva
- EaseUS Data Recovery
- TestDisk
- Stellar Data Recovery
- PhotoRec
- Disk Drill
Email Forensic Tools
- MailXaminer
- MailPro+
- Xtraxtor
- Aid4Mail
- eMailTrackerPro
- Autopsy
OSINT Tools
- Maltego
- Nmap
- OSINT Framework
- Shodan
- Recon-ng
- TheHavester
Live Forensics Tools
- OS Forensics
- Encase Live
- CAINE
- F-Response
- Kali Linux Forensic Mode
Memory Forensics Tools
- Volatility
- DumpIt
- memDump
- Access data FTK Imager
- Hibernation Recon
- WindowSCOPE
Cloud Forensic Tools
- Magnet AXIOM
- MSAB XRY Cloud
- Azure CLI
Card_number: 4415551112512531
EXP: 05/25
CVV: 573
Name: Pradeep Pn
E-mail: pradeep6473@gmail.com
Phone: +97332300439
Address_original: Bldg No. 78, Manama, 32899, BH
ZIP_City_State_Country: N/A
Bank_Country: BAHRAIN
Type: VISA
Subtype: CLASSIC
Bank: BANK OF BAHRAIN AND KUWAIT B.S.C.; 973 17207777 OR 973 17207772; http://www.bbkonline.com; BAHRAIN
Credit: DEBIT
HTTP_IP: 193.188.122.33
HTTP_UserAgent: Mozilla/5.0 (Linux; Android 10; CPH2179 Build/QP1A.190711.020; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/124.0.6367.74 Mobile Safari/537.36 [FB_IAB/FB4A;FBAV/461.0.0.47.85;]
Source: 4415551112512531
|05/25|573|Pradeep Pn|Bldg No. 78|Manama||32899|BH|+97332300439|pradeep6473@gmail.com|193.188.122.33|Mozilla/5.0 (Linux; Android 10; CPH2179 Build/QP1A.190711.020; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/124.0.6367.74 Mobile Safari/537.36 [FB_IAB/FB4A;FBAV/461.0.0.47.85;]
๐ Make Skill for Future Jobs + Earn Certificates ๐งโ๐
Master digital marketing skills to level up your productivity, credibility, confidence and career.
https://www.facebook.com/business/learn/certification
Marketing & sales
https://academy.hubspot.com/certification-overview
google Analytics
https://analytics.google.com/analytics/academy/
SEO
https://moz.com/training
๐บ Maps
Google Earth โ https://www.google.com/intl/en/earth/
Google Maps โ https://www.google.com/maps
Open Street Map โ https://www.openstreetmap.org/
Geojson.io โ https://geojson.io/#map=2/-18.3/161.0
Bing Maps โ https://www.bing.com/maps
World Imagery Wayback โ https://livingatlas.arcgis.com/wayback/?active=29260&ext=-115.34210,36.04325,-115.25490,36.08474
Worldview: Explore Your Dynamic Planet โ https://worldview.earthdata.nasa.gov/
Free Map Tools โ https://www.freemaptools.com/
SunCalc โ http://suncalc.net/#/58.7847,8.776,3/2020.12.29/22:39
Mapbox โ https://api.mapbox.com/styles/v1/mapbox/satellite-streets-v11.html?title=true&access_token=pk.eyJ1IjoibWFwYm94IiwiYSI6ImNpejY4M29iazA2Z2gycXA4N2pmbDZmangifQ.-g_vE53SD2WrJ6tFX7QHmA#3.78/38.64/-95.72
Mashedworld โ http://www.mashedworld.com/
Snap Map โ 59.810954,10.421920,10.65z" rel="nofollow">https://map.snapchat.com/@59.810954,10.421920,10.65z
Interactive News Map โ https://usa.liveuamap.com/
OpenStreetMap โ https://www.openstreetmap.org/#map=8/58.981/9.454
=====================================================
๐๐๐ Geo Tools
geocreepy โ https://www.geocreepy.com/
Sentinel Hub โ https://www.sentinel-hub.com/
Geosocial Footprint โ http://geosocialfootprint.com/
Batch Geocoder For Journalists โ https://geocode.localfocus.nl/
Geocoding by SmartMonkey - Google Workspace Marketplace โ https://workspace.google.com/marketplace/app/geocoding_by_smartmonkey/1033231575312
Geoserver.org โ http://geoserver.org/
OpenLayers โ https://openlayers.org/
Google Maps Platform ย |ย Google DevelopersGoogleGoogle โ https://developers.google.com/maps
Leaflet โ https://leafletjs.com/
Welcome to the QGIS project! โ https://www.qgis.org/en/site/
Planet โ https://www.planet.com/
Welcome to MapServer โ https://mapserver.org/
Mapguide Osgeo โ https://mapguide.osgeo.org/
Nepal police part 2.
Details: These above two files belong to the Nepalese police which were obtained in 2020. They are as a response to corruption within the ranks of police officials in this institution.
Google is testing desktop mode for Android tablets that will let you freely resize and arrange apps on the screen as you like, just like on a PC
Currently, apps on Android tablets open in full-screen mode by default. When the new mode is enabled, each app will appear in a window with controls that let you reposition it, maximize it, or close the app.
Youtube alternatives
LiveLeak โ https://www.liveleak.com/
Libre.Video โ https://libre.video/
Invidious โ https://invidious.tube/feed/popular
Odysee โ https://odysee.com/
BitTube โ https://bittube.tv/
BitChute โ https://www.bitchute.com/
LBRY โ https://lbry.tv/
D.tube โ https://d.tube/
Rumble โ https://rumble.com/
Vidmax โ https://vidmax.com/
AOL Video โ https://www.aol.com/video/
Metacafe โ https://www.metacafe.com/
MetaTube โ https://www.metatube.com/
Framatube โ https://framatube.org/home
WHATSAPP UNBAN MATHOD
1st - Take a Screenshot This ban error
2nd - Go try to login and click the support option type the description and add the image of ban number error on WhatsApp
3rd - Automatic Redirect Questions list choose not listed Optionย and last send click send mail
Wait for 6 hours and enjoy your WhatsApp
Regarding Your HackBeke Team โ
Description :-
Hello sir & maam, I read your term condition and policy Please forgive me this time because i have done mistake and violates you're policy, but from now I understand what the real use of what'sapp and I will never make such a mistake from now.
This number is connected to every member who are closed to me
Please unban this time, from now I will not make violates any term and condition So request to you please unbaned my whatsapp no.
+91 928xxx2899
This my official mobile number and I'm using it since to many year ago
Thanks regard
Your Name.