Digital Forensics: File & Disk Analysis | @hackshubb #INE #Forensics
information : https://my.ine.com/CyberSecurity/courses/225b7429/digital-forensics-file-disk-analysis
How to Get Started With Cybersecurity
Cybersecurity is a vital field that involves protecting individuals and their data on the internet. To start a career in cybersecurity, one must understand basic concepts, research various career paths, choose a specialized field, gain practical knowledge, and network within the community. The post provides a step-by-step guide to becoming a cybersecurity professional, including resources and additional tips to enhance learning and career progression.
15 BEST INFOMATION GATHERING TOOLS 🙊
• Network Map (nmap) - https://github.com/nmap/nmap
•Dracnmap - https://github.com/Screetsec/Dracnmap
•Xerosploit - https://github.com/LionSec/xerosploit
•RED HAWK (All In One Scanning) - https://github.com/Tuhinshubhra/RED_HAWK
•ReconSpider(For All Scaning) - https://github.com/bhavsec/reconspider
•IsItDown (Check Website Down/Up)
Infoga - Email OSINT - https://github.com/m4ll0k/Infoga
•ReconDog - https://github.com/s0md3v/ReconDog
•Striker - https://github.com/s0md3v/Striker
•SecretFinder (like API & etc) - https://github.com/m4ll0k/SecretFinder
•Find Info Using Shodan - https://github.com/m4ll0k/Shodanfy.py
•Port Scanner - rang3r - https://github.com/floriankunushevci/rang3r
•Breacher - https://github.com/s0md3v/Breacher
We are launching a private channel where you get access to leaked/methods/tutorials/tools/scripts/bots related to spamming, cracking, dumping, botnet, laravel, smtp, Ads, Office 365, Bypassing 2FA without otp, Carding, Fraud and more.
CONTAINS:
~Private Scampages
~Combolists
~Private Laravel tools
~Ads Threshold methods
~Auto Pay Bins
~Gads/Fbads
~Private Ip Methods
~Leaked Tools
~Shell Cracking
~Leaked methods
~Spamming Tutorials
~Botnet logs
~Private Tools
~Cookies
~Carding methods
~Fraud Methods
~SMTP Cracking
~And Much More
Learn Penetration Testing with BackBox Linux ( 8.2024 ) | #PenTest #BackBox
information : https://www.udemy.com/course/learn-penetration-testing-with-backbox-linux
❤️🔥 18 web-application hacking tools:
1. Burp Suite - Framework.A
2. ZAP Proxy - Framework.
3. Dirsearch - HTTP bruteforcing.
4. Nmap - Port scanning.
5. Sublist3r - Subdomain discovery.
6. Amass - Subdomain discovery.
7. SQLmap - SQLi exploitation.
8. Metasploit - Framework.
9. WPscan - WordPress exploitation.
10. Nikto - Webserver scanning.
11. HTTPX - HTTP probing.
12. Nuclei - YAML based template scanning.
13. FFUF - HTTP probing.
14. Subfinder - Subdomain discovery.
15. Masscan - Mass IP and port scanner.
16. Lazy Recon - Subdomain discovery.
17. XSS Hunter - Blind XSS discovery.
18. Aquatone - HTTP based recon.
🌕 NOTE: FOR EDUCATIONAL PURPOSES. 🔮
🎯Blacklists of crypto wallets:
https://www.bitcoinabuse.com/
https://www.bitcoinwhoswho.com/
https://checkbitcoinaddress.com/
https://scam-alert.io/
https://badbitcoin.org/
https://bitcoinais.com/
https://cryptscam.com/ru
https://intelx.io/tools?tab=bitcoin
TorDepot
http://depotzmeg75ja4a6uswjwmsqi7pfokfiz3hzywgn4q3gihsixhmmcwqd.onion
Category: #Marketplace
///////////
Your One-Stop DeepWeb Marketplace. Everything rom A to Z. Encrypted messaging system, escrow + arbitrator, 24/7 support,
\\\\\\\\\\\
Why are there 4 markets?
The reason is simple: these markets are on the super list of Dread, a highly respected dark web forum. The admins of these markets are consistently active on Dread. That's why we chose these 4 dark web markets. You can find the links to these markets and the Dread forum here.
https://tor.wine
http://torwine3n7vg6vznuvm7y6odjgu3emgrkbvd2ozvqhbwoht6tdnrrlad.onion
Telegram
Telegram - Lyzem Search → https://lyzem.com/
Telegram -Google Custom Search → https://cse.google.com/cse?&cx=006368593537057042503:efxu7xprihg#gsc.tab=0
Telegram Search. Search for posts → https://tgstat.ru/en/search
Telegram Channels → https://telegramchannels.me/
Search.buzz.im → https://search.buzz.im/
🔍 Search engines for OSINT 💸
https://leak.sx
http://scylla.sh
https://intelx.io
https://4iq.com
https://leaked.site
https://hashes.org
https://leakcheck.io
https://vigilante.pw
https://leakcheck.net
https://weleakinfo.to
https://leakcorp.com
https://leakpeek.com
https://rslookup.com
https://snusbase.com
https://ghostproject.fr
https://leakedsource.ru
https://leak-lookup.com
https://nuclearleaks.com
https://private-base.info
https://haveibeensold.app
/channel/thestarkarmyx
https://breachchecker.com
https://www.dehashed.com
http://scatteredsecrets.com
https://haveibeenpwned.com
https://haveibeenpwned.com
https://services.normshield.com
https://joe.black/leakengine.html
/channel/addlist/jeYFZx5rEhgxYTZl
I'm releasing this leaked version of OxycoRAT, but beware: it's a scam tool by the same Turkish scammer behind the fake Rhino Botnet, BawlessRAT, among other scam tools.
Читать полностью…What is CAM-DUMPER?
Cam-Dumper is a Linux-based cam grabber tool that works in termux that allows you to capture images from the front camera of the victim and get it in your termux by just sending a simple link. This tool is made especially if you encounter someone on the internet who is doing something bad and you want to get their actual image.
C++ Programming Roadmap
|
|-- Fundamentals
| |-- Basics of Programming
| | |-- Introduction to C++
| | |-- Setting Up Development Environment (IDE: Code::Blocks, Visual Studio, etc.)
| | |-- Compiling and Running C++ Programs
| |
| |-- Syntax and Structure
| | |-- Basic Syntax
| | |-- Variables and Data Types
| | |-- Operators (Arithmetic, Relational, Logical, Bitwise)
|
|-- Control Structures
| |-- Conditional Statements
| | |-- If-Else Statements
| | |-- Switch Case
| |
| |-- Loops
| | |-- For Loop
| | |-- While Loop
| | |-- Do-While Loop
| |
| |-- Jump Statements
| | |-- Break, Continue
| | |-- Goto Statement
|
|-- Functions and Scope
| |-- Defining Functions
| | |-- Function Syntax
| | |-- Parameters and Arguments (Pass by Value, Pass by Reference)
| | |-- Return Statement
| |
| |-- Function Overloading
| | |-- Overloading Functions with Different Parameters
| |
| |-- Scope and Lifetime
| | |-- Local and Global Scope
| | |-- Static Variables
|
|-- Object-Oriented Programming (OOP)
| |-- Basics of OOP
| | |-- Classes and Objects
| | |-- Member Functions and Data Members
| |
| |-- Constructors and Destructors
| | |-- Constructor Types (Default, Parameterized, Copy)
| | |-- Destructor Basics
| |
| |-- Inheritance
| | |-- Single and Multiple Inheritance
| | |-- Protected Access Specifier
| | |-- Virtual Base Class
| |
| |-- Polymorphism
| | |-- Function Overriding
| | |-- Virtual Functions and Pure Virtual Functions
| | |-- Abstract Classes
| |
| |-- Encapsulation and Abstraction
| | |-- Access Specifiers (Public, Private, Protected)
| | |-- Getters and Setters
| |
| |-- Operator Overloading
| | |-- Overloading Operators (Arithmetic, Relational, etc.)
| | |-- Friend Functions
|
|-- Advanced C++
| |-- Pointers and Dynamic Memory
| | |-- Pointer Basics
| | |-- Dynamic Memory Allocation (new, delete)
| | |-- Pointer Arithmetic
| |
| |-- References
| | |-- Reference Variables
| | |-- Passing by Reference
| |
| |-- Templates
| | |-- Function Templates
| | |-- Class Templates
| |
| |-- Exception Handling
| | |-- Try-Catch Blocks
| | |-- Throwing Exceptions
| | |-- Standard Exceptions
|
|-- Data Structures
| |-- Arrays and Strings
| | |-- One-Dimensional and Multi-Dimensional Arrays
| | |-- String Handling
| |
| |-- Linked Lists
| | |-- Singly and Doubly Linked Lists
| |
| |-- Stacks and Queues
| | |-- Stack Operations (Push, Pop, Peek)
| | |-- Queue Operations (Enqueue, Dequeue)
| |
| |-- Trees and Graphs
| | |-- Binary Trees, Binary Search Trees
| | |-- Graph Representation and Traversal (DFS, BFS)
|
|-- Standard Template Library (STL)
| |-- Containers
| | |-- Vectors, Lists, Deques
| | |-- Stacks, Queues, Priority Queues
| | |-- Sets, Maps, Unordered Maps
| |
| |-- Iterators
| | |-- Input and Output Iterators
| | |-- Forward, Bidirectional, and Random Access Iterators
| |
| |-- Algorithms
| | |-- Sorting, Searching, and Manipulation
| | |-- Numeric Algorithms
|
|-- File Handling
| |-- Streams and File I/O
| | |-- ifstream, ofstream, fstream
| | |-- Reading and Writing Files
| | |-- Binary File Handling
|
|-- Testing and Debugging
| |-- Debugging Tools
| | |-- gdb (GNU Debugger)
| | |-- Valgrind for Memory Leak Detection
| |
| |-- Unit Testing
| | |-- Google Test (gtest)
| | |-- Writing and Running Tests
|
|-- Deployment and DevOps
| |-- Version Control with Git
| | |-- Integrating C++ Projects with GitHub
| |-- Continuous Integration/Continuous Deployment (CI/CD)
| | |-- Using Jenkins or GitHub
| |
| |--Free courses
| | |--imp.i115008.net/kjoq9V
| | |--imp.i115008.net/5bmnKL
| | |--Microsoft Documentation
| | |--Udemy Course
Submarine
http://no6m4wzdexe3auiupv2zwif7rm6qwxcyhslkcnzisxgeiw6pvjsgafad.onion/
Category: #Search Engine
///////////
Relevant TOR search engine
\\\\\\\\\\\
AGAIN
Whois Search
Viewdns Whois → https://viewdns.info/whois/
Reverse Whois Lookup → https://viewdns.info/reversewhois/
Whois Domain Lookup → https://www.whois.com/whois/
Whois. DomainTools → https://whois.domaintools.com/
———————————————————————————————
Reverse IP Search
Reverse Whois Lookup → https://viewdns.info/reverseip/
———————————————————————————————
DNS Port Scanner
Viewdns Port Scanner → https://viewdns.info/portscan/
———————————————————————————————
DNS IP History
IP History → https://viewdns.info/iphistory/
DNS History → https://completedns.com/dns-history/
————————————————————————————————
IP Addresses
Iplocation → https://iplocation.com/
BGPview → https://bgpview.io/
IPLocationTools → https://www.ipaddressguide.com/
IP2Location (Free Demo Mode) → https://www.ip2location.com/demo
IP Locator → https://www.ipfingerprints.com/
IP Address API and Data Solutions → https://ipinfo.io/
IP Location Finder → https://www.iplocation.net/
Viewdns IP Location → https://viewdns.info/iplocation/
Viewdns IP Traceroute → https://viewdns.info/traceroute/
Find People Using an IP Address → https://thatsthem.com/reverse-ip-lookup
ExoneraTor – Tor Metrics → https://metrics.torproject.org/exonerator.html
Domainiq → https://www.domainiq.com/
IP Location Finder → https://iplocation.net/
—————————————————————————————————
IP Geolocation
IP2Location → https://www.ip2location.com/demo
IP Locator → https://www.ipfingerprints.com/
SilentSpy V6 Leaked
Features:
- One-click access to all phone permissions.
- Hide SMS on startup or by panel command.
- Mute sound and turn off phone for stealth.
- Adjust phone volume.
- Custom Accessibility Pages.
- Optimized Screen Reader (bypass black screen).
- Quick launch for Trustwallet, Metamask, Binance.
- Steal 12 recovery phrases (Trustwallet).
- Remove Safepal black screen restrictions.
- Add/remove contacts (spoof bank contacts).
Generated Photos → https://generated.photos/
This Person Does Not Exist → https://thispersondoesnotexist.com/
AI Generated Faces → https://boredhumans.com/faces.php
sourcemedpharma
http://64ittpm2unuhcr2jyp6whywjipoz7y5usrudoqpvarsf6shk2p4yagqd.onion/?product=buy-crystal-meth-onli
Category: #Catalogue
///////////
buy crystal meth online
\\\\\\\\\\\
🔰 HOTMAIL CHEKER | NO DOWNLOAD NEEDED 🔰
https://xila.netlify.app/hotmail-checker
#Tool
Hiding a number in iPhone
Few people know, but the iPhone supports the function of hiding the number without installing additional programs.
To enable number hiding you need to go to "Settings", and go to "Phone". There you will find the function "Show number". After turning off this item you can call without displaying your phone number to the interlocutor.
It is worth noting that some operators have a paid feature "Caller ID". If it is connected at interlocutor, then your number will be displayed, but there is a solution for this situation, and it is a paid function of the operator "Anti Caller ID".
With this function, you can call a person whose number you are in the black list, but for the operator, as well as for the police to determine your number is not difficult, so we can conclude that the anonymity of this function is given only in relation to the interlocutor.
😀Shodan Search Engine Tutorial - How to Discover Routers, Servers, Webcams + CLI Setup🥳
What is Shodan?Shodan is a search engine that indexes information about internet-connected devices and networks.
And it is used by security researcher and hacker to identify and track connected device so that they can identify vulnerability in devices and network
➕ DURATION : 21 Minutes
➕ SIZE : 19.6 Mb
➕ FORMAT : Video
➕ PLATFORM : Telegram
Luxury Shield is an ineffective tool, but I’ll share this fake tool with you anyway. The developer, a Turkish scammer who also runs the fake botnet called Rhino, has created it as a fake crypter for scamming. Don’t buy it, or you’ll lose your money.
Читать полностью…