चैनल का पता:
श्रेणियाँ:
प्रौद्योगिकियों
भाषा: हिंदी
ग्राहकों:
6.27K
चैनल से विवरण
🔰Wᴇʟᴄᴏᴍᴇ ᴛᴏ ᴛʜᴇ ᴄʜᴀɴɴᴇʟ🔰
✴️Wʜᴀᴛ ᴡᴇ ᴡɪʟʟ ᴛᴇᴀᴄʜ🤔❔
◼️Hᴀᴄᴋɪɴɢ ғʀᴏᴍ ʙᴇɢɪɴɴɪɴɢ
◼️Cʀᴀᴄᴋɪɴɢ
◼️Sᴘᴀᴍᴍɪɴɢ
◼️Cᴀʀᴅɪɴɢ
◼️Pᴀɪᴅ ᴄᴏᴜʀsᴇs ᴀɴᴅ ᴛᴏᴏʟs ғᴏʀ ғʀᴇᴇ
◼️Tɪᴘs ᴀɴᴅ ᴛʀɪᴄᴋs
⚠️Tʜɪs ᴄʜᴀɴɴᴇʟ ɪs ᴏɴʟʏ ғᴏʀ ᴇᴅᴜᴄᴀᴛɪᴏɴᴀʟ ᴘᴜʀᴘᴏᴜs.Wᴇ ᴀʀᴇ ɴᴏᴛ ʀᴇsᴘᴏɴsɪʙʟᴇ ғᴏʀ ᴜʀ ᴡᴏʀᴋ⚠️
Ratings & Reviews
Reviews can be left only by registered users. All reviews are moderated by admins.
5 stars
0
4 stars
2
3 stars
0
2 stars
1
1 stars
0
नवीनतम संदेश 14
2021-11-12 15:36:13
ALL ABOUT BOTNET
Attention
I would like to inform you guys i leaving posting content from today, its my last post from @kalingraaj account.
But my second account (@its_me_kali) and whole community (@CIDHUB) will manage by my friend Nagarjuna he is expert in Cybersecurity, for doubts you can ask anything at @its_me_kali, he will surely help you.
Thankyou Guys For Supporting Me.
Botnet Info
A botnet is a number of Internet-connected devices, each of which is running one or more bots. Botnets can be used to perform Distributed Denial-of-Service attacks, steal data, send spam, and allow the attacker to access the device and its connection.
Tips for protecting yourself against Botnets
Improve all user passwords for smart devices.
Avoid buying devices with weak security.
Update admin settings and passwords across all your devices.
Be wary of any email attachments.
Never click links in any message you receive. ...
Install effective anti-virus software.
Botnet Guide Article
https://telegra.ph/All-About-Botnet-by-IMK-11-12
Regards:@CIDHUB
987 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯 ✺ , 12:36
2021-11-11 18:30:04
LEAKING DEMO OF MY PAID OSINT COURSE
First Indian Blackhat OSINT Course by IMK
Doxing involves compiling Personally Identifiable Information (PII) about a person and disclosing that information publicly. Even though there are no specific federal or state laws that make doxing illegal, doxing can get you arrested for related crimes.
If you are willing to learn OSINT and Ethical Hacking then check the course description either enroll through @its_me_kali
OSINT TOOLS
https://telegra.ph/Best-25-OSINT-Tools-09-22
DOXING GUIDE
https://telegra.ph/ALL-ABOUT-DOXING-11-19
IP HUNTING https://telegra.ph/IP-HUNTING-TRICKS-11-24
INTELLIGENCE
https://telegra.ph/Intelligence-And-Its-Types-By-IMK-08-25
Course Description
https://telegra.ph/ETHICAL-HACKING-AND-OSINT-PROFESSIONAL-COURSE-10-08
REGARDS=@CIDHUB
809 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯 ✺ , 15:30
2021-11-10 16:58:47
CyberFraud Awareness 2021
Types of cybercrime
Here are some specific examples of the different types of cybercrime:
Email and internet fraud.
Identity fraud (where personal information is stolen and used).
Theft of financial or card payment data.
Theft and sale of corporate data.
Ransomware attacks (a type of cyberextortion).
Cryptojacking (where hackers mine cryptocurrency using resources they do not own).
Cyberespionage (where hackers access government or company data).
Fraud Bible where you can learn how the cyber crime actually works, its only for educational purpose, don't misuse it.
Fraud Methods Link
https://mega.nz/folder/OzhQzJSL#wQvfLEGvDNJ0BU7OprDbxQ
Alert
I found that some resellers are selling my course at higher price than its actual cost if you interested to learn osint and ethical hacking you can buy directly registering here
@its_me_kali
696 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯 ✺ , 13:58
2021-11-09 14:24:14
** ᭙ꫀ᥇ ᦔꫀꪜꫀꪶꪮρꪑꫀꪀꪻ ρꪊ᥅ꪖꪖꪀ
𝐖𝐞𝐛 𝐝𝐞𝐯𝐞𝐥𝐨𝐩𝐦𝐞𝐧𝐭 𝐢𝐬 𝐭𝐡𝐞 𝐛𝐮𝐢𝐥𝐝𝐢𝐧𝐠 𝐚𝐧𝐝 𝐦𝐚𝐢𝐧𝐭𝐞𝐧𝐚𝐧𝐜𝐞 𝐨𝐟 𝐰𝐞𝐛𝐬𝐢𝐭𝐞𝐬; 𝐢𝐭'𝐬 𝐭𝐡𝐞 𝐰𝐨𝐫𝐤 𝐭𝐡𝐚𝐭 𝐡𝐚𝐩𝐩𝐞𝐧𝐬 𝐛𝐞𝐡𝐢𝐧𝐝 𝐭𝐡𝐞 𝐬𝐜𝐞𝐧𝐞𝐬 𝐭𝐨 𝐦𝐚𝐤𝐞 𝐚 𝐰𝐞𝐛𝐬𝐢𝐭𝐞 𝐥𝐨𝐨𝐤 𝐠𝐫𝐞𝐚𝐭, 𝐰𝐨𝐫𝐤 𝐟𝐚𝐬𝐭 𝐚𝐧𝐝 𝐩𝐞𝐫𝐟𝐨𝐫𝐦 𝐰𝐞𝐥𝐥 𝐰𝐢𝐭𝐡 𝐚 𝐬𝐞𝐚𝐦𝐥𝐞𝐬𝐬 𝐮𝐬𝐞𝐫 𝐞𝐱𝐩𝐞𝐫𝐢𝐞𝐧𝐜𝐞. 𝐖𝐞𝐛 𝐝𝐞𝐯𝐞𝐥𝐨𝐩𝐞𝐫𝐬, 𝐨𝐫 '𝐝𝐞𝐯𝐬', 𝐝𝐨 𝐭𝐡𝐢𝐬 𝐛𝐲 𝐮𝐬𝐢𝐧𝐠 𝐚 𝐯𝐚𝐫𝐢𝐞𝐭𝐲 𝐨𝐟 𝐜𝐨𝐝𝐢𝐧𝐠 𝐥𝐚𝐧𝐠𝐮𝐚𝐠𝐞𝐬.#imk
Web Development can be classified into two ways:
Frontend Development
Backend Development
Salary
Average Web Developer Salary in India is Rs. 308,040 per annum. The salary could vary depending on factors like location, experience level, company profile, etc.#imk
Get Free Certifications and Internship From IIT
For More= Kali
Course=@CIDHUB
𝓡𝓮𝓰𝓪𝓻𝓭𝓼=@Its_me_kali**
663 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯 ✺ , 11:24
2021-11-08 15:24:53
Get Free 3D models 2021 Trick
The term “3D modeling” refers to the process of creating a three-dimensional representation of an object using specialized software. This representation, called a 3D model, can convey an object's size, shape and texture. ... These replicas incorporate the points, lines and surfaces that make up the physical environment.#imk
3D template models for download, files in 3ds, max, c4d, maya, blend, obj, fbx with low poly, animated, rigged, game, and VR options. #imk
Regards=@CIDHUB
644 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯 ✺ , 12:24
2021-11-07 15:14:02
GMAIL TRICK 2021 BY KALINGRAAJ
Learn how to create unlimited gmail of any country without number !!
And how to activate playpass with bin !
Bin=4895048300xx1
Ip=Usa
Regards=@kalingraaj
591 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯 ✺ , 12:14
2021-11-06 15:44:18
C-E-H GUIDE 2021
A certified ethical hacker (CEH) is an information security professional. They are very useful to companies as they inspect their online network for vulnerabilities. A CEH can help protect your business from malicious hackers and data breaches.
@its_me_kali
Job You get After CEH
The CEH certification can be a stepping-stone to a wide range of top-tier positions that require CEH skills, including Information Security Analyst, Computer Forensics Analyst, Homeland Security Specialist, Cyber Security Analyst, Penetration Tester, Security Engineer, Security Auditor, Vulnerability Tester, .
@its_me_kali
Basic Hacking Guide
https://bit.ly/3wjK68q
@its_me_kali
CEH Pratice Questions
https://bit.ly/3o2yJ0P
@its_me_kali
Ethical Hacking and OSINT Master Class
https://bit.ly/3bMrJ2x
@its_me_kali
REGARDS:@CIDHUB
688 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯 ✺ , 12:44
2021-11-04 15:32:19
CIDHUB 2021 NOV CTF SOLUTION
Answers of https://t.me/IndianCyberIntelligence/32781
1=Which command is use Metasploit to get option details of exploit? >> show options
2=Which protocol should you use to filter all web traffic?
>> https
3=What is the primary difference between threat hunting and penetration testing?
>> threat hunting: Tells us that who is already in our enviornmentand deals with the present state. penetration testing: Tells us that how anyone can get into our enviornment and how different vulnerabilities may be exploited
4=Which programming language can be used to write Metasploit scripts for Metasploit 4.x Framework?
>> Ruby
5=Which command sets the SHELLCODE?
>> set PAYLOAD payloadname
6=What is the default command port for FTP?
>> Port 21
7=Which hash algorithm produces a 160-bit value?
>> SHA-1
8=What are the two types of intrusion detection systems?
>> NIDS & HIDS
9= Do Yourself
10= Use Virustotal.com
Regards=@CIDHUB
671 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯 ✺ , 12:32
2021-11-04 07:20:57
CIDHUB 2021 CTF
Happy Diwali Guys
On the occasion of diwali join our community @CIDHUB and learn everything for free.
Most Secured Password is the password of zip file .
A. keepyourpasswordsecuretoyourself
B. pass123!!
C. P@$$w0rD
D. KeepY0urPasswordSafe!
Submit your answers at @its_me_kali inbox before 6pm.
634 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯 ✺ , 04:20
2021-11-03 16:55:38
UDEMY PYTHON3 2021
Python is a high-level, interpreted, interactive and object-oriented scripting language. Python is designed to be highly readable. It uses English keywords#imk frequently where as other languages use punctuation, and it has fewer#imk syntactical constructions than other languages.
https://mega.nz/folder/zfJQyLrT#uvGAaSb7Bs5bggzXXWqosQ
Regards=@CIDHUB
679 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯 ✺ , 13:55