CyberSecurity & AI Experts – Telegram
CyberSecurity & AI Experts
40.4K subscribers
313 photos
378 files
296 links
🔰 Ethical Hacking and Cyber Security Official Telegram Channel
🔰 Free content to learn Hacking & AI

For promotions: @coderfun
Download Telegram
How to Become Ethical Hacker 👇👇


1. Develop a Strong Foundation in Computer Science and Programming:

Master a programming language like Python, Java, or C++. These languages are widely used in cybersecurity tools and noscripts.

Understand computer networking concepts like TCP/IP, network protocols, and routing mechanisms.

Familiarize yourself with operating systems, including Linux, Windows, and macOS, as you'll be interacting with various systems during ethical hacking.

2. Learn Cybersecurity Fundamentals
:

Grasp the principles of cryptography, encryption techniques, and hashing algorithms.

Understand vulnerability assessment and penetration testing (VAPT) methodologies.

Familiarize yourself with common security threats, attack vectors, and exploit techniques.

Explore web application security concepts, including SQL injection, cross-site noscripting (XSS), and cross-site request forgery (CSRF).

3. Enroll in Ethical Hacking Courses and Certifications:

Consider pursuing certifications like Certified Ethical Hacker (CEH) or CompTIA Penetration Testing+ (PT+) to validate your skills and knowledge.

Participate in online courses or bootcamps offered by reputable institutions to gain hands-on experience and practical skills.

Engage in virtual labs and Capture the Flag (CTF) competitions to test your skills and practice ethical hacking techniques.

4. Join Online Communities and Engage with Experts:

Engage in online forums, discussion groups, and communities dedicated to ethical hacking.

Connect with experienced hackers and cybersecurity professionals to seek guidance and mentorship.

Participate in workshops, conferences, and networking events to expand your knowledge and connections.

5. Contribute to Open-Source Projects and Build a Portfolio:

Contribute to open-source security projects to gain real-world experience and demonstrate your skills.

Participate in bug bounty programs to identify and report vulnerabilities in various systems.

Build a personal portfolio showcasing your ethical hacking projects, certifications, and contributions.

6. Stay Updated with the Latest Cybersecurity Trends:

Continuously read industry news, blogs, and research papers to keep abreast of emerging threats and vulnerabilities.

Participate in online webinars, workshops, and training sessions to stay updated on the latest hacking techniques and tools.

Attend cybersecurity conferences and events to network with experts and learn about cutting-edge technologies.
👍184
100 web vulnerabilities, categorized into various types :

Injection Vulnerabilities:
1. SQL Injection (SQLi)
2. Cross-Site Scripting (XSS)
3. Cross-Site Request Forgery (CSRF)
4. Remote Code Execution (RCE)
5. Command Injection
6. XML Injection
7. LDAP Injection
8. XPath Injection
9. HTML Injection
10. Server-Side Includes (SSI) Injection
11. OS Command Injection
12. Blind SQL Injection
13. Server-Side Template Injection (SSTI)

Broken Authentication and Session Management:
14. Session Fixation
15. Brute Force Attack
16. Session Hijacking
17. Password Cracking
18. Weak Password Storage
19. Insecure Authentication
20. Cookie Theft
21. Credential Reuse

Sensitive Data Exposure:
22. Inadequate Encryption
23. Insecure Direct Object References (IDOR)
24. Data Leakage
25. Unencrypted Data Storage
26. Missing Security Headers
27. Insecure File Handling

Security Misconfiguration:
28. Default Passwords
29. Directory Listing
30. Unprotected API Endpoints
31. Open Ports and Services
32. Improper Access Controls
33. Information Disclosure
34. Unpatched Software
35. Misconfigured CORS
36. HTTP Security Headers Misconfiguration

XML-Related Vulnerabilities:
37. XML External Entity (XXE) Injection
38. XML Entity Expansion (XEE)
39. XML Bomb

Broken Access Control:
40. Inadequate Authorization
41. Privilege Escalation
42. Insecure Direct Object References
43. Forceful Browsing
44. Missing Function-Level Access Control

Insecure Deserialization:
45. Remote Code Execution via Deserialization
46. Data Tampering
47. Object Injection

API Security Issues:
48. Insecure API Endpoints
49. API Key Exposure
50. Lack of Rate Limiting
51. Inadequate Input Validation

Insecure Communication:
52. Man-in-the-Middle (MITM) Attack
53. Insufficient Transport Layer Security
54. Insecure SSL/TLS Configuration
55. Insecure Communication Protocols

Client-Side Vulnerabilities:
56. DOM-based XSS
57. Insecure Cross-Origin Communication
58. Browser Cache Poisoning
59. Clickjacking
60. HTML5 Security Issues

Denial of Service (DoS):
61. Distributed Denial of Service (DDoS)
62. Application Layer DoS
63. Resource Exhaustion
64. Slowloris Attack
65. XML Denial of Service

Other Web Vulnerabilities:
66. Server-Side Request Forgery (SSRF)
67. HTTP Parameter Pollution (HPP)
68. Insecure Redirects and Forwards
69. File Inclusion Vulnerabilities
70. Security Header Bypass
71. Clickjacking
72. Inadequate Session Timeout
73. Insufficient Logging and Monitoring
74. Business Logic Vulnerabilities
75. API Abuse

Mobile Web Vulnerabilities:
76. Insecure Data Storage on Mobile Devices
77. Insecure Data Transmission on Mobile Devices
78. Insecure Mobile API Endpoints
79. Mobile App Reverse Engineering

IoT Web Vulnerabilities:
80. Insecure IoT Device Management
81. Weak Authentication on IoT Devices
82. IoT Device Vulnerabilities

Web of Things (WoT) Vulnerabilities:
83. Unauthorized Access to Smart Homes
84. IoT Data Privacy Issues

Authentication Bypass:
85. Insecure "Remember Me" Functionality
86. CAPTCHA Bypass

Server-Side Request Forgery (SSRF):
87. Blind SSRF
88. Time-Based Blind SSRF

Content Spoofing:
89. MIME Sniffing
90. X-Content-Type-Options Bypass
91. Content Security Policy (CSP) Bypass

Business Logic Flaws:
92. Inconsistent Validation
93. Race Conditions
94. Order Processing Vulnerabilities
95. Price Manipulation
96. Account Enumeration
97. User-Based Flaws

Zero-Day Vulnerabilities:
98. Unknown Vulnerabilities
99. Unpatched Vulnerabilities
100. Day-Zero Exploits
👍193
JUST IN: 🇮🇳 India to ban 9 crypto exchange URL's.

• Binance
• Kraken
• Huobi
• Kucoin
• Bittrex
• Gate․io
• Bitstamp
• Bitfinex
• MEXC Global

Take Out all your Funds from these apps Asap!!! Stay Safe 🙏
👍13🙏31
🌐 Networking Tool Links:

IP camera hacking
🔗 Link: https://github.com/kancotdiq/ipcs

Termux Lazynoscript tool
🔗 Link: https://github.com/TechnicalMujeeb/Termux-Lazynoscript

TMscanner Tool
🔗 Link: https://github.com/TechnicalMujeeb/TM-scanner

Trace location with IP
🔗 Link: https://github.com/Rajkumrdusad/IP-Tracer

WPS Wi-Fi hacking tool
🔗 Link: https://github.com/nxxxu/AutoPixieWps

Routersploit - vulnerability scanner and attacker
🔗 Link: https://github.com/reverse-shell/routersploit.git

Local network exploiting tool Zarp
🔗 Link: https://github.com/hatRiot/zar

IP tracker, Device info by link
🔗 Link: https://github.com/lucasfarre/ip-tracker

Ip-Fy IP address information
🔗 Link: https://github.com/T4P4N/IP-FY.git

Wifite Wi-Fi hacking tool
🔗 Link: https://github.com/derv82/wifite
👍84👏2🎉2
🧵 Complete Cybersecurity Professional Roadmap 🧵

https://news.1rj.ru/str/EthicalHackingToday

1. Introduction to Ethical Hacking
   - Definition
   - Purpose
   - Types of Hackers
   - Legal and Ethical Considerations

2. Networking Basics
   - TCP/IP
   - OSI Model
   - Subnetting
   - DNS
   - DHCP

3. Operating Systems
   - Linux
   - Windows
   - macOS
   - Command Line Basics

4. Cybersecurity Fundamentals
   - Encryption
   - Firewalls
   - Antivirus
   - IDS/IPS

5. Programming Languages
   - Python
   - Javanoscript
   - Bash Scripting
   - SQL
   - C/ C++/ Java/ Ruby

6. Scanning and Enumeration
   - Port Scanning
   - Service Enumeration
   - Vulnerability Scanning

7. Exploitation
   - Common Vulnerabilities and Exploits
   - Metasploit Framework
   - Buffer Overflows

8. Web Application Security
   - OWASP Top Ten
   - SQL Injection
   - Cross-Site Scripting (XSS)

9. Wireless Network Hacking
   - Wi-Fi Security
   - WEP, WPA, WPA2
   - Wireless Attacks

10. Social Engineering
    - Phishing
    - Spear Phishing
    - Social Engineering Toolkit (SET)

11. Sniffing and Spoofing
    - Man-in-the-Middle Attacks
    - ARP Spoofing
    - DNS Spoofing

12. Malware Analysis
    - Types of Malware
    - Sandbox Analysis
    - Signature-Based and Behavior-Based Detection

13. Incident Response and Handling
    - Incident Response Process
    - Digital Forensics
    - Chain of Custody

14. Penetration Testing
    - Types of Penetration Testing
    - Methodology
    - Reporting

15. Cryptography
    - Symmetric and Asymmetric Encryption
    - Hashing Algorithms
    - Digital Signatures

16. Mobile Hacking
    - Android and iOS Security
    - Mobile Application Security

17. Cloud Security
    - AWS, Azure, Google Cloud
    - Security Best Practices

18. IoT Security
    - Internet of Things Risks
    - Securing IoT Devices

19. Legal and Compliance
    - Computer Fraud and Abuse Act (CFAA)
    - GDPR, HIPAA, PCI DSS

20. Cybersecurity Tools
    - Nmap, Wireshark, Burp Suite
    - Snort, Nessus, Aircrack-ng

21. Career Path and Certifications
    - Certified Ethical Hacker (CEH)
    - Offensive Security Certified Professional (OSCP)
    - CISSP, CompTIA Security+

ENJOY LEARNING 👍👍
👍4211🔥5🤩1
18 Most used Linux commands
👍199🔥5
50 Cybersecurity Project Ideas For Beginners To Expert
👌1511👍10
🖥 100 Web Vulnerabilities, categorized into various types : 😀

⚡️ Injection Vulnerabilities:
1. SQL Injection (SQLi)
2. Cross-Site Scripting (XSS)
3. Cross-Site Request Forgery (CSRF)
4. Remote Code Execution (RCE)
5. Command Injection
6. XML Injection
7. LDAP Injection
8. XPath Injection
9. HTML Injection
10. Server-Side Includes (SSI) Injection
11. OS Command Injection
12. Blind SQL Injection
13. Server-Side Template Injection (SSTI)


⚡️ Broken Authentication and Session Management:
14. Session Fixation
15. Brute Force Attack
16. Session Hijacking
17. Password Cracking
18. Weak Password Storage
19. Insecure Authentication
20. Cookie Theft
21. Credential Reuse


⚡️ Sensitive Data Exposure:
22. Inadequate Encryption
23. Insecure Direct Object References (IDOR)
24. Data Leakage
25. Unencrypted Data Storage
26. Missing Security Headers
27. Insecure File Handling


⚡️ Security Misconfiguration:
28. Default Passwords
29. Directory Listing
30. Unprotected API Endpoints
31. Open Ports and Services
32. Improper Access Controls
33. Information Disclosure
34. Unpatched Software
35. Misconfigured CORS
36. HTTP Security Headers Misconfiguration


⚡️ XML-Related Vulnerabilities:
37. XML External Entity (XXE) Injection
38. XML Entity Expansion (XEE)
39. XML Bomb


⚡️ Broken Access Control:
40. Inadequate Authorization
41. Privilege Escalation
42. Insecure Direct Object References
43. Forceful Browsing
44. Missing Function-Level Access Control


⚡️ Insecure Deserialization:
45. Remote Code Execution via Deserialization
46. Data Tampering
47. Object Injection


⚡️ API Security Issues:
48. Insecure API Endpoints
49. API Key Exposure
50. Lack of Rate Limiting
51. Inadequate Input Validation


⚡️ Insecure Communication:
52. Man-in-the-Middle (MITM) Attack
53. Insufficient Transport Layer Security
54. Insecure SSL/TLS Configuration
55. Insecure Communication Protocols


⚡️ Client-Side Vulnerabilities:
56. DOM-based XSS
57. Insecure Cross-Origin Communication
58. Browser Cache Poisoning
59. Clickjacking
60. HTML5 Security Issues


⚡️ Denial of Service (DoS):
61. Distributed Denial of Service (DDoS)
62. Application Layer DoS
63. Resource Exhaustion
64. Slowloris Attack
65. XML Denial of Service


⚡️ Other Web Vulnerabilities:
66. Server-Side Request Forgery (SSRF)
67. HTTP Parameter Pollution (HPP)
68. Insecure Redirects and Forwards
69. File Inclusion Vulnerabilities
70. Security Header Bypass
71. Clickjacking
72. Inadequate Session Timeout
73. Insufficient Logging and Monitoring
74. Business Logic Vulnerabilities
75. API Abuse


⚡️ Mobile Web Vulnerabilities:
76. Insecure Data Storage on Mobile Devices
77. Insecure Data Transmission on Mobile Devices
78. Insecure Mobile API Endpoints
79. Mobile App Reverse Engineering


⚡️ IoT Web Vulnerabilities:
80. Insecure IoT Device Management
81. Weak Authentication on IoT Devices
82. IoT Device Vulnerabilities


⚡️ Web of Things (WoT) Vulnerabilities:
83. Unauthorized Access to Smart Homes
84. IoT Data Privacy Issues


⚡️ Authentication Bypass:
85. Insecure "Remember Me" Functionality
86. CAPTCHA Bypass


⚡️ Server-Side Request Forgery (SSRF):
87. Blind SSR
88. Time-Based Blind SSRF


⚡️ Content Spoofing:
89. MIME Sniffing
90. X-Content-Type-Options Bypass
91. Content Security Policy (CSP) Bypass


⚡️ Business Logic Flaws:
92. Inconsistent Validation
93. Race Conditions
94. Order Processing Vulnerabilities
95. Price Manipulation
96. Account Enumeration
97. User-Based Flaws


⚡️ Zero-Day Vulnerabilities:
98. Unknown Vulnerabilities
99. Unpatched Vulnerabilities
100. Day-Zero Exploits
👍289💩2😁1
​​​​🔎 How to generate a photo of a non-existent person! 🔎

😎 If you want to create a fake account on a social network, you can use another person's photo, but this is not the best option. It is better to use the following service to generate photos of non-existent people:

🤯. Open this website:
https://thispersondoesnotexist.com/
🤯. Visiting the website, we immediately get a photo of a non-existent person.
🤯. Updating the page, you will see a new generated image.

⚠️ That's it, you can update the resource until you are satisfied with the photo. The site works very fast which is an undoubted plus. Many sites based on the work of artificial intelligence are often very slow. ⚠️

➡️ Need 200 Reactions on this Post
👍4622
18 most used Linux commands YOU MUST KNOW

- ls
- mv
- ssh
- cd
- cat
- sudo
- pwd
- grep
- top
-mkdir
- find
- wget
- rm
- chmod
- tar
- cp
- chwon
- gzip
👍417🔥1
🌐 Here are 30 cybersecurity search engines :

1. Dehashed—View leaked credentials.
2. SecurityTrails—Extensive DNS data.
3. DorkSearch—Really fast Google dorking.
4. ExploitDB—Archive of various exploits.
5. ZoomEye—Gather information about targets.
6. Pulsedive—Search for threat intelligence.
7. GrayHatWarefare—Search public S3 buckets.
8. PolySwarm—Scan files and URLs for threats.
9. Fofa—Search for various threat intelligence.
10. LeakIX—Search publicly indexed information.
11. DNSDumpster—Search for DNS records quickly.
13. FullHunt—Search and discovery attack surfaces.
14. AlienVault—Extensive threat intelligence feed.
12. ONYPHE—Collects cyber-threat intelligence data.
15. Grep App—Search across a half million git repos.
17. URL Scan—Free service to scan and analyse websites.
18. Vulners—Search vulnerabilities in a large database.
19. WayBackMachine—View content from deleted websites.
20. Shodan—Search for devices connected to the internet.
21. Netlas—Search and monitor internet connected assets.
22. CRT sh—Search for certs that have been logged by CT.
20. Wigle—Database of wireless networks, with statistics.
23. PublicWWW—Marketing and affiliate marketing research.
24. Binary Edge—Scans the internet for threat intelligence.
25. GreyNoise—Search for devices connected to the internet.
26. Hunter—Search for email addresses belonging to a website.
27. Censys—Assessing attack surface for internet connected devices.
28. IntelligenceX—Search Tor, I2P, data leaks, domains, and emails.
29. Packet Storm Security—Browse latest vulnerabilities and exploits.
30. SearchCode—Search 75 billion lines of code from 40 million projects.
👍246🔥5
⭕️ G-Mail keyboard shortcuts ⭕️
#pc_feature #OldPost

Here is the complete list of Gmail keyboard shortcuts:

Compose and Chat

<Shift> + <Esc> : Focus main window
<Esc> : Focus latest chat or compose
<Ctrl> + . : Advance to next chat or compose
<Ctrl> + , : Advance to previous chat or compose
<Ctrl> + <Enter> : Send
<Ctrl> + <Shift> + c : Add cc recipients
<Ctrl> + <Shift> + b : Add bcc recipients
<Ctrl> + <Shift> + f : Access custom from
<Ctrl> + k : Insert a link
<Ctrl> + ; : Go to previous misspelled word
<Ctrl> + ' : Go to next misspelled word
<Ctrl> + m : Open spelling suggestions

Formatting

<Ctrl> + <Shift> + 5 : Previous font
<Ctrl> + <Shift> + 6 : Next font
<Ctrl> + <Shift> + - : Decrease text size
<Ctrl> + <Shift> + + : Increase text size
<Ctrl> + b : Bold
<Ctrl> + i : Italics
<Ctrl> + u : Underline
<Ctrl> + <Shift> + 7 : Numbered list
<Ctrl> + <Shift> + 8 : Bulleted list
<Ctrl> + <Shift> + 9 : Quote
<Ctrl> + [ : Indent less
<Ctrl> + ] : Indent more
<Ctrl> + <Shift> + l : Align left
<Ctrl> + <Shift> + e : Align center
<Ctrl> + <Shift> + r : Align right
<Ctrl> + <Shift> + , : Set right-to-left
<Ctrl> + <Shift> + . : Set left-to-right
<Ctrl> + \ : Remove formatting


Jumping

g then i : Go to Inbox
g then s : Go to Starred conversations
g then t : Go to Sent messages
g then d : Go to Drafts
g then a : Go to All mail
g then c : Go to Contacts
g then k : Go to Tasks
g then l : Go to Label

Threadlist selection

* then a : Select all conversations
* then n : Deselect all conversations
* then r : Select read conversations
* then u : Select unread conversations
* then s : Select starred conversations
* then t : Select unstarred conversations

Navigation

u : Back to threadlist
k / j : Newer/older conversation
o or <Enter> : Open conversation; collapse/expand conversation
p / n : Read previous/next message
` : Go to next inbox section
~ : Go to previous inbox section

Application

c : Compose
d : Compose in a tab (new compose only)
/ : Search mail
q : Search chat contacts
. : Open "more actions" menu
v : Open "move to" menu
l : Open "label as" menu
? : Open keyboard shortcut help

Actions

, : Move focus to toolbar
x : Select conversation
s : Rotate superstar
y : Remove label
e : Archive
m : Mute conversation
! : Report as spam
# : Delete
r : Reply
<Shift> + r : Reply in a new window
a : Reply all
<Shift> + a : Reply all in a new window
f : Forward
<Shift> + f : Forward in a new window
<Shift> + n : Update conversation
] / [ :  Remove conversation from current view and go previous/next
} / { : Archive conversation and go previous/next
z : Undo last action
<Shift> + i : Mark as read
<Shift> + u : Mark as unread
_ : Mark unread from the selected message
+ or = : Mark as important
- : Mark as not important
<Shift> + t : Add conversation to Tasks
👍223
🔰How Do I Protect My Computer From Bots?🔰

🤖It’s Very Possible To Protect Your Computer From Bots, But it Takes Diligence And Knowing What To Look For. Use The Following Tips To Keep Your Computer Safe:

🌀Install Firewalls To Block Malicious Attacks And Never Turn Them Off.

🌀Use A Long And Complicated Password That Contains Numbers And Symbols.

🌀Never Use The Same Password For Multiple Programs.

🌀Install Quality Anti-Malware Software Such As Norton security to protect your device.

🌀Ensure Software Is Up To Date, And Never Ignore System Updates.

🌀Refrain From Using Flash Drives, Or Thumb Drives, In An Infected Computer.

➡️ Give Reactions 🤟
👍164🔥1👏1
🔰7 Best Hacking Tools Everyone Must Know🔰

1. Nmap
It is a free and open-source tool that is used for network discovery and security auditing.

2. Metasploit
It is basically a Security Assessment and Penetration Testing tool. Metasploit can be used to launch an attack on other systems with it.

3. Angry IP Scanner
It is one of the fastest IP addresses and port scanner. By using this hacker can easily gather information about open ports in the target system.

4. Nikto
It is a webserver assessment tool. Nikto is an open-source platform that performs tests against Web Servers to find various vulnerable files, misconfigurations, outdated servers and programs on that web server.

5. John the Ripper
JTR is free and open-source software that is widely used by hackers for password cracking. It uses the various cryptanalysis attacks such as “Dictionary Attack” and “Brute-Force Attack”.

6. Wireshark:
It is an open-source tool that is used to capture traffic on the network. It is basically a network protocol analyzer tool.

7. Burp Suite:
It is an integrated platform that is used for performing a test on web application security.

➡️ Give Reactions 🤟
👍307🔥5👨‍💻5👏2😁1👌1
TUTORIAL : How To Change Your IP Address

ʏᴏᴜ ᴄᴏᴜʟᴅ ᴅᴏ ᴛʜɪs ʟᴇss ᴛʜᴀɴ ᴀ ᴍɪɴᴜᴛᴇ

𝗚𝘂𝗶𝗱𝗲 -

Click on "Start" in the bottom left hand corner of 𝘀𝗰𝗿𝗲𝗲𝗻

Click on "Run"

Type in "command" and hit ok
You should now be at an MSDOS prompt screen.

Type "ipconfig /release" just like that, and hit "enter"

Type "exit" and leave the prompt
• Right-click on "Network Places" or "My Network Places" on your desktop.

Click on "properties" You should now be on a screen with something noscriptd "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.

Right click on "Local Area Connection" and click "properties"

Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" 𝘁𝗮𝗯

Click on "Use the following IP address" under the "General" 𝘁𝗮𝗯

Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).

Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.

Hit the "Ok" button 𝗵𝗲𝗿𝗲

Hit the "Ok" button again You should now be back to the "Local Area Connection" screen.

Right-click back on "Local Area Connection" and go to properties again.

Go back to the "TCP/IP" 𝘀𝗲𝘁𝘁𝗶𝗻𝗴𝘀

This time, select "Obtain an IP address automatically" tongue.gif

18. Hit "Ok"

Hit "Ok" 𝗮𝗴𝗮𝗶𝗻

➡️ Give Reactions 🤟
👍235😁5
❇️Shut Down your ANDROID Device by Making Call from Another Phone (like a pro)


🔹Step 1: First of all, download and install the Automateit app. This app needs root access. So, make sure to grant the root permission.

🔹Step 2: Next, select ‘My Rules’ and tap on the (+) icon.

🔹Step 3: In the next screen tap on the ‘Call State Trigger’

🔹Step 4: Now, choose the option ‘Incoming Call’

🔹Step 5; In the next step, select the contact. You can choose from saved contacts or can create a new one.

🔹Step 6: Now tap on ‘Next’ and on the next screen, select ‘Shutdown Device Action’

🔹Step 7: Now you need to provide the name for the rule and save the rule.

Now you just need to make a call from the contact you specified and your Android device will be shut down.
👍10🔥3
Track Location With Live Address And City in Termux

IpHack: is a tracking tool for both IP location and tracking testing.

Installation ~

apt update && apt upgrade

apt install git

git clone https://github.com/mishakorzik/IpHack

cd IpHack

bash setup.sh

chmod +x *

cd IpHack

python IpHack.py -t (victim ip)

Enjoy 🤟

➡️ Give 100+ Reactions 🤟
🔥33👍17👎61🎉1
#lifehack

How to always run Google Chrome in incognito mode in Windows 10

If you want to use "Incognito" mode in Google Chrome browser by default, you can set it to start in that mode right away.

1. Right-click on the Chrome shortcut and select "Properties".
3. On the "Shortcut" tab, find the "Object" text box. It will contain the following:
"C:Program Files (x86)GoogleChromeApplicationchrome.exe".
4. modify the content of the "Object" field by adding "-incognito" at the end, separated by a space.
5. Click on "Apply".

The next time you open Chrome using this shortcut, it will automatically launch in "Incognito" mode.
👍82