CyberSecurity & AI Experts – Telegram
CyberSecurity & AI Experts
40.5K subscribers
316 photos
378 files
300 links
🔰 Ethical Hacking and Cyber Security Official Telegram Channel
🔰 Free content to learn Hacking & AI

For promotions: @coderfun
Download Telegram
Password Security
10👍7
Here are 30 cybersecurity search engines:

1. Dehashed—View leaked credentials.
2. SecurityTrails—Extensive DNS data.
3. DorkSearch—Really fast Google dorking.
4. ExploitDB—Archive of various exploits.
5. ZoomEye—Gather information about targets.
6. Pulsedive—Search for threat intelligence.
7. GrayHatWarefare—Search public S3 buckets.
8. PolySwarm—Scan files and URLs for threats.
9. Fofa—Search for various threat intelligence.
10. LeakIX—Search publicly indexed information.
11. DNSDumpster—Search for DNS records quickly.
13. FullHunt—Search and discovery attack surfaces.
14. AlienVault—Extensive threat intelligence feed.
12. ONYPHE—Collects cyber-threat intelligence data.
15. Grep App—Search across a half million git repos.
17. URL Scan—Free service to scan and analyse websites.
18. Vulners—Search vulnerabilities in a large database.
19. WayBackMachine—View content from deleted websites.
16. Shodan—Search for devices connected to the internet.
21. Netlas—Search and monitor internet connected assets.
22. CRT sh—Search for certs that have been logged by CT.
20. Wigle—Database of wireless networks, with statistics.
23. PublicWWW—Marketing and affiliate marketing research.
24. Binary Edge—Scans the internet for threat intelligence.
25. GreyNoise—Search for devices connected to the internet.
26. Hunter—Search for email addresses belonging to a website.
27. Censys—Assessing attack surface for internet connected devices.
28. IntelligenceX—Search Tor, I2P, data leaks, domains, and emails.
29. Packet Storm Security—Browse latest vulnerabilities and exploits.
30. SearchCode—Search 75 billion lines of code from 40 million projects.

➡️ Give 100+ Reactions 🙌
18👍11👏2
👍135🤩2
Become A Pro Ethical Hacker 🤝

1. Root Me- Challenges.
2. Stok's YouTube - Videos.
3. Hacker101 Videos-Videos.
4. InsiderPhD YouTube- Videos.
5. EchoCTF -Interactive Learning.
6. Vuln Machines - Videos and Labs.
7. Try2Hack - Interactive Learning.
8. Pentester Land- Written Content.
9. Checkmarx- Interactive Learning.
10. Cybrary-Written Content and Labs.
11. RangeForce- Interactive Exercises.
12. Vuln Hub-Written Content and Labs.
13. TCM Security - Interactive Learning.
14. HackXpert-Written Content and Labs.
15. Try Hack Me- Written Content and Labs.
16. OverTheWire - Written Content and Labs.
17. Hack The Box-Written Content and Labs.
18. CyberSecLabs- Written Content and Labs.
19. Pentester Academy-Written Content and Labs.
20. Bug Bounty Reports Explained YouTube - Videos.
21. Web Security Academy- Written Content and Labs.
22. Securibee's Infosec Resources - Written Content.
Bonus: Zseano's Free Bug Bounty Methodology- Free Ebook.- Interactive Learning.

Google the above keyword
👍10🤩104
Hidden Code for Android ⭐️

*#06#-IMEI number
the

*#0*#-Enter the service menu

*#*#4636#*#*-Phone information, usage statistics and battery

*#*#34971539#*#*-Detailed camera information

🌟*#*#273282*255*663282*#*#*-Immediate backup of all media files

*#*#197328640#*#*-Enable test mode for service

*#*#232339#*#*-Wireless LAN tests

*#*#0842#*#*-Backlight/vibration test

*#*#2664#*#*-Test the touch screen

*#*#1111#*#*-FTA software version (1234 in the same code will give PDA and Firmware version)

*#12580*369#-Software and hardware info

*#9090#-Diagnostic configuration

*#872564#-USB logging control

*#9900#-System dump mode

*#301279#-HSDPA/HSUPA Control Menu

*#7465625#-View phone lock status

*#*#7780#*#*-Reset the/data partition to factory state

*2767*3855#-Format device to factory state (will delete everything on the phone)

##7764726-Hidden service

⭐️ Give Reactions 🙌
24👍13
😂😂
👍19🤩72
30 Days Roadmap to learn Ethical Hacking 👇👇

Day 1-3: Introduction to Ethical Hacking
- Understand the basics of ethical hacking and its importance
- Learn about different types of hackers and their motivations
- Explore the legal and ethical considerations of ethical hacking

Day 4-7: Networking Fundamentals
- Learn about networking protocols, IP addresses, and subnets
- Understand how data is transmitted over networks
- Explore common network vulnerabilities and how to secure them

Day 8-10: Information Gathering and Footprinting
- Learn how to gather information about a target system or network
- Explore techniques such as passive information gathering and footprinting
- Understand the importance of reconnaissance in ethical hacking

Day 11-14: Scanning and Enumeration
- Learn how to scan for open ports and services on a target system
- Understand the concept of enumeration and its role in ethical hacking
- Explore tools such as Nmap for scanning and enumeration

Day 15-17: Vulnerability Assessment and Exploitation
- Learn how to identify and assess vulnerabilities in a target system
- Understand common exploitation techniques and tools used in ethical hacking
- Explore how to exploit vulnerabilities responsibly and ethically

Day 18-21: Web Application Security
- Learn about common web application vulnerabilities (e.g., SQL injection, XSS)
- Understand how to secure web applications against attacks
- Explore tools such as Burp Suite for web application testing

Day 22-24: Wireless Network Security
- Learn about common wireless network vulnerabilities and attacks
- Understand how to secure wireless networks against intruders
- Explore tools such as Aircrack-ng for wireless network penetration testing

Day 25-27: Social Engineering and Physical Security
- Learn about social engineering techniques used in ethical hacking
- Understand the importance of physical security in cybersecurity
- Explore ways to protect against social engineering attacks

Day 28-30: Penetration Testing and Reporting
- Learn how to conduct penetration tests on systems and networks
- Understand the methodology of penetration testing (e.g., reconnaissance, scanning, exploitation, reporting)
- Practice conducting penetration tests on virtual environments and create detailed reports on findings

Remember to practice your skills in a controlled environment and always seek permission before performing any ethical hacking activities. Additionally, consider obtaining relevant certifications such as Certified Ethical Hacker (CEH) to validate your skills in ethical hacking.

Some good resources to learn Ethical Hacking

1. Tutorials & Courses
   - Informarion Security Free Course
   - Ethical Hacking Bootcamp
   - Network Hacking Course

2. Telegram Channels
   - Cyber Security and Ethical Hacking
   - Ethical Hacking Books

3. Books
   - Ultimate Linux Free Book
   - Python for Ethical Hacking

4. Ethical Hacking Forums

Join @free4unow_backup for more free resources

ENJOY LEARNING 👨‍💻🔒
8👍6
Here are 30 cybersecurity search engines:

1. Dehashed—View leaked credentials.
2. SecurityTrails—Extensive DNS data.
3. DorkSearch—Really fast Google dorking.
4. ExploitDB—Archive of various exploits.
5. ZoomEye—Gather information about targets.
6. Pulsedive—Search for threat intelligence.
7. GrayHatWarefare—Search public S3 buckets.
8. PolySwarm—Scan files and URLs for threats.
9. Fofa—Search for various threat intelligence.
10. LeakIX—Search publicly indexed information.
11. DNSDumpster—Search for DNS records quickly.
13. FullHunt—Search and discovery attack surfaces.
14. AlienVault—Extensive threat intelligence feed.
12. ONYPHE—Collects cyber-threat intelligence data.
15. Grep App—Search across a half million git repos.
17. URL Scan—Free service to scan and analyse websites.
18. Vulners—Search vulnerabilities in a large database.
19. WayBackMachine—View content from deleted websites.
16. Shodan—Search for devices connected to the internet.
21. Netlas—Search and monitor internet connected assets.
22. CRT sh—Search for certs that have been logged by CT.
20. Wigle—Database of wireless networks, with statistics.
23. PublicWWW—Marketing and affiliate marketing research.
24. Binary Edge—Scans the internet for threat intelligence.
25. GreyNoise—Search for devices connected to the internet.
26. Hunter—Search for email addresses belonging to a website.
27. Censys—Assessing attack surface for internet connected devices.
28. IntelligenceX—Search Tor, I2P, data leaks, domains, and emails.
29. Packet Storm Security—Browse latest vulnerabilities and exploits.
30. SearchCode—Search 75 billion lines of code from 40 million projects.

➡️ Give 100+ Reactions 🙌
👍232
TYPES OF INTELLIGENCE

4 types of Intelligence:

1) Intelligence Quotient (IQ)
2) Emotional Quotient (EQ)
3) Social Quotient (SQ)
4) Adversity Quotient (AQ)

1. Intelligence Quotient (IQ): this is the measure of your level of comprehension. You need IQ to solve maths, memorize things, and recall lessons.

2. Emotional Quotient (EQ): this is the measure of your ability to maintain peace with others, keep to time, be responsible, be honest, respect boundaries, be humble, genuine and considerate.
3. Social Quotient (SQ): this is the measure of your ability to build a network of friends and maintain it over a long period of time.

People that have higher EQ and SQ tend to go further in life than those with a high IQ but low EQ and SQ. Most schools capitalize on improving IQ levels while EQ and SQ are played down.

Develop their IQ, as well as their EQ, SQ and AQ. They should become multifaceted human beings able to do things independently of their parents.
4. The Adversity Quotient (AQ): The measure of your ability to go through a rough patch in life, and come out of it without losing your mind.

When faced with troubles, AQ determines who will give up, who will abandon their family, and who will consider suicide.

Parents please expose your children to other areas of life than just Academics. They should adore manual labour (never use work as a form of punishment), Sports and Arts.
👍17
Useful Run Commands Every Windows User Should Know

Press Win + R on your ⌨️ to open the Run dialog box and enter any of 👇 commands to access the respective tool.

🔹 "." -  the user's folder.
🔹 ".." - user folder.
🔹 "control" - control panel.
🔹 "msconfig" - system configuration parameters.
🔹 "appwiz.cpl" - programs and components.
🔹 "cleanmgr" - a disk cleaning utility.
🔹 "resmon" - resource monitor.
🔹 "calc", "notepad", "mspaint" - calculator, notepad and paint.
🔹 "main.cpl" - mouse parameters.
🔹 "mstsc" - remote desktop.
🔹 "msinfo32" - system information.
🔹 wab  - Contacts.
🔹 dccw - Display Color Calibration.
🔹 desk.cpl - Display Settings.

➡️ Give Reactions 🤟
👍23👏4
How Email Phishing works
👍52
Here's a List Of 50 Different Cybersecurity Careers

1. Security Analyst
2. Penetration Tester
3. Security Consultant
4. Incident Responder
5. Security Engineer
6. Ethical Hacker
7. Security Architect
8. Malware Analyst
9. Cryptographer
10. Security Administrator
11. Network Security Engineer
12. Security Auditor
13. Security Operations Center (SOC) Analyst
14. Threat Intelligence Analyst
15. Security Compliance Analyst
16. Security Researcher
17. Security Awareness Trainer
18. Forensic Analyst
19. Risk Analyst
20. Application Security Engineer
21. Data Privacy Officer
22. Identity and Access Management (IAM) Specialist
23. Cloud Security Engineer
24. IoT Security Specialist
25. Industrial Control System (ICS) Security Analyst
26. Mobile Security Analyst
27. Wireless Security Engineer
28. Blockchain Security Specialist
29. Embedded Systems Security Analyst
30. Incident Handler
31. Security Information and Event Management (SIEM) Engineer
32. Network Forensics Analyst
33. Threat Hunter
34. Disaster Recovery Specialist
35. Business Continuity Planner
36. Security Software Developer
37. DevSecOps Engineer
38. Cybersecurity Sales Engineer
39. Security Program Manager
40. Security Policy Analyst
41. Cyber Insurance Analyst
42. Security Education Specialist
43. Security Risk Manager
44. Security Compliance Manager
45. Cloud Security Architect
46. Red Team Operator
47. Blue Team Operator
48. Security Tool Developer
49. Security Awareness Manager
50. Cybersecurity Trainer
👍17👏21
Ruby hack.pdf
3.4 MB
RubyFu: Ruby programming for Hacker

Author:
KING SABRI
1
🛡 How data encryption works
👍4
Linux System Administrator Roadmap🐧💻

├── 🔹 Foundations
│ ├── 🔸 Basic Linux Concepts
│ │ ├── 📂 File System Hierarchy
│ │ ├── 🔑 Permissions and Ownership
│ │ ├── 🔄 Processes and Daemons
│ │ └── 🖥️ Basic Commands (ls, cd, cp, mv, rm, etc.)
│ ├── 🔸 Shell and Scripting
│ │ ├── 📝 Bash Scripting
│ │ ├── 🔧 Basic Automation
│ │ └── 🛠️ Common Shell Commands (grep, awk, sed)
│ ├── 🔸 Networking Fundamentals
│ │ ├── 🌐 TCP/IP Stack
│ │ ├── 🌍 DNS Configuration
│ │ ├── 🔌 Network Interfaces
│ │ └── 🛠️ Basic Network Troubleshooting (ping, traceroute, netstat)
│ └── 🔸 System Installation and Configuration
│ ├── 💿 Installation Methods (ISO, PXE)
│ ├── 🗂️ Disk Partitioning and File Systems
│ └── 🔒 Initial Configuration and Hardening
├── 🔹 System Administration
│ ├── 🔸 User and Group Management
│ │ ├── 👤 User Accounts
│ │ ├── 👥 Group Policies
│ │ └── 🔑 sudo Configuration
│ ├── 🔸 Package Management
│ │ ├── 📦 RPM and YUM (RHEL/CentOS)
│ │ ├── 📦 APT (Debian/Ubuntu)
│ │ └── 🔧 Compiling from Source
│ ├── 🔸 Process Management
│ │ ├── 🔄 Systemd and Init
│ │ ├── 👀 Monitoring and Controlling Processes
│ │ └── 🕒 Crontab and Scheduled Tasks
│ ├── 🔸 Filesystem Management
│ │ ├── 🗂️ Mounting and Unmounting File Systems
│ │ ├── 📁 NFS and Samba
│ │ └── 📊 Disk Quotas
│ └── 🔸 Security
│ ├── 🔥 Firewalls (iptables, firewalld)
│ ├── 🛡️ SELinux and AppArmor
│ ├── 🔒 SSH Configuration and Hardening
│ └── 📝 Auditing and Logging
├── 🔹 Networking and Services
│ ├── 🔸 Network Configuration
│ │ ├── 🌐 Static and Dynamic IP Addressing
│ │ ├── 🔌 Network Bonding and Bridging
│ │ └── 📶 VLANs
│ ├── 🔸 Web Services
│ │ ├── 🌐 Apache and Nginx
│ │ ├── 🔐 HTTPS and SSL/TLS
│ │ ├── ↔️ Reverse Proxies
│ │ └── 🛡️ Web Application Firewalls (WAF)
│ ├── 🔸 Database Management
│ │ ├── 💾 MySQL/MariaDB
│ │ ├── 💾 PostgreSQL
│ │ ├── 📂 NoSQL Databases (e.g., MongoDB)
│ │ └── 🔄 Backup and Restore
│ ├── 🔸 Email Services
│ │ ├── ✉️ Postfix and Sendmail
│ │ └── 🚫 Spam Filtering
│ └── 🔸 File and Print Services
│ ├── 📁 Samba
│ ├── 📁 NFS
│ └── 🖨️ CUPS
├── 🔹 Advanced Administration
│ ├── 🔸 Virtualization
│ │ ├── 💻 KVM and QEMU
│ │ ├── 📦 VirtualBox
│ │ └── 🔧 Libvirt
│ ├── 🔸 Containerization
│ │ ├── 🐳 Docker
│ │ ├── ☸️ Kubernetes
│ │ └── 🔧 Podman
│ ├── 🔸 Cloud Computing
│ │ ├── ☁️ AWS
│ │ ├── ☁️ Azure
│ │ ├── ☁️ OpenStack
│ │ └── ☁️ GCP (Google Cloud Platform)
│ ├── 🔸 Configuration Management
│ │ ├── 🤖 Ansible
│ │ ├── 🎭 Puppet
│ │ ├── 🍴 Chef
│ │ └── 🧂 SaltStack
│ └── 🔸 High Availability
│ ├── 🔗 Clustering (Pacemaker, Corosync)
│ ├── ⚖️ Load Balancing (HAProxy, Nginx)
│ └── 🔄 Backup and Disaster Recovery
├── 🔹 Monitoring and Performance
│ ├── 🔸 System Monitoring
│ │ ├── 🔧 Tools (Nagios, Zabbix, Prometheus, Grafana)
│ │ └── 📝 Log Management (ELK Stack, Graylog)
│ ├── 🔸 Performance Tuning
│ │ ├── 🧠 CPU and Memory Optimization
│ │ ├── 💾 Disk I/O Performance
│ │ └── 🌐 Network Performance
│ └── 🔸 Troubleshooting
│ ├── 📝 Log Analysis
│ ├── 🔍 Common Issues and Solutions
│ ├── 🚧 Performance Bottlenecks
│ └── 🔧 Kernel Tuning
├── 🔹 Scripting and Automation
│ ├── 🔸 Advanced Scripting
│ │ ├── 📜 Shell Scripting (Advanced)
│ │ ├── 🐍 Python Scripting
│ │ └── 🤖 Task Automation
│ └── 🔸 Infrastructure as Code (IaC)
│ ├── 🌍 Terraform
│ ├── ☁️ CloudFormation
│ └── 🔄 CI/CD Pipelines (Jenkins, GitLab CI)
└── 🔹 Security and Compliance
├── 🔸 Security Best Practices
│ ├── 🔒 System Hardening
│ └──🔄 Regular Updates and Patching
└── 🔍 Security Auditing Tools (e.g., Lynis, OpenVAS)
👍201
🛡 50 Cybersecurity project ideas for beginners to expert
👍15
Bug bounty Cheatsheet🚬


XSS
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/xss.md
https://github.com/ismailtasdelen/xss-payload-list

SQLi
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/sqli.md

SSRF
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/ssrf.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Request%20Forgery

CRLF
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/crlf.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/CRLF%20Injection

CSV-Injection
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/csv-injection.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/CSV%20Injection

Command Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Command%20Injection

Directory Traversal
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Directory%20Traversal

LFI
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/lfi.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/File%20Inclusion

XXE
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/xxe.md

Open-Redirect
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/open-redirect.md

RCE
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/rce.md

Crypto
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/crypto.md

Template Injection
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/template-injection.md
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Server%20Side%20Template%20Injection

XSLT
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/xslt.md

Content Injection
https://github.com/EdOverflow/bugbounty-cheatsheet/blob/master/cheatsheets/content-injection.md

LDAP Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/LDAP%20Injection

NoSQL Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/NoSQL%20Injection

CSRF Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/CSRF%20Injection

GraphQL Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/GraphQL%20Injection

IDOR
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Insecure%20Direct%20Object%20References

ISCM
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Insecure%20Source%20Code%20Management

LaTex Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/LaTeX%20Injection

OAuth
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/OAuth

XPATH Injection
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/XPATH%20Injection

Bypass Upload Tricky
https://github.com/swisskyrepo/PayloadsAllTheThings/tree/master/Upload%20Insecure%20Files
2
🕯 All in one Awesome Cybersecurity Resources - [Part 1]


•Awesome Red Team Ops :-
https://github.com/CyberSecurityUP/Awesome-Red-Team-Operations

•Awesome Red Teaming :-
https://github.com/yeyintminthuhtut/Awesome-Red-Teaming

•Awesome Red Team ToolKit :-
https://0x1.gitlab.io/pentesting/Red-Teaming-Toolkit/

•Awesome Blue Team Ops :-
https://github.com/fabacab/awesome-cybersecurity-blueteam

•Awesome OSINT :-
https://github.com/jivoi/awesome-osint