Download Premium Courses for free Hacking, Programming, website development, trading, and other Courses available All Course provides only for Educational purposes This Channel is Owned by @Courseuniverse Contact Us :- @Courseuniversebot
🍎AIML 2021 FULL COURSE🍎
⭕Artificial Intelligence: Reinforcement Learning in Python⭕
⭕Complete guide to Reinforcement Learning, with Stock Trading and Online Advertising Applications
⭕Apply gradient-based supervised machine learning methods to reinforcement learning
⭕Understand reinforcement learning on a technical level
⭕Understand the relationship between reinforcement learning and psychology
⭕Implement 17 different reinforcement learning algorithms
🔊LINK=https://mega.nz/folder/VgUCHZhD#38Qqr4nyLlcCztn0PQv_Ew
❤️🔥More=bio.cool/itsmekali
🔔REGARDS=@CIDHUB
🦹♂🦹♂Web Intelligence
Researching Domains🦹♂🦹♂
Web intelligence (WEBINT) is a means to efficiently identify the intelligence available in open source (OSINT). Structuring and visualizing web-based information allows an analyst to surface tactical information like technical indicators, and strategic understandings like the swaying sentiment of a troubled region.
🍎Tools Link 🍎
🍏Access Check https://accesscheck.thenetmonitor.org
🍏AFRINIC https://www.afrinic.net
🍏APNIC https://www.apnic.net
🍏ARIN https://www.arin.net
🍏 Website Search Tool https://www.aware-online.com/osint-tools/website-search-tool
🍏Better Whois http://www.betterwhois.com
🍏Central Ops http://centralops.net
🍏Complete DNS https://completedns.com
🍏Daily Changes http://dailychanges.domaintools.com
🍏Danger Zone https://github.com/woj-ciech/Danger-zone
🍏Da.whois https://dawhois.com
🍏Dedicated or Not http://dedicatedornot.com
🍏Denic web whois https://www.denic.de/webwhois
🍏DNSDumpster https://dnsdumpster.com
🍏DNS History http://dnshistory.org
🍏DNS Lookup https://dnslookup.online
🍏DNSlytics https://dnslytics.com
🍏dnspop https://github.com/bitquark/dnspop
🍏DNS Queries https://www.dnsqueries.com
🍏dnsrecon https://github.com/darkoperator/dnsrecon
🍏DNS Root Instances https://atlas.ripe.net/results/maps/root-instances
🍏DNSSec Analyzer https://dnssec-analyzer.verisignlabs.com
🍏IMK-CREDITS
https://bio.cool/itsmekali
🍏DNS Spy
https://dnsspy.io
🍏DNSStuff http://www.dnsstuff.com
🍏DNSTools http://www.dnstools.ch
🍏DNS Trails http://dnstrails.com
🍏DNS Trails https://securitytrails.com/dns-trails
🍏dnstwist https://github.com/elceef/dnstwist
🍏dnstwist
https://dnstwist.it
🍏dnstwister https://dnstwister.report
🍏DNSViz
http://dnsviz.net
🍏Domain Big Data http://domainbigdata.com
🍏Domain Crawler http://www.domaincrawler.com
🍏Domain Dossier http://centralops.net/co/DomainDossier.aspx
🍏Domain Eye https://domaineye.com
🍏DomainIQ https://www.domainiq.com
🍏Domain SDB https://domainsdb.info
🍏Domain To IP Converter http://domaintoipconverter.com
🍏Domain Tools https://www.domaintools.com
🍏Domain Tools http://whois.domaintools.com
🍏DomEye https://xaviesteve.com/domeye
🍏downdetector http://downdetector.com
🍏downforeveryoneorjustme http://downforeveryoneorjustme.com
🍏DNS Checker https://dnschecker.org
🍏DShield API https://isc.sans.edu/api
🍏EasyCounter WHois https://whois.easycounter.com
🍏Easy whois https://www.easywhois.com
🍏Educause Whois Lookup https://net.educause.edu/whois.htm
🍏Geektools http://www.geektools.com/whois.php
🍏Lookup https://www.infobyip.com/ipbulklookup.php
🍏Network Tools http://network-tools.com
🍏NS.Tools
https://ns.tools
Onyphe https://www.onyphe.io
🍏OpenData Rapid7 https://opendata.rapid7.com
🍏The Prefix Whois Project https://pwhois.org
🍏PTRArchive http://ptrarchive.com
🍏Purplepee.com https://purplepee.co
🍏RedirectDetective http://redirectdetective.com
💛More=bio.cool/itsmekali
👁Regards=@CIDHUB
💚PYTHON DEVELOPMENT 2021💚
Python is an interpreted high-level general-purpose programming language. Python's design philosophy emphasizes code readability with its notable use of significant indentation.
BUILD YOUR SKILLS WITH PYTHON AND GET BEST JOBS !!
💚https://mega.nz/folder/jxhlzBgI#bDeBZl7TxQvHW45PL394bw
💚https://drive.google.com/file/d/1JjZur3Zvxi8PmK8rWyAgIGwuD9lEMMqh/view
💚Jobs💚
Looking for work or have a Python related position that you're trying to hire for? Our relaunched community-run job board is the place to go.
jobs.python.org
💚Regards=@CIDHUB
🦹♂🦹♂WARDRIVING GUIDE BY IMK🦹♂🦹♂
Wardriving is the act of searching for Wi-Fiwireless networks, usually from a moving vehicle, using a laptop or smartphone. Software for wardriving is freely available on the internet.
Wardriving might seem like a thing of the past. However, security specialists still use it to research Wi-Fi security. Data accumulated in such a manner is valuable and helps detect common mistakes and drawbacks. It also helps understand how open Wi-Fi networks protect their users (or don't).
🍏How wardriving can affect you🍏
Wardriving couldenable hackers to gain access to any device connected to your home network. Hackers that access your network through wardriving may be able to engage in malicious activities like installing malware on your home computer and other connected devices.
❤️🔥Safety Guide By @its_me_kali ❤️🔥
Stay safe when using a public access point or an open wifi network
🥶Use a firewall.
🥶Always use VPN.
🥶When transferring sensitive information, make sure the site is using SSL (look for the HTTPS in the address bar).
🥶When on a public, unsecured network, I'd be leery of using credit cards or accessing your bank, etc.
🥶Don't leave your wireless card on when you're not using it.
🍎Get Info About Your Near By Area Network 🍏
https://play.google.com/store/apps/details?id=net.wigle.wigleandroid
👾Regards=@CIDHUB
☔FULL STACK DEVELOPER GUIDE☔
The complete roadmap for full-stack development in 2021 by IMK
💚FrontEnd💚
💚HTML, CSS,JAVASCRIPT, SQL
💚REACT, VUE, ANGULAR,WEBPACK
💚BOOTSTRAP, MATERIAL UI, ELM
🍎@its_me_kali
💜BACKEND💜
💜PHP, NODE, RUBY on Rails, Express, Django
💜JAVA(SPRING)
💜ASP. NET
💜REDIS
🍎@its_me_kali
💙DATABASE💙
💙(DBMS) MySQL, SQLite, Postgres
💙(NOSQL) MONGO, CASANDRA, CouchDB
ElasticSearch,Apache storm, Sphinx
💙(GRAPH) NEO4J, ARANGO DB,VoltDB and MemSQL
🍎@its_me_kali
❤️ANDROID❤️
❤️Java, Kotlin, SDK, Python, Xml.
❤️IOS(SWIFT, C, C++)
❤️(CROSSPLATFORM) REACT Native, IONIC, PWA, XAMARIN, FLUTTER,Unity.
🍎@its_me_kali
💛DEV OPs💛
💛(INFRASTRUCTURE)NGNIX, AWS, AZURE, ELK
💛(AUTOMATION) Ansible, Chef, Jenkins
💛(VIRTUALIZATION) Docker, Vagrant, VMWARE, BladeCenter.
🍎@its_me_kali
💝Other Things💝
Machine Learning, SSH, HTTP & HTTPS, Linux commands, Data structures and algorithms, Characters Encoding.
🍎@its_me_kali
❤️🔥 NOTE=FOR COURSES RELATED TO ABOVE TOPIC, CHECK OLD POSTS OF CIDHUB.
🦹♂Regards=@CIDHUB
🦹♂🦹♂SQL INJECTION GUIDE 🦹♂🦹♂
SQL injection is a code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution.
❤️🔥 Admin Panel Hack Basic Guide❤️🔥
/channel/l000century/278
❤️🔥Sqli Guide❤️🔥
https://telegra.ph/FULL-SQL-GUIDE-BY-its-me-kali-09-23
👁Cheatsheet Link👁
https://bit.ly/3opaU5p
🍎Note)This post is only for educational purpose.
Use it for ethical purpose
👀Regards=@CIDHUB
❤️🔥❤️🔥Detecting malware on your Android device❤️🔥❤️🔥
🦹♂A surge in monthly data usage: Sudden spikes in data without any changes in data usage patterns from your side need investigation.
@its_me_kali
🦹♂Battery draining quickly: Juice jackers may have infected your device with battery-sucking viruses. The drain will occur almost immediately after infection, so you should be able to spot this one early.
@its_me_kali
🦹♂Possible identity theft: If the attacker has managed to steal your personal information and impersonated you for financial gains, you may see withdrawals from your bank account that you cannot explain, see unfamiliar charges or accounts on your credit report, or not get your usual bills.
@its_me_kali
🦹♂Unwanted apps: Android phones and jailbroken iPhones, when infected with Trojan malware, will automatically download more malicious apps without your knowledge.
@its_me_kali
🦹♂Check running services of your device in developer option.
@its_me_kali
🍎Safety Guide By IMK🍎
🍏Reboot in safe mode.
🍏Uninstall all suspicious apps.
🍏Get rid of pop-up ads and redirects from your browser.
🍏Clear your downloads.
🍏Install a mobile anti-malware app from Playstore.
🍏Always scans any type of files on virustotal.com before opening it.
🍏Use double authentication in each and every accounts.
🍏Stay Away from unknown links.
🍏Stay Away from public wifi network or use VPN while using them.
🖱By🖱= @CIDHUB
🦹♂🦹♂Top 2021 Hacking Questions Practice Apps🦹♂🦹♂
❤️🔥HACKER X https://play.google.com/store/apps/details?id=hacking.learnhacking.learn.hack.ethicalhacking.programming.coding.hackerx.cybersecurity
👁@its_me_kali👁
❤️🔥 Kali Linux Guide
https://play.google.com/store/apps/details?id=lifegoal.helpinghands.kalilinux
👁@its_me_kali👁
❤️🔥 Hacking Exams
https://play.google.com/store/apps/details?id=com.certquestions.mobile.app
👁@its_me_kali👁
❤️🔥 Coding Pratice
https://play.google.com/store/apps/details?id=com.paprbit.dcoder
👁@its_me_kali👁
❤️🔥Learn EH
https://play.google.com/store/apps/details?id=com.askills.edu.ethical.hacking.university
👁@its_me_kali👁
❤️🔥 Mitnick Tips
https://play.google.com/store/apps/details?id=com.tutorials.bestcomputerguide
👁@its_me_kali👁
❤️🔥 Linux Commands
https://play.google.com/store/apps/details?id=com.inspiredandroid.linuxcommandbibliotheca
👁@its_me_kali👁
❤️🔥 Nmap Guide
https://play.google.com/store/apps/details?id=com.nmap_tutors
👁@its_me_kali👁
❤️🔥 Learn Docker
https://play.google.com/store/apps/details?id=lifegoal.helpinghands.docker
👁@its_me_kali👁
❤️🔥 Learn Powershell
https://play.google.com/store/apps/details?id=com.sweinc.powershell
👁@its_me_kali👁
❤️🔥TopHacking Guide
https://telegra.ph/How-to-become-a-ethical-hacker-02-28
👁@its_me_kali👁
❤️🔥Metasploit Guide
https://play.google.com/store/apps/details?id=com.higuddu.metasploit
👁@its_me_kali👁
❤️🔥Termux Guide https://play.google.com/store/apps/details?id=com.termux.guide
👁@its_me_kali👁
❤️🔥Wireshark Guide
https://play.google.com/store/apps/details?id=com.iam.wiresharktutorial
👁@its_me_kali👁
🍎Regards=@CIDHUB
❤Learn To Build A Google Map App Using Angular 2💙
❤Description💙
Learn Angular 2 features by building a working AngularJS application. Make a Google Map App in this Angular 2 tutorial.
🎇LINK=https://bit.ly/3lWWC9c
Regards=@CIDHUB
💙Course by Eduonix❤
🚨🚨All Rubber Ducky and HID Devices 2021🚨🚨
USB Rubber ducky is an HID device that looks similar to a USB Pen drive. It may be used to inject keystroke into a system, used to hack a system, steal victims essential and credential data can inject payload to the victim’s computers. The main important thing about USB Rubber ducky is that it cannot be detected by any Anti-Virus or Firewall as it acts as an HID device.
A Rubber Ducky USB stick, once plugged into a computer, looks like a normal keyboard. Following a correct and simple programming, it is able to inject a keystroke sequence as if it were a normal user typing through it.
💚Guide By @ITS_ME_KALI 💚
https://telegra.ph/USB-DUCKY-GUIDE-BY-IMK-09-23
🚨Course 🚨
https://bit.ly/3hXuoKo
❤️🔥Regards=@CIDHUB
🚨CyberJacking 2021 By IMK🚨
Cyber hijacking, or computer hijacking, is a type of network security attack in which the attacker takes control of computer systems, software programs and/or network communications.
❤️🔥Types❤️🔥
🥶IJacking
🥶ClickJacking
🥶CryptoJacking
🥶Juice Jacking
🥶Web Jacking
🥶FormJacking
🥶Wi-FiJacking
🥶BrandJacking
🥶HyperJacking
🥶SideJacking
🥶PasteJacking
🥶PageJacking
🥶BioJacking
🥶Metajacking
🥶TabJacking
🥶ThreadJacking
🥶MouseJacking
🥶TrendJacking
🥶DataJacking
🧭Guide by @ITS_ME_KALI 🧭
https://telegra.ph/CYBER-JACKING-BY-IMK-09-21
⛄️Regards=@CIDHUB
🚨🚨SIM-CARD HACKING AND SAFETY GUIDE 2021🚨🚨
3 Ways Your SIM Card Can Be Hacked:
❤️🩹Simjacker.
❤️🩹SIM Card Swapping.
❤️🩹SIM Clonning.
❤️🔥SimCard Attack
https://telegra.ph/SIM-CARD-ATTACKS-2020-MUST-READ-10-23
🤍By=@its_me_kali
❤️🔥GSM Sniffing
https://telegra.ph/GSM-SNIFFING-07-25
🤍By=@its_me_kali
💥Awesome-Cellular-Hacking💥
https://github.com/W00t3k/Awesome-Cellular-Hacking
⛄️Tools⛄️(USE IN RDP or Virtual Platform)
https://bit.ly/2VR2Myu
💚Regards=@CIDHUB
💙Cybersecurity Analyst 2021💙
Cyber security analysts (also called information security analysts) plan and carry out security measures to protect a company's computer networks and systems, according to the BLS. They keep constant tabs on threats and monitor their organization's networks for any breaches in security.
🍎Salary🍎
The salary of a cybersecurity analyst starts from INR. 5 to 6 lakhs per annum.
💙Jobs💙
https://www.naukri.com/cyber-security-analyst-jobs
https://in.linkedin.com/jobs/cyber-security-analyst-jobs
https://in.indeed.com/m/jobs?q=Cyber+Security+Analyst
💙Course💙
https://mega.nz/file/ZWYywLLL#Rb4cWEBrcthCymcYBv-t0HTvQ5NKvZI6SHAPJzm1a1s
🦁regards=@its_me_kali
🍎WEBSITE PENTESTING 2021🍎
🍉MUST READ ALL ARTICLES !!
🍊SQLI GUIDE BY KALINGRAAJ https://telegra.ph/FULL-SQL-GUIDE-BY-its-me-kali-09-23
💚Course=https://www.mediafire.com/file/ff6ghkmp1pbsijx/Udemy-+SQL+Injection+Master+Course.rar/file
🍊WEBSITE DEFACING BY KALINGRAAJ
https://telegra.ph/WEBSITE-DEFACING-10-08
🍊HTML INJJECTION BY KALINGRAAJ
https://telegra.ph/HTML-INJECTION-Basic-Guide-For-beginners-11-14
🍊RFI ATTACK BY KALINGRAAJ
https://telegra.ph/How-To-Hack-Sites-Using-Remote-File-Inclusion-10-18
❤️🔥By=@its_me_kali
🍊WAF BYPASS BY KALINGRAAJ
https://telegra.ph/How-To-Bypass-Web-Application-Firewall-02-15
🤍Tools🤍https://www.mediafire.com/file/r3k2vhkv2ihczwz/Advance_Web_hacking_tools.rar/file
🍅REGARDS=@cidhub
🔔🔔Cyber Harassment Safety Guide By IMK 🔔🔔
Have you ever thought your how your personal data become public and how hackers do that .
Its very simple, your stupidity behind it .
Let's understand what are the common factors through which someone attack on you .
.................its_me_kali...............
❤️🔥Missing Double Authentication .
❤️🔥Clicking on unknown links.
❤️🔥Downloading unknown files and pdfs without scanning them through antivirus or virustotal.com
❤️🔥Making unencrypted backup of your files on cloud.
❤️🔥Trusting unknown person may be he or she just messaged you for getting your personal details, stay away from these catphishers .
❤️🔥Saving or sharing your unclad photos on social media apps .
❤️🔥Using mods or cracked softwares.
🟧🟩Safety Measures🟧🟩
.............its_me_kali..............
🔘Don't use face lock, use six digit pin.
🔘Use double authentication in each and every account .
🔘Weekly check your running services of your device in settings in developer option there's a option of running services(activities).
🔘Never share your personal pics with strangers .
🔘Use different username in every accounts .
🔘Backup your files in encrypted form with password protection .
🔘Don't share your number in social media apps except whatsapp.
🔘If you found your personal data leaked anywhere then don't panic its your public data that you shared on web.
🔘If any hacker demand you money for deleting your personal info or decrypting your encrypted files then never trust ,90% of them will not do that after getting money .
🔘Never share your personal details on online advertisement of different apps and sites.
🀄️Note🀄️ Never trust any carders or money doublers of telegram of any channel they all are scammers. Keep it in your mind . No carder will card product for you at cheaper price. If you like this post please share it in each and every channel and group with credits .
👨💻Cyber Fraud Awareness 👨💻
Some of you suffering from cyber frauds and scamming so providing you these websites where you can file complaints for cyber frauds !!
🍎https://www.cybercrime.gov.in/
Number=155260
🍎www.consumercomplaintindia.com/cyber-cell
Call 084482 20668
Consumer Complaint India · File Complaint Now
🍎https://grahakshikayatmanch.com/
🍎https://www.consumercomplaints.info/
🍎https://consumerchanakya.com
Call Now 8588850696
🍎https://staysafeonline.org/stay-safe-online/identity-theft-fraud-cybercrime/reporting-cybercrime/
🍎https://cytrain.ncrb.gov.in/
🚨🚨🚨@CIDHUB🚨🚨🚨
🇮🇳 Copy with credit 🇮🇳
❤️🔥❤️🔥General website and HTML checks❤️🔥❤️🔥
What is the Website Checker?
The Website Checker analyzes your website to see how well equipped it is for success online, and gives you tips on how you can improve it.
🥶More=bio.cool/itsmekali
🎇Regards=@CIDHUB
🦹♂🦹♂All about ETHICAL HACKING 🦹♂🦹♂
What is Ethical Hacking?
Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data, for finding Vulnerabilities to protect it from threats.
❤️🔥 Injection attacks.
❤️🔥 Changes in security settings.
❤️🔥 Exposure of sensitive data.
❤️🔥 Breach in authentication protocols.
❤️🔥 Components used in the system or network that may be used as access points.
🍎Course1🍎
https://bit.ly/2YwiEr4
🍎Course2🍎
https://bit.ly/3DntwqG
❤️More:= bio.cool/itsmekali
🍏Regards=@CIDHUB
🐽PIGGYBACKING GUIDE 🐽
Piggybacking is defined as stealing, or commandeering, a wireless connection. An example of piggybacking is using your neighbor's connection. Gaining access to a restricted communications channel by using the session another user already established.
🍏Security Tips🍏
❤️🔥Change default passwords. .
❤️🔥 Restrict access.
❤️🔥 Encrypt the data on your network. ...
❤️🔥 Protect your Service Set Identifier (SSID).
❤️🔥 Install a firewall.
❤️🔥 Maintain antivirus software.
❤️🔥 Use file sharing with caution.
❤️🔥 Keep your access point software patched and up to date.
❤️🔥Guide❤️🔥
https://telegra.ph/Piggybacking-Guide-10-06
🦹♂By=@its_me_kali
🍎Regards=@CIDHUB
👁TIME MANAGEMENT TRICK👁
Some of you are asking about how to manage your time and learn more.
Here is the guide by IMK which will help you.
🍎9 time management skills practiced by successful people:
❤️🔥 Start your day early.
❤️🔥 Set priorities and goals when planning your day.
❤️🔥 Focus on one task at a time.
❤️🔥 Learn to delegate.
❤️🔥 Apply the 80/20 rule.
The Pareto principle (also known as the 80/20 rule or the law of the vital few) states that in many cases, roughly 80% of the effects of action comes from 20% of the causes.
❤️🔥 Pencil in some time for distractions and interruptions.
❤️🔥 Say no more often and master the art of short meetings.
❤️🔥 Divide your time in different phase.
❤️🔥ABC METHOD
Another common method for prioritizing tasks is the ABC method, which ranks each task with the letter A, B, or C. The most important tasks on your time management plan are given the letter A, less important tasks the letter B, and the least important tasks the letter C.
🦹♂REGARDS=@ITS_ME_KALI
👾🍏Top Web Hacking 2021 TOOLS 🍏👾
Web hacking refers to exploitation of applications via HTTP which can be done by manipulating the application via its graphical web interface, tampering the Uniform Resource Identifier (URI) or tampering HTTP elements not contained in the URI.
👁Basic Guide👁
https://github.com/infoslack/awesome-web-hacking
🧑💻@its_me_kali
🍎TruffleHog browser extension
https://github.com/trufflesecurity/Trufflehog-Chrome-Extension
🧑💻@its_me_kali
🍎Raider
https://github.com/DigeeX/raider
🧑💻@its_me_kali
🍎WARCannon
https://github.com/c6fc/warcannon
🧑💻@its_me_kali
🍎Scrapesy
https://pypi.org/project/scrapesy/
🧑💻@its_me_kali
🍎Intruder
https://www.intruder.io
🧑💻@its_me_kali
🍎Netsparker
https://www.netsparker.com/web-vulnerability-scanner/download-vulnerability-scanner/
🧑💻@its_me_kali
🍎Nmap
https://nmap.org/download.html
🧑💻@its_me_kali
🍎Wireshark https://www.wireshark.org/download.html
🧑💻@its_me_kali
🍎Nessus
https://www.tenable.com/products/nessus
🧑💻@its_me_kali
🍎Burpsuite
https://portswigger.net/burp/communitydownload
🧑💻@its_me_kali
👨🏫Regards=@CIDHUB
❤️🔥Bait and Switch Attack Safety Guide❤️🔥
Bait and switch hacking is a technique on the rise due to the explosion of internet-based content marketing. A bait and switch attack occurs when victims are told they are downloading or running a piece of safe and legitimate content or advertising which is then switched (usually by way of a redirect) to something malicious..
🥶It works like this:
The hacker buys advertising on a network or popular website.
The hacker then submits a ‘safe’ and nonmalicious advertisement to the network which is then approved.
Once approved, the hacker then switches the link or actual advertising content to something malicious.
❤️Safety Guide ❤️
🍏Read the Terms and Conditions🍏
🍏Compare with Other Sellers
🍏Ask for a Rain Check
🍏Clarify the Pricing Terms
🍏Don’t Agree to a Purchase If You Feel Uncomfortable
🍏Research the Seller Beforehand.
🍏Before dealing check verified details first.
👁Recent Scam Case👁
https://bit.ly/39QI7hp
🦹♂Regards=@CIDHUB
💚How to bypass payment and otp of websites 💚
https://telegra.ph/Bypass-Payment-gateway-on-Websites-11-10
❤️🔥 Only For Educational Purpose❤️🔥
https://anonfiles.com/p5cch9Nbo0/video_2020-08-04_06-21-15_mp4
⛩️BURP SUITE OTP BYPASS ⛩️
Disclaimer: I will be censored about the target on my Practice, so find your own target. WARNING!!! This is Education Purpose Only
Open Mozilla Firefox then configure the Proxy like this
Open Burpsuite
Create a Temporary Project, then click next until Burpsuite shows the Dashboard.
After the Dashboard Burpsuite opened, navigate to Proxy Menu then Intercept. Make sure your Intercept is on because if Intercept is off you can’t use it.
After you set Intercept is on navigate on Mozilla Firefox then navigate to your website target
Your Intercept text will be changed to orange text, you must forward it until the page on Mozilla Firefox normally opened.
Login into the page that you have to navigate it, after you Login. The page on Mozilla Firefox will not successfully load after you click the Forward button in the Burpsuite.
Click forward until the next page is showing
After the next page is showing, I can see there are 2 buttons available, GO & Resend Code. The next step you must hit the Resend Code button again. Then the Burpsuite will show the Cookies Data
You will ask, Where is the OTP Code? Chill, you must Decode the Cookies Data First. Open in another Browser, then navigate to https://www.urldecoder.org/ paste the Cookies Data (the Red Color Text in Image) into urldecoder the result will look clean like this
and Now, Where is the fucking OTP CODE? Just check in the Output you’ve decode it.
Congratulations! You have OTP CODE right now. Now back to Mozilla Firefox input the OTP CODE then click GO!
You have BYPASSED the OTP CODE.
❤️🔥 Note = This only works on vulnerabile sites not all, where you can perform web tampering.
🥶/channel/l000century/271
🌍REGARDS=@CIDHUB
🦹♂🦹♂Work Portfolio Making Course 2021🦹♂🦹♂
A work portfolio is a collection of work samples that shows your capabilities to prospective employers. Job seekers might have an online portfolio, a paper portfolio, or both. Choose the format that best showcases the work you do. Your portfolio should be easy to navigate and aesthetically pleasing.
❤️🔥Web Hosting and Domain ❤️🔥
https://telegra.ph/Free-Webhosting-2020-latest-methods-10-21
🍎PASS=@its_me_kali
👁Regards=@CIDHUB
🌴Learn Swift Programming Step by Step🌴
🐳Description: Learn the fastest growing programming language for iOS. Learn Swift programming language in this Swift online tutorial.
https://www.eduonix.com/courses/Software-Development/Learn-Swift-Programming-Step-by-Step
💙Pass=@its_me_kali
💙Course by Eduonix❤
📳NETWORK HACKING 2021📳
💙The course objective is to help you learn to master the (ethical) hacking techniques and methodology that are used in penetration systems. The course is designed for IT passionate, network and system engineers, security officers.❤
💚Computer Network Types💚
Below are the most common computer network types that are frequently used these days:
🍎LAN [Local Area Network}
🍎WLAN [Wireless local area network]
🍎CAN [Campus Area Network]
🍎MAN [Metropolitan Area Network]
🍎PAN [Personal Area Network]
🍎SAN [Storage Area Network]
🍎VPN [Virtual Private Network]
🍎WAN [ Wide Area Network]
❤️🔥Course @ITS_ME_KALI
https://mega.nz/folder/UAFFmCZB#lC2yKfMfx4Y71upL_qsgzw
☘Regards=@CIDHUB
❤️🔥Ethical Hacking Countermeasures 2021❤️🔥
🔘Password cracking
🔘Password attacks
🔘Identifying various password cracking tools
🔘Formulating countermeasures for password cracking
🔘Escalating privileges
🔘Executing applications
🔘Keyloggers and Spywares
🔘Spywares and keyloggers countermeasures
🔘Hiding files
🔘Understanding rootkits
🔘The use of Steganography
🔘Covering tracks
🧭Course @ITS_ME_KALI
https://bit.ly/2VSY976
🧭Book @ITS_ME_KALI
https://bit.ly/3kmijzV
🧭Guide @ITS_ME_KALI
https://bit.ly/2XET6rT
🍎Regards=@CIDHUB
🍎ALL ABOUT PORTS 2021🍎
https://telegra.ph/Port-Forwarding-without-router-01-30
🍊WHAT IS PORT ?🍊
We can say that A port number is a way to identify a specific process to which an Internet or other network message is to be forwarded when it arrives at a server.
A port number uniquely identifies a network-based application on a computer.A port number is the logical address of each application or process that uses a network or the Internet to communicate. In a server, more than one user process can use TCP at the same time. To identify the data associated with each process, port numbers are used. Port numbers are 16-bit, and numbers up to 65535 are possible.
Here are some Important port number for you :
20: File Transfer Protocol (FTP) Data Transfer
21: File Transfer Protocol (FTP) Command Control
22: Secure Shell (SSH) Secure Login
23: Telnet remote login service, unencrypted text messages
25: Simple Mail Transfer Protocol (SMTP) E-mail routing
53: Domain Name System (DNS) service
67and 68: Dynamic Host Configuration Protocol (DHCP) servers use UDP port 67 to listen for requests while DHCP clients communicate on UDP port 68.
69: TFTP(Trivial File Transfer Protocol) TFTP offers a method of file transfer without the session establishment requirements that FTP uses. Because TFTP uses UDP instead of TCP
80: Hypertext Transfer Protocol (HTTP) used in the World Wide Web
88: The Xbox Live Internet gaming service uses several different port numbers including UDP port 88.
110: Post Office Protocol (POP3)
119: Network News Transfer Protocol (NNTP)
123: Network Time Protocol (NTP)
137/138/139 NetBIOS
143: Internet Message Access Protocol (IMAP) Management of digital mail
161and 162: Simple Network Management Protocol (SNMP)
194: Internet Relay Chat (IRC)
389 Lightweight Directory Access Protocol (LDAP)
443: HTTP Secure (HTTPS) HTTP over TLS/SSL
The registered ports are those from 1024 through 49151. IANA maintains the official list of well-known and registered ranges. The dynamic or private ports are those from 49152 through 65535. One common use for this range is for ephemeral ports.
🍊REGARDS=@CIDHUB
🍎SQL MYSQL DB DESIGNING🍎
🍎Learn how to design database !
🍎This app will help you most!
https://play.google.com/store/apps/details?id=com.klim.dbdesigner
#its_me_kali
🍏Course
https://mega.nz/#F!ijxhhASB!1DmHWKPfh1C95SdC7HsmVQ
🍏By=@ITS_ME_KALI
❤️🔥Practice Questions Examples ❤️🔥
Ques.1. Write an SQL query to fetch the EmpId and FullName of all the employees working under Manager with id – ‘986’.
Ans. We can use the EmployeeDetails table to fetch the employee details with a where clause for the manager-
SELECT EmpId, FullName FROM EmployeeDetails WHERE ManagerId = 986;
🍏By=@ITS_ME_KALI
Ques.2. Write an SQL query to fetch the different projects available from the EmployeeSalary table.
Ans. While referring to the EmployeeSalary table, we can see that this table contains project values corresponding to each employee, or we can say that we will have duplicate project values while selecting Project values from this table.
So, we will use the distinct clause to get the unique values of the Project.
SELECT DISTINCT(Project) FROM EmployeeSalary;
🍏By=@ITS_ME_KALI
Ques.3. Write an SQL query to fetch the count of employees working in project ‘P1’.
Ans. Here, we would be using aggregate function count() with the SQL where clause-
SELECT COUNT(*) FROM EmployeeSalary WHERE Project = 'P1';
🍏By=@ITS_ME_KALI
Ques.4. Write an SQL query to find the maximum, minimum, and average salary of the employees.
Ans. We can use the aggregate function of SQL to fetch the max, min, and average values-
SELECT Max(Salary), Min(Salary), AVG(Salary) FROM EmployeeSalary;
🍏By=@ITS_ME_KALI
Ques.5. Write an SQL query to find the employee id whose salary lies in the range of 9000 and 15000.
Ans. Here, we can use the ‘Between’ operator with a where clause.
🍏By=@ITS_ME_KALI
SELECT EmpId, Salary FROM EmployeeSalary WHERE Salary BETWEEN 9000 AND 15000;
🍏By=@ITS_ME_KALI
Regards=@CIDHUB
⭕LEARN ANDROID APP DEVELOPMENT 2020⭕
🍎HERE IS EVERYTHING REQUIRED FOR LEARNING
APP DEVELOPMENT 🍎
⭕ANDROID STUDIO APP ⭕
https://play.google.com/store/apps/details?id=arjuntoshniwal.androidtutorials.advanced
⭕App Development COURSE⭕
https://mega.nz/folder/gRJBkYJZ
Key= 3FFR6aY0mz2R9CAdhGKZ2w
🇮🇳Regards=@its_me_kali
🌋#copy with credit #🌋
🍎🍎ALL ABOUT SSH 🍎🍎
SSH provides password or public-key based authentication and encrypts connections between two network endpoints. It is a secure alternative to legacy login protocols (such as telnet, rlogin) and insecure file transfer methods (such as FTP).
💚https://telegra.ph/ALL-ABOUT-SSH-05-10
💚By=@its_me_kali
🦁REGARDS=@Cidhub