Cyber Security Technology
0 FOLLOWERS
Dedicated Into Providing Knowledge About Cyber Threats And How To Avert-Prevent Them.
Cyber Security Technology
3y ago
Infoga is an tool that amasses information from sundry public sources on email accounts ips, hostname, country, and tests if emails are leaked . It's an authentically rudimentary implement, but very subsidiary for the early stages of a perforation test or just to understand your company's internet exposure.Installing Infoga :git clone https://github.com/m4ll0k/Infoga.git && cd InfogaAfter ..read more
Cyber Security Technology
3y ago
OSINT Stands For Open Source Intelligence Which is the amassment and review of open or plenarily accessible material. Throughout the roles of national security, law enforcement, cyber security professionals, gregarious engineers and business perspicacity, OSINT is mainly utilized. "One who knows the enemy and knows himself will not be endangered in a hundred engagements" - Sun TzuOSINT has been ..read more
Cyber Security Technology
3y ago
What Is Websploit?Websploit is a MITM framework built with python.Websploit Can Be Used To Intercept network data frames, change traffic or halting all traffic,or Monitoring & gaining knowledge about traffic to and from a network, performing a De-authentication attack, etc. Websploit Has Some Useful Modules Such As "arp_spoof" "wifi_deauth" "wifi_fap" "http_sniffer" etc. What Attacks Can ..read more
Cyber Security Technology
3y ago
Installing KALI LINUX in Any Android Phone Using Termux With Only A Few Commands Kali Linux is a Linux distribution based on Debian that is intended for ethical hacking, social engineering, Information Gathering , digital forensics and perforation testing.Since Its Debian Based It Utilizes dpkg and everything else, but however its famous for its pre-installed implements. Kali Linux has about 600 ..read more
Cyber Security Technology
3y ago
Open "Notepad" And Type :@echo off Set wshShell = wscript.CreateObject("WScript.Shell") do wscript.sleep 100 wshshell.sendkeys "YOUR TXT HERE" loopSave it as "VIRUS.VBS" Once it opens it'll execute the commands This Blog or Author shall not be responsible or liable in any manner for user Actions, any lawsuits, penalties, injuries, expenses, indirect damages, costs or liabilities whatsoever.  ..read more
Cyber Security Technology
3y ago
Wi-Fi is a common wireless network system category of IEEE 802.11 systems. WPA has been developed to respond to significant WPA and WPA2 vulnerabilities. The susceptibility imposes a WPS PIN retrieval and WPA/WPA2 password within few hours of a remote intruder. WPAs remain a sundry WPA routing crossover configuration option.
Password Hacking Hackie ..read more
Cyber Security Technology
3y ago
Mount folder/filesystem through SSH :
sshfs name@server:/path/to/folder /path/to/mount/point
Compare a remote file with a local file :
Source : Linuxcommandlibrary
ssh user@host cat /path/to/remotefile | diff /path/to/localfile -
Source : Linuxcommandlibrary
Watch Star Wars :
telnet towel.blinkenlights.nl
Source : Linuxcommandlibrary
Individually 7zip all files in current directory :
Source : CommandLineFu
for i in *.*; do 7z a "$i".7z "$i"; done
Source : CommandLineFu
Information about the CPU :
lscpu | egrep 'Model name|Socket|Thread|NUM ..read more
Cyber Security Technology
3y ago
Hacking ATTACK SIMULATION WILL BEGIN In A Few Seconds,Refresh To Review Or Go To Another Post To Exit !
Read more ..read more
Cyber Security Technology
3y ago
The First AI :
The first artificial intelligence program was developed as a science subject in 1955.
However The Concept Of Artificial Intelligence Goes Back To 10th century BC yes, 10th century BC ! When Yan Shi presented King Mu of Zhou with mechanical men.
There is a strange story involving a much earlier meeting between Zhou's Mu and Yan Shi, the 'artificial' mechanical engineer. They proudly showed the King his mechanical life-size, human-shaped figure.
There have been several waves of optimism and deceit and a shortage of resources. In the 21st century, AI techniques reapp ..read more
Cyber Security Technology
3y ago
To Protect Your Self from Covid 19 Remember To :
Clean & Wash your hands very much & Cough or sneeze in your bent elbow, not your hands!
Avoid rubbing your eyes-nose. Restricted social events and time spent in crowded locations
Clean and disinfect objects and surfaces that are often touched
Cover your mouth and nose with a Mask.
For More Information Make Sure To Visit w.h.o website.
Wishing you a Happy New Year with the hope that you will have many blessings in the coming year. Happy New year.  ..read more