Get Mystery Box with random crypto!

𝐂𝐘𝐁𝐄𝐑 𝐢𝐧𝐯𝐞𝐬𝐭𝐢𝐠𝐚𝐭𝐨𝐫 𝟐.𝐎™

Logo of telegram channel cyber_investigator — 𝐂𝐘𝐁𝐄𝐑 𝐢𝐧𝐯𝐞𝐬𝐭𝐢𝐠𝐚𝐭𝐨𝐫 𝟐.𝐎™ 𝐂
Logo of telegram channel cyber_investigator — 𝐂𝐘𝐁𝐄𝐑 𝐢𝐧𝐯𝐞𝐬𝐭𝐢𝐠𝐚𝐭𝐨𝐫 𝟐.𝐎™
Channel address: @cyber_investigator
Categories: Cryptocurrencies
Language: English
Subscribers: 193

Ratings & Reviews

3.67

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

1

4 stars

1

3 stars

0

2 stars

1

1 stars

0


The latest Messages 4

2021-08-26 09:32:25 Session Hijacking 2021

A session hijacking attack happens when an attacker takes over your internet session — for instance, while you're checking your credit card balance, paying your bills, or shopping at an online store. Session hijackers usually target browser or web application sessions.

Session Hijacking Techniques.

Types of Session Hijacking.

Prevention and security techniques .

MITM ,MITB,TCP,UDP techniques .

IP, ARP, DNS spoofing.

Session Fixation .

Tools for Hijacking .

Password=@its_me_kali
26 views〘CID〙 🇰‌🇦‌🇱‌🇮 ✺ , 06:32
Open / Comment
2021-08-25 11:03:31 ALL ABOUT INTELLIGENCE

Intelligence is the ability to learn from experience and adapt to the environment.

THREATINT
HUMINT
IMINT
SIGINT
MASINT
GEOINT
COMINT
ELINT
FISINT
IRINT
NUCINT
FININT
TECHINT
SOCMINT
OSINT
CYBINT
ACINT
Top Intelligence Agencies

Article
https://telegra.ph/Intelligence-And-Its-Types-By-IMK-08-25

Regards=@its_me_kali
48 views〘CID〙 🇰‌🇦‌🇱‌🇮 ✺ , 08:03
Open / Comment
2021-08-23 11:19:41 WEB PENTESTING 2021

A penetration test, also known as a pen test, is a simulated cyber attack against your computer system to check for exploitable vulnerabilities. In the context of web application security, penetration testing is commonly used to augment a web application firewall (WAF).

Top Tools

Netsparker
Arachni
BeEF
Acunetix
ImmuniWeb
Vega
Wapiti
SQLMap
ZED Attack Proxy

Cheatsheet
https://hausec.com/pentesting-cheatsheet/

Jobs

https://www.naukri.com/web-application-penetration-testing-jobs

https://www.upwork.com/freelance-jobs/penetration-testing/

Pass=@its_me_kali
55 views〘CID〙 🇰‌🇦‌🇱‌🇮 ✺ , 08:19
Open / Comment
2021-08-22 09:05:07 LEAR FIGMA 2021

Figma is the only platform that brings together powerful design features you already love and a more efficient workflow to boot.
However, Figma also holds a few hidden gems I would like to share with you to improve up your workflow even further.
...

Builtin Version History!

Smart selection & tidy.

Import images quickly.

Adjust nudging.

Arc tool.

Batch create and (re)name components.

https://mega.nz/folder/RNJEQYSL#FtZnp3LM-3ol0eP7FPOEbg

REGARDS=@its_me_kali
61 views〘CID〙 🇰‌🇦‌🇱‌🇮 ✺ , 06:05
Open / Comment
2021-08-21 11:31:13 2021 AI COURSE

Artificial intelligence endeavours to simulate human intelligence. It has immense potential in cybersecurity. If harnessed correctly, Artificial Intelligence or AI systems can be trained to generate alerts for threats, identify new types of malware and protect sensitive data for organisations.

https://mega.nz/folder/5OZk0JyS#P163w9d0AZfHk_CuL3X9Mw

Key=P163w9d0AZfHk_CuL3X9Mw

REGARDS=@its_me_kali
63 views〘CID〙 🇰‌🇦‌🇱‌🇮 ✺ , 08:31
Open / Comment
2021-08-20 11:52:38 ALL ABOUT ROOTKITS

A rootkit is a clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence. ... Today rootkits are generally associated with malware – such as Trojans, worms, viruses – that conceal their existence and actions from users and other system processes.

Rootkits Designing
Rootkits Detection
Rootkits Protection
FUD creation
Keylogger Creation
Backdoor Creation
Firewall Bypass
Shell Coding
Code Injections

ALL ABOUT PAYLOAD 2021

https://telegra.ph/Create-Undetectable-Payload-01-28

https://mega.nz/folder/ojpmlCCZ#8CR38iGbIBPDryl7krVYZQ

How to remove a rootkit

Step 1: Run rootkit removal software. Don't rely on Windows Defender or other inbuilt security software, since most rootkits can subvert basic protections. ...

Step 2: Perform boot-time scan. ...

Step 3: Wipe device and reinstall OS.

Pass=@its_me_kali
28 views〘CID〙 🇰‌🇦‌🇱‌🇮 ✺ , 08:52
Open / Comment
2021-08-19 11:33:10 Threat Protection Guide

Threat protection refers to a category of security solutions that defend against sophisticated malware or hacking-based attacks targeting sensitive data. Advanced threat protection solutions can be available as software or as managed services.

Blackhat Countermeasures
https://telegra.ph/BlackHat-Countermeasures-06-09


Course
https://mega.nz/file/ZWYywLLL#Rb4cWEBrcthCymcYBv-t0HTvQ5NKvZI6SHAPJzm1a1s

Regards=@its_me_kali
43 views〘CID〙 🇰‌🇦‌🇱‌🇮 ✺ , 08:33
Open / Comment
2021-08-18 09:17:42 Osint 2021 Course

Top Osint techniques and guides.

‍ Tools ‍
https://telegra.ph/Best-25-OSINT-Tools-09-22

Course
https://t.me/l000century/217

Social Engineering

Malware Analysis

OSINT Guide

Data Searching Techniques

SOCINT

GEOINT

IMGINT

Regards=@Its_me_kali
58 views〘CID〙 🇰‌🇦‌🇱‌🇮 ✺ , 06:17
Open / Comment
2021-08-17 10:18:16 Torrent Creation & Best torrent of 2021

How to get any torrent file fast?
First search torrent files in torrent search bot, copy that magnet url and paste it in seedr. cc then it will give you download able link, which u can upload to url uploader bot, either directly download in your browser.

‍ For More information check below article.

https://telegra.ph/ALL-ABOUT-TORRENT-02-09

Site To upload torrent url
https://www.seedr.cc

FreeTorrent Courses
@cybertorrenthub

Torrent Search Bot
@torrentsearcher_bot

Url Uploader Bot
@urluploadxbot

Regards=@its_me_kali
60 views〘CID〙 🇰‌🇦‌🇱‌🇮 ✺ , 07:18
Open / Comment
2021-08-16 09:30:53 Doxing 2021 GUIDE BY IMK

Ip Hunting
https://telegra.ph/IP-HUNTING-TRICKS-11-24

DoxingGuide
https://telegra.ph/ALL-ABOUT-DOXING-11-19

OSINT TOOLS
https://telegra.ph/Best-25-OSINT-Tools-09-22

Google Dorking
https://telegra.ph/Google-Dorks-And-Google-Hacking-02-06

All Stuff
https://telegra.ph/How-to-become-a-ethical-hacker-02-28

Tools By IMK
https://kalingraajtools.000webhostapp.com/index.html

Note:Only for educational purpose, according to IT ACT 2000 doxing is illegal..

Regards=@its_me_kali

#Be Safe
#Be Legal
61 views〘CID〙 🇰‌🇦‌🇱‌🇮 ✺ , 06:30
Open / Comment