Learn how to find ANYONE’s email associated with Github accounts and Google drive files using two different OSINT techniques. In today’s hyper-connected world, our digital footprints are larger than ever. While we might think certain information like our email address …
Did you know Google once paid nearly $150k to a security researcher for discovering a single SSRF vulnerability? That vulnerability was Server-Side Request Forgery (SSRF), a potentially devastating flaw that can allow attackers to manipulate web servers. If you’re interested …
Hey guys! In this video, we will discuss how to generate a payload and a listener via Empire, and trick users into clicking a .pdf shortcut that has that backdoor. This is How Hackers Take Over Your Device! Empire is a …
A step-by-step guide teaching you how to discover and exploit IDOR vulnerabilities + xp_cmdshell + local buffer overflow to hack a RaaS (Ransomware-as-a-Service) platform and gain full remote control over their servers. Check out the video below: Hacking the Hackers …
This video will show you how hackers can hack cryptocurrency and how to secure your crypto from the mentioned methods.Check out the video below: How Crypto Gets Hacked? ————————————————————————————Resources:How Phishing Links Are Generated: https://www.youtube.com/watch?v=2crXwg-a_SQCrypto scam tracker: https://dfpi.ca.gov/consumers/crypto/crypto-scam-tracker/LaZagne: https://github.com/AlessandroZ/LaZagneMimikatz: https://github.com/gentilkiwi/mimikatz————————————————————————————Maythom social media:Personal Youtube channel: @maythomPatreon: https://patreon.com/MAYTHOMInstagram: https://www.instagram.com/mayth0m Twitter: https://twitter.com/mayth0m————————————————————————————-zSecurity …
This video showcases a tool named Xeuledoc that can extract metadata from publicly shared Google documents such as Docs, Sheets, and Slides.