View allAll Photos Tagged bugbounty
Fix Kali Linux Source List Update Upgrade Errors Sources.List Repositories 2022.2 | Kali Linux
Link : www.kali.org/docs/general-use/kali-linux-sources-list-rep...
On a standard, clean install of Kali Linux, with network access, you should have the following entry present in /etc/apt/sources.list:
f the output doesn’t exactly match up to the above output, you may not be able to install any new additional packages or receive updates. This may happen for any number of reasons, such as:
You have switched your branch.
Using a different hardcoded mirror.
You will probably want to read the “switching branches” section to alter this.
Since Kali 2020.3, after Kali’s setup is complete, network repositories will be enabled by default, even if there was no network access during installation.
CEH Course 2023:-
Day 1 : introduction: CEH "Certified Ethical Hacking"
Link: youtube.com/watch?v=TNtIygnmLtw&feature=shares
Day 2 : Introduction: Kali Linux CEH "Certified Ethical Hacking"
Link: youtube.com/watch?v=v40QVxrmmzs&feature=shares
Day 3 : Linux FIle System CEH "Certified Ethical Hacking"
Link: youtube.com/watch?v=8aIXbZhUTkg&feature=shares
Day 4 : Information Gathering CEH "Certified Ethical Hacking"
Link: youtube.com/watch?v=8ZCXClsdvUs&feature=shares
Day 5 : Phishing Attack CEH "Certified Ethical Hacking"
Link: youtube.com/watch?v=DyGJ9BXOsYw&feature=shares
Day 6 : nmap basic concept # 1 CEH "Certified Ethical Hacking"
Link: youtube.com/watch?v=yv6ffgby2Xk&feature=shares
Day 7 : Nmap Scripting Engine (NSE) # 2 CEH "Certified Ethical Hacking"
Link: youtube.com/watch?v=gT6f_X2A19s&feature=shares
Day 8 : "Day 8 : Hacking With Usernames CEH "Certified Ethical Hacking"
Link: youtube.com/watch?v=wv478i8kufs&feature=shares
Day 9 : Gobuster - Penetration Testing Tools in Kali Tools, CEH "Certified Ethical Hacking"
Link: youtube.com/watch?v=zkcEev_qmXk&feature=shares
Day 10 : Seclists Wordlists for Pentester CEH "Certified Ethical Hacking"
Link: youtube.com/watch?v=uoQNP5oNi6E&feature=shares
Day 11 : Hydra for Pentester CEH "Certified Ethical Hacking"
Link: youtube.com/watch?v=Aj87Kt95rIw&feature=shares
Day 12 : Web Fundamentals for Pentester CEH "Certified Ethical Hacking"
Link: youtube.com/watch?v=DhX6y8A2Eww&feature=shares
BugBounty Course 2023
How We Find XSS bug In Website...#bugbounty #XSS secret Tip and Trick
Link: youtube.com/watch?v=ViLIVc-kGyo&feature=shares
How we Find The Sql Injection Bug In a Website With The Help Of Tool #bugbounty #sqlmap #oscp
Link: youtube.com/watch?v=CRS53oxMssg&feature=shares
instagram Link : instagram.com/mr_robot09?igshid=Yzg5MTU1MDY=
Linkedin Link :https://www.linkedin.com/in/abhishek-aswal-69696921b
Github Link : github.com/freecouse098/freecouse098/blob/main/Profile.md
vulnhub Link : www.vulnhub.com/entry/dripping-blues-1,744/
Telegram Link : t.me/FreeCourse_Offical_Disscussion
Whatsapp Link : chat.whatsapp.com/LTO5tlCstI8D9iwOgS3TrU
ethicalhacking #ceh #bugbounty #oscp #ccna #bug #hacking #Metasploit
Contact Me
Email: abhishekaswal777@gmail.com
@htbridge : Bug Bounties Aren't Silver Bullet for Better Security: t.co/73kRD0F8hD #bugbounty #cybersecurity (via Twitter twitter.com/htbridge/status/1085148581852598273)
I am an experienced Open Source Intelligence (OSINT) Investigator and Cybersecurity Specialist with over 7 years of hands-on experience in digital investigations, social media profiling, threat analysis, and information security. My academic foundation in Finance & Banking from the University of Dhaka–affiliated Govt. Titumir College has equipped me with strong analytical and research skills, which I apply daily to solve complex cyber and intelligence challenges.
My work involves uncovering hidden digital footprints, analyzing open-source data, and supporting individuals, legal professionals, journalists, and organizations in identifying threats, tracing digital assets, and resolving online fraud or harassment cases. I have supported numerous private and corporate clients in identifying anonymous threat actors, recovering hacked accounts, verifying backgrounds, and reporting fraudulent activity. I also specialize in investigating impersonation, romance scams, cryptocurrency theft, and online abuse.
As a cybersecurity professional, I follow ethical and legal frameworks while using advanced tools and techniques for intelligence gathering. My methods are fully OSINT-based, ensuring privacy and compliance with international standards. I rely on a mix of threat intelligence platforms, deep web research, social media analytics, domain tools, and cross-referenced databases to build factual, actionable reports.
Over the years, I’ve worked with individuals in highly sensitive matters, helping them navigate harassment, blackmail, fraud, or property disputes by uncovering the truth and securing evidence. My clients appreciate my confidentiality, attention to detail, and timely delivery of verified information.
Currently, I live in Mirpur, Dhaka, and continue my mission to support digital safety and transparency. I am always open to freelance collaborations or new assignments in the fields of OSINT, cybersecurity, or fraud investigation.
If you need support identifying a person, tracing an online account, verifying a claim, or resolving a digital threat — I’m here to help. Let’s connect and explore how I can assist.
@htbridge : #GitHub widens the scope of its #bugbounty program and increases rewards: t.co/nm2Pc5Y8w3 #cybersecurity (via Twitter twitter.com/htbridge/status/1098241642606313473)
Tor, anonim olmak isteyenler için biçilmiş bir kaftan. Standart VPN sunucularının aksine çok daha komplike bir algoritmaya sahip olan Tor, bu nedenle sıradan VPN hizmetlerine göre daha güvenilir bir konumda.
DeepWeb‘e de giriş yapmamıza da olanak sağlayan Tor, güvenlik konusunda ipleri...
@htbridge : #Microsoft launches Azure #DevOps #bugbounty program, $20,000 rewards on offer: t.co/mWQiq7eIMM (via Twitter twitter.com/htbridge/status/1086259637261881344)
@htbridge : Application Security Weekly Review, Week 3 2019. Highlights of the most interesting #cybersecurity news of this week. t.co/NR5dNoNHbn #appsec #bugbounty (via Twitter twitter.com/htbridge/status/1086238113448497153)
@htbridge : Top 5 Bug Bounty Platforms: @HackenProof, @openbugbounty, @YesWeHack, @Bugcrowd, @Hacker0x01. t.co/p8YmCSoig2 #bugbounty #ethicalhacking (via Twitter twitter.com/htbridge/status/1101117415386218496)
Brute force attack prevention
Database security
Website files security
Firewall security
www.fiverr.com/frontenrahan/do-pentest-your-website-with-...
@htbridge : New Settings Let #Hackers Easily #Pentest #Facebook, #Instagram Mobile Apps: t.co/HVtTveRJ9I #MobileSecurity #BugBounty (via Twitter twitter.com/htbridge/status/1110580507325222913)
It's important to cook the deer meat before serving it to your cat. Cooking helps get rid of any potential nasties that could make your cat sick. Skip the seasonings and spices – plain and simple is the way to go. check out here 👇
✅https://payrchat.com/blogs/1750/can-cats-eat-deer-meat
@htbridge : RT @secuninja: finally a news blog on @openbugbounty 😍 lots of cool new features announced #BugBounty #websecurity t.co/6QE2IRIBoD (via Twitter twitter.com/htbridge/status/1093838785438277632)
@htbridge : Researcher Earns $10,000 for Another #XSS Flaw in #Yahoo Mail: t.co/j9zPSFFKn7 #WebSecurity #BugBounty (via Twitter twitter.com/htbridge/status/1098885545030230016)
I am a web cyber security expert with 2 years of experience. Besides I have another 4 years of experience in web development. Currently I am engaged in website security analysis, assessment, deep scan, malware/virus removal etc.
I will do solve any hacking issues
@htbridge : RT @Gamliel_InfoSec: Online resource, useful for basic static analysis of mobile Apps (Android & iOS). But the backend analysis is where the fun begins :) t.co/lBfrPnRDg6 #basic #mobile #pentest #resources #hacking #bugbounty #hack2learn (via Twitter twitter.com/htbridge/status/1186316091255132162)
Discover our comprehensive features designed for effective penetration testing.
contact us
📞 +91 9692186285, +91 8917484478
📧 info@kronoryx.com
blogs- kronoryxtechnology.blogspot.com/2023/09/fortifying-websit...
Welcome to my private investigation services! In this digital age, it's becoming increasingly common for people and businesses to be affected by online crimes and other nefarious activities. As your private investigator, I offer a range of digital investigation services to help you navigate and resolve any issues you may be facing.
My services include:
· Social Media Intelligence Gathering
· Deep Web and Dark Web Research
· Online Reputation Management
· Email Tracing and Verification
· Background Checks
· Domain names and DNS discovery
· OSINT to find employees
· Targets location, activities, and contact.
· Photos & videos
· Family and associates
· Marital status
· Work history
· Locations and address fingerprinting
· Breach data for OSINT
· Job post for OSINT
· Competitive Intelligence
· And more
Professional Service at the lowest cost
24 hours express delivery
100% money-back guarantee
Feel Free to inbox me to discuss anything about Penetration Testing related.
NOTE: Please contact me before placing an order so that we can discuss about your issue and make an effective deal. Please read FAQ if possible.