Cyber Bhandar

Cyber Bhandar

Share

Knowledge Sharing 🧑‍💻 Cyber Security🧏‍♂️💸 Education 📚Career Growth ♐️Ethical Hacking | InfoSec

Photos from Cyber Bhandar's post 03/04/2024

📌DNSdumpster - Website for subdomain enumeration and DNS Records, Geo Location🔎

Cyber Security, Ethical Hacking, Information Security, Pe*******on Testing, Information gathering, Reconnaissance, dnsdumpster

Follow for more and save this reel for future reference❤️🙌













30/03/2024

Knockpy - Great tool for discovery the Subdomains of any target😎🔥

Cyber Security, Ethical Hacking, Information Security, Pe*******on Testing, Information gathering, Reconnaissance, Scapy

🙌Follow for more and save this reel for future reference❤️







Photos from Cyber Bhandar's post 28/03/2024

Sublist3r - Amazing tool for Subdomain enumeration 🙌



Follow for more and save this post for future reference❤️✌️

Cyber Security, Subdomain Enumeration, Information Security, Information Gathering, Kali Linux, ethical Hacking

Photos from Cyber Bhandar's post 26/03/2024

SQLMAP - Great 😊 Tool to identify and exploiting SQL Injection Vulnerabilities in Web Applications

🎯 Key Features:

1. Automatically detects SQL injection vulnerabilities in web applications
2.Supports various SQL injection techniques, including error-based, blind, and time-based injections
3. Enumerates databases, tables, columns, and data from vulnerable web applications
4. Exploits SQL injection vulnerabilities to extract sensitive information from databases.
5. Performs additional actions after successful exploitation, such as executing arbitrary commands or uploading files

Follow for more and save this post for future reference😎👍



SQLmap, Cyber Security, Kali linux, Pe*******on Testing, SQL Injection, Ethical Hacking, Infosec

24/03/2024

Unicornscan - Network Discovery and Port Scanning Tool😎

Unicornscan a open-source network scanning tool known for its speed and efficiency in discovering hosts and open ports on a network 🔥

🎯 Supports a wide range of scan types, including TCP, UDP, ICMP, and ARP scans

Cyber Security, Ethical Hacking, Information Security, Pe*******on Testing, Information gathering, Reconnaissance, Scapy

🙌Follow for more and save this reel for future reference❤️



Photos from Cyber Bhandar's post 22/03/2024

Dmitry- DeepMagic Information Gathering Tool🔥

Amazing 👌 tool for Information gathering 👏
Dmitry can find possible subdomains, email addresses, perform port scanning and more💯

Follow for more and save this post for future reference❤️👍

Cyber Security, DeepMagic InformationGathering, Network Mapper, Ethical Hacking,Dmitry, Kali linux, bug bounty, Pentesting













Photos from Cyber Bhandar's post 20/03/2024

Scapy-One of the Powerful tool for Packet Crafting And Sniffing💯🔥

👉Through Scapy we can construct custom TCP, IP, ICMP, UDP packets and many other services for security testing 😀

Packet crafting, Cybersecurity, Ethical Hacking, cyber security,
Port Scanning, information security, Scapy tool, security testing

Follow for more and save this post for future reference 👍 💕











Photos from Cyber Bhandar's post 18/03/2024

One of the Best Tool for Packet Crafting🔥
Hping3 - Multi-purpose tool for Cyber Security Researchers💯


Hping3 - provides TCP/IP packet crafting, scanning, etc. It allows users to construct and send custom packets to target hosts and analyze their responses



👉Packet Crafting: Construct custom TCP, UDP, and ICMP packets for Security Assessments
👉Port Scanning: Perform SYN, FIN, NULL, XMAS, and ACK scans to identify open ports


Follow for more and save this post for future reference❤️🤟







Photos from Cyber Bhandar's post 17/03/2024

Step-by-Step Guide to Conducting a Network Pe*******on Testing 🚀



1️⃣ Preparation: Outline your objectives, scope, and rules of engagement
2️⃣ Reconnaissance: Gather information on your target infrastructure
3️⃣ Scanning: Identify open ports, services, and potential vulnerabilities
4️⃣ Enumeration: Gather detailed information about target systems and services
5️⃣ Vulnerability Analysis: Assess vulnerabilities for potential exploits
6️⃣ Exploitation: Validate identified vulnerabilities and gain access
7️⃣ Post-Exploitation: Maintain access and explore the target network further
8️⃣ Reporting: Document findings, including vulnerabilities and mitigations


Follow for more and save this post for future reference ❤️👍





Photos from Cyber Bhandar's post 15/03/2024

Top Password Cracking Techniques 🔥
Did you know?


1. Keyloggers
2. Brute Force Attacks
3. Rainbow Table Attacks
4. Dictionary Attacks

Share your best Password Cracking Techniques in the comment section Below👀👇


Follow Cyber Bhandar for more and save this post for future reference ❤️


Photos from Cyber Bhandar's post 13/03/2024

Top 10 Tools for Pe*******on Testing 🔥


Which one is your Favourite? Let me know your thoughts in the comments 👇


Follow for more and save this post for future reference❤️


Photos from Cyber Bhandar's post 11/03/2024

Nexphisher - Advanced Phishing Tool For Linux & Termux 🔥


Nexphisher is an advanced phishing tool designed to facilitate the creation and deployment of phishing campaigns

👉 Any actions or activities related to Nexphisher is solely your responsibility. The misuse of this toolkit can result in criminal charges brought against the persons in question


[Cyber Security, Phishing attacks, Nexphisher, Phishing tools, Ethical Hacking, Information Security, Cyber threats, Information Security]

Follow me for more and save this post for future reference💯


Photos from Cyber Bhandar's post 09/03/2024

Zphisher - An automated phishing tool with 30+ templates👇

👉 A Powerful open-source tool Phishing Tool and is used to do phishing attacks on Target. Zphisher is easier than Social Engineering Toolkit. It contains some templates generated by a tool called Zphisher and offers phishing templates webpages for 33 popular sites such as Facebook, Instagram, Google, Snapchat, GitHub, Yahoo, Proton mail, Spotify, Netflix, LinkedIn, WordPress, Origin, Steam, Microsoft, etc

Note ❌> Any actions or activities related to Zphisher is solely your responsibility. The misuse of this toolkit can result in criminal charges brought against the persons in question

[Cyber Security, Phishing attacks, Zphisher, Phishing tools, Ethical Hacking, Information Security, Cyber threats, Stay Safe Online]

Follow me for more and save this post for future reference 👊

Photos from Cyber Bhandar's post 08/03/2024

Gitleaks - SAST BASED Tool🔥😮

SAST tool for detecting and preventing Hardcoded SECRETS like Passwords, API keys, and Tokens in git repos

👉We can detect secrets using these two switches; detect and protect

[Ethical Hacking, Cyber Security, Gitleaks, Github, Cyber Security training, Hardcoded Passwords, SAST, Information Security, hacking]

Don't forgot to SAVE this POST for future reference 👍

Photos from Cyber Bhandar's post 03/03/2024

Hello Researchers 👋 Its back Again your favourite with Few Updates 🕵️‍♂️💣

KALI Linux 2024.1 Released 🚀😳

02/03/2024

Target users for this tool are pentesters☠️🕵️‍♂️

GitMiner 🔗🔨
Tool to scan for sensitive data that is leaked via software repositories 💣
Examples of sensitive data are authentication details such as passwords or connection settings

👉GitMiner used for asset discovery, discovery of sensitive information, or information leak detection

[Cyber Security, Ethical Hacking, GitMiner, Ethical Hacking Tools, Information Security, Kali Linux, Information Gathering]

👉Follow me for more and save this post for future reference💯

Photos from Cyber Bhandar's post 25/02/2024

Follow Cyber Bhandar for more and save this post for future reference 👈👉

Breaking Into Networks💯

This post shows the Common Services or protocols through which attacker can get into the server👾👇

[Cyber Security, Breaking Into Networks, Information Security, Infosec, Social Engineering, Brute Force, Reconnaissance, Information Gathering, Online Cyber Security Training, Online Coaching, Ethical Hacking, Tech Knowledge, Internet Basics]

Photos from Cyber Bhandar's post 23/02/2024

Follow for more and save this post for future reference 💯👈

Hey Cyber Security Guys - NEW Tools in the Market👾☠️👇
SmuggleFuzz - a tool designed for rapid and customizable scanning of HTTP downgrade smuggling vulnerabilities 👾

It provides users with the ability to define their own gadget lists, allowing for deeper insights into the reasons behind failed smuggling attacks. The tool aims to address the common issue where many individuals overlook potential vulnerabilities after a cursory scan👾☠️

Installation-
go install github.com/moopinger/smugglefuzz@latest
Or:
git clone https://github.com/moopinger/smugglefuzz.git
cd smugglefuzz
go build .
/smugglefuzz

👉Check out this Website for more details- https://www.blackhatethicalhacking.com/tools/smugglefuzz/

[Cyber Security, CVEs, Information security, Ethical Hacking, blackhat, 0day vulnerabilities, Cyber threats, information gathering, reconnaissance, hacking]

Want your school to be the top-listed School/college?

Videos (show all)

Have you used Dmitry Techniques 🫣 in any of Security Assessments?Dmitry - DeepMagic Information Gathering Tool for Port ...
DNS Enumeration Top tools 👾☠️ #DNS #Enumeration #dnssecurity #cybersecurity
Follow @cyberbhandar for more and save this reel for future reference 👾Swiss Army knife: Netcat! 💻 From port scanning to...
**Subdomain discovery**Process of identifying subdomains associated with a particular domain name. Subdomains are prefix...
Let see Power of OSINT: Techniques & Tools! 🌐✨1️⃣ **Keyword Searching:** 📝 Start your OSINT adventure with strategic key...
🕵️‍♂️Top Active Recon Tools! 🌐💻 1️⃣ **Nmap:** 🚀 The Swiss Army knife of network scanning! Nmap dives deep, revealing ope...
👉 In this Short Video we will see the Power of Google Dorks! 🔍💻 Buckle up for a reel that takes you deep into the world ...
🕵️‍♂️✨ Unlocking the Power of Ethical Hacking! 🔒💻 Dive into the world of cyber warriors, where code is mightier than the...
Linux Distributions Distros👨‍💻🔑Linux has different distributions✌️ ⬇️🧑‍💻...👉 Ubuntu  👉 Debian 👉 RedHat Enterprise (RHEL)...
Linux Operating System Architecture 👨‍💻🔑The following layers make up a⚛️ LINUX ARCHITECTURE 🧑‍💻👇...👉 Hardware Layer  👉 K...
Active Directory 👨‍💻🔑Security Principles in Active Directory🔎🚀✌️⬇️👇🧑‍💻...👉 SIDs 👉 Access Tokens👉 Permissions👉 Authentica...
🌐✨ Exploring the Web’s Backbone: The Magic of HTTP! 💻🚀 HTTP (Hypertext Transfer Protocol) is the silent force powering o...

Website