Free Open Source knowledge
12K members
864 photos
47 videos
1.8K files
690 links
Welcome to my Small CYBER world..

Contents:-

#Ethical_Hacking_courses +
#All_Cyber_security. +
#All_programming_courses +
#All_Networking_courses.

Note:-

1) All my contents are totally free.
2) Next target to reach 15k subscriber.
Download Telegram
to view and join the conversation
Forwarded from Free Open Source knowledge (Mr Vabs)
List of my video on YouTube..

what is Anonyous mail and how to send

https://youtu.be/eK_HJwxdBMc

Grabify - How to Trace Victim details (Ip address) In window

https://youtu.be/SwzKdBJA8aE

How to install and configure VPN in Windows

https://youtu.be/V45amqKKhJE

How to install and configure VPN in kali linux

https://youtu.be/KOQoTzesVgU

Crunch - How to create custom password list or wordlist.

https://youtu.be/sUcm-6uRx5o

Anomor - Phishing Page For all social media.

https://youtu.be/BygwPiopvVE

IP Hide - Anonymous browser in Window

https://youtu.be/FTOQs65vM9k

Ngrok - Hack android / Ios / Window over internet without router

https://youtu.be/IQJwWH0vFgM

Trity - Email Bombing

https://youtu.be/48o2u61jXbc

Gloom Framework - Track ip Geo Location

https://youtu.be/5Ftl9YDTpbw

Gloom Framework - Website admin panel finder

https://youtu.be/9AtMQTcJgzU

Venom - Hack android / IOS / window by opening link.

https://youtu.be/dajgO-sBJsI

Netattack2 - Install and configure wifi jammer in Kali Linux

https://youtu.be/KBybpIadRJA

how to view world map on your terminal in kali linux 2017

https://youtu.be/NVpJS-ORGD0


subscribe our channel
if you want any course then check my website.
vist our website also
https://www.vabstutorials.com

share to help us.
@free_open_source_knowledge
Forwarded from Free Open Source knowledge (Mr Vabs)
Group rules...

1. No promotion link
2. Inactive member kick out..
3. Respect each other...
4. Off topic not allow
5. Don't send unnecessary sticker's

Learn Hacking Pentesting, Security Basics, Linux, Windows..
We are here to learn not to earn so knowledge are free..

If you cross group rule you will kick out..

Group link:-

https://chat.whatsapp.com/DIJAnjfA2TBGPld0N1Jw8b
Forwarded from Free Open Source knowledge (Mr Vabs)
This media is not supported in your browser
VIEW IN TELEGRAM
Topic: Most Advanced Level Ethical Hacking Using Kali Linux

Content:

1. Introduction
1. Introduction of Kali Linux

2. Let's start ethical hacking using kali linux
1. Installing kali linux into vm
2. Installing softwares, patches, and upgrades into kali linux
3. Configuring services in kali linux
4. Categories of kali linux tools
5. Deploy Metasploitable2
6. Default Gateway
7. Name Server
8. DHCP
9. Configure Network Interface Card
10. FTP Server
11. SSH Server
12. The Penetration Testing Life Cycle
13. Tarballs
14. Creation Of Tarballs
15. Extracting Files From A Tarballs
16. Compressing A Tarballs
17. Reconnaissance Phase
18. Targets Own Websites
19. What is website mirroring
20. Demonstrating Website Mirroring Using HTTRACK
21. Google Hacking
22. Google Hacking Database
23. Job Sites
24. DNS Zone Transfer
25. Whois
26. dnsenum
27. fierce
28. DMitry
29. Maltego

https://youtu.be/kmfKuvEbHEc

Don't forget to like + subscribe + share + comment
Forwarded from Free Open Source knowledge (Mr Vabs)
This media is not supported in your browser
VIEW IN TELEGRAM
Topic: Complete Cyber Security Course Go from zero to hero!

Content:

1. Cyber Security Basics & Setting Up The Lab
1. Installing Virtual Box For Hacking
2. Installing Kali Linux [Hacking Operating System]
3. Basics Of Linux
4. Network Basics

2. Online Anonymity [Hide From Internet]
1. What Is A Mac Address & How To Change It For Becoming Anonymous
2. Advanced Anonymity

3. Pre Connection Attacks
1. Sniffing Packets - Sensitive Data such as Password, Username
2. Performing Targeted Sniffing
3. Disconnect Any Device From WiFi
4. Creating A Fake WiFi Access Point

4. Gaining Access To The System
1. Generating A Complex Undetectable Backdoor
2. Listening For Incoming Connecting
3. Bind Any File Type and PayloadBackdoor Together
4. Spoof Extension - Creating The Backdoor Payload Undetectable
5. Creating A Complex Undetectable Payload
6. BeefHook Introduction and Setup
7. Running Commands On Beef
8. Gaining Full Access With Our Payload And Beef
9. Injecting Our Hook Using MITMF

5. Post Exploitation
1. Post Exploitation - Part 1
2. Post Exploitation - Part 2

6. Advanced Hacking Attacks
1. DNS Spoofing [Advanced]
2. Suspicious Activity
3. Advanced Hacking Attack [Real-Word Example]

7. Website HackingPenetration Testing
1. Introduction and Basics Of Website Hacking
2. Discovering Technologies Installed On The Website - Information Gathering
3. Website Hacking - Metasploit
4. Collecting Sensitive Files such as Username, Passwords
5. Uploading Files On The Website - Website Hacking
6. Executing More Vulnerabilities


https://youtu.be/oILl8E3XlkA

Don't forget to like + subscribe + share + comment
Topic: Web Hacking Become a Professional Web Pentester

Content:

Lesson 1. Introduction
Lesson 2. Disclaimer
Lesson 3. Methodology
Lesson 4. In this section
Lesson 5. Setting up the target
Lesson 6. Setting up Kali
Lesson 7. Setting up the Burp Suite
Lesson 8. In this section
Lesson 9. How HTTP works
Lesson 10. Static HTML
Lesson 11. PHP and friends
Lesson 12. Modern MVC frameworks
Lesson 13. Javascript
Lesson 14. Manual discovery
Lesson 15. Automated discovery
Lesson 16. Session management intro
Lesson 17. Session fixation
Lesson 18. Weak logout
Lesson 19. Same origin policy
Lesson 20. CSRF
Lesson 21. Securing the session
Lesson 22. SSLTLS
Lesson 23. Authentication bypass
Lesson 24. Unauthenticated URL access
Lesson 25. Password quality
Lesson 26. Password brute force
Lesson 27. Default accounts
Lesson 28. Weak password recovery
Lesson 29. Mitigations
Lesson 30. Authorization Intro
Lesson 31. Manipulating variables
Lesson 32. Client side authentication
Lesson 33. Mitigations
Lesson 34. Reflected XSS
Lesson 35. Stored XSS
Lesson 36. HTTP header injection
Lesson 37. Malicious URL redirection
Lesson 38. Exploiting wrong content-type
Lesson 39. Mitigations
Lesson 40. Malicious file upload
Lesson 41. LFI and RFI
Lesson 42. OS command injection
Lesson 43. SQL injection
Lesson 44. UNION Select Attack
Lesson 45. Blind SQL injection
Lesson 46. Automating SQLi testing
Lesson 47. Mitigations
Lesson 48. Reporting
Lesson 49. Checklist
Lesson 50. What's next

https://youtu.be/OTcfjWGCxII


Don't forget to like + subscribe + share + comment
Forwarded from Free Open Source knowledge (Mr Vabs)
This media is not supported in your browser
VIEW IN TELEGRAM
Topic: Build A Successful Blog In 2019 Make Money

Content:

1. Introduction
1. Course Intro - START HERE
2. How To Use This Course

2. Before You Begin
1. The Mindset Of A Successful Blogger
2. Choosing A Topic And Planning A Content Strategy
3. Naming And Branding Your Blog

3. Technology
1. Why You Should Use WordPress For Your Blog
2. Domain Names And Web Hosting
3. How To Install WordPress In Under 5 Minutes
4. Exploring The WordPress Dashboard
5. WordPress Settings
6. WordPress Themes
7. WordPress Plugins
8. WordPress Security And Backups
9. Analytics And Data

4. Content
1. Content Intro
2. How To Write Amazing Blog Posts
3. Where To Find Content Ideas And Inspiration
4. 20 Types Of Content You Can Create For Your Blog
5. Content Frequency How Often Should You Post
6. Alternative Content Formats
7. How To Generate An Endless Stream Of Fresh Content

5. Promotion
1. Promotion Intro
2. Basic WordPress SEO (Search Engine Optimization)
4. Social Media For Bloggers
5. 12 Content Promotion Strategies You Can Use To Grow Your Audience

6. Email List
1. Why You Need An Email List
2. Which Email Marketing Service Should You Use
3. How To Get People To Opt Into Your List
4. 15 Effective Strategies You Can Use To Grow Your Email List
5. What Should You Send To Your Email Subscribers

7. Revenue
1. Revenue Intro
2. 5 Revenue Models You Can Use To Build A Business Around Your Blog

8. Wrapping Up
1. The Next Steps


https://youtu.be/ihG7MEuABAQ

Don't forget to like + subscribe + share + comment
Forwarded from Free Open Source knowledge (Mr Vabs)
This media is not supported in your browser
VIEW IN TELEGRAM
Topic: Easy Adsense Method Using Whatsapp Free Traffic 2019

Content:

1. Introduction
1. How This Method Works

2. 2 -Buy Domain & Hosting
1. 1. Buy Domain Name
2. 2. Buy Web Hosting

3. 3- Uploading Website
1. Upload Website Files To Your Server
2. Access Your cPanel

4. 4- Content
1. Use These Website To Get Content For Your Website
2. Editing Website Content and Website Interface

5. 5-Google Adsense
1. Add Google Adsense Ads and Google Analytics To Your Site

6. 6-SSL Certificate
1. Activate SSL For Free

7. 7-Website Promotion
1. How To Get FREE Traffic From Whatsapp

8. 8-End
1. End

https://youtu.be/DttRY_H6juc

Don't forget to like + subscribe + share + comment
Forwarded from Free Open Source knowledge (Mr Vabs)
This media is not supported in your browser
VIEW IN TELEGRAM
How many of you interested in carding...? I will teach/solve doubts carding free..... Note:- i will not card for others..
anonymous poll

Yes i am interested – 105
👍👍👍👍👍👍👍 88%

No – 15
👍 13%

👥 120 people voted so far. Poll closed.
If i got 100 yes then only i will create group...

If you think my work is good then.. you can donate..

Bitcoin donate address

1Gt81twDVs4Cm3JxsDD7Ssfijcy28VSQ97

Paytm /phonepe also accept..

After donation send screenshot @mr_vabs
Happy to help you...
Soon my website cross 900k views...
Thanks for support..
Link:- www.vabstutorials.com

Soon my channel cross 1.5k subscriber..
YouTube link:-

https://www.youtube.com/channel/UCIqjaAqZtyvhkxPNnlDa4lg

Share to help us.

@free_open_source_knowledge
Forwarded from Free Open Source knowledge (Mr Vabs)
This media is not supported in your browser
VIEW IN TELEGRAM
Topic: Bug Bounty: Android Hacking

Content:

Analysis
Active Analysis
Passive Analysis 1
Passive Analysis 2

Introduction
Introduction
Pentesting White and Black box

Miscellaneous Reports
Android Address Bar Spoofing Vulnerability report
Authentication Failed Mobile Version Report
Bypass Pin
Coinbase Android Application - Bitcoin Wallet Leaks OAuth Response Code report
Content Provider Information Leakage report
Email Leak in Transactions in Android App Report
Manifest allows for ADB backup attack when USB debugging is enabled report
Multiple Critical Vulnerabilities in Odnoklassniki Android Application Report
Shopify Android Client all API Request's Response Leakage Report

Practical
Android Appilication Teardown
Android Startup Process
Android Traffic Interception
Application Signing
Digging Deeper
Finding Vulnerabilities with Fuzz Testing
Lesser known Android Attacks
Top 10 Security issues

Tools
Apktool
Application Security
Certificate
Dex2jar
Genymotion Proxy
Genymotion Setup
Installing Terminal
Setting up ADB
Unzip

Vulnerability
Account Hijacking Possible through ADB backup Feature Report
AF-logical
Attacking the Radio Interface Layer
Client-side Attack Surface 2
Client-side Attack Surface
Cross-Application Scripting in Android
Debugging and Analyzing Vulnerabilities
Expoit Mitigations
Fetching Data
File Permission
File System Partition
HTML or XSS rendered in Android App
Information Leakage via Logcat Report
Insecure Data Storage
Local Attack Surfaces
Logcat
Physical Attack Surfaces
Possible to Steal any Protected files on Android Report
SQlite
Vulnerable to JavaScript Injection Report
Webview Vulnerablity Report


https://youtu.be/kRjGyCMtyAw


Don't forget to like + subscribe + share + comment
Forwarded from Free Open Source knowledge (Mr Vabs)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Vabstutorials.com
List of 20 New Course..
I hope you will enjoy Course..

Udemy - REAL World Website Hacking and Penetration (101% Practical)
http://bit.ly/2JCHbCp

Cloud Ethical Hacking Use Kali Linux on Amazon AWS
http://bit.ly/2Eval29

Udemy - Learn Network Hacking From Scratch (WiFi & Wired)
http://bit.ly/2WpSaF9

Udemy - A Hacker's Guide to Internet Safety and Cybersecurity
http://bit.ly/2VXijM2

Complete Ethical hacking Courses
http://bit.ly/2YMy5qe

Cyber Security and Information Security Fundamentals
http://bit.ly/2EulIHA

16 Beginner Programming Projects Java, Python, JavaScript, C#
http://bit.ly/2Qj9MNA

Udemy - Angular & NodeJS - The MEAN Stack Guide
http://bit.ly/2WnDx59

Start Using Wireshark to Hack like a Pro
http://bit.ly/2Mh9k3M

Complete Penetration Testing and Ethical Hacking Hands On
http://bit.ly/2JZmpfy

Udemy - Reverse Engineering and Exploit Development
http://bit.ly/2JDLMnC

Udemy - Advanced Python for IoT & IoT Based Data Analysis
http://bit.ly/2wghYEX

Kali Linux Tips, Tricks and Techniques
http://bit.ly/2Ernvgs

How to build a wordpress plugin
http://bit.ly/2Jy7s4A

Complete SQL Bootcamp with MySQL, PHP & Python
http://bit.ly/2JW7m6m

Building Ethical Hacking Python Tools From Scratch
http://bit.ly/2wfL875

CEH v10 Certified Ethical Hacker Lab Tools
http://bit.ly/2VYkG1g

Udemy - How Hackers Create Undetectable Malware and Viruses
http://bit.ly/2wj3Z1j

Udemy - The Complete 2019 Web Development Bootcamp
http://bit.ly/2Eumi8e

Ethical Hacking Extreme The Career Accelerator Program
http://bit.ly/2WkGX8V

Share to help us
@free_open_source_knowledge