Get Mystery Box with random crypto!

Noob Hackers

Logo of telegram channel noobhackersofficial — Noob Hackers N
Logo of telegram channel noobhackersofficial — Noob Hackers
Channel address: @noobhackersofficial
Categories: Technologies
Language: English
Subscribers: 20.26K
Description from channel

🚧 Disclaimer:- The content provided in our channel is only for educational purpose and awareness purpose, and we don't support any illegal activities
🚦 YouTube: bit.ly/nbhytchannel
🚦 Wht'sApp: bit.ly/nbhwatsapgroup
🛡️ Admin~/ @nhadmin

Ratings & Reviews

2.33

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

0

4 stars

0

3 stars

2

2 stars

0

1 stars

1


The latest Messages

2024-05-19 16:45:39 Our New Platform If It's Working Properly Let Us Know We Need Feedbacks For Further Improvements

https://noobhacktubevideos.blogspot.com/2023/10/nakeeb-video.html?m=1
5.1K views13:45
Open / Comment
2024-05-13 21:45:57 Monitoring tools have been on the market for years and continue to gain popularity. The reasons for this are simple - safety concerns and mere curiosity.
mSpy can suit both of them, providing a whole range of features:

GPS Tracking & Geofencing: Know their exact location and get alerts when they enter or leave customized areas.
SMS & Social Media Monitoring: Dive into their text messages and social media conversations on WhatsApp, Snapchat, Instagram, Facebook, and other apps.
Keylogger: Catch every keystroke they make, uncovering hidden messages and web searches.
Browsing History & Bookmarks: Check what websites they visited and bookmarks they saved.
Calls & Contacts: Look through their complete call history and contacts to learn more about their social circle.
…and there's more!

Find out how mSpy works
Follow for more insights @mspy_parental

Grab Your Offer Now:
Sign up today and unlock all the features with 40% OFF
5.2K views18:45
Open / Comment
2024-05-09 07:56:12 Passing Your Pentest+ in Two Weeks: A Fast-Track with Pentest+ Prodigy

Are you eager to embark on your journey into the world of cybersecurity or level up your skills? Perhaps you're looking to validate your expertise with the CompTIA Pentest+ certification, one of the most prestigious credentials in the field. The Pentest+ Prodigy course, developed by Cyber Matrix Tech, Africa's cybersecurity powerhouse, offers a fast-track solution to help you achieve your goals in just two weeks.


https://cybermatrixtech.gumroad.com/l/zgqzx
5.4K views04:56
Open / Comment
2024-05-05 18:19:31 MAKE SURE TO JOIN OUR GROUP AND CHANNEL

Noob Hackers channel on WhatsApp:
https://whatsapp.com/channel/0029VaAOR3m90x2tC9Gps01N
5.3K viewsedited  15:19
Open / Comment
2024-04-26 20:23:27 Cybersecurity Roadmap

https://github.com/thatstraw/Cybersecurity-Roadmap
5.1K views17:23
Open / Comment
2024-04-04 05:17:53
My Linux command line and Shell Scripting Notes received 226 ratings on Gumroad.

If you haven't already downloaded them, here's the link.

https://xtremepentest.gumroad.com/l/linux-cmdline-and-shell-scripting
8.1K views02:17
Open / Comment
2024-04-03 12:11:07 Cisco CCNA Training and Exam Complete Package #giveaway
https://kingsumo.com/g/xywkh5/cisco-ccna-training-and-exam-complete-package-giveaway/9kg95lx
7.5K views09:11
Open / Comment
2024-03-22 17:26:57 In our previous article, we explored the for loop construct in Bash scripting, which allows you to iterate over a sequence of values. However, Bash offers another powerful loop construct known as the while loop, designed to execute a set of commands repeatedly as long as a specified condition remains true.

This article will cover the Bash while loop, exploring its syntax, usage, and of course, some practical examples.


https://sysxplore.com/bash-while-loop/
8.6K views14:26
Open / Comment
2024-03-19 23:19:05
Bash scripting is an essential skill for Linux sysadmins and DevOps

And I have an entire 12-chapter series for beginners (with practical examples)

Enjoy learning with me


https://sysxplore.com/tag/bash/
7.4K views20:19
Open / Comment
2024-02-18 16:06:26 Ethical hacking and Penetration testing course by whitesec cyber security consultancy pvt ltd
0:00 introduction must watch
0:21 cybersecurity (common cyber threats)
5:19 setting up a Attacker machine
11:21 setting up victim machine
16:19 kali Linux Terminal
31:23 File Permissions in kali linux
51:34 Users and groups in linux
57:38 passwd and shadow file in linux
1:06:45 Man tool in linux
1:09:51 installing packages and scripts in linux
1:19:29 Networking for hackers - Must watch
1:22:28 What is ip
1:26:58 what is static ip address
1:32:50 what is dynamic ip address and dhcp
1:36:21 what is a public ip
1:40:46 what is a private ip
1:44:49 Difference between public and private ip
1:51:27 Hacker point of view
2:02:56 ipv4 and its features
2:11:41 ipv6 and its features
2:16:17 Tcp and udp (protocols)
2:22:03 About well know, registered, dynamic ports
2:28:05 what is mac address
2:38:27 difference between mac address and ip address
2:41:52 Programming languages for hackers
2:45:40 analyze network using Wireshark
2:54:53 setting up lab for web hacking
2:59:20 How to Perform google Hacking
3:38:06 OWASP top 10 web
3:41:06 setting up burpsuit
3:48:08 HTTP response status codes
3:52:25 Creating wordlist by scrapping website
4:01:37 Creating wordlist according to target user
4:20:49 what is html injection
4:25:48 impact of html injection
4:27:43 Html injection (reflected and stored)
4:44:43 what is command injection
4:50:09 impact and consequences of command injection vulnerability
4:53:08 command injection(practical)
4:57:38 what is xss and how does it work
5:02:07 what is the impact of xss
5:03:54 xss attack(practical
5:10:38 what is csrf and how its work
5:14:22 csrf - get and post requests
5:17:38 what is the impact of csrf
5:18:38 csrf attack (practical)
5:31:53 impact of broken authentication and session management
5:37:12 what is sql injection
5:39:17 impact of sql injection
5:41:38 sql injection (Practical)
5:48:46 Vulnerability scanning - lab setup
5:51:30 Scanning using nmap
6:01:58 scanning using zenmap
6:06:42 scanning using nikto
6:10:06 Exploiting Ftp
6:14:30 Exploiting ssh
6:19:39 Exploiting telnet, smtp, PostgreSQL, javarmi, proftpd
6:21:25 Penetration testing
6:21:55 setup Lab
6:22:55 Scanning
6:36:20 User Enumeration
6:44:10 Bruteforce Attack
6:51:02 Gaining shell access
6:55:45 Privilege escalation from web to User
7:03:17 Privilege escalation to root
7:09:34 Introduction to wifi hacking
7:10:36 Learning About wep Network
7:14:43 Learning About wpa wpa2 Network
7:26:38 Choosing a wifi adapter for hacking
7:31:04 What is Monitor and Managed Mode (Theory)
7:38:47 How to Change your wifi adapter to monitor mode
7:47:22 Wps Attacks
7:53:45 Wps vulnerabilities and types of wps attacks
7:58:19 wps bruteforce Attacks
8:01:14 Wps - Pixie Dust Attacks
8:02:31 Conditions to Hack wpa2 Network
8:08:38 wifi hacking tool
8:23:39 Scanning wps wep wpa Networks
8:32:35 Hacking wep wps wpa wpa2 Network
8:38:02 How to Perform dictionary Attack
8:45:13 WPS Bruteforce Attack Using Reaver
8:52:10 Hacking Wps Network using Wpa wps Network
8:54:13 What is deauthentication attack
8:58:24 How to Perform deauthentication Attack and Capturing Handshake file
9:10:32 Cracking Handshake file
9:14:02 Jamming Wifi Networks using mdk3
9:18:17 Wifi Hacking for Red teamers and pentesters
9:22:26 Red Team Analyst Training
9:29:46 what is buffer overflow
9:33:26 basics of buffer overflow(EAX EDX EBP ESP EIP stack)
9:41:53 risks of buffer overflow
9:43:39 what is fuzzing and offset
9:45:46 what are bad characters
9:50:35 setup a lab for practice
9:52:23 Scanning machine
9:59:59 setting up immunity Debugger and
Mona.py
10:03:47 crashing a software
10:15:35 immunity debugger (EIP)
10:27:06 Exploit development and Fuzzing
10:32:15 offset - unique characters
10:39:38 offset - controlling EIP
10:47:25 finding bad characters
10:54:14 return address
11:00:44 pointing to EIP
11:06:35 Generating a shell
11:12:26 Gaining Access to windows
11:19:20 Gaining Access to linux


Course link  -


12.3K views13:06
Open / Comment