Get Mystery Box with random crypto!

Drug Hacks

Logo of telegram channel drugstipsgamingmodhack — Drug Hacks D
Logo of telegram channel drugstipsgamingmodhack — Drug Hacks
Channel address: @drugstipsgamingmodhack
Categories: Games
Language: English
Subscribers: 1.37K
Description from channel

Owner @DrugsHacks
Admin @Ayan_Mughal
@DrugHackChat
🔅Hacking
🔅Cracking
🔅Spamming
🔅Carding
🔅Mod Apk
🔅Daily New Hack
🔅PUBG BGMI HACK
🔅PUBG BGMI UC
🔅FF Hack
🔅WhatsApp Hack Facebok instagram
🔅Daily New Bins

Ratings & Reviews

4.67

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

2

4 stars

1

3 stars

0

2 stars

0

1 stars

0


The latest Messages 9

2021-12-14 16:42:57 CSS Motion Design

https://mega.nz/folder/7iQymZpR#HW9wBd32VxPT4Gk_NixIzA

.@drugstipsgamingmodhack
115 viewsDrugs Hack, edited  13:42
Open / Comment
2021-12-14 16:42:57
Course Name -» Next.js Firebase Full Course

Author -» FireShip.io

Category -» App Development

————»Description«————

Next.js Firebase - The Full Course takes you from zero to a production-ready hybrid-rendered webapp. Learn how build a high-performance React app that features realtime data from Firebase and multiple server-side rendering paradigms with Next.js.

——————»Links«——————

Preview Course -» https://fireship.io/courses/react-next-firebase/

Download -» https://mega.nz/folder/Ko0kxApD#xbADd8EyPAa0-Oi_coRMag

Link Verification -» Valid! @drugstipsgamingmodhack
132 viewsDrugs Hack, edited  13:42
Open / Comment
2021-12-13 21:11:50
ARE YOU INTERESTED SELL/BUY CHEAP ACCOUNT
Anonymous Poll
60%
YES
18%
NO
23%
BAKWAS
57 voters197 viewsDrugs Hack, 18:11
Open / Comment
2021-12-13 19:47:12 Hacking Course Worth Rs. 8430

FREE For You !!!

Link : https://mega.nz/folder/qwUnACSB#97s7X4qUmNb1KSHuPWYxaQ/folder/btEVyKzL
@drugstipsgamingmodhack
206 viewsDrugs Hack, edited  16:47
Open / Comment
2021-12-13 19:43:11 Top 10 Common Hacking Techniques All Beginners Should Know About

10. Keylogger
Keylogger is a simple software that records the key sequence and strokes of your keyboard into a log file on your machine. These log files might even contain your personal email IDs and passwords.

Keylogger is one of the main reasons why online banking sites give you an option to use their virtual keyboards.

9. Denial of Service (DoS\DDoS)
A Denial of Service attack is a hacking technique to take down a site or server by flooding that site or server with a lot of traffic that the server is unable to process all the requests in the real time and finally crashes down.

For DDoS attacks, hackers often deploy botnets or zombie computers which have got the only work to flood your system with request packets.

8. Waterhole attacks
If you are a big fan of Discovery or National Geographic channels, you could relate easily with the waterhole attacks. To poison a place, in this case, the hacker hits the most accessible physical point of the victim.

For example, if the source of a river is poisoned, it will hit the entire stretch of animals during summer. In the same way, hackers target the most accessed physical location to attack the victim. That point could be a coffee shop, a cafeteria etc.

Once hackers are aware of your timings, they might create a fake Wi-Fi access point and modify your most visited website to redirect them to you to get your personal information.

7. Fake WAP
Even just for fun, a hacker can use software to fake a wireless access point. This WAP connects to the official public place WAP. Once you get connected the fake WAP, a hacker can access your data, just like in the above case.

6. Eavesdropping (Passive Attacks)
Unlike other attacks which are active in nature, using a passive attack, a hacker just monitors the computer systems and networks to gain some unwanted information.

The motive behind eavesdropping is not to harm the system but to get some information without being identified.

5. Phishing
Phishing is a hacking technique using which a hacker replicates the most-accessed sites and traps the victim by sending that spoofed link.

Once the victim tries to login or enter some data, the hacker gets that private information of the target victim using the trojan running on the fake site.

4. Virus, Trojan etc.
Virus or trojans are malicious software programs which get installed into the victim’s system and keeps sending the victims data to the hacker.

3. ClickJacking Attacks
ClickJacking is also known by a different name, UI Redress. In this attack, the hacker hides the actual UI where the victim is supposed to click.

In another word, the attacker hijacks the clicks of the victim that aren’t meant for the exact page, but for a page where the hacker wants you to be.

2. Cookie theft
The cookies of a browser keep our personal data such as browsing history, username, and passwords for different sites that we access. Once the hacker gets the access to your cookie, he can even authenticate himself as you on a browser.

1. Bait and switch
Using bait and switch hacking technique, the hacker runs a malicious program which the user believes to be authentic. This way, after installing the malicious program on your computer, the hacker gets unprivileged access to your computer.
196 viewsDrugs Hack, 16:43
Open / Comment
2021-12-13 19:42:30 Cybrary - Advanced Penetration Testing


The Advanced Penetration Testing course teaches the cyber attack lifecycle from the perspective of an adversary. Become more familiar with the most widely used penetration-testing tools, manipulate network traffic, and perform web application attacks such as cross-site scripting and SQL injection.

Download :
https://mega.nz/folder/3TRG2IiK#cYUfjdBRz4FlsfZFedx4NA
@drugstipsgamingmodhack
167 viewsDrugs Hack, edited  16:42
Open / Comment
2021-12-13 19:41:55 List of useful resources for pentesters and hackers

• Exploits Database:
https://www.shodan.io/
http://www.exploit-db.com
http://packetstormsecurity.com

• Vulnerabilities Database:
https://nvd.nist.gov/
http://www.secdocs.org/
https://cve.mitre.org/cve/
http://www.cvedetails.com/
https://www.kb.cert.org/vuls/
http://lwn.net/Vulnerabilities/
http://www.vulnerability-lab.com
http://www.securityfocus.com/bid
https://secunia.com/community/advisories/search/
http://denimgroup.com/resources-threadfix/

• Hacking Tutorials:
http://www.ehacking.net/
http://www.securitytube.net/
http://www.hacking-tutorial.com/
https://www.offensive-security.com/
http://breakthesecurity.cysecurity.org/
http://www.spacerogue.net/wordpress/
https://www.youtube.com/user/Hak5Darren
https://www.youtube.com/user/sansinstitute
https://vimeo.com/channels/fullscopesecurity
http://www.kalitutorials.net/2013/08/kali-linux.html
https://www.youtube.com/user/DEFCONConference
https://en.wikibooks.org/wiki/Metasploit/VideoTutorials

• Virus Scan:
http://fuckingscan.me/
http://v2.scan.majyx.net/
http://nodistribute.com/
http://www.file2scan.net/
http://anubis.iseclab.org/
https://anonscanner.com/
http://virusscan.jotti.org/it
https://www.virustotal.com/nl/

• Tools Download:
http://insecure.org/
http://www.kitploit.com/
http://www.toolswatch.org/
http://tools.kali.org/tools-listing
http://www.romhacking.net/utilities/
http://www.blackarch.org/tools.html
http://www.hackersonlineclub.com/hacking-tools
https://www.concise-courses.com/hacking-tools/
https://gexos.github.io/Hacking-Tools-Repository/
http://www.darknet.org.uk/category/hacking-tools/
https://pentest-tools.com/reconnaissance/google-hacking

• Network Online Tools:
http://bgp.he.net/
http://www.dnswatch.info/
http://www.tcpiputils.com/
http://services.ce3c.be/ciprg/
http://www.yougetsignal.com/
http://www.coffer.com/mac_find/
http://www.nirsoft.net/countryip/
http://www.sockets.com/services.htm
https://t.me/thegeeksnetwork

• IP Lookup:
http://ip-api.com/
http://ipaddress.com
http://whatstheirip.com
http://www.whatismyip.com/
http://www.ip2location.com/demo
http://www.my-ip-neighbors.com/
http://freegeoip.net/static/index.html
http://www.ip-adress.com/ipaddresstolocation/

• Encrypt / Decrypt:
http://crypo.in.ua/tools/
http://codebeautify.org/encrypt-decrypt
http://www.yellowpipe.com/yis/tools/encrypter/
http://www.tools4noobs.com/online_tools/decrypt/
http://textmechanic.com/Encryption-Generator.html

• Online Hash Crackers:
http://www.cmd5.org/
http://hashcrack.in/en
https://crackstation.net/
http://passcracking.com/
http://md5.rednoize.com/
http://www.hashkiller.co.uk/
http://www.md5online.org/
http://www.md5crack.com/
http://md5decryption.com/
http://www.cloudcracker.net/
https://hdb.insidepro.com/en
http://www.onlinehashcrack.com/
http://www.md5this.com/index.php
http://www.netmd5crack.com/cracker/
http://www.tydal.nu/article/md5-crack/
https://isc.sans.edu/tools/reversehash.html

• Anonymous Test:
https://ipleak.net/
https://www.dnsleaktest.com/
https://diafygi.github.io/webrtc-ips/

• Torcheck:
http://5deqglhxcoy3gbx6.onion - Xenobite
http://tmkloc6vhxos3nde.onion

• SMS:
http://receive-sms-now.com/
http://www.receivesmsonline.net/
http://www.receive-sms-online.info/

• Fake Identity:
https://fakena.me/
http://www.fakenamegenerator.com/
http://names.igopaygo.com/people/fake_person
@drugstipsgamingmodhack
Unmute & Pin channel for more
180 viewsDrugs Hack, edited  16:41
Open / Comment
2021-12-13 17:38:36 100$ Hacking Pack | Mega Collection Of eBooks

Hacking, Burp Suite, Network Hacking, Gmail, Much Much More!
100$ Mega Pack
Contains: 22 folders, 62 files

Size: 745MB

: https://mega.nz/folder/SlhihQKb#0ggUkIVF4bZcug2Ms2Wu1g


Unmute our channel and Pin to the top for more such content@drugstipsgamingmodhack
179 viewsDrugs Hack, edited  14:38
Open / Comment
2021-12-13 17:37:27
#wireshark
What is Wireshark || How to Install Wireshark || OnlineHacking


Installation

Termux


Linux

$ sudo apt-get install wireshark

$ wireshark


How To Use Live Play This Video



@drugstipsgamingmodhack

Share and Support
180 viewsDrugs Hack, edited  14:37
Open / Comment