![CybrZone](/img/default-banner.jpg)
- 81
- 275 252
CybrZone
United Kingdom
Registrace 15. 01. 2021
CybrZone is a cyber security and programming focused channel, providing free videos on all aspects of protecting yourself and others online!
Learn VIM absolute basics in 6 minutes! (VIM beginner tutorial 2024)
Join this channel to get access to perks:
czcams.com/channels/jsEf7AGa-YHV8g54DH5Niw.htmljoin
Normal Default; for navigation and simple editing
Insert For explicitly inserting and modifying text
Command Line For operations like saving, exiting, etc.
!q (quit without saving)
!x (save and exit)
czcams.com/channels/jsEf7AGa-YHV8g54DH5Niw.htmljoin
Normal Default; for navigation and simple editing
Insert For explicitly inserting and modifying text
Command Line For operations like saving, exiting, etc.
!q (quit without saving)
!x (save and exit)
zhlédnutí: 44
Video
DESTROY scam call centres with python!!
zhlédnutí 1,2KPřed 4 hodinami
Support this channel to get access to perks: czcams.com/channels/jsEf7AGa-YHV8g54DH5Niw.htmljoin Unfortunately I had a video planned to show the funny side of this script by recording the calls and the angry scammers, however twilio banned my account for no reason lol. F twilio! MP3 voice: www.tetyys.com/SAPI4/ (mike in hall) github.com/CybrZone/CallCentreHelper
Getting revenge on evil phishing website using Python
zhlédnutí 7KPřed 19 hodinami
Join this channel to get access to perks: czcams.com/channels/jsEf7AGa-YHV8g54DH5Niw.htmljoin This is an update video to our project PhishKR, getting revenge against evil phishing websites! and how to find links easily using appanyrun malware analysis platform (#scammerpayback ) scammer trolling with a python website flooder hopefully this saves people from being compromised by these scammers! ...
How to install NESSUS Essentials for FREE on Kali Linux (any linux distro)
zhlédnutí 320Před 21 hodinou
This is a quick guide on how to install NESSUS Essentials on linux based OS. www.tenable.com/products/nessus/nessus-essentials temp-mail.org
Using python to get revenge on an evil phishing website!
zhlédnutí 24KPřed dnem
Join this channel to get access to perks: czcams.com/channels/jsEf7AGa-YHV8g54DH5Niw.htmljoin this video shows how to use burpe suite to intercept post requests and then use python to flood POST requests to the malicious domain! Code github.com/CybrZone/phishkiller
How to crack password protected ZIP files using John the ripper/Kali
zhlédnutí 1,2KPřed dnem
this is why password complexity is important! using john the ripper is a simple way of cracking/brute forcing forgotten passwords!
Cracking password protected RAR files tutorial 2024!
zhlédnutí 132Před dnem
This video shows why password complexity is so important for any pdf, winzip, 7zip, zip and rar files that have a password on them
Crack password protected PDF documents with John The Ripper
zhlédnutí 1,1KPřed dnem
Join this channel to get access to perks: czcams.com/channels/jsEf7AGa-YHV8g54DH5Niw.htmljoin This is why password complexity is important! this video shows how easy it is to HACK passwords for PDF documents. This can come in useful if you have forgotten your PDF passwords!
How To Crack / Recover Forgotten PDF Protected Passwords!
zhlédnutí 56Před dnem
This is quick video on how to crack password protected PDF files! pdftk nameit.pdf output pwd.pdf user_pw 123456789 copy password protected PDF file to johntheripper run folder ./pdf2john.pl pwd.pdf (greater than sign) pdf.hash john pdf.hash (got to be careful saying that lol)
Some people have a death wish... ICODC part 1 #a35amg #a35
zhlédnutí 68Před 28 dny
Some people have a death wish... ICODC part 1 #a35amg #a35
How to use NMAP on Kali Linux 2024 (Nmap beginner tutorial)
zhlédnutí 200Před 6 měsíci
How to use NMAP on Kali Linux 2024 (Nmap beginner tutorial)
How to fix OpenVAS POSTGRESQL libgvmd wrong version error on Kali Linux
zhlédnutí 2,1KPřed 7 měsíci
How to fix OpenVAS POSTGRESQL libgvmd wrong version error on Kali Linux
How to investigate phishing emails safely with free cyber security tools! #cybersecurity
zhlédnutí 189Před 9 měsíci
How to investigate phishing emails safely with free cyber security tools! #cybersecurity
Python beginner tutorial - creating a simple game
zhlédnutí 65Před 9 měsíci
Python beginner tutorial - creating a simple game
How To Compile C & C++ Files On Windows (easy tutorial)
zhlédnutí 178Před 9 měsíci
How To Compile C & C Files On Windows (easy tutorial)
3 MOST common ENTRY LEVEL CYBER SECURITY Interview questions
zhlédnutí 94Před rokem
3 MOST common ENTRY LEVEL CYBER SECURITY Interview questions
Cyber Security - Threats, Adversaries and Risk
zhlédnutí 22Před rokem
Cyber Security - Threats, Adversaries and Risk
Kali Linux - How To DNS POSION/Website SPOOFING !
zhlédnutí 10KPřed rokem
Kali Linux - How To DNS POSION/Website SPOOFING !
HOW TO CHECK IF YOUR PC HAS BEEN HACKED ! (RAT INFECTED!)
zhlédnutí 436Před rokem
HOW TO CHECK IF YOUR PC HAS BEEN HACKED ! (RAT INFECTED!)
Create your own WiFi Jammer with kali linux + wireless USB
zhlédnutí 626Před rokem
Create your own WiFi Jammer with kali linux wireless USB
Linux Terminal Commands - Process Management
zhlédnutí 58Před rokem
Linux Terminal Commands - Process Management
Linux Terminal Commands - File Commands & Directory
zhlédnutí 31Před rokem
Linux Terminal Commands - File Commands & Directory
Linux Terminal Commands - User Information & Management
zhlédnutí 56Před rokem
Linux Terminal Commands - User Information & Management
Linux Terminal Commands - Performance Monitoring & Statistics
zhlédnutí 131Před rokem
Linux Terminal Commands - Performance Monitoring & Statistics
Linux Terminal Commands - Hardware Information
zhlédnutí 70Před rokem
Linux Terminal Commands - Hardware Information
Linux Terminal Commands - System Information
zhlédnutí 112Před rokem
Linux Terminal Commands - System Information
huuuuge W bro, gonna punish some scammers too xd we're all waiting for proxy updates btw
Lol
please answer our pull request!!
Great work 🙏
Keep it up bro 💪
Are you actually sure that those guys won't see which IP those requests were came from and categorize them according to that? Using tor or proxies for so-called ddos could have been a better idea. But anyways, appreciate the effort and job! Keep going.
good work
Great work.
how do i create one so you can use, i really love this project.just tell me how to go about the twilio
I'm now a youtube ad partner so thanks for all the support. Really disappointed with twilio, but hopefully people see the good intention. They didn't want my money lol.
keep going bro
Keep up the good work bro!
The module faker can create fake but realistic looking emails and passwords
Is it legal to hack a phishing website?
Red hat hacking
class mate ,haha
Fair warning, he uses rotating vpn, if you keep running floods straight from your home isp, depending on your isp you might get temp shutdown for ddos.. however, nice tactic ;) this amount is not usefull but if you'd keep this running over a extended time it could def create a garbage db. I'd say it wont be easy to quickly switch between thousands of stealth ip's, it will slow down things conciderably, but if this was passed to a botnet then certainly all hell will break loose.. but yea most effective would indeed be that their host doesnt like the floods removes the hosting account ;) my 2cents, keep up the fight 💪👍👍
lmao good shit
how you find the phishing links?
W
use threads to send multiple request per second
What would have been better is if you randomized the email and password for each request being sent. That way the people hosting it would have had to dig through thousands of fake details to even get access to someones account. Probably would do this using TOR aswell.
Awesome vid! I'm new in the cyber security field and was just wondering . If I were to try this, I should probably use some sort of VPN/proxy no? Since the victim will be able to trace back my IP? Thanks in advance
There is a python package that can generate emails/passwords/names and all that for testing Django and such. I forgot the name would have to look it up. But this would be a great use for it
you could show how to use proxychains with only the tor service as proxy. its set up in 5 minutes and it will change the ip in every request i think
This would be a fun project to learn python in and get some random fake user data api's in
Hey bro very interesting video about hacking android and iphone camera, in real time and so that the victim does not know about it, that is, nothing blinks or lights up when the camera is working, you have cool videos, thank you
just checked the github, i love where this is going hahaha nice job
this is not applicable in WSL Kali
Easily overthrown with “SELECT*FROM ‘table’ WHERE NOT az = ‘yourNiceWords’”
your acc so goated man
You can optimize itt using Multi Threading with Threading library cuz that's builtin in python 3, that can cause much trouble to the Phisher Website, Even you can takedown that website using a DoS Script in python 3
Does it use some VPN or Tor for the IP spoofing? If you send many requests from one IP, they may just filter entries easily, even if user agent is the same.
I was thinking the same
The script is good so far but the generate password function generates password all of the same length using a wordlist and generating passwords of different lengths will make it harder for these phishing links to determine what data is crap.
mybe add 'While True' for automation and then try temp mail for fake emails and a wordlist for pswrds
nice work !;
legend! next time make them install a rootkit
Nice video man! Thank you for all the informations I will give a look to your new code here! Very interesting :P!
I like the idea of you wanting to stop scammers, but, using the same email address (especially an unrealistic one, as you took) and password is easily detectable. Not only that, as soon as the scammer sees, there's like 1000s of entries with that certain email, they will simply match and replace that data. Instead, you could be trying to work on a bot that randomizes the email and password everytime. Even better, would be emails that seem like they could be real, to make their life even harder. For example, you could take a list of first names and last names, and shuffle email addresses with that.
For me it says theres no module named 'name'
same here! how to fix?
my toxic trait thinking I can do this easily
You actually can.
PhishSwamper
SELECT * FROM table WHERE ip = yours
I had a similar one and what I did in the Python script was make the email and password random with random intervals between posting the data and also IP changes using auto IP changer. The reason was making it harder for them to delete the data from their database, assuming they used SQL-like databases. So eventually I posted so much data that they took down the whole link possibly to make a new one 😁😉
can you explain how the ip will be changed on every request we put
Your channel may be dead, but you've won a subscriber now.❤
You could improve this by using the faker library to create realistic and varied submissions, which would be better than having all submissions the same, as the bad actor can easily bulk delete similar submissions
you are learning and punishing ahahahhaha great content bro
Could you put the github link in the description please? :D
love your videos. I subscribed
awesome video mate
You should: Thread the requests & try to use php injection on form parts(email || password) :)
i dont know much python but these will really help: 1 - multi threading 2 - generate fake email:pass into a .txt , and split each line with ":" , then you can iterate over each line and get yourself an email and password and submit the request 3 - i doubt this goofy website will ever ban your ip , but its a possibility , in that case we can use proxies
Bro you can do this with python with library call faker it's generating fake data like names emails and passwords.