CybrZone
CybrZone
  • 81
  • 275 252
Learn VIM absolute basics in 6 minutes! (VIM beginner tutorial 2024)
Join this channel to get access to perks:
czcams.com/channels/jsEf7AGa-YHV8g54DH5Niw.htmljoin
Normal Default; for navigation and simple editing
Insert For explicitly inserting and modifying text
Command Line For operations like saving, exiting, etc.
!q (quit without saving)
!x (save and exit)
zhlédnutí: 44

Video

DESTROY scam call centres with python!!
zhlédnutí 1,2KPřed 4 hodinami
Support this channel to get access to perks: czcams.com/channels/jsEf7AGa-YHV8g54DH5Niw.htmljoin Unfortunately I had a video planned to show the funny side of this script by recording the calls and the angry scammers, however twilio banned my account for no reason lol. F twilio! MP3 voice: www.tetyys.com/SAPI4/ (mike in hall) github.com/CybrZone/CallCentreHelper
Getting revenge on evil phishing website using Python
zhlédnutí 7KPřed 19 hodinami
Join this channel to get access to perks: czcams.com/channels/jsEf7AGa-YHV8g54DH5Niw.htmljoin This is an update video to our project PhishKR, getting revenge against evil phishing websites! and how to find links easily using appanyrun malware analysis platform (#scammerpayback ) scammer trolling with a python website flooder hopefully this saves people from being compromised by these scammers! ...
How to install NESSUS Essentials for FREE on Kali Linux (any linux distro)
zhlédnutí 320Před 21 hodinou
This is a quick guide on how to install NESSUS Essentials on linux based OS. www.tenable.com/products/nessus/nessus-essentials temp-mail.org
Divine Intellect. RIP Terry A. Davis
zhlédnutí 1,3KPřed dnem
Divine Intellect. RIP Terry A. Davis
Using python to get revenge on an evil phishing website!
zhlédnutí 24KPřed dnem
Join this channel to get access to perks: czcams.com/channels/jsEf7AGa-YHV8g54DH5Niw.htmljoin this video shows how to use burpe suite to intercept post requests and then use python to flood POST requests to the malicious domain! Code github.com/CybrZone/phishkiller
How to crack password protected ZIP files using John the ripper/Kali
zhlédnutí 1,2KPřed dnem
this is why password complexity is important! using john the ripper is a simple way of cracking/brute forcing forgotten passwords!
Cracking password protected RAR files tutorial 2024!
zhlédnutí 132Před dnem
This video shows why password complexity is so important for any pdf, winzip, 7zip, zip and rar files that have a password on them
Crack password protected PDF documents with John The Ripper
zhlédnutí 1,1KPřed dnem
Join this channel to get access to perks: czcams.com/channels/jsEf7AGa-YHV8g54DH5Niw.htmljoin This is why password complexity is important! this video shows how easy it is to HACK passwords for PDF documents. This can come in useful if you have forgotten your PDF passwords!
How To Crack / Recover Forgotten PDF Protected Passwords!
zhlédnutí 56Před dnem
This is quick video on how to crack password protected PDF files! pdftk nameit.pdf output pwd.pdf user_pw 123456789 copy password protected PDF file to johntheripper run folder ./pdf2john.pl pwd.pdf (greater than sign) pdf.hash john pdf.hash (got to be careful saying that lol)
Some people have a death wish... ICODC part 1 #a35amg #a35
zhlédnutí 68Před 28 dny
Some people have a death wish... ICODC part 1 #a35amg #a35
How to use NMAP on Kali Linux 2024 (Nmap beginner tutorial)
zhlédnutí 200Před 6 měsíci
How to use NMAP on Kali Linux 2024 (Nmap beginner tutorial)
How to fix OpenVAS POSTGRESQL libgvmd wrong version error on Kali Linux
zhlédnutí 2,1KPřed 7 měsíci
How to fix OpenVAS POSTGRESQL libgvmd wrong version error on Kali Linux
How to investigate phishing emails safely with free cyber security tools! #cybersecurity
zhlédnutí 189Před 9 měsíci
How to investigate phishing emails safely with free cyber security tools! #cybersecurity
ASMR Programming a game with PYTHON!
zhlédnutí 145Před 9 měsíci
ASMR Programming a game with PYTHON!
Python beginner tutorial - creating a simple game
zhlédnutí 65Před 9 měsíci
Python beginner tutorial - creating a simple game
How To Compile C & C++ Files On Windows (easy tutorial)
zhlédnutí 178Před 9 měsíci
How To Compile C & C Files On Windows (easy tutorial)
3 MOST common ENTRY LEVEL CYBER SECURITY Interview questions
zhlédnutí 94Před rokem
3 MOST common ENTRY LEVEL CYBER SECURITY Interview questions
Cyber Security - Threats, Adversaries and Risk
zhlédnutí 22Před rokem
Cyber Security - Threats, Adversaries and Risk
Kali Linux - How To DNS POSION/Website SPOOFING !
zhlédnutí 10KPřed rokem
Kali Linux - How To DNS POSION/Website SPOOFING !
HOW TO CHECK IF YOUR PC HAS BEEN HACKED ! (RAT INFECTED!)
zhlédnutí 436Před rokem
HOW TO CHECK IF YOUR PC HAS BEEN HACKED ! (RAT INFECTED!)
Create your own WiFi Jammer with kali linux + wireless USB
zhlédnutí 626Před rokem
Create your own WiFi Jammer with kali linux wireless USB
Linux Terminal Commands - Compression
zhlédnutí 51Před rokem
Linux Terminal Commands - Compression
Linux Terminal Commands - Networking
zhlédnutí 163Před rokem
Linux Terminal Commands - Networking
Linux Terminal Commands - Process Management
zhlédnutí 58Před rokem
Linux Terminal Commands - Process Management
Linux Terminal Commands - File Commands & Directory
zhlédnutí 31Před rokem
Linux Terminal Commands - File Commands & Directory
Linux Terminal Commands - User Information & Management
zhlédnutí 56Před rokem
Linux Terminal Commands - User Information & Management
Linux Terminal Commands - Performance Monitoring & Statistics
zhlédnutí 131Před rokem
Linux Terminal Commands - Performance Monitoring & Statistics
Linux Terminal Commands - Hardware Information
zhlédnutí 70Před rokem
Linux Terminal Commands - Hardware Information
Linux Terminal Commands - System Information
zhlédnutí 112Před rokem
Linux Terminal Commands - System Information

Komentáře

  • @meownati0n
    @meownati0n Před 21 hodinou

    huuuuge W bro, gonna punish some scammers too xd we're all waiting for proxy updates btw

  • @BobertV702
    @BobertV702 Před 22 hodinami

    Lol

  • @fredb5626
    @fredb5626 Před dnem

    please answer our pull request!!

  • @user-nq3ew3zg7i
    @user-nq3ew3zg7i Před dnem

    Great work 🙏

  • @thedark6871
    @thedark6871 Před dnem

    Keep it up bro 💪

  • @ahmgarci1349
    @ahmgarci1349 Před dnem

    Are you actually sure that those guys won't see which IP those requests were came from and categorize them according to that? Using tor or proxies for so-called ddos could have been a better idea. But anyways, appreciate the effort and job! Keep going.

  • @MindfulMinds322
    @MindfulMinds322 Před 2 dny

    good work

  • @eclipseontime
    @eclipseontime Před 2 dny

    Great work.

  • @Zoe_Cyber
    @Zoe_Cyber Před 2 dny

    how do i create one so you can use, i really love this project.just tell me how to go about the twilio

  • @CybrZone
    @CybrZone Před 2 dny

    I'm now a youtube ad partner so thanks for all the support. Really disappointed with twilio, but hopefully people see the good intention. They didn't want my money lol.

  • @lokluex3824
    @lokluex3824 Před 2 dny

    The module faker can create fake but realistic looking emails and passwords

  • @Eiii-1762
    @Eiii-1762 Před 2 dny

    Is it legal to hack a phishing website?

  • @AmaanKhan-gq3qv
    @AmaanKhan-gq3qv Před 4 dny

    class mate ,haha

  • @ktwice7481
    @ktwice7481 Před 4 dny

    Fair warning, he uses rotating vpn, if you keep running floods straight from your home isp, depending on your isp you might get temp shutdown for ddos.. however, nice tactic ;) this amount is not usefull but if you'd keep this running over a extended time it could def create a garbage db. I'd say it wont be easy to quickly switch between thousands of stealth ip's, it will slow down things conciderably, but if this was passed to a botnet then certainly all hell will break loose.. but yea most effective would indeed be that their host doesnt like the floods removes the hosting account ;) my 2cents, keep up the fight 💪👍👍

  • @comosaycomosah
    @comosaycomosah Před 5 dny

    lmao good shit

  • @jw200
    @jw200 Před 5 dny

    how you find the phishing links?

  • @Nate73837
    @Nate73837 Před 5 dny

    W

  • @FaizKhan-of9qv
    @FaizKhan-of9qv Před 5 dny

    use threads to send multiple request per second

  • @store-manager-deluxe

    What would have been better is if you randomized the email and password for each request being sent. That way the people hosting it would have had to dig through thousands of fake details to even get access to someones account. Probably would do this using TOR aswell.

  • @Yonky999
    @Yonky999 Před 6 dny

    Awesome vid! I'm new in the cyber security field and was just wondering . If I were to try this, I should probably use some sort of VPN/proxy no? Since the victim will be able to trace back my IP? Thanks in advance

  • @zebusaqua4415
    @zebusaqua4415 Před 6 dny

    There is a python package that can generate emails/passwords/names and all that for testing Django and such. I forgot the name would have to look it up. But this would be a great use for it

  • @Muziek37414
    @Muziek37414 Před 6 dny

    you could show how to use proxychains with only the tor service as proxy. its set up in 5 minutes and it will change the ip in every request i think

  • @Muziek37414
    @Muziek37414 Před 6 dny

    This would be a fun project to learn python in and get some random fake user data api's in

  • @Volt_Prime
    @Volt_Prime Před 6 dny

    Hey bro very interesting video about hacking android and iphone camera, in real time and so that the victim does not know about it, that is, nothing blinks or lights up when the camera is working, you have cool videos, thank you

  • @unsuspiciousinternetuser

    just checked the github, i love where this is going hahaha nice job

  • @user-ei8dc8ug8m
    @user-ei8dc8ug8m Před 6 dny

    this is not applicable in WSL Kali

  • @JohnFerrier
    @JohnFerrier Před 6 dny

    Easily overthrown with “SELECT*FROM ‘table’ WHERE NOT az = ‘yourNiceWords’”

  • @1810mm-yb5hs
    @1810mm-yb5hs Před 6 dny

    your acc so goated man

  • @mowlandproduction
    @mowlandproduction Před 6 dny

    You can optimize itt using Multi Threading with Threading library cuz that's builtin in python 3, that can cause much trouble to the Phisher Website, Even you can takedown that website using a DoS Script in python 3

  • @replikvltyoutube3727

    Does it use some VPN or Tor for the IP spoofing? If you send many requests from one IP, they may just filter entries easily, even if user agent is the same.

  • @TutorialsxGames
    @TutorialsxGames Před 7 dny

    The script is good so far but the generate password function generates password all of the same length using a wordlist and generating passwords of different lengths will make it harder for these phishing links to determine what data is crap.

  • @adambamf9365
    @adambamf9365 Před 7 dny

    mybe add 'While True' for automation and then try temp mail for fake emails and a wordlist for pswrds

  • @adambamf9365
    @adambamf9365 Před 7 dny

    nice work !;

  • @remy2885
    @remy2885 Před 7 dny

    legend! next time make them install a rootkit

  • @ricardocosta8344
    @ricardocosta8344 Před 7 dny

    Nice video man! Thank you for all the informations I will give a look to your new code here! Very interesting :P!

  • @Pokedollar
    @Pokedollar Před 7 dny

    I like the idea of you wanting to stop scammers, but, using the same email address (especially an unrealistic one, as you took) and password is easily detectable. Not only that, as soon as the scammer sees, there's like 1000s of entries with that certain email, they will simply match and replace that data. Instead, you could be trying to work on a bot that randomizes the email and password everytime. Even better, would be emails that seem like they could be real, to make their life even harder. For example, you could take a list of first names and last names, and shuffle email addresses with that.

  • @jesseN301
    @jesseN301 Před 7 dny

    For me it says theres no module named 'name'

  • @Radiation-xxv
    @Radiation-xxv Před 7 dny

    my toxic trait thinking I can do this easily

  • @Niall96
    @Niall96 Před 7 dny

    PhishSwamper

  • @pp0x280
    @pp0x280 Před 7 dny

    SELECT * FROM table WHERE ip = yours

  • @pouyatoutounchy1238

    I had a similar one and what I did in the Python script was make the email and password random with random intervals between posting the data and also IP changes using auto IP changer. The reason was making it harder for them to delete the data from their database, assuming they used SQL-like databases. So eventually I posted so much data that they took down the whole link possibly to make a new one 😁😉

    • @user-gw2fm1vj5v
      @user-gw2fm1vj5v Před 4 hodinami

      can you explain how the ip will be changed on every request we put

  • @anwari.h.g7072
    @anwari.h.g7072 Před 7 dny

    Your channel may be dead, but you've won a subscriber now.❤

  • @enijar
    @enijar Před 7 dny

    You could improve this by using the faker library to create realistic and varied submissions, which would be better than having all submissions the same, as the bad actor can easily bulk delete similar submissions

  • @thedark6871
    @thedark6871 Před 7 dny

    you are learning and punishing ahahahhaha great content bro

  • @loxbie1661
    @loxbie1661 Před 7 dny

    Could you put the github link in the description please? :D

  • @cryptoafc7655
    @cryptoafc7655 Před 8 dny

    love your videos. I subscribed

  • @W.RonanJohannesPaulDiii

    awesome video mate

  • @okcapo
    @okcapo Před 8 dny

    You should: Thread the requests & try to use php injection on form parts(email || password) :)

  • @emptycode1782
    @emptycode1782 Před 8 dny

    i dont know much python but these will really help: 1 - multi threading 2 - generate fake email:pass into a .txt , and split each line with ":" , then you can iterate over each line and get yourself an email and password and submit the request 3 - i doubt this goofy website will ever ban your ip , but its a possibility , in that case we can use proxies

    • @H1NTR0X1
      @H1NTR0X1 Před 3 dny

      Bro you can do this with python with library call faker it's generating fake data like names emails and passwords.