cyber security #98
Replies: 4 comments
-
|
Ethical hacking is like being a digital detective for good. It’s when cybersecurity experts hack into systems—but with permission—to find and fix security flaws before real hackers can exploit them. Instead of causing harm, ethical hackers help protect data, networks, and devices from cyberattacks. It’s all about staying one step ahead of the bad guys to keep systems safe. |
Beta Was this translation helpful? Give feedback.
-
|
I want to learn specific tools if you can teach me how to create rat
embedded in a web link or pdf file or image that will be stealthy installed
when the user of the target device tries to open or click on the link, and
I will have a clone of the device , especially phones and for computer, I
will gain access to the computer , and for emails I will get thier password
…On Mon, 26 May 2025, 12:03 rishabhtpt, ***@***.***> wrote:
Ethical hacking is like being a digital detective for good. It’s when
cybersecurity experts hack into systems—but with permission—to find and fix
security flaws before real hackers can exploit them. Instead of causing
harm, ethical hackers help protect data, networks, and devices from
cyberattacks. It’s all about staying one step ahead of the bad guys to keep
systems safe.
visit-https://tpointtech.hashnode.dev/common-ethical-hacking-techniques
—
Reply to this email directly, view it on GitHub
<#98 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/BSQT3DJNDHPP672TEDCVP2L3ALYJ3AVCNFSM6AAAAAB5JPBBYWVHI2DSMVQWIX3LMV43URDJONRXK43TNFXW4Q3PNVWWK3TUHMYTGMRXGE2DIOI>
.
You are receiving this because you authored the thread.Message ID:
<farhanashrafdev/90DaysOfCyberSecurity/repo-discussions/98/comments/13271449
@github.com>
|
Beta Was this translation helpful? Give feedback.
-
|
I am looking for a ethical hacker please help I'll pay I have a hacker on my ass who is very malicious |
Beta Was this translation helpful? Give feedback.
-
|
Good evening everyone from Nigeria. Please, this is urgent. I have been looking for ways to download metasploitable for windows 10. I want to use it for my ethical hacking practice. I already have virtual box and Linux installed in my system what is remaining now is metasploitable. Please, where can I download it. I will appreciate if I get a genuine feedback. Thank you all. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hi everyone,
I’m an aspiring cybersecurity professional with a strong interest in red teaming and advanced threat simulation. I'm particularly eager to understand the techniques and tools used in controlled environments for simulating real-world attacks — such as remote code execution, payload delivery, and post-exploitation techniques — all strictly within legal and ethical boundaries.
If anyone here is experienced in developing or using such tools (e.g., C2 frameworks like Cobalt Strike, Mythic, or Empire), I would deeply appreciate any guidance, learning resources, or mentorship. I’m also open to participating in ethical hacking labs like Hack The Box or TryHackMe, and I’m willing to contribute to any related open-source projects.
Thank you in advance for any help or direction!
[email protected]
Beta Was this translation helpful? Give feedback.
All reactions