- Видео 29
- Просмотров 643 286
Let's Hack
Индия
Добавлен 12 июл 2021
I am a Cyber Security Researcher, a student and a JEE aspirant. I have done many certifications including CEH and CCNA training, and have created this channel to share that knowledge with the world.
QUANTUM COMPUTERS, EXPLAINED | ACCESS and CODE IMB Quantum Computers....
This video on Quantum Computing gives you an overview of the underlying technology of Quantum Computing. This video will help you understand its difference from other classic computers or Supercomputers. A conventional digital computer manipulates bits of value "0" or "1" to execute data processing operations.
In this video we will discuss how quantum computers work, their effect on CYBERSECURITY and also how to access one of IMB Computers in your own computers.....
Time Stamps:
0:00 - Intro
0:25 - Theory
6:55 - Practical
12:00 - Outro
#quantumcomputing #cybersecurity #2024
In this video we will discuss how quantum computers work, their effect on CYBERSECURITY and also how to access one of IMB Computers in your own computers.....
Time Stamps:
0:00 - Intro
0:25 - Theory
6:55 - Practical
12:00 - Outro
#quantumcomputing #cybersecurity #2024
Просмотров: 626
Видео
SHODAN for BUG BOUNTY ! | (Best RECON Tool) | Let's Hack
Просмотров 2,8 тыс.4 месяца назад
Shodan is a search engine that lets the user find specific types of computers (webcams, routers, servers, etc.) connected to the internet using a variety of filters. Some have also described it as a search engine of service banners, which are meta-data the server sends back to the client. This can be information about the server software, what options the service supports, a welcome message or ...
Networking SNIFFING | MITIM Explained (Let's Hack) [2024]
Просмотров 1,3 тыс.5 месяцев назад
This video explains network sniffing and MITM attacks in detail and which can help you protect yourselves and perform a small attack yourself. Content type however is optional and webmasters sometimes don’t set it, which leaves the browsers wondering about the content type it is consuming. So browsers had to implement parsing and “sniffing” techniques to detect the type of content when a conten...
Find OPEN SOURCE INFORMATION on ANYONE | (OSINT Tutorial) [2024]
Просмотров 9 тыс.5 месяцев назад
Find information about anyone online. This video explains how you can use OSINT and have open-source information come to you just like that. Tool Links: Exploit DB: www.exploit-db.com/ SPOKEO spokeo.com/ GOOGLE LENS: lens.google/ TINEYE: tineye.com/ EXIF: exifdata.com/ Chapters: 0:00 - Intro 1:17 - Theory 2:38 - Tools/Practical 9:44 - Outro #osint #2024 #information #letshack
HASHING Explained ! | Tutorial (Let's Hack) [2024]
Просмотров 9216 месяцев назад
What is hashing? In this video, I explain how hash functions work in an easy-to-digest way. Hashing is the process of converting an input of any length into a fixed-size string of text, using a mathematical function. Stay Tuned till the end to get a very deep understanding on what this concept is and how it works. Hashcat Link - github.com/hashcat/hashcat Check Out the Latest Content - ruclips....
I hid a VIRUS inside an IMAGE! [Tutorial] (Let's Hack)
Просмотров 2 тыс.6 месяцев назад
Steganography is a technique that is centuries old and is now adopted by new technologies, especially by HACKERS!! Hackers have been known to hide malicious files inside files like photos or audio files and later extract these files on a victim’s computer to wreak havoc. But, steganography is also used for good! People will often use steganography to hide secret messages safely without the auth...
SHODAN Explained! (It's Scary Easy to do) | Let's Hack
Просмотров 516 тыс.7 месяцев назад
Shodan is a search engine that lets the user find specific types of computers (webcams, routers, servers, etc.) connected to the internet using a variety of filters. Some have also described it as a search engine of service banners, which are meta-data the server sends back to the client. This can be information about the server software, what options the service supports, a welcome message or ...
Complete MACHINE LEARNING ROADMAP | GET CERTIFIED (Let's Hack)
Просмотров 6898 месяцев назад
What is Machine Learning Fully Explained This Machine Learning basics video will help you understand what Machine Learning is, what are the types of Machine Learning - supervised, unsupervised & reinforcement learning, how Machine Learning works with simple examples, and will also explain how Machine Learning is being used in various industries. I will be taking you though a very educational jo...
PHISHING ATTACKS EXPLAINED (PROTECT YOURSELF) | Let's Hack
Просмотров 2 тыс.8 месяцев назад
What are Phishing Attacks, and how to prevent yourself from these. This video on Phishing explains what is a phishing attack, we cover the infamous cyber-attack vector which has been affecting users since the early days of the internet. We learn the workings and intricacies of a phishing attack, and the numerous remedial measures. We will dive deep into Phishing and how can a Hacker Perform thi...
FLIPPER ZERO : The SECRET Tool Hackers Don't Want You To Know About
Просмотров 2,4 тыс.9 месяцев назад
Flipper Zero is it useful? Or Just a waste of time and money Today we discover everything about the flipper, how it works, what are the main features and a lot more. This week, we dive deep into the Flipper Zero, a multi-purpose hacking gadget that's taken the security world by storm. We'll explore its features, from cloning RFID badges to bypassing access control systems. Subscribe :) Let's Ha...
How to use JOHN THE RIPPER | Password Cracking (Let's Hack) {2023}
Просмотров 2,4 тыс.Год назад
Join our cybersecurity RUclips channel as we explore the extraordinary world of John the Ripper, the renowned hacking tool for password cracking. In this captivating video, we delve into the capabilities and functionalities of John the Ripper, empowering you to enhance your cybersecurity skills. Learn how to crack passwords efficiently, analyze encryption algorithms, and secure your digital ass...
OPEN REDIRECT (EXPLAINED) | Step-by-step (Let's Hack) {2023}
Просмотров 1 тыс.Год назад
Join our cybersecurity RUclips channel as we uncover the hidden dangers of open redirect vulnerabilities in this informative video. Learn how malicious actors exploit this widespread flaw to redirect unsuspecting users to malicious websites, phishing pages, or malware-infested domains. Discover the impact of open redirect vulnerabilities on the integrity and reputation of your website, and gain...
DDOS ATTACKS Explained (Live Examples!) | Let's Hack (2024)
Просмотров 885Год назад
Denial Of Service Attacks Fully Explained! 2024 Denial of Service attacks are one of the many tactics malicious actors may use. Explore what a denial of service attack is and learn how a single hacker can take down an entire system. Today we will be covering everything there's to know about Ddos Attacks Time Codes: 0:00 - Intro 0:35 - Theory 2:25 - Practical 8:57 - Outro #LOIC #denialofservice ...
Metasploit Tutorial ! (Fully Explained) | Let's Hack (2024) | {Within 10 mins} 🔒
Просмотров 3,1 тыс.Год назад
Metasploit Tutorial ! (Fully Explained) | Let's Hack (2024) | {Within 10 mins} 🔒
Unlocking the Secrets: Mastering Hash Cracking with Hashcat | Let's Hack (2023)
Просмотров 1,8 тыс.Год назад
Unlocking the Secrets: Mastering Hash Cracking with Hashcat | Let's Hack (2023)
What is AIRCRACK-NG ? | FULL TUTORIAL | [2024] (Let's Hack)
Просмотров 1,6 тыс.Год назад
What is AIRCRACK-NG ? | FULL TUTORIAL | [2024] (Let's Hack)
CROSS SITE SCRIPTING EXPLAINED! (2023) | Let's Hack | [Fully Explained]
Просмотров 2 тыс.Год назад
CROSS SITE SCRIPTING EXPLAINED! (2023) | Let's Hack | [Fully Explained]
INFORMATION DISCLOSURE | Let's Hack (Full Tutorial) | 2023
Просмотров 2,4 тыс.Год назад
INFORMATION DISCLOSURE | Let's Hack (Full Tutorial) | 2023
Getting Started with NETWORKING || Let's Hack (Explained) || 2023
Просмотров 347Год назад
Getting Started with NETWORKING || Let's Hack (Explained) || 2023
Nmap 101: It could save your life.....(Full Tutorial) [2023]
Просмотров 1,2 тыс.2 года назад
Nmap 101: It could save your life.....(Full Tutorial) [2023]
How to become COMPLETELY ANONYMOUS on the INTERNET [Full Tutorial] (2023)
Просмотров 5 тыс.2 года назад
How to become COMPLETELY ANONYMOUS on the INTERNET [Full Tutorial] (2023)
How to use SHERLOCK! (FULL TUTORIAL) [2024] {Within minutes 5 MINS} 🕵🏻♂️
Просмотров 69 тыс.2 года назад
How to use SHERLOCK! (FULL TUTORIAL) [2024] {Within minutes 5 MINS} 🕵🏻♂️
ADVANCED GOOGLE SEARCH TUTORIAL [All You Need to Know] (2024)
Просмотров 2,9 тыс.2 года назад
ADVANCED GOOGLE SEARCH TUTORIAL [All You Need to Know] (2024)
The Most SECURE OS on LiNuX [Tutorial 2021] (All you need to know)
Просмотров 9543 года назад
The Most SECURE OS on LiNuX [Tutorial 2021] (All you need to know)
How to Install the LAZY SCRIPT on Kali Linux | (Official Tutorial)
Просмотров 9 тыс.3 года назад
How to Install the LAZY SCRIPT on Kali Linux | (Official Tutorial)
Traceback (most recent call last): File "/usr/bin/sherlock", line 7, in <module> from sherlock.sherlock import main File "/usr/share/sherlock/sherlock/sherlock.py", line 12, in <module> import pandas as pd File "/usr/lib/python3/dist-packages/pandas/__init__.py", line 46, in <module> from pandas.core.api import ( File "/usr/lib/python3/dist-packages/pandas/core/api.py", line 1, in <module> from pandas._libs import ( File "/usr/lib/python3/dist-packages/pandas/_libs/__init__.py", line 18, in <module> from pandas._libs.interval import Interval File "pandas/_libs/interval.pyx", line 1, in init pandas._libs.interval ValueError: numpy.dtype size changed, may indicate binary incompatibility. Expected 96 from C header, got 88 from PyObject
Bro can you help me,i have my online marketing id and password. But i was just forget my online marketing extra key password.... Will you can help me to find this password?? Plz
Buddy I want to trace someone's address from his phone number. Is it possible
yooo
Can you help with this? I am on Mac OS Catalina version 10.15.7 Preparing metadata (pyproject.toml) ... error error: subprocess-exited-with-error × Preparing metadata (pyproject.toml) did not run successfully. │ exit code: 1 ╰─> [23 lines of output] + meson setup /tmp/pip-install-5zpe7wfi/pygobject_ac88d78ecf054a4fac6e0c245f9445a7 /tmp/pip-install-5zpe7wfi/pygobject_ac88d78ecf054a4fac6e0c245f9445a7/.mesonpy-2udnwi_5 -Dbuildtype=release -Db_ndebug=if-release -Db_vscrt=md -Dtests=false -Dwheel=true --wrap-mode=nofallback --native-file=/tmp/pip-install-5zpe7wfi/pygobject_ac88d78ecf054a4fac6e0c245f9445a7/.mesonpy-2udnwi_5/meson-python-native-file.ini The Meson build system Version: 1.6.0 Source dir: /tmp/pip-install-5zpe7wfi/pygobject_ac88d78ecf054a4fac6e0c245f9445a7 Build dir: /tmp/pip-install-5zpe7wfi/pygobject_ac88d78ecf054a4fac6e0c245f9445a7/.mesonpy-2udnwi_5 Build type: native build Project name: pygobject Project version: 3.48.2 C compiler for the host machine: cc (gcc 13.2.0 "cc (Ubuntu 13.2.0-23ubuntu4) 13.2.0") C linker for the host machine: cc ld.bfd 2.42 Host machine cpu family: x86_64 Host machine cpu: x86_64 Program python3 found: YES (/home/kevinmeyer56/bin/python3) Found pkg-config: YES (/usr/bin/pkg-config) 1.8.1 Run-time dependency python found: YES 3.12 Found CMake: /usr/bin/cmake (3.28.3) Run-time dependency gobject-introspection-1.0 found: NO (tried pkgconfig and cmake) Not looking for a fallback subproject for the dependency gobject-introspection-1.0 because: Use of fallback dependencies is disabled. ../meson.build:29:9: ERROR: Dependency 'gobject-introspection-1.0' is required but not found. A full log can be found at /tmp/pip-install-5zpe7wfi/pygobject_ac88d78ecf054a4fac6e0c245f9445a7/.mesonpy-2udnwi_5/meson-logs/meson-log.txt [end of output] note: This error originates from a subprocess, and is likely not a problem with pip. error: metadata-generation-failed × Encountered error while generating package metadata. ╰─> See above for output. note: This is an issue with the package mentioned above, not pip. hint: See above for details.
pls i am having problem finding the python installation
It all goes well until I put in "python3 -m pip install -r requirements.txt" and it says "ERROR: Could not open requirements file: [Errno 2] No such file or directory: 'requirements.txt'" Do you know a solution or am I doing something wrong?
ERROR: Could not open requirements file: [Errno 2] No such file or directory: 'requirements.txt'
This is what I keep getting when I want to install ERROR: could not open requirements file:[Errno 2] No such file or directory: 'requirements.txt'
like me
@@firasko_officiel same here
using "python3 -mpip install -e ." worked for the requirements.txt on my mac
every time i try to copy installation requirement always says like this ERROR: Could not open requirements file: [Errno 2] No such file or directory: 'requirements.txt' could you please help me
Hey bro, I love your educational videos. I'm from Nigeria and really happy to reach out
Look at you hacker. I pathetic life form of meat and flesh
Herro sir I'm a curry loving turd did u turn ur phone off and on again
Eat balls
ERROR: Could not open requirements file: [Errno 2] No such file or directory: 'requirements.txt
ERROR: Could not open requirements file: [Errno 2] No such file or directory: 'requirements.txt
ERROR: Could not open requirements file: [Errno 2] No such file or directory: 'requirements.txt
hello! i tryed different usernames (only mine ones) and it sais "user not found" what sould i do?.....
Useless video. Average Indian chutiya gen z trying to act cool
asd
d
asd
asd
it's kinda crazy how nobody is talking about the book whispers of manifestation on borlest
asd
nice
ERROR: Could not open requirements file: [Errno 2] No such file or directory: 'requirements.tx'
ah, so shodan is used for low level non critical relatively useless non priority targets... i just use linux...
❤❤ Pakistan
hello can you please help me about hack and kali linux please i need you ?
Bro looks like shinchan and works like Mr robot
not hacking really if all your doing is trying to connect to open ports.. thankfully an utterly pointless video and will save the vist from the youtube whitehat hacker making a video about you
FBI. HOLLAND. Musk or Martha the Slut. Kimbal took out a life insurance policy and hit on my life. THREAT OF PERPETUAL SPYING.
why only 500 views?
indian= hacker who da thunk it
so smug - really needs an asskicking
Let hack china 😂
I used to look like this..❤ for the boy. Subscribed..🎉
Thanks.. can a layman make money by being node for TOR? If so the how?
Not exactly showing what your straight up saying...its more like demo tool to practice... don't get confused with its hacked or something
ERROR: Could not open requirements file: [Errno 2] No such file or directory: 'requirements.txt'
ya same
2:45 The re*ard says "these webcams are open" but when clicks on any of them, no webcam loads up for viewing. Intentionally hides the browser's tabs to show us a fake tab which was not opened from shodan.
@@kurt1853says the western guy
@@kurt1853 a youtuber makes mistake Lets hate entire country
@@kurt1853 you fail
Shodan is no longer free, you fking re*ard. At least update the video title or delete this misleading clickbait video, c*ck.
Disgusting Indian accent
Not for Android..or
the wondabirity
nooo, it should be Bob, not Tom!!!
দাদাগিরি দেখা বানা ইন্ডিয়া।
You are a good teacher. More lectures please
That really means a lot Thank you so much..