Cyber Security
Cyber Security
  • Видео 25
  • Просмотров 18 865
How to Install the Nuclei Tool in Kali Linux | Step-by-Step Guide
#cybersecurity #ethicalhacking #vulnerability #babaralijamali
==============================================================
Connect with Me:-
▶ Facebook Page: cybsec.pk
▶ Facebook: babaralijamali.official
▶ Instagram: babaralijamali_official
▶ Linkedin: www.linkedin.com/in/babaralijamali
▶ SnapChat: www.snapchat.com/add/babar_jamalix
Просмотров: 1 057

Видео

Undetectable Android Payload | Kali Linux
Просмотров 1,5 тыс.Месяц назад
In this video, learn how to create and use an undetectable payload to hack Android devices ethically. This step-by-step guide is perfect for ethical hackers and cybersecurity enthusiasts who want to learn how to Hack Android with ethical hacking skills. #android #androidhacks #Cybersecurity #EthicalHacking #babaralijamali Connect with Me:- ▶ Facebook Page: cybsec.pk ▶ Facebook: fac...
Create Fake Wireless Access Point | Kali Linux Tutorial
Просмотров 8582 месяца назад
In this video, learn how to create a Fake Access Point (FakeAP) wireless network using Kali Linux for ethical hacking and penetration testing. FakeAPs are useful for understanding wireless network vulnerabilities and testing user behavior in controlled environments. This step-by-step guide will walk you through the entire process, making it easy for beginners and professionals alike. Full Artic...
How to Create an Android Payload in Just 1 Minute | Kali Linux
Просмотров 5252 месяца назад
In this video, I'll show you how to create an Android payload in just 1 minute using Metasploit. This quick and easy guide is perfect for ethical hackers and cybersecurity enthusiasts who want to learn the basics of penetration testing. Follow along as we generate a payload to test Android devices in a controlled, ethical environment. Full Article available : medium.com/@bjamali/how-to-create-a...
DVWA for Kali Linux | Kali Linux Tutorial
Просмотров 4022 месяца назад
In this video, You will learn how to install DVWA (Damn Vulnerable Web Application) on Kali Linux in just 5 minutes! Enhance your bug bounty skills with DVWA! If you found this video helpful, please like, subscribe, and hit the bell icon for more tutorials. Also, please drop your questions and suggestions in the comments below. #cybersecurity #ethicalhacking #kalilinux #babaralijamali Connect w...
DVWA in Cyber Security | Windows Edition
Просмотров 2123 месяца назад
In this tutorial, I'll guide you through the process of installing DVWA (Damn Vulnerable Web Application) on Windows 11. DVWA is an intentionally vulnerable web application designed to test web security and practice penetration testing skills. Follow this step-by-step guide to set up DVWA on your Windows 11 machine and learn about ethical hacking and web vulnerability testing. In this video, yo...
Whonix & Kali Linux Setup Tutorial | Stay Anonymous Online
Просмотров 1,6 тыс.4 месяца назад
In this step-by-step tutorial, learn how to set up Whonix with Kali Linux on VirtualBox to enhance your online anonymity and security. Whether you're into penetration testing or simply want to protect your privacy, this guide will walk you through configuring Whonix Gateway and Workstation with Kali Linux for maximum anonymity. Perfect for cybersecurity enthusiasts, ethical hackers, and anyone ...
Hack with WhatsApp Group | Step by Step Guide
Просмотров 4,2 тыс.5 месяцев назад
In this video, you will learn how hackers can hack any device using WhatsApp Group Link Let's Explore real-time hacking with Me in this full hacking tutorial. Learn about the hacking process of one of the most popular messaging apps WhatsApp in this video. This video is for educational purposes to help cybersecurity enthusiasts and professionals learn about potential threats and how to protect ...
Hide or Anonmyze IP Address using Proxychains + Tor in Kali Linux / Parrot Linux
Просмотров 9406 месяцев назад
In this Video, I will guide you step-by-step, securing your privacy and hide, or anonymize your IP address by using any Linux (Kali Linux, Parrot OS, and Ubuntu) using Proxychains and tor tool configuration! Whether you want to protect your privacy, access restricted content, or enhance your online security, this tutorial will show you how to achieve it using various methods and tools. Follow a...
Find Social Media Accounts with Sherlock | Kali Linux Tutorial
Просмотров 3,7 тыс.6 месяцев назад
Hey everyone, welcome to the Cyber Security RUclips Channel! In this video, I will show you how to use the powerful Sherlock tool for social media account information gathering. This open-source tool helps you find any social media accounts across various platforms using just a username, making it essential for ethical hacking, OSINT, or information gathering. In this Video: 1. Introduction to ...
Hack Any Android Phone and TV | Pro Hacker
Просмотров 7286 месяцев назад
In a surprising twist, an Android phone and TV were hacked, and the hacker took control to play Sindhi music of Jalal Chandio! In this video, we’ll explore how this unusual hack happened. Stay informed and learn how to safeguard your digital life from unexpected intrusions. #AndroidHack #Cybersecurity #JalalChandio #ethicalhacking #digitalforensics #babaralijamali Connect with Me:- ▶ Facebook P...
How to Hide MAC Address | Kali Linux Tutorial
Просмотров 3137 месяцев назад
In this video, we explore the techniques used by hackers to hide or change their MAC (Media Access Control) identity - Let's explore inside hackers' identities with us on Kali Linux. Whether you're a cybersecurity enthusiast or an ethical hacker looking to enhance your privacy, understanding these methods is crucial. Note: Changing your MAC address can enhance privacy, bypass network restrictio...
Secure File Delete Python Project
Просмотров 2068 месяцев назад
File Deleted Forever Demo - Digital Forensics Shredding Project Demo! Using an Advanced file shredding tool that deletes files with no data left using encryption techniques. Free Download: my fshredder tool: (Now available for public usage on Python): pypi.org/project/fshredder In this video, You will see the whole process of shredding a file is removed permanently without any data existing and...
Google Dork for Hacking Part 2
Просмотров 919 месяцев назад
Let's explore and Learn Google Dork hacking with this comprehensive tutorial! Google Dorks, also known as Google hacking, utilize advanced search syntax to uncover hidden information and vulnerabilities in websites. In this video, we'll explore how to use Google Dork queries effectively to identify exposed sensitive data, security loopholes, and much more. Perfect for cybersecurity professional...
Google Dork for Hacking Part 1
Просмотров 2269 месяцев назад
Let's explore and Learn Google Dork hacking with this comprehensive tutorial! Google Dorks, also known as Google hacking, utilize advanced search syntax to uncover hidden information and vulnerabilities in websites. In this video, we’ll explore how to use Google Dork queries effectively to identify exposed sensitive data, security loopholes, and much more. Perfect for cybersecurity professional...
Finding Web Vulnerabilities | Kali Linux
Просмотров 68710 месяцев назад
Finding Web Vulnerabilities | Kali Linux
Access Windows using NETCAT | Kali Linux
Просмотров 27110 месяцев назад
Access Windows using NETCAT | Kali Linux
How to Find IP Address
Просмотров 9310 месяцев назад
How to Find IP Address
Exploiting FTP Server Using Kali Linux
Просмотров 59310 месяцев назад
Exploiting FTP Server Using Kali Linux
Get Belkasoft's Full Forensics Course Worth $989 for FREE
Просмотров 23110 месяцев назад
Get Belkasoft's Full Forensics Course Worth $989 for FREE
Nmap Tool for Beginners | Kali Linux
Просмотров 9010 месяцев назад
Nmap Tool for Beginners | Kali Linux
How to use Metasploitable 2 | Ethical Hacking
Просмотров 13210 месяцев назад
How to use Metasploitable 2 | Ethical Hacking
OpenVAS Vulnerability Scanner | Kali Linux
Просмотров 20910 месяцев назад
OpenVAS Vulnerability Scanner | Kali Linux
Connect Linux with Remote Desktop
Просмотров 8410 месяцев назад
Connect Linux with Remote Desktop
Zotero tool for Research Studies
Просмотров 9111 месяцев назад
Zotero tool for Research Studies

Комментарии

  • @Trend-_-Zonee
    @Trend-_-Zonee 2 часа назад

    Here comes error hostapd not found

  • @Alpha-cw7vs
    @Alpha-cw7vs 4 дня назад

    Please make complete video where you install this payload in android version 13 or 14 and show us how to read stuff in meterpreter

  • @penggemar_tarling
    @penggemar_tarling 4 дня назад

    Mantap tutorialnya. Salam sling dukng n sukses sllu kwn..

  • @Shivanshtiwari2025
    @Shivanshtiwari2025 10 дней назад

    Is this compatible with Android 14

  • @AADARSH2023
    @AADARSH2023 16 дней назад

    Nice video bro 🙏🙏🙏👍🌹💯🥀

  • @d3wolfgaming695
    @d3wolfgaming695 25 дней назад

    Bro full video on this payload how to run commands in android

    • @CyberSecurity_PK
      @CyberSecurity_PK 25 дней назад

      Use meterpreter in Metasploit framework after payload.

  • @tedimele4028
    @tedimele4028 26 дней назад

    why do you use github

    • @CyberSecurity_PK
      @CyberSecurity_PK 25 дней назад

      Github is archive or storage where we add tools for public use as open-source and for collaboration.

  • @tahanashwan1999
    @tahanashwan1999 29 дней назад

    Is the file exposed by Google protection?

    • @CyberSecurity_PK
      @CyberSecurity_PK 29 дней назад

      Not i have tested on all av platforms 💯 undetectable, so you can upload on google Console if there is no detection, because google uses the same av technologies to scan

  • @rainbowarmy8799
    @rainbowarmy8799 Месяц назад

    bruh you saved my a lot of time. thankyou so much.

  • @todaypakistantv3574
    @todaypakistantv3574 Месяц назад

    ❤❤❤❤

  • @todaypakistantv3574
    @todaypakistantv3574 Месяц назад

    ❤❤❤❤

  • @DevNigthNews
    @DevNigthNews Месяц назад

    help me with an invalid package payload error

  • @dersanjs2906
    @dersanjs2906 2 месяца назад

    y you create a fake wireless network?

    • @CyberSecurity_PK
      @CyberSecurity_PK 2 месяца назад

      To test wireless devices and vulnerabilities inside wireless devices etc

  • @timilehinoyinlola7168
    @timilehinoyinlola7168 2 месяца назад

    I really need you to be my mentor sir

    • @CyberSecurity_PK
      @CyberSecurity_PK 2 месяца назад

      so follow my steps given in video it will guide you more, what you want to learn?

    • @timilehinoyinlola7168
      @timilehinoyinlola7168 2 месяца назад

      @CyberSecurity_PK I want to learn penetration testing

    • @timilehinoyinlola7168
      @timilehinoyinlola7168 8 дней назад

      @@CyberSecurity_PK from Cybersecurity to CEH

  • @ZeldaLebowitz
    @ZeldaLebowitz 3 месяца назад

    I couldn't take my eyes off the screen while watching this.

  • @TiphaineWillian
    @TiphaineWillian 3 месяца назад

    このビデオのおかげで、このトピックに対する見方が変わりました。

    • @CyberSecurity_PK
      @CyberSecurity_PK 3 месяца назад

      私のビデオを見てくれてありがとう。

  • @ClaudineSulkowski
    @ClaudineSulkowski 3 месяца назад

    Non riuscivo a staccare gli occhi dallo schermo mentre lo guardavo.

  • @XiomaraSutt
    @XiomaraSutt 4 месяца назад

    Grazie per aver condiviso queste preziose informazioni.

  • @SetsukoAngelbeck
    @SetsukoAngelbeck 4 месяца назад

    This video is amazing!

  • @MilissaSunseri
    @MilissaSunseri 4 месяца назад

    Grazie per aver condiviso queste preziose informazioni.

  • @brandyannekoch7136
    @brandyannekoch7136 4 месяца назад

    このビデオはたくさんのポジティブな価値をもたらしてくれます。

    • @CyberSecurity_PK
      @CyberSecurity_PK 3 месяца назад

      私のビデオを見てくれてありがとう。

  • @DenyFrankfurter
    @DenyFrankfurter 4 месяца назад

    Questo video è fantastico!

    • @CyberSecurity_PK
      @CyberSecurity_PK 3 месяца назад

      Grazie, e grazie per aver guardato i miei video.

  • @tbuxilyir1069
    @tbuxilyir1069 4 месяца назад

    I've watched this video multiple times already.

  • @LatonyagomeryMon
    @LatonyagomeryMon 4 месяца назад

    Non riuscivo a staccare gli occhi dallo schermo mentre lo guardavo.

    • @CyberSecurity_PK
      @CyberSecurity_PK 3 месяца назад

      bene e grazie per aver guardato i miei video.

  • @MedarnoAviles
    @MedarnoAviles 4 месяца назад

    Este video es increíblemente inspirador.

  • @KeshavM-ql1nq
    @KeshavM-ql1nq 4 месяца назад

    Brother i want to hack a group, he scammed money from me so i want to destroy that group? Any help by you

  • @vishnuvg9381
    @vishnuvg9381 4 месяца назад

    How did you get real time location .the victim must press"allow location access" in his phone

    • @CyberSecurity_PK
      @CyberSecurity_PK 4 месяца назад

      some time device directly allow and it not to ask.

  • @geykum_shakeshigh
    @geykum_shakeshigh 4 месяца назад

    I want to learn more about cyber security

  • @mr_hardy5329
    @mr_hardy5329 4 месяца назад

    Something strange here. Guy using Windows and Google Chrome talking about security.

    • @CyberSecurity_PK
      @CyberSecurity_PK 4 месяца назад

      Cybersecurity is for every one, so if you have Windows or Google Chrome you need to learn awareness about it.

    • @vfs3774
      @vfs3774 4 месяца назад

      its linux tho

    • @CyberSecurity_PK
      @CyberSecurity_PK 4 месяца назад

      @@vfs3774 Yes, it's linux but you can configure it's gateway and IP wi another system either Linux or Windows or MacOS using same IP Configuration and setup.

  • @Free.Education786
    @Free.Education786 6 месяцев назад

    Please make beginner to advance level practical live website hacking, live website bug hunting, live website penetration testing, live website exploitation content video series... 🙏 😊 💯✌❤💚💙💜😍😘🤝

  • @samiplays6365
    @samiplays6365 6 месяцев назад

    Wow thats cool! new fan❤❤ very good channel to learn cyber security for education.

  • @njmediaentertainment1178
    @njmediaentertainment1178 6 месяцев назад

    ❤❤❤❤❤

  • @wonderworld9809
    @wonderworld9809 6 месяцев назад

    you are pakistani

  • @amuslimapolymath7481
    @amuslimapolymath7481 6 месяцев назад

    With or without placing a software in host Android device

    • @CyberSecurity_PK
      @CyberSecurity_PK 6 месяцев назад

      Yes, without any password or pass code or without software you can hack!

    • @amuslimapolymath7481
      @amuslimapolymath7481 6 месяцев назад

      Through imei!?

    • @CyberSecurity_PK
      @CyberSecurity_PK 6 месяцев назад

      @@amuslimapolymath7481 no i access it with ip address.

    • @guitarlegend1482
      @guitarlegend1482 3 месяца назад

      This is adb server and it's for and vulnerable devices but keep up the good work​@@CyberSecurity_PK

  • @cicada3318
    @cicada3318 7 месяцев назад

    Nice work ❤ May we get the source code of the Python file???

    • @CyberSecurity_PK
      @CyberSecurity_PK 7 месяцев назад

      No, this is not for public, soon available for commercial use, if any one want then need to purchase this code from me.

  • @MohammedSalah2405
    @MohammedSalah2405 10 месяцев назад

    Well, what's the point? You said disclaimer as if it's some kinda hacking. But, where's the hacking here when you're First manually installing on the target device, second, you're working on a local network.

    • @CyberSecurity_PK
      @CyberSecurity_PK 10 месяцев назад

      Yes, this is for educational purposes, so i added and can be used for hacking purposes, i am working on local, but this disclaimer message is for those who try to run in another system without asking.

  • @ashraf7958
    @ashraf7958 10 месяцев назад

    i am getting resync error during Notus file and after that

    • @CyberSecurity_PK
      @CyberSecurity_PK 10 месяцев назад

      You need to upgrade its database of CVE , sometime it's database takes more timing for update so incomplete makes more errors during run.

    • @pppppp11marco47
      @pppppp11marco47 10 месяцев назад

      same here, always rsync errors

    • @CyberSecurity_PK
      @CyberSecurity_PK 10 месяцев назад

      this is a common issue in Openvas so it's make more hard to use Openvas@@pppppp11marco47

  • @abbasisahab4096
    @abbasisahab4096 10 месяцев назад

    Bhai course link yaha comment box main laga den pin kar k.

  • @seriousss5890
    @seriousss5890 10 месяцев назад

    course link?

  • @atifshah9681
    @atifshah9681 10 месяцев назад

    Great🫡

  • @atifshah9681
    @atifshah9681 10 месяцев назад

    Awesome dude. U Cleared all my questions regarding NMAP.