dillibabukadati-blog
dillibabukadati-blog
KDB's TECH WORLD
150 posts
Want to Learn Hacking, Technology and Android Development and many more al those are for free only so, enjoy learning and be a developer
Don't wanna be here? Send us removal request.
dillibabukadati-blog · 7 years ago
Text
Tor-Based Messenger Briar Is Officially Released to the Public
Tor-Based Messenger Briar Is Officially Released to the Public
Briar, a new messaging service that operates through the Tor network, is publicly released for Android platforms.
Last July, a Tor-based messaging service called Briar was first announced. It was only in beta at the time, but the app showed a lot of potential.
And now, after nearly a year of development, Briar is finally available for a full public release.
Briar is an encrypted peer-to-peer…
View On WordPress
0 notes
dillibabukadati-blog · 8 years ago
Text
(unleashed) How CCTV's and other IoT Devices are Turning into BOTNETs |Dos,DDos | Dilli Babu Kadati
(unleashed) How CCTV’s and other IoT Devices are Turning into BOTNETs |Dos,DDos | Dilli Babu Kadati
Tumblr media
Hi everyone, First of all I’m thankful to you guys for getting me to cross 1 lack views milestone
“How CCTVs and other IoT devices are turning into BOT.?”
This is the question many times I’ve searched in Internet but could never find the answer (No one disclosed)  for it then I decided to do research on it. Before going to topic we just know what is a BOT.?
What is a BOT ?
A system which sends…
View On WordPress
0 notes
dillibabukadati-blog · 8 years ago
Text
Israel Hacked Kaspersky, Caught Russian Spies Hacking American Spies, But...
Israel Hacked Kaspersky, Caught Russian Spies Hacking American Spies, But…
Tumblr media
According to a story published today by the New York Times, Israeli government hackers hacked into Kaspersky’s network in 2015 and caught Russian government hackers red-handed hacking US government hackers with the help of Kaspersky.
In other words — Russia spying on America, Israel spying on Russia and America spying on everyone.
What the F^#% is going around?
It is like one is blaming…
View On WordPress
0 notes
dillibabukadati-blog · 8 years ago
Video
Python for Ethical hacking | Dilli Babu kadati Hi everyone, Today i'm sharing a scripting language tutorials which is python. Why Python ? Python can able to run on any platform like Android,Windows,Mac and Linux/Unix.
0 notes
dillibabukadati-blog · 8 years ago
Text
The Top 10 Wifi Hacking Tools in Kali Linux | Dilli Babu Kadati
The Top 10 Wifi Hacking Tools in Kali Linux | Dilli Babu Kadati
Tumblr media
How to hack WiFi is second popular search after how to hack a Facebook. Most of the routers are not correctly configured and are susceptible to various kinds of attacks.
A lot of the router manufacturers and ISPs are still turning on WPS by default on their routers which makes the wireless security and penetration testing an even more important. Using the below Top 10 Wifi Hacking Tools you will…
View On WordPress
0 notes
dillibabukadati-blog · 8 years ago
Text
How To Use Google Dorks [Website Hacking] |Dilli babu kadati
How To Use Google Dorks [Website Hacking] |Dilli babu kadati
Google The most widely used search engine is improving itself every moment. Google indexes pages in order to make search better. Google Dorks Enable us to search with greater details and accuracy. Google Dorks lets you customize your search query to display a specific set of results. Suppose if you want to search within a site only that is you search for some specific thing in a specific site.…
View On WordPress
0 notes
dillibabukadati-blog · 8 years ago
Text
CEH v9 : Certified Ethical Hacker V9 PDFs & Tools Download
CEH v9 : Certified Ethical Hacker V9 PDFs & Tools Download
Download Certified Ethical Hacking ( CEHv9 ) PDF & Tools. This is a PDF & Tools collection of CEH | V9. Read to learn How to Hack and become good Hacker. Check Hacking section for more Tutorials and Ebook For more Ebook download. Download CEH V9 Ebook Modules From Below
CEHv9 Module 00.unlocked.pdf
CEHv9 Module 01 Introduction to Ethical Hacking.pdf
CEHv9 Module 02 Footprinting and…
View On WordPress
0 notes
dillibabukadati-blog · 8 years ago
Text
Japanese boy arrested for creating Ransomware
Japanese boy arrested for creating Ransomware
Tumblr media
A 14-year-old in Osaka has become the first person in Japan caught for allegedly creating Ransomware. The high school student, who was arrested the same day, is suspected of merging free encryption programs to build Ransomware, which makes computer files encrypted unless the victim paid a ransom.
Ransomware is a type of malicious software from cryptovirology that blocks access to the victim’s…
View On WordPress
0 notes
dillibabukadati-blog · 8 years ago
Photo
Tumblr media
Cyber researchers discover how any network router can covertly leak data Researchers at the Ben-Gurion University of the Negev (BGU) Cyber Security Research Center (CSRC) have demonstrated for the first time that it is possible to covertly siphon sensitive files, passwords or other critical data from any common router.
0 notes
dillibabukadati-blog · 8 years ago
Photo
Tumblr media
Attack by subtitles: Media player exploit grants hackers access to your system ​Better watch out where you download your subtitles from: It turns out attackers can infect subtitles with malicious code to exploit vulnerabilities in popular media players and take control of your device…
0 notes
dillibabukadati-blog · 8 years ago
Text
CIA-created spyware called Athena released by WikiLeaks, targets all major Windows versions
Tumblr media
As Microsoft recently pointed out, the stockpiling of cyber exploits by the intelligence community has been the subject of great concern for cyber security experts, putting the privacy and data of millions of users at risk. WikiLeaks, today, revealed another exploit used by the American intelligence agencies to target Windows systems.
Codenamed ‘Athena’, the spyware was apparently created by…
View On WordPress
0 notes
dillibabukadati-blog · 8 years ago
Text
World's largest single-memory computer unveiled to revolutionise Big Data with limitless RAM
World’s largest single-memory computer unveiled to revolutionise Big Data with limitless RAM
Tumblr media Tumblr media Tumblr media
Hewlett Packard Enterprise has developed the world’s largest single-memory computer in order to ensure that machine learning and supercomputers have the memory they need for the Big Data revolutionHPE
Hewlett Packard Enterprise (HPE) has developed the world’s largest single-memory computer, in order to provide the memory that will be needed for supercomputers, machine learning and the ongoing Big…
View On WordPress
0 notes
dillibabukadati-blog · 8 years ago
Video
youtube
(via https://www.youtube.com/watch?v=nxtvb84p7zU)
0 notes
dillibabukadati-blog · 8 years ago
Video
youtube
(via https://www.youtube.com/watch?v=BeS14QQkWjM)
0 notes
dillibabukadati-blog · 8 years ago
Text
Protect Against WannaCry: Microsoft Issues Patch for Unsupported Windows (XP, Vista, 8,...)
Protect Against WannaCry: Microsoft Issues Patch for Unsupported Windows (XP, Vista, 8,…)
Tumblr media
Note: Dear Readers, If any of you have been infected with WannaCry ransomware, please send us details and screenshots of the delivery vector, i.e., how you received the malware, probably the screenshot of spam emails or you can forward those emails to us at [email protected]  Thanks.
In the wake of the largest ransomware attack in the history that had already infected over 114,000…
View On WordPress
0 notes
dillibabukadati-blog · 8 years ago
Text
YOUTUBE VIDEO DOWNLOADER SCRIPT
HELLO READERS, TODAY I AM BACK WITH ANOTHER NEW POST. MANY OF YOU WANTS TO DOWNLOAD YOUTUBE VIDEO AND SHARE AMONG YOUR FRIENDS BUT YOU CAN’T ABLE TO DO THAT. I ADDED YOUTUBE SCRIPT, FROM THE HELP OF SCRIPT YOU CAN DOWNLOAD YOUTUBE VIDEO AND YOU CAN SHARE TO YOUR FRIENDS.
NOTE – FOLLOWING TRICK IS FOR EDUCATIONAL PURPOSE ONLY
STEPS :-
1. Paste the download link.
2. Click on download button.
3.…
View On WordPress
0 notes
dillibabukadati-blog · 8 years ago
Text
Hackers exploit stolen US spy agency tool to launch global cyberattack
Security software maker Avast said they had observed 57,000 infections in 99 countries with Russia, Ukraine and Taiwan the top targets.
Tumblr media
      (Photo: Representational Image)
A global cyberattack leveraging hacking tools widely believed by researchers to have been developed by the US National Security Agency hit international shipper FedEx, disrupted Britain’s health system and infected computers…
View On WordPress
0 notes