Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
134 views
11 pages
Googohack 1
googohack
Uploaded by
Portal Bué De Bagulho
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save googohack1 For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
0 ratings
0% found this document useful (0 votes)
134 views
11 pages
Googohack 1
googohack
Uploaded by
Portal Bué De Bagulho
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save googohack1 For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
Download
Save googohack1 For Later
You are on page 1
/ 11
Search
Fullscreen
24103723, 00:40 Google Hacking: varifique quai informagdes sobre voc8 au sua empresa aparecem nos resultados | WeLiveSecurly (nttps: fav. welivesecurity.com/br/)(https.//www.eset.com)? tm_source=welivesecurity.com&utm_medium=referralautm_campaign=autotaggingzutm_content=I Google Hacking: verifique quais informacgées sobre vocé ou sua empresa aparecem nos resultados Saiba quais so as formas de filtrar os resultados de busca no Google e os riscos de ter informacdes privadas expostas e acessiveis no buscador. © Google conta com 0 mecanismo de busca mais popular e um dos mais poderosos atuaimente. 0 mecanismo utiliza um “rob6" que indexa uma grande quantidade de contetido da web, permitindo que bilhdes de paginas da web estejam visiveis através dos resultados dessas buscas. No entanto, dentro do vasto mar de dados e contetidos piiblicos, algumas informagdes confidenciais ou sensiveis podem ser reveladas nos resultados de busca, e isso geralmente acontece sem o conhecimento do proprietario do site, ‘Amenos que os administradores dos sites bloqueiem determinados recursos para evitar sua exposicao (https://developers google.com/search/docs/advanced/robots/robots_meta_tag), ou que protejam secdes Privadas dos sites por meio de um sistema de autenticaco, o Google indexa todas as informacdes que esto presentes neles. Depois de um tempo, todas essas informaces ficam a disposigéo de qualquer pessoa que saiba buscé-las (e encontré-las ®). Comandos para filtrar as buscas no Google Ao fazer uma busca no Google, existem certas palavras-chave e operadores que funcionam como uma linguagem de consulta estruturada e tém um significado especial para este mecanismo de busca. Eles so, usados para filtrar os resultados. Isso significa que os usuarios podem contar com esses operadores para encontrar resultados relevantes para suas buscas com mais rapidez e preciso, embora, por outro lado, uma pessoa mal-intencionada possa usar essas mesmas técnicas para obter informacdes sensiveis, e isso & © que se conhece como * Google Dorks “ou” Google Hacking " operador exemple Propésito ode ser combinade com outros comes rented ussite cots sn ite wpe suse uml de ha sn it twee sewn mn aeypeene fexenet anc ri epi ‘in hitps:lwwn.wellvesecurity.combr!202 /07/30!google-hacking-veriique-quals-nformacoes-sobre-voce-ou-sua-empresa-aparecemm-nos-resuitados! 1/1124103723, 00:40 Google Hacking: verfique quaisinformagSes sobre vocé ou sua emorasa aparacem nos resultados | WeLiveSecurily Coulpsitutielesecuniy co MBHRERos iamwesckeomn Sscaporumapedioento | sim ; | su SOE seen cop eter. conen- green ctr | - | mw | ceuemsansa | os joe | mmworr femme | a Fm | saan - | meee | maesesosxo | msacummocrmaen —_| ws foe | emm—f entices | sn jo | a | ewarearenas | * | s | enmawo | aware | sn |. | emwasesm | asaaemcsermanceneis | » Tabela: Exemplos de alguns operadores de buscas comuns. Fonte: Wikipedia (https://pt wikipedia org/wiki/Google_Hacking) Google Hacking Database GHDB Google Hacking Database (GHD8) (https://www.exploit-db.com/google-hacking-database) é um projeto open-source que compila uma imensa colecao de dorks conhecidos, Este projeto & a eminéncia no que diz respeito a este assunto, e é atualizado e mantido pelo grupo Offensive Security (https://www.offensive-security.com/community-projects/) (os mesmos criadores do Kali Linux, Backtrack e Exploit-DB). Google Hacking Database 20200819 nurefagin mor hron Tetmoages! 2OZLO613_mite-Poperee trot WoxkCanse™ Machina Moda~Mchine Name" com (https: wane. welivesecurity.com/wp-content/uploads/2021/07/google-hacking- ips) Imagem 1. Google Hacking Database, Esses dorks, por sua vez, sao classificados em diferentes categorias: hitps:lwwn.wellvesecurity.comibr/202'/07/30/google-hacking-veriique-qu -nformacoes-sobre-voce-otr-sus-empresa-aparecemnos-resutados! 2/1124103723, 00:40 Google Hacking: verfique quaisinformagSes sobre vocé au sua emorasa aparacem nos resultados | WeLiveSecurily reg Olear (rips tov welvesecurty cf RFRA a ~_—_utm_source=welivesecurity-comutm_medium=referralgutm_campalgn=autotagging&utm content=! Files Containing Usemames Sensitive Directories Web Server Detection Vulnerable Files Vulnerable Servers Error Messages Files Containing Juicy nto (https://www.welivesecurity.com/wp-content/uploads/2021/07/google-hacking- 2ipe) Imagem 2. Categorias de classificagao usadas pelo Google Hacking Database, A seguir esto alguns exemplos de dorks retirados do projeto GHDB e alguns resultados relevantes: Exemplo 1: intitle:"webcamxP 5° Com este dork, & possivel encontrar webcams modelo "WebcamXP 5° que esto transmitindo ao vivo € que Nao possuem nenhum tipo de restri¢ao de acesso por IP (whitelist) ou que nao requerem autenticagao. ht ~ Traducir esta pagina WebcamXP 5 welbcartXP 6, webcams and ip cameraa Server for windows, Home view SmariphoneGalleryAdministration. Not logged in. Source 1, Source 4, Source S ait +> Traductr esta pagina WebcamXP 5 wobcamX? 6, webcams and ip camaras server for windows. HomaMult iow ‘SmsriphoneGaleyAdminstraon. Not logged in. Source 1. Source 2. Source 3 itt soul Traducir asta pagina webcamxP 5 vwabcamXP 5. wabcams and ip cameras sever for windows: HomeMull view ‘SmartphonealoryAdminkstraion, Notoggod In. 160x120, 320240, 640x480 ito ~ Traducir esta pagina webcamXP 5 webcaniX? 6. webcams and ip camaras server for windows. Hometfll view ‘SmartphoneGalaryAdmbnstation. Nat logged in. JavaScipt, Motion JPEG [Firefox] (https: www. wellvesecurity.com/wp-cantent/uploads/2021/07/google-hacking- 3,8) Imagem 3. Resultados da busca no Google. hitps:lwwnzwellvesecurity.conr/2021107/30!googl-hacking-veriique-qual informacoes-sobre-voce-ou-sua-empresa-aparecem-nos-resultados! 3/1124103723, 00:40 (https: s/w welivesecurity Exemplo Google Hacking: verifique quaisinformagSes sobre vocé ou sua emorasa aparacem nos resultados | WeLiveSecurily testy (https://wuwewelivesecurty.com/wp-content/uploads/2021/07/google-hacking- 4ipe) Imagem 4. Exemplo de uma camera transmitindo ao vivo, intext:"index of inurl:ftp Com o seguinte dork, é possivel encontrar servidores FTP abertos, que podem estar expondo informacées sensiveis e que nao requerem nenhum tipo de autenticacao. hitps:lwwnzwellvesecurity.conr/2021107/30!google-hacking-veriique-qual itp 4 + Trader ota pagina Index of tp Index of ip}, Namo Last modod Size Desciion.[PARENTOIR] Parent Dat, “~IDIR, Epson, 20186-20 1000,~ DIR, FEN! 2017-01-41 17:13, tp pelea argentina © Index of ip! Index of fplanarganina 1C0] Name: Lastmocifed ‘Se Description [PARENTOR) Parant Dc, [DIR], vidi, 2027.02.26 1523. - [DIR anleros itp, 2p» Windows © Index of ip/Windows Index of pWindous.]CO, Name - Last modified Size Descripson [PARENT Parent Disco, ~ (DIR, Tamar eonaol de una PC! 2020-10-26 1316, hapthvrn eum tp > Index of tp ~ Index ofp. Name Last modied Sirs Deserpin Parent Dretoy - Noms SC, 2012- (8-1507 38, SGANVGTocNYVIGENTE), 201810072152, (https: www. welivesecurity.com/wp-content/uploads/2021/07/google-hacking- Sipe) Imagem 5. Resultados da busca no Google. informacoes-sobre-voce-ou-sua-empresa-aparecem-nos-tesultados! 4/1124103723, 00:40 Google Hacking: verifique quaisinformagSes sobre vocé ou sua emprasa aparacem nos resultados | WeLiveSecurily Tades ef /ftp (epson welvesecuty comb Xttoxomweset.com? sm apg welvesecurity amare eer Ryan areRBig-autotageingtutm content=t ArmaSecreta pdf 2019-11-28 07:21 228K Audioteca Servic 2019-11-2807:34 Buena-Idea.péf 2019-11-28 07-34 22M Catalogo-SQI pdf 2019-11-28 07:34 3.1M 2019-11-28 07-35 634K 2019-11-28 07:35 3.7M 2019-11-28 07:35 3.7M Conexiones.pdf 2019-11-28 07.36 1.7M (https //wwnwwvelivesecurity.com/wp-content/uploads/2021 07/gaogle-hacking- 6ipe) Imagem 6, Exemplo de um dos resultados Exemplo 3: “Index of" inur:phpmyadmin © phpMyAdmin é uma ferramenta do stack do LAMP (Linux, Apache, PHP/Perl/Python, MySQL). Este software & usado para gerenciar um banco de dados MySQL ou MariaDB. Os painéis de login do phpMyAdmin nao deve estar acessiveis publicamente e 0 acesso deve ser restrito por meio de uma lista branea: wp shorn » Tadurceata pina Index of phpmyadmin Inde of phpmyacmin ICO] Nome Last mised. Sizo Ossetian [OI Pant Beeson, [DDT CREDITS, 18F3b.2012 137.227 [TXT], Changelog tp fae ets pipe Trac ot gine Index of phpmyadmin - Index ot eromyacn. HCO), Name-Last moctiag Sea Description (OR Parent Drecony [TAT Change.og 08-0e+2012 1723, 2 Xx] rps og photly Trai est pagha Index of phpMyAdmin Indes of phphtyAdmin, Parent Dstiny CREDITS. Chargatog Documentation html Dacumentatin ta INSTALL LICENSE README README ps Infos papa Traducir ext pigs Index of phpmyadmin Index ot romyacin. NCO), Name Last moctiag Sa Descrpton (IR Parent Drecony [TAT Changetog 68-0ct2012 1721, 29 {Px (hetps://wwnwwvelivesecurity.com/wp-content/uploads/2021 07/google-hacking- 7ip8) Imagem 7. Resultados da busca no Google. hitps:lwwn.wellvesecurity.comibr/202'/07/30/google-hacking-veriique-qu -nformacoes-sobre-voce-otr-sus-empresa-aparecemnos-resutados! 5/1124103723, 00:40 Google Hacking: verfique quaisinformagSes sobre vocé au sua emorasa aparacem nos resultados | WeLiveSecurily txempto 4 ourpd DRTAMPSGRRESAY URIBE RAE ASE WERDEN: AND “password” | "pwd" | ‘pw" tm_source=welivesecurity.com&utm_medium=referralautm_campalgn=autotaggingzutm_content=I Esta busca permite buscar arquivos txt com as palavras “username”, "password’, “pwd” ou "pw" em sites que usam 0 popular gerenciador de contetido WordPress, hpi > Access ~ Trad asta pina http! /wp-login. php username : usemame password DismayedG55233 detals 3s EDSYYAUONUZHOLWONYGSLZOXtre2sAh np + 2020/02) web + Taducesta pina 1 university website) univers web np: sername Password Techn 2 (Enaleh wetske) it vip... = Traduek esta pésina The website Is hosted here; httpsipanel ... LOGIN Wordpress Login ‘wp-log pp Usemamn. Adin Password: edmin@O87# And atached ae the changes my cent would bis: + Teer ate pagina what is the username and password for http://www \wpogin deals usemame: ain pw. T2osrSV7 Fi lain deals host wusemame six pul E885 (https: www. welivesecurity.com/wp-content/uploads/2021/07/google-hacking- Bip) Imagem 8, Resultados da busca no Google, website) /up-admin/ username: password: Techgesa# By (English website) http:// ‘uup-admin/ username: Pw !tBGPDb9UOn&eEXXN 3 North University Login url:http:// wp-admin/ Login url:http:// + in/wp-admin/ username: password:RedsB*1*2"cd 4.KVK http:// upload. com/ username: Password: “&v*rXg2SORLcmfO*s6TzeA] (https:l/wwrmwelivesecurity.com/wp- hitps:lwwn.wellvesecurity.comibr!202'/07/30/google-hacking-veriique-qu -nformacoes-sobre-voce-otr-sus-empresa-aparecem-nos-resutados! 6/1124103723, 00:40 Google Hacking: verfique quaisinformagSes sobre vocé ou sua emorasa aparacem nos resultados | WeLiveSecurily centent/uploads/2021/07/google-hacking-9-b,pg) Imagem 9. exemplo de um dos resultados, (https://awmewelivesecurty.comfbri)(https:fwavweset.com/? tm_source=wellvesecurity.com&utm_medium=referralautm_campalgn=autotaggingzutm_content=I Exemplo intitle:index of "dump.sal” Essa busca expde arquivos de backup ou despejos de banco de dados que podem conter informacaes sensiveis que podem ser acessadas por qualquer pessoa, sem a necessidade de autenticagao, pe tu + dumpe * Tabet sta pigina Index of dumps! - Ine of ual Nama Last meses Sze Description. up PavntDectary 15Apr-2021 0499. nko 2021-0410-03.£3-48 dump cg 1-46-2021 0253 Papen mp + Tredue este pine Index of idump 16.08, 2018-08-46 0120, 1], damp, 20-01-91 7-3, G6OM hm. 2 2016.01.31 1109, 650M [} dump_3 5 2015.02.01 0540. 5030, hips Seathe + Tesuc esta pagine Index of /wp-contenticache/page_enhanced. Incex of p-comamicacafpage enhances Tenlaotump sq Name Lest ‘modted Sze. Descipion. Parent Decoy, index hap tun > dnp + Taduc-este pine Index of Jwp-contenticache/page_enhancediwww. Index a fp conericsehspage enhanced damp Name Last moc ‘Sze Oesaption Pare Decoy, index gap od (https: www. welivesecurity.com/wp-content/uploads/2021/07/google-hacking- ripe) Imagem 10, Resultados da busca no Google. Index of /dumps/ Name Parent Directory 2021-04-10--3-53-49-dump.sq] 2021-04-15--05-38-19-dump.sq] {}odume.sq] DODDe Proudly Served by LiteSpeed Web Server (https://wwrw.wetivesecutity.com/wp~ content/uploads/2071/07/google-hacking” ‘ipa hitps:lwwn.wellvesecurity.comibr/202'/07/30/google-hacking-veriique-quas-informacoes-sobre-voce-ou-sua-empresa-aparecem-nos-resuitados! 7/1124103723, 00:40 Google Hacking: varifique qua informagdes sobre voc8 au sua empresa aparecem nos resultados | WeLiveSecurly ‘imagem 11. Exemplo de um dos resultados. (nttps:favvw.welivesecurity.com/br/)(https.//www.eset.com)? tm _source=welivesecurity.com&utm_medium=referralautm_campalgn=autotaggingzutm_content=I Depois de destacar alguns exemplos e casos de uso, podemos ver que as possibilidades sao muito amplas. Se vocé tem interesse em saber mais sobre esse assunto, confira os links externos no fim deste post. Por tiltimo, vale a pena refletir sobre essa ferramenta e as opcdes que ela oferece. € importante configurar a privacidade das contas e servicos expostos na Internet corretamente, a fim de evitar a exposicio de informagdes indevidas que podem ser usadas contra nés por pessoas mal-intencionadas. Links externos: Refinar pesquisas na Web (https://support google com/websearch/answer/2466433?hl=pt-BR) (Google) Pratique e aprenda os conceitos do Google Dorking (https://tryhackme.com/room/googledorking) (TryHackme) Google Hacking Database (https://www.exploit-db.com/google-hacking-database) (GHDB, Offensive Security) Google Darks: Analysis, Creation & new Defenses (https://www scribd.com/document/317987372/ Google-Dorks-Analysis-Creation-and-new- Defenses) (por Flavio Toffalini, Maurizio Abba, Damiano Carra & Davide Balzarotti) Dork - Google Hacking Too! (https://github.com/m3n0sd0n4ld/uDork/blob/master/README.md) (por David Utén) Nicolas Raggi (https://www.welivesecurity.com/br/author/nico-raggil) 30Jul2021- 04:19PM Cadastre-se para receber por e-mail todas as atualizacées sobre novos artigos que publicamos em nossa secdo referente d Crise na Ucrania (https://www.welivesecurity.com/br/category/crise- na-ucrania-centro-de-recursos-de-seguranca-digital/). Submit Newsletter hitpsslwwnwelivesecurity.combr/202 1/07/30/google-hacking-veriique-quals-informacoes-sobre-voce-ou-sua-empresa-aparecem-nos-resuitados! 8/1124103723, 00:40 Google Hacking: verfique quaisinformagSes sobre vocé au sua emorasa aparacem nos resultados | WeLiveSecurily I ‘Submit (Ta eT eSOCUTTY COMNTETNREEGST wen SCLC? tm _source=welivesecurity.com&utm_medium=referralautm_campalgn=autotagging&utm_content=I Artigos semelhantes (nttps:wowve welivesecurity.combr/2023/03/22/5- ‘mecanismos-de-busca-de-cispositivas- qual-e-a-melhor-opcaa!) internet/) (https: www. wellvesecurity.com/br/2023/03/20/tor-ou-vpn- servicos-conectadas- ‘Tor ou VPN: qual é melhor opgio? (eps:/favwel vesecuriy-com/b/2023/08/20/t0r-ou-ypn-qual~ e-a-melhor-opcaal) Smecanismos de busca de dspositivoseservcos conectados 8 Intemet (https wr. welvesecurty.cornfor/2023/03/225 mecanismas-ce-busca-de-disposhtvos-e-servicos-conectados-a- internet) hitps:lwwnzwellvesecuriy.con/br/2021107/30!googl-hacking-verique-qual informacoes-sobre-voce-ou-sua-empresa-aparecem-nos-resultados/ 9/1124103723, 00:40 Google Hacking: verfique quaisinformagSes sobre vocé ou sua emorasa aparacem nos resultados | WeLiveSecurily Discuss: (https: s/w welivesecurty.comfbri)(https:fwavaceset.com/? What do PSiriRikgr welveseute.comsutm,meumarteralzutm campaigneautotaggingsutm_contenta 4£eee?f¢ SS | sin the discussion. O Share 1 Newest oldest (Ga Donieon Filho ae Nem precisa de ferementas para hackesr, ‘Show © Reply + shar» Dracke wuomos aa Achel o Santo Graal de Estudos Hacking webs 99 Reply + share» Lea Myriam ae Tem curso disso, ¢ bem complet: htpsstwwnsudery com/cours © 0 Reply + share» Francisco Alexandre a Matheus 0 Reply + share» Subscribe Privacy Do Not Sll My Data welivesecurity» a (rtostwonselvesecurtycemttr) (hepsiwmnesetcorit tm. soure-welyezecueycomtut_medirreteralum_campalgn-autot Home (be) Pesquisa (hexps:fwwwwelivesecurity.com/brieategory/pesquisal) ‘Categorias (nttps//www.welivesecurity.com/br/eategorias!) RSS (hetps:/fwww.welivesecurty-com/br/configurar-rss-2) Sobrea ESET (nttps://wuru.welivesecurty.com/brisobre-a-eset/) Contato (http://www wetivesecurity com/be/contatol) ‘Mapa do site (netp://mww.welivesecurity.com/br/mapa-do- site”) informacoes-sobre-voce-ou-sua-empresa-aparecem-nos-resultad.. 10/11 hitps:lwwnzwellvesecuriy.con/br/2021107/30!googl-hacking-verique-qual24103723, 00:40 Google Hacking: varifique quai informagdes sobre voc8 au sua emorasa aparecem nos resultados | WeliveSecurly Especialstas(netps:/imwy-welivesecurity.com/briespecalistas/) Noticias (hetps://mww.welivesecurity.com/br/news-widget- erator be) ESET (https://eset.com/? * (ipa armurenameivesecarty pm byein ane vivmareieeelaito_campaign-autotagging&utm,contentsferramentassutm.term=pt) Uutm_source=welivesecurty.comutm_medium=referralautm_campaign=autotaggingeutm_content= Politica de Privacidade (nets /wnwwawelivesecurity.com! Ipoltca-privacidadel) Informasio Legal (https www. weivesecuity.com/brlinformacao-lgal) ‘erenciar cookies hitps:lwwn.wellvesecuriy.combr!202/07/30!google-hacking-veriique-quals-nformacoes-sobre-voce-ou-sua-empresa-aparecem-nos-resutad.. 11/11
You might also like
.Ad Block Host
PDF
No ratings yet
.Ad Block Host
811 pages
Onboarding Tool Kit Jun
PDF
No ratings yet
Onboarding Tool Kit Jun
82 pages
Release Notes - Zebra Android Oreo 01-30-04.00-OG-U06-STD Release (GMS)
PDF
No ratings yet
Release Notes - Zebra Android Oreo 01-30-04.00-OG-U06-STD Release (GMS)
8 pages
Lets Be A Dork and Read Js Files
PDF
No ratings yet
Lets Be A Dork and Read Js Files
9 pages
Clase 3 - ADJUNTOS - Avances - Mario Calderón
PDF
No ratings yet
Clase 3 - ADJUNTOS - Avances - Mario Calderón
2,201 pages
Camera Hacks With Google.
PDF
No ratings yet
Camera Hacks With Google.
1 page
Sense of Security VoIP Security Testing Training (PDFDrive)
PDF
No ratings yet
Sense of Security VoIP Security Testing Training (PDFDrive)
160 pages
Untitled
PDF
No ratings yet
Untitled
116 pages
Motorola Moto g8 Power Lite Manual
PDF
No ratings yet
Motorola Moto g8 Power Lite Manual
198 pages
Mobile Computing Book
PDF
No ratings yet
Mobile Computing Book
736 pages
Hosts Ipv6
PDF
No ratings yet
Hosts Ipv6
148 pages
Glossary of Digital Marketing Terms PDF
PDF
No ratings yet
Glossary of Digital Marketing Terms PDF
43 pages
DrWeb Crash
PDF
No ratings yet
DrWeb Crash
112 pages
2011-PDF-Fact-Book Kroger
PDF
No ratings yet
2011-PDF-Fact-Book Kroger
60 pages
Linux Commands
PDF
No ratings yet
Linux Commands
42 pages
WA State Court of Appeals 12/6/2022 Brief of Plaintiff Chandra Hampson V Seattle School District No. 1
PDF
No ratings yet
WA State Court of Appeals 12/6/2022 Brief of Plaintiff Chandra Hampson V Seattle School District No. 1
39 pages
NIST: Assessing Threats To Mobile Devices & Infrastructure
PDF
100% (1)
NIST: Assessing Threats To Mobile Devices & Infrastructure
50 pages
Knox
PDF
No ratings yet
Knox
31 pages
Cyber Crime-Types-Reporting Mechanisms - 3-9-2022
PDF
No ratings yet
Cyber Crime-Types-Reporting Mechanisms - 3-9-2022
14 pages
Connect Facebook Net Signals Config 1548069268553425 V 2!9!89&r Stable
PDF
No ratings yet
Connect Facebook Net Signals Config 1548069268553425 V 2!9!89&r Stable
43 pages
Forensic Analysis of Browsers: - Shrey Dhungana - Syed Ali Qasim
PDF
100% (1)
Forensic Analysis of Browsers: - Shrey Dhungana - Syed Ali Qasim
33 pages
Handbook End-Users': Cyber Security
PDF
No ratings yet
Handbook End-Users': Cyber Security
17 pages
Class Xii Pb-I Syllabus (2022-23)
PDF
No ratings yet
Class Xii Pb-I Syllabus (2022-23)
4 pages
Unit-5 - Computer Networks-Part 1
PDF
No ratings yet
Unit-5 - Computer Networks-Part 1
12 pages
Cracking More Password Hashes With Patterns
PDF
No ratings yet
Cracking More Password Hashes With Patterns
28 pages
Summary of The Article: Cybersecurity 101: Protect Your Privacy From Hackers, Spies, and The Government
PDF
No ratings yet
Summary of The Article: Cybersecurity 101: Protect Your Privacy From Hackers, Spies, and The Government
7 pages
Vuln Web
PDF
No ratings yet
Vuln Web
3 pages
E-Commerce MCQ
PDF
No ratings yet
E-Commerce MCQ
10 pages
AirPrime - GSMA Device Connection Efficiency Requirements - Rev1.0
PDF
No ratings yet
AirPrime - GSMA Device Connection Efficiency Requirements - Rev1.0
4 pages
Best Ad Blockers For Chrome in 2023 - Post
PDF
No ratings yet
Best Ad Blockers For Chrome in 2023 - Post
6 pages
Fuel Bill June 2
PDF
No ratings yet
Fuel Bill June 2
1 page
GgggMore GHDB
PDF
No ratings yet
GgggMore GHDB
5 pages
Affiliate Lite API V2.0
PDF
No ratings yet
Affiliate Lite API V2.0
12 pages
Apn Lagi
PDF
No ratings yet
Apn Lagi
15 pages
Temp Mail Data
PDF
No ratings yet
Temp Mail Data
3 pages
Globe Payload and Promos
PDF
No ratings yet
Globe Payload and Promos
5 pages
How To Configure DD-WRT
PDF
No ratings yet
How To Configure DD-WRT
18 pages
AIO Unpack Utility (ROMS) (Windows) - Android Development and Hacking
PDF
No ratings yet
AIO Unpack Utility (ROMS) (Windows) - Android Development and Hacking
10 pages
Retail Mode Installation Guide Common
PDF
No ratings yet
Retail Mode Installation Guide Common
18 pages
ISD Cheat Sheet
PDF
No ratings yet
ISD Cheat Sheet
2 pages
Samsung
PDF
No ratings yet
Samsung
21 pages
Samsung PDF
PDF
No ratings yet
Samsung PDF
7 pages
Hackpage
PDF
No ratings yet
Hackpage
5 pages
Voucher NH2003069007378
PDF
No ratings yet
Voucher NH2003069007378
3 pages
Google101 8 10 2006
PDF
No ratings yet
Google101 8 10 2006
63 pages
Sqlmap Cheatsheet
PDF
No ratings yet
Sqlmap Cheatsheet
2 pages
Apps by Gov
PDF
No ratings yet
Apps by Gov
1 page
Google Hacking Mini
PDF
No ratings yet
Google Hacking Mini
8 pages
CITIBANK - Presentation
PDF
No ratings yet
CITIBANK - Presentation
14 pages
WWW BIT Syllabus
PDF
No ratings yet
WWW BIT Syllabus
8 pages
Bluetooth Tools
PDF
100% (1)
Bluetooth Tools
3 pages
Anonymous Intelligence Agency
PDF
No ratings yet
Anonymous Intelligence Agency
3 pages
Website Directore Information: Indian Language Site
PDF
No ratings yet
Website Directore Information: Indian Language Site
15 pages
Google Hacking #1
PDF
100% (1)
Google Hacking #1
31 pages
What Is Wi Fi Network
PDF
No ratings yet
What Is Wi Fi Network
6 pages
Useful Sites
PDF
No ratings yet
Useful Sites
6 pages
Computer Full Forms
PDF
No ratings yet
Computer Full Forms
20 pages
Google Dorks
PDF
No ratings yet
Google Dorks
6 pages
Secret Steps in Getting Free Internet On HTTP Injector - TECH FOE
PDF
No ratings yet
Secret Steps in Getting Free Internet On HTTP Injector - TECH FOE
10 pages
How To Get Free Internet On Any ISP in The WorldPart2 Techno-Hexes
PDF
No ratings yet
How To Get Free Internet On Any ISP in The WorldPart2 Techno-Hexes
22 pages