lunes, 31 de agosto de 2020

HACKING GMAIL FOR FREE CUSTOM DOMAIN EMAIL

hacking-gmail-for-free-custom-domain-email


HACKING GMAIL FOR FREE CUSTOM DOMAIN EMAIL

When it comes to email providers, there's no competitor to Google's awesome features. It is efficient which connects seamlessly with the rest of your Google products such as YouTube, Drive, has a major application called Gmail Inbox, and is overall an extremely powerful email service. However, to use it with a custom domain, you need to purchase Google Apps for either $5 or $10/month, which for casual users is a bit unnecessary. On top of that, you don't even get all of the features a personal account gets, e.g. Inbox. So, here's a free way to use your Gmail account with a custom domain. I am just going to show you hacking Gmail for free custom domain email.

SO, HOW HACKING GMAIL FOR FREE CUSTOM DOMAIN EMAIL

PASSWORD: EHT

STEPS:

  • First, register with Mailgun using your Gmail address. Use your Gmail only. Once you have clicked the confirm link, log in to the Mailgun website. Now you're in the dashboard, move on the right under "Custom Domains", click "Add Domain".
  • Follow the setup instructions and set DNS records with whoever manages your DNS. Once you've done this, click on the "Routes" link on the top to set up email forwarding.
  • Now move to the Route tab and click on Create New Route.
  • As you click the button, you will see a page like below. Just enter the information as entered in the following screenshot.
  • Just replace the quoted email with your desired email in the above-given screenshot.
  • Next, we'll setup SMTP configuration so we would be able to send emails from an actual server. Go to "Domains" tab, click on your domain name.
  • On this page, click "Manage your SMTP credentials" then "New SMTP Credential" on the next page.
  • Type in the desired SMTP credentials. And, go to Gmail settings and click "Add another email address you own". Once you open, enter the email address you wish to send from.
  • In the next step, set the SMTP settings as follows.
  • After clicking "Add Account" button, now you're done.
  • The final step, make sure to set it to default email in the Gmail settings > Accounts.
That's all. Now you got free Gmail custom domain with 10,000 emails per month. Hope it will work for you. If you find any issue, just comment below.


Note: Use Virtual Machine and scan on VirusTotal before downloading any program on Host Machine for your privacy.

Related word


domingo, 30 de agosto de 2020

OWASP-ZSC: A Shellcode/Obfuscate Customized Code Generating Tool


About OWASP-ZSC
   OWASP ZSC is open source software written in python which lets you generate customized shellcodes and convert scripts to an obfuscated script. This software can be run on Windows/Linux/OSX with Python 2 or 3.

   What is shellcode?: Shellcode is a small codes in Assembly language which could be used as the payload in software exploitation. Other usages are in malwares, bypassing antiviruses, obfuscated codes...

   You can read more about OWASP-ZSC in these link:
Why use OWASP-ZSC?
   Another good reason for obfuscating files or generating shellcode with OWASP-ZSC is that it can be used during your pen-testing. Malicious hackers use these techniques to bypass anti-virus and load malicious files in systems they have hacked using customized shellcode generators. Anti-virus work with signatures in order to identify harmful files. When using very well known encoders such as msfvenom, files generated by this program might be already flagged by Anti-virus programs.

   Our purpose is not to provide a way to bypass anti-virus with malicious intentions, instead, we want to provide pen-testers a way to challenge the security provided by Anti-virus programs and Intrusion Detection systems during a pen test.In this way, they can verify the security just as a black-hat will do.

   According to other shellcode generators same as Metasploit tools and etc, OWASP-ZSC  using new encodes and methods which antiviruses won't detect. OWASP-ZSC encoders are able to generate shell codes with random encodes and that allows you to generate thousands of new dynamic shellcodes with the same job in just a second, that means, you will not get the same code if you use random encodes with same commands, And that make OWASP-ZSC one of the best! During the Google Summer of Code we are working on to generate Windows Shellcode and new obfuscation methods. We are working on the next version that will allow you to generate OSX.

OWASP-ZSC Installation:
   You must install Metasploit and Python 2 or 3 first:
  • For Debian-based distro users: sudo apt install python2 python3 metasploit-framework
  • For Arch Linux based distro users: sudo pacman -S python2 python3 metasploit
  • For Windows users: Download Python and Metasploit here.
   And then, enter these command (If you're Windows user, don't enter sudo):
DISCLAIMER: THIS SOFTWARE WAS CREATED TO CHALLENGE ANTIVIRUS TECHNOLOGY, RESEARCH NEW ENCRYPTION METHODS, AND PROTECT SENSITIVE OPEN SOURCE FILES WHICH INCLUDE IMPORTANT DATA. CONTRIBUTORS AND OWASP FOUNDATION WILL NOT BE RESPONSIBLE FOR ANY ILLEGAL USAGE.

An example of OWASP-ZSC

Read more


What Is Cybercrime? What Are The Types Of Cybercrime? What Is Cyberlaw In India?

What is cyber crime?

Cybercrime is the use of computers & networks to perform illegal activities such as spreading viruses,online  bullying,performing unauthorized electronic fund transfers etc. Most cyber crimes are committed through the internet.
Some cyber crime also be carried out using mobile phones via Sms and online chatting applications.

TYPES OF CYBERCRIME

The following list presents the common types of cybercrimes-

1-Computer Fraud-Intential deception for personal gain via the use of computer system.

2-Privacy Violations-Exposing personal information such as email addresses,phone numbers,account details etc, on social media,websites,etc.

3-Identity theft-Stealing personal information from somebody and impersonating that person.

4-Sharing copyright files/information-This involves distributing copyright protected files such as eBooks and computer program etc.

5-Electronic funds transfer-This involves gaining an unauthorized access to bank computer networks and making illegal funds transferring.

6-Electronic money laundering-This involves the use of the computer to launder money.

7-Atm fraud-This involves intercepting ATM card details such as account numbers and PIN numbers.These details are then used to withdraw funds from the intercepted accounts.

8-Denial of service attack-This involves the use of computers in multiple locations to attack servers with a view of shutting them down.

9-Spam:sending unauthorized emails.
These emails usually contain advertisements.


CYBER LAW

Under The Information Technology Act,2000 
CHAPTER XI-OFFENCES-66. Hacking with computer system.

1-whoever with the Intent to cause or knowing that he is likely to cause Wrongfull Loss or Damage to the public or any person Destroys or Deletes or Alter any Information Residing in computer Resource or diminishes its value or utility or affects it injuriously by any means, commits hack.

2-whoever commits hacking shell be punished with imprisonment up to three years, or  with fine which may extend up to two lakh rupees,or with both.
Related news
  1. Hack Tools For Games
  2. Pentest Tools Port Scanner
  3. Pentest Tools Find Subdomains
  4. Hacks And Tools
  5. Pentest Tools Review
  6. Nsa Hacker Tools
  7. Hack Tools Github
  8. Hack Tools
  9. Hacking Tools Hardware
  10. Hacking Tools For Windows 7
  11. Hacking Tools Kit
  12. Tools For Hacker
  13. Hacker Tools Linux
  14. Hack Tools For Ubuntu
  15. Pentest Tools Website
  16. Hack Tools For Games
  17. Hacker Tools Windows
  18. Hack Tool Apk No Root
  19. Pentest Tools
  20. What Are Hacking Tools
  21. Hacking Tools Kit
  22. Nsa Hack Tools
  23. Hack Tools For Windows
  24. Beginner Hacker Tools
  25. Hack Apps
  26. Hacker Tools Free Download
  27. Hacking Tools For Games
  28. Hackrf Tools
  29. Hacker Security Tools
  30. Hacking App
  31. Pentest Tools For Windows
  32. Pentest Tools Url Fuzzer
  33. Hacking Apps
  34. Hacker Tools 2019
  35. Tools Used For Hacking
  36. Wifi Hacker Tools For Windows
  37. What Are Hacking Tools
  38. Hacker Tools Github
  39. Beginner Hacker Tools
  40. Github Hacking Tools
  41. Pentest Tools Free
  42. Hacking Tools Software
  43. Usb Pentest Tools
  44. Hacking Apps
  45. Hacker Tools Windows
  46. Tools For Hacker
  47. Pentest Tools Tcp Port Scanner
  48. Pentest Tools For Android
  49. Install Pentest Tools Ubuntu
  50. Pentest Tools Url Fuzzer
  51. Tools For Hacker
  52. Pentest Tools Online
  53. Blackhat Hacker Tools
  54. Hacker Tools Linux
  55. Pentest Tools For Ubuntu
  56. Best Pentesting Tools 2018
  57. Install Pentest Tools Ubuntu
  58. Hack Tools Online
  59. Pentest Tools Open Source
  60. Hacker Tools Apk Download
  61. Free Pentest Tools For Windows
  62. Hacker Tools For Pc
  63. Pentest Tools List
  64. Nsa Hack Tools Download
  65. Pentest Box Tools Download
  66. Nsa Hack Tools Download
  67. Hackers Toolbox
  68. Hack Apps
  69. New Hack Tools
  70. Hacker Tools Github
  71. Hack Tools For Mac
  72. Pentest Tools Subdomain
  73. Hacker Tools Linux
  74. Hacks And Tools
  75. Hacking Tools For Mac
  76. Pentest Tools Nmap
  77. Pentest Tools Find Subdomains
  78. Hacker Tools Online
  79. Pentest Tools Find Subdomains
  80. Hacking Tools For Beginners
  81. Hacker Tools Linux
  82. Pentest Tools Subdomain
  83. Hacking Tools For Pc
  84. Hacking Tools Free Download
  85. Pentest Tools Windows
  86. Pentest Tools Framework
  87. Best Hacking Tools 2020

How To Start | How To Become An Ethical Hacker

Are you tired of reading endless news stories about ethical hacking and not really knowing what that means? Let's change that!
This Post is for the people that:

  • Have No Experience With Cybersecurity (Ethical Hacking)
  • Have Limited Experience.
  • Those That Just Can't Get A Break


OK, let's dive into the post and suggest some ways that you can get ahead in Cybersecurity.
I receive many messages on how to become a hacker. "I'm a beginner in hacking, how should I start?" or "I want to be able to hack my friend's Facebook account" are some of the more frequent queries. Hacking is a skill. And you must remember that if you want to learn hacking solely for the fun of hacking into your friend's Facebook account or email, things will not work out for you. You should decide to learn hacking because of your fascination for technology and your desire to be an expert in computer systems. Its time to change the color of your hat 😀

 I've had my good share of Hats. Black, white or sometimes a blackish shade of grey. The darker it gets, the more fun you have.

If you have no experience don't worry. We ALL had to start somewhere, and we ALL needed help to get where we are today. No one is an island and no one is born with all the necessary skills. Period.OK, so you have zero experience and limited skills…my advice in this instance is that you teach yourself some absolute fundamentals.
Let's get this party started.
  •  What is hacking?
Hacking is identifying weakness and vulnerabilities of some system and gaining access with it.
Hacker gets unauthorized access by targeting system while ethical hacker have an official permission in a lawful and legitimate manner to assess the security posture of a target system(s)

 There's some types of hackers, a bit of "terminology".
White hat — ethical hacker.
Black hat — classical hacker, get unauthorized access.
Grey hat — person who gets unauthorized access but reveals the weaknesses to the company.
Script kiddie — person with no technical skills just used pre-made tools.
Hacktivist — person who hacks for some idea and leaves some messages. For example strike against copyright.
  •  Skills required to become ethical hacker.
  1. Curosity anf exploration
  2. Operating System
  3. Fundamentals of Networking
*Note this sites





Related links


  1. Pentest Tools Find Subdomains
  2. Pentest Tools Windows
  3. Hacker Security Tools
  4. Ethical Hacker Tools
  5. Hacker Search Tools
  6. Pentest Box Tools Download
  7. Hacking Tools Download
  8. Hacking Apps
  9. Hacking Tools For Mac
  10. Hacking Tools For Windows
  11. Pentest Tools Find Subdomains
  12. Install Pentest Tools Ubuntu
  13. Hack Tools Mac
  14. Hacker Tools For Mac
  15. What Is Hacking Tools
  16. Hacking Tools For Beginners
  17. Hacker Tools Apk
  18. Growth Hacker Tools
  19. Usb Pentest Tools
  20. Hacking Tools Kit
  21. Pentest Tools Free
  22. Hack Apps
  23. Pentest Tools Subdomain
  24. Hacker Tools 2019
  25. Pentest Tools Port Scanner
  26. Pentest Tools Open Source
  27. Hacker Tools Mac
  28. Hacker Tools Software
  29. Hack Tool Apk No Root
  30. Hak5 Tools
  31. How To Make Hacking Tools
  32. Hacking Tools Usb
  33. Hack Tools Mac
  34. Hacker Tools 2020
  35. Nsa Hack Tools
  36. Hacker Tools Linux
  37. How To Hack
  38. Hack Tools Mac
  39. Pentest Tools Free
  40. What Is Hacking Tools
  41. Pentest Box Tools Download
  42. Hack Tools Pc
  43. Hacking Tools For Windows 7
  44. Hacking App
  45. Hak5 Tools
  46. Best Pentesting Tools 2018
  47. Hacker Tools Apk
  48. Pentest Tools Linux
  49. Hack Tool Apk No Root
  50. Hacking Tools Online
  51. Hacker Tools Free
  52. Best Hacking Tools 2020
  53. Hacker Hardware Tools
  54. Hack And Tools
  55. Hacking Tools For Beginners
  56. Pentest Tools Download
  57. Hacking Tools For Games
  58. Pentest Automation Tools
  59. Hacker Security Tools
  60. Hacker Tools For Pc
  61. Pentest Tools Kali Linux
  62. Pentest Tools Website
  63. Android Hack Tools Github
  64. Usb Pentest Tools
  65. Hacking Tools Free Download
  66. What Is Hacking Tools
  67. Hacker Tools Apk
  68. Hacking App
  69. Hacking Tools Online
  70. Tools Used For Hacking
  71. Hacking Tools For Games
  72. Hack Tools Download
  73. Hacking Tools Free Download
  74. Hacking Tools And Software
  75. Hacker Tools For Pc
  76. Hack Tools For Ubuntu
  77. Hackrf Tools
  78. Hacker Tools For Ios
  79. Hack Tools For Mac
  80. Hacking Tools For Beginners
  81. Pentest Reporting Tools
  82. Pentest Tools Bluekeep
  83. Hacking Tools Windows 10
  84. Hack Apps
  85. Pentest Tools Online
  86. Pentest Automation Tools
  87. Hacking Tools For Windows
  88. Pentest Automation Tools
  89. Hacking Tools Windows 10
  90. Hacker Hardware Tools
  91. Hacker Tools Github
  92. Pentest Tools Apk
  93. Hacker Tools Linux
  94. Kik Hack Tools
  95. Pentest Tools
  96. Hacking Tools For Windows 7
  97. Hacking Tools Software
  98. Hack Tools Online
  99. Hacking Tools Github
  100. Pentest Tools Free
  101. Underground Hacker Sites
  102. Hacking Tools Kit
  103. Hacker Tools
  104. Hack Tools Online
  105. Pentest Tools Website
  106. Pentest Tools Framework
  107. Hacking Tools
  108. Termux Hacking Tools 2019
  109. Hack Tools Online
  110. Hack App
  111. Pentest Recon Tools
  112. Install Pentest Tools Ubuntu
  113. Hacker Tools 2020
  114. Hack Tools Download
  115. Hacking Tools Online
  116. Hacker Tools Software
  117. Hack Apps
  118. Usb Pentest Tools
  119. Hacker Tools Online
  120. Hack Rom Tools
  121. Game Hacking
  122. Growth Hacker Tools
  123. Tools For Hacker
  124. Hacker Tools Online
  125. Hack Tools Github
  126. Hack Tools For Mac
  127. Hacker
  128. Top Pentest Tools
  129. What Are Hacking Tools
  130. Game Hacking
  131. Hacker Security Tools
  132. How To Hack
  133. Nsa Hack Tools
  134. Black Hat Hacker Tools
  135. Hacker Tools Mac
  136. Hack Tools Pc
  137. Pentest Recon Tools
  138. Hacker Tools For Mac
  139. Hacker Tools 2020
  140. Hacker Tools Online
  141. Hack Tools Pc
  142. Hacker Tools Apk
  143. Hacker Tools For Mac
  144. Hackrf Tools
  145. Hack Apps
  146. Pentest Tools Find Subdomains
  147. Black Hat Hacker Tools
  148. Best Hacking Tools 2020
  149. Hacker Tools Windows
  150. Pentest Tools Nmap
  151. Hack Tools Github
  152. Tools 4 Hack
  153. Hacking Tools For Pc
  154. Hack Tools For Mac
  155. Hack Apps
  156. Hacking Tools Free Download
  157. Hack Tools For Mac