cookie

نحن نستخدم ملفات تعريف الارتباط لتحسين تجربة التصفح الخاصة بك. بالنقر على "قبول الكل"، أنت توافق على استخدام ملفات تعريف الارتباط.

avatar

🇲🇾Nusantara🇮🇩

🇵🇸”We know too well that our freedom is incomplete without the freedom of the Palestinians.”🇵🇸Resistance Is Futile

إظهار المزيد
مشاركات الإعلانات
3 032
المشتركون
+1324 ساعات
+857 أيام
+29030 أيام

جاري تحميل البيانات...

معدل نمو المشترك

جاري تحميل البيانات...

thenationaltrust.gov.in.zip11.56 MB
🥷🏻Leak Database By Nusantara🥷🏻 ⛔️Indian Government Website Has Been Hacked! ✅️The National Trust is a statutory body of the Ministry of Social Justice and Empowerment, Government of India, set up under the “National Trust for the Welfare of Persons with Autism, Cerebral Palsy, Mental Retardation and Multiple Disabilities” Act (Act 44 of 1999). ✅️A small data from the website includes pdf files, but there is much more in save!! 🌐https://thenationaltrust.gov.in/ ⚡️Crack By The D3athsec & Nusantara 🔥 Greetz:- All Muslim Hackers 🇵🇸 We know too well that our freedom is incomplete without the freedom of the Palestinians.Stop supporting zionist israel . 🔗 https://t.me/nusantaraMYID
إظهار الكل...
2👍 1
Repost from RED EAGLE CREW
If you want to join our team please read first, We are still looking for new members to join our team... https://t.me/RedEagleCrew/2466 #RedEagleCrew #GlobalHackers
إظهار الكل...
RED EAGLE CREW

Hallo Everyone !!! We Are From Red Eagle Crew, We Are Looking For New Members To Join Our Team. Please Read First👇🏻 Joining a hacker group can vary greatly depending on the group's focus, culture, and ethics. While I do not encourage or condone illegal activities, here are some general guidelines that one might consider if interested in joining a group focused on ethical hacking or cybersecurity: 1. Understand Ethical Hacking: Ensure you have a clear understanding of what ethical hacking involves. This includes awareness of laws and regulations around cybersecurity, data protection, and responsible disclosure. 2. Demonstrate Skills: Many hacker groups will look for individuals with certain skills. This often includes knowledge of programming languages (like Python, JavaScript, C/C++), networking, web development, and familiarity with various operating systems (Linux, Windows, etc.). 3. Build a Portfolio: Having a portfolio can help demonstrate your skills. This can include contributions to open-source projects, personal projects, or participation in hackathons and Capture The Flag (CTF) competitions. 4. Stay Updated: Cybersecurity is a rapidly evolving field. Stay informed about the latest trends, vulnerabilities, and tools by participating in forums, attending conferences, and following relevant publications. 5. Follow Legal and Ethical Guidelines: It's crucial to adhere to laws and ethical standards. Never engage in illegal activities or promote malicious intentions within any group. 6. Seek Like-Minded Individuals: Look for groups with similar ethics and goals. Whether it’s about learning, sharing knowledge, or collaborating on ethical security research, find a group that reflects your interests. 7. Engagement and Communication: Actively participate in discussions and contribute to projects. Being engaged and communicative shows that you're committed and willing to collaborate. 8. Respect Privacy and Security: Respect the privacy of others and ensure that security practices are followed within the group. This includes not disclosing sensitive information without permission. 9. Be Open to Learning: Recognize that the field of hacking and cybersecurity is vast. Be willing to learn from others and accept constructive criticism. 10. Networking: Engage with the broader security community through online forums, social media, and local meetups. Networking can help you find opportunities and connections within the field. If you’re looking to join a hacker group specifically focused on ethical hacking, always prioritize integrity and responsibility in all your activities. If your interests lean toward malicious activities, remember that the consequences can be severe and illegal. If You Have Read Completely You Can Message Me Personally @PuteraIzdarX #RedEagleCrew

Photo unavailableShow in Telegram
TIME ▶️0️⃣2️⃣:0⃣0️⃣pm (SG) DATE  🗓 :18-Sep-2024 TARGET ❓: https://www.iitmandi.ac.in/ IP ❓: 204.197.248.190 ISP 🛡:PrivateSystems Networks Ports ℹ️ : 21 | 26 | 53 | 80 | 110 | 143 | 443 | ⚠️ 𝐎𝐮𝐫 𝐌𝐞𝐬𝐬𝐚𝐠𝐞 ⚠️
Stop Insulting Muslims. Stop Beating Muslims. Stop Killing Muslims #OpIndian #ForHumanity #ForJustice
-> Our Royal Comrades 👑
#RipperSec #StucxTeam     #4-Exploitation #SylhetGang #NetGhostSec #CyberFattah #HacktivistSulawesi #T3GASec #SilentCyberForce #EtherSec #CyberTeamIndonesia #CGPLLNET #NoName057(16) #DXPLOIT #EagleCyberCrew #AlAhad #Z-BL4CK-H4T #WebSec #AhadunAhad #1722Team #KhalifahCyberCrew #VulcanSec #SedihCrew #SKILLNET #LaskarPembebasanPalestina #Zenimous #RADNET64 #GarudaFromCyber #HolyLeague #JatimRedStormXploit #MorrocanCyberBlackArmy #RussianCyberArmyTeam #SilentEnemyCrew #KhilafahHackers #AnonymousBD #TengkorakCyberCrew #HackerCouncil #GarudaErrorSystem #PokerFace #RedEagleCrew #UndefinedHacker #GarnesiaTeam #MoroccanDragons #CyberTeam2009 #NasA1788
FOllow For More Updates 💡 : @RipperSec | @RipperSecIO | @RipperSecGroup | @PyRoxyForum
إظهار الكل...
🔥 1👏 1
Moroccan Cyber Force hacked an Israeli website and it is out of service! اخترق القوة السيبرانية المغربية موقع إسرائيلي وهو خارج الخدمة!
إظهار الكل...
🔥 9👍 2
Repost from RED EAGLE CREW
Photo unavailableShow in Telegram
Hallo Everyone !!! We Are From Red Eagle Crew, We Are Looking For New Members To Join Our Team. Please Read First👇🏻 Joining a hacker group can vary greatly depending on the group's focus, culture, and ethics. While I do not encourage or condone illegal activities, here are some general guidelines that one might consider if interested in joining a group focused on ethical hacking or cybersecurity: 1. Understand Ethical Hacking: Ensure you have a clear understanding of what ethical hacking involves. This includes awareness of laws and regulations around cybersecurity, data protection, and responsible disclosure. 2. Demonstrate Skills: Many hacker groups will look for individuals with certain skills. This often includes knowledge of programming languages (like Python, JavaScript, C/C++), networking, web development, and familiarity with various operating systems (Linux, Windows, etc.). 3. Build a Portfolio: Having a portfolio can help demonstrate your skills. This can include contributions to open-source projects, personal projects, or participation in hackathons and Capture The Flag (CTF) competitions. 4. Stay Updated: Cybersecurity is a rapidly evolving field. Stay informed about the latest trends, vulnerabilities, and tools by participating in forums, attending conferences, and following relevant publications. 5. Follow Legal and Ethical Guidelines: It's crucial to adhere to laws and ethical standards. Never engage in illegal activities or promote malicious intentions within any group. 6. Seek Like-Minded Individuals: Look for groups with similar ethics and goals. Whether it’s about learning, sharing knowledge, or collaborating on ethical security research, find a group that reflects your interests. 7. Engagement and Communication: Actively participate in discussions and contribute to projects. Being engaged and communicative shows that you're committed and willing to collaborate. 8. Respect Privacy and Security: Respect the privacy of others and ensure that security practices are followed within the group. This includes not disclosing sensitive information without permission. 9. Be Open to Learning: Recognize that the field of hacking and cybersecurity is vast. Be willing to learn from others and accept constructive criticism. 10. Networking: Engage with the broader security community through online forums, social media, and local meetups. Networking can help you find opportunities and connections within the field. If you’re looking to join a hacker group specifically focused on ethical hacking, always prioritize integrity and responsibility in all your activities. If your interests lean toward malicious activities, remember that the consequences can be severe and illegal. If You Have Read Completely You Can Message Me Personally @PuteraIzdarX #RedEagleCrew
إظهار الكل...
👍 3 1🔥 1
Repost from Websec
Photo unavailableShow in Telegram
We are pleased to inform you that our team has successfully suspended 𝐭𝐡𝐞 𝐟𝐨𝐥𝐥𝐨𝐰𝐢𝐧𝐠 𝐩𝐡𝐨𝐧𝐨𝐠𝐫𝐚𝐩𝐡𝐲 𝐰𝐞𝐛𝐬𝐢𝐭𝐞 TARGET : https://linkdebhai.in This website have been taken down because such content creates a harmful impact on children and the overall online environment. Our mission is to protect young minds and ensure a safer digital space for everyone. Thank you for your support as we continue to work towards a better online world. #ActionAgainstPornography GREETZ #BONDOWOSOBLACKHAT #Ahadunahad #Dxpliots #Cyberfattah #Madad #Ghostofgaza #Khilfah_Hackers #Rippersec # Alixsec #Z_BL4CK_HAT #Holyleague #7_Union # Noname057
إظهار الكل...
👏 9🫡 2👍 1 1🥰 1
Repost from RED EAGLE CREW
If you want to use the BLACK OPERATIONS tag, you can, no problem But Don't Attack the Islamic State Regards, Co Manager - Putera #BlackOperations #AllMuslimHackers
إظهار الكل...
🔥 6
Repost from N/a
WEBSITE ISRAEL DOWN BY DXPLOIT! Site: https://accessible.org.il/ Mirror: https://check-host.net/check-http?host=https://accessible.org.il/ "We See , and We Care!" Our group: https://t.me/cyberstine2 https://t.me/joinarmyofimammahdi https://t.me/DXPLOIT66 https://t.me/tengkorakcybercrewz Greetz ⚡ #khilafah hacker #ahadun ahad #empiresec #TengkorakCyberCrew #allalliance
إظهار الكل...
🥰 5
Repost from RED EAGLE CREW
peilingdb.txt0.62 KB
اختر خطة مختلفة

تسمح خطتك الحالية بتحليلات لما لا يزيد عن 5 قنوات. للحصول على المزيد، يُرجى اختيار خطة مختلفة.