About

Learn more about me

Ethical Hacker

Learning FUD creation ,Working on Bots(with whatsapp WEB-API)

  • Birthday: 20 AUG 2007
  • Website: r3ap3er.github.io
  • Phone: +123 456 7890
  • City: India, Kerala
  • Age: 14
  • instagram: instagram.com/klsiy
  • Email: r3eap3er@protonmail.com
  • Freelance: Available

A bug is never just a mistake. It represents something bigger. An error of thinking that makes you who you are.

Interests

CyberSecurity

Technology

Coding

SecurityAwareness

Ethicalhacker

HackingTools

Networking

Bugbounty

CloudSecurity

Exploits

KaliLinux

Datasecurity

Your IP

IP (FOR SHOWING HOW VULNURABLE INTERNET IS)

Notes

Check My Notes

Penetration Testing

what is penetration testing ?

0101 - 0101

A penetration test, colloquially known as a pen test, pentest or ethical hacking, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system; this is not to be confused with a vulnerability assessment.

  • Penetration Testing: A Hands-on Introduction to Hacking
  • RTFM: Red Team Field Manual
  • Metasploit: The Penetration Tester's Guide

Networking

what is networking in computer ?

0101 - 0101

The foundations of networking: switches, routers, and wireless points

A computer network is a group of computers that use a set of common communication protocols over digital interconnections for the purpose of sharing resources located on or provided by the network nodes

what is cyber security ?

1010 - 1010

Protecting our sensitive data, personally identifiable information

Computer security, cybersecurity or information technology security is the protection of computer systems and networks from information disclosure, theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide.

Advanced Penetration Testing

Unique features of Advanced Penetration Testing ?

0101 - 0101

Essential skills needed for Advanced Penetration Testing

  • Going beyond tool suites to find vulnerabilities and exploits.
  • Understanding secure web communications.Ability to script or write a code.Effective report writing skills.
  • Securing web communication by generating secure domain certificates
  • Understanding web technologies and the need for secure web applications.

osint skills in cyber security ?

0101 - 0101

Top 5 OSINT Techniques Cybersecurity Professionals Must Know !

  • Use Google Dorks professionally
  • Using OSINT resources repositories
  • Know how to use Linux
  • Learn Programming Language
  • Become anonymous

Data

My Database

Wordlists

The list contains every wordlist, dictionary, and password database leak that I could find on the internet. !

Fb Breached Data-2021

533 million facebook user's phone numbers and personal data have been Breached. !

TrueCaller Breached Data-2019

Truecaller data of 4.75 crore Indian users have been put on sale on the dark web for around ₹75,000 in 2019 !

-----

At vero eos et accusamus et iusto odio dignissimos ducimus qui blanditiis

-----

Quis consequatur saepe eligendi voluptatem consequatur dolor consequuntur

-----

Modi nostrum vel laborum. Porro fugit error sit minus sapiente sit aspernatur

Tools

Penetration Testing Tools

  • All
  • 1
  • 2
  • 3

NMAP

1

METASPLOIT

2

AIRCRACK

3

BETTERCAP

4

SQLMAP

5

BURP SUITE

6

HYDRA

7

HASHCAT

8

WIRESHARK

9

Contact

Contact Me

My Address

A108 Max Street, India Kerala, KL 535022

Social Profiles

Email Me

Call Me

+123 456 7890

Loading
Your message has been sent. Thank you!
BIG thanks to >> Designed by GODMAX