LEGENDARY HACKZ

Logo of telegram channel legendary_hackz — LEGENDARY HACKZ L
Logo of telegram channel legendary_hackz — LEGENDARY HACKZ
Channel address: @legendary_hackz
Categories: Leaks
Language: English
Subscribers: 3.12K
Description from channel

💙 GET ALL PAID HACKING CONTENTS FOR FREE.💙
💖PAID EBOOKS!
💖BLACKHAT COURSES LEAKED!
💖DAILY PREMIUM BINS!
💖PAID TUTORIALS AND COURSES LEAKED!
💖DAILY PRIVATE HACKING TUTORIALS.

Ratings & Reviews

3.33

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

1

4 stars

1

3 stars

0

2 stars

0

1 stars

1


The latest Messages 3

8 Nov 2021
Get Free 3D models 2021 Trick

The term “3D modeling” refers to the process of creating a three-dimensional representation of an object using specialized software. This representation, called a 3D model, can convey an object's size, shape and texture. ... These replicas incorporate the points, lines and surfaces that make up the physical environment.#imk

3D template models for download, files in 3ds, max, c4d, maya, blend, obj, fbx with low poly, animated, rigged, game, and VR options. #imk

Regards=@CIDHUB
345 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯‌ ✺ , 12:24
Open / Comment
6 Nov 2021
C-E-H GUIDE 2021

A certified ethical hacker (CEH) is an information security professional. They are very useful to companies as they inspect their online network for vulnerabilities. A CEH can help protect your business from malicious hackers and data breaches.
@its_me_kali

Job You get After CEH
The CEH certification can be a stepping-stone to a wide range of top-tier positions that require CEH skills, including Information Security Analyst, Computer Forensics Analyst, Homeland Security Specialist, Cyber Security Analyst, Penetration Tester, Security Engineer, Security Auditor, Vulnerability Tester, .
@its_me_kali

Basic Hacking Guide
https://bit.ly/3wjK68q
@its_me_kali

CEH Pratice Questions
https://bit.ly/3o2yJ0P
@its_me_kali

Ethical Hacking and OSINT Master Class
https://bit.ly/3bMrJ2x
@its_me_kali

REGARDS:@CIDHUB
439 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯‌ ✺ , 12:46
Open / Comment
5 Nov 2021
EARN PAYTM MONEY WITH US

Just read the post it has all the details along with proofs.

Do share it with your friends.

Must allow the notifications from the site for future post's.

Trick valid for limited time.....!!!

Link :— https://indian-hacker-zone.blogspot.com/2021/11/ear-free-money.html
420 views мя. ηєωвιє 【★𝘽𝙂★】 Creator of @DeathStaker [ next Station :-- December ], 08:29
Open / Comment
4 Nov 2021
CIDHUB 2021 NOV CTF SOLUTION

Answers of https://t.me/IndianCyberIntelligence/32781

1=Which command is use Metasploit to get option details of exploit? >> show options

2=Which protocol should you use to filter all web traffic?
>> https

3=What is the primary difference between threat hunting and penetration testing?
>> threat hunting: Tells us that who is already in our enviornmentand deals with the present state. penetration testing: Tells us that how anyone can get into our enviornment and how different vulnerabilities may be exploited

4=Which programming language can be used to write Metasploit scripts for Metasploit 4.x Framework?
>> Ruby

5=Which command sets the SHELLCODE?
>> set PAYLOAD payloadname

6=What is the default command port for FTP?
>> Port 21

7=Which hash algorithm produces a 160-bit value?
>> SHA-1

8=What are the two types of intrusion detection systems?
>> NIDS & HIDS

9= Do Yourself

10= Use Virustotal.com

Regards=@CIDHUB
35 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯‌ ✺ , 12:32
Open / Comment
4 Nov 2021
Wishing you and your family a Happy diwali
60 viewsмσнιт 『𝐈ɴ𝐃 』, 06:53
Open / Comment
4 Nov 2021
CIDHUB 2021 CTF

Happy Diwali Guys
On the occasion of diwali join our community @CIDHUB and learn everything for free.

Most Secured Password is the password of zip file .

A. keepyourpasswordsecuretoyourself

B. pass123!!

C. P@$$w0rD

D. KeepY0urPasswordSafe!

Submit your answers at @its_me_kali inbox before 6pm.
83 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯‌ ✺ , 04:19
Open / Comment
3 Nov 2021
UDEMY PYTHON3 2021

Python is a high-level, interpreted, interactive and object-oriented scripting language. Python is designed to be highly readable. It uses English keywords#imk frequently where as other languages use punctuation, and it has fewer#imk syntactical constructions than other languages.

https://mega.nz/folder/zfJQyLrT#uvGAaSb7Bs5bggzXXWqosQ

Regards=@CIDHUB
127 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯‌ ✺ , 13:54
Open / Comment
26 Oct 2021
IMK BIBLE 2021 NOV4

Going offline till 3nov21 so providing you below course
for learning and preparing the CTF of @CIDHUB. I hope you all will learn and pass the test and will be the part of our community.

Topics

Ethical Hacking 2021

SDR HACKING

G_S_E_C

EXCEL ADVANCE TRICKS

Networking With Linux

Operating Systems

Course Link
https://bit.ly/3jDL62h

If you having doubts or questions in learning or need a proper guidance then check below article
https://bit.ly/3mhUDhc

Regards=@its_me_kali
23 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯‌ ✺ , 15:36
Open / Comment
26 Oct 2021
C²¹+
Peniel Ads Service



➛ Bgmi Config File
➛ Daily Bins, Cvv $ Css
➛ Premium Android Mod Apps
➛ Cinema Hub Blockbuster
➛ Premium hacking courses
•••••
➛ Positivity & Self-Growth
➛ Premium Paid Hackz
➛ Premium Accounts & Giveaway
➛ Comedy Show
•••••
➛ Android Modz
➛ Habesha Thoughts
➛ Rap & Beats
➛ All In One
•••••
➛ D' Fu''king Feeling
Trading Books & Courses
➛ Netflix Prime & Mods
➛ Mafia Mods
•••••
➛ English Stories & Audiobooks
➛ Netflix | Hotstar | Prime Mods
➛ Amazing & Exquisite Pics
➛ Psychology Of Money

ㅤㅤㅤ No Post Until 3 Hours
ㅤㅤㅤ Autodelete In 7 Hour's

ㅤㅤㅤㅤ Add Your Channel
83 viewsPeniel, 13:09
Open / Comment
25 Oct 2021
DEEPFAKE AI RECOGNITATION TECHNOLOGY

Deepfakes are synthetic media in which a person in an existing image or video is replaced with someone else's likeness. 

Tutorial
https://telegra.ph/DEEPFAKE-Guide-03-10

Info
https://github.com/iperov/DeepFaceLab

Regards= @KALINGRAAJWORLD
89 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯‌ ✺ , 12:46
Open / Comment
25 Oct 2021
Z SECURITY [TOOLZ SPOT] COURSE LEAKED

This course is based on Ethical Hacking from beginning, whoever is a beginner in this field or don't kniow from where to start can start from this course.

Link :- https://bit.ly/3nqYpUx
502 views мя. ηєωвιє 【★𝘽𝙂★】, 02:30
Open / Comment
24 Oct 2021
Satellite Communication Course
#First #on #Telegram

Posted By:@its_me_kali

Satellites communicate by using radio waves to send signals to the antennas on the Earth. The antennas then capture those signals and process the information coming from those signals.

Here are some of the jobs satellites do:

Television.

Telephones.

Navigation.

Business & finance.

Weather.

Climate & environmental monitoring.

Safety.

Land stewardship.

Military Uses

Internet

Many More.

Course
https://bit.ly/30VtacT

Sattelites Working
https://bit.ly/3prn1PT

Regards=@CIDHUB
196 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯‌ ✺ , 07:04
Open / Comment
23 Oct 2021
Test 2021 IMK PAID CLASS

Yesterday Test Answers By @Mr_Robleis


1.) What is the difference between IP address and Mac address?

> Difference between MAC and IP address is that MAC Address is used to ensure the physical address of the computer. It uniquely identifies the devices on a network. While IP addresses are used to uniquely identifies the connection of the network with that device takes part in a network.

2.) List out some of the common tools used by Ethical hackers?

> Nmap Hacking Tool
Burp Suite Hacking Tool
Netsparker
Acunetix
Metasploit
Aircrack-Ng
Ettercap
John The Ripper
Wireshark
Angry IP Scanner

3.)What is footprinting in ethical hacking? What is the techniques used for footprinting?

> It Refers to the process of collecting as much as information as possible about the target system to find ways to penetrate into the system. Techniques : DNS Queries, N/W Enumeration, Network Queries, Ping Sweeps, Port Scanning.

4.)Explain what is DOS (Denial of service) attack? What are the common forms of DOS attack?

> A denial-of-service (DoS) attack aims to obstruct a network or resource by flooding a target with artificial traffic, which restricts user access to the respective service being attacked. Types : Ddos, N/W Targeted Attacks, System Targeted, Teardrop.

5.) Explain what is SQL injection?

> SQL Injection attacks (or SQLi) alter SQL queries, injecting malicious code by exploiting application vulnerabilities.

6.) Explain what is Network Sniffing?

> Sniffing is a process of monitoring and capturing all data packets passing through given network. Sniffers are used by network/system administrator to monitor and troubleshoot network traffic. Attackers use sniffers to capture data packets containing sensitive information such as password, account information etc.

7.) Write Linux command to view text file?

> cat foo.txt or cat /etc/resolv.conf

8.)Explain what is Burp Suite, what are the tools it consist of?

> Burp Suite is an integrated platform for performing security testing of web applications. Tools : Target, proxy, repeater, scanner, Intruder, sequencer, decoder, comparer etc.

9.)You are working as an ethical hacker in a company you have to hide your company data, what the methods you will use explain in your own language.

> When a cyberattack occurs, ethical hackers are called in to be digital detectives. In a certain sense, they are like regular police detectives on TV. They have to search computer systems to find ways an intruder might have come in – a digital door or window left unlocked, perhaps.

10.) Find location and open ports of this ip address 49.33.178.116

> City : Mumbai
Region : Maharashtra (MH)
Postal code : 400070
Country : India (IN)
Continent : Asia (AS)
Coordinates : 19.0748 (lat) / 72.8856 (long)

Starting Nmap 7.40 ( https://nmap.org ) at 2021-10-22 16:14 UTC
Nmap scan report for 49.33.178.116
Host is up.
PORT STATE SERVICE
21/tcp filtered ftp
22/tcp filtered ssh
23/tcp filtered telnet
80/tcp filtered http
110/tcp filtered pop3
143/tcp filtered imap
443/tcp filtered https
3389/tcp filtered ms-wbt-server

Nmap done: 1 IP address (1 host up) scanned in 3.15 seconds

Regards>@CIDHUB**
234 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯‌ ✺ , 09:15
Open / Comment
22 Oct 2021
Test 2021 IMK PAID CLASS

Topic: Ethical Hacking Basics


1.) What is the difference between IP address and Mac address?

2.) List out some of the common tools used by Ethical hackers?

3.)What is footprinting in ethical hacking? What is the techniques used for footprinting?

4.)Explain what is DOS (Denial of service) attack? What are the common forms of DOS attack?

5.) Explain what is SQL injection?

6.) Explain what is Network Sniffing?

7.) Write Linux command to view text file?

8.)Explain what is Burp Suite, what are the tools it consist of?

9.)You are working as an ethical hacker in a company you have to hide your company data, what the methods you will use explain in your own language.

10.) Find location and open ports of this ip address 49.33.178.116

Try to practice, will be upload tomorrow!!

PRATICE COURSE
https://bit.ly/3jpI2qa

Ethical Hacking Class
https://bit.ly/30Os4Q3

Regards:@CIDHUB
66 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯‌ ✺ , 13:34
Open / Comment
21 Oct 2021
2021 Job Guide

Top Apps That Surely Help You In getting Future Job. For that first develop your skills from @CIDHUB then apply for a job either if you want to learn from basics and 24*7 professional guidance then check below ethical hacking article.

Apna India Job
https://bit.ly/3ngpb1P

Linkdin
https://bit.ly/3nh5hDY

GlassDoor
https://bit.ly/3aZ2ZDW

Shine Jobs
https://bit.ly/3DZll43

Indeed Jobs
https://bit.ly/3ndiVrQ

To build resume use below app:

Professional CV
https://bit.ly/3m3313G

CV Maker
https://bit.ly/2Z6kP55

Portfolio Making
https://bit.ly/3G8ovEj

Ethical Hacking
https://bit.ly/30Os4Q3

Regards=@CIDHUB
145 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯‌ ✺ , 10:11
Open / Comment
20 Oct 2021
Golang Course and Guide

Go is a statically typed, compiled programming language designed at Google by Robert Griesemer, Rob Pike, and Ken Thompson. Go is syntactically similar to C, but with memory safety, garbage collection, structural typing, and CSP-style concurrency. 

Characteristics of Golang

Open-Source. The foremost characteristic of Golang programming language is that it is open-source.

Static Typing.

Concurrency Support.

Powerful Standard Library and Tool Set.

Testing Capabilities.

Garbage Collection. ...

Ease of Use.

Cross-Platform Development Opportunities.

Download link
https://golang.org

Course

Basic
https://t.me/cybertorrenthub/178

Advance
https://mega.nz/folder/0IxkGDrb#HBWbVFE_UuPj7vQD6MinKw

Full Ethical Hacking
https://telegra.ph/ETHICAL-HACKING-AND-OSINT-PROFESSIONAL-COURSE-10-08

Regards=@CIDHUB
175 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯‌ ✺ , 15:54
Open / Comment
18 Oct 2021
ETHICAL HACKING 2021

Ethical hacking involves an authorized attempt to gain unauthorized access to a computer system, application, or data. Also known as “white hats,” ethical hackers are security experts that perform these assessments. The proactive work they do helps to improve an organization's security posture.

Modules of Ethical Hacking

Footprinting and Reconnaissance

Scanning

Enumeration

System Hacking

Malware Threats

Sniffing

Social Engineering

Denial of Service

Session Hijacking

Hacking Web Servers

Web Application Attacks

SQL Injection

Hacking Wireless Networks

Hacking Mobile Devices

Evading Firewall/IDS and Honey Bots

Cryptography

Cloud Computing

Course Link
https://mega.nz/folder/HldHkSJD#jYRQtC67Ibsg36J4yOdwVA

Pass=@its_me_kali

Note
If interested to learn open source intelligence or Doxing, then check below article.

https://telegra.ph/ETHICAL-HACKING-AND-OSINT-PROFESSIONAL-COURSE-10-08


Regards=@CIDHUB
343 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯‌ ✺ , 14:53
Open / Comment
17 Oct 2021
🇼‌🇭‌🇦‌🇹‌ 🇮‌🇸‌
🇸‌🇺‌🇧‌🇩‌🇴‌🇲‌🇦‌🇮‌🇳‌
🇪‌🇳‌🇺‌🇲‌🇪‌🇷‌🇦‌🇹‌🇮‌🇴‌🇳‌


𝙎𝙪𝙗𝙙𝙤𝙢𝙖𝙞𝙣 𝙚𝙣𝙪𝙢𝙚𝙧𝙖𝙩𝙞𝙤𝙣 𝙞𝙨 𝙖 𝙥𝙧𝙤𝙘𝙚𝙨𝙨 𝙤𝙛 𝙛𝙞𝙣𝙙𝙞𝙣𝙜 𝙨𝙪𝙗𝙙𝙤𝙢𝙖𝙞𝙣𝙨 𝙛𝙤𝙧 𝙤𝙣𝙚 𝙤𝙧 𝙢𝙤𝙧𝙚 𝙙𝙤𝙢𝙖𝙞𝙣𝙨. #imk

𝘼 𝙨𝙪𝙗𝙙𝙤𝙢𝙖𝙞𝙣 𝙞𝙨, 𝙖𝙨 𝙩𝙝𝙚 𝙣𝙖𝙢𝙚 𝙬𝙤𝙪𝙡𝙙 𝙨𝙪𝙜𝙜𝙚𝙨𝙩, 𝙖𝙣 𝙖𝙙𝙙𝙞𝙩𝙞𝙤𝙣𝙖𝙡 𝙨𝙚𝙘𝙩𝙞𝙤𝙣 𝙤𝙛 𝙮𝙤𝙪𝙧 𝙢𝙖𝙞𝙣 𝙙𝙤𝙢𝙖𝙞𝙣 𝙣𝙖𝙢𝙚. 𝙔𝙤𝙪 𝙘𝙧𝙚𝙖𝙩𝙚 𝙨𝙪𝙗𝙙𝙤𝙢𝙖𝙞𝙣𝙨 𝙩𝙤 𝙝𝙚𝙡𝙥 𝙤𝙧𝙜𝙖𝙣𝙞𝙯𝙚 𝙖𝙣𝙙 𝙣𝙖𝙫𝙞𝙜𝙖𝙩𝙚 𝙩𝙤 𝙙𝙞𝙛𝙛𝙚𝙧𝙚𝙣𝙩 𝙨𝙚𝙘𝙩𝙞𝙤𝙣𝙨 𝙤𝙛 𝙮𝙤𝙪𝙧 𝙢𝙖𝙞𝙣 𝙬𝙚𝙗𝙨𝙞𝙩𝙚. 𝙒𝙞𝙩𝙝𝙞𝙣 𝙮𝙤𝙪𝙧 𝙢𝙖𝙞𝙣 𝙙𝙤𝙢𝙖𝙞𝙣, 𝙮𝙤𝙪 𝙘𝙖𝙣 𝙝𝙖𝙫𝙚 𝙖𝙨 𝙢𝙖𝙣𝙮 𝙨𝙪𝙗𝙙𝙤𝙢𝙖𝙞𝙣𝙨 𝙖𝙨 𝙣𝙚𝙘𝙚𝙨𝙨𝙖𝙧𝙮 𝙩𝙤 𝙜𝙚𝙩 𝙩𝙤 𝙖𝙡𝙡 𝙤𝙛 𝙩𝙝𝙚 𝙙𝙞𝙛𝙛𝙚𝙧𝙚𝙣𝙩 𝙥𝙖𝙜𝙚𝙨 𝙤𝙛 𝙮𝙤𝙪𝙧 𝙬𝙚𝙗𝙨𝙞𝙩𝙚. #𝙞𝙢𝙠

Tool Link

altdns https://github.com/infosec-au/altdns
Amass https://github.com/OWASP/Amass
censys-subdomain-finder https://github.com/christophetd/censys-subdomain-
finder
dr_robot https://github.com/sandialabs/dr_robot
Fierce https://www.aldeid.com/wiki/Fierce
Gobuster https://github.com/OJ/gobuster
Knock https://github.com/guelfoweb/knock
Knock.py https://github.com/santiko/KnockPy/blob/master/kn
ock.py
Pentest Tools Find Subdomains https://pentest-tools.com/information-
gathering/find-subdomains-of-domain
Security Trails https://securitytrails.com
spyse_ Subdomain Finder https://spyse.com/tools/subdomain-finder
subbrute https://github.com/TheRook/subbrute
subfinder https://github.com/projectdiscovery/subfinder
Sublist3r https://github.com/aboul3la/Sublist3r
subscraper https://github.com/m8r0wn/subscraper
urlscan https://urlscan.io

Course
https://mega.nz/folder/p10jCCQL#UiDzJIjiL3G4iPsd-76hBw

Full Ethical Hacking
https://telegra.ph/ETHICAL-HACKING-AND-OSINT-PROFESSIONAL-COURSE-10-08

Regards=@its_me_kali
386 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯‌ ✺ , 14:22
Open / Comment
16 Oct 2021
ETHICAL HACKING WITH PRACTICALS

INFO

Cyber Mentor Ethical Hacking Course where he practically performs everything, so must complete this course.

Link :— https://bit.ly/3aKiwr2
365 views мя. ηєωвιє, 17:03
Open / Comment
15 Oct 2021
HOTSTAR VIP MOD APK

Link :- https://itsmenewbie.blogspot.com/2021/10/hotstar-mod.html

Don't share this in your channel.

If Not Working In Ur Device Then Stay Tuned In Our Channel we release New Mod Soon.

#updated
416 views мя. ηєωвιє, 13:32
Open / Comment