- 43
- 47 221
GREENET
Uganda
เข้าร่วมเมื่อ 15 เม.ย. 2016
Everything about #IT #hacking #cybersecurity #programming #linux_tutorial #windows #redteam #blueteam #SOCanalyst #reverseengineering #webdevelopment
Bypass Windows Defender With Hooka
#gr33n37 #kalilinux #windows #hackingcommunity #bypass
Hooka
github.com/D3Ext/Hooka
.................. Socials ...................
twitter: x.com/gr33N37
Gitbook: greenet.gitbook.io
Blog: gr33n37.blogspot.com/
medium: gr33n37.medium.com/
Disclaimer: This video is intended for educational purposes only. All penetration testing shown here is done in a controlled environment (Virtual Box) and should not be attempted on live systems without proper authorization.
Hooka
github.com/D3Ext/Hooka
.................. Socials ...................
twitter: x.com/gr33N37
Gitbook: greenet.gitbook.io
Blog: gr33n37.blogspot.com/
medium: gr33n37.medium.com/
Disclaimer: This video is intended for educational purposes only. All penetration testing shown here is done in a controlled environment (Virtual Box) and should not be attempted on live systems without proper authorization.
มุมมอง: 599
วีดีโอ
How to bypass Mark of The Web (MOTW)
มุมมอง 83วันที่ผ่านมา
#gr33n37 #kalilinux #hackingcommunity #MOTW #windows #windowsdefender Disclaimer: This video is intended for educational purposes only. All penetration testing shown here is done in a controlled environment (Virtual Box) and should not be attempted on live systems without proper authorization. .................. Socials ................... twitter: x.com/gr33N37 Gitbook: greenet.gitbook.io Blog...
How to manage your Virtual Box VMs from the Command Line
มุมมอง 18414 วันที่ผ่านมา
#gr33n37 #kalilinux #virtualbox #commandline #cmd #VM #virtualization I hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms .................. Socials ................... twitter: x.com/gr33N37 Gitbook: greenet.gitbook.io Blog: gr...
How to use wfuzz in bug bounting for Beginners
มุมมอง 6021 วันที่ผ่านมา
#gr33n37 #bugbounty #wfuzz #fuzz #kalilinux #webapp #ethicalhacking Disclaimer: This video is intended for educational purposes only. All penetration testing shown here is done in a controlled environment and should not be attempted on live systems without proper authorization. .................. Socials ................... twitter: x.com/gr33N37 Gitbook: greenet.gitbook.io Blog: gr33n37.blogsp...
How to Enumerate subdomains and directories with gobuster for beginners
มุมมอง 58หลายเดือนก่อน
#gr33n37 #greenet #gobuster #webapp #enumeration #kalilinux #hackingcommunity #bugbounty Disclaimer: This video is intended for educational purposes only. All penetration testing shown here is done in a controlled environment and should not be attempted on live systems without proper authorization. .................. Socials ................... twitter: x.com/gr33N37 Gitbook: greenet.gitbook.io...
How to exploit eternal blue(ms17-010) with metasploit in just 10 minutes
มุมมอง 65หลายเดือนก่อน
#gr33n37 #ethicalhacking #kalilinux #metasploitframework #eternalblue Disclaimer: This video is intended for educational purposes only. All penetration testing shown here is done in a controlled environment and should not be attempted on live systems without proper authorization. .................. Socials ................... twitter: x.com/gr33N37 Gitbook: greenet.gitbook.io Blog: gr33n37.blog...
How to find sub domains of any target during bug bounty(SUB-DOMAIN ENUMERATION)
มุมมอง 67หลายเดือนก่อน
#gr33n37 #ethicalhacking #kalilinux #bugbounty #enumeration #enumeration Disclaimer: This video is intended for educational purposes only. All penetration testing shown here is done in a controlled environment and should not be attempted on live systems without proper authorization. .................. Socials ................... twitter: x.com/gr33N37 Gitbook: greenet.gitbook.io Blog: gr33n37.b...
Live Bug Bounting, Finding SQL Injection(CVE-2024-52412 )
มุมมอง 842 หลายเดือนก่อน
#gr33n37 #kalilinux #bugbounty #CVE-2024-52412 #sqlinjection #greenet Disclaimer: This video is intended for educational purposes only. All penetration testing shown here is done in a controlled environment and should not be attempted on live systems without proper authorization. software: github.com/coffinxp/loxs .................. Socials ................... twitter: x.com/gr33N37 Gitbook: gr...
How to configure BurpSuite to Firefox in Kali Linux
มุมมอง 882 หลายเดือนก่อน
#gr33n37 #burpsuite #webapp I hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms ................. Socials ................... twitter: x.com/gr33N37 Gitbook: greenet.gitbook.io Blog: gr33n37.blogspot.com/ medium: gr33n37.medium....
How to install and run AI (ChatGPT) in Kali linux terminal
มุมมอง 4892 หลายเดือนก่อน
#gr33n37 #chatgpt #cybersecurity #kalilinux #hacking #tgpt I hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms TGPT: github.com/aandrew-me/tgpt/
How to use ChatGpt for penetration testing
มุมมอง 802 หลายเดือนก่อน
#gr33n37 #chatgpt #hackergpt #greenet #hacking #Ai Disclaimer : All demonstrations in this video are conducted on authorized systems with explicit permission. No support for illegal activities. Ethical hacking means responsible vulnerability discovery. Misusing techniques for unauthorized or malicious purposes is strictly discouraged. Exercise sound judgment and respect others' security and pri...
how to hunt for malwares in memory with volatility. (memory analysis)
มุมมอง 593 หลายเดือนก่อน
#gr33n37 #windows #volatility #memory-analysis In this video am demonstrating to you how to hunt for malwares in memory with volatility . the labs used are for BLUE TEAM LABS and they are free labs Blue team labs blueteamlabs.online/ Cheatsheet blog.onfvp.com/post/volatility-cheatsheet/ .................. Socials ................... t witter: x.com/gr33N37 Gitbook: greenet.gitbook.io Blog: gr33...
How HACKERS and SYS-ADMIN dump data from databases
มุมมอง 1433 หลายเดือนก่อน
#gr33n37 #database #hacking #kalilinux #mysql #kalilinuxtools In this video am showing showing you how to backup your data in mysql sql, it also talk about simple ways you can keep your database safe from bad actors. ................ Socials ................... twitter: x.com/gr33N37 Gitbook: greenet.gitbook.io Blog: gr33n37.blogspot.com/ medium: gr33n37.medium.com/ Disclaimer: This video is fo...
Simplest way to hunt for webshell in a linux server
มุมมอง 2214 หลายเดือนก่อน
#gr33n37 #linuxhacking #webshell #php #hacking #cybersecurity In this video am showing you how you can hunt webshells simply on your linux server with find. ............content.......... 0:00 introduction 1:22 hunting with find 4:09 conclusion .................. Socials ................... witter: x.com/gr33N37 Gitbook: greenet.gitbook.io Blog: gr33n37.blogspot.com/ I hope you enjoyed the video...
how to fix the initramfs error in kali linux
มุมมอง 8414 หลายเดือนก่อน
#gr33n37 #linux #kalilinux #hacking ................. Socials ................... twitter: x.com/gr33N37 Gitbook: greenet.gitbook.io Blog: gr33n37.blogspot.com/ I hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms
How to run SQL with bash script in linux
มุมมอง 1574 หลายเดือนก่อน
How to run SQL with bash script in linux
How to perform phishing analysis for SOC analyst and threat hunters (email analysis)
มุมมอง 1164 หลายเดือนก่อน
How to perform phishing analysis for SOC analyst and threat hunters (email analysis)
How to connect to tryhackme labs with openvpn(and in one command)
มุมมอง 2215 หลายเดือนก่อน
How to connect to tryhackme labs with openvpn(and in one command)
How to hack any widows PC with havoc C2. (+ privilege escalation)
มุมมอง 2.5K6 หลายเดือนก่อน
How to hack any widows PC with havoc C2. ( privilege escalation)
How to reset a forgotten linux password (trick works on all distros)
มุมมอง 2396 หลายเดือนก่อน
How to reset a forgotten linux password (trick works on all distros)
How to transfer data fast and secure between linux systems with SCP
มุมมอง 2137 หลายเดือนก่อน
How to transfer data fast and secure between linux systems with SCP
How to rest a forgotten Windows password (part 1)
มุมมอง 1747 หลายเดือนก่อน
How to rest a forgotten Windows password (part 1)
How to change your IP address every 5 seconds
มุมมอง 32K7 หลายเดือนก่อน
How to change your IP address every 5 seconds
How To Pivot Through a Network with Msfconsole (pivoting and port forwarding )
มุมมอง 6197 หลายเดือนก่อน
How To Pivot Through a Network with Msfconsole (pivoting and port forwarding )
How to set a different ip address to your machines in VB
มุมมอง 1607 หลายเดือนก่อน
How to set a different ip address to your machines in VB
how to hide data in music (pro hacking)
มุมมอง 1537 หลายเดือนก่อน
how to hide data in music (pro hacking)
How to give your kali linux a cool Hollywood theme
มุมมอง 1.1K8 หลายเดือนก่อน
How to give your kali linux a cool Hollywood theme
How to hide data inside a picture(steganography)
มุมมอง 9968 หลายเดือนก่อน
How to hide data inside a picture(steganography)
Understand file compression with tar. (In just 10 mins)
มุมมอง 309 หลายเดือนก่อน
Understand file compression with tar. (In just 10 mins)
it maybe bypass win 10 but not 11
it's detected already by win 11. nothing is undetectable anymore unless you know what you're doing and custom it yourself. Internet now is just full of censored content and people copying and paste. all of the contents are basically useless
Great content but why did the connection get disconnected?
Not sure yet,but to have a stable connection after your get access migrate your connection to another program on that system that if this is closed, you are still connected
How do I do it for a website
You can look at the logs if their is any noise or hunt for any files that might have been uploaded to the server
You can also use other open source tools to help
Thanks bro! i was on the verge of using rustscan, thanks for the quick explanation
Grate to hear I was helpful
Eu regular 2
you can choose any server you want, thou some fail to connect
Thanks bro 🎉
not working
Good job ❤
works only once if i close the virtual box and restart try to restart the kali the same error appears!!!!
Ayo give this man a metal! 🥇 it worked!
Thanks 👍
u helped me quite much
this is uselss it got detcted long ago , try using modern methods not the ones heavily signatured by av, cant last even 1 second gets dleted.
What would use as a ‘replacment’
Yeah new error came
trying installing apktool the new version, because if you are using the new kali or updated linux the version in used in my video nolonger works
great tutorial thanks for sharing a question any script for persistence other than sharpersistem? automatic suite? maybe
how on earth are u gonna type the word and u dont have the passw to continue make it make sense
you just didn't understood the video, give me the minutes in video i explain to you
Thank you for your creativity👍👍👍👍
We are here in Brazil watching your videos with subtitles.. thank you for the quality
its a pleasure
You won't be able to do anything practical with this method. maybe go to what is my IP and keep refreshing.. that's about it. Also if you use Chrome, there are thousands of finger prints that point to you and how you literally type on your computer, all they need to do is triangulate those metrics on different end points you accessed.
Very clear guide. Looking forward to more good content on your channel. Followed and liked!
Thank you 👍
what do you do about the DNS Leaks, this just changes the ip dress?
The DNS leak website can help you to view your IP, with the change of IP by a software, I used that site to see each IP leak by refreshing the site
@@Gr33n37 thanks for the reply, but my question really was "how do you manage the DNS leak." Yes the ip address changes but there is still a trail from the DNS Leak. I have tested the using a VPN, and a encrypted dns service where the DNS isn't directly sent to the ISP, both ends are being encrypted via tunnel and encrypted DNS sent to separation server. With your method the ISP receives all the dns traffic and sees with there are going leaving a trail How do you fix this using your method?
@@Unk-1010 I understand you now, i have to retest the program and do more research to see if I can fix that, for now i won't lie you am not sure, but incase you find the trick first than me, am down to the contribution to the program, it's open source on GitHub, one can join with me and we make it better
@@Gr33n37 I would to encrypt the dns traffic and forward it to server(s) that handle encrypted dns traffic (TLS/HTTPS) say 1.1.1.1/9.9.9.9 just to cover loose ends am open to corrections if anyone has ideas
The only reason you would ever do this is to impress kids who don't know any better. Good luck keeping any connections alive.
Bollocks GitHub is owned by Ms beware
🐐
warum soll ich es als normaler anwender sowas tun, ein VPN bietet das "Multi-hop" dies ist eigentlich fast das gleiche.....es gibt nichts was dich, oder mich als Internetuser komplet annonym macht. Eine 3 Buchstaben Inst. hat immer die möglichkeit heruszufinden wer wir sind wenn sie natürlich interesse hat und will ob Tor oder VPN(welches sowieso ein Witz ist) nur sind wir normale Anwender nicht wichtig, sei vorsichtig, bleib still, click nur was von interesse für dich ist und niemanden juckt's wer du bit und wo du bist! Fertig
I get inspired whenever I see a Ugandan fellow doing pentesting bro that's great
Thanks for the work bro I become very happy whenever I see a Ugandan dude doing hacking
I came across this video wen I wanted to get working IP for UDP to connect for a free internet vpn
More shit to do..... Proxychains file, just change that
Ive known tools and techniques like this existed, but always depended on MS to always update its software, virus packages and firewalls. Having worked in the industry for years (but doing other things) and depending on others to protect our systems, i have to admit this information you present is scarry. I dont know if i can suceed, but im getting the feeling i should be studying this in my home lab to at least be aware of the dangers. Very enlightening to me at least.
true, i will creating a video on how to set your own local lab
Dear GREENET, I wanted to take a moment to express my heartfelt gratitude for the incredible content you consistently share on your TH-cam channel. Your videos are not only informative but also engaging and thoughtfully crafted. Your dedication and passion shine through in every video, and it’s clear that you put a lot of effort into ensuring that your audience receives high-quality and valuable information. Thank you for being a source of inspiration and for continuously enriching our knowledge. Your hard work and commitment do not go unnoticed, and I truly appreciate the positive impact you are making through your channel. Keep up the fantastic work! Warm regards,
i appreciate alot this heart warming message, thanks alot friend for your feedback.
Good one bro 🎉
Thanks 🔥
The issue with pentesting and using the IP script with foxy proxy is then you might have issues using both proxies for both the IP changer and Burpsuite together. even though they may be using different ports on the localhost.
That's really cool, but if you have that running, and you start downloading something, or you start an rdc, and then you change your up address, how does it still continue to know where to download the information to, or continue to send the remote desktop to? I've never understood that from movies, how do they start connected to something if their up address continues to change?
I left out -- by law(LA') -- any Aviation -- "KUIMAKA - sabotaged kidnapped - "By used their - own equipment -- but show -- "U.S. NAVY - etc!" 100% illegal - under any LA'!
/4''pn 2''UIx'' kntrol fld~tmp krop fold 4''IC vk(auch fs O)/ /L''pn < abv pas ~2''UI'x tmp < 4''pn x 4''IC vk + auch abv/ /M''4 x 2''UI'x'' kntrol fld > ~tmp vk thrm mrk int=cjz 4''pn/ /R''X'pn(4''tTx'' fld vk pchrol) < L''~tmp krop fold 4''IC + UI'x''/ /mch vd LN'' < fs txt fld @ 4''IC auch fz O < zfr 4''orb/
Changing my IP address every 3 to 5 Seconds isn't going to allow me to receive much information from the internet, considering the return data IP address will be invalid. What happens when you issue TCP request with only a half of a second remaining? This isn't security this is ridiculousness.
Simple, then just increase the time it has to change
@@Gr33n37No, not really. A proper implementation of this would be tracking IP addresses being used and connections that are open. Wait for those connections to close and then change the IP.
👍Cheers buddy!
Obfuscation is not absolute, The FBI owns half of all TOR relays and will deobfuscate you, MAC address tracking is a whole other bag of headaches...don't do this from your house, YOUR ISP KNOWS WHAT YOURE DOING,
I use anon surf + proxy chains + macchanger addr pretending to be burnt in + changed ipv4 and ipv6 + netmask and broadcast addr change
This works fine anywhere other than China and Russia as they have GFW (Greate Firewall) where the tor net's IPs are mostly blocked. Great video though Thanks
Plus Iran, we have a pretty nasty GFW here too😢
Ah you know that the US gov has backdoors in OS's? "Section 702 gives the US government the ability to monitor foreign nationals located outside the United States without a warrant; however, a “backdoor” permits warrantless surveillance to be extended to people in the US as well."
How does this apply to Linux at all, given community analysis? This could apply to Windows but, as far as I have learned, Linus Torvalds actively tries to protect the Linux project and, given the activity of Linux development, these backdoors are already much easier to catch anyway. Some of the biggest attacks have been neutered already before they have taken action or, using the xz backdoor as an example, fixed within a matter of moments after discovery. Not fully secure, but free of backdoors, more than likely.
You know it works when the guy sounds indian and goes the extra mile to blur out his firefox url suggestions
Not Indian. African or Jamaican
@@TheTubejunkyfacts
Bro you really don’t know what an Indian sounds like do you?
I reside in East Africa and he sounds Ugandan
Its hard to say but I think more African Jamaican...... Could also be using a voice changer
why did you add the proxy server? The one with Foxy Proxy? and by Using TOR you mean just having multiple IP addresses right?
i set the proxy in my foxy proxy to proxy every connection from the browser while tor in the background is doing its magic, you could proxy chains too
What would be cool is if you can randomize ip data packet wise, what would be cooler is if u can randomize permanent mac address
I could write you a script to do that for 25$
Constantly randomizing your Mac address only affects the equipment on your local network and confuses the s*** out of your switches. If you do it for long enough, your local switches will exceed the MAC address Table and you will not be able to communicate anymore. I have no idea what you mean by randomized IP packet data?
Lol you Hayden interesting webs?
Don't ever do that, it will fk your opsec fr, your isp will notice you doing this and will inspect the traffic possibly reporting you to the police or other authorities
Lies lmao
@@cathal357 bro how do u know all this ?
pro tipp: use this only on public networks. Or hacked networks around you. + regularly change from where you physically access that network (because of triangulation)
I'm not sure where you are, but there's nothing illegal about changing your ip address in the US. That alone isn't illegal.
Hey there you use username as GREEN & sunds good to me...
Well done but I've got to check your script. I mean, what ip pool are you polling from? Where did the pool come from? Someone else's list?
Tor is in action, feel free to read the script
Why the agony man? change the proxychains file.
Knowing other ways ain't bad thou