GREENET
GREENET
  • 43
  • 47 221
Bypass Windows Defender With Hooka
#gr33n37 #kalilinux #windows #hackingcommunity #bypass
Hooka
github.com/D3Ext/Hooka
.................. Socials ...................
twitter: x.com/gr33N37
Gitbook: greenet.gitbook.io
Blog: gr33n37.blogspot.com/
medium: gr33n37.medium.com/
Disclaimer: This video is intended for educational purposes only. All penetration testing shown here is done in a controlled environment (Virtual Box) and should not be attempted on live systems without proper authorization.
มุมมอง: 599

วีดีโอ

How to bypass Mark of The Web (MOTW)
มุมมอง 83วันที่ผ่านมา
#gr33n37 #kalilinux #hackingcommunity #MOTW #windows #windowsdefender Disclaimer: This video is intended for educational purposes only. All penetration testing shown here is done in a controlled environment (Virtual Box) and should not be attempted on live systems without proper authorization. .................. Socials ................... twitter: x.com/gr33N37 Gitbook: greenet.gitbook.io Blog...
How to manage your Virtual Box VMs from the Command Line
มุมมอง 18414 วันที่ผ่านมา
#gr33n37 #kalilinux #virtualbox #commandline #cmd #VM #virtualization I hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms .................. Socials ................... twitter: x.com/gr33N37 Gitbook: greenet.gitbook.io Blog: gr...
How to use wfuzz in bug bounting for Beginners
มุมมอง 6021 วันที่ผ่านมา
#gr33n37 #bugbounty #wfuzz #fuzz #kalilinux #webapp #ethicalhacking Disclaimer: This video is intended for educational purposes only. All penetration testing shown here is done in a controlled environment and should not be attempted on live systems without proper authorization. .................. Socials ................... twitter: x.com/gr33N37 Gitbook: greenet.gitbook.io Blog: gr33n37.blogsp...
How to Enumerate subdomains and directories with gobuster for beginners
มุมมอง 58หลายเดือนก่อน
#gr33n37 #greenet #gobuster #webapp #enumeration #kalilinux #hackingcommunity #bugbounty Disclaimer: This video is intended for educational purposes only. All penetration testing shown here is done in a controlled environment and should not be attempted on live systems without proper authorization. .................. Socials ................... twitter: x.com/gr33N37 Gitbook: greenet.gitbook.io...
How to exploit eternal blue(ms17-010) with metasploit in just 10 minutes
มุมมอง 65หลายเดือนก่อน
#gr33n37 #ethicalhacking #kalilinux #metasploitframework #eternalblue Disclaimer: This video is intended for educational purposes only. All penetration testing shown here is done in a controlled environment and should not be attempted on live systems without proper authorization. .................. Socials ................... twitter: x.com/gr33N37 Gitbook: greenet.gitbook.io Blog: gr33n37.blog...
How to find sub domains of any target during bug bounty(SUB-DOMAIN ENUMERATION)
มุมมอง 67หลายเดือนก่อน
#gr33n37 #ethicalhacking #kalilinux #bugbounty #enumeration #enumeration Disclaimer: This video is intended for educational purposes only. All penetration testing shown here is done in a controlled environment and should not be attempted on live systems without proper authorization. .................. Socials ................... twitter: x.com/gr33N37 Gitbook: greenet.gitbook.io Blog: gr33n37.b...
Live Bug Bounting, Finding SQL Injection(CVE-2024-52412 )
มุมมอง 842 หลายเดือนก่อน
#gr33n37 #kalilinux #bugbounty #CVE-2024-52412 #sqlinjection #greenet Disclaimer: This video is intended for educational purposes only. All penetration testing shown here is done in a controlled environment and should not be attempted on live systems without proper authorization. software: github.com/coffinxp/loxs .................. Socials ................... twitter: x.com/gr33N37 Gitbook: gr...
How to configure BurpSuite to Firefox in Kali Linux
มุมมอง 882 หลายเดือนก่อน
#gr33n37 #burpsuite #webapp I hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms ................. Socials ................... twitter: x.com/gr33N37 Gitbook: greenet.gitbook.io Blog: gr33n37.blogspot.com/ medium: gr33n37.medium....
How to install and run AI (ChatGPT) in Kali linux terminal
มุมมอง 4892 หลายเดือนก่อน
#gr33n37 #chatgpt #cybersecurity #kalilinux #hacking #tgpt I hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms TGPT: github.com/aandrew-me/tgpt/
How to use ChatGpt for penetration testing
มุมมอง 802 หลายเดือนก่อน
#gr33n37 #chatgpt #hackergpt #greenet #hacking #Ai Disclaimer : All demonstrations in this video are conducted on authorized systems with explicit permission. No support for illegal activities. Ethical hacking means responsible vulnerability discovery. Misusing techniques for unauthorized or malicious purposes is strictly discouraged. Exercise sound judgment and respect others' security and pri...
how to hunt for malwares in memory with volatility. (memory analysis)
มุมมอง 593 หลายเดือนก่อน
#gr33n37 #windows #volatility #memory-analysis In this video am demonstrating to you how to hunt for malwares in memory with volatility . the labs used are for BLUE TEAM LABS and they are free labs Blue team labs blueteamlabs.online/ Cheatsheet blog.onfvp.com/post/volatility-cheatsheet/ .................. Socials ................... t witter: x.com/gr33N37 Gitbook: greenet.gitbook.io Blog: gr33...
How HACKERS and SYS-ADMIN dump data from databases
มุมมอง 1433 หลายเดือนก่อน
#gr33n37 #database #hacking #kalilinux #mysql #kalilinuxtools In this video am showing showing you how to backup your data in mysql sql, it also talk about simple ways you can keep your database safe from bad actors. ................ Socials ................... twitter: x.com/gr33N37 Gitbook: greenet.gitbook.io Blog: gr33n37.blogspot.com/ medium: gr33n37.medium.com/ Disclaimer: This video is fo...
Simplest way to hunt for webshell in a linux server
มุมมอง 2214 หลายเดือนก่อน
#gr33n37 #linuxhacking #webshell #php #hacking #cybersecurity In this video am showing you how you can hunt webshells simply on your linux server with find. ............content.......... 0:00 introduction 1:22 hunting with find 4:09 conclusion .................. Socials ................... witter: x.com/gr33N37 Gitbook: greenet.gitbook.io Blog: gr33n37.blogspot.com/ I hope you enjoyed the video...
how to fix the initramfs error in kali linux
มุมมอง 8414 หลายเดือนก่อน
#gr33n37 #linux #kalilinux #hacking ................. Socials ................... twitter: x.com/gr33N37 Gitbook: greenet.gitbook.io Blog: gr33n37.blogspot.com/ I hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms
How to run SQL with bash script in linux
มุมมอง 1574 หลายเดือนก่อน
How to run SQL with bash script in linux
How to perform phishing analysis for SOC analyst and threat hunters (email analysis)
มุมมอง 1164 หลายเดือนก่อน
How to perform phishing analysis for SOC analyst and threat hunters (email analysis)
How to connect to tryhackme labs with openvpn(and in one command)
มุมมอง 2215 หลายเดือนก่อน
How to connect to tryhackme labs with openvpn(and in one command)
How to hack any widows PC with havoc C2. (+ privilege escalation)
มุมมอง 2.5K6 หลายเดือนก่อน
How to hack any widows PC with havoc C2. ( privilege escalation)
How to reset a forgotten linux password (trick works on all distros)
มุมมอง 2396 หลายเดือนก่อน
How to reset a forgotten linux password (trick works on all distros)
How to transfer data fast and secure between linux systems with SCP
มุมมอง 2137 หลายเดือนก่อน
How to transfer data fast and secure between linux systems with SCP
How to rest a forgotten Windows password (part 1)
มุมมอง 1747 หลายเดือนก่อน
How to rest a forgotten Windows password (part 1)
How to change your IP address every 5 seconds
มุมมอง 32K7 หลายเดือนก่อน
How to change your IP address every 5 seconds
How To Pivot Through a Network with Msfconsole (pivoting and port forwarding )
มุมมอง 6197 หลายเดือนก่อน
How To Pivot Through a Network with Msfconsole (pivoting and port forwarding )
How to set a different ip address to your machines in VB
มุมมอง 1607 หลายเดือนก่อน
How to set a different ip address to your machines in VB
How to install RustScan + basic usage
มุมมอง 9247 หลายเดือนก่อน
How to install RustScan basic usage
how to hide data in music (pro hacking)
มุมมอง 1537 หลายเดือนก่อน
how to hide data in music (pro hacking)
How to give your kali linux a cool Hollywood theme
มุมมอง 1.1K8 หลายเดือนก่อน
How to give your kali linux a cool Hollywood theme
How to hide data inside a picture(steganography)
มุมมอง 9968 หลายเดือนก่อน
How to hide data inside a picture(steganography)
Understand file compression with tar. (In just 10 mins)
มุมมอง 309 หลายเดือนก่อน
Understand file compression with tar. (In just 10 mins)

ความคิดเห็น

  • @Vexeria-STORE
    @Vexeria-STORE วันที่ผ่านมา

    it maybe bypass win 10 but not 11

  • @0fcksgivenATT
    @0fcksgivenATT 4 วันที่ผ่านมา

    it's detected already by win 11. nothing is undetectable anymore unless you know what you're doing and custom it yourself. Internet now is just full of censored content and people copying and paste. all of the contents are basically useless

  • @Imkoodos
    @Imkoodos 6 วันที่ผ่านมา

    Great content but why did the connection get disconnected?

    • @Gr33n37
      @Gr33n37 6 วันที่ผ่านมา

      Not sure yet,but to have a stable connection after your get access migrate your connection to another program on that system that if this is closed, you are still connected

  • @reallife-ew9no
    @reallife-ew9no 13 วันที่ผ่านมา

    How do I do it for a website

    • @Gr33n37
      @Gr33n37 13 วันที่ผ่านมา

      You can look at the logs if their is any noise or hunt for any files that might have been uploaded to the server

    • @Gr33n37
      @Gr33n37 13 วันที่ผ่านมา

      You can also use other open source tools to help

  • @nerdg2
    @nerdg2 13 วันที่ผ่านมา

    Thanks bro! i was on the verge of using rustscan, thanks for the quick explanation

    • @Gr33n37
      @Gr33n37 13 วันที่ผ่านมา

      Grate to hear I was helpful

  • @ultronhere4356
    @ultronhere4356 23 วันที่ผ่านมา

    Eu regular 2

    • @Gr33n37
      @Gr33n37 22 วันที่ผ่านมา

      you can choose any server you want, thou some fail to connect

  • @reyaanr
    @reyaanr 29 วันที่ผ่านมา

    Thanks bro 🎉

  • @saurabhrmahajan
    @saurabhrmahajan หลายเดือนก่อน

    not working

  • @fethallahghellaimi2024
    @fethallahghellaimi2024 2 หลายเดือนก่อน

    Good job ❤

  • @sparkgamer3190
    @sparkgamer3190 2 หลายเดือนก่อน

    works only once if i close the virtual box and restart try to restart the kali the same error appears!!!!

  • @MegaRabbit1993
    @MegaRabbit1993 4 หลายเดือนก่อน

    Ayo give this man a metal! 🥇 it worked!

    • @Gr33n37
      @Gr33n37 4 หลายเดือนก่อน

      Thanks 👍

  • @Notosas
    @Notosas 4 หลายเดือนก่อน

    u helped me quite much

  • @sheeprecaps
    @sheeprecaps 5 หลายเดือนก่อน

    this is uselss it got detcted long ago , try using modern methods not the ones heavily signatured by av, cant last even 1 second gets dleted.

    • @Nol-0408
      @Nol-0408 หลายเดือนก่อน

      What would use as a ‘replacment’

  • @filmyman4561
    @filmyman4561 5 หลายเดือนก่อน

    Yeah new error came

    • @Gr33n37
      @Gr33n37 5 หลายเดือนก่อน

      trying installing apktool the new version, because if you are using the new kali or updated linux the version in used in my video nolonger works

  • @eliaslobo7467
    @eliaslobo7467 6 หลายเดือนก่อน

    great tutorial thanks for sharing a question any script for persistence other than sharpersistem? automatic suite? maybe

  • @ForexKing-pj9mt
    @ForexKing-pj9mt 6 หลายเดือนก่อน

    how on earth are u gonna type the word and u dont have the passw to continue make it make sense

    • @Gr33n37
      @Gr33n37 6 หลายเดือนก่อน

      you just didn't understood the video, give me the minutes in video i explain to you

  • @miak911
    @miak911 6 หลายเดือนก่อน

    Thank you for your creativity👍👍👍👍

  • @passaronegro349
    @passaronegro349 6 หลายเดือนก่อน

    We are here in Brazil watching your videos with subtitles.. thank you for the quality

    • @Gr33n37
      @Gr33n37 6 หลายเดือนก่อน

      its a pleasure

  • @ig00g1e
    @ig00g1e 6 หลายเดือนก่อน

    You won't be able to do anything practical with this method. maybe go to what is my IP and keep refreshing.. that's about it. Also if you use Chrome, there are thousands of finger prints that point to you and how you literally type on your computer, all they need to do is triangulate those metrics on different end points you accessed.

  • @AloysiusChowBass
    @AloysiusChowBass 7 หลายเดือนก่อน

    Very clear guide. Looking forward to more good content on your channel. Followed and liked!

    • @Gr33n37
      @Gr33n37 7 หลายเดือนก่อน

      Thank you 👍

  • @Unk-1010
    @Unk-1010 7 หลายเดือนก่อน

    what do you do about the DNS Leaks, this just changes the ip dress?

    • @Gr33n37
      @Gr33n37 7 หลายเดือนก่อน

      The DNS leak website can help you to view your IP, with the change of IP by a software, I used that site to see each IP leak by refreshing the site

    • @Unk-1010
      @Unk-1010 7 หลายเดือนก่อน

      @@Gr33n37 thanks for the reply, but my question really was "how do you manage the DNS leak." Yes the ip address changes but there is still a trail from the DNS Leak. I have tested the using a VPN, and a encrypted dns service where the DNS isn't directly sent to the ISP, both ends are being encrypted via tunnel and encrypted DNS sent to separation server. With your method the ISP receives all the dns traffic and sees with there are going leaving a trail How do you fix this using your method?

    • @Gr33n37
      @Gr33n37 7 หลายเดือนก่อน

      @@Unk-1010 I understand you now, i have to retest the program and do more research to see if I can fix that, for now i won't lie you am not sure, but incase you find the trick first than me, am down to the contribution to the program, it's open source on GitHub, one can join with me and we make it better

    • @Unk-1010
      @Unk-1010 7 หลายเดือนก่อน

      @@Gr33n37 I would to encrypt the dns traffic and forward it to server(s) that handle encrypted dns traffic (TLS/HTTPS) say 1.1.1.1/9.9.9.9 just to cover loose ends am open to corrections if anyone has ideas

  • @randykitchleburger2780
    @randykitchleburger2780 7 หลายเดือนก่อน

    The only reason you would ever do this is to impress kids who don't know any better. Good luck keeping any connections alive.

  • @hidude9119
    @hidude9119 7 หลายเดือนก่อน

    Bollocks GitHub is owned by Ms beware

  • @dallathayogi
    @dallathayogi 7 หลายเดือนก่อน

    🐐

  • @dvw26
    @dvw26 7 หลายเดือนก่อน

    warum soll ich es als normaler anwender sowas tun, ein VPN bietet das "Multi-hop" dies ist eigentlich fast das gleiche.....es gibt nichts was dich, oder mich als Internetuser komplet annonym macht. Eine 3 Buchstaben Inst. hat immer die möglichkeit heruszufinden wer wir sind wenn sie natürlich interesse hat und will ob Tor oder VPN(welches sowieso ein Witz ist) nur sind wir normale Anwender nicht wichtig, sei vorsichtig, bleib still, click nur was von interesse für dich ist und niemanden juckt's wer du bit und wo du bist! Fertig

  • @trinityosmedia
    @trinityosmedia 7 หลายเดือนก่อน

    I get inspired whenever I see a Ugandan fellow doing pentesting bro that's great

  • @trinityosmedia
    @trinityosmedia 7 หลายเดือนก่อน

    Thanks for the work bro I become very happy whenever I see a Ugandan dude doing hacking

  • @trinityosmedia
    @trinityosmedia 7 หลายเดือนก่อน

    I came across this video wen I wanted to get working IP for UDP to connect for a free internet vpn

  • @Crazy--Clown
    @Crazy--Clown 7 หลายเดือนก่อน

    More shit to do..... Proxychains file, just change that

  • @jimzielinski946
    @jimzielinski946 7 หลายเดือนก่อน

    Ive known tools and techniques like this existed, but always depended on MS to always update its software, virus packages and firewalls. Having worked in the industry for years (but doing other things) and depending on others to protect our systems, i have to admit this information you present is scarry. I dont know if i can suceed, but im getting the feeling i should be studying this in my home lab to at least be aware of the dangers. Very enlightening to me at least.

    • @Gr33n37
      @Gr33n37 7 หลายเดือนก่อน

      true, i will creating a video on how to set your own local lab

  • @miak911
    @miak911 7 หลายเดือนก่อน

    Dear GREENET, I wanted to take a moment to express my heartfelt gratitude for the incredible content you consistently share on your TH-cam channel. Your videos are not only informative but also engaging and thoughtfully crafted. Your dedication and passion shine through in every video, and it’s clear that you put a lot of effort into ensuring that your audience receives high-quality and valuable information. Thank you for being a source of inspiration and for continuously enriching our knowledge. Your hard work and commitment do not go unnoticed, and I truly appreciate the positive impact you are making through your channel. Keep up the fantastic work! Warm regards,

    • @Gr33n37
      @Gr33n37 7 หลายเดือนก่อน

      i appreciate alot this heart warming message, thanks alot friend for your feedback.

  • @nicholasloren
    @nicholasloren 7 หลายเดือนก่อน

    Good one bro 🎉

    • @Gr33n37
      @Gr33n37 7 หลายเดือนก่อน

      Thanks 🔥

  • @CyberNinja6969
    @CyberNinja6969 7 หลายเดือนก่อน

    The issue with pentesting and using the IP script with foxy proxy is then you might have issues using both proxies for both the IP changer and Burpsuite together. even though they may be using different ports on the localhost.

  • @heatherryan9820
    @heatherryan9820 7 หลายเดือนก่อน

    That's really cool, but if you have that running, and you start downloading something, or you start an rdc, and then you change your up address, how does it still continue to know where to download the information to, or continue to send the remote desktop to? I've never understood that from movies, how do they start connected to something if their up address continues to change?

  • @paulhetherington3854
    @paulhetherington3854 7 หลายเดือนก่อน

    I left out -- by law(LA') -- any Aviation -- "KUIMAKA - sabotaged kidnapped - "By used their - own equipment -- but show -- "U.S. NAVY - etc!" 100% illegal - under any LA'!

  • @paulhetherington3854
    @paulhetherington3854 7 หลายเดือนก่อน

    /4''pn 2''UIx'' kntrol fld~tmp krop fold 4''IC vk(auch fs O)/ /L''pn < abv pas ~2''UI'x tmp < 4''pn x 4''IC vk + auch abv/ /M''4 x 2''UI'x'' kntrol fld > ~tmp vk thrm mrk int=cjz 4''pn/ /R''X'pn(4''tTx'' fld vk pchrol) < L''~tmp krop fold 4''IC + UI'x''/ /mch vd LN'' < fs txt fld @ 4''IC auch fz O < zfr 4''orb/

  • @SpaceCadet4Jesus
    @SpaceCadet4Jesus 7 หลายเดือนก่อน

    Changing my IP address every 3 to 5 Seconds isn't going to allow me to receive much information from the internet, considering the return data IP address will be invalid. What happens when you issue TCP request with only a half of a second remaining? This isn't security this is ridiculousness.

    • @Gr33n37
      @Gr33n37 7 หลายเดือนก่อน

      Simple, then just increase the time it has to change

    • @randykitchleburger2780
      @randykitchleburger2780 7 หลายเดือนก่อน

      ​@@Gr33n37No, not really. A proper implementation of this would be tracking IP addresses being used and connections that are open. Wait for those connections to close and then change the IP.

  • @djnikx1
    @djnikx1 7 หลายเดือนก่อน

    👍Cheers buddy!

  • @augustacybersolutions
    @augustacybersolutions 7 หลายเดือนก่อน

    Obfuscation is not absolute, The FBI owns half of all TOR relays and will deobfuscate you, MAC address tracking is a whole other bag of headaches...don't do this from your house, YOUR ISP KNOWS WHAT YOURE DOING,

  • @sippinondroppromotions4276
    @sippinondroppromotions4276 7 หลายเดือนก่อน

    I use anon surf + proxy chains + macchanger addr pretending to be burnt in + changed ipv4 and ipv6 + netmask and broadcast addr change

  • @pouyatoutounchy1238
    @pouyatoutounchy1238 7 หลายเดือนก่อน

    This works fine anywhere other than China and Russia as they have GFW (Greate Firewall) where the tor net's IPs are mostly blocked. Great video though Thanks

    • @danielnoohi1224
      @danielnoohi1224 7 หลายเดือนก่อน

      Plus Iran, we have a pretty nasty GFW here too😢

  • @le2r
    @le2r 7 หลายเดือนก่อน

    Ah you know that the US gov has backdoors in OS's? "Section 702 gives the US government the ability to monitor foreign nationals located outside the United States without a warrant; however, a “backdoor” permits warrantless surveillance to be extended to people in the US as well."

    • @asiliria
      @asiliria 7 หลายเดือนก่อน

      How does this apply to Linux at all, given community analysis? This could apply to Windows but, as far as I have learned, Linus Torvalds actively tries to protect the Linux project and, given the activity of Linux development, these backdoors are already much easier to catch anyway. Some of the biggest attacks have been neutered already before they have taken action or, using the xz backdoor as an example, fixed within a matter of moments after discovery. Not fully secure, but free of backdoors, more than likely.

  • @VIVEVIEV
    @VIVEVIEV 7 หลายเดือนก่อน

    You know it works when the guy sounds indian and goes the extra mile to blur out his firefox url suggestions

    • @TheTubejunky
      @TheTubejunky 7 หลายเดือนก่อน

      Not Indian. African or Jamaican

    • @johnmorse4875
      @johnmorse4875 7 หลายเดือนก่อน

      @@TheTubejunkyfacts

    • @WrathOfVaz
      @WrathOfVaz 7 หลายเดือนก่อน

      Bro you really don’t know what an Indian sounds like do you?

    • @wendohgermaine6448
      @wendohgermaine6448 7 หลายเดือนก่อน

      I reside in East Africa and he sounds Ugandan

    • @Crazy--Clown
      @Crazy--Clown 7 หลายเดือนก่อน

      Its hard to say but I think more African Jamaican...... Could also be using a voice changer

  • @prithvirajghorpade5538
    @prithvirajghorpade5538 7 หลายเดือนก่อน

    why did you add the proxy server? The one with Foxy Proxy? and by Using TOR you mean just having multiple IP addresses right?

    • @Gr33n37
      @Gr33n37 7 หลายเดือนก่อน

      i set the proxy in my foxy proxy to proxy every connection from the browser while tor in the background is doing its magic, you could proxy chains too

  • @gauravjoseph4831
    @gauravjoseph4831 7 หลายเดือนก่อน

    What would be cool is if you can randomize ip data packet wise, what would be cooler is if u can randomize permanent mac address

    • @sippinondroppromotions4276
      @sippinondroppromotions4276 7 หลายเดือนก่อน

      I could write you a script to do that for 25$

    • @SpaceCadet4Jesus
      @SpaceCadet4Jesus 7 หลายเดือนก่อน

      Constantly randomizing your Mac address only affects the equipment on your local network and confuses the s*** out of your switches. If you do it for long enough, your local switches will exceed the MAC address Table and you will not be able to communicate anymore. I have no idea what you mean by randomized IP packet data?

  • @tntomega
    @tntomega 7 หลายเดือนก่อน

    Lol you Hayden interesting webs?

  • @retr0.1337
    @retr0.1337 7 หลายเดือนก่อน

    Don't ever do that, it will fk your opsec fr, your isp will notice you doing this and will inspect the traffic possibly reporting you to the police or other authorities

    • @lolononojay9010
      @lolononojay9010 7 หลายเดือนก่อน

      Lies lmao

    • @akshatkumawat1218
      @akshatkumawat1218 7 หลายเดือนก่อน

      ​@@cathal357 bro how do u know all this ?

    • @amandamate9117
      @amandamate9117 7 หลายเดือนก่อน

      pro tipp: use this only on public networks. Or hacked networks around you. + regularly change from where you physically access that network (because of triangulation)

    • @heatherryan9820
      @heatherryan9820 7 หลายเดือนก่อน

      I'm not sure where you are, but there's nothing illegal about changing your ip address in the US. That alone isn't illegal.

  • @TheGreenOfficial
    @TheGreenOfficial 7 หลายเดือนก่อน

    Hey there you use username as GREEN & sunds good to me...

  • @WoodyWilliams
    @WoodyWilliams 7 หลายเดือนก่อน

    Well done but I've got to check your script. I mean, what ip pool are you polling from? Where did the pool come from? Someone else's list?

    • @Gr33n37
      @Gr33n37 7 หลายเดือนก่อน

      Tor is in action, feel free to read the script

  • @MohammedSalah2405
    @MohammedSalah2405 7 หลายเดือนก่อน

    Why the agony man? change the proxychains file.

    • @Gr33n37
      @Gr33n37 7 หลายเดือนก่อน

      Knowing other ways ain't bad thou