Thanks for the support guys, please ask any questions that you have about the courses in the Q&A / forums, there we can share screenshots and its just much easier to manage, its also useful to other students that might face the same issues.
My friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/ th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-.html
I just started but I need you to know that you are an extremely great teacher. Even though you are an expert you explain everything so a day 1 beginner can understand but you do it in such a way it’s not boring nor is it condescending. I’ve watched other teachers. If you’re a beginner they won’t answer questions, they don’t explain what they’re doing and they are so condescending as if they are to good to help beginners. So THANK YOU!
@@saikumaryangala1063 although it was a year ago, but I came to realize about something, most modules that are used are rather manual, meaning it can't connect without doing something, like installing a malicious program we set, or ask a person to do something, I kind of expected things to be done sitting on a chair and wait for a established connect.
My friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/ th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-.html
@@themassventures2060 everybody can learn hacking doesn't mean what is ur religion . So don't be serious what other says . I am also a kattar hindu🕉️ but really appreciate you . Love from UP india and make country rich . Jai hind Jai bharat .
My friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/ th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-.html
Zaid, I have been following you by opting in all the courses you have put up and they are helping me a lot in my journey to become a pentester. If possible , can you please do a course on hardware hacking and on hardware knowledge.
My friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/ th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-.html
I'll love a full course on rubber ducky so kindly make one. Maybe you can create a poll somewhere and ask your existing students if they would like it so you can get a better feedback. Thank you for all your teachings. Really enjoy them and learn a lot
My friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/ th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-.html
My friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/ th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-.html
Cool tool! It's been around for over 7 years + and is helpful for local accounts, but thankfully it will not work on enterprise domain binded machines. Things to remember - always BIOS protect your system, block USB access via group policy, disable autorun, and always encrypt your drive. 👍😁
eric , I am new to security ,so you said it won't work on enterprise domain binded machine,,could you please tell me what is enterprise domain binding ,,and wont it work ,,usually I am a good googler but in this thing I could not get what it is ,,a small summary would be very helpful ,,is enterprise domain binding is like whitelisting sites ,,,thanks for the info
My friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/ th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-.html
yes definitely, a brief video on hacking using hardware would be great and a course on UDEMY would be fantastic Sir. I have enrolled for your UDEMY course of ETHICAL HACKING FROM SCRATCH.
My friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/ th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-.html
My friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/ th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-.html
Hello Zaid, you're one of my best teacher! And do you have any updates for your current courses or introducing on new courses? I want to learn PowerShell commands and python more..
yes there was an update last week for the social engineering and the main ethical hacking course and there will be an update for the python course either this week or next week, there are constantly updates so just check out the announcements and follow us on social media to stay updated.
My friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/ th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-.html
Hello Zaid, great tutorial and of course what’s most amazing is your courses! I would love to know how to make usb devices like the rubber ducky - why not make a course and add to Udemy on basic to intermediate hacks with hardware devices or custom hardware devices... I would love to buy it lol!
yes I already asked Adrian to make a video on it, it might take a little bit of time because he is working from home at the moment and he needs to come to the office to record it
My friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/ th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-My.html friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/ th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-.html
zaid great fan here !! i just love your contents.. please make a video on how to root any android there are many videos and articles but from my point of view yours will be the best
Sir i am enrolled with your course and very satisfied as well ......i want to see that part...how to use normal pendrives to work as keylogger or keyboard acknowledge ....
@@zSecurity sir then plz a content on it ..... and i also wanna join your advanced bug Bounty course ....so plz suggest me if there is any course of it ,
I have bought your all the udemy courses. I've noticed most of the courses you have recorded 5-6 years ago. In the Course banner section we can see last updated month of your course. Which is very good & really I appreciate it as a your udemy student. all of the courses you always keep up to date. What kind of updates do you put in the course?
it's always something different so sometimes the cursed Electra itself gets improved and sometimes the method shown gets out of date so I would have to update it
My friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/ th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-.html
My friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/ th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-.html
Zeid I have learnt a lot from your courses and thank you for that. You are a good teacher and I like hacking a lot and I want to learn more and more. That’s why I have a question. If you gain access on someone like here in this video. If the victim closes the pc or if you lose connection some how, is it the door still open? Can you gain access again easily?
I know you will lose your access if they close their computer, that's why if you want to maintain your access you should install a persistent backdoor.
My friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/ th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-.html
Hi sir, Am one of your student in Udemy you are really a Great teacher duffer like me can easily understand your course that's really very helpful, And I request you to let me know Hardware stuff so that i can learn.
The protocol is called HID (human interface device) It's how you can plug a keyboard or mouse into your computer, and it just starts working. The term is "plug and play". All typical devices are plug and play, to make it easy for people. A hacker exploits this by setting up a device to trick your computer into thinking it's a new keyboard you plugged in. Then, it sends key strokes (just as if you were typing them in yourself), to download a file from the device, and run it. The pc and software manufacturers should make it so computers will only accept 1 keyboard device at a time. And they should require a password entered, to accept ANY other HID that's plugged in.
Great video, just a question you are using a local ip like from a router, when you set it shouldn't be the network's ip? Sorry I'm still new maybe it's a lame question
My friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/ th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-.html
Zaid Sir i recently purchase your hacking course.I think you are best teacher because your way of talking is very comfortable for me. Thanks a lot You are best ❤❤❤
Great Video Man 👍👌 Pls post a video on how to bypass antiviruses properly i have built many viruses that you taught in your python course but does not matter how much i obfuscate the code or compress it its still getting detected by the Windows Defender.Also sites like No distribute are no longer functional so its impossible to check for antivirus evasion please consider this
My friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/ th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-.html
My friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/ th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-.html
Bro please make a video about kr00k vulnerability and web pentesting series......because you can explain all contents very neatly and I like your video
hi zaid, is there a way or hacking method to find out or trace a phone number for example find out the location of a phone number? specifically for the uk?
No, doesn't have to be on the same network. The downloaded file could simply have instructions to "call" anywhere on the internet and connect. I'm pretty sure the target computer has to be open though.. meaning the user has unlocked it with their password. But once that happens, the downloaded file could also run key logging software to obtain your passwords, so the hacker can get into your system anytime, through the ports it has opened (backdoors).
Is nethunter supported on limited phones or can be installed on any Android device ? I have rooted my phone just worried that will nethunter work on my phone or not
officially it supported on a limited number of phones, there are even more ports that are not officially supported, and you can even manually exported to other phones but it's going to be a bit challenging.
@@zSecurity thanks for the response, in my country I'll need to have nexus imported as our stores do not have nexus devices, so that's why I was hoping you'd be able suggest some devices that is compatible with net hunter and can be rooted, perhaps you could make a video on this if possible?
This guy is fantastic I’ve bought 1 of his courses from Udemy and I recommend you all do the same. Do you have a course to buy so we can jack from an iPhone?
Awesome video, as expected. Worth the wait. Zaid sometimes if we want to access the login page of a website, its very difficult. How to do so easily every time?
Thanks for the support guys, please ask any questions that you have about the courses in the Q&A / forums, there we can share screenshots and its just much easier to manage, its also useful to other students that might face the same issues.
I have all yours courses i just learned alot ...thanks🤩💯
Is shipment is available in lockdown in india in june/july???for wifi adaptors
Kindly create a video on malware analysis.
zSecurity when is the python update course coming out ? And when you going be making a course on ducky script ?
Sir, Being honest literally it's our pleasure sir...❤️
Yes we want a tut for making of a bad usb same mind hit like 👍
like and comment
Lots of people asked about this so I will make it happen 😉
@@zSecurity thanks sir💗
what he said
@@zSecurity thanks
hey Zaid, few days ago I started your course on Udemy and already became your fan. You're doing very good job - thank you very much.
Sweet! On Udemy! I have used that for Erickson's hypnotherapy. Hehe. :3
Nice to see the video Zaid. Udemy Mennerz Put ur hands up in the air 🖐️
My friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/
th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-.html
I just started but I need you to know that you are an extremely great teacher. Even though you are an expert you explain everything so a day 1 beginner can understand but you do it in such a way it’s not boring nor is it condescending. I’ve watched other teachers. If you’re a beginner they won’t answer questions, they don’t explain what they’re doing and they are so condescending as if they are to good to help beginners. So THANK YOU!
Omg that's crazy I'm not going to let anyone in to my house again after this haha but I really enjoy this video best so far 👌
🤣🤣🤣
@@saikumaryangala1063 although it was a year ago, but I came to realize about something, most modules that are used are rather manual, meaning it can't connect without doing something, like installing a malicious program we set, or ask a person to do something, I kind of expected things to be done sitting on a chair and wait for a established connect.
My friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/
th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-.html
Lot's of love from India...
You no hack bro
@Simon Brix Gobaton You go away..
@@themassventures2060 everybody can learn hacking doesn't mean what is ur religion . So don't be serious what other says . I am also a kattar hindu🕉️ but really appreciate you . Love from UP india and make country rich . Jai hind Jai bharat .
@@pinbox_gamer723 Lot's of love my brother, Literally I'm glad after reading ur message...❤️
My friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/
th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-.html
I wish youtube has multiple likes option...
You are the best teacher...
Zaid, I have been following you by opting in all the courses you have put up and they are helping me a lot in my journey to become a pentester. If possible , can you please do a course on hardware hacking and on hardware knowledge.
Thanks for the suggestion, I will consider this when I start making my next course.
My friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/
th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-.html
I struggle with so many tutorials because My english is not good. But your videos are very clear easy to understand. Good job. Thank you❤
First view and first comment...!!
Awesome explanation sir
I'VE BEEN LOOKING FOR A POWERSHELL COURSE, and I'd love to do it from you!
Do it, boy
I'll love a full course on rubber ducky so kindly make one. Maybe you can create a poll somewhere and ask your existing students if they would like it so you can get a better feedback.
Thank you for all your teachings. Really enjoy them and learn a lot
Thanks for the suggestion I will keep that in mind.
Yes my guy, please show us the hardware part too :D Superb videos. I have already purchased one of your courses
My friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/
th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-.html
U r the best teacher ever please make videos about manual hardware making that can be used in hacking lots of love and support from Nepal ❤️
Lots of people asked about this so I will make it happen 😉
Yes man I want that hard ware knowledge if possible make a whole course
yes plz Zaid!
Hugs for subs
Yaa bro make a course
My soldering iron is ready
Yes bro plz
Zaid is best!!!! The udemy course is best!!!!
i have it free
HOW
Mine doesnt even work I get stuck everywhere
I also have free by a group in telegram they giv free coupon codes lol
@@allinonememes7574 telegram group joining link plox if possible
Top notch video like always really enjoyed it ❤️❤️
My friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/
th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-.html
Cool tool! It's been around for over 7 years + and is helpful for local accounts, but thankfully it will not work on enterprise domain binded machines. Things to remember - always BIOS protect your system, block USB access via group policy, disable autorun, and always encrypt your drive. 👍😁
eric , I am new to security ,so you said it won't work on enterprise domain binded machine,,could you please tell me what is enterprise domain binding ,,and wont it work ,,usually I am a good googler but in this thing I could not get what it is ,,a small summary would be very helpful ,,is enterprise domain binding is like whitelisting sites ,,,thanks for the info
Nice Zaid! Amazing!
Ziad is not a name it's a brand ,I respect him sir ones I wanna meet you
Thanks zaid for the video. This is just ace!! Are you going to male any courses on rubber ducky?
Thanks for the support, I don't think I will make a full course on it what if you guys want one I will make one.
@@zSecurity if not a full course on rubber ducky maybe net hunter?
My friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/
th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-.html
yes definitely, a brief video on hacking using hardware would be great and a course on UDEMY would be fantastic Sir. I have enrolled for your UDEMY course of ETHICAL HACKING FROM SCRATCH.
My friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/
th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-.html
This is a real life Mr. Robot episode 😬
zSecurity yes we want to learn hardware knowledge .
Zaid is a only guy who make hacking videos with fun
Where are your courses?
Best udemy course please keep it up ive been learning alot from u. Much love from Lebanon
My friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/
th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-.html
Hello Zaid, you're one of my best teacher! And do you have any updates for your current courses or introducing on new courses? I want to learn PowerShell commands and python more..
yes there was an update last week for the social engineering and the main ethical hacking course and there will be an update for the python course either this week or next week, there are constantly updates so just check out the announcements and follow us on social media to stay updated.
@@zSecurity Awesome
My friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/
th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-.html
Hello Zaid, great tutorial and of course what’s most amazing is your courses!
I would love to know how to make usb devices like the rubber ducky - why not make a course and add to Udemy on basic to intermediate hacks with hardware devices or custom hardware devices... I would love to buy it lol!
yes I already asked Adrian to make a video on it, it might take a little bit of time because he is working from home at the moment and he needs to come to the office to record it
zSecurity Awesome! I and I’m sure others in the community will be readily expecting it! Thanks for the help!
My friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/
th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-My.html friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/
th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-.html
Thanks sir for giving me this video...... ❤️❤️❤️🙏🙏😍
If you are not the root user use the "sudo" command before the update command
Zaid, please make a course on powershell and batch commands on windows. Please please please.
Thanks for the suggestion I will keep that in mind.
zaid great fan here !! i just love your contents.. please make a video on how to root any android there are many videos and articles but from my point of view yours will be the best
I had many issues with nethunter, so I made a fake cable with a digispark hidden inside. Great video
Yes Sir we will love to see an evil pen-drive to see in action 😈
BRO u just awesome best youtuber fr
You finally did it... You stood by your word.
Sir i am enrolled with your course and very satisfied as well ......i want to see that part...how to use normal pendrives to work as keylogger or keyboard acknowledge ....
unfortunately he hasn't made content for bad usbs
Yes this is not covered in any of my courses.
@@zSecurity sir then plz a content on it ..... and i also wanna join your advanced bug Bounty course ....so plz suggest me if there is any course of it ,
I have bought your all the udemy courses. I've noticed most of the courses you have recorded 5-6 years ago. In the Course banner section we can see last updated month of your course. Which is very good & really I appreciate it as a your udemy student. all of the courses you always keep up to date. What kind of updates do you put in the course?
it's always something different so sometimes the cursed Electra itself gets improved and sometimes the method shown gets out of date so I would have to update it
My friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/
th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-.html
Looking forward to the next courses, man. I have almost all of your courses on udemy
My friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/
th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-.html
like ur video.. lots of love and support from Nepal.(the country of gurkha)
Zeid I have learnt a lot from your courses and thank you for that. You are a good teacher and I like hacking a lot and I want to learn more and more. That’s why I have a question. If you gain access on someone like here in this video. If the victim closes the pc or if you lose connection some how, is it the door still open? Can you gain access again easily?
I know you will lose your access if they close their computer, that's why if you want to maintain your access you should install a persistent backdoor.
My friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/
th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-.html
Hi sir,
Am one of your student in Udemy you are really a Great teacher duffer like me can easily understand your course that's really very helpful,
And I request you to let me know Hardware stuff so that i can learn.
How can the computer believe that the phone is a keyboard? How It Works?
The protocol is called HID (human interface device)
It's how you can plug a keyboard or mouse into your computer, and it just starts working. The term is "plug and play".
All typical devices are plug and play, to make it easy for people. A hacker exploits this by setting up a device to trick your computer into thinking it's a new keyboard you plugged in. Then, it sends key strokes (just as if you were typing them in yourself), to download a file from the device, and run it.
The pc and software manufacturers should make it so computers will only accept 1 keyboard device at a time. And they should require a password entered, to accept ANY other HID that's plugged in.
Great video, just a question you are using a local ip like from a router, when you set it shouldn't be the network's ip? Sorry I'm still new maybe it's a lame question
My friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/
th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-.html
Zaid Sir i recently purchase your hacking course.I think you are best teacher because your way of talking is very comfortable for me. Thanks a lot You are best ❤❤❤
Please make a whole course on hardware hacking. awesome video
Hey! Zaid, Can you plz tell in which of your course you are teaching this in depth so i can enrolled.
This is not covered in any of my courses.
Loved the video fr man !!
And yes, I would love to see those hardware videos as well.
Hey Zaid big fan of yours I have even done many courses of yours
Can you show how to use any device as a keyboard
Great Video Man 👍👌 Pls post a video on how to bypass antiviruses properly i have built many viruses that you taught in your python course but does not matter how much i obfuscate the code or compress it its still getting detected by the Windows Defender.Also sites like No distribute are no longer functional so its impossible to check for antivirus evasion please consider this
I love this one please make an another video on usb hardware section as keystroke injection.............
Lots of people asked about this so I will make it happen 😉
Such an ispiration for me 💙🌪
My friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/
th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-.html
There is it, so hyped!
Any new courses on the way? I already went through all of them :D
No no new courses for now, we are working on a number of exciting projects though, so stay tuned
i dont understand how did you get to the gui ,strings ....
Please do make a full course on ducky scripts , making own bash scripts for real world scenarios (pentesting) and on powershell. Thanks.
My friends, search for your life purpose, why are we here?? I advise you to watch this series 👇 as a beginning to know the purpose of your existence in this life/
th-cam.com/play/PLPqH38Ki1fy3EB-8xmShVqpbQw99Do2B-.html
I wait this video for long time.
Please sir don't delay next video.
Hi sir. I have bought 3 of your courses and enjoying them. I just wanted to know how we can make a bad usb and hardware.😃😃please make a video on it.
Sirin your course the kali linux os which yoy provide. In that you have bind some pay load or what . Means is it safe for us or not
What the heck bro 😂 , what kind of question is that
Can you give the link for the application Net hunter It is difficult for me to find it in google play
Zaid sir you ar awsm... Create a video on making bad usb also
Amazing.....love your courses
Hey Zaid, how did u setup that phone for hacking? Because I didn't see a clip of the app you were using to set it up. TY
Zaid sir, could you please make a vid on how we can make our own evil USB's
Lots of people asked about this so I will make it happen 😉
@@zSecurity this will be the greatest
@@zSecurity Thanks
Hi zaid I've taken ur course
But my kali takes a lot time to boot
Please suggest me some tips to correct it...
/hello zaid , i an your big follower , i learn all the day , also in udemy you are amazing ,, thank you zaid
Finally after a long time
yeah would appreciate, if you or adrian taught on how to make bad usb devices.
Definitely we would love to see how to create our own bad usb
Lots of people asked about this so I will make it happen 😉
@@zSecurity thanks
Hi zaid...
Waiting for your powershell for hacking course
When your going to upload this course on udemy...
Bro please make a video about kr00k vulnerability and web pentesting series......because you can explain all contents very neatly and I like your video
hi zaid, is there a way or hacking method to find out or trace a phone number for example find out the location of a phone number? specifically for the uk?
Sir we are learning a lot from your courses and your courses are lucid
Sir can you even make a video how to make our own evil USB and help us more sir
Hey guys have anyone try it this or just Zaid have done this experience love you Zaid keep support you the best teacher
Sir, one of your student ..
Please make video regarding Android hacking techniques
I cover some of this in my social engineering course, the network attacks I show in my other courses work on Android to.
Yay, Can't wait for your Bad USB video.
correct me if i'm wrong but it will only work if both the hacker machine and the victim machine is on the same network? i'm kinda confused
No, doesn't have to be on the same network. The downloaded file could simply have instructions to "call" anywhere on the internet and connect. I'm pretty sure the target computer has to be open though.. meaning the user has unlocked it with their password. But once that happens, the downloaded file could also run key logging software to obtain your passwords, so the hacker can get into your system anytime, through the ports it has opened (backdoors).
Today Zaid is very happy😊😊😊😊
Yes sir, how to make our own keystrokes device? Make video on its. You should also add this on course plz.
👍🏻👍🏻👍🏻.....
You're really cool man! Keep doin what you doin.
عمري زيود اني اشكرك علا كورساتك ال تخبل
بس اتمنة تنزل كورس بلغة العربية كثير كثير اشخاص راح يشترو
وا اتمنة تنزل شون نبرمج كيف نشغل عقلنة ونتعلم نبرمح بايثون
وا شكرا لك تحياتي حبيبي زيود
هذا عربي ؟
عفوا اخي و شكرا على الدعم، أن شا الله احتمال نسوي شي بالعربي بالمستقبل
You Are My Favouriteee Cool🔥🔥🔥
the video was awesome but the funny part is...
I got his udemy ad on his video lol
Is nethunter supported on limited phones or can be installed on any Android device ? I have rooted my phone just worried that will nethunter work on my phone or not
officially it supported on a limited number of phones, there are even more ports that are not officially supported, and you can even manually exported to other phones but it's going to be a bit challenging.
@@zSecurity okay Thanks !
Hi Zaid, quick question, what devices are rootable and also capable of running Net Hunter?
Use nexus
Best for Hacking..
Yeah Nexus devices are great, if you have something else just Google the model of it.
@@zSecurity thanks for the response, in my country I'll need to have nexus imported as our stores do not have nexus devices, so that's why I was hoping you'd be able suggest some devices that is compatible with net hunter and can be rooted, perhaps you could make a video on this if possible?
This guy is fantastic I’ve bought 1 of his courses from Udemy and I recommend you all do the same. Do you have a course to buy so we can jack from an iPhone?
thank you for the support...No I don't cover that in any of my courses at the moment.
zSecurity well thank you for the great content and the courses it’s appreciated. Watching your videos got me interested in IT!
hi Zaid, you are rocking and also could you please help us to learn how to make those particular devices as 'Keystroke Injection device'
Can we use nodemcu as keystroke injector plzz reply😁
Very helpful for me.
Thanks 👍👍😊
I was the 100th liker
Awesome video, as expected. Worth the wait. Zaid sometimes if we want to access the login page of a website, its very difficult. How to do so easily every time?
Sir I am enrolled in your 4 courses. I just want ask can you upload any new courses in future
Very nice information... please Zaid make a video on hardware ducky USB and script
Plz make videos on game hacking. Loved your courses
love u mannnn and please make avideo on making bad usbs
It’d be great if you do a video on how to port forward without router access
Thanks for the suggestion, I'm actually considering adding this to my social engineering course.
zSecurity it’d be awesome if you did a TH-cam video on port forwarding without router access
Do we need to keep the USB or mobile phones connected? or can we remove the device after connection?
Hello a student from DRC when i try to join the course in your website it fails saying out of stock... you dont other students?😓
Hello Sir,
It is possible to format any android device without touching it... Using metasoloit or any other tool.....
Hello Zaid, Please make a video about *The disadvantages of rooting android devices and how we can prevent them*
Thanks for the suggestion, I will keep that in mind
sir in which specific course you shared the meterpreter attack
social engineering , from scratch