cyber security #98
44783farmer
started this conversation in
General
Replies: 2 comments
-
Ethical hacking is like being a digital detective for good. It’s when cybersecurity experts hack into systems—but with permission—to find and fix security flaws before real hackers can exploit them. Instead of causing harm, ethical hackers help protect data, networks, and devices from cyberattacks. It’s all about staying one step ahead of the bad guys to keep systems safe. |
Beta Was this translation helpful? Give feedback.
0 replies
-
I want to learn specific tools if you can teach me how to create rat
embedded in a web link or pdf file or image that will be stealthy installed
when the user of the target device tries to open or click on the link, and
I will have a clone of the device , especially phones and for computer, I
will gain access to the computer , and for emails I will get thier password
…On Mon, 26 May 2025, 12:03 rishabhtpt, ***@***.***> wrote:
Ethical hacking is like being a digital detective for good. It’s when
cybersecurity experts hack into systems—but with permission—to find and fix
security flaws before real hackers can exploit them. Instead of causing
harm, ethical hackers help protect data, networks, and devices from
cyberattacks. It’s all about staying one step ahead of the bad guys to keep
systems safe.
visit-https://tpointtech.hashnode.dev/common-ethical-hacking-techniques
—
Reply to this email directly, view it on GitHub
<#98 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/BSQT3DJNDHPP672TEDCVP2L3ALYJ3AVCNFSM6AAAAAB5JPBBYWVHI2DSMVQWIX3LMV43URDJONRXK43TNFXW4Q3PNVWWK3TUHMYTGMRXGE2DIOI>
.
You are receiving this because you authored the thread.Message ID:
<farhanashrafdev/90DaysOfCyberSecurity/repo-discussions/98/comments/13271449
@github.com>
|
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Hi everyone,
I’m an aspiring cybersecurity professional with a strong interest in red teaming and advanced threat simulation. I'm particularly eager to understand the techniques and tools used in controlled environments for simulating real-world attacks — such as remote code execution, payload delivery, and post-exploitation techniques — all strictly within legal and ethical boundaries.
If anyone here is experienced in developing or using such tools (e.g., C2 frameworks like Cobalt Strike, Mythic, or Empire), I would deeply appreciate any guidance, learning resources, or mentorship. I’m also open to participating in ethical hacking labs like Hack The Box or TryHackMe, and I’m willing to contribute to any related open-source projects.
Thank you in advance for any help or direction!
[email protected]
Beta Was this translation helpful? Give feedback.
All reactions