Vilge234 kullanıcısının son içeriği

  1. V

    Python / Socket Module

    Hello friends, today I'll try to describe Socket module as much as I can... Thread Titles; >>What is Socket module? >>What is Socket type seperated to? >>Socket methods and explanations. >>A small example is shown. What is Socket Module? Socket module, provides statics, functions...
  2. V

    What is DoS/DDoS, What are the most used types?

    Hello everyone, in this topic I'll tell you about what is DoS/DDoS, what are it's types. Let's begin. # Thread Content # # What is DoS/DDoS? # What are the most used DoS/DDoS types in our time. What is DoS/DDoS ? DoS:Known as Denial of Service attack, is the attack type...
  3. V

    What is Design Patterns?

    Hello all TurkHackTeam members, I'm Uchiha-Sasuke In my this thread, I'll tell you about what is Design Patterns Design Patterns Design Patterns, is the name given to responsive patterns that are made for handling similiar problems. In object oriented programming apps...
  4. V

    Let's Learn XSS in Detail

    Hello TurkHackTeam members, in this thread, I'll do a detailed instruction about XSS (Cross Side Scripting, so without further ado let's get to the point. - Subject Titles - - What is XSS, What does it do ? - What is doable with XSS ? -What is the cause of XSS vulnerability ...
  5. V

    Finding Security Vulnerability on Target System / WAES / Cold-Shadow

    What is WAES? WAES is a software that does security vulnerability scan on target site by using specific tools. Installation git clone https://github.com/Shiva108/WAES ls cd WAES sudo ./install.sh Let's type our password. We need to be "root" in order to run the...
  6. V

    Few Ways to Become Anonymous on the Internet

    Hello everyone, today I'll give you 3 recommendations on how to surf the internet anonymously. 1) Use Incognito Window. Incognito window is a feature presented to users by web browsers. The service that's presented as "Private window" on Firefox and Safari can make you as private...
  7. V

    NMAP Usage / / ReoBlood

    Hello TurkHackTeam family, on this thread I'll tell you the usage of NMAP with Linux. First of all what is NMAP?? NMAP is a security scanner made by Gordon Lyon using C++/C and Python programming languages. What does NMap Do?? It can show the scanned network's map and observe...
  8. V

    Web site vulnerability and info collection tool (D-TECT)

    Hello guys, today I'll present you D-Tect which is a tool used collect web site vulnerability and info. First of all what the program does: *Sub Domain Scan *Port Scan *Wordpress Scan *Wordpress User Name Numbering *Wordpress Backup Disable *Sensitive File Detection *Same-Site Scripting...
  9. V

    Creating Forensic Image with Magnet Acquire

    Magnet ACQUIRE, is designed to get quick and easy image on iOS and Android devices. Two extraction options have been given to controllers. Quick and Full Firstly, install Magnet Acquire to your PC by downloading it from here. Now connect your Android device to your PC via data cable. There...
  10. V

    Brain Storm and Effects

    Brain storm (Brainstorming) is a method used for problem solving and reaching the most accurate solution. Brain storm : When persons get together and exchange ideas with eachother by explaining their ideas without controversy. Simply; it's a tool for us to create ideas to think...
  11. V

    What is Virtual machine, how to install it?

    Hello guys, in today's topic I'll talk about, what is Virtual Machine, how to install it First of all what is Virtual Machine? Virtual machine, in computer science, it's the software version of a real computer system which runs programs. Virtual machine, creates a virtual environment...
  12. V

    Android 9-10 Hacking google account, forgotten password / updated

    Android 9-10 hacking google account Hello guys. Most of us have forgotten our password atleast once, we sometimes remember it we sometimes don't. The only thing that we can do is performing a hard reset. I won't tell how to perform a hard reset, I'll add it to the end of the thread, I've...
  13. V

    Termuxa - Installing Met@sploit Without Errors and Root

    Hello guys, today I'll show you how to create the tool named met@sploit on termux without nokogirl error and without root. Let's begin :) 1-)First of all let's go to play store and download it 2-After downloading it, update the packets. apt-update 3-)Next apt...
  14. V

    PHP - Two Dimensional Array

    PHP Two Dimensional Array In the array, we sometimes need to save different properties of the index value. At situations like these, we use two dimensional array. For example : In the checkout application, there may be array elements that we need to add to the index value with product ID...
  15. V

    Wi-Fi Phisher

    Hello guys, first of all I present my thanks to ch_arli41 who has helped me open this thread. Today I'll present you the script named Wi-Fi Phisher. As it being different from the methods that you've known till now. This script doesn't hack Wi-Fi network's password via Brute Force or WPS PIN...
Üst

Turkhackteam.org internet sitesi 5651 sayılı kanun’un 2. maddesinin 1. fıkrasının m) bendi ile aynı kanunun 5. maddesi kapsamında "Yer Sağlayıcı" konumundadır. İçerikler ön onay olmaksızın tamamen kullanıcılar tarafından oluşturulmaktadır. Turkhackteam.org; Yer sağlayıcı olarak, kullanıcılar tarafından oluşturulan içeriği ya da hukuka aykırı paylaşımı kontrol etmekle ya da araştırmakla yükümlü değildir. Türkhackteam saldırı timleri Türk sitelerine hiçbir zararlı faaliyette bulunmaz. Türkhackteam üyelerinin yaptığı bireysel hack faaliyetlerinden Türkhackteam sorumlu değildir. Sitelerinize Türkhackteam ismi kullanılarak hack faaliyetinde bulunulursa, site-sunucu erişim loglarından bu faaliyeti gerçekleştiren ip adresini tespit edip diğer kanıtlarla birlikte savcılığa suç duyurusunda bulununuz.