Telegram Web
happy 2020 ya'll🥳🥳🥳🥳
Media is too big
VIEW IN TELEGRAM
London got already 2020🤩🥳🥳
🎮 Next-level Gaming
🧩 Don't just play games. Live them. This vr puts you inside of the action of the most exciting games.
🎮 Built for adventure
🧩 Duck. turn. move with an adjustable headset so comfortable you can forget it's even there.
🎮 Lifelike Controler
🧩 Grab on with hands. The controller brung the magic of hands presence to combat, art work and more.....

Any one interested it is Available on hand now hurry🤩🤩🤩


Contact : @zeprogrammer
Hackers Breach ZoneAlarm's Forum Site — Outdated vBulletin to Blame

ZoneAlarm, an internet security software company owned by Israeli cybersecurity firm Check Point Technologies, has suffered a data breach exposing data of its discussion forum users, the company confirmed The Hacker News.

With nearly 100 million downloads, ZoneAlarm offers antivirus software, firewall, and additional virus protection solutions to home PC users, small businesses, and mobile

@zeeprogrammer
​​🔰How to use SOCKS Proxy on FireFox🔰

1. To use it on FireFox, just go to Options.

2. Navigate to the Advanced tab.

3. Then select Network tab and click on the Settings button. A new settings window will appear. From here, you can now input the proxy you got. Just be sure to select the radio selection button for Manual configuration and uncheck the Use this proxy server for all protocols checkbox.

4. Then proceed on inputting your SOCKS proxy, click on OK when finished.

@zeeprogrammer
Frank S. Greene was one of the first black technologists, breaking the color barrier in the local industry. He developed high-speed semiconductor computer memory systems at Fairchild Semiconductor R&D Labs in the 1960s. He started two technology companies and later founded NewVista Capital, a venture firm with a special focus on minority- and female-headed firms.
Greene is one of the 63 inductees into the Silicon Valley Engineering Hall of Fame, conferred by the Silicon Valley Engineering Council. #solutions #entrepreneurs #innovators
MOHA NUR
https://mohanuredris.com/

We'll make sure that you are visible to the digital world with our marvelous website design, digital marketing, graphics designing and social media promotion.
https://www.tgoop.com/Mohanur_tg
MOHA NUR
https://mohanuredris.com/

We'll make sure that you are visible to the digital world with our marvelous website design, digital marketing, graphics designing and social media promotion.
https://www.tgoop.com/Mohanur_tg
Navigation Gestures Premium v1.19.0 @PCAndroidSoftware.apk
3.8 MB
🆔 Navigation Gestures – Swipe Gesture Controls! v1.19.0 (Premium)

♻️ Bring Swipe Gestures To Any Android Device! Replace The Navigation Bar Buttons And Get Gesture Controls.


@zeeprogrammer
Scripting with WebTech

You can use WebTech in any Python script by merely importing the library. This flexibility is the most useful feature of the tool, in my opinion, since you can integrate it into any other script where determining what a website is built on is important.
For example, WebTech could be used as part of a larger fingerprinting script alongside port scans and service enumeration. It would also be useful in exploit scripts, where the details of the exploit change slightly depending on the platform.
Let's write a quick demo script to show it in action. Create your Python file with your text editor of choice — in this case, I'll use nano since it is easy:

~# nano scan.py
import webtech
Then we can start a new instance with the wt variable:

wt = webtech.WebTech()

And start a scan of the desired URL (I had to also set a short timeout or it wouldn't work) and save that to the results variable:

results = wt.start_from_url('https://null-byte.wonderhowto.com/', timeout=1)

Finally, we can print the results of the scan to the screen:

print results
The final script should look like this:
#!/usr/bin/python import webtech wt = webtech.WebTech() results = wt.start_from_url('https://null-byte.wonderhowto.com/', timeout=1) print results

We can now run our script with the python command we set up above:

~# python scan.py Target URL: https://null-byte.wonderhowto.com/ Detected technologies: - jQuery 1.7 - Google Font API - comScore Detected the following interesting custom headers: - Server: WonderHowTo - X-UA-Compatible: IE=Edge,chrome=1 - X-Server-Name: APP03

Here we can see that we've obtained the same results as before. Keep in mind, this was just a simple proof-of-concept — we could make this a lot more robust if we wanted.
What this does is prove how potentially useful WebTech could be when integrating it into other scripts or tools.
Wrapping Up

In this article, we learned about WebTech — a Python tool used to identify website technologies.
We saw how to install it with pip and run it from the command line with ease. We also explored its true power, the ability to be used as a Python library, by writing our little script. WebTech makes it easy to get to know your target during the recon phase, giving you the advantage when planning an attack.
Ever wondered how to package Python apps for windows? This article teaches you how!! 🚀

🧤 http://bit.ly/2MNZQuP

Read this article NOW to find how to include even sqlite dbs and picture. A really in depth article 💥

@zeeprogrammer
Cross promotion
Contact @zeprogrammer
2025/06/30 08:04:13
Back to Top
HTML Embed Code: