FR13NDS IMPERIYA


Гео и язык канала: Узбекистан, Узбекский
Категория: Даркнет


Biz qudratlimiz, biz kopchilikmiz, biz ANONIMMIZ

Связанные каналы

Гео и язык канала
Узбекистан, Узбекский
Категория
Даркнет
Статистика
Фильтр публикаций


Arzon nakrutka bot bormi


Happy birthday to me!


2025☠️






Видео недоступно для предпросмотра
Смотреть в Telegram
#aura


Bu esa matritsia


matritsa degani shunday: Tasavvur qil, sen butun hayoting davomida bitta xonada yashading va derazadan ko‘rinadigan hamma narsa faqat surat edi. Sen o‘ylaysan: “Hamma narsa haqiqiy!” Lekin aslida, tashqarida hamma narsa boshqa joyda yoki boshqa ko‘rinishda.

"Matritsa" degan tushuncha shu haqida: biz yashayotgan dunyo haqiqiy ko‘rinadi, lekin ehtimol u faqat ulkan bir "aldamchi o‘yin"dir. Haqiqatda esa bizni boshqarayotgan yoki kuzatayotgan biror kuch bor, masalan, kompyuter yoki kimdir bizga boshqa dunyoni "ko‘rsatib qo‘ygan".

Bu xuddi "video o‘yinning ichida yashash"ga o‘xshaydi. Haqiqiy ko‘rinadi, lekin aslida o‘yin dunyosi!


Saud akani videosini koʻrganlar tushunadi


simulyatsiya degani shunday: Tasavvur qil, sen video o‘yinda yuribsan. O‘sha o‘yinda daraxtlar, odamlar va hayvonlar bor, lekin ularning barchasi haqiqiy emas — ular kompyuter tomonidan yaratilgan. Haqiqiy dunyoga o‘xshab ko‘rinsa ham, aslida bu faqat o‘yin ichidagi sun’iy dunyo.

Endi tasavvur qil, biz yashayotgan dunyo ham o‘sha o‘yindek bo‘lishi mumkin. Ya’ni, bizning butun dunyomiz — osmonga qaraganda ko‘rinadigan yulduzlar, bizning tanamiz, hatto bizning fikrlarimiz ham — kimdir yaratgan ulkan kompyuter dasturi bo‘lishi mumkin.

Shuning uchun simulyatsiya deganda, haqiqiy ko‘rinadigan, lekin aslida sun’iy yaratilgan dunyo tushuniladi. Bu faqat fikr o‘yini, lekin u juda qiziq!


Nim gaplar yoʻq bob kettilar






#NMAP #PYTHON
🔐 Python yordamida Nmap: Tarmoq xavfsizligini mustahkamlash yo‘li 🔍

Salom, do‘stlar! Bugun sizlarga Python tilida Nmap vositasidan foydalanib, tarmoqni qanday skaner qilish va ochiq portlarni aniqlash haqida ma’lumot beraman.

Nmap — bu tarmoqni tahlil qilish va zaifliklarni aniqlashda ishlatiladigan mashhur vosita. Python esa bu jarayonni avtomatlashtirishni osonlashtiradi. Endi ushbu vositalar bilan ishlashni birga o‘rganamiz!


---

📜 Python kod namunasi

Quyidagi kod orqali siz tarmoqni skaner qilishingiz va natijalarni ko‘rishingiz mumkin:

import nmap

def scan_network(target, ports):
    scanner = nmap.PortScanner()
    print(f"Scanning {target} on ports {ports}...\n")
   
    scanner.scan(target, ports)
    for host in scanner.all_hosts():
        print(f"Host: {host} ({scanner[host].hostname()})")
        print(f"State: {scanner[host].state()}")
        for protocol in scanner[host].all_protocols():
            print(f"\nProtocol: {protocol}")
            for port in scanner[host][protocol]:
                print(f"Port: {port} | State: {scanner[host][protocol][port]['state']}")

# Maqsadli domen yoki IP-manzilni kiriting
target = input("Enter target IP or domain: ")
ports = input("Enter ports to scan (e.g., 22,80,443 or 1-1000): ")
scan_network(target, ports)

✅ Foydalanish usuli

1️⃣ Python’da python-nmap kutubxonasini o‘rnating:

pip install python-nmap


2️⃣ Kodni ishga tushirib, maqsadli IP yoki domenni va portlar diapazonini kiriting.
3️⃣ Natijalar konsolda ko‘rsatiladi: ochiq portlar, tarmoq holati va boshqa ma’lumotlar.


---

❗️ Etik foydalanish haqida

Bu vositani faqat ruxsat etilgan tarmoqlarda va test maqsadlarida ishlatish kerak. Noto‘g‘ri foydalanish huquqiy muammolarga olib kelishi mumkin.


---

📢 Ko‘proq kod va texnologiya yangiliklari uchun bizning kanalga qo‘shiling!
@FR13NDS_IMPERIYA


import subprocess

def find_subdomains(domain):
try:
result = subprocess.check_output(["sublist3r", "-d", domain], text=True)
print("Subdomains found:")
print(result)
with open("domains.txt", "w") as file:
file.write(result)
except Exception as e:
print(f"Error: {e}")

domain = input("Enter the target domain: ")
find_subdomains(domain)


Amaliyot qselar qbsilarda😂 davay parol buzilarchi brutomi daxuya qurol bor parol buzgani


Ochib yurmang😂




Destruction@alex14324 (1).rar
50.2Кб
🪬 Assalomu alaykum, bugun biz sizlarga o'zini virtual olam xudosi deb hisoblagan kambodjalik firibgar Aleks haqidagi barcha ma'lumotlarni oshkor qilamiz.
————————
☠️Sizga personal_information.txt faylini o'qishdan boshlashingizni tavsiya qilamiz




Malware dev lessons

https://x-it.medium.com/lesson-1a-setting-up-your-malware-development-environment-with-visual-studio-and-net-framework-43c6546ac862

https://x-it.medium.com/lesson-1b-using-external-classes-in-c-console-applications-a-step-by-step-guide-741f06740f72

https://x-it.medium.com/lesson-2-collecting-hardware-information-for-malware-development-a0bde03deeee

https://x-it.medium.com/lesson-3-collecting-network-information-for-malware-development-18f25416fd80

https://x-it.medium.com/lesson-4-filtration-techniques-for-malware-development-35b9f4464555

https://x-it.medium.com/lesson-5-browser-theft-in-malware-development-881f1f676022

https://x-it.medium.com/lesson-6-social-theft-in-malware-development-ff4c5dfda739

https://x-it.medium.com/lesson-7-stealing-ftp-clients-with-malware-top-5-popular-source-codes-b9c699ac96e3

https://x-it.medium.com/lesson-8-stealing-vpn-accounts-with-malware-top-4-popular-source-codes-9dbef09eed82

https://x-it.medium.com/lesson-9-stealing-offline-crypto-wallets-with-malware-top-6-popular-source-codes-fe35148894be

https://x-it.medium.com/lesson-10-stealing-accounts-sessions-with-malware-f25217c3b057

https://x-it.medium.com/lesson-11-file-grabbing-made-easy-for-malware-developers-6544f927868c

https://x-it.medium.com/lesson-12-crypto-clipper-stealing-cryptocurrency-like-a-pro-7e47f6cdb413

https://x-it.medium.com/lesson-13-exfiltrating-data-like-a-pro-learn-advanced-techniques-189d3215a727

https://x-it.medium.com/lesson-14-maintaining-persistence-with-malware-development-fd1cde42ee7e

https://x-it.medium.com/014-malware-development-lessons-with-source-code-advance-stealer-development-in-c-53bd16f6b3d



Показано 20 последних публикаций.