Disclaimer - Everything thought here is for ethical purposes only do not attempt to use any of this tool for malicious purposes as SLYTECH will not take responsibility for that. ... https://www.youtube.com/watch?v=xecExDKHrAc
I would show you how to find a device location in few minutes.
There are instances where our devices have been stolen and the thieves go on to make use of it, soliciting for funds from our friends and family.
In this video i would show you how you can track a device location using social engineering skills and this is done in a few minutes!! you too can put this to use.
Contribute & Support the channel - https://bit.ly/3G0MQfB
website - slytech.org
contact me:
Twitter: https://twitter.com/slytech_org
Instagram: https://instagram.com/slytech_org
Disclaimer - Whatever is shared on this channel is aimed at enlightening individuals and the public as to how easy such types of attacks can be orchestrated and how to protect ourselves. So whatever you learn here is for educational purposes only and should not be carried out without permission. SLYTECH nor Sly Uduosa is responsible for what you do with this knowledge.
Track a device with Kali Linux
How hackers track a device location
How hackers can find you
How to find a thief with your phone
...
https://www.youtube.com/watch?v=fSF7Yjg6p3Y
Companies expose themselves to the internet and that is detrimental. How to check for sure exposure and protect your company.
Netlas.io
Patreon.com/slytech
Instagram - @slytech_org
slytech.org
Like | Comment | Subscribe
Warning- This tutorial is here for ETHICAL PURPOSES ONLY do not attempt to hack anyone as it is an illegal offense and SLYTECH is not responsible for that.
...
https://www.youtube.com/watch?v=GT48696uEq4
Today I’ll be taking a look at Dark Utilities one of the greatest underground trending tools which assists with creating payloads that bypasses antivirus and anti-amalware.
We are basically looking at how stealth it is and this is done in a virtual environment as no one was attacked using this tool.
Follow us on the following platforms:
Website - https://slytech.org
Twitter - @slytech_org
Instagram - @slytech_org
Patreon - https://patreon.com/slytech
Odysee- https://odysee.com/@SLYTECH:1
Telegram - https://t.me/slytechorg
Disclaimer - Everything thought here is for ethical purposes only do not attempt to use any of this tool for malicious purposes as SLYTECH will not take responsibility for that.
...
https://www.youtube.com/watch?v=zn75iXvfM1w
Welcome to the long awaited tutorial series of HOW TO USE BURPSUITE TO DISCOVER WEB VULNERABILITIES. In this video we’ll be installing Burpsuite and a purposely vulnerable web application (OWASP BWA) in order to become more acquainted with the tool.
Follow us on the following platforms:
Website - slytech.org
Twitter - @slytech_org
Instagram - @slytech_org
Patreon - https://patreon.com/slytech
Odysee- https://odysee.com/@SLYTECH:1
Telegram - https://t.me/slytechorg
Disclaimer - Everything thought here is for ethical purposes only do not attempt to use any of this tool for malicious purposes as SLYTECH will not take responsibility for that.
...
https://www.youtube.com/watch?v=2EeshkFhvvA
This video shows how changes to a website content preying on the HTTP Parameter Pollution can be done.
Contribute & Support the channel - https://bit.ly/3G0MQfB
website - slytech.org
Follow us on all platforms feel free to ask questions i would always be available to respond.
Twitter: https://twitter.com/slytech_org
Instagram: https://instagram.com/slytech_org
Disclaimer - This video tutorial is only for educational purposes only, practice what you learn within your own lab or on others ONLY WITH PERMISSION. SLYTECH nor Sly Uduosa is responsible for what you do with this knowledge.
...
https://www.youtube.com/watch?v=Ji1zQ4y5ZqQ
Today we’ll be setting up an SSH server on Kali Linux. It usually comes pre-installed on Kali Linux but if you don’t see it then this video will help you. If you’ve also messed up the configuration files, then this tutorial will also help you with how to restore it.
Website - slytech.org
Twitter - @slytech_org
Instagram - @slytech_org
Patreon - patreon.com/slytech
Odysee- https://odysee.com/@SLYTECH:1
Telegram - https://t.me/slytechorg
Locals- slytech.locals.com
Disclaimer - Everything thought here is for ethical purposes only do not attempt to use any of this tool for malicious purposes as SLYTECH will not take responsibility for that.
...
https://www.youtube.com/watch?v=uqfdhBZf9g0
You need to watch this video if you want to protect your Windows Computer.
Companies Exposed- https://youtu.be/GT48696uEq4
Patreon.com/slytech
Instagram - @slytech
slytech.org
Like | Comment | Subscribe
Wanna sponsor an episode?
Email - sponsor@slytech.org
Warning- This tutorial is here for ETHICAL PURPOSES ONLY do not attempt to hack anyone as it is an illegal offense and SLYTECH is not responsible for that.
...
https://www.youtube.com/watch?v=VaK9Ekn9NJ4
OTP's are good but a website implementing them must take extra effort to avoid it being bypassed..
Like | Comment | Subscribe
You Can Reach Us On
Instagram - @slytech_org
Twitter - @slytech
Website - slytech.org
...
https://www.youtube.com/watch?v=OP8Wm7uRD04