Last active
May 24, 2025 04:10
-
-
Save argaghulamahmad/9a2f9db371550ce6178b8a5140d9c231 to your computer and use it in GitHub Desktop.
New Profile
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| [{"context":"PC Security Channel","queries":"How to know if your PC is hacked? Digital Forensics 101\nHow to know if your PC is hacked? Suspicious Network Activity 101\nHow to tell if your Wifi is hacked?\nIs your PC hacked? RAM Forensics with Volatility","id":"1aa13e9f-77ce-4361-beff-5541d3d224ba","createdAt":"2025-05-23T06:13:16.928Z"},{"context":"CyberFlow","queries":"A Step-By-Step Guide to Hacking ANY Wi-Fi Password.\nCDP & LLDP | FREE CCNA 200-301 Cisco Course\ncybersecurity is easy, actually...\nDHCP | FREE CCNA 200-301 Cisco Course\nDomain Name System (DNS) | FREE CCNA 200-301 Cisco Course\nEthernet Switching | FREE CCNA 200-301 Cisco Course\nFREE CCNA 200-301 Cisco Course #1 | Networking Basics\nFREE CCNA 200-301 Cisco Course #2 | OSI Model\nFREE CCNA 200-301 Cisco Course #3 | TCP/IP\nFREE CCNA 200-301 Cisco Course #8 | CLI\nHackers Are Just Professional Googlers\nHow To Hack Social Media Accounts\nHow Anti-Cheat Software Really Works\nHow Every CTF Turns Into a MENTAL Breakdown!\nHow EVERY Pentest Turns Into a DUMPSTER FIRE!\nHow to Access the Dark Web (Safely)\nHow To ACTUALLY Become an Ethical Hacker!\nHow to Control Any PC From ANYWHERE!\nHow To Crack ANY Password! (Full Tutorial)\nHow To Find Information on ANY Phone Number\nHow to Hack Passwords Using Hydra!\nHow to Learn Hacking (2025) - a Practical Guide\nHow to Scan ANY Website for Vulnerabilities!\nHow To Test Your Website For Unexpected Errors\nI Hacked 200,000 Emails by Accident (Here’s How)\nIf You Only Learn 3 Things About Hacking, Learn This\nInter-VLAN Routing | FREE CCNA 200-301 Cisco Course\nIPv4 Explained pt.1 | FREE CCNA 200-301 Cisco Course #9\nIPv4 Explained pt.2 | FREE CCNA 200-301 Cisco Course #10\nLAN Security and Device Hardening | FREE CCNA 200-301 Cisco Course\nLearn Kali Linux in 5 minutes!\nLost 1000€ Because of a QR Scam.\nNetwork Security Concepts | FREE CCNA 200-301 Cisco Course\nNetworking For Hackers: The Only Guide You’ll Ever Need!\nNetworking Models, Devices and Components| FREE CCNA 200-301 Cisco Course\nRouting Concepts | FREE CCNA 200-301 Cisco Course\nSocial Media OSINT: Find Information about ANYONE!\nSPAM | 007 | SY0-601 CompTIA Security+ Free Course\nSQL Injection explained in 69 Seconds. #sql #injection #sqlinjection\nSY0-601 CompTIA Security+ Practice Exam #1\nThe Best Way to Learn Bug Bounty Hunting\nThis FREE Trick Exposes ALL Your Passwords (Thanks, Google!) #google #shorts\nWatering Holes Attacks | 006 | SY0-601 CompTIA Security+ Free Course\nWhat is CLI?| FREE CCNA 200-301 Cisco Course\nWhat Your Hacking Tool Says About YOU!\nWhat Your Terminal Setup Says About YOU!\nWhy EVERY Hacker Learns the HARD WAY!\nWhy Most ‘Cybersecurity Advice’ is Useless\nWhy Script Kiddies Are WINNING! And It’s Terrifying\nWI-FI Hacking: Step by Step Guide","id":"2ba63a98-bef9-4fed-842b-ea69b52cece8","createdAt":"2025-05-24T04:08:15.750Z"},{"context":"NetworkChuck","queries":"AI can handle the boring stuff!\nAm I Too OLD to Become a Network Engineer? Study for CCNA | CCNP?\nAsk Me Anything\ncan my daughters decode this?!?\nChatGPT has a BIG problem...\nChatGPT Operator is expensive....use this instead (FREE + Open Source)\nData Center NETWORKS (what do they look like??) // FREE CCNA // EP 7\nDeepSeek in Deep Trouble! (Internal database exposed)\nditch Google!! (build your own PRIVATE search engine)\nDo you know your protocols?\nEXPOSE your home network to the INTERNET!! (it's safe)\nFrom CCNA to CLOUD DevOps Engineer (the path) // AWS, Azure, Linux, Python\nGet your CCNA RIGHT NOW!! (before the new CCNA 200-301)\nGoogle is forcing you to use their proxy (build your own instead)\nHow Big Companies Get Hacked\nhow the OSI model works on YouTube (Application and Transport Layers) // FREE CCNA // EP 5\nHow to grow as a HACKER // ft. NahamSec (a hacker)\nhow to HACK a password // password cracking with Kali Linux and HashCat\nHow to Setup a Raspberry Pi LEARNING Desktop (Linux, Hacking, Coding)\nHow to Stop Procrastinating and Study for Your CCNA CCNP\nHow to Study for IT Certifications (and KILL IT!!)\nHow to Upgrade/Activate a License on a Cisco ASA (Adaptive Security Appliance)\nI use this everyday\nInstagram OSiNT\nintro to cloud hacking (leaky buckets)\nlearn to HACK (the best way) // ft. John Hammond\nlet’s play with a ZERO-DAY vulnerability “follina”\nmy beard isn’t real // FREE Security+ // EP 5\nmy kids built a HACKING computer!! (i almost died)\nREAL LIFE example!! (TCP/IP and OSI layers) // FREE CCNA // EP 4\nsetup a FREE VPN server in the cloud (AWS)\nShould I Use a Brain Dump on my CCNA/CCNP/MCSA Exam?\nshould you get a Cisco certification? CCNA? CCNP? // A DEBATE (feat. the Packet Thrower)\nSQL Injections are scary!! (hacking tutorial for beginners)\nThe Dark Web NEEDS You!\nthe FrankeNAS - (Raspberry Pi, Zima Board, Dell Server, Ugreen) // a CEPH Tutorial\nThe new ChatGPT just dropped….it solves a big problem\nThe open-source Alexa\nThe tools to learn Python, Linux, Cisco 🔥🔥 HURRY\nTwitter OSiNT (Ethical Hacking)\nwe PASSED the CCNA!! (how to pass the CCNA in 2020)\nWhat if you forgot EVERYTHING? - Re-Learning IT after MEMORY LOSS w/ Shawn Powers | Linux | CCNA\nWhy do I work so hard?\nWhy you need to learn Azure RIGHT NOW!! (become a cloud engineer) ft. The Packet Thrower\nYou CAN Learn Python - 10 WINNERS!! - CCNA | CCNP Network Engineer\nyou need to learn Ansible RIGHT NOW!! (Linux Automation)\nyou need to learn BASH Scripting RIGHT NOW!! // EP 1\nyou NEED to learn Windows RIGHT NOW!!\nYou're going to get Hacked in 2025\nyour first Hacking certification (PenTest+)","id":"414fcfe2-0a32-4c4f-bb3f-6aff56c64c7e","createdAt":"2025-05-24T04:09:36.054Z"},{"context":"Loi Liang Yang","queries":"3 signs your computer's HACKED!\n3 Signs Your Phone Has Been Hacked! Protect your phone from hackers now!\nAccess Android Over Internet (Cybersecurity)\nadvanced SQL injection\nAndroid Debug Bridge (ADB)\nAndroid Remote Access from Web Browser\nAre you Human or Machine? AWS WAF CAPTCHA To Protect Your Website Against Robots\nAWS GuardDuty EC2 Runtime Monitoring\nAWS Security Lake demo | OpenSearch - Zero ETL\nChange MAC Address On Linux And Windows!\nCloud Security Explained! Hear from a Pro Hacker!\ncome and join this WiFi :) nothing will happen...\nCreate a Network of Machines in VirtualBox\nCross-Site Request Forgery Explained! Learn Cybersecurity Now!\ncross-site scripting (XSS) explained and demonstrated by pro hacker\nDo Not Click On Any Unknown Links On Your Phone! Hackers Can Break Into Your Phone Once You Click!\ndo not click this link!\ndo not open this excel sheet!\nDo not store your credit card on any website! else, hackers can gain access to it!\nFirefox Access Addons (Cybersecurity)\nHACKERLOI.pdf\nHow Hacker Install Browser\nHow Hackers Login To Any Websites Without Password?!\nhow hackers recover any deleted files?!?!\nHow I Would Learn Cyber Security If I Could Start Over | Amazon Principal Security Engineer\nhow to Install Kali Linux into Raspberry Pi 5!\nhow to Install Kali Linux Into your Phone!\nHOW TO RESET Administrator PASSWORD and Unlock any PCs?!\nIntrusion Detection System with Snort Rules Creation\nIs Linux Really Unhackable???\njadx basic tutorial - mobile app analysis (TECHNICAL TUTORIAL)\nKali Linux Explained!\nNoSQL Injection Tutorial For Beginners\npro hacker teaches you how to bypass this!\nproduct security on website\nQRadar SIEM\nQRadar Threat Simulation - Security Monitoring\nremotely control any PC with an Excel sheet!?\nRemotely Control Any PCs with this FREE software!\nRemotely Control Any TV with PC\nRun Processes As Defaultuser0\nSecure Your Servers From Hackers Using CHKROOTKIT\nSecurity Intelligence & Events Monitoring (SIEM) Platform\nSQL Injection For Beginners\nTrack A Phone's Location With IP Address (Cybersecurity tutorial)\nTurn Your Mac Into A Penetration Testing Toolbox\nWeb Application Analysis: OWASP ZAP\nWhat Happens If You Click On Phishing Links?\nWhat Type Of Hacker Are You? #shorts\nyes, your phone is already hacked","id":"c19ec03b-ea94-4bea-82b6-49e39468f072","createdAt":"2025-05-24T04:10:12.684Z"}] |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment