
Kubotor Infotech
@Kubotortech
Followers
26
Following
62
Media
52
Statuses
67
Kubotor is an organisation built on an aim to Promote Cyber Security Awareness and to Boost Security of Individuals and Organisations
New Delhi, India
Joined August 2019
Abhijeet Singh Conducted a Seminar on Cyber Security at @CT_University. #seminar #cyber #security #cybersecurity #awareness #ctu #ctuniversity #cyberwarfare #infosec #like #share #likeforlikes #shareforshare
0
1
5
π¨ Day 7: Shodan Dorking Unauthenticated Telnet = instant open door for attackers. π. #CyberSafety #CybersecurityTraining
0
0
1
π Day 6: Shodan Dorking.Exposed MongoDB databases = sensitive data at risk. π¨.A single misconfigured database can leak thousands of records in minutes. Lock it down before attackers find it first. π. #cybersecuritytips #cyberday
0
2
3
Day 5: Shodan Dorking.Even βInstallation Successfulβ messages can expose sensitive setups like OneInStack to the internet. π.For attackers, this is a roadmap straight into your systems. π¨. Always secure your deployments before going live. π. #dorking #Cybersecurity
0
1
5
Day 4: Shodan Dorking.Exposed βCreate Admin Accountβ panels are like an open invitation for attackers. π¨.A single weak endpoint can put your entire system at risk. Harden your defenses before someone else takes control. π. #Cybersecurity #CyberAttack
0
1
2
π Day 3: Shodan Dorking.Default directory listings might seem harmless, but they often expose sensitive files to the world. π.One careless misconfiguration = open doors for attackers. π¨. Stay sharp, stay secure. π. #Cybersecurity #CyberAwareness
0
2
3
This Ganesh Chaturthi, let wisdom and protection walk hand in hand. πβ¨ . #GaneshChaturthi2025 #Cybersecurity
1
1
3
π Day 1: Shodan Dorking .Ever wondered how attackers find exposed systems? .Using queries like this they can spot anonymous FTP logins in seconds. Stay tuned, this is just the beginning of a cyber security learning series. #Cybersecurity #CyberAwareness #Trending
1
2
4
Shodan Dorking π.Uncover exposed devices & services with advanced queries, but always ethically. Stay sharp, stay secure with Kubotor. π. #cyberhelp #cybersafety
1
1
3
Day 7 GitHub Dorking. Use queries to uncover exposed creds in public repos. Stay sharp, stay secure. #Cybersecurity #githubactions
0
0
2
Day 6 | GitHub Dorking.Secure your code, protect your users with Kubotor π . #githubactions #Cybersecurity
0
0
3
β³ 1 Day To Go!.Join our exclusive Masterclass on Dictionaries of Brute Force Attacks with @Avi_Sonic_X.π
Sunday, 24 Aug.ποΈ Only 30 slots left β secure yours now!
0
3
4
Day 5: Attackers can uncover npm auth tolkens with a single query!. #Cybersecurity #githubactions
0
0
2
Day 4: GitHub Dorking π¨. These files can hold DB credentials and service configs. One exposed file could hand over your entire environment. #cybersecurity #github #kubotor
0
0
1
Day 3: How to spot AWS keys hiding in config files?. Remember: If itβs public, itβs public for everyone. Follow @kubotorinfotech for much such content. #CyberSecurity #GitHub
0
0
2
Day 2: GitHub Dorking π¨.Exposes Git credentials often username:password combos for repos. One leak could open the door to your entire codebase. #cybersecutiy #gitbub #dorking
0
0
2
Day 1: GitHub Dorking 101 π¨. Find exposed environment variables API keys, DB credentials, and more. One search could reveal critical secrets. #github #dorking #cybersecurity
2
1
7
π OTP is your digital key donβt hand it to a stranger! Even a single mistake can open the door to fraud, theft, or account loss. Keep it secret. Keep it safe. #CyberSecurity.#Kubotor
0
0
3