Channel Avatar

cyber blockz @UCubRxAfRcsHRWApCqGwUE8A@youtube.com

22K subscribers - no pronouns :c

"Welcome to CyberBlockz, your go-to destination for all thin


Welcoem to posts!!

in the future - u will be able to do some more stuff here,,,!! like pat catgirl- i mean um yeah... for now u can only see others's posts :c

cyber blockz
Posted 5 days ago

Hey everyone! 😊

If you are preparing for the CEH exam and want to test your skills? I've created detailed CEH v12 and v13 mock tests to help you out! These tests are designed to mirror the real exam format, and also many of the questions can repeat in the exam or will be in same format. so if you are really writing CEH exam buy this mock tests!!

📅 Limited Time Offer:
👉 Only ₹399 for both versions!
👉 Referral link expires in 5 days – don’t miss out!
👉 www.udemy.com/course/certified-ethical-hacker-v12-…

15 - 0

cyber blockz
Posted 1 week ago

Wow, 10,000 subscribers! 😱 I honestly can’t believe it. Thank you so much to everyone who’s supported the channel—whether you’ve been here from the start or just joined. I really appreciate every single like, comment, and share.

This is just the beginning, and I’m so excited for what’s next. Let’s keep growing together!

Much love,
Pranay

24 - 2

cyber blockz
Posted 4 weeks ago

Hello guys andharu ela unaru..? and next videos ki suggestions ivandi.. channel ki kotha aythey telugu lo mana channel lo cover cheysina topics a telugu cybersecurity channel cover cheyaru so once check out our content nachuthey do share it with your friends.. Thanks for always supporting our channel.

11 - 4

cyber blockz
Posted 1 month ago

Burp suite Part 2 in Telugu will be uploaded tomorrow morning 11 am.
Thank you for your support

4 - 0

cyber blockz
Posted 1 month ago

batch 2 Ethical Hacking Course live class will start from September 15th interested can check out the links below for syllabus and duration explained https://youtu.be/2meFwOffgeg forms.gle/QdV9m15hc9as3YhY9

25 - 0

cyber blockz
Posted 2 months ago

Which of the following methods can be used to securely authenticate to a remote server using SSH?

8 - 0

cyber blockz
Posted 3 months ago

which of the tool is most used to brute force login pages

17 - 0

cyber blockz
Posted 4 months ago

Which of the following tools can help find open ports and services?

15 - 0

cyber blockz
Posted 5 months ago

You're a cybersecurity analyst tasked with performing subdomain enumeration on a target domain to identify potential security risks. Which Gobuster command below would you use for this task?

13 - 2

cyber blockz
Posted 5 months ago

Robert, a security expert, has been assigned by a colleague to conduct a network scan to identify an HTTP website along with its version details and the OS it's running on. Which of the following commands should Robert use?

12 - 0