β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to remotely install applications on an Android smartphone ?
1) Open the Play Store in a browser
If you have a link to the app, you can follow it in a browser on any device and then go to step 3.
It usually starts with visiting the Play Store through the device's browser. If it's an iPhone or Mac, you can use the Safari browser. The store link looks like play.google.com/store.
2) Find the app page in the store
You can jump directly to the application you want if you have a link to the page. Alternatively, you can search the store by name. It is possible to filter search results. For example, select only apps in a tab in the left menu. You can click "See More" next to the "Applications" section in the search results.
3) Remote installation of the application
Click on the "Install" button. If the app is already installed on the device, this is reported. You need to sign in to your Google account, which is used on the Android device.
If you are already signed in and you are not using this Android device, you can change your account by clicking on your profile picture in the upper right corner.
4) You will see a list of Android devices associated with this account, including tablets and Android TVs. If the currently selected device is not where you will install the application, click on the name of the desired device in the drop-down menu. After selecting, click "Continue".
5) If this is the first time you do this, a window will appear asking when authorization is required. Whichever option you choose, a password is always required for a remote installation. You can also add the need to enter a password when shopping.
Select the option you want and click Save. After the download is complete, a message appears that the application is being installed
6) Return to your smartphone and the installation of the application will begin. The duration depends on the connection speed.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to remotely install applications on an Android smartphone ?
1) Open the Play Store in a browser
If you have a link to the app, you can follow it in a browser on any device and then go to step 3.
It usually starts with visiting the Play Store through the device's browser. If it's an iPhone or Mac, you can use the Safari browser. The store link looks like play.google.com/store.
2) Find the app page in the store
You can jump directly to the application you want if you have a link to the page. Alternatively, you can search the store by name. It is possible to filter search results. For example, select only apps in a tab in the left menu. You can click "See More" next to the "Applications" section in the search results.
3) Remote installation of the application
Click on the "Install" button. If the app is already installed on the device, this is reported. You need to sign in to your Google account, which is used on the Android device.
If you are already signed in and you are not using this Android device, you can change your account by clicking on your profile picture in the upper right corner.
4) You will see a list of Android devices associated with this account, including tablets and Android TVs. If the currently selected device is not where you will install the application, click on the name of the desired device in the drop-down menu. After selecting, click "Continue".
5) If this is the first time you do this, a window will appear asking when authorization is required. Whichever option you choose, a password is always required for a remote installation. You can also add the need to enter a password when shopping.
Select the option you want and click Save. After the download is complete, a message appears that the application is being installed
6) Return to your smartphone and the installation of the application will begin. The duration depends on the connection speed.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Google
Android Apps on Google Play
Enjoy millions of the latest Android apps, games, music, movies, TV, books, magazines & more. Anytime, anywhere, across your devices.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Termux root packages manual install :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/termux/termux-root-packages
2) cd termux-root-packages
3) If you want to build a package with the docker container run
./start-builder.sh ./build-package.sh name-of-package
4) You might have to run the command as root, if you have not configured docker to be run as your user.
5) To build outside the docker container you can run
> git submodule update --init
6) ./termux-packages/build-package.sh ../packages/package-to-build)
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Termux root packages manual install :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/termux/termux-root-packages
2) cd termux-root-packages
3) If you want to build a package with the docker container run
./start-builder.sh ./build-package.sh name-of-package
4) You might have to run the command as root, if you have not configured docker to be run as your user.
5) To build outside the docker container you can run
> git submodule update --init
6) ./termux-packages/build-package.sh ../packages/package-to-build)
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - termux/termux-root-packages: Termux packages that are only usable by root users.
Termux packages that are only usable by root users. - termux/termux-root-packages
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 UPDATED LIST BEST VOICE CHANGERS FOR IOS & ANDROID :
https://apps.apple.com/ua/app/robovox-voice-changer/id584847250
https://play.google.com/store/apps/details?id=com.mikrosonic.RoboVoxLite
https://play.google.com/store/apps/details?id=app.call.changer.voice.recorder
https://apps.apple.com/app/prank-voice-changer-plus/id1385337974?l=en
https://play.google.com/store/apps/details?id=com.baviux.voicechanger&hl=en_US
https://apps.apple.com/app/funny-call/id392640258
https://play.google.com/store/apps/details?id=piper.app.maniya.callvoicechanger
https://apps.apple.com/us/app/funcall-voice-changer-rec/id775837930
https://play.google.com/store/apps/details?id=com.fun.funcalls
https://apps.apple.com/app/bendybooth-face-voice-changer/id1054793717
https://play.google.com/store/apps/details?id=com.iapp.livefacefilters
https://apps.apple.com/app/voice-changer-sound-recorder/id1006625490
https://play.google.com/store/apps/details?id=com.androidrocker.voicechanger&hl=en
https://apps.apple.com/us/app/celebrity-voice-changer-face/id1111710488
https://play.google.com/store/apps/details?id=com.CelebrityVoiceChanger.best.voice.fx.funny.lite
https://apps.apple.com/us/app/voice-changer-sound-effects/id649637699
https://play.google.com/store/apps/details?id=com.bagon.voicechanger
https://apps.apple.com/app/sound-blaster-voicefx/id714636639
https://play.google.com/store/apps/details?id=com.mobzapp.voicefx
https://apps.apple.com/ng/app/voice-changer-plus/id339440515
https://play.google.com/store/apps/details?id=com.e3games.voicechanger&hl=en_GB
https://apps.apple.com/us/app/voice-changer-change-
tones/id1028313523
https://play.google.com/store/apps/details?id=com.wondershare.voicechanger
https://apps.apple.com/us/app/change-voice-with-audio-effects/id1189261977
https://play.google.com/store/apps/details?id=studio.onepixel.voicechanger
https://apps.apple.com/us/app/voice-changer/id680063805
https://play.google.com/store/apps/details?id=com.androbaby.voicechanger&hl=en_GB
https://apps.apple.com/us/app/voice-changer-app-soundboard-effects-for-vine/id910447989
https://play.google.com/store/apps/details?id=com.tct.soundrecorder
E N J O Y :)
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 UPDATED LIST BEST VOICE CHANGERS FOR IOS & ANDROID :
https://apps.apple.com/ua/app/robovox-voice-changer/id584847250
https://play.google.com/store/apps/details?id=com.mikrosonic.RoboVoxLite
https://play.google.com/store/apps/details?id=app.call.changer.voice.recorder
https://apps.apple.com/app/prank-voice-changer-plus/id1385337974?l=en
https://play.google.com/store/apps/details?id=com.baviux.voicechanger&hl=en_US
https://apps.apple.com/app/funny-call/id392640258
https://play.google.com/store/apps/details?id=piper.app.maniya.callvoicechanger
https://apps.apple.com/us/app/funcall-voice-changer-rec/id775837930
https://play.google.com/store/apps/details?id=com.fun.funcalls
https://apps.apple.com/app/bendybooth-face-voice-changer/id1054793717
https://play.google.com/store/apps/details?id=com.iapp.livefacefilters
https://apps.apple.com/app/voice-changer-sound-recorder/id1006625490
https://play.google.com/store/apps/details?id=com.androidrocker.voicechanger&hl=en
https://apps.apple.com/us/app/celebrity-voice-changer-face/id1111710488
https://play.google.com/store/apps/details?id=com.CelebrityVoiceChanger.best.voice.fx.funny.lite
https://apps.apple.com/us/app/voice-changer-sound-effects/id649637699
https://play.google.com/store/apps/details?id=com.bagon.voicechanger
https://apps.apple.com/app/sound-blaster-voicefx/id714636639
https://play.google.com/store/apps/details?id=com.mobzapp.voicefx
https://apps.apple.com/ng/app/voice-changer-plus/id339440515
https://play.google.com/store/apps/details?id=com.e3games.voicechanger&hl=en_GB
https://apps.apple.com/us/app/voice-changer-change-
tones/id1028313523
https://play.google.com/store/apps/details?id=com.wondershare.voicechanger
https://apps.apple.com/us/app/change-voice-with-audio-effects/id1189261977
https://play.google.com/store/apps/details?id=studio.onepixel.voicechanger
https://apps.apple.com/us/app/voice-changer/id680063805
https://play.google.com/store/apps/details?id=com.androbaby.voicechanger&hl=en_GB
https://apps.apple.com/us/app/voice-changer-app-soundboard-effects-for-vine/id910447989
https://play.google.com/store/apps/details?id=com.tct.soundrecorder
E N J O Y :)
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Making it Rain shells in Kubernetes
180.7 KB
THIS WILL HELP YOU TO CREATE YOUR OWN SHELL :
Following on from the last post in this series lets setup a rather more ambitious set ofreverse shells when attacking a Kubernetes cluster.The scenario here is that weβve got the ability to create a daemonset object in atarget Kubernetes cluster and weβd like to have shells on every node in the clusterwhich have the Docker socket exposed, so we can get a root shell on every node inthe cluster.To do this weβll need something thatβll easily handle multiple incoming shells, so weβllturn to the Metasploit Framework and specifically, exploit/multi/handler
Following on from the last post in this series lets setup a rather more ambitious set ofreverse shells when attacking a Kubernetes cluster.The scenario here is that weβve got the ability to create a daemonset object in atarget Kubernetes cluster and weβd like to have shells on every node in the clusterwhich have the Docker socket exposed, so we can get a root shell on every node inthe cluster.To do this weβll need something thatβll easily handle multiple incoming shells, so weβllturn to the Metasploit Framework and specifically, exploit/multi/handler
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦FOR WHATSAPP + USERS AND OUTDATED ONE
-- LAST WHATSAPP CVE :
> The real history aboutCVE-2019-3568 Detail
1) This vulnerability has been modified since it was last analyzed by the NVD.
2) It is awaiting reanalysis which may result in further changes to the information provided.
> Current Description
A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of RTCP packets sent to a target phone number.
The issue affects WhatsApp for Android prior to v2.19.134, WhatsApp Business for Android prior to v2.19.44, WhatsApp for iOS prior to v2.19.51, WhatsApp Business for iOS prior to v2.19.51, WhatsApp for Windows Phone prior to v2.18.348, and WhatsApp for Tizen prior to v2.18.15.
π¦CVE-2020-1894
A stack write overflow in WhatsApp for Android prior to v2.20.35, WhatsApp Business for Android prior to v2.20.20, WhatsApp for iPhone prior to v2.20.30, and WhatsApp Business for iPhone prior to v2.20.30 could have allowed arbitrary code execution when playing a specially crafted push to talk message.
> CVE-2020-1891
A user controlled parameter used in video call in WhatsApp for Android prior to v2.20.17, WhatsApp Business for Android prior to v2.20.7, WhatsApp for iPhone prior to v2.20.20, and WhatsApp Business for iPhone prior to v2.20.20 could have allowed an out-of-bounds write on 32-bit devices.
> CVE-2020-1890
A URL validation issue in WhatsApp for Android prior to v2.20.11 and WhatsApp Business for Android prior to v2.20.2 could have caused the recipient of a sticker message containing deliberately malformed data to load an image from a sender-controlled URL without user interaction.
> CVE-2020-1889
A security feature bypass issue in WhatsApp Desktop versions prior to v0.3.4932 could have allowed for sandbox escape in Electron and escalation of privilege if combined with a remote code execution vulnerability inside the sandboxed renderer process.
> CVE-2020-1886
A buffer overflow in WhatsApp for Android prior to v2.20.11 and WhatsApp Business for Android prior to v2.20.2 could have allowed an out-of-bounds write via a specially crafted video stream after receiving and answering a malicious video call.
> CVE-2019-11928
An input validation issue in WhatsApp Desktop versions prior to v0.3.4932 could have allowed cross-site scripting upon clicking on a link from a specially crafted live location message.
#wiki + whatsapp
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦FOR WHATSAPP + USERS AND OUTDATED ONE
-- LAST WHATSAPP CVE :
> The real history aboutCVE-2019-3568 Detail
1) This vulnerability has been modified since it was last analyzed by the NVD.
2) It is awaiting reanalysis which may result in further changes to the information provided.
> Current Description
A buffer overflow vulnerability in WhatsApp VOIP stack allowed remote code execution via specially crafted series of RTCP packets sent to a target phone number.
The issue affects WhatsApp for Android prior to v2.19.134, WhatsApp Business for Android prior to v2.19.44, WhatsApp for iOS prior to v2.19.51, WhatsApp Business for iOS prior to v2.19.51, WhatsApp for Windows Phone prior to v2.18.348, and WhatsApp for Tizen prior to v2.18.15.
π¦CVE-2020-1894
A stack write overflow in WhatsApp for Android prior to v2.20.35, WhatsApp Business for Android prior to v2.20.20, WhatsApp for iPhone prior to v2.20.30, and WhatsApp Business for iPhone prior to v2.20.30 could have allowed arbitrary code execution when playing a specially crafted push to talk message.
> CVE-2020-1891
A user controlled parameter used in video call in WhatsApp for Android prior to v2.20.17, WhatsApp Business for Android prior to v2.20.7, WhatsApp for iPhone prior to v2.20.20, and WhatsApp Business for iPhone prior to v2.20.20 could have allowed an out-of-bounds write on 32-bit devices.
> CVE-2020-1890
A URL validation issue in WhatsApp for Android prior to v2.20.11 and WhatsApp Business for Android prior to v2.20.2 could have caused the recipient of a sticker message containing deliberately malformed data to load an image from a sender-controlled URL without user interaction.
> CVE-2020-1889
A security feature bypass issue in WhatsApp Desktop versions prior to v0.3.4932 could have allowed for sandbox escape in Electron and escalation of privilege if combined with a remote code execution vulnerability inside the sandboxed renderer process.
> CVE-2020-1886
A buffer overflow in WhatsApp for Android prior to v2.20.11 and WhatsApp Business for Android prior to v2.20.2 could have allowed an out-of-bounds write via a specially crafted video stream after receiving and answering a malicious video call.
> CVE-2019-11928
An input validation issue in WhatsApp Desktop versions prior to v0.3.4932 could have allowed cross-site scripting upon clicking on a link from a specially crafted live location message.
#wiki + whatsapp
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦WEB HACKING
WPForce is a suite of Wordpress Attack tools. Currently this contains 2 scripts - WPForce, which brute forces logins via the API, and Yertle, which uploads shells once admin credentials have been found. Yertle also contains a number of post exploitation modules.
F E A T U R E S :
Brute Force via API, not login form bypassing some forms of protection
Can automatically upload an interactive shell
Can be used to spawn a full featured reverse shell
Dumps WordPress password hashes
Can backdoor authentication function for plaintext
password collection
Inject BeEF hook into all pages
Pivot to meterpreter if needed
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/n00py/WPForce.git
2) cd WPForce
3) python wpforce.py -i usr.txt -w pass.txt -u "http://www.[website].com"
4) python wpforce.py -i for all commands
use for learn !!
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦WEB HACKING
WPForce is a suite of Wordpress Attack tools. Currently this contains 2 scripts - WPForce, which brute forces logins via the API, and Yertle, which uploads shells once admin credentials have been found. Yertle also contains a number of post exploitation modules.
F E A T U R E S :
Brute Force via API, not login form bypassing some forms of protection
Can automatically upload an interactive shell
Can be used to spawn a full featured reverse shell
Dumps WordPress password hashes
Can backdoor authentication function for plaintext
password collection
Inject BeEF hook into all pages
Pivot to meterpreter if needed
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/n00py/WPForce.git
2) cd WPForce
3) python wpforce.py -i usr.txt -w pass.txt -u "http://www.[website].com"
4) python wpforce.py -i for all commands
use for learn !!
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - n00py/WPForce: Wordpress Attack Suite
Wordpress Attack Suite. Contribute to n00py/WPForce development by creating an account on GitHub.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦POPULAR CRACKING TOOLS :
https://wpscan.org/
https://nmap.org/
https://cisofy.com/lynis/
https://www.aircrack-ng.org/
https://github.com/vanhauser-thc/THC-Archive
https://www.wireshark.org/
https://github.com/rapid7/metasploit-framework
https://gitlab.com/kalilinux/packages/skipfish/
https://www.paterva.com/web7/buy/maltego-clients.php
https://www.tenable.com/try
https://portswigger.net/burp
https://github.com/iBotPeaches/Apktool
http://sqlmap.org/
https://www.snort.org/#get-started
https://www.sleuthkit.org/autopsy/
https://github.com/securestate/king-phisher
https://gitlab.com/kalilinux/packages/nikto/
https://github.com/tomac/yersinia
https://www.trustedsec.com/social-engineer-toolkit-set/
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦POPULAR CRACKING TOOLS :
https://wpscan.org/
https://nmap.org/
https://cisofy.com/lynis/
https://www.aircrack-ng.org/
https://github.com/vanhauser-thc/THC-Archive
https://www.wireshark.org/
https://github.com/rapid7/metasploit-framework
https://gitlab.com/kalilinux/packages/skipfish/
https://www.paterva.com/web7/buy/maltego-clients.php
https://www.tenable.com/try
https://portswigger.net/burp
https://github.com/iBotPeaches/Apktool
http://sqlmap.org/
https://www.snort.org/#get-started
https://www.sleuthkit.org/autopsy/
https://github.com/securestate/king-phisher
https://gitlab.com/kalilinux/packages/nikto/
https://github.com/tomac/yersinia
https://www.trustedsec.com/social-engineer-toolkit-set/
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
WPScan
WPScan CLI Scanner Install + User Guide
The WPScan CLI tool is a free, for non-commercial use, black box WordPress security scanner written for security professionals and blog maintainers to test the security of their sites.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to install & check Java version- Linux:
1) Java version control
Java uses semantic versioning. Versions of the ready-to-release releases are presented as follows:
MAJOR.MINOR.SECURITY
> For example, in Java 11.0.8, 11 is the major version, 0 is the minor version, and 8 is the security version.
MAJOR - Major releases contain new features and capabilities.
MINOR - Minor releases contain various bug fixes and compatibility improvements.
SECURITY - Security releases contain critical security fixes.
2) Checking Java version
To find out what version of Java is installed on your system, run the java -version command:
> java -version
3) The command will display the default Java version:
> openjdk 11.0.8 2020-07-14
4) OpenJDK Runtime Environment (build 11.0.8 + 10-post-Ubuntu-0ubuntu120.04)
> OpenJDK 64-Bit Server VM (build 11.0.8 + 10-post-Ubuntu-0ubuntu120.04, mixed mode, sharing)
5) In this example 11.0.8 we have Java version installed on our system. The version installed on your system may be different.
> If you got the message (Ubuntu, Debian):
6) Command 'java' not found, but can be installed with:
7) this means Java is not installed on the system.
The system can also have multiple Java versions installed at the same time. To check if you have multiple Java installations on your machine:
> sudo update-alternatives --config java
8) If you only have one Java installation, the output will look something like this:
> There is only one alternative in link group java (providing / usr / bin / java): / usr / lib / jvm / java-11-openjdk-amd64 / bin / java
> Nothing to configure.
9) Otherwise, if you have multiple Java installations, the command will display a menu where you can choose which version will be the default Java version:
There are 3 choices for the alternative java (providing / usr / bin / java).
10) Selection Path Priority Status
* 0 / usr / lib / jvm / java-11-openjdk-amd64 / bin / java 1111
auto mode
1 / usr / lib / jvm / java-11-openjdk-amd64 / bin / java 1111 manual mode
2 / usr / lib / jvm / java-8-openjdk-amd64 / jre / bin / java 1081 manual mode
11) Press <enter> to keep the current choice [*], or type selection number
DONE :)
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to install & check Java version- Linux:
1) Java version control
Java uses semantic versioning. Versions of the ready-to-release releases are presented as follows:
MAJOR.MINOR.SECURITY
> For example, in Java 11.0.8, 11 is the major version, 0 is the minor version, and 8 is the security version.
MAJOR - Major releases contain new features and capabilities.
MINOR - Minor releases contain various bug fixes and compatibility improvements.
SECURITY - Security releases contain critical security fixes.
2) Checking Java version
To find out what version of Java is installed on your system, run the java -version command:
> java -version
3) The command will display the default Java version:
> openjdk 11.0.8 2020-07-14
4) OpenJDK Runtime Environment (build 11.0.8 + 10-post-Ubuntu-0ubuntu120.04)
> OpenJDK 64-Bit Server VM (build 11.0.8 + 10-post-Ubuntu-0ubuntu120.04, mixed mode, sharing)
5) In this example 11.0.8 we have Java version installed on our system. The version installed on your system may be different.
> If you got the message (Ubuntu, Debian):
6) Command 'java' not found, but can be installed with:
> apt install default-jre
> apt install openjdk-11-jre-headless
> apt install openjdk-8-jre-headless
7) this means Java is not installed on the system.
The system can also have multiple Java versions installed at the same time. To check if you have multiple Java installations on your machine:
> sudo update-alternatives --config java
8) If you only have one Java installation, the output will look something like this:
> There is only one alternative in link group java (providing / usr / bin / java): / usr / lib / jvm / java-11-openjdk-amd64 / bin / java
> Nothing to configure.
9) Otherwise, if you have multiple Java installations, the command will display a menu where you can choose which version will be the default Java version:
There are 3 choices for the alternative java (providing / usr / bin / java).
10) Selection Path Priority Status
* 0 / usr / lib / jvm / java-11-openjdk-amd64 / bin / java 1111
auto mode
1 / usr / lib / jvm / java-11-openjdk-amd64 / bin / java 1111 manual mode
2 / usr / lib / jvm / java-8-openjdk-amd64 / jre / bin / java 1081 manual mode
11) Press <enter> to keep the current choice [*], or type selection number
DONE :)
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Post Exploitation_ Empire.pdf
583.9 KB
#full with pictures- For beginers
ss7.pdf
150.2 KB
All you need to know about SS7 Attack :
1. WhatIsSignaling?
2. WhatIsOut-of-BandSignaling?
3. SignalingNetworkArchitechture
4. TheNorthAmericanSignalingArchitecture
5. BasicSignalingArchitecture
6. SS7LinkTypes
7. BasicCallSetupExample
8. DatabaseQueryExample
9. LayersoftheSS7Protocol
10. WhatGoesOvertheSignalingLink
11. AddressingintheSS7Network
12. SignalUnitStructure
13. WhatAretheFunctionsoftheDifferentSignalingUnits?
14. Message Signal Unit Structure
1. WhatIsSignaling?
2. WhatIsOut-of-BandSignaling?
3. SignalingNetworkArchitechture
4. TheNorthAmericanSignalingArchitecture
5. BasicSignalingArchitecture
6. SS7LinkTypes
7. BasicCallSetupExample
8. DatabaseQueryExample
9. LayersoftheSS7Protocol
10. WhatGoesOvertheSignalingLink
11. AddressingintheSS7Network
12. SignalUnitStructure
13. WhatAretheFunctionsoftheDifferentSignalingUnits?
14. Message Signal Unit Structure
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to get the new Android 11 media controls on any smartphone ?
1) Install Power Shade
An app called Power Shade gives you access to new media controls in quick settings. You can download the application from the link
https://play.google.com/store/apps/details?id=com.treydev.pns&hl
2) Enabling Accessibility Service
After installing the application, open it and click the "Accessibility" switch. The system settings menu will open, where you need to enable Power Shade at the top and click OK in the window that appears
3) Enabling the notification service
Click back to return to the app. Click on the "Notifications" switch and you will be taken to another screen of system settings. Activate the Power Shade switch and give permission in the window that appears. Press back again.
4) Make sure the integration with the media player
The feature should be enabled by default. If not, click in the main application menu "More". Scroll down to the Integrate media players in quick settings radio button. Activate it and then on the main screen of the app, turn off the Running switch and turn it back on to apply the changes.
5) Try the new functionality
Open your media player and start music. Swipe down on the status bar to open a miniature version of quick settings. The new controls will be located below. You can play, pause and skip tracks, you can click on this interface to open the music application.
A new button will appear in the upper right corner of the controls called Phone speaker. Here you can specify the device to which you will transfer music. Swipe down on the status bar again to open Advanced View. There are all the same controls as in the mini version, but there are also "Like" and "Dislike" buttons if your music playback application has them. There is also a progress bar when playing audio files.
6) Unlike Android 11, the controls remain in the Notifications section of the lock screen. This makes it easier to access them. On Android 11, they are always in quick settings, so you have to make an extra gesture. If you have different streaming services, you can swipe left and right on a tile to switch between controls for different media applications.
ENJOY β€οΈππ»
WRITTEN BY
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to get the new Android 11 media controls on any smartphone ?
1) Install Power Shade
An app called Power Shade gives you access to new media controls in quick settings. You can download the application from the link
https://play.google.com/store/apps/details?id=com.treydev.pns&hl
2) Enabling Accessibility Service
After installing the application, open it and click the "Accessibility" switch. The system settings menu will open, where you need to enable Power Shade at the top and click OK in the window that appears
3) Enabling the notification service
Click back to return to the app. Click on the "Notifications" switch and you will be taken to another screen of system settings. Activate the Power Shade switch and give permission in the window that appears. Press back again.
4) Make sure the integration with the media player
The feature should be enabled by default. If not, click in the main application menu "More". Scroll down to the Integrate media players in quick settings radio button. Activate it and then on the main screen of the app, turn off the Running switch and turn it back on to apply the changes.
5) Try the new functionality
Open your media player and start music. Swipe down on the status bar to open a miniature version of quick settings. The new controls will be located below. You can play, pause and skip tracks, you can click on this interface to open the music application.
A new button will appear in the upper right corner of the controls called Phone speaker. Here you can specify the device to which you will transfer music. Swipe down on the status bar again to open Advanced View. There are all the same controls as in the mini version, but there are also "Like" and "Dislike" buttons if your music playback application has them. There is also a progress bar when playing audio files.
6) Unlike Android 11, the controls remain in the Notifications section of the lock screen. This makes it easier to access them. On Android 11, they are always in quick settings, so you have to make an extra gesture. If you have different streaming services, you can swipe left and right on a tile to switch between controls for different media applications.
ENJOY β€οΈππ»
WRITTEN BY
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Google Play
Power Shade: Notification Bar - Apps on Google Play
Personalized custom notifications for a better user interface and experience.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to skip intros, end credits, and other unnecessary things on YouTube on Android ?
1) Install YouTube Vanced
YouTube Vanced is a third-party YouTube app with tools not found in the official app. Among other things, it offers a dark graphics theme and several YouTube Premium features, such as background playback.
After complaining about the complexity of the installation process, the developer of this open source application has combined all the tools into one application called Vanced Manager. You need to download the Vanced Manager APK and use the manager to third-party install the other two files. You will then be able to work with YouTube Vanced.
2) Enabling Sponsor Block
Once installed, launch YouTube Vanced and select the avatar icon in the upper right corner. Then open the settings. Select Sponsor Block Settings and activate the Enable Sponsor Block (beta) radio button.
3) Configuring Sponsor Block
On the next page, in the "What to do with different segments" section, there is a list of all video sections, which allows you to skip unnecessary parts of the video. Each setting is marked with its own color, which will appear on the progress bar when watching a video. This shows where the unneeded content is.
4) The first option will automatically skip the fragment and display a message about it. This is the default for all segments. The second option displays a small "Skip" button in the right corner of the video. The last option leaves everything as it is.
5) Testing
Open the video in Vanced and look at the progress bar. If you see sections of different colors, everything worked out. If there are no colors, Sponsor Block users have not marked this video and its sections will not be automatically skipped.
When watching a video, parts of the introduction, messages about sponsors, and other sections you do not need may be cut out. You will receive notifications about this.
6) Helping the community (optional)
Sponsor Block is an open source project, which means that anyone can add tags to every video on YouTube. You can do this too. To do this, return to the Sponsor Block settings page and activate the "Enable adding a new segment" switch.
Now, when playing a video, a new icon appears in the upper left corner. It looks like a play button inside a shield. When you click on this button, a toolbox is displayed (if you hold the smartphone in portrait orientation). These tools provide the ability to add segments to the video. You can use tools to mark distractions in your video.
Disclaimer : This article is written for educational purposes only. The author or publisher did not publish this tutorial for malicious purposes. If readers would like to use the information for personal gain, then the author and the publisher are not responsible for any harm or damage caused.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to skip intros, end credits, and other unnecessary things on YouTube on Android ?
1) Install YouTube Vanced
YouTube Vanced is a third-party YouTube app with tools not found in the official app. Among other things, it offers a dark graphics theme and several YouTube Premium features, such as background playback.
After complaining about the complexity of the installation process, the developer of this open source application has combined all the tools into one application called Vanced Manager. You need to download the Vanced Manager APK and use the manager to third-party install the other two files. You will then be able to work with YouTube Vanced.
2) Enabling Sponsor Block
Once installed, launch YouTube Vanced and select the avatar icon in the upper right corner. Then open the settings. Select Sponsor Block Settings and activate the Enable Sponsor Block (beta) radio button.
3) Configuring Sponsor Block
On the next page, in the "What to do with different segments" section, there is a list of all video sections, which allows you to skip unnecessary parts of the video. Each setting is marked with its own color, which will appear on the progress bar when watching a video. This shows where the unneeded content is.
4) The first option will automatically skip the fragment and display a message about it. This is the default for all segments. The second option displays a small "Skip" button in the right corner of the video. The last option leaves everything as it is.
5) Testing
Open the video in Vanced and look at the progress bar. If you see sections of different colors, everything worked out. If there are no colors, Sponsor Block users have not marked this video and its sections will not be automatically skipped.
When watching a video, parts of the introduction, messages about sponsors, and other sections you do not need may be cut out. You will receive notifications about this.
6) Helping the community (optional)
Sponsor Block is an open source project, which means that anyone can add tags to every video on YouTube. You can do this too. To do this, return to the Sponsor Block settings page and activate the "Enable adding a new segment" switch.
Now, when playing a video, a new icon appears in the upper left corner. It looks like a play button inside a shield. When you click on this button, a toolbox is displayed (if you hold the smartphone in portrait orientation). These tools provide the ability to add segments to the video. You can use tools to mark distractions in your video.
Disclaimer : This article is written for educational purposes only. The author or publisher did not publish this tutorial for malicious purposes. If readers would like to use the information for personal gain, then the author and the publisher are not responsible for any harm or damage caused.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β