β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Let's analyse together: Critical vulnerabilities in the architecture of Intel, AMD and ARM processors :
How fortunate that critical vulnerabilities in the architecture of Intel, AMD and ARM processors were published while we were resting.
1) We did not have time to change the equipment, as recommended by US-CERT, as it turned out that it was enough to update the operating systems.
Well, the manufacturers had time to release updates.
2)So, what is the bottom line at the moment.
There are two vulnerabilities - Meltdown ("Crash") and Specter ("Ghost").
3)Meltdown allows you to break the barrier between applications and the internal memory of the operating system, which opens access to the data stored in the memory of the OS.
Detailed description https://meltdownattack.com/meltdown.pdf.
4)Well, there are also exploits, for example: https://github.com/paboldin/meltdown-exploit.
5)Specter breaks memory isolation between applications themselves: conventionally, one service can crawl into the memory of another.
Description https://spectreattack.com/spectre.pdf. They say exploiting the vulnerability is more difficult, but there are still exploits: https://github.com/crozone/SpectrePoC, https://github.com/Eugnis/spectre-attack.
In general, a nightmare! Update, definitely!
Fears about 30% loss of productivity in practice are not justified
Microsoft:
Windows Server 2008 R2 Service Pack 1, Windows 7 Service Pack 1 - KB4056897 or KB4056894
Windows Server 2012 Standard - KB4056899 or KB4056896
Windows 8.1, Windows Server 2012 R2 Standard - KB4056898 or KB4056895
Windows 10 Enterprise - KB4056893
Windows 10 Version 1607, Windows Server 2016 , Windows 10 Mobile - KB4056890
Windows 10 Version 1703 - KB4056891
Windows 10 version 1709 - KB4056892
π¦There may be problems installing the patch due to the antivirus.
Provided a list of antiviruses that block the patch: BitDefender, Carbon Black, Cisco, CrowdStrike, Cylance, Cyren, Endgame, Fortinet, G-DATA, McAfee, Nyotron, Palo-Alto, SentinelOne, Sophos, Trend Micro, VIPRE, Webroot.
Modifying or creating the following registry key may help resolve the issue:
?
Key="HKEY_LOCAL_MACHINE"Subkey="SOFTWARE\Microsoft\Windows\CurrentVersion\QualityCompat"
Value Name="cadca5fe-87d3-4b96-b7fb-a231484277cc"
Type="REG_DWORD"
Data="0x00000000"
Very short on performance: tests with the Windows 10 update showed a decrease in various performance parameters by 1-2%.
Details: http://www.guru3d.com/articles-pages/windows-vulnerability-cpu-meltdown-patch-benchmarked.html.
Linux:
Everything is simple, you need a kernel 4.14.12, 4.9.75 or 4.4.110. There are no updates for other branches, but they have a bunch of other unpatched vulnerabilities, so they are not recommended for use.
Apple:
Meltdown has been fixed in iOS 11.2, macOS 10.13.2, and tvOS 11.2. No update is required for watchOS.
Specter, Apple claims, is only practically exploitable via JavaScript in a web browser, so they will keep Safari updated. This patch, as well as the Axis Specter patches, are pending.
Google:
Android with the patch from 2018-01-05 is protected.
Chrome 64 adds Specter protection, but is set to release on January 23rd. For now, if you wish, you can enable Site Isolation to protect against attacks.
Your not allowed to copy our tutorials
!@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Let's analyse together: Critical vulnerabilities in the architecture of Intel, AMD and ARM processors :
How fortunate that critical vulnerabilities in the architecture of Intel, AMD and ARM processors were published while we were resting.
1) We did not have time to change the equipment, as recommended by US-CERT, as it turned out that it was enough to update the operating systems.
Well, the manufacturers had time to release updates.
2)So, what is the bottom line at the moment.
There are two vulnerabilities - Meltdown ("Crash") and Specter ("Ghost").
3)Meltdown allows you to break the barrier between applications and the internal memory of the operating system, which opens access to the data stored in the memory of the OS.
Detailed description https://meltdownattack.com/meltdown.pdf.
4)Well, there are also exploits, for example: https://github.com/paboldin/meltdown-exploit.
5)Specter breaks memory isolation between applications themselves: conventionally, one service can crawl into the memory of another.
Description https://spectreattack.com/spectre.pdf. They say exploiting the vulnerability is more difficult, but there are still exploits: https://github.com/crozone/SpectrePoC, https://github.com/Eugnis/spectre-attack.
In general, a nightmare! Update, definitely!
Fears about 30% loss of productivity in practice are not justified
Microsoft:
Windows Server 2008 R2 Service Pack 1, Windows 7 Service Pack 1 - KB4056897 or KB4056894
Windows Server 2012 Standard - KB4056899 or KB4056896
Windows 8.1, Windows Server 2012 R2 Standard - KB4056898 or KB4056895
Windows 10 Enterprise - KB4056893
Windows 10 Version 1607, Windows Server 2016 , Windows 10 Mobile - KB4056890
Windows 10 Version 1703 - KB4056891
Windows 10 version 1709 - KB4056892
π¦There may be problems installing the patch due to the antivirus.
Provided a list of antiviruses that block the patch: BitDefender, Carbon Black, Cisco, CrowdStrike, Cylance, Cyren, Endgame, Fortinet, G-DATA, McAfee, Nyotron, Palo-Alto, SentinelOne, Sophos, Trend Micro, VIPRE, Webroot.
Modifying or creating the following registry key may help resolve the issue:
?
Key="HKEY_LOCAL_MACHINE"Subkey="SOFTWARE\Microsoft\Windows\CurrentVersion\QualityCompat"
Value Name="cadca5fe-87d3-4b96-b7fb-a231484277cc"
Type="REG_DWORD"
Data="0x00000000"
Very short on performance: tests with the Windows 10 update showed a decrease in various performance parameters by 1-2%.
Details: http://www.guru3d.com/articles-pages/windows-vulnerability-cpu-meltdown-patch-benchmarked.html.
Linux:
Everything is simple, you need a kernel 4.14.12, 4.9.75 or 4.4.110. There are no updates for other branches, but they have a bunch of other unpatched vulnerabilities, so they are not recommended for use.
Apple:
Meltdown has been fixed in iOS 11.2, macOS 10.13.2, and tvOS 11.2. No update is required for watchOS.
Specter, Apple claims, is only practically exploitable via JavaScript in a web browser, so they will keep Safari updated. This patch, as well as the Axis Specter patches, are pending.
Google:
Android with the patch from 2018-01-05 is protected.
Chrome 64 adds Specter protection, but is set to release on January 23rd. For now, if you wish, you can enable Site Isolation to protect against attacks.
Your not allowed to copy our tutorials
!@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Everything you need to know about Google Stadia :
#FastTips
1) On June 12, Google fixed one of the main shortcomings of the Stadia service: it is now available on any Android device, whether it is on the official support list or not. In addition, all OnePlus models from OnePlus 5 will support Stadia.
2) To use Stadia on a device without official support, you need to download the Stadia app, open the βExperimentsβ tab, click βPlayβ. The service should work without problems.
3) Last year Google announced the Stream project. This was a limited test built around Assassin's Creed Odyssey. After a short period of testing in January, the project ended and Google said nothing about its future plans to stream games. Stadia was announced at GDC 2019.
4) The idea of ββstreaming is far from new. However, Google's service may turn out to be one of the most ambitious.
Google Stadia is a game streaming service to any user's device. It can be a TV, smartphone, laptop, tablet. In any case, you will be able to access the most advanced games.
How is this possible? Google servers process the image of the games and broadcast it. The user only needs a device with a screen. This gives everyone access to high quality games with high system requirements. Including those who cannot afford to buy an expensive gaming computer or console.
π¦Supported platforms
The cloud service works with a Chromecast Ultra device when connected to a TV. Chrome browser is supported on computers, laptops and tablets, including Chrome OS. Among smartphones, Google Pixel 2, Pixel 3, Pixel 3a and Pixel 4 are supported.
In February, support for the following smartphones appeared:
Samsung Galaxy S8
Samsung Galaxy S8 Plus
Samsung Galaxy S8 Active
Samsung Galaxy Note 8
Samsung Galaxy S9
Samsung Galaxy S9 Plus
..../.......
5) in June it was announced that all Android smartphones will be able to work with Stadia. Even those that are not included in the above list. You can install the Stadia application on them, open the "Experiments" tab and click "Play".
6) Since this is a cloud service, all the heavy processing is done by other people's computers remotely. You can work with a smartphone, tablet or even a weak computer, the quality will be equally high. Users of the service will receive the computing power of a custom AMD 2.7 GHz x86 processor, 16 GB of RAM, data transfer rates up to 484 GB / s and a GPU with a capacity of 10.7 teraflops.
This makes Google's platform more powerful than any game console on the market. In addition, Google will be responsible for updates and users will not have to do anything.
Of course, the quality of the games will depend on your internet connection. Playing on Chromecast Ultra, you can get 4K support with HDR and 5.1 surround sound if you have a TV, sound system, and fast enough internet to support it all.
π¦Can I try Stadia for free?
Yes. Google has announced a two-month free trial for Stadia Pro. Any owner of supported devices can play several games on the service for free. They can buy additional games to play and stream. After the trial period ends, you can renew your Stadia Pro subscription for $ 9.99 per month. You can unsubscribe at any time before the end of the trial period.
Your not allowed to copy our tutorials
!@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Everything you need to know about Google Stadia :
#FastTips
1) On June 12, Google fixed one of the main shortcomings of the Stadia service: it is now available on any Android device, whether it is on the official support list or not. In addition, all OnePlus models from OnePlus 5 will support Stadia.
2) To use Stadia on a device without official support, you need to download the Stadia app, open the βExperimentsβ tab, click βPlayβ. The service should work without problems.
3) Last year Google announced the Stream project. This was a limited test built around Assassin's Creed Odyssey. After a short period of testing in January, the project ended and Google said nothing about its future plans to stream games. Stadia was announced at GDC 2019.
4) The idea of ββstreaming is far from new. However, Google's service may turn out to be one of the most ambitious.
Google Stadia is a game streaming service to any user's device. It can be a TV, smartphone, laptop, tablet. In any case, you will be able to access the most advanced games.
How is this possible? Google servers process the image of the games and broadcast it. The user only needs a device with a screen. This gives everyone access to high quality games with high system requirements. Including those who cannot afford to buy an expensive gaming computer or console.
π¦Supported platforms
The cloud service works with a Chromecast Ultra device when connected to a TV. Chrome browser is supported on computers, laptops and tablets, including Chrome OS. Among smartphones, Google Pixel 2, Pixel 3, Pixel 3a and Pixel 4 are supported.
In February, support for the following smartphones appeared:
Samsung Galaxy S8
Samsung Galaxy S8 Plus
Samsung Galaxy S8 Active
Samsung Galaxy Note 8
Samsung Galaxy S9
Samsung Galaxy S9 Plus
..../.......
5) in June it was announced that all Android smartphones will be able to work with Stadia. Even those that are not included in the above list. You can install the Stadia application on them, open the "Experiments" tab and click "Play".
6) Since this is a cloud service, all the heavy processing is done by other people's computers remotely. You can work with a smartphone, tablet or even a weak computer, the quality will be equally high. Users of the service will receive the computing power of a custom AMD 2.7 GHz x86 processor, 16 GB of RAM, data transfer rates up to 484 GB / s and a GPU with a capacity of 10.7 teraflops.
This makes Google's platform more powerful than any game console on the market. In addition, Google will be responsible for updates and users will not have to do anything.
Of course, the quality of the games will depend on your internet connection. Playing on Chromecast Ultra, you can get 4K support with HDR and 5.1 surround sound if you have a TV, sound system, and fast enough internet to support it all.
π¦Can I try Stadia for free?
Yes. Google has announced a two-month free trial for Stadia Pro. Any owner of supported devices can play several games on the service for free. They can buy additional games to play and stream. After the trial period ends, you can renew your Stadia Pro subscription for $ 9.99 per month. You can unsubscribe at any time before the end of the trial period.
Your not allowed to copy our tutorials
!@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦WIFI HACKING & TUTORIALS :)
https://www.youtube.com/watch?v=63qZzmGPFLI
https://github.com/FluxionNetwork/fluxion
https://github.com/wifiphisher/wifiphisher
(tutorial https://wifiphisher.org/)
https://www.aircrack-ng.org/
https://www.pcmag.com/how-to/how-to-hack-wi-fi-passwords
https://www.guru99.com/how-to-hack-wireless-networks.html
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦WIFI HACKING & TUTORIALS :)
https://www.youtube.com/watch?v=63qZzmGPFLI
https://github.com/FluxionNetwork/fluxion
https://github.com/wifiphisher/wifiphisher
(tutorial https://wifiphisher.org/)
https://www.aircrack-ng.org/
https://www.pcmag.com/how-to/how-to-hack-wi-fi-passwords
https://www.guru99.com/how-to-hack-wireless-networks.html
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦LINUX EXPLOITS :
Highly probable - assessed kernel is most probably affected and there's a very good chance that PoC exploit will work out of the box without any major modifications.
Probable - it's possible that exploit will work but most likely customization of PoC exploit will be needed to suit your target.
Less probable - additional manual analysis is needed to verify if kernel is affected.
Unprobable - highly unlikely that kernel is affected (exploit is not displayed in the tool's output)
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) wget https://raw.githubusercontent.com/mzet-/linux-exploit-suggester/master/linux-exploit-suggester.sh -O les.sh
2) Details about LES usage and inner workings:
3) https://mzet-.github.io/2019/05/10/les-paper.html
Additional resources for the LES:
https://github.com/mzet-/les-res
4) Purpose
LES tool is designed to assist in detecting security deficiencies for given Linux kernel/Linux-based machine. It provides following functionality:
Assessing kernel exposure on publicly known exploits
Tool assesses (using heuristics methods discussed in details here) exposure of the given kernel on every publicly known Linux kernel exploit. Example of tool output:
5) $ ./linux-exploit-suggester.sh
...
[+] [CVE-2017-16995] eBPF_verifier
Details: https://ricklarabee.blogspot.com/2018/07/ebpf-and-analysis-of-get-rekt-linux.html
> Exposure: highly probable
Tags: debian=9.0{kernel:4.9.0-3-amd64},fedora=25|26|27,[ ubuntu=14.04 ]{kernel:4.4.0-89-generic},ubuntu=(16.04|17.04)
> {kernel:4.(8|10).0-(19|28|45)-generic}
Download URL: https://www.exploit-db.com/download/45010
Comments: CONFIG_BPF_SYSCALL needs to be set && kernel.unprivileged_bpf_disabled != 1
https://github.com/mzet-/linux-exploit-suggester
don't clone our tutorials
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦LINUX EXPLOITS :
Highly probable - assessed kernel is most probably affected and there's a very good chance that PoC exploit will work out of the box without any major modifications.
Probable - it's possible that exploit will work but most likely customization of PoC exploit will be needed to suit your target.
Less probable - additional manual analysis is needed to verify if kernel is affected.
Unprobable - highly unlikely that kernel is affected (exploit is not displayed in the tool's output)
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) wget https://raw.githubusercontent.com/mzet-/linux-exploit-suggester/master/linux-exploit-suggester.sh -O les.sh
2) Details about LES usage and inner workings:
3) https://mzet-.github.io/2019/05/10/les-paper.html
Additional resources for the LES:
https://github.com/mzet-/les-res
4) Purpose
LES tool is designed to assist in detecting security deficiencies for given Linux kernel/Linux-based machine. It provides following functionality:
Assessing kernel exposure on publicly known exploits
Tool assesses (using heuristics methods discussed in details here) exposure of the given kernel on every publicly known Linux kernel exploit. Example of tool output:
5) $ ./linux-exploit-suggester.sh
...
[+] [CVE-2017-16995] eBPF_verifier
Details: https://ricklarabee.blogspot.com/2018/07/ebpf-and-analysis-of-get-rekt-linux.html
> Exposure: highly probable
Tags: debian=9.0{kernel:4.9.0-3-amd64},fedora=25|26|27,[ ubuntu=14.04 ]{kernel:4.4.0-89-generic},ubuntu=(16.04|17.04)
> {kernel:4.(8|10).0-(19|28|45)-generic}
Download URL: https://www.exploit-db.com/download/45010
Comments: CONFIG_BPF_SYSCALL needs to be set && kernel.unprivileged_bpf_disabled != 1
https://github.com/mzet-/linux-exploit-suggester
don't clone our tutorials
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - mzet-/les-res: Additional resources and references for linux-exploit-suggester.sh
Additional resources and references for linux-exploit-suggester.sh - mzet-/les-res
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to get rid of SMS Trojans WinLock (Windows Blocker) :
1) "Get Accelerator" (Trojan-Ransom.Win32.Agent.gc)
The first example of a Trojan ransomware that caused a large-scale outbreak was a malicious product self-named "Get Accelerator". It was entered into the Kaspersky Lab database as Trojan-Ransom.Win32.Agent.gc, Dr. The Web calls it "Trojan.Winlock.366" and BitDefender heuristically identified it as "Gen: Trojan.Heur.Hype.cy4@aSUBebjk ".
We saw the first cases of infection with this program around the middle of October last year. By the beginning of the third decade, there was a sharp surge in infection, which, by the way, was repeated towards the end of the year; epidemic outbreaks are clearly visible on the summary graph of search queries, compiled according to the analytical service LiveInternet.
2) "Get Accelerator" was, in essence, one of the primitive representatives of the "ransomware factory" products. The user was presented with a normal application window without controls, which is relatively easy to make in a visual programming environment, with a couple of threatening labels and a timer; in this case, the correct operation of the network connection was disrupted, which did not allow the user to access the Internet.
3) malware consisted of two components - the driver % WinDir% \ dmgr134.sys and the injectable dynamic link library % system32% \ {991F0AD1-DA5D-4dc3-B0BA-F46BA0F1D3CB} .dll; both components were clearly visible in the results of the study of the AVZ system, their names were fixed, which made it possible to draw up standard recommendations for their removal:
To remove a typical Trojan-Ransom.Win32.Agent.gc (Get Accelerator) from a regular home or office PC, you need to execute a script in AVZ:
<div style = "margin: 20px; margin-top: 5px ">
<div class =" smallfont "style =" margin-bottom: 2px "> Code:
<pre class =" alt2 β³ dir = "ltr" style = "
margin: 0px;
padding: 6px;
border: 1px inset;
width: 640px;
height: 210px;
text-align: left;
overflow: auto "> begin
SearchRootkit (true, true);
SetAVZGuardStatus (true);
QuarantineFile ('% WinDir% \ dmgr134.sys', ");
QuarantineFile ('% System32% \ {991F0AD1-DA5D-4dc3-B0BA-F46BA0F1D3CB} .dll', ");
DeleteFile ('% System32% \ {991F0AD1-DA5D-4dc3-B0BA-F46BA0F1D3CB} .dll');
DeleteFile ('% WinDir% \ dmgr134.sys');
BC_ImportALL;
ExecuteSysClean;
BC_Activate;
RebootWindows (true);
end. </pre> The
operating system will reboot.
4) "uFast Download Manager" (Trojan-Ransom.Win32.SMSer.qm, Trojan.Win32.Agent.dapb)
The second representative of the family was the so-called. βUFast Download Managerβ named βTrojan-Ransom.Win32.SMSer.qmβ and βTrojan.Win32.Agent.dapbβ in the databases of Kaspersky Lab and βTrojan.Botnetlog.11β - according to Dr. Web; BitDefender re-identified the malware heuristically, naming it "BehavesLike: Trojan.UserStartup".
The attack by this malicious program occurred in early November, when the first wave of Get Accelerator had already been extinguished. An epidemic surge is clearly visible again on the search query graph, although it was not as powerful as in the previous sample.
don't clone our tutorials
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to get rid of SMS Trojans WinLock (Windows Blocker) :
1) "Get Accelerator" (Trojan-Ransom.Win32.Agent.gc)
The first example of a Trojan ransomware that caused a large-scale outbreak was a malicious product self-named "Get Accelerator". It was entered into the Kaspersky Lab database as Trojan-Ransom.Win32.Agent.gc, Dr. The Web calls it "Trojan.Winlock.366" and BitDefender heuristically identified it as "Gen: Trojan.Heur.Hype.cy4@aSUBebjk ".
We saw the first cases of infection with this program around the middle of October last year. By the beginning of the third decade, there was a sharp surge in infection, which, by the way, was repeated towards the end of the year; epidemic outbreaks are clearly visible on the summary graph of search queries, compiled according to the analytical service LiveInternet.
2) "Get Accelerator" was, in essence, one of the primitive representatives of the "ransomware factory" products. The user was presented with a normal application window without controls, which is relatively easy to make in a visual programming environment, with a couple of threatening labels and a timer; in this case, the correct operation of the network connection was disrupted, which did not allow the user to access the Internet.
3) malware consisted of two components - the driver % WinDir% \ dmgr134.sys and the injectable dynamic link library % system32% \ {991F0AD1-DA5D-4dc3-B0BA-F46BA0F1D3CB} .dll; both components were clearly visible in the results of the study of the AVZ system, their names were fixed, which made it possible to draw up standard recommendations for their removal:
To remove a typical Trojan-Ransom.Win32.Agent.gc (Get Accelerator) from a regular home or office PC, you need to execute a script in AVZ:
<div style = "margin: 20px; margin-top: 5px ">
<div class =" smallfont "style =" margin-bottom: 2px "> Code:
<pre class =" alt2 β³ dir = "ltr" style = "
margin: 0px;
padding: 6px;
border: 1px inset;
width: 640px;
height: 210px;
text-align: left;
overflow: auto "> begin
SearchRootkit (true, true);
SetAVZGuardStatus (true);
QuarantineFile ('% WinDir% \ dmgr134.sys', ");
QuarantineFile ('% System32% \ {991F0AD1-DA5D-4dc3-B0BA-F46BA0F1D3CB} .dll', ");
DeleteFile ('% System32% \ {991F0AD1-DA5D-4dc3-B0BA-F46BA0F1D3CB} .dll');
DeleteFile ('% WinDir% \ dmgr134.sys');
BC_ImportALL;
ExecuteSysClean;
BC_Activate;
RebootWindows (true);
end. </pre> The
operating system will reboot.
4) "uFast Download Manager" (Trojan-Ransom.Win32.SMSer.qm, Trojan.Win32.Agent.dapb)
The second representative of the family was the so-called. βUFast Download Managerβ named βTrojan-Ransom.Win32.SMSer.qmβ and βTrojan.Win32.Agent.dapbβ in the databases of Kaspersky Lab and βTrojan.Botnetlog.11β - according to Dr. Web; BitDefender re-identified the malware heuristically, naming it "BehavesLike: Trojan.UserStartup".
The attack by this malicious program occurred in early November, when the first wave of Get Accelerator had already been extinguished. An epidemic surge is clearly visible again on the search query graph, although it was not as powerful as in the previous sample.
don't clone our tutorials
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦NEW HACKING TOOL LIST
- [cuckoo](https://github.com/cuckoosandbox/cuckoo) - Cuckoo Sandbox is an automated dynamic malware analysis system.[](https://github.com/cuckoosandbox/cuckoo/stargazers/)
- [Easymap](https://github.com/Cvar1984/Easymap) - No description provided[](https://github.com/Cvar1984/Easymap/stargazers/)
- [Ecode](https://github.com/Cvar1984/Ecode) - Encode / Decode.[](https://github.com/Cvar1984/Ecode/stargazers/)
- [Hac](https://github.com/Cvar1984/Hac) - No description provided[](https://github.com/Cvar1984/Hac/stargazers/)
- [sqlscan](https://github.com/Cvar1984/sqlscan) - Quick SQL Scanner, Dorker, Webshell injector PHP.[](https://github.com/Cvar1984/sqlscan/stargazers/)
- [hammer](https://github.com/cyweb/hammer) - Hammer DDos Script - Python 3.[](https://github.com/cyweb/hammer/stargazers/)
- [Kadabra](https://github.com/D35m0nd142/Kadabra) - [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python..[](https://github.com/D35m0nd142/Kadabra/stargazers/)
- [LFISuite](https://github.com/D35m0nd142/LFISuite) - Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner .[](https://github.com/D35m0nd142/LFISuite/stargazers/)
- [Clickjacking-Tester](https://github.com/D4Vinci/Clickjacking-Tester) - A python script designed to check if the website if vulnerable of clickjacking and create a poc.[](https://github.com/D4Vinci/Clickjacking-Tester/stargazers/)
- [Dr0p1t-Framework](https://github.com/D4Vinci/Dr0p1t-Framework) - A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks.[](https://github.com/D4Vinci/Dr0p1t-Framework/stargazers/)
- [elpscrk](https://github.com/D4Vinci/elpscrk) - A Common User Passwords generator script that looks like the tool Eliot used it in Mr.Robot Series Episode 01 :D :v.[](https://github.com/D4Vinci/elpscrk/stargazers/)
- [SecLists](https://github.com/danielmiessler/SecLists) - SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more..[](https://github.com/danielmiessler/SecLists/stargazers/)
- [dnsrecon](https://github.com/darkoperator/dnsrecon) - DNS Enumeration Script.[]
don't clone our tutorials
β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦NEW HACKING TOOL LIST
- [cuckoo](https://github.com/cuckoosandbox/cuckoo) - Cuckoo Sandbox is an automated dynamic malware analysis system.[](https://github.com/cuckoosandbox/cuckoo/stargazers/)
- [Easymap](https://github.com/Cvar1984/Easymap) - No description provided[](https://github.com/Cvar1984/Easymap/stargazers/)
- [Ecode](https://github.com/Cvar1984/Ecode) - Encode / Decode.[](https://github.com/Cvar1984/Ecode/stargazers/)
- [Hac](https://github.com/Cvar1984/Hac) - No description provided[](https://github.com/Cvar1984/Hac/stargazers/)
- [sqlscan](https://github.com/Cvar1984/sqlscan) - Quick SQL Scanner, Dorker, Webshell injector PHP.[](https://github.com/Cvar1984/sqlscan/stargazers/)
- [hammer](https://github.com/cyweb/hammer) - Hammer DDos Script - Python 3.[](https://github.com/cyweb/hammer/stargazers/)
- [Kadabra](https://github.com/D35m0nd142/Kadabra) - [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python..[](https://github.com/D35m0nd142/Kadabra/stargazers/)
- [LFISuite](https://github.com/D35m0nd142/LFISuite) - Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner .[](https://github.com/D35m0nd142/LFISuite/stargazers/)
- [Clickjacking-Tester](https://github.com/D4Vinci/Clickjacking-Tester) - A python script designed to check if the website if vulnerable of clickjacking and create a poc.[](https://github.com/D4Vinci/Clickjacking-Tester/stargazers/)
- [Dr0p1t-Framework](https://github.com/D4Vinci/Dr0p1t-Framework) - A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks.[](https://github.com/D4Vinci/Dr0p1t-Framework/stargazers/)
- [elpscrk](https://github.com/D4Vinci/elpscrk) - A Common User Passwords generator script that looks like the tool Eliot used it in Mr.Robot Series Episode 01 :D :v.[](https://github.com/D4Vinci/elpscrk/stargazers/)
- [SecLists](https://github.com/danielmiessler/SecLists) - SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more..[](https://github.com/danielmiessler/SecLists/stargazers/)
- [dnsrecon](https://github.com/darkoperator/dnsrecon) - DNS Enumeration Script.[]
don't clone our tutorials
β
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - cuckoosandbox/cuckoo: Cuckoo Sandbox is an automated dynamic malware analysis system
Cuckoo Sandbox is an automated dynamic malware analysis system - cuckoosandbox/cuckoo
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Common WEB vulnerabilities and repair suggestions :
1) High-risk vulnerabilities include SQL injection vulnerabilities, XSS cross-site scripting vulnerabilities, source code leaks on pages, backup files on websites, files containing SVN information on websites, and arbitrary file read vulnerabilities in Resin on websites.
2) SQL injection vulnerability: The website program ignores the check of the SQL statement contained in the input string, which makes the SQL statement contained in the database mistakenly regarded as a legal SQL command and run, resulting in various sensitive data in the database being stolen, changed or delete.
3) XSS Cross-Site Scripting Vulnerability: The website program ignores the checking of special characters and strings (such as <>'"<script><iframe>onload) in the input string, allowing an attacker to trick users into visiting pages containing malicious JavaScript code , Causing malicious code to be executed in the userβs browser, resulting in the theft of the target userβs authority or the tampering of data.
4) Source code leakage on the page: The source code leakage on the page may lead to the disclosure of the key logic of the website service and the configured account password. Attackers can use this information to obtain website permissions more easily, leading to the website being hacked.
5) There are backup files on the website: There are backup files on the website, such as database backup files, website source code backup files, etc. Attackers can use this information to obtain website permissions more easily, leading to the website being hacked.
6) There is a file containing SVN information on the website: There is a file containing SVN information on the website, which is a private file of the version controller of the website source code, which contains the address of the SVN service, the private file name submitted, the SVN user name and other information. This information is helpful The attacker has a more comprehensive understanding of the structure of the website and provides help for the attacker to invade the website.
7) Resin arbitrary file reading vulnerability exists in the website: The website installed with certain versions of Resin server has a vulnerability that can read arbitrary files. Attackers can use this vulnerability to read any file content of the website server, causing the website to be hacked.
don't clone our tutorials
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Common WEB vulnerabilities and repair suggestions :
1) High-risk vulnerabilities include SQL injection vulnerabilities, XSS cross-site scripting vulnerabilities, source code leaks on pages, backup files on websites, files containing SVN information on websites, and arbitrary file read vulnerabilities in Resin on websites.
2) SQL injection vulnerability: The website program ignores the check of the SQL statement contained in the input string, which makes the SQL statement contained in the database mistakenly regarded as a legal SQL command and run, resulting in various sensitive data in the database being stolen, changed or delete.
3) XSS Cross-Site Scripting Vulnerability: The website program ignores the checking of special characters and strings (such as <>'"<script><iframe>onload) in the input string, allowing an attacker to trick users into visiting pages containing malicious JavaScript code , Causing malicious code to be executed in the userβs browser, resulting in the theft of the target userβs authority or the tampering of data.
4) Source code leakage on the page: The source code leakage on the page may lead to the disclosure of the key logic of the website service and the configured account password. Attackers can use this information to obtain website permissions more easily, leading to the website being hacked.
5) There are backup files on the website: There are backup files on the website, such as database backup files, website source code backup files, etc. Attackers can use this information to obtain website permissions more easily, leading to the website being hacked.
6) There is a file containing SVN information on the website: There is a file containing SVN information on the website, which is a private file of the version controller of the website source code, which contains the address of the SVN service, the private file name submitted, the SVN user name and other information. This information is helpful The attacker has a more comprehensive understanding of the structure of the website and provides help for the attacker to invade the website.
7) Resin arbitrary file reading vulnerability exists in the website: The website installed with certain versions of Resin server has a vulnerability that can read arbitrary files. Attackers can use this vulnerability to read any file content of the website server, causing the website to be hacked.
don't clone our tutorials
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦So is the SMS verification code really safe?
1) If it is safe, nothing is really safe, and SMS verification code is not the safest way to verify your identity. The reason why identity verification through SMS can grow wildly within a few years is that it is the lowest cost, easiest and most convenient verification method for secondary verification through SMS.
2) Another reason is that the popularity of mobile phones is also the easiest to be widely used by users. Accept, and the security level of SMS verification is relatively high.
3) Relatively speaking, the security of the secondary identity verification by SMS is relatively high. The difference is that due to the popularity of smart phones, the loopholes in the mobile phone system are also increasing, and the existence of various Trojan horses has led to the emergence of the security of identity verification by SMS. problem. But at present it is still a relatively safe verification method.
π¦What kind of threats are mobile SMS verification facing? What kind of response?
1) Since it is the era of smart phones, the biggest threat to mobile phone SMS verification is from SMS Trojans on smart platforms. This type of SMS Trojan horse sends short connection SMS to allow users to download and install the Trojan without their knowledge. When the Trojan horse is installed in the mobile phone, it will reset the userβs property-related application account password and intercept the SMS verification code. Reset the user's account.
2) This is a threat to the userβs SMS verification security, but because of the simplicity of writing, such Trojans have already formed a very complete industry chain. Make Trojans β sell Trojans β rent Trojans β conduct phishing scams β wash after success No. β Transfer of property . This is a huge industrial chain located underground, and because it has derived a series of industries,
3) I won't say much here. Of course, smart platforms have also issued corresponding policies to reduce the incidence of such thefts. For example, after the Android system version 4.4 has tightened the permissions for SMS, most of them still rely on users to increase their vigilance to prevent
don't clone our tutorials
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦So is the SMS verification code really safe?
1) If it is safe, nothing is really safe, and SMS verification code is not the safest way to verify your identity. The reason why identity verification through SMS can grow wildly within a few years is that it is the lowest cost, easiest and most convenient verification method for secondary verification through SMS.
2) Another reason is that the popularity of mobile phones is also the easiest to be widely used by users. Accept, and the security level of SMS verification is relatively high.
3) Relatively speaking, the security of the secondary identity verification by SMS is relatively high. The difference is that due to the popularity of smart phones, the loopholes in the mobile phone system are also increasing, and the existence of various Trojan horses has led to the emergence of the security of identity verification by SMS. problem. But at present it is still a relatively safe verification method.
π¦What kind of threats are mobile SMS verification facing? What kind of response?
1) Since it is the era of smart phones, the biggest threat to mobile phone SMS verification is from SMS Trojans on smart platforms. This type of SMS Trojan horse sends short connection SMS to allow users to download and install the Trojan without their knowledge. When the Trojan horse is installed in the mobile phone, it will reset the userβs property-related application account password and intercept the SMS verification code. Reset the user's account.
2) This is a threat to the userβs SMS verification security, but because of the simplicity of writing, such Trojans have already formed a very complete industry chain. Make Trojans β sell Trojans β rent Trojans β conduct phishing scams β wash after success No. β Transfer of property . This is a huge industrial chain located underground, and because it has derived a series of industries,
3) I won't say much here. Of course, smart platforms have also issued corresponding policies to reduce the incidence of such thefts. For example, after the Android system version 4.4 has tightened the permissions for SMS, most of them still rely on users to increase their vigilance to prevent
don't clone our tutorials
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦USA NUMBERS FOR SOCIAL MEDIA APPS :
UPDATED LIST
1) https://www.ring4.com/en/
2) https://www.numeroesim.com/
3) https://www.openphone.co/
4) https://talkroute.com/mobile-apps-ios-android/
5) https://www.vonage.com/personal/vonage-mobile-app?
6) https://sonetel.com/en/
7) https://www.virtualphone.com/
8) https://www.worldsim.com/virtual-phone-number?___store=usa
9) http://www.telosapp.com/
10) https://www.cloudsimapp.com/
11) https://www.line2.com/
12) https://www.burnerapp.com/ (GOOD FOR WHATSAPP)
13) https://apkpure.com/usa-free-number/com.usa.free.nu
14) https://2ndline-second-phone-number.en.softonic.com/android
don't clone our tutorials
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦USA NUMBERS FOR SOCIAL MEDIA APPS :
UPDATED LIST
1) https://www.ring4.com/en/
2) https://www.numeroesim.com/
3) https://www.openphone.co/
4) https://talkroute.com/mobile-apps-ios-android/
5) https://www.vonage.com/personal/vonage-mobile-app?
6) https://sonetel.com/en/
7) https://www.virtualphone.com/
8) https://www.worldsim.com/virtual-phone-number?___store=usa
9) http://www.telosapp.com/
10) https://www.cloudsimapp.com/
11) https://www.line2.com/
12) https://www.burnerapp.com/ (GOOD FOR WHATSAPP)
13) https://apkpure.com/usa-free-number/com.usa.free.nu
14) https://2ndline-second-phone-number.en.softonic.com/android
don't clone our tutorials
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Docker for beginers :
Docker is the world's leading software containerization platform. For different types of penetration testing , we can use Docker to create corresponding environments. With Docker containers, you can put the test environment on a USB flash drive or the cloud.
Β»What is Docker
1) Docker is an open source technology. In software containers, you can create, run, test, and deploy applications. Dcoker allows you to deploy applications quickly, reliably, and stably in any environment.
2) The container has the advantages of being portable, convenient and fast. Using Docker, we can create an image, and then create other environments on the basis of this image. For example, we downloaded Kali Linux as a basic container, but it didn't install the tools we need. We regard it as a basic container, install the required tools on it, and then save it as a new image without affecting the original image.
3) In other words, based on the original image, a container containing forensic tools and Web penetration testing tools can be created.
π¦Tools for web penetration testing
W3af-console
SQLMap
Arachni
Nikto
Websploit
Nmap
π¦About installation
The installation of Docker depends on the operating system you are using, but now we can find installation packages for most systems in the official warehouse.
example we use the OpenSuse system.
_0x4a0x72@pwned ~ sudo zypper se docker
S | Nome | Resumo | Tipo
β+ββββββββββ+βββββββββββββββββββββ+ββββ-
| docker | The Linux container runtime | pacote
_0x4a0x72@pwned ~ sudo zypper in docker
After the installation is successful, you must enable and start the service
_0x4a0x72@pwned ~ sudo systemctl enable docker
_0x4a0x72@pwned ~ sudo systemctl start docker
_0x4a0x72@pwned ~ sudo docker info
don't clone our tutorials
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Docker for beginers :
Docker is the world's leading software containerization platform. For different types of penetration testing , we can use Docker to create corresponding environments. With Docker containers, you can put the test environment on a USB flash drive or the cloud.
Β»What is Docker
1) Docker is an open source technology. In software containers, you can create, run, test, and deploy applications. Dcoker allows you to deploy applications quickly, reliably, and stably in any environment.
2) The container has the advantages of being portable, convenient and fast. Using Docker, we can create an image, and then create other environments on the basis of this image. For example, we downloaded Kali Linux as a basic container, but it didn't install the tools we need. We regard it as a basic container, install the required tools on it, and then save it as a new image without affecting the original image.
3) In other words, based on the original image, a container containing forensic tools and Web penetration testing tools can be created.
π¦Tools for web penetration testing
W3af-console
SQLMap
Arachni
Nikto
Websploit
Nmap
π¦About installation
The installation of Docker depends on the operating system you are using, but now we can find installation packages for most systems in the official warehouse.
example we use the OpenSuse system.
_0x4a0x72@pwned ~ sudo zypper se docker
S | Nome | Resumo | Tipo
β+ββββββββββ+βββββββββββββββββββββ+ββββ-
| docker | The Linux container runtime | pacote
_0x4a0x72@pwned ~ sudo zypper in docker
After the installation is successful, you must enable and start the service
_0x4a0x72@pwned ~ sudo systemctl enable docker
_0x4a0x72@pwned ~ sudo systemctl start docker
_0x4a0x72@pwned ~ sudo docker info
don't clone our tutorials
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Base64 Encode and Decode From Command Line :
how to use the base64 command to encode and decode the data in a string or a file ?
example We have performed the commands on Ubuntu 20.04 Focal Fossa system. However, you can also run the same commands on other Linux distributions. For running the commands, we have used the command line Terminal application, which can be accessed using the Ctrl+Alt+T keyboard shortcut.
A) Base64 Syntax
1) Here is the syntax for encoding using Base64:
base64 [OPTION] [FILE]
Options
Some of the command-line options that can be used with base64 command are:
-d or --decode
2) Use this option to decode a file or a string.
--help
Use this option to display help regarding the usage of base64.
-i, --ignore-garbage
Use this option while decoding to ignore non-alphabet characters
--version
Use this option to display version information
B) Encoding String
You can easily encode a string using the base64 command. For instance, to encode a sample text βWelcome to Linuxβ to base64, the command would be:
$ echo βWelcome to Linuxβ | base64
1) This command will encode the text in the string using base64 and print the encoded text to standard output
2) You can also save the encoded output to a file rather than printing to standard output using the redirection operator (>). The following command will encode the text and save the output to a file named βencodedfile.txt:
$ echo βWelcome to Linuxβ | base64 > encodedfile.txt
3) To view the encoded file, you can use the cat command:
$ cat encodedfile.txt
C) Decoding String
1) You can also decode the base64 encoded text using the βdecode or -d option. For instance to decode base64 encoded text βV2VsY29tZSB0byBMaW51eAo=β, the command would be:
$ echo βV2VsY29tZSB0byBMaW51eAo=β | base64 --decode
2) This command will decode the base64 encoded text and print the original text on the standard outpuT
3) You can also save the decoded output to a file rather than printing to standard output using the redirection operator (>). The following command will decode the encoded text and save the original text to a file named βdecodedfile.txt:
$ echo βV2VsY29tZSB0byBMaW51eAo=β | base64 βdecode > decodedfile.txt
E) Encoding Text File
The base64 command can also be used to encode a text file. For instance, to encode a text file named βtestfile.txtβ, the command would be:
$ base64 testfile.txt
unix forum
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Base64 Encode and Decode From Command Line :
how to use the base64 command to encode and decode the data in a string or a file ?
example We have performed the commands on Ubuntu 20.04 Focal Fossa system. However, you can also run the same commands on other Linux distributions. For running the commands, we have used the command line Terminal application, which can be accessed using the Ctrl+Alt+T keyboard shortcut.
A) Base64 Syntax
1) Here is the syntax for encoding using Base64:
base64 [OPTION] [FILE]
Options
Some of the command-line options that can be used with base64 command are:
-d or --decode
2) Use this option to decode a file or a string.
--help
Use this option to display help regarding the usage of base64.
-i, --ignore-garbage
Use this option while decoding to ignore non-alphabet characters
--version
Use this option to display version information
B) Encoding String
You can easily encode a string using the base64 command. For instance, to encode a sample text βWelcome to Linuxβ to base64, the command would be:
$ echo βWelcome to Linuxβ | base64
1) This command will encode the text in the string using base64 and print the encoded text to standard output
2) You can also save the encoded output to a file rather than printing to standard output using the redirection operator (>). The following command will encode the text and save the output to a file named βencodedfile.txt:
$ echo βWelcome to Linuxβ | base64 > encodedfile.txt
3) To view the encoded file, you can use the cat command:
$ cat encodedfile.txt
C) Decoding String
1) You can also decode the base64 encoded text using the βdecode or -d option. For instance to decode base64 encoded text βV2VsY29tZSB0byBMaW51eAo=β, the command would be:
$ echo βV2VsY29tZSB0byBMaW51eAo=β | base64 --decode
2) This command will decode the base64 encoded text and print the original text on the standard outpuT
3) You can also save the decoded output to a file rather than printing to standard output using the redirection operator (>). The following command will decode the encoded text and save the original text to a file named βdecodedfile.txt:
$ echo βV2VsY29tZSB0byBMaW51eAo=β | base64 βdecode > decodedfile.txt
E) Encoding Text File
The base64 command can also be used to encode a text file. For instance, to encode a text file named βtestfile.txtβ, the command would be:
$ base64 testfile.txt
unix forum
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Hack instagram via linux :
π»π΄π 'π π π π°π π :
1) git clone https://github.com/Ethical-H4CK3R/Instagram.git
this command will clone the entire program/script to your computer.
2) and now you need to chmod the file and open (go to) the directory of the program.
Type
> chmod -R 755 Instagram && cd Instagram
3) Now that we cloned the program/script, we now need to open the program.
> Type :
"ls"
to see what is inside the folder.
4) Now, as we know that there are three things inside the program/script folder, "Core", "README.md" and "instagram.py".
5) The executable program here is "instagram.py".
We need to execute the program. So type:
python instagram.py
6) For setup proxies https://www.serverlab.ca/tutorials/linux/administration-linux/how-to-configure-proxy-on-ubuntu-18-04/
7) for setup worldlist
https://www.youtube.com/watch?v=GUNA0THt4a4
don't clone our tutorials
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Hack instagram via linux :
π»π΄π 'π π π π°π π :
1) git clone https://github.com/Ethical-H4CK3R/Instagram.git
this command will clone the entire program/script to your computer.
2) and now you need to chmod the file and open (go to) the directory of the program.
Type
> chmod -R 755 Instagram && cd Instagram
3) Now that we cloned the program/script, we now need to open the program.
> Type :
"ls"
to see what is inside the folder.
4) Now, as we know that there are three things inside the program/script folder, "Core", "README.md" and "instagram.py".
5) The executable program here is "instagram.py".
We need to execute the program. So type:
python instagram.py
6) For setup proxies https://www.serverlab.ca/tutorials/linux/administration-linux/how-to-configure-proxy-on-ubuntu-18-04/
7) for setup worldlist
https://www.youtube.com/watch?v=GUNA0THt4a4
don't clone our tutorials
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - Bitwise-01/Instagram-: Bruteforce attack for Instagram.
Bruteforce attack for Instagram. . Contribute to Bitwise-01/Instagram- development by creating an account on GitHub.
π¦FREE ANDROID SPYING APPLICATION :
Remote access to the complete database of the targeted device with full invisibility on targeted devices.
Remote access the LIVE SCREEN SHARING OF TARGETED DEVICE
Remotely access to WEB HISTORY(in processing)
Remotely MONITORING MULTIPLE DEVICES AT A TIME WITH
BETTER CONSOLE
REALTIME WEB CONSOLE FOR MONITORING AND CONTROLLING
BETTER UX/UI DESIGN EXPERIENCE
Β» https://github.com/ranaaditya/SPYZIER-APP
(open source)
β β β Uππ»βΊπ«Δπ¬πβ β β β
Remote access to the complete database of the targeted device with full invisibility on targeted devices.
Remote access the LIVE SCREEN SHARING OF TARGETED DEVICE
Remotely access to WEB HISTORY(in processing)
Remotely MONITORING MULTIPLE DEVICES AT A TIME WITH
BETTER CONSOLE
REALTIME WEB CONSOLE FOR MONITORING AND CONTROLLING
BETTER UX/UI DESIGN EXPERIENCE
Β» https://github.com/ranaaditya/SPYZIER-APP
(open source)
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - ranaaditya/SPYZIER-APP: Android spying app and Parental controller app.
Android spying app and Parental controller app. Contribute to ranaaditya/SPYZIER-APP development by creating an account on GitHub.