Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BITCOIN EARNING & MANAGEMENTS APPLICATIONS:
https://play.google.com/store/apps/details?id=com.tapgen.featurepoints&hl=en_US
https://itunes.apple.com/us/app/featurepoints/id1409722949?mt=8
https://play.google.com/store/apps/details?id=com.cakecodes.bitmaker
https://itunes.apple.com/us/app/storm-play/id1420545397
https://play.google.com/store/apps/details?id=weekend.bitcoin.free&hl=en_US
https://itunes.apple.com/us/app/bitcoin-free/id999004027?mt=8
https://play.google.com/store/apps/details?id=bitcoin.blockchain.game&hl=en_US
https://play.google.com/store/apps/details?id=bitcoin.alien.run&hl=en_US
https://itunes.apple.com/us/app/bitcoin-alien-run/id1161356630?mt=8
https://play.google.com/store/apps/details?id=app.bitcoin.abundance
https://play.google.com/store/apps/details?id=my.mine.btc&hl=en_US
https://play.google.com/store/apps/details?id=com.cryptbase.supersatoshi&hl=en_US
https://itunes.apple.com/us/app/lympo-walk-run-earn/id1423003823?mt=8
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BITCOIN EARNING & MANAGEMENTS APPLICATIONS:
https://play.google.com/store/apps/details?id=com.tapgen.featurepoints&hl=en_US
https://itunes.apple.com/us/app/featurepoints/id1409722949?mt=8
https://play.google.com/store/apps/details?id=com.cakecodes.bitmaker
https://itunes.apple.com/us/app/storm-play/id1420545397
https://play.google.com/store/apps/details?id=weekend.bitcoin.free&hl=en_US
https://itunes.apple.com/us/app/bitcoin-free/id999004027?mt=8
https://play.google.com/store/apps/details?id=bitcoin.blockchain.game&hl=en_US
https://play.google.com/store/apps/details?id=bitcoin.alien.run&hl=en_US
https://itunes.apple.com/us/app/bitcoin-alien-run/id1161356630?mt=8
https://play.google.com/store/apps/details?id=app.bitcoin.abundance
https://play.google.com/store/apps/details?id=my.mine.btc&hl=en_US
https://play.google.com/store/apps/details?id=com.cryptbase.supersatoshi&hl=en_US
https://itunes.apple.com/us/app/lympo-walk-run-earn/id1423003823?mt=8
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
Google Play
FeaturePoints: Get Rewarded - Apps on Google Play
Earn Rewards by Trying Apps, Playing Games, Completing Surveys and more...
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Best Bitcoin Wallets:
https://coinbase-consumer.sjv.io/c/328256/830083/9251?subId1=4160642&subId2=balance&subId3=link&dd_pm=affiliate&dd_pm_cat=brokerage&subid1=nfaa0a068a4ed4e6eb5bd3e1edc7aad1508&subid2=thebalance&subid3=link
https://trezor.io/
https://www.ledger.com/
https://refer.sofi.com/c/328256/864359/11190?adcampaigngroup=wealth&adnetwork=BD&subid1=nfaa0a068a4ed4e6eb5bd3e1edc7aad1508&subid2=thebalance&subid3=link
https://robinhood.c3me6x.net/c/328256/748415/10402?subId1=4160642&subId2=balance&sharedid=balance&dd_pm=affiliate&dd_pm_cat=brokerage&subid1=nfaa0a068a4ed4e6eb5bd3e1edc7aad1508&subid2=thebalance&subid3=link
https://edge.app/
https://www.exodus.io/
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Best Bitcoin Wallets:
https://coinbase-consumer.sjv.io/c/328256/830083/9251?subId1=4160642&subId2=balance&subId3=link&dd_pm=affiliate&dd_pm_cat=brokerage&subid1=nfaa0a068a4ed4e6eb5bd3e1edc7aad1508&subid2=thebalance&subid3=link
https://trezor.io/
https://www.ledger.com/
https://refer.sofi.com/c/328256/864359/11190?adcampaigngroup=wealth&adnetwork=BD&subid1=nfaa0a068a4ed4e6eb5bd3e1edc7aad1508&subid2=thebalance&subid3=link
https://robinhood.c3me6x.net/c/328256/748415/10402?subId1=4160642&subId2=balance&sharedid=balance&dd_pm=affiliate&dd_pm_cat=brokerage&subid1=nfaa0a068a4ed4e6eb5bd3e1edc7aad1508&subid2=thebalance&subid3=link
https://edge.app/
https://www.exodus.io/
β β β Uππ»βΊπ«Δπ¬πβ β β β
trezor.io
Trezor Hardware Wallet (Official) | Bitcoin & Crypto Security
The safest cold storage wallets for crypto security and financial independence. Easily use, store, and protect Bitcoins.
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
All Microsoft Windows Users should update their systems.
A New Dangerous Microsoft Windows Print Spooler Vulnerability
#Vulnerabilities
A New Dangerous Microsoft Windows Print Spooler Vulnerability
#Vulnerabilities
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Free Credit card Updated 2020 :
https://www.oxigenwallet.com/
http://tracking.payoneer.com/SH2J0
https://revolut.ngih.net/c/393170/584909/9626?subId1=
https://www.microsoft.com/en-us/p/mb-way/9nblggh3vcn3?
https://www.vcpay.co.za/
https://www.zeta.tech/
https://www.freecharge.in/
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Free Credit card Updated 2020 :
https://www.oxigenwallet.com/
http://tracking.payoneer.com/SH2J0
https://revolut.ngih.net/c/393170/584909/9626?subId1=
https://www.microsoft.com/en-us/p/mb-way/9nblggh3vcn3?
https://www.vcpay.co.za/
https://www.zeta.tech/
https://www.freecharge.in/
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODER
Advised on caution on smishing text messages for iPhone hijacking from Naver account.
#Vulnerabilities
MORE INFO - https://undercodenews.com/advised-on-caution-on-smishing-text-messages-for-iphone-hijacking-from-naver-account/12/11/2020/
#Vulnerabilities
MORE INFO - https://undercodenews.com/advised-on-caution-on-smishing-text-messages-for-iphone-hijacking-from-naver-account/12/11/2020/
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦NETWORK HACKING :
SUBDOMAINE TAKE OVER...
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) DOWNLOAD:
https://github.com/mhmdiaa/second-order
2) go get github.com/mhmdiaa/second-order
This will download the code, compile it, and leave a second-order binary in $GOPATH/bin.
π¦Command line options
-base string
Base link to start scraping from (default "http://127.0.0.1")
-config string
Configuration file (default "config.json")
-debug
Print visited links in real-time to stdout
-output string
Directory to save results in (default "output")
π¦Example
> go run second-order.go -base https://example.com -config
config.json -output example.com -concurrency 10
Configuration File
π¦Example configuration file included (config.json)
F E A T U R E S :
Headers: A map of headers that will be sent with every request.
Depth: Crawling depth.
LogCrawledURLs: If this is set to true, Second Order will log the URL of every crawled page.
LogQueries: A map of tag-attribute queries that will be searched for in crawled pages. For example, βaβ: βhrefβ means log every
href attribute of every a tag.
LogURLRegex: A list of regular expressions that will be matched against the URLs that are extracted using the queries in
LogQueries; if left empty, all URLs will be logged.
LogNon200Queries: A map of tag-attribute queries that will be searched for in crawled pages, and logged only if they donβt return a 200 status code.
ExcludedURLRegex: A list of regular expressions whose matching URLs will not be accessed by the tool.
ExcludedStatusCodes: A list of status codes; if any page responds with one of these, it will be excluded from the results of
LogNon200Queries; if left empty, all non-200 pagesβ URLs will be logged.
LogInlineJS: If this is set to true, Second Order will log the contents of every script tag that doesnβt have a src attribute.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦NETWORK HACKING :
SUBDOMAINE TAKE OVER...
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) DOWNLOAD:
https://github.com/mhmdiaa/second-order
2) go get github.com/mhmdiaa/second-order
This will download the code, compile it, and leave a second-order binary in $GOPATH/bin.
π¦Command line options
-base string
Base link to start scraping from (default "http://127.0.0.1")
-config string
Configuration file (default "config.json")
-debug
Print visited links in real-time to stdout
-output string
Directory to save results in (default "output")
π¦Example
> go run second-order.go -base https://example.com -config
config.json -output example.com -concurrency 10
Configuration File
π¦Example configuration file included (config.json)
F E A T U R E S :
Headers: A map of headers that will be sent with every request.
Depth: Crawling depth.
LogCrawledURLs: If this is set to true, Second Order will log the URL of every crawled page.
LogQueries: A map of tag-attribute queries that will be searched for in crawled pages. For example, βaβ: βhrefβ means log every
href attribute of every a tag.
LogURLRegex: A list of regular expressions that will be matched against the URLs that are extracted using the queries in
LogQueries; if left empty, all URLs will be logged.
LogNon200Queries: A map of tag-attribute queries that will be searched for in crawled pages, and logged only if they donβt return a 200 status code.
ExcludedURLRegex: A list of regular expressions whose matching URLs will not be accessed by the tool.
ExcludedStatusCodes: A list of status codes; if any page responds with one of these, it will be excluded from the results of
LogNon200Queries; if left empty, all non-200 pagesβ URLs will be logged.
LogInlineJS: If this is set to true, Second Order will log the contents of every script tag that doesnβt have a src attribute.
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - mhmdiaa/second-order: Second-order subdomain takeover scanner
Second-order subdomain takeover scanner. Contribute to mhmdiaa/second-order development by creating an account on GitHub.
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Best & fastest download manager for windows:
https://jdownloader.org/home/index
http://www.internetdownloadmanager.com/
https://ninjadownloadmanager.com/
https://www.freedownloadmanager.org/
https://beebom.com/best-chrome-extensions/
http://www.eagleget.com/
https://ugetdm.com/
http://xdman.sourceforge.net/
https://www.microsoft.com/en-in/p/idownload-manager-idm/9nqx4mtt2z9g?rtc=1&activetab=pivot%3Aoverviewtab
https://westbyte.com/ida/
https://wordrider.net/freerapid/index.html
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Best & fastest download manager for windows:
https://jdownloader.org/home/index
http://www.internetdownloadmanager.com/
https://ninjadownloadmanager.com/
https://www.freedownloadmanager.org/
https://beebom.com/best-chrome-extensions/
http://www.eagleget.com/
https://ugetdm.com/
http://xdman.sourceforge.net/
https://www.microsoft.com/en-in/p/idownload-manager-idm/9nqx4mtt2z9g?rtc=1&activetab=pivot%3Aoverviewtab
https://westbyte.com/ida/
https://wordrider.net/freerapid/index.html
β β β Uππ»βΊπ«Δπ¬πβ β β β
Internetdownloadmanager
Internet Download Manager is a powerful download accelerator
Internet Download Manager (IDM) is a tool to increase download speeds by up to 10 times, resume or schedule downloads and download streaming videos
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Samsungβs latest βsurround screen machineβ patent is exposed: a screen is what you see!
#Technologies
#Technologies
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦WHAT IS CAUSE OF VPN LEAK :
1) IP leaks
IP leaks happen the moment your IP goes out of the VPN tunnel.
They are of two types:
IPv4 leaks - This happens when there are incorrect communication errors between your device and the VPN server, the VPN server is poorly configured, or your ISP or operating system is having problems connecting to the VPN server.
IPv6 leaks - such a leak occurs when the VPN does not support IPv6 traffic. Not many VPN providers provide this feature, and your IPv6 address will leak outside of the VPN tunnel.
2) DNS leaks
These leaks happen when your VPN does not route your DNS requests (website connection requests) through their own DNS server.
Instead, they go through your ISP's DNS server, which means they can see (and broadcast) which websites you are browsing.
3) WebRTC Leaks
WebRTC is an open source project that allows web browsers to support video calling, voice calling, and P2P exchange functions. WebRTC is also a major problem for VPNs as it can cause IP leaks.
4) Traffic leaks
This is when all your internet traffic is leaked through the VPN tunnel.
A traffic leak occurs the moment your VPN connection is interrupted - even if it only takes a few seconds.
This can happen if you are using a resource-intensive protocol, if the VPN server is very far from you, or if the VPN client simply crashed.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦WHAT IS CAUSE OF VPN LEAK :
1) IP leaks
IP leaks happen the moment your IP goes out of the VPN tunnel.
They are of two types:
IPv4 leaks - This happens when there are incorrect communication errors between your device and the VPN server, the VPN server is poorly configured, or your ISP or operating system is having problems connecting to the VPN server.
IPv6 leaks - such a leak occurs when the VPN does not support IPv6 traffic. Not many VPN providers provide this feature, and your IPv6 address will leak outside of the VPN tunnel.
2) DNS leaks
These leaks happen when your VPN does not route your DNS requests (website connection requests) through their own DNS server.
Instead, they go through your ISP's DNS server, which means they can see (and broadcast) which websites you are browsing.
3) WebRTC Leaks
WebRTC is an open source project that allows web browsers to support video calling, voice calling, and P2P exchange functions. WebRTC is also a major problem for VPNs as it can cause IP leaks.
4) Traffic leaks
This is when all your internet traffic is leaked through the VPN tunnel.
A traffic leak occurs the moment your VPN connection is interrupted - even if it only takes a few seconds.
This can happen if you are using a resource-intensive protocol, if the VPN server is very far from you, or if the VPN client simply crashed.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Fined nearly tens of billions of dollars, Google still dominates the European search market.
#international
#international
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦bug hunting tools :
- MITRE ATT&CK Navigator(source code) - The ATT&CK Navigator is designed to provide basic navigation and annotation of ATT&CK matrices, something that people are already doing today in tools like Excel.
- HELK - A Hunting ELK (Elasticsearch, Logstash, Kibana) with advanced analytic capabilities.
- osquery - An operating system instrumentation framework for Windows, OS X (macOS), Linux, and FreeBSD. It exposes an operating system as a high-performance relational database.
- osquery-configuration - A repository for using osquery for incident detection and response.
- DetectionLab - Vagrant & Packer scripts to build a lab environment complete with security tooling and logging best practices.
- Sysmon-DFIR - Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦bug hunting tools :
- MITRE ATT&CK Navigator(source code) - The ATT&CK Navigator is designed to provide basic navigation and annotation of ATT&CK matrices, something that people are already doing today in tools like Excel.
- HELK - A Hunting ELK (Elasticsearch, Logstash, Kibana) with advanced analytic capabilities.
- osquery - An operating system instrumentation framework for Windows, OS X (macOS), Linux, and FreeBSD. It exposes an operating system as a high-performance relational database.
- osquery-configuration - A repository for using osquery for incident detection and response.
- DetectionLab - Vagrant & Packer scripts to build a lab environment complete with security tooling and logging best practices.
- Sysmon-DFIR - Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - mitre/attack-navigator: Web app that provides basic navigation and annotation of ATT&CK matrices
Web app that provides basic navigation and annotation of ATT&CK matrices - GitHub - mitre/attack-navigator: Web app that provides basic navigation and annotation of ATT&CK matrices