Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HIGH RATED HACKING TOOLS :
>>XSSFreak(https://github.com/PR0PH3CY33/XSSFreak)
>>XSpear(https://github.com/hahwul/XSpear)
>>XSSCon(https://github.com/menkrep1337/XSSCon)
>>XanXSS(https://github.com/Ekultek/XanXSS)
>>Advanced XSS Detection Suite(https://github.com/UltimateHackers/XSStrike)
>>RVuln(https://github.com/iinc0gnit0/RVuln)
>>Whitespace(https://github.com/beardog108/snow10)
SocialMedia Bruteforce
>>Instagram Attack(https://github.com/chinoogawa/instaBrute)
>>AllinOne SocialMedia Attack(https://github.com/Matrix07ksa/Brute_Force)
>>Facebook Attack(https://github.com/Matrix07ksa/Brute_Force)
>>Application Checker(https://github.com/jakutatech/underhanded)
Android Hacking tools
>>Keydroid(https://github.com/F4dl0/keydroid)
>>MySMS(https://github.com/papusingh2sms/mysms)
>>Lockphish (Grab target LOCK PIN)(https://github.com/JasonJerry/lockphish)
>>DroidCam (Capture Image)(https://github.com/kinghacker0/WishFish)
>>EvilApp (Hijack Session)(https://github.com/crypticterminal/EvilApp)
>>HatCloud(Bypass CloudFlare for IP)(https://github.com/HatBashBR/HatCloud)
IDN Homograph Attack
>>EvilURL(https://github.com/UndeadSec/EvilURL)
Email Verify tools
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HIGH RATED HACKING TOOLS :
>>XSSFreak(https://github.com/PR0PH3CY33/XSSFreak)
>>XSpear(https://github.com/hahwul/XSpear)
>>XSSCon(https://github.com/menkrep1337/XSSCon)
>>XanXSS(https://github.com/Ekultek/XanXSS)
>>Advanced XSS Detection Suite(https://github.com/UltimateHackers/XSStrike)
>>RVuln(https://github.com/iinc0gnit0/RVuln)
>>Whitespace(https://github.com/beardog108/snow10)
SocialMedia Bruteforce
>>Instagram Attack(https://github.com/chinoogawa/instaBrute)
>>AllinOne SocialMedia Attack(https://github.com/Matrix07ksa/Brute_Force)
>>Facebook Attack(https://github.com/Matrix07ksa/Brute_Force)
>>Application Checker(https://github.com/jakutatech/underhanded)
Android Hacking tools
>>Keydroid(https://github.com/F4dl0/keydroid)
>>MySMS(https://github.com/papusingh2sms/mysms)
>>Lockphish (Grab target LOCK PIN)(https://github.com/JasonJerry/lockphish)
>>DroidCam (Capture Image)(https://github.com/kinghacker0/WishFish)
>>EvilApp (Hijack Session)(https://github.com/crypticterminal/EvilApp)
>>HatCloud(Bypass CloudFlare for IP)(https://github.com/HatBashBR/HatCloud)
IDN Homograph Attack
>>EvilURL(https://github.com/UndeadSec/EvilURL)
Email Verify tools
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - hahwul/XSpear: π± Powerfull XSS Scanning and Parameter analysis tool&gem
π± Powerfull XSS Scanning and Parameter analysis tool&gem - hahwul/XSpear
Forwarded from UNDERCODE NEWS
It's full of windows! Samsung needs to create a cell phone!
#Technologies
#Technologies
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
Hack anything, special tutorials collection from git:
1- 3 Ways Extract Password Hashes from NTDS.dit:
https://www.hackingarticles.in/3-ways-extract-password-hashes-from-ntds-dit
-2- 3 ways to Capture HTTP Password in Network PC:
https://www.hackingarticles.in/3-ways-to-capture-http-password-in-network-pc/
-3- 3 Ways to Crack Wifi using Pyrit,oclHashcat and Cowpatty:
www.hackingarticles.in/3-ways-crack-wifi-using-pyrit-oclhashcat-cowpatty/
-4-BugBounty @ Linkedln-How I was able to bypass Open Redirection Protection:
https://medium.com/p/2e143eb36941
-5-BugBounty β βLet me reset your password and login into your account β-How I was able to Compromise any User Account via Reset Password Functionality:
https://medium.com/p/a11bb5f863b3/share/twitter
-6-βJourney from LFI to RCE!!!β-How I was able to get the same in one of the Indiaβs popular property buy/sell company:
https://medium.com/p/a69afe5a0899
-7-BugBounty β βI donβt need your current password to login into your accountβ - How could I completely takeover any userβs account in an online classi ed ads company:
https://medium.com/p/e51a945b083d
-8-BugBounty β βHow I was able to shop for free!β- Payment Price Manipulation:
https://medium.com/p/b29355a8e68e
-9-Recon β my way:
https://medium.com/p/82b7e5f62e21
-10-Reconnaissance: a eulogy in three acts:
https://medium.com/p/7840824b9ef2
-11-Red-Teaming-Toolkit:
https://github.com/infosecn1nja/Red-Teaming-Toolkit
-12-Red Team Tips:
https://vincentyiu.co.uk/
-13-Shellcode: A reverse shell for Linux in C with support for TLS/SSL:
https://modexp.wordpress.com/2019/04/24/glibc-shellcode/
-14-Shellcode: Encrypting traffic:
https://modexp.wordpress.com/2018/08/17/shellcode-encrypting-traffic/
-15-Penetration Testing of an FTP Server:
https://medium.com/p/19afe538be4b
-16-Reverse Engineering of the Anubis Malware β Part 1:
https://medium.com/p/741e12f5a6bd
-17-Privilege Escalation on Linux with Live examples:
https://resources.infosecinstitute.com/privilege-escalation-linux-live-examples/
β β β Uππ»βΊπ«Δπ¬πβ β β β
Hack anything, special tutorials collection from git:
1- 3 Ways Extract Password Hashes from NTDS.dit:
https://www.hackingarticles.in/3-ways-extract-password-hashes-from-ntds-dit
-2- 3 ways to Capture HTTP Password in Network PC:
https://www.hackingarticles.in/3-ways-to-capture-http-password-in-network-pc/
-3- 3 Ways to Crack Wifi using Pyrit,oclHashcat and Cowpatty:
www.hackingarticles.in/3-ways-crack-wifi-using-pyrit-oclhashcat-cowpatty/
-4-BugBounty @ Linkedln-How I was able to bypass Open Redirection Protection:
https://medium.com/p/2e143eb36941
-5-BugBounty β βLet me reset your password and login into your account β-How I was able to Compromise any User Account via Reset Password Functionality:
https://medium.com/p/a11bb5f863b3/share/twitter
-6-βJourney from LFI to RCE!!!β-How I was able to get the same in one of the Indiaβs popular property buy/sell company:
https://medium.com/p/a69afe5a0899
-7-BugBounty β βI donβt need your current password to login into your accountβ - How could I completely takeover any userβs account in an online classi ed ads company:
https://medium.com/p/e51a945b083d
-8-BugBounty β βHow I was able to shop for free!β- Payment Price Manipulation:
https://medium.com/p/b29355a8e68e
-9-Recon β my way:
https://medium.com/p/82b7e5f62e21
-10-Reconnaissance: a eulogy in three acts:
https://medium.com/p/7840824b9ef2
-11-Red-Teaming-Toolkit:
https://github.com/infosecn1nja/Red-Teaming-Toolkit
-12-Red Team Tips:
https://vincentyiu.co.uk/
-13-Shellcode: A reverse shell for Linux in C with support for TLS/SSL:
https://modexp.wordpress.com/2019/04/24/glibc-shellcode/
-14-Shellcode: Encrypting traffic:
https://modexp.wordpress.com/2018/08/17/shellcode-encrypting-traffic/
-15-Penetration Testing of an FTP Server:
https://medium.com/p/19afe538be4b
-16-Reverse Engineering of the Anubis Malware β Part 1:
https://medium.com/p/741e12f5a6bd
-17-Privilege Escalation on Linux with Live examples:
https://resources.infosecinstitute.com/privilege-escalation-linux-live-examples/
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
4G investment has been frozen, but you can still rest assured that it still takes 3-4 years to grow 5G.
#International
#International
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ How to check the provider of installed RPM packages on Linux ??
1) List of RPM Package Vendor Information
To list all rpm's with vendor information, use the βquery format (βof) parameter.
# rpm -qa --queryformat '% {NAME} -% {VERSION} -% {RELEASE}.% {ARCH}% {VENDOR} \ n'
Output example:
# rpm -qa --queryformat '% {NAME} -% {VERSION} -% {RELEASE}.% {ARCH}% {VENDOR} \ n'
python3-pyparted-3.11.0-13.el8.x86_64 CentOS
python3-gobject-base-3.28.3-1.el8.x86_64 CentOS
libvirt-daemon-driver-secret-4.5.0-42.module_el8.2.0 + 320 + 13f867d7.x86_64 CentOS
gnome-screenshot-3.26.0-3.el8.x86_64 CentOS
fontpackages-filesystem-1.44-22.el8.noarch CentOS
libevdev-1.8.0-1.el8.x86_64 CentOS
cronie-1.5.2-4.el8.x86_64 CentOS
lua-json-1.3.2-9.el8.noarch CentOS
mesa-libglapi-19.3.4-2.el8.x86_64 CentOS
baobab-3.28.0-4.el8.x86_64 CentOS
xkeyboard-config-2.28-1.el8.noarch CentOS
...
2) List of third party or non-native packages
To list all packages that are not provided by CentOS, run the following command:
# rpm -qa --qf "% {NAME} -% {VERSION} -% {RELEASE} -% {ARCH}% {VENDOR} \ n" | awk '{if ($ 2! = "CentOS") print $ 0;}'
Sample output from a CentOS 8 server:
# rpm -qa --qf "% {NAME} -% {VERSION} -% {RELEASE} -% {ARCH}% {VENDOR} \ n" | awk '{if ($ 2! = "CentOS") print $ 0;}'
gpg-pubkey-8483c65d-5ccc5b19- (none) (none)
amazon-ssm-agent-2.3.1644.0-1-x86_64 Amazon.com
gpg-pubkey-6963f07f-57fad2ec- (none) (none)
More information
If you would like to know more about a specific rpm package!
3) request installed rpm
# rpm -qi [rpm_name]
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ How to check the provider of installed RPM packages on Linux ??
1) List of RPM Package Vendor Information
To list all rpm's with vendor information, use the βquery format (βof) parameter.
# rpm -qa --queryformat '% {NAME} -% {VERSION} -% {RELEASE}.% {ARCH}% {VENDOR} \ n'
Output example:
# rpm -qa --queryformat '% {NAME} -% {VERSION} -% {RELEASE}.% {ARCH}% {VENDOR} \ n'
python3-pyparted-3.11.0-13.el8.x86_64 CentOS
python3-gobject-base-3.28.3-1.el8.x86_64 CentOS
libvirt-daemon-driver-secret-4.5.0-42.module_el8.2.0 + 320 + 13f867d7.x86_64 CentOS
gnome-screenshot-3.26.0-3.el8.x86_64 CentOS
fontpackages-filesystem-1.44-22.el8.noarch CentOS
libevdev-1.8.0-1.el8.x86_64 CentOS
cronie-1.5.2-4.el8.x86_64 CentOS
lua-json-1.3.2-9.el8.noarch CentOS
mesa-libglapi-19.3.4-2.el8.x86_64 CentOS
baobab-3.28.0-4.el8.x86_64 CentOS
xkeyboard-config-2.28-1.el8.noarch CentOS
...
2) List of third party or non-native packages
To list all packages that are not provided by CentOS, run the following command:
# rpm -qa --qf "% {NAME} -% {VERSION} -% {RELEASE} -% {ARCH}% {VENDOR} \ n" | awk '{if ($ 2! = "CentOS") print $ 0;}'
Sample output from a CentOS 8 server:
# rpm -qa --qf "% {NAME} -% {VERSION} -% {RELEASE} -% {ARCH}% {VENDOR} \ n" | awk '{if ($ 2! = "CentOS") print $ 0;}'
gpg-pubkey-8483c65d-5ccc5b19- (none) (none)
amazon-ssm-agent-2.3.1644.0-1-x86_64 Amazon.com
gpg-pubkey-6963f07f-57fad2ec- (none) (none)
More information
If you would like to know more about a specific rpm package!
3) request installed rpm
# rpm -qi [rpm_name]
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Apple's independent domestic repair service company will repair the iPhone on-site!
#International
#International
β β β Uππ»βΊπ«Δπ¬πβ β β β
ITWSV- Integrated Tool for Web Security Vulnerability:
ITWSV is automated penetration testing tool which performs information gathering, auditing and reporting.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/penetrate2hack/ITWSV.git
2) cd ITWSV
3) chmod +x start.sh
4) chmod +x update.sh (only if required)
5) ./start.sh
6) choose option> WHOIS
DNSWALK
FIERCE
DNSRecon
DNSenum
NMAP
DMitry
theHarvester
LBD
SSLScan
SSLYze
WhatWeb
Automater
Grabber
Parsero
Uniscan
Metagoofil
A2SV
WPScan
Droopescan
WPSeku
XssPy
Spaghetti
sublist3r
WAFW00F
nslookup
nslookup
dirsearch
OWASP Joomscan
Spaghetti
Globuster
Grabber
β β β Uππ»βΊπ«Δπ¬πβ β β β
ITWSV- Integrated Tool for Web Security Vulnerability:
ITWSV is automated penetration testing tool which performs information gathering, auditing and reporting.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/penetrate2hack/ITWSV.git
2) cd ITWSV
3) chmod +x start.sh
4) chmod +x update.sh (only if required)
5) ./start.sh
6) choose option> WHOIS
DNSWALK
FIERCE
DNSRecon
DNSenum
NMAP
DMitry
theHarvester
LBD
SSLScan
SSLYze
WhatWeb
Automater
Grabber
Parsero
Uniscan
Metagoofil
A2SV
WPScan
Droopescan
WPSeku
XssPy
Spaghetti
sublist3r
WAFW00F
nslookup
nslookup
dirsearch
OWASP Joomscan
Spaghetti
Globuster
Grabber
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - penetrate2hack/ITWSV: ITWSV- Integrated Tool for Web Security Vulnerability
ITWSV- Integrated Tool for Web Security Vulnerability - penetrate2hack/ITWSV
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Operators of Revil ransomware threaten to upload photographs pertaining to cosmetic surgery.
#Malwares
#Malwares
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ALL FREE :
Dynamic Reverse Shell generator (PHP, Bash, Ruby, Python, Perl, Netcat)
Shell Spawning (TTY Shell Spawning)
XSS Payloads
Basic SQLi payloads
Local file inclusion payloads (LFI)
Base64 Encoder / Decoder
Hash Generator (MD5, SHA1, SHA256, SHA512, SM3)
Useful Linux commands (Port Forwarding, SUID)
RSS Feed (Exploit DB, Cisco Security Advisories, CXSECURITY)
CVE Search Engine
Various method of data exfiltration and download from a remote
machine
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) install this extension in your browser: https://addons.mozilla.org/en-US/firefox/addon/hacktools/
2) switch on from extension manager
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ALL FREE :
Dynamic Reverse Shell generator (PHP, Bash, Ruby, Python, Perl, Netcat)
Shell Spawning (TTY Shell Spawning)
XSS Payloads
Basic SQLi payloads
Local file inclusion payloads (LFI)
Base64 Encoder / Decoder
Hash Generator (MD5, SHA1, SHA256, SHA512, SM3)
Useful Linux commands (Port Forwarding, SUID)
RSS Feed (Exploit DB, Cisco Security Advisories, CXSECURITY)
CVE Search Engine
Various method of data exfiltration and download from a remote
machine
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) install this extension in your browser: https://addons.mozilla.org/en-US/firefox/addon/hacktools/
2) switch on from extension manager
β β β Uππ»βΊπ«Δπ¬πβ β β β
addons.mozilla.org
HackTools β Get this Extension for π¦ Firefox (en-US)
Download HackTools for Firefox. Hacktools, is a web extension facilitating your web application penetration tests, it includes cheat sheets as well as all the tools used during a test such as XSS payloads, Reverse shells to test your web application.
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS