Should respond with 403 Forbidden
E N J O Y WITH Under Code:
WRITTEN BY @UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ
E N J O Y WITH Under Code:
WRITTEN BY @UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ
๐ฆTermux 2019 tool :
PentBox is a tool that allows us to create honeypot in systema this is written in ruby language
t.me/UnderCodeTestingOfficial
๐ฆFeatures:
> Command execution in gets (STDIN) implemented. (!command)
> Honeypot now shows attacker's IP and port (thx Shyish)
> Ip grabber direct targeting from email: yahoo,gmail,hotmail & sites like facebook gmail ...etc
> Included log options.
> Wordlist is bigger now.
> Included "back" option on menus. New tools:
> Included new area, Web tools.
> Included new module MAC address geolocation (samy.pl).
> Included new module HTTP directory bruteforce.
> Included new module HTTP common files bruteforce.
> Included exploits for DoS [other/http] 3Com SuperStack Switch DoS [other/http] 3Com OfficeConnect Routers DoS (Content-Type) [windows/
>ftp] Windows 7 IIS7.5 FTPSVC UNAUTH'D DoS [windows/ftp] Solar FTP Server 2.1 DoS [windows/pptp] MS02-063 PPTP Malformed Control Data
>Kernel DoS [windows/smb] Windows Vista/7 SMB2.0 Negotiate Protocol Request DoS BSOD
> Included pb_update.rb to update PenTBox from the SVN repository. Bugfixing:
> Fixed issue with SHODAN API.
> Deleted l33t speak and extra menu.
> Improved permissions checking, now it's done by euid, not username (thx r4mosg)
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/technicaldada/pentbox
2) cd pentbox
3) tar -zxvf pentbox.tar.gz
4) cd pentbox
5) chmod 777 pentbox.rb
6) ./pentbox.rb
Written by ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆTermux 2019 tool :
PentBox is a tool that allows us to create honeypot in systema this is written in ruby language
t.me/UnderCodeTestingOfficial
๐ฆFeatures:
> Command execution in gets (STDIN) implemented. (!command)
> Honeypot now shows attacker's IP and port (thx Shyish)
> Ip grabber direct targeting from email: yahoo,gmail,hotmail & sites like facebook gmail ...etc
> Included log options.
> Wordlist is bigger now.
> Included "back" option on menus. New tools:
> Included new area, Web tools.
> Included new module MAC address geolocation (samy.pl).
> Included new module HTTP directory bruteforce.
> Included new module HTTP common files bruteforce.
> Included exploits for DoS [other/http] 3Com SuperStack Switch DoS [other/http] 3Com OfficeConnect Routers DoS (Content-Type) [windows/
>ftp] Windows 7 IIS7.5 FTPSVC UNAUTH'D DoS [windows/ftp] Solar FTP Server 2.1 DoS [windows/pptp] MS02-063 PPTP Malformed Control Data
>Kernel DoS [windows/smb] Windows Vista/7 SMB2.0 Negotiate Protocol Request DoS BSOD
> Included pb_update.rb to update PenTBox from the SVN repository. Bugfixing:
> Fixed issue with SHODAN API.
> Deleted l33t speak and extra menu.
> Improved permissions checking, now it's done by euid, not username (thx r4mosg)
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/technicaldada/pentbox
2) cd pentbox
3) tar -zxvf pentbox.tar.gz
4) cd pentbox
5) chmod 777 pentbox.rb
6) ./pentbox.rb
Written by ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆTermux/Kali/Parrot package manager script 2019
package manager for hacker's. onex manage large number's of hacking tools that can be installed on single click. Using onex, you can install all hacking tools in Termux and other Linux based distributions. onex can install more than 370+ kali linux hacking tools. use onex install [tool_name] command to install any hacking tool.
instagram.com/UnderCodeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
Open the terminal and type following commands.
1) apt update
2) apt install git
3) git clone https://github.com/Rajkumrdusad/onex.git
4) chmod +x onex/install
5) sh onex/install if not work than use ./onex/install
๐ฆonex start to start onex menu mode:
> Enter a Number for a specific output:
(1) : To show all available tools and type the number of a tool which you want to install.
(2) : To show tools category.
(3) : If you want to update onex.
(4) : If you want to know About Us.
(5) : To exit the tool.
Written by ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆTermux/Kali/Parrot package manager script 2019
package manager for hacker's. onex manage large number's of hacking tools that can be installed on single click. Using onex, you can install all hacking tools in Termux and other Linux based distributions. onex can install more than 370+ kali linux hacking tools. use onex install [tool_name] command to install any hacking tool.
instagram.com/UnderCodeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
Open the terminal and type following commands.
1) apt update
2) apt install git
3) git clone https://github.com/Rajkumrdusad/onex.git
4) chmod +x onex/install
5) sh onex/install if not work than use ./onex/install
๐ฆonex start to start onex menu mode:
> Enter a Number for a specific output:
(1) : To show all available tools and type the number of a tool which you want to install.
(2) : To show tools category.
(3) : If you want to update onex.
(4) : If you want to know About Us.
(5) : To exit the tool.
Written by ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆRemote Access Tool/Botnet
Loki is Remote Access Tool.
Loki uses RSA-2048 with AES-256 to keep your communication secure.
Warning: DO NOT upload any samples generated by this program to online scanners.
instagram.com/UnderCodeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/Pure-L0G1C/Loki
2) pip install -r requirements.txt
3)open /lib/const.py & configure your private and public IP's
4) start loki.py
5) navigate to http://127.0.0.1:5000
6) login, Username: loki Password: ikol
7) navigate to settings, selected server tab and start the server on the same IP as your private IP
8) Click the home button
9) Generate a payload
10) Navigate to the agent directory
> Run: python builder.py -h
It will not compile inside a virtual enivornment
> After connection
11) You can click the hostname of the bot once it connects
> Explore
๐ฆFeatures:
>Upload & Download
> Chrome Launching
> Persistence
> Screenshot
> Keylogger
> Ddos
> SFTP
> SSH
Written by ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆRemote Access Tool/Botnet
Loki is Remote Access Tool.
Loki uses RSA-2048 with AES-256 to keep your communication secure.
Warning: DO NOT upload any samples generated by this program to online scanners.
instagram.com/UnderCodeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/Pure-L0G1C/Loki
2) pip install -r requirements.txt
3)open /lib/const.py & configure your private and public IP's
4) start loki.py
5) navigate to http://127.0.0.1:5000
6) login, Username: loki Password: ikol
7) navigate to settings, selected server tab and start the server on the same IP as your private IP
8) Click the home button
9) Generate a payload
10) Navigate to the agent directory
> Run: python builder.py -h
It will not compile inside a virtual enivornment
> After connection
11) You can click the hostname of the bot once it connects
> Explore
๐ฆFeatures:
>Upload & Download
> Chrome Launching
> Persistence
> Screenshot
> Keylogger
> Ddos
> SFTP
> SSH
Written by ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow to get MacOs ? And How To convert to .iso?
instagram.com/UnderCodeTestingCompany
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) There is no way to legitimately get the file without having access to a Mac, and a licensed copy of the OS via a purchase (unless you are a member of the Developer Program, for which you can expect to pay far more than the cost of the OS, what with it being free)
2) But if you can blag some access time on a Mac, then you can download the OS from the Mac App Store (You may need to Option+Click the Purchased section to force it to reshow them if you have downloaded them at least once already).
3)Once you have the installer downloaded and sat in your dock, you can simply pick it apart and get to the image file that is inside it.
4) This is the official way to get the file direct from Apple, but there is still work to do to make it into an ISO
5) Once youโve downloaded Mavericks, find the installer on your Mac. Itโs called Install OS X Mavericks.app and it should have been downloaded to your main Applications folder or be sat in your Dock.
6) Right-click (or Control+click) the installer, and choose Show Package Contents from the resulting contextual menu.
7) In the folder that appears, open Contents > Shared Support; youโll see a disk image file called InstallESD.dmg
8) This dmg file is in essence an ISO file in s slightly different format. We'll need to convert it. Open up Disk Utility and:
9) From the menu bar, select Images > Convert and point it to your .dmg file
10) In the Save As dialog that follows, select DVD/CD master. Disk Utility will insist on saving the new ISO as a .cdr file, but it is really an ISO.
11) When complete, you can rename it to .iso in Finder.
12) Use an external HD or thumb drive which is in ExFAT format (Compared to FAT format, this allows for single files larger than 4GB).
13) Copy the .iso file and access it on the other system or vm...
Wrtten by Steave
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow to get MacOs ? And How To convert to .iso?
instagram.com/UnderCodeTestingCompany
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) There is no way to legitimately get the file without having access to a Mac, and a licensed copy of the OS via a purchase (unless you are a member of the Developer Program, for which you can expect to pay far more than the cost of the OS, what with it being free)
2) But if you can blag some access time on a Mac, then you can download the OS from the Mac App Store (You may need to Option+Click the Purchased section to force it to reshow them if you have downloaded them at least once already).
3)Once you have the installer downloaded and sat in your dock, you can simply pick it apart and get to the image file that is inside it.
4) This is the official way to get the file direct from Apple, but there is still work to do to make it into an ISO
5) Once youโve downloaded Mavericks, find the installer on your Mac. Itโs called Install OS X Mavericks.app and it should have been downloaded to your main Applications folder or be sat in your Dock.
6) Right-click (or Control+click) the installer, and choose Show Package Contents from the resulting contextual menu.
7) In the folder that appears, open Contents > Shared Support; youโll see a disk image file called InstallESD.dmg
8) This dmg file is in essence an ISO file in s slightly different format. We'll need to convert it. Open up Disk Utility and:
9) From the menu bar, select Images > Convert and point it to your .dmg file
10) In the Save As dialog that follows, select DVD/CD master. Disk Utility will insist on saving the new ISO as a .cdr file, but it is really an ISO.
11) When complete, you can rename it to .iso in Finder.
12) Use an external HD or thumb drive which is in ExFAT format (Compared to FAT format, this allows for single files larger than 4GB).
13) Copy the .iso file and access it on the other system or vm...
Wrtten by Steave
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆwhat is AOXdeface tools?
AOXdeface is a tool for defacing dozens or hundreds of sites at once,depending on the number of sites that have been determined by you, this is not dangerous, and this is only the file upload method
t.me/UnderCodeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
A)Termux:
pkg install python2
pip2 install requests
pkg install git
git clone https://github.com/Ranginang67/AOXdeface
cd AOXdeface
python2 aox.py
B)Linux:
apt-get install python
apt-get install pthon-pip
pip install requests
apt-get install git
git clone https://github.com/Ranginang67/AOXdeface
cd AOXdeface
python aox.py
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆwhat is AOXdeface tools?
AOXdeface is a tool for defacing dozens or hundreds of sites at once,depending on the number of sites that have been determined by you, this is not dangerous, and this is only the file upload method
t.me/UnderCodeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
A)Termux:
pkg install python2
pip2 install requests
pkg install git
git clone https://github.com/Ranginang67/AOXdeface
cd AOXdeface
python2 aox.py
B)Linux:
apt-get install python
apt-get install pthon-pip
pip install requests
apt-get install git
git clone https://github.com/Ranginang67/AOXdeface
cd AOXdeface
python aox.py
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆwhat is Crypton tools?
cryton this a tools usefull for penetration testing, information gathering,
and for ethical hacking and this tools easy to use and easy to install
instagram.com/UnderCodeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
> install on kali, ubuntu, and parrot:
1) apt-get install git
2) git clone https://github.com/Ranginang67/Crypton
3) chmod 777 install.sh
4) ./install.sh
5) type crypton in term to run it
๐ฆFeatures:
feature information
> credit card validator checker to check whether the credit card is active
> Facebook account information to see all the information on your Facebook account
> social media name checker search for social media users associated with that username
> website backdoor scanner looking for a backdoor shell that is embedded on the website
>http header information get http header information from website
website analyze scanner scanning website vulnerability
>find admin login page for find the admin login page
gmail account checker checking if gmail account is exists
>find my facebook id find facebook user id
>dump all friend id dump all your friend ID on Facebook
domain age checker checking age of domain
>md5 hash cracker crack md5 password
ip adres checker search for information from the ip
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆwhat is Crypton tools?
cryton this a tools usefull for penetration testing, information gathering,
and for ethical hacking and this tools easy to use and easy to install
instagram.com/UnderCodeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
> install on kali, ubuntu, and parrot:
1) apt-get install git
2) git clone https://github.com/Ranginang67/Crypton
3) chmod 777 install.sh
4) ./install.sh
5) type crypton in term to run it
๐ฆFeatures:
feature information
> credit card validator checker to check whether the credit card is active
> Facebook account information to see all the information on your Facebook account
> social media name checker search for social media users associated with that username
> website backdoor scanner looking for a backdoor shell that is embedded on the website
>http header information get http header information from website
website analyze scanner scanning website vulnerability
>find admin login page for find the admin login page
gmail account checker checking if gmail account is exists
>find my facebook id find facebook user id
>dump all friend id dump all your friend ID on Facebook
domain age checker checking age of domain
>md5 hash cracker crack md5 password
ip adres checker search for information from the ip
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆSo we ve heared alot about Md5 and Still alot don t know exact definition for it so :
t.me/iOsDeveloppers
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) MD5 is a type of algorithm that is known as a cryptographic hash algorithm.
2) MD5 produces a hash value in a hexadecimal format. This competes with other designs where hash functions take in a certain piece of data, and change it to provide a key or value that can be used in place of the original value.
3) Security engineers and others are familiar with long lists of hash algorithms with different properties.
4) MD5 and other types of hash algorithms are often referred to as "message digest" functions.
5) The idea here is that a hash "digests" an original value and outputs a replacement value that is significantly different from the original.
6) Hashes have several main uses in security and database efficiency, related to the use of replacement values in searches and in data storage.
7) With the development of various hash algorithms, experts have noted that engineers found MD5 to have serious weaknesses in terms of not being "collision resistant." A collision happens when two hash values are found to be similar or the same.
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆSo we ve heared alot about Md5 and Still alot don t know exact definition for it so :
t.me/iOsDeveloppers
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) MD5 is a type of algorithm that is known as a cryptographic hash algorithm.
2) MD5 produces a hash value in a hexadecimal format. This competes with other designs where hash functions take in a certain piece of data, and change it to provide a key or value that can be used in place of the original value.
3) Security engineers and others are familiar with long lists of hash algorithms with different properties.
4) MD5 and other types of hash algorithms are often referred to as "message digest" functions.
5) The idea here is that a hash "digests" an original value and outputs a replacement value that is significantly different from the original.
6) Hashes have several main uses in security and database efficiency, related to the use of replacement values in searches and in data storage.
7) With the development of various hash algorithms, experts have noted that engineers found MD5 to have serious weaknesses in terms of not being "collision resistant." A collision happens when two hash values are found to be similar or the same.
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Telegram
iUNDERCODE IOS JAILBREAK SUPPORT & HELP
WELCOME TO iUNDERCODE BY UNDERCODE TESTING FOR IOS JAILBREAK & TWEAKS GROUP RULES @UNDERCODERULES
๐๐พ๐๐๐๐ฑ๐ ด
Youtube.com/c/Undercode
๐ ต๐ฐ๐ ฒ๐ ด๐ฑ๐พ๐พ๐ บ
@UndercOdeTesting
@iUNDERCODE
๐ ธ๐ ฝ๐๐๐ฐ๐ ถ๐๐ฐ๐ ผ
@UndercOdeTestinG
@iUNDERCODE
๐๐๐ ธ๐๐๐ ด๐
@iUNDERCODE
@UNDERCODENEWS
๐๐พ๐๐๐๐ฑ๐ ด
Youtube.com/c/Undercode
๐ ต๐ฐ๐ ฒ๐ ด๐ฑ๐พ๐พ๐ บ
@UndercOdeTesting
@iUNDERCODE
๐ ธ๐ ฝ๐๐๐ฐ๐ ถ๐๐ฐ๐ ผ
@UndercOdeTestinG
@iUNDERCODE
๐๐๐ ธ๐๐๐ ด๐
@iUNDERCODE
@UNDERCODENEWS
This media is not supported in your browser
VIEW IN TELEGRAM
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Passwords Attack The Popular tool Medusa :
> Medusa is a speedy, parallel, and modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application
instagram.com/UnderCodeTestingCompany
๐ฆFeatures :
1) Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently.
2) Flexible user input. Target information (host/user/password) can be specified in a variety of ways. For example, each item can be either a single entry or a file containing multiple entries. Additionally, a combination file format allows the user to refine their target listing.
3) Modular design. Each service module exists as an independent .mod file. This means that no modifications are necessary to the core application in order to extend the supported list of services for brute-forcing.
4) Multiple protocols supported. Many services are currently supported (e.g. SMB, HTTP, POP3, MS-SQL, SSHv2, among others).
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
> its preinstalled on kali os
Or
1) git clone https://github.com/jmk-foofus/medusa/blob/master
2) `cd' to the directory containing the package's source code and type
`./configure' to configure the package for your system.
3) using `csh' on an old version of System V, you might need to type
`sh ./configure' instead to prevent `csh' from trying to execute
`configure' itself.
4) Running `configure' takes a while. While running, it prints some
messages telling which features it is checking for.
5) Type `make' to compile the package.
6) Type `make install' to install the programs and any data files and
documentation.
7) You can remove the program binaries and object files from the
source code directory by typing `make clean'.
8) Note:
Some systems require unusual options for compilation or linking that
the `configure' script does not know about. You can give `configure'
initial values for variables by setting them in the environment. Using
a Bourne-compatible shell, you can do that on the command line like
this:
> CC=c89 CFLAGS=-O2 LIBS=-lposix ./configure
Or on systems that have the `env' program, you can do it like this:
env CPPFLAGS=-I/usr/local/include LDFLAGS=-s ./configure
๐ฆMacOs :
1) git clone https://github.com/jmk-foofus/medusa
2) cd medusa
3) macOS dependencies
brew install freerdp
> export FREERDP2_CFLAGS='-I/usr/local/include'
> export FREERDP2_LIBS='-I/usr/local/lib/freerdp'
4 )./configure
5) make
6 )./src/medusa
Wrtten by Steave
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Passwords Attack The Popular tool Medusa :
> Medusa is a speedy, parallel, and modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application
instagram.com/UnderCodeTestingCompany
๐ฆFeatures :
1) Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently.
2) Flexible user input. Target information (host/user/password) can be specified in a variety of ways. For example, each item can be either a single entry or a file containing multiple entries. Additionally, a combination file format allows the user to refine their target listing.
3) Modular design. Each service module exists as an independent .mod file. This means that no modifications are necessary to the core application in order to extend the supported list of services for brute-forcing.
4) Multiple protocols supported. Many services are currently supported (e.g. SMB, HTTP, POP3, MS-SQL, SSHv2, among others).
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
> its preinstalled on kali os
Or
1) git clone https://github.com/jmk-foofus/medusa/blob/master
2) `cd' to the directory containing the package's source code and type
`./configure' to configure the package for your system.
3) using `csh' on an old version of System V, you might need to type
`sh ./configure' instead to prevent `csh' from trying to execute
`configure' itself.
4) Running `configure' takes a while. While running, it prints some
messages telling which features it is checking for.
5) Type `make' to compile the package.
6) Type `make install' to install the programs and any data files and
documentation.
7) You can remove the program binaries and object files from the
source code directory by typing `make clean'.
8) Note:
Some systems require unusual options for compilation or linking that
the `configure' script does not know about. You can give `configure'
initial values for variables by setting them in the environment. Using
a Bourne-compatible shell, you can do that on the command line like
this:
> CC=c89 CFLAGS=-O2 LIBS=-lposix ./configure
Or on systems that have the `env' program, you can do it like this:
env CPPFLAGS=-I/usr/local/include LDFLAGS=-s ./configure
๐ฆMacOs :
1) git clone https://github.com/jmk-foofus/medusa
2) cd medusa
3) macOS dependencies
brew install freerdp
> export FREERDP2_CFLAGS='-I/usr/local/include'
> export FREERDP2_LIBS='-I/usr/local/lib/freerdp'
4 )./configure
5) make
6 )./src/medusa
Wrtten by Steave
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Crack hashes in seconds: Md5 Cracker 2019 :
t.me/UnderCodeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/s0md3v/Hash-Buster
2) cd Hash-Buster
3) Hash-Buster can be run directly from the python script but I highly suggest you to install it with
> make install
4) python hash.py/
5) buster -s <hash>
6) Finding hashes from a directory
just specify a directory and Hash Buster will go through all the files and directories present in it, looking for hashes.
> buster -d /root/Documents
7) Hash Buster can find your hashes even if they are stored in a file like this
๐ฆTested On:
> Kali
> Debian
Written by ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Crack hashes in seconds: Md5 Cracker 2019 :
t.me/UnderCodeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/s0md3v/Hash-Buster
2) cd Hash-Buster
3) Hash-Buster can be run directly from the python script but I highly suggest you to install it with
> make install
4) python hash.py/
5) buster -s <hash>
6) Finding hashes from a directory
just specify a directory and Hash Buster will go through all the files and directories present in it, looking for hashes.
> buster -d /root/Documents
7) Hash Buster can find your hashes even if they are stored in a file like this
๐ฆTested On:
> Kali
> Debian
Written by ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆREcommended by UnderCode Hardwares for Cracking Hash
T.me/UnderCodeTestingOfficial
๐ฆHardware
1) Geforce RTX 2080 Ti
> With over 758kH/s on HashCat, the Geforce RTX 2080 Ti is currently the best GPU for brute-forcing passwords.
> If you didn't decrypt your hash on MD5Online, you'll probably get it very fast with this monster
2) Raspberry Pi Zero
> The Raspberry Pi Zero is the perfect tool for pentesting. Mr Robot fan? Here is your new favorite device.
> You can install Kali Linux on it and enjoy all the included tools.
> This complete kit include anything you need.
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆREcommended by UnderCode Hardwares for Cracking Hash
T.me/UnderCodeTestingOfficial
๐ฆHardware
1) Geforce RTX 2080 Ti
> With over 758kH/s on HashCat, the Geforce RTX 2080 Ti is currently the best GPU for brute-forcing passwords.
> If you didn't decrypt your hash on MD5Online, you'll probably get it very fast with this monster
2) Raspberry Pi Zero
> The Raspberry Pi Zero is the perfect tool for pentesting. Mr Robot fan? Here is your new favorite device.
> You can install Kali Linux on it and enjoy all the included tools.
> This complete kit include anything you need.
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆBest 2019 Websites to Easily Help Decrypt MD5 Hashed Strings
instagram.com/UnderCodeTestingCompany
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) md5online.org
md5online.org contains 452 billion words in their database. Other than searching for the original word of the MD5 from the website, you can also request for a batch search which is limited to 100 lines and the results will be sent to the provided email address. They also provide a simple API for paid premium members where their service can be used to decrypt MD5 from a script, website or even application.
2) md5crack.com
Unlike most of the online websites that have their own database of MD5 and words, md5crack.com uses a combination of search engine indexes and rainbow tables to help search for a word matching the given MD5 hash. Free API usage without limitations is also available to everyone although the usage is closely monitored to prevent excessive use.
3) md5cracker.org
md5cracker.org shows that it automatically searches 11 different websites for a matching word of a provided MD5 hash. However after manually testing each database, we found that half of them donโt work anymore. It is still useful because the results are shown in real time without the need to refresh the webpage.
4) md5decrypt.org
Similar to md5cracker.org above, md5decrypt.org claims to search your hash on over 23 other websites for a matching word. It is hard to tell whether md5decrypt.org did crawl over 23 website to search for a matching word because it does not list the other websites being used and the search is very quick, that always takes nearly the same amount of time to return a result.
5) crackstation.net
crackstation.net is a password hash cracker that can automatically recognize different types of hash functions other than MD5 and search for the correct password for the given hash. It is able to accept up to 10 hashes at a time and uses their own wordlist consisting of every word found in Wikipedia and every password list that they could find. Other than that, theyโve also made their wordlist more efficient by applying intelligent word mangling
6) hashkiller.co.uk
Hashkiller.co.uk has been around since 2007 and has decrypted over a whopping 43 billion MD5 hashes to date! The decryption form accepts up to a maximum of 64 MD5 hashes to check at a time. They have a public forum which is very helpful because anyone can sign up for a free account and post a hash cracking request as long as it is below 25 hashes.
7) reverse-hash-lookup.online-domain-tools.com
Online Domain Tools is a website that provides many useful tools that can be used for networking, domain, web, browser, security, privacy, data, conversion, and coding purposes. One of their tools is a reverse hash lookup that can decrypt MD5, SHA1, SHA-256, LM and NTLM hash function to plaintext message. The form allows up to 5 hash values at a time and the result is shown instantly at the bottom of the form. The lookup is based on several online databases as well as engines using rainbow tables.
8) md5decrypt.net
md5decrypt.netโs database contains over a billion words but still is not considered to have one of the biggest wordlists. However, what we like about md5decrypt.net is the clean design with no advertisements at all and the ability to search for words that are hashed twice. A useful tip is the text box can actually support multiple hashes up to a maximum of 500 by putting each hash in a new line.
9) onlinehashcrack.com
Home ยป Hacking ยป 10 Websites to Easily Help Decrypt MD5 Hashed Strings
10 Websites to Easily Help Decrypt MD5 Hashed Strings
Raymond Updated 3 years ago Hacking 14 Comments
10) cmd5.org
๐ฆBest 2019 Websites to Easily Help Decrypt MD5 Hashed Strings
instagram.com/UnderCodeTestingCompany
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) md5online.org
md5online.org contains 452 billion words in their database. Other than searching for the original word of the MD5 from the website, you can also request for a batch search which is limited to 100 lines and the results will be sent to the provided email address. They also provide a simple API for paid premium members where their service can be used to decrypt MD5 from a script, website or even application.
2) md5crack.com
Unlike most of the online websites that have their own database of MD5 and words, md5crack.com uses a combination of search engine indexes and rainbow tables to help search for a word matching the given MD5 hash. Free API usage without limitations is also available to everyone although the usage is closely monitored to prevent excessive use.
3) md5cracker.org
md5cracker.org shows that it automatically searches 11 different websites for a matching word of a provided MD5 hash. However after manually testing each database, we found that half of them donโt work anymore. It is still useful because the results are shown in real time without the need to refresh the webpage.
4) md5decrypt.org
Similar to md5cracker.org above, md5decrypt.org claims to search your hash on over 23 other websites for a matching word. It is hard to tell whether md5decrypt.org did crawl over 23 website to search for a matching word because it does not list the other websites being used and the search is very quick, that always takes nearly the same amount of time to return a result.
5) crackstation.net
crackstation.net is a password hash cracker that can automatically recognize different types of hash functions other than MD5 and search for the correct password for the given hash. It is able to accept up to 10 hashes at a time and uses their own wordlist consisting of every word found in Wikipedia and every password list that they could find. Other than that, theyโve also made their wordlist more efficient by applying intelligent word mangling
6) hashkiller.co.uk
Hashkiller.co.uk has been around since 2007 and has decrypted over a whopping 43 billion MD5 hashes to date! The decryption form accepts up to a maximum of 64 MD5 hashes to check at a time. They have a public forum which is very helpful because anyone can sign up for a free account and post a hash cracking request as long as it is below 25 hashes.
7) reverse-hash-lookup.online-domain-tools.com
Online Domain Tools is a website that provides many useful tools that can be used for networking, domain, web, browser, security, privacy, data, conversion, and coding purposes. One of their tools is a reverse hash lookup that can decrypt MD5, SHA1, SHA-256, LM and NTLM hash function to plaintext message. The form allows up to 5 hash values at a time and the result is shown instantly at the bottom of the form. The lookup is based on several online databases as well as engines using rainbow tables.
8) md5decrypt.net
md5decrypt.netโs database contains over a billion words but still is not considered to have one of the biggest wordlists. However, what we like about md5decrypt.net is the clean design with no advertisements at all and the ability to search for words that are hashed twice. A useful tip is the text box can actually support multiple hashes up to a maximum of 500 by putting each hash in a new line.
9) onlinehashcrack.com
Home ยป Hacking ยป 10 Websites to Easily Help Decrypt MD5 Hashed Strings
10 Websites to Easily Help Decrypt MD5 Hashed Strings
Raymond Updated 3 years ago Hacking 14 Comments
10) cmd5.org
><claims to have the largest database in the world with 7.8 trillion unique records. They are similar to onlinehashcrack.com whereby they offer both a free and paid hash cracking service. Although not mentioned anywhere on their website, it seems like a cracked hash containing 6 characters or less is free while strings containing 7 characters or more require payment. Their cheapest package is they accept a minimum payment of $20 that includes 1000 hashes with no expiration to the credits. This is the only one that managed to decrypt the MD5 of the word โraymond.ccโ
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆMost advanced XSS scanner in 2019
> XSStrike is a Cross Site Scripting detection suite equipped with four hand written parsers, an intelligent payload generator, a powerful fuzzing engine and an incredibly fast crawler.
> Instead of injecting payloads and checking it works like all the other tools do, XSStrike analyses the response with multiple parsers and then crafts payloads that are guaranteed to work by context analysis integrated with a fuzzing engine. Here are some examples of the payloads generated by XSStrike:
}]};(confirm)()//\
<A%0aONMouseOvER%0d=%0d[8].find(confirm)>z
</tiTlE/><a%0donpOintErentER%0d=%0d(prompt)``>z
</SCRiPT/><DETAILs/+/onpoINTERenTEr%0a=%0aa=prompt,a()//
t.me/UndercOdeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/s0md3v/XSStrike
2) cd XSSrtike
3) pip install -m requirements.txt
4) python xsstrike.py
๐ฆFeatures:
> Reflected and DOM XSS scanning
> Multi-threaded crawling
> Context analysis
> Configurable core
> WAF detection & evasion
> Outdated JS lib scanning
> Intelligent payload generator
> Handmade HTML & JavaScript parser
> Powerful fuzzing engine
> Blind XSS support
Written by ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
> Highly researched work-flow
> Complete HTTP support
> Bruteforce payloads from a file
> Powered by Photon, Zetanize and Arjun
> Payload Encoding
@ Steaven(tm)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆMost advanced XSS scanner in 2019
> XSStrike is a Cross Site Scripting detection suite equipped with four hand written parsers, an intelligent payload generator, a powerful fuzzing engine and an incredibly fast crawler.
> Instead of injecting payloads and checking it works like all the other tools do, XSStrike analyses the response with multiple parsers and then crafts payloads that are guaranteed to work by context analysis integrated with a fuzzing engine. Here are some examples of the payloads generated by XSStrike:
}]};(confirm)()//\
<A%0aONMouseOvER%0d=%0d[8].find(confirm)>z
</tiTlE/><a%0donpOintErentER%0d=%0d(prompt)``>z
</SCRiPT/><DETAILs/+/onpoINTERenTEr%0a=%0aa=prompt,a()//
t.me/UndercOdeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/s0md3v/XSStrike
2) cd XSSrtike
3) pip install -m requirements.txt
4) python xsstrike.py
๐ฆFeatures:
> Reflected and DOM XSS scanning
> Multi-threaded crawling
> Context analysis
> Configurable core
> WAF detection & evasion
> Outdated JS lib scanning
> Intelligent payload generator
> Handmade HTML & JavaScript parser
> Powerful fuzzing engine
> Blind XSS support
Written by ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
> Highly researched work-flow
> Complete HTTP support
> Bruteforce payloads from a file
> Powered by Photon, Zetanize and Arjun
> Payload Encoding
@ Steaven(tm)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆNetwork Trick
Tensorflow implementation of Deep Convolutional Generative Adversarial Networks which is a stabilize Generative Adversarial Networks
instagram.com/UnderCodeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/carpedm20/DCGAN-tensorflow
2) cd DCGAN-tensorflow
3) python download.py mnist celebA
4) To train a model with downloaded dataset:
> python main.py --dataset mnist --input_height=28 --output_height=28 --train
> python main.py --dataset celebA --input_height=108 --train --crop
๐ฆ To test with an existing model:
1) python main.py --dataset mnist --input_height=28 --output_height=28
2) python main.py --dataset celebA --input_height=108 --crop
> Or, you can use your own dataset (without central crop) by:
3) mkdir data/DATASET_NAME
... add images to data/DATASET_NAME ...
4) python main.py --dataset DATASET_NAME --train
5) python main.py --dataset DATASET_NAME
6) # example
7) python main.py --dataset=eyes --input_fname_pattern="*_cropped.png" --train
8) If your dataset is located in a different root directory:
> python main.py --dataset DATASET_NAME --data_dir DATASET_ROOT_DIR --train
9) python main.py --dataset DATASET_NAME --data_dir DATASET_ROOT_DIR
> # example
10) python main.py --dataset=eyes --data_dir ../datasets/ --input_fname_pattern="*_cropped.png" --train
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆNetwork Trick
Tensorflow implementation of Deep Convolutional Generative Adversarial Networks which is a stabilize Generative Adversarial Networks
instagram.com/UnderCodeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/carpedm20/DCGAN-tensorflow
2) cd DCGAN-tensorflow
3) python download.py mnist celebA
4) To train a model with downloaded dataset:
> python main.py --dataset mnist --input_height=28 --output_height=28 --train
> python main.py --dataset celebA --input_height=108 --train --crop
๐ฆ To test with an existing model:
1) python main.py --dataset mnist --input_height=28 --output_height=28
2) python main.py --dataset celebA --input_height=108 --crop
> Or, you can use your own dataset (without central crop) by:
3) mkdir data/DATASET_NAME
... add images to data/DATASET_NAME ...
4) python main.py --dataset DATASET_NAME --train
5) python main.py --dataset DATASET_NAME
6) # example
7) python main.py --dataset=eyes --input_fname_pattern="*_cropped.png" --train
8) If your dataset is located in a different root directory:
> python main.py --dataset DATASET_NAME --data_dir DATASET_ROOT_DIR --train
9) python main.py --dataset DATASET_NAME --data_dir DATASET_ROOT_DIR
> # example
10) python main.py --dataset=eyes --data_dir ../datasets/ --input_fname_pattern="*_cropped.png" --train
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆPyTorch implementation of "Efficient Neural Architecture Search via Parameters Sharing"
termux/Kali
t.me/UnderCodeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/carpedm20/ENAS-pytorch
2) cd ENAS-pytorch
3) conda install graphviz
4) pip install -r requirements.txt
5) To train ENAS to discover a recurrent cell for RNN:
> python main.py --network_type rnn --dataset ptb --controller_optim adam --controller_lr 0.00035 \
--shared_optim sgd --shared_lr 20.0 --entropy_coeff 0.0001
6) python main.py --network_type rnn --dataset wikitext
7) To train ENAS to discover CNN architecture (in progress):
> python main.py --network_type cnn --dataset cifar --controller_optim momentum --controller_lr_cosine=True \
--controller_lr_max 0.05 --controller_lr_min 0.0001 --entropy_coeff 0.1
8) You can see the details of training (e.g. reward, entropy, loss) with:
> tensorboard --logdir=logs --port=6006
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆPyTorch implementation of "Efficient Neural Architecture Search via Parameters Sharing"
termux/Kali
t.me/UnderCodeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/carpedm20/ENAS-pytorch
2) cd ENAS-pytorch
3) conda install graphviz
4) pip install -r requirements.txt
5) To train ENAS to discover a recurrent cell for RNN:
> python main.py --network_type rnn --dataset ptb --controller_optim adam --controller_lr 0.00035 \
--shared_optim sgd --shared_lr 20.0 --entropy_coeff 0.0001
6) python main.py --network_type rnn --dataset wikitext
7) To train ENAS to discover CNN architecture (in progress):
> python main.py --network_type cnn --dataset cifar --controller_optim momentum --controller_lr_cosine=True \
--controller_lr_max 0.05 --controller_lr_min 0.0001 --entropy_coeff 0.1
8) You can see the details of training (e.g. reward, entropy, loss) with:
> tensorboard --logdir=logs --port=6006
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ