โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆDatabase Hacking :
> sqlsus is an open source MySQL injection and takeover tool, written in perl.
> Via a command line interface, you can retrieve the database(s) structure, inject your own SQL queries (even complex ones), download files from the web server, crawl the website for writable directories, upload and control a backdoor, clone the database(s), and much moreโฆ
Whenever relevant, sqlsus will mimic a MySQL console output.
> sqlsus focuses on speed and efficiency, optimizing the available injection space, making the best use (I can think of) of MySQL functions.
It uses stacked subqueries and an powerful blind injection algorithm to maximize the data gathered per web server hit.
Using multi-threading on top of that, sqlsus is an extremely fast database dumper, be it for inband or blind injection.
t.me/UndercOdeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) download official site :
>https://sourceforge.net/projects/sqlsus/files/sqlsus/sqlsus-0.7.2.tgz/download
(kali preinstalled tool)
2) Unzip & go dir then
3) sqlsus -h
๐ฆ Options:
-h, --help brief help message
-v, --version version information
-e, --execute <commands> execute commands and exit
-g, --genconf <filename> generate configuration file
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆDatabase Hacking :
> sqlsus is an open source MySQL injection and takeover tool, written in perl.
> Via a command line interface, you can retrieve the database(s) structure, inject your own SQL queries (even complex ones), download files from the web server, crawl the website for writable directories, upload and control a backdoor, clone the database(s), and much moreโฆ
Whenever relevant, sqlsus will mimic a MySQL console output.
> sqlsus focuses on speed and efficiency, optimizing the available injection space, making the best use (I can think of) of MySQL functions.
It uses stacked subqueries and an powerful blind injection algorithm to maximize the data gathered per web server hit.
Using multi-threading on top of that, sqlsus is an extremely fast database dumper, be it for inband or blind injection.
t.me/UndercOdeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) download official site :
>https://sourceforge.net/projects/sqlsus/files/sqlsus/sqlsus-0.7.2.tgz/download
(kali preinstalled tool)
2) Unzip & go dir then
3) sqlsus -h
๐ฆ Options:
-h, --help brief help message
-v, --version version information
-e, --execute <commands> execute commands and exit
-g, --genconf <filename> generate configuration file
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆFlip lets you declare and manage feature flags, backed by cookies (private testing) and database (site-wide). last 2019
instagram.com/UndercOdeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/pda/flip
2) cd flip
3) Generate the model and migration
> rails g flip:install
4) Run the migration
> rake db:migrate
# Include the Feature model, e.g. config/initializers/feature.rb:
๐ฆChecking Features
Flip.on? or the dynamic predicate methods are used to check feature state:
Flip.on? :world_domination # true
Flip.world_domination? # true
Flip.on? :shiny_things # false
Flip.shiny_things? # false
๐ฆViews and controllers use the feature?(key) method:
<div>
<% if feature? :world_domination %>
<%= link_to "Dominate World", world_dominations_path %>
<% end %>
</div>
๐ฆFEATURES:
This gem optimizes for:
1) developer ease-of-use,
2) visibility and control for other stakeholders (like marketing); and
3) run-time performance
ยป There are three layers of strategies per feature:
default
database, to flip features site-wide for all users
cookie, to flip features just for you (or someone else)
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆFlip lets you declare and manage feature flags, backed by cookies (private testing) and database (site-wide). last 2019
instagram.com/UndercOdeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/pda/flip
2) cd flip
3) Generate the model and migration
> rails g flip:install
4) Run the migration
> rake db:migrate
# Include the Feature model, e.g. config/initializers/feature.rb:
๐ฆChecking Features
Flip.on? or the dynamic predicate methods are used to check feature state:
Flip.on? :world_domination # true
Flip.world_domination? # true
Flip.on? :shiny_things # false
Flip.shiny_things? # false
๐ฆViews and controllers use the feature?(key) method:
<div>
<% if feature? :world_domination %>
<%= link_to "Dominate World", world_dominations_path %>
<% end %>
</div>
๐ฆFEATURES:
This gem optimizes for:
1) developer ease-of-use,
2) visibility and control for other stakeholders (like marketing); and
3) run-time performance
ยป There are three layers of strategies per feature:
default
database, to flip features site-wide for all users
cookie, to flip features just for you (or someone else)
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆAccurately Locate Smartphones # using Social Engineering๐
2019-2020 (Termux/Linux..)
t.me/UndercOdeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
>Kali Linux / Ubuntu / Parrot OS
1) git clone https://github.com/thewhiteh4t/seeker.git
2) cd seeker/
3) chmod 777 install.sh
4) ./install.sh
5)BlackArch Linux
6)pacman -S seeker
> Docker
docker pull thewhiteh4t/seeker
๐ฆTermux
1)git clone https://github.com/thewhiteh4t/seeker.git
2)cd seeker/
3)chmod 777 termux_install.sh
4)./termux_install.sh
ยปUsage
> python3 seeker.py -h
For Help options
> seeker.py [-h] [-s SUBDOMAIN]
to Run it
๐ฆoptional arguments:
-h, --help show this help message and exit
-s SUBDOMAIN, --subdomain Subdomain Provide Subdomain for Serveo URL ( Optional )
-k KML, --kml KML Provide KML Filename ( Optional )
-t TUNNEL, --tunnel TUNNEL Specify Tunnel Mode [manual]
๐ฆHow It Works ??
> Concept behind Seeker is simple, just like we host phishing pages to get credentials why not host a fake page that requests your location like many popular location based websites.
> Seeker Hosts a fake website on In Built PHP Server and uses Serveo to generate a link which we will forward to the target, website asks for Location
๐ฆwe can get :
> Longitude
> Latitude
>Accuracy
>Altitude - Not always available
>Direction - Only available if user is moving
>Speed - Only available if user is moving
>Along with Location Information we also get Device Information
without any permissions :
>Operating System
>Platform
>Number of CPU Cores
>Amount of RAM - Approximate Results
>Screen Resolution
>GPU information
>Browser Name and Version
>Public IP Address
>IP Address Reconnaissance
๐ฆTested By UndercOde On:
>Ubanto
> Termux
>Kali
E N J O Y W I T H U N D E R C O D E
@UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆAccurately Locate Smartphones # using Social Engineering๐
2019-2020 (Termux/Linux..)
t.me/UndercOdeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
>Kali Linux / Ubuntu / Parrot OS
1) git clone https://github.com/thewhiteh4t/seeker.git
2) cd seeker/
3) chmod 777 install.sh
4) ./install.sh
5)BlackArch Linux
6)pacman -S seeker
> Docker
docker pull thewhiteh4t/seeker
๐ฆTermux
1)git clone https://github.com/thewhiteh4t/seeker.git
2)cd seeker/
3)chmod 777 termux_install.sh
4)./termux_install.sh
ยปUsage
> python3 seeker.py -h
For Help options
> seeker.py [-h] [-s SUBDOMAIN]
to Run it
๐ฆoptional arguments:
-h, --help show this help message and exit
-s SUBDOMAIN, --subdomain Subdomain Provide Subdomain for Serveo URL ( Optional )
-k KML, --kml KML Provide KML Filename ( Optional )
-t TUNNEL, --tunnel TUNNEL Specify Tunnel Mode [manual]
๐ฆHow It Works ??
> Concept behind Seeker is simple, just like we host phishing pages to get credentials why not host a fake page that requests your location like many popular location based websites.
> Seeker Hosts a fake website on In Built PHP Server and uses Serveo to generate a link which we will forward to the target, website asks for Location
๐ฆwe can get :
> Longitude
> Latitude
>Accuracy
>Altitude - Not always available
>Direction - Only available if user is moving
>Speed - Only available if user is moving
>Along with Location Information we also get Device Information
without any permissions :
>Operating System
>Platform
>Number of CPU Cores
>Amount of RAM - Approximate Results
>Screen Resolution
>GPU information
>Browser Name and Version
>Public IP Address
>IP Address Reconnaissance
๐ฆTested By UndercOde On:
>Ubanto
> Termux
>Kali
E N J O Y W I T H U N D E R C O D E
@UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆwhat is a Hyperparameter Optimization ?
instagram.com/UndercodeTestingCompany
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
> The same types of machine learning models may require different assumptions, weights, or learning speeds for different types of data. These parameters are called hyperparameters and should be adjusted so that the model can optimally solve the training problem
๐ฆcan be by :
1) Grid Search
> The traditional method for optimizing hyperparameters is to search by a lattice (or a variation of parameters ), which simply does a full search on a manually specified subset of the space of hyperparameters of the training algorithm. A grid search should be accompanied by some measure of performance, usually measured by cross-checking on a training set , or by running an algorithm on an established test set
2) Random Search
>Random search replaces the exhaustive search of all combinations by randomly selecting them. This can be easily applied to the discrete settings given above, but the method can also be generalized to continuous and mixed spaces. Random search can outperform grid search, especially if only a small number of hyperparameters affects the performance of the machine learning algorithm
3) Bayesian Optimization
> Bayesian optimization is a global optimization method for an unknown function (black box) with noise. Applied to hyperparametric optimization, Bayesian optimization constructs a stochastic model of the mapping function from the values โโof the hyperparameter to the objective function applied on the set of checks.
> By iteratively applying a promising configuration of hyperparameters based on the current model, and then updating it, Bayesian optimization seeks to collect as much information as possible about this function
4) Gradient Optimization
For specific learning algorithms, you can calculate the gradient of hyperparameters and optimize them using gradient descent
5) Evolutionary Optimization
a) create an initial population of random solutions (that is, a randomly generated tuple of hyperparameters, usually 100+)
b) We evaluate the tuples of hyperparameters and obtain their fitness function (for example, using 10-fold accuracy of cross-checking the learning algorithm of a machine with these hyperparameters)
c) Rank tuples of hyperparameters according to their relative suitability
d) Replace tuples of hyperparameters with worse performance with new tuples of hyperparameters formed by crossing [en] and mutation [en]
e) Repeat steps 2โ4 until we obtain a satisfactory algorithm performance or until the performance stops improving
Powred by wiki
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆwhat is a Hyperparameter Optimization ?
instagram.com/UndercodeTestingCompany
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
> The same types of machine learning models may require different assumptions, weights, or learning speeds for different types of data. These parameters are called hyperparameters and should be adjusted so that the model can optimally solve the training problem
๐ฆcan be by :
1) Grid Search
> The traditional method for optimizing hyperparameters is to search by a lattice (or a variation of parameters ), which simply does a full search on a manually specified subset of the space of hyperparameters of the training algorithm. A grid search should be accompanied by some measure of performance, usually measured by cross-checking on a training set , or by running an algorithm on an established test set
2) Random Search
>Random search replaces the exhaustive search of all combinations by randomly selecting them. This can be easily applied to the discrete settings given above, but the method can also be generalized to continuous and mixed spaces. Random search can outperform grid search, especially if only a small number of hyperparameters affects the performance of the machine learning algorithm
3) Bayesian Optimization
> Bayesian optimization is a global optimization method for an unknown function (black box) with noise. Applied to hyperparametric optimization, Bayesian optimization constructs a stochastic model of the mapping function from the values โโof the hyperparameter to the objective function applied on the set of checks.
> By iteratively applying a promising configuration of hyperparameters based on the current model, and then updating it, Bayesian optimization seeks to collect as much information as possible about this function
4) Gradient Optimization
For specific learning algorithms, you can calculate the gradient of hyperparameters and optimize them using gradient descent
5) Evolutionary Optimization
a) create an initial population of random solutions (that is, a randomly generated tuple of hyperparameters, usually 100+)
b) We evaluate the tuples of hyperparameters and obtain their fitness function (for example, using 10-fold accuracy of cross-checking the learning algorithm of a machine with these hyperparameters)
c) Rank tuples of hyperparameters according to their relative suitability
d) Replace tuples of hyperparameters with worse performance with new tuples of hyperparameters formed by crossing [en] and mutation [en]
e) Repeat steps 2โ4 until we obtain a satisfactory algorithm performance or until the performance stops improving
Powred by wiki
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow to Speed up Python code using the language itself
Twitter.com/UndercODEtC
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
>Python C Extensions
C API, which makes it possible to relatively transparently integrate C-code into Python programs. There are only two drawbacks to this solution:
1) The "entry threshold" for C and the Python / C API is still higher than for the "bare" Python, which cuts this option off for developers not familiar with C
2) One of the key features of Python is development speed. Writing part of a C program reduces it in proportion to the part of the code rewritten in C for the entire program
> So, this method is also not suitable for everyone.
๐ฆTo Speedup :
1) Removing the main program code to a separate
> This step helps the python interpreter to better perform internal optimizations about startup, and when using psyco, this step can help a lot, because psyco only optimizes functions without affecting the main body of the program.
If earlier, the calculated part of the original program looked like this:
for Y in xrange(height):
for X in xrange(width):
> Then, changing it to:
def mandelbrot(height, itt, width):
for Y in xrange(height):
for X in xrange(width):
mandelbrot(height, itt, width)
2) Profiling:
python -m cProfile sample.py
The -m interpreter switch allows you to run modules as separate programs, if the module itself provides such an opportunity.
The result of this command will be to get the โprofileโ of the program - a table, of the form. Using it, it is easy to determine the places that need optimization (the rows with the highest values โโof ncalls (number of function calls), tottime and percall (the operating time of all calls to this function and each individual respectively)). For convenience, you can add a key
4613944 function calls (4613943 primitive calls) in 2.818 seconds
Ordered by: internal time
ncalls tottime percall cumtime percall filename:lineno(function)
1 2.309 2.309 2.766 2.766 mand_slow.py:22(mandelbrot)
...
3) Profile Analysis
We see that in the first place in timeof the example main function mandelbrot by Undercode , followed by the system function abs, followed by several functions from the math module, then single calls to functions with minimal time costs, we are not interested in.
4) Maths in code :
>that the exponentiation operator is quite โgeneralโ, but we need only the exponentiation, that is, all constructions of the form x 2 can be replaced by x * x, thus gaining a little more time.
> Let's look at the time:
1.9 sec , or 62% of the original time, achieved by simply replacing Few lines:
p = math.sqrt
better than do
>pix = img.load()
def mandelbrot(height, itt, width):
step_x = (2 - width / 1.29) / (width / 2.6) - (1 - width / 1.29) / (width / 2.6)
for Y in range(height):
y = (Y - height / 2) / (width / 2.6)
.........
๐ฆSteps 5, 6, and 7. Small but Important
> The common truth that all Python programmers know is that working with global variables is slower than working with local variables. But the fact that this is true not only for variables but also for all objects in general is often forgotten. The function code calls several functions from the math module. So why not import them into the function itself? Made by:
def mandelbrot(height, itt, width):
from math import atan2, cos, sqrt
pix = img.load()
Another 0.1 sec.
Recall that abs (x) will return a number of type float. So itโs worth comparing it with float and not int:
if abs(Z_i) > 2: ------> if abs(Z_i) > 2.0:
Another 0.15sec. 53% of the initial time.
ยป And finally, a dirty hack.
In this particular task, it can be understood that the lower half of the image is equal to the upper, i.e. the number of calculations can be halved, resulting in a total of 0.84 seconds or 27% of the original time.
Written by UndercOde
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow to Speed up Python code using the language itself
Twitter.com/UndercODEtC
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
>Python C Extensions
C API, which makes it possible to relatively transparently integrate C-code into Python programs. There are only two drawbacks to this solution:
1) The "entry threshold" for C and the Python / C API is still higher than for the "bare" Python, which cuts this option off for developers not familiar with C
2) One of the key features of Python is development speed. Writing part of a C program reduces it in proportion to the part of the code rewritten in C for the entire program
> So, this method is also not suitable for everyone.
๐ฆTo Speedup :
1) Removing the main program code to a separate
> This step helps the python interpreter to better perform internal optimizations about startup, and when using psyco, this step can help a lot, because psyco only optimizes functions without affecting the main body of the program.
If earlier, the calculated part of the original program looked like this:
for Y in xrange(height):
for X in xrange(width):
> Then, changing it to:
def mandelbrot(height, itt, width):
for Y in xrange(height):
for X in xrange(width):
mandelbrot(height, itt, width)
2) Profiling:
python -m cProfile sample.py
The -m interpreter switch allows you to run modules as separate programs, if the module itself provides such an opportunity.
The result of this command will be to get the โprofileโ of the program - a table, of the form. Using it, it is easy to determine the places that need optimization (the rows with the highest values โโof ncalls (number of function calls), tottime and percall (the operating time of all calls to this function and each individual respectively)). For convenience, you can add a key
4613944 function calls (4613943 primitive calls) in 2.818 seconds
Ordered by: internal time
ncalls tottime percall cumtime percall filename:lineno(function)
1 2.309 2.309 2.766 2.766 mand_slow.py:22(mandelbrot)
...
3) Profile Analysis
We see that in the first place in timeof the example main function mandelbrot by Undercode , followed by the system function abs, followed by several functions from the math module, then single calls to functions with minimal time costs, we are not interested in.
4) Maths in code :
>that the exponentiation operator is quite โgeneralโ, but we need only the exponentiation, that is, all constructions of the form x 2 can be replaced by x * x, thus gaining a little more time.
> Let's look at the time:
1.9 sec , or 62% of the original time, achieved by simply replacing Few lines:
p = math.sqrt
better than do
>pix = img.load()
def mandelbrot(height, itt, width):
step_x = (2 - width / 1.29) / (width / 2.6) - (1 - width / 1.29) / (width / 2.6)
for Y in range(height):
y = (Y - height / 2) / (width / 2.6)
.........
๐ฆSteps 5, 6, and 7. Small but Important
> The common truth that all Python programmers know is that working with global variables is slower than working with local variables. But the fact that this is true not only for variables but also for all objects in general is often forgotten. The function code calls several functions from the math module. So why not import them into the function itself? Made by:
def mandelbrot(height, itt, width):
from math import atan2, cos, sqrt
pix = img.load()
Another 0.1 sec.
Recall that abs (x) will return a number of type float. So itโs worth comparing it with float and not int:
if abs(Z_i) > 2: ------> if abs(Z_i) > 2.0:
Another 0.15sec. 53% of the initial time.
ยป And finally, a dirty hack.
In this particular task, it can be understood that the lower half of the image is equal to the upper, i.e. the number of calculations can be halved, resulting in a total of 0.84 seconds or 27% of the original time.
Written by UndercOde
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Twitter
UNDERCODE TESTING COMPANY (@UnderCodeTC) | Twitter
The latest Tweets from UNDERCODE TESTING COMPANY (@UnderCodeTC). ๐ธ๐๐ง๐๐๐๐๐ & ๐ธ๐๐จ๐๐ช๐ค ๐๐ก๐๐๐ฅ๐๐. Lebanon-North
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow hackany Wifi On Windows 7-8-10 ?
t.me/UndercOdeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) download Aircrack :
> https://download.aircrack-ng.org/aircrack-ng-1.2-win.zip
2) Extract via Winar or winzip
3) Go to your 'Local Disk (C:) and open the folder "Program Files" or "Program Files (x86)" depending on your windows architecture. Since my Windows is 64-bit I will choose the 'Program Files' folder.
4) Then, copy and paste the Aircrack-ng folder that you uncompressed before inside the "Program Files" folder.
> The Aircrack-ng folder should look like this inside the "Program Files" folder.
5) After pasting the "Aircrack-ng" folder inside the "Program files" or "Program Files (x86)" you have to go inside of that folder.
Once inside the folder you will have to open the "bin" folder.
6) Depending on your Windows architecture you will choose the folder according to your Windows 32 or 64 bit
7) Once inside your corresponding folder, you will have to copy the address
(the dir location )
8) Now go to pc Propriety :
> left click on Advanced system settings
9) Now you will have to click on the button that says "Environment Variables...
10) Once you got this window, you will have to click the "New" button pointed with the arrow.
In this new window, you have to write (path) inside the "Variable name:" box. Then, you will have to paste the address that you copied before
11) After that, just click "OK" on all the windows that are open. Also, click on "Apply" if you see the option.
Final Step: Go to your desktop and press the keys "Ctrl + R" to open the "Run" program. Inside "Run" type "cmd"
>Then press "OK"
12) type "aireplay-ng" inside the "cmd".
Then, press enter.
13) You should get a set of information
Now you are done and ready to use it : just input the catured file + a wifi worldlist example :
>http://wordlist.softwaresea.com/Windows-software-download/wordlist-wireshark
in addiction you can run this setup to capture wifi packets :
>http://wordlist.softwaresea.com/Windows-software-download
E N J O Y W I T H UndercOde
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow hackany Wifi On Windows 7-8-10 ?
t.me/UndercOdeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) download Aircrack :
> https://download.aircrack-ng.org/aircrack-ng-1.2-win.zip
2) Extract via Winar or winzip
3) Go to your 'Local Disk (C:) and open the folder "Program Files" or "Program Files (x86)" depending on your windows architecture. Since my Windows is 64-bit I will choose the 'Program Files' folder.
4) Then, copy and paste the Aircrack-ng folder that you uncompressed before inside the "Program Files" folder.
> The Aircrack-ng folder should look like this inside the "Program Files" folder.
5) After pasting the "Aircrack-ng" folder inside the "Program files" or "Program Files (x86)" you have to go inside of that folder.
Once inside the folder you will have to open the "bin" folder.
6) Depending on your Windows architecture you will choose the folder according to your Windows 32 or 64 bit
7) Once inside your corresponding folder, you will have to copy the address
(the dir location )
8) Now go to pc Propriety :
> left click on Advanced system settings
9) Now you will have to click on the button that says "Environment Variables...
10) Once you got this window, you will have to click the "New" button pointed with the arrow.
In this new window, you have to write (path) inside the "Variable name:" box. Then, you will have to paste the address that you copied before
11) After that, just click "OK" on all the windows that are open. Also, click on "Apply" if you see the option.
Final Step: Go to your desktop and press the keys "Ctrl + R" to open the "Run" program. Inside "Run" type "cmd"
>Then press "OK"
12) type "aireplay-ng" inside the "cmd".
Then, press enter.
13) You should get a set of information
Now you are done and ready to use it : just input the catured file + a wifi worldlist example :
>http://wordlist.softwaresea.com/Windows-software-download/wordlist-wireshark
in addiction you can run this setup to capture wifi packets :
>http://wordlist.softwaresea.com/Windows-software-download
E N J O Y W I T H UndercOde
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆBest emulator : full Android system on a regular GNU/Linux system like Ubuntu
>Anbox is a container-based approach to boot a full Android system on a regular GNU/Linux system like Ubuntu. In other words: Anbox will let you run Android on your Linux system without the slowness of virtualization.
t.me/UndercOdeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) sudo apt install build-essential cmake cmake-data debhelper dbus google-mock \
2) libboost-dev libboost-filesystem-dev libboost-log-dev libboost-iostreams-dev \
3) libboost-program-options-dev libboost-system-dev libboost-test-dev \
4) libboost-thread-dev libcap-dev libsystemd-dev libegl1-mesa-dev \
5) libgles2-mesa-dev libglm-dev libgtest-dev liblxc1 \
6) libproperties-cpp-dev libprotobuf-dev libsdl2-dev libsdl2-image-dev lxc-dev \
7) pkg-config protobuf-compile
8) git clone https://github.com/anbox/anbox.git
9) cd anbox
10) mkdir build
11) cd build
12) cmake ..
13) make
๐ฆ simple
1) sudo make install
will install the necessary bits into your system.
2) If you want to build the anbox snap instead you can do this with the following steps:
> mkdir android-images
> cp /path/to/android.img android-images/android.img
> snapcraft
The result will be a .snap file you can install on a system supporting snaps
2) snap install --dangerous --devmode anbox_1_amd64.snap
๐ฆRequirements :
libdbus
google-mock
google-test
libboost
libboost-filesystem
libboost-log
libboost-iostreams
libboost-program-options
libboost-system
libboost-test
libboost-thread
libcap
libsystemd
mesa (libegl1, libgles2)
libsdl2
libprotobuf
protobuf-compiler
lxc (>= 3.0)
๐ฆTested:
>kali
>ubanto
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆBest emulator : full Android system on a regular GNU/Linux system like Ubuntu
>Anbox is a container-based approach to boot a full Android system on a regular GNU/Linux system like Ubuntu. In other words: Anbox will let you run Android on your Linux system without the slowness of virtualization.
t.me/UndercOdeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) sudo apt install build-essential cmake cmake-data debhelper dbus google-mock \
2) libboost-dev libboost-filesystem-dev libboost-log-dev libboost-iostreams-dev \
3) libboost-program-options-dev libboost-system-dev libboost-test-dev \
4) libboost-thread-dev libcap-dev libsystemd-dev libegl1-mesa-dev \
5) libgles2-mesa-dev libglm-dev libgtest-dev liblxc1 \
6) libproperties-cpp-dev libprotobuf-dev libsdl2-dev libsdl2-image-dev lxc-dev \
7) pkg-config protobuf-compile
8) git clone https://github.com/anbox/anbox.git
9) cd anbox
10) mkdir build
11) cd build
12) cmake ..
13) make
๐ฆ simple
1) sudo make install
will install the necessary bits into your system.
2) If you want to build the anbox snap instead you can do this with the following steps:
> mkdir android-images
> cp /path/to/android.img android-images/android.img
> snapcraft
The result will be a .snap file you can install on a system supporting snaps
2) snap install --dangerous --devmode anbox_1_amd64.snap
๐ฆRequirements :
libdbus
google-mock
google-test
libboost
libboost-filesystem
libboost-log
libboost-iostreams
libboost-program-options
libboost-system
libboost-test
libboost-thread
libcap
libsystemd
mesa (libegl1, libgles2)
libsdl2
libprotobuf
protobuf-compiler
lxc (>= 3.0)
๐ฆTested:
>kali
>ubanto
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆMassive automated handshake capture on BlackArch with zizzania automate Wifi Hacking tutorial by UndercOde :
t.me/iOsDeveloppers
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/cyrus-and/zizzania
2) cd zizzania
3) for debian/kali/parrot...
> sudo apt-get install libpcap-dev
๐ฆFor macOS systems (Homebrew):
1)brew install libpcap
2)Building
3)make -f config.Makefile
4)make
5)The installation process is not mandatory, zizzania can be run from the src directory. Just in case:
> make install
> make uninstall
6) now Channel switching must be performed manually:
ln -s /System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resources/airport /usr/local/bin/airport
7)sudo airport --disassociate
8)sudo airport --channel=<channel>
๐ฆWe re ready now :
1) Suppose we are interested in an access point with BSSID AA: BB: CC: DD: EE: FF, but very rarely (once a day, once a week, once a month) clients connect to it.
We can run zizzania on the network interface -i wlp2s0 , restrict listening to the sixth channel -c 6 (if we specify the channel, the program switches the network interface to monitoring mode), specify the access point we are interested in -b AA: BB: CC: DD: EE: FF and the file to which the intercepted handshakes -w out.pcap should be written :
>
<font style="vertical-align: inherit;"><font style="vertical-align: inherit;">sudo zizzania -i wl
2) Suppose we want to listen to a specific channel and we are interested in all access points on it. Then the command will look something like this (we did not specify the -b switch with the BSSID of any AP):
>
<font style="vertical-align: inherit;"><font style="vertical-align: inherit;">sudo zizzania -i wlp2s0 -c 1 -2 -w zizza / out5</font></font>
3) We want to capture handshakes from all access points of all channels. At the same time,
> use a deauthentication attack to get the maximum possible handshakesWe want to capture handshakes from all access points of all channels. At the same time, we want to use a deauthentication attack to get the maximum possible handshakes
Lets run :
>use the --berlin 1200 option . It is needed only so that access points do not crash too quickly from the screen (this does not affect the work in any way)
2) sudo airodump-ng wlp2s0 -f 30000 -w hndshk/auto5 --berlin 1200
When starting zizzania, I specify only the name of the wireless interface on which it will work (send deauthentication packets)
3) sudo zizzania -i wlp2s0
4) pyrit -r "hndshk/auto5-01.cap" analyze
(note auto5... its name of pcapfile )
5) finallu use any packets in aircrack & Wait till done
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆMassive automated handshake capture on BlackArch with zizzania automate Wifi Hacking tutorial by UndercOde :
t.me/iOsDeveloppers
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/cyrus-and/zizzania
2) cd zizzania
3) for debian/kali/parrot...
> sudo apt-get install libpcap-dev
๐ฆFor macOS systems (Homebrew):
1)brew install libpcap
2)Building
3)make -f config.Makefile
4)make
5)The installation process is not mandatory, zizzania can be run from the src directory. Just in case:
> make install
> make uninstall
6) now Channel switching must be performed manually:
ln -s /System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resources/airport /usr/local/bin/airport
7)sudo airport --disassociate
8)sudo airport --channel=<channel>
๐ฆWe re ready now :
1) Suppose we are interested in an access point with BSSID AA: BB: CC: DD: EE: FF, but very rarely (once a day, once a week, once a month) clients connect to it.
We can run zizzania on the network interface -i wlp2s0 , restrict listening to the sixth channel -c 6 (if we specify the channel, the program switches the network interface to monitoring mode), specify the access point we are interested in -b AA: BB: CC: DD: EE: FF and the file to which the intercepted handshakes -w out.pcap should be written :
>
<font style="vertical-align: inherit;"><font style="vertical-align: inherit;">sudo zizzania -i wl
2) Suppose we want to listen to a specific channel and we are interested in all access points on it. Then the command will look something like this (we did not specify the -b switch with the BSSID of any AP):
>
<font style="vertical-align: inherit;"><font style="vertical-align: inherit;">sudo zizzania -i wlp2s0 -c 1 -2 -w zizza / out5</font></font>
3) We want to capture handshakes from all access points of all channels. At the same time,
> use a deauthentication attack to get the maximum possible handshakesWe want to capture handshakes from all access points of all channels. At the same time, we want to use a deauthentication attack to get the maximum possible handshakes
Lets run :
>use the --berlin 1200 option . It is needed only so that access points do not crash too quickly from the screen (this does not affect the work in any way)
2) sudo airodump-ng wlp2s0 -f 30000 -w hndshk/auto5 --berlin 1200
When starting zizzania, I specify only the name of the wireless interface on which it will work (send deauthentication packets)
3) sudo zizzania -i wlp2s0
4) pyrit -r "hndshk/auto5-01.cap" analyze
(note auto5... its name of pcapfile )
5) finallu use any packets in aircrack & Wait till done
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Telegram
iUNDERCODE IOS JAILBREAK SUPPORT & HELP
WELCOME TO iUNDERCODE BY UNDERCODE TESTING FOR IOS JAILBREAK & TWEAKS GROUP RULES @UNDERCODERULES
๐๐พ๐๐๐๐ฑ๐ ด
Youtube.com/c/Undercode
๐ ต๐ฐ๐ ฒ๐ ด๐ฑ๐พ๐พ๐ บ
@UndercOdeTesting
@iUNDERCODE
๐ ธ๐ ฝ๐๐๐ฐ๐ ถ๐๐ฐ๐ ผ
@UndercOdeTestinG
@iUNDERCODE
๐๐๐ ธ๐๐๐ ด๐
@iUNDERCODE
@UNDERCODENEWS
๐๐พ๐๐๐๐ฑ๐ ด
Youtube.com/c/Undercode
๐ ต๐ฐ๐ ฒ๐ ด๐ฑ๐พ๐พ๐ บ
@UndercOdeTesting
@iUNDERCODE
๐ ธ๐ ฝ๐๐๐ฐ๐ ถ๐๐ฐ๐ ผ
@UndercOdeTestinG
@iUNDERCODE
๐๐๐ ธ๐๐๐ ด๐
@iUNDERCODE
@UNDERCODENEWS
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ How Dump a git repository from a website termux or any linux distro
t.me/UndercOdeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/arthaud/git-dumper
2) cd git-dumper
3) pip install -r requirements.txt
4) ./git-dumper.py http://website.com/.git ~/website
๐ฆFeatures :
> Fetch all common files (.gitignore, .git/HEAD, .git/index, etc.);
> Find as many refs as possible (such as refs/heads/master, refs/remotes/origin/HEAD, etc.) by analyzing .git/HEAD, .git/logs/HEAD, .git/config, .git/packed-refs and so on;
> Find as many objects (sha1) as possible by analyzing .git/packed-refs, .git/index, .git/refs/* and .git/logs/*;
> Fetch all objects recursively, analyzing each commits to find their parents;
> Run git checkout . to recover the current working tree
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ How Dump a git repository from a website termux or any linux distro
t.me/UndercOdeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/arthaud/git-dumper
2) cd git-dumper
3) pip install -r requirements.txt
4) ./git-dumper.py http://website.com/.git ~/website
๐ฆFeatures :
> Fetch all common files (.gitignore, .git/HEAD, .git/index, etc.);
> Find as many refs as possible (such as refs/heads/master, refs/remotes/origin/HEAD, etc.) by analyzing .git/HEAD, .git/logs/HEAD, .git/config, .git/packed-refs and so on;
> Find as many objects (sha1) as possible by analyzing .git/packed-refs, .git/index, .git/refs/* and .git/logs/*;
> Fetch all objects recursively, analyzing each commits to find their parents;
> Run git checkout . to recover the current working tree
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Calculation in the Cloud
CoCalc offers collaborative calculation in the cloud. This includes working with the full (scientific) Python stack, SageMath, Julia, R, Octave, and more. It also offers capabilities to author documents in LaTeX, R/knitr or Markdown, storing and organizing files, a web-based Linux Terminal, communication tools like a chat, course management and more.
t.me/UndercodeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone --recurse-submodules https://github.com/sagemathinc/cocalc
2)cd cocalc/src
3) npm run install-all -- build
4) npm test -- run test suite (expected failures if your clock is not UTC)
5) install.py all --compute --web -- build and install some parts system-wide for development use
See INSTALL.md for more details.
๐ฆRequirements :
>node
> Postgres
>pip install pyyaml; pip3 install pyyaml
๐ฆArchitecture:
1) Client -- javascript client library that runs in web browser
2) Load balancer/ssl -- HAproxy
3) Database -- PostgreSQL
4) Compute -- VM's running TCP servers (e.g., sage, console, projects, python3, R, etc.)
5) Hub -- written in Node.js; primus server; connects with everything -- compute servers, database, other hubs, and clients.
6) Storage -- Snapshots of project data
7) HTTP server -- Nginx
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Calculation in the Cloud
CoCalc offers collaborative calculation in the cloud. This includes working with the full (scientific) Python stack, SageMath, Julia, R, Octave, and more. It also offers capabilities to author documents in LaTeX, R/knitr or Markdown, storing and organizing files, a web-based Linux Terminal, communication tools like a chat, course management and more.
t.me/UndercodeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone --recurse-submodules https://github.com/sagemathinc/cocalc
2)cd cocalc/src
3) npm run install-all -- build
4) npm test -- run test suite (expected failures if your clock is not UTC)
5) install.py all --compute --web -- build and install some parts system-wide for development use
See INSTALL.md for more details.
๐ฆRequirements :
>node
> Postgres
>pip install pyyaml; pip3 install pyyaml
๐ฆArchitecture:
1) Client -- javascript client library that runs in web browser
2) Load balancer/ssl -- HAproxy
3) Database -- PostgreSQL
4) Compute -- VM's running TCP servers (e.g., sage, console, projects, python3, R, etc.)
5) Hub -- written in Node.js; primus server; connects with everything -- compute servers, database, other hubs, and clients.
6) Storage -- Snapshots of project data
7) HTTP server -- Nginx
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆTop Free Proxies lastest for Anonymity :
t.me/UndercOdeTestingOfficial
1) https://www.4everproxy.com
2) https://www.proxysite.com/
3) https://hide.me/en/proxy
4) https://whoer.net/webproxy
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆTop Free Proxies lastest for Anonymity :
t.me/UndercOdeTestingOfficial
1) https://www.4everproxy.com
2) https://www.proxysite.com/
3) https://hide.me/en/proxy
4) https://whoer.net/webproxy
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆUsufull for Many Developpers :
> RSA public/private key generation, RSA, AES encryption/decryption, RSA sign/verify in Swift with CommonCrypto in iOS and OS X
t.me/iOsDeveloppers
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1> clone https://github.com/soyersoyer/SwCrypt
2> go dir as usuall then :
3> Install https://guides.cocoapods.org/using/getting-started.html#getting-started
4> pod 'SwCrypt'
5> Run pod install
๐ฆLet s Start :
1) Create public and private RSA keys in DER format
let (privateKey, publicKey) = try! CC.RSA.generateKeyPair(2048)
2) Convert them to PEM format
let privateKeyPEM = try SwKeyConvert.PrivateKey.derToPKCS1PEM(privateKey)
let publicKeyPEM = SwKeyConvert.PublicKey.derToPKCS8PEM(publicKey)
3) Or read them from strings with PEM data
let privateKeyDER = SwKeyConvert.PrivateKey.pemToPKCS1DER(privateKeyPEM)
let publicKeyDER = SwKeyConvert.PublicKey.pemToPKCS1DER(publicKeyPEM)
4) Or encrypt, decrypt the private key (OpenSSL compatible)
try SwKeyConvert.PrivateKey.encryptPEM(privateKeyPEM, passphrase: "longpassword", mode: .aes256CBC)
try SwKeyConvert.PrivateKey.decryptPEM(privEncrypted, passphrase: "longpassword")
5) Get public key from private keys in DER format
let publicKeyDER = try? CC.RSA.getPublicKeyFromPrivateKey(privateKeyDER!)
6) Encrypt, decrypt data with RSA
try CC.RSA.encrypt(data, derKey: publicKey, tag: tag, padding: .oaep, digest: .sha1)
try CC.RSA.decrypt(data, derKey: privateKey, tag: tag, padding: .oaep, digest: .sha1)
Sign, verify data with RSA
let sign = try? CC.RSA.sign(testMessage, derKey: privKey, padding: .pss,
digest: .sha256, saltLen: 16)
let verified = try? CC.RSA.verify(testMessage, derKey: pubKey, padding: .pss,
digest: .sha256, saltLen: 16, signedData: sign!)
7) Elliptic curve functions
let keys = try? CC.EC.generateKeyPair(384)
let signed = try? CC.EC.signHash(keys!.0, hash: hash)
let verified = try? CC.EC.verifyHash(keys!.1, hash: hash, signedData: signed!)
let shared = try? CC.EC.computeSharedSecret(keys!.0, publicKey: partnerPubKey)
let privComponents = try? CC.EC.getPrivateKeyComponents(keys!.0)
let pubComponents = try? CC.EC.getPublicKeyComponents(keys!.1)
let pubKey = try? CC.EC.createFromData(keySize, x, y)
let pubKey = try? CC.EC.getPublicKeyFromPrivateKey(keys!.0)
8) Diffie-Hellman functions
let dh = try CC.DH.DH(dhParam: .rfc3526Group5)
let myPubKey = try dh.generateKey()
let commonKey = try dh.computeKey(partnerPubKey!)
Encrypt, decrypt data with symmetric ciphers
try CC.crypt(.encrypt, blockMode: .cbc, algorithm: .aes, padding: .pkcs7Padding, data: data, key: aesKey, iv: iv)
try CC.crypt(.decrypt, blockMode: .cfb, algorithm: .aes, padding: .pkcs7Padding, data: data, key: aesKey, iv: iv)
Encrypt, decrypt data with symmetric authenticating ciphers
try CC.cryptAuth(.encrypt, blockMode: .gcm, algorithm: .aes, data: data, aData: aData, key: aesKey, iv: iv, tagLength: tagLength)
try CC.cryptAuth(.decrypt, blockMode: .ccm, algorithm: .aes, data: data, aData: aData, key: aesKey, iv: iv, tagLength: tagLength)
Digest functions
CC.digest(data, alg: .md5)
CC.digest(data, alg: .sha256)
CC.digest(data, alg: .sha512)
10) HMAC function
CC.HMAC(data, alg: .sha512, key: key)
CMAC function
CC.CMAC.AESCMAC(input, key: key)
๐ฆCRC function
let output = try? CC.CRC.crc(input, mode: .crc32)
KeyDerivation
CC.KeyDerivation.PBKDF2(password, salt: salt, prf: .sha256, rounds: 4096)
11) Symmetric Key Wrapping
try CC.KeyWrap.SymmetricKeyWrap(CC.KeyWrap.rfc3394IV, kek: kek, rawKey: rawKey)
try CC.KeyWrap.SymmetricKeyUnwrap(CC.KeyWrap.rfc3394IV, kek: kek, wrappedKey: wrappedKey)
...
12) Check availability
SwCrypt uses dlopen and dlsym to load the CommonCrypto's functions, because not all of them are available in public header files. You have to check the availability before using them.
13) or all in one turn:
let ccAvailable : Bool = CC.available()
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆUsufull for Many Developpers :
> RSA public/private key generation, RSA, AES encryption/decryption, RSA sign/verify in Swift with CommonCrypto in iOS and OS X
t.me/iOsDeveloppers
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1> clone https://github.com/soyersoyer/SwCrypt
2> go dir as usuall then :
3> Install https://guides.cocoapods.org/using/getting-started.html#getting-started
4> pod 'SwCrypt'
5> Run pod install
๐ฆLet s Start :
1) Create public and private RSA keys in DER format
let (privateKey, publicKey) = try! CC.RSA.generateKeyPair(2048)
2) Convert them to PEM format
let privateKeyPEM = try SwKeyConvert.PrivateKey.derToPKCS1PEM(privateKey)
let publicKeyPEM = SwKeyConvert.PublicKey.derToPKCS8PEM(publicKey)
3) Or read them from strings with PEM data
let privateKeyDER = SwKeyConvert.PrivateKey.pemToPKCS1DER(privateKeyPEM)
let publicKeyDER = SwKeyConvert.PublicKey.pemToPKCS1DER(publicKeyPEM)
4) Or encrypt, decrypt the private key (OpenSSL compatible)
try SwKeyConvert.PrivateKey.encryptPEM(privateKeyPEM, passphrase: "longpassword", mode: .aes256CBC)
try SwKeyConvert.PrivateKey.decryptPEM(privEncrypted, passphrase: "longpassword")
5) Get public key from private keys in DER format
let publicKeyDER = try? CC.RSA.getPublicKeyFromPrivateKey(privateKeyDER!)
6) Encrypt, decrypt data with RSA
try CC.RSA.encrypt(data, derKey: publicKey, tag: tag, padding: .oaep, digest: .sha1)
try CC.RSA.decrypt(data, derKey: privateKey, tag: tag, padding: .oaep, digest: .sha1)
Sign, verify data with RSA
let sign = try? CC.RSA.sign(testMessage, derKey: privKey, padding: .pss,
digest: .sha256, saltLen: 16)
let verified = try? CC.RSA.verify(testMessage, derKey: pubKey, padding: .pss,
digest: .sha256, saltLen: 16, signedData: sign!)
7) Elliptic curve functions
let keys = try? CC.EC.generateKeyPair(384)
let signed = try? CC.EC.signHash(keys!.0, hash: hash)
let verified = try? CC.EC.verifyHash(keys!.1, hash: hash, signedData: signed!)
let shared = try? CC.EC.computeSharedSecret(keys!.0, publicKey: partnerPubKey)
let privComponents = try? CC.EC.getPrivateKeyComponents(keys!.0)
let pubComponents = try? CC.EC.getPublicKeyComponents(keys!.1)
let pubKey = try? CC.EC.createFromData(keySize, x, y)
let pubKey = try? CC.EC.getPublicKeyFromPrivateKey(keys!.0)
8) Diffie-Hellman functions
let dh = try CC.DH.DH(dhParam: .rfc3526Group5)
let myPubKey = try dh.generateKey()
let commonKey = try dh.computeKey(partnerPubKey!)
Encrypt, decrypt data with symmetric ciphers
try CC.crypt(.encrypt, blockMode: .cbc, algorithm: .aes, padding: .pkcs7Padding, data: data, key: aesKey, iv: iv)
try CC.crypt(.decrypt, blockMode: .cfb, algorithm: .aes, padding: .pkcs7Padding, data: data, key: aesKey, iv: iv)
Encrypt, decrypt data with symmetric authenticating ciphers
try CC.cryptAuth(.encrypt, blockMode: .gcm, algorithm: .aes, data: data, aData: aData, key: aesKey, iv: iv, tagLength: tagLength)
try CC.cryptAuth(.decrypt, blockMode: .ccm, algorithm: .aes, data: data, aData: aData, key: aesKey, iv: iv, tagLength: tagLength)
Digest functions
CC.digest(data, alg: .md5)
CC.digest(data, alg: .sha256)
CC.digest(data, alg: .sha512)
10) HMAC function
CC.HMAC(data, alg: .sha512, key: key)
CMAC function
CC.CMAC.AESCMAC(input, key: key)
๐ฆCRC function
let output = try? CC.CRC.crc(input, mode: .crc32)
KeyDerivation
CC.KeyDerivation.PBKDF2(password, salt: salt, prf: .sha256, rounds: 4096)
11) Symmetric Key Wrapping
try CC.KeyWrap.SymmetricKeyWrap(CC.KeyWrap.rfc3394IV, kek: kek, rawKey: rawKey)
try CC.KeyWrap.SymmetricKeyUnwrap(CC.KeyWrap.rfc3394IV, kek: kek, wrappedKey: wrappedKey)
...
12) Check availability
SwCrypt uses dlopen and dlsym to load the CommonCrypto's functions, because not all of them are available in public header files. You have to check the availability before using them.
13) or all in one turn:
let ccAvailable : Bool = CC.available()
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Telegram
iUNDERCODE IOS JAILBREAK SUPPORT & HELP
WELCOME TO iUNDERCODE BY UNDERCODE TESTING FOR IOS JAILBREAK & TWEAKS GROUP RULES @UNDERCODERULES
๐๐พ๐๐๐๐ฑ๐ ด
Youtube.com/c/Undercode
๐ ต๐ฐ๐ ฒ๐ ด๐ฑ๐พ๐พ๐ บ
@UndercOdeTesting
@iUNDERCODE
๐ ธ๐ ฝ๐๐๐ฐ๐ ถ๐๐ฐ๐ ผ
@UndercOdeTestinG
@iUNDERCODE
๐๐๐ ธ๐๐๐ ด๐
@iUNDERCODE
@UNDERCODENEWS
๐๐พ๐๐๐๐ฑ๐ ด
Youtube.com/c/Undercode
๐ ต๐ฐ๐ ฒ๐ ด๐ฑ๐พ๐พ๐ บ
@UndercOdeTesting
@iUNDERCODE
๐ ธ๐ ฝ๐๐๐ฐ๐ ถ๐๐ฐ๐ ผ
@UndercOdeTestinG
@iUNDERCODE
๐๐๐ ธ๐๐๐ ด๐
@iUNDERCODE
@UNDERCODENEWS