π¦Some interesting Termux/Linux #tool
> httptunnel creates a bidirectional virtual data path tunnelled in HTTP
requests. The requests can be sent via an HTTP proxy if so desired.
>This can be useful for users behind restrictive firewalls. If WWW
access is allowed through an HTTP proxy, it's possible to use
httptunnel and, say, telnet or PPP to connect to a computer outside
the firewall.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£git clone https://github.com/larsbrinkhoff/httptunnel.git
2οΈβ£cd httptunnel
3οΈβ£chmod 777 autogen.sh
4οΈβ£./autogen.sh
5οΈβ£EXAMPLES
π³ start httptunnel server:
1) At host REMOTE, start hts like this:
hts -F localhost:23 8888 (set up httptunnel server to listen on port 8888 and forward to localhost:23)
2) start httptunnel client:
At host LOCAL, start htc like this:
htc -F 2323 -P PROXY_ADDRESS:8000 REMOTE_IP:8888 (set up httptunnel client to forward localhost:2323 to REMOTE_IP:8888 via a local proxy at PROXY_ADDRESS:8000)
3) or, if using a buffering HTTP proxy:
htc -F 2323 -P PROXY_ADDRESS:8000 -B 48K REMOTE_IP:8888
4) Now you can do this at host LOCAL:
telnet localhost 2323 (telnet in to REMOTE_IP:8888 via your httptunnel you just configured above on port localhost:2323)
...and you will hopefully get a login prompt from host REMOTE_IP.
π³Debugging:
5) For debug output, add -Dn to the end of a command, where n is the level of debug output you'd like to see, with 0 meaning no debug messages at all, and 5 being the highest level (verbose).
6) ex: htc -F 10001 -P PROXY_ADDRESS:8000 REMOTE_IP:8888 -D5 will show verbose debug output (level 5 debugging) while setting up an httptunnel client to forward localhost:10001 to REMOTE_IP:8888 via a local proxy at PROXY_ADDRESS:8000
6οΈβ£Related Docs :
π³https://sergvergara.files.wordpress.com/2011/04/http_tunnel.pdf - excellent httptunnel tutorial, examples, & info
π³http://sebsauvage.net/punching/ - another excellent example
π³https://daniel.haxx.se/docs/sshproxy.html - more useful info
π³http://neophob.com/2006/10/gnu-httptunnel-v33-windows-binaries/ -
π³httptunnel Win32 binaries (download here)
π³Google search for "http tunnel v3.3" - brings up lots of good links to httptunnel (this search seems to work better than searching for "httptunnel" alone since the latter brings up many generic search results or results pertaining to other tools)
enjoyβ€οΈππ»
β Topic git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
> httptunnel creates a bidirectional virtual data path tunnelled in HTTP
requests. The requests can be sent via an HTTP proxy if so desired.
>This can be useful for users behind restrictive firewalls. If WWW
access is allowed through an HTTP proxy, it's possible to use
httptunnel and, say, telnet or PPP to connect to a computer outside
the firewall.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£git clone https://github.com/larsbrinkhoff/httptunnel.git
2οΈβ£cd httptunnel
3οΈβ£chmod 777 autogen.sh
4οΈβ£./autogen.sh
5οΈβ£EXAMPLES
π³ start httptunnel server:
1) At host REMOTE, start hts like this:
hts -F localhost:23 8888 (set up httptunnel server to listen on port 8888 and forward to localhost:23)
2) start httptunnel client:
At host LOCAL, start htc like this:
htc -F 2323 -P PROXY_ADDRESS:8000 REMOTE_IP:8888 (set up httptunnel client to forward localhost:2323 to REMOTE_IP:8888 via a local proxy at PROXY_ADDRESS:8000)
3) or, if using a buffering HTTP proxy:
htc -F 2323 -P PROXY_ADDRESS:8000 -B 48K REMOTE_IP:8888
4) Now you can do this at host LOCAL:
telnet localhost 2323 (telnet in to REMOTE_IP:8888 via your httptunnel you just configured above on port localhost:2323)
...and you will hopefully get a login prompt from host REMOTE_IP.
π³Debugging:
5) For debug output, add -Dn to the end of a command, where n is the level of debug output you'd like to see, with 0 meaning no debug messages at all, and 5 being the highest level (verbose).
6) ex: htc -F 10001 -P PROXY_ADDRESS:8000 REMOTE_IP:8888 -D5 will show verbose debug output (level 5 debugging) while setting up an httptunnel client to forward localhost:10001 to REMOTE_IP:8888 via a local proxy at PROXY_ADDRESS:8000
6οΈβ£Related Docs :
π³https://sergvergara.files.wordpress.com/2011/04/http_tunnel.pdf - excellent httptunnel tutorial, examples, & info
π³http://sebsauvage.net/punching/ - another excellent example
π³https://daniel.haxx.se/docs/sshproxy.html - more useful info
π³http://neophob.com/2006/10/gnu-httptunnel-v33-windows-binaries/ -
π³httptunnel Win32 binaries (download here)
π³Google search for "http tunnel v3.3" - brings up lots of good links to httptunnel (this search seems to work better than searching for "httptunnel" alone since the latter brings up many generic search results or results pertaining to other tools)
enjoyβ€οΈππ»
β Topic git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
GitHub
larsbrinkhoff/httptunnel
Bidirectional data stream tunnelled in HTTP requests. - larsbrinkhoff/httptunnel
β β β Uππ»βΊπ«6π¬πβ β β β
π¦maybee you have Toolx THE GREAT TOOL
Still need more ?
#tool
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
$ apt update
$ apt upgrade
$ apt install git
$ git clone https://github.com/Ranginang67/DarkFly-Tool
$ cd DarkFly-Tool
$ chmod +x
$ sh install
Run :
$ DarkFly
enjoyβ€οΈππ»
β β β Uππ»βΊπ«6π¬πβ β β β
π¦maybee you have Toolx THE GREAT TOOL
Still need more ?
#tool
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
$ apt update
$ apt upgrade
$ apt install git
$ git clone https://github.com/Ranginang67/DarkFly-Tool
$ cd DarkFly-Tool
$ chmod +x
$ sh install
Run :
$ DarkFly
enjoyβ€οΈππ»
β β β Uππ»βΊπ«6π¬πβ β β β
GitHub
GitHub - Ranginang67/DarkFly-Tool: DarkFly tool V.4.0
DarkFly tool V.4.0. Contribute to Ranginang67/DarkFly-Tool development by creating an account on GitHub.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Another web hacking #tool
F E A T U R E S :
-A port scanner
-SQL injection scanner
-Dork checker
-Hash cracker
-Hash type verification tool
-Proxy finding tool
-XSS scanner
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/Ekultek/Pybelt.git
2) cd Pybelt
3) pip install -r requirements.txt
4) C O M M A N D S:
python pybelt.py -p 127.0.0.1 Will run a port scan on your local host
python pybelt.py -s http://example.com/php?id=2 Will run a SQLi scan on the given URL
python pybelt.py -d idea?id=55 Will run a Dork check on the given Google Dork
python pybelt.py -c 9a8b1b7eee229046fc2701b228fc2aff:all Will attempt to crack the hash using all algorithms available on the computer
python pybelt.py -v 098f6bcd4621d373cade4e832627b4f6 Will try to verify the hash type
python pybelt.py -f Will find usable proxies
python pybelt.py -x http://127.0.0.1/php?id=1 Will search the URL for XSS vulnerability
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Another web hacking #tool
F E A T U R E S :
-A port scanner
-SQL injection scanner
-Dork checker
-Hash cracker
-Hash type verification tool
-Proxy finding tool
-XSS scanner
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/Ekultek/Pybelt.git
2) cd Pybelt
3) pip install -r requirements.txt
4) C O M M A N D S:
python pybelt.py -p 127.0.0.1 Will run a port scan on your local host
python pybelt.py -s http://example.com/php?id=2 Will run a SQLi scan on the given URL
python pybelt.py -d idea?id=55 Will run a Dork check on the given Google Dork
python pybelt.py -c 9a8b1b7eee229046fc2701b228fc2aff:all Will attempt to crack the hash using all algorithms available on the computer
python pybelt.py -v 098f6bcd4621d373cade4e832627b4f6 Will try to verify the hash type
python pybelt.py -f Will find usable proxies
python pybelt.py -x http://127.0.0.1/php?id=1 Will search the URL for XSS vulnerability
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - Ekultek/Pybelt: The hackers tool belt
The hackers tool belt. Contribute to Ekultek/Pybelt development by creating an account on GitHub.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦A #tool to dump a git repository from a website.
1) git clone https://github.com/arthaud/git-dumper.git?
2)cd git-dumper
3) pip install -r requirements.txt
4) ./git-dumper.py http://website.com/.git ~/website
F E A T U R E S :
-Fetch all common files (.gitignore, .git/HEAD, .git/index, etc.);
-Find as many refs as possible (such as refs/heads/master, refs/remotes/origin/HEAD, etc.) by analyzing .git/HEAD, .git/logs/HEAD, .git/config, .git/packed-refs and so on;
-Find as many objects (sha1) as possible by analyzing .git/packed-refs, .git/index, .git/refs/* and .git/logs/*;
-Fetch all objects recursively, analyzing each commits to find their parents;
-Run git checkout . to recover the current working tree
β
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦A #tool to dump a git repository from a website.
1) git clone https://github.com/arthaud/git-dumper.git?
2)cd git-dumper
3) pip install -r requirements.txt
4) ./git-dumper.py http://website.com/.git ~/website
F E A T U R E S :
-Fetch all common files (.gitignore, .git/HEAD, .git/index, etc.);
-Find as many refs as possible (such as refs/heads/master, refs/remotes/origin/HEAD, etc.) by analyzing .git/HEAD, .git/logs/HEAD, .git/config, .git/packed-refs and so on;
-Find as many objects (sha1) as possible by analyzing .git/packed-refs, .git/index, .git/refs/* and .git/logs/*;
-Fetch all objects recursively, analyzing each commits to find their parents;
-Run git checkout . to recover the current working tree
β
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - arthaud/git-dumper: A tool to dump a git repository from a website
A tool to dump a git repository from a website. Contribute to arthaud/git-dumper development by creating an account on GitHub.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible..->
#tool
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/FortyNorthSecurity/EyeWitness.git
2) cd Navigate into the CS directory
3) Load EyeWitness.sln into Visual Studio
4) Go to Build at the top and then Build Solution if no modifications are wanted
5) EyeWitness.exe --help
6) EyeWitness.exe -f C:\Path\to\urls.txt
7) EyeWitness.exe -f C:\Path\to\urls.txt -d [timeout in seconds] -c
8) ./EyeWitness.py -f filename --timeout optionaltimeout
E X A M P L E :
./EyeWitness -f urls.txt --web
./EyeWitness -x urls.xml --timeout 8
./EyeWitness.py -f urls.txt --web --proxy-ip 127.0.0.1 --proxy-port 8080 --proxy-type socks5 --timeout 120
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible..->
#tool
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/FortyNorthSecurity/EyeWitness.git
2) cd Navigate into the CS directory
3) Load EyeWitness.sln into Visual Studio
4) Go to Build at the top and then Build Solution if no modifications are wanted
5) EyeWitness.exe --help
6) EyeWitness.exe -f C:\Path\to\urls.txt
7) EyeWitness.exe -f C:\Path\to\urls.txt -d [timeout in seconds] -c
8) ./EyeWitness.py -f filename --timeout optionaltimeout
E X A M P L E :
./EyeWitness -f urls.txt --web
./EyeWitness -x urls.xml --timeout 8
./EyeWitness.py -f urls.txt --web --proxy-ip 127.0.0.1 --proxy-port 8080 --proxy-type socks5 --timeout 120
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - RedSiege/EyeWitness: EyeWitness is designed to take screenshots of websites, provide some server header info, and identifyβ¦
EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible. - RedSiege/EyeWitness
TODAY TOPIC :
COMMAND AND CONTROL WEBSITE/WMI
https://t.me/UnderCodeTesting/11804
https://t.me/UnderCodeTesting/11805
SQLMAP GUIDE & ALOT OF STUFFS PDF
https://t.me/UnderCodeTesting/11806
Become a professional trader 4GB
https://t.me/UnderCodeTesting/11815
New mobile phone battery is dangerous to charge for 12 hours in the first three times #Tip
https://t.me/UnderCodeTesting/11816
run postfix with smtp authentication (sasldb) in a docker container. TLS and OpenDKIM support are optional #tool
https://t.me/UnderCodeTesting/11817
HACK ANY LINUX
https://t.me/UnderCodeTesting/11819
XSS-Finder: a super powerful and advanced cross-site scripting scanner
https://t.me/UnderCodeTesting/11820
How to find out the creation time of a file on Linux using Debugfs
https://t.me/UnderCodeTesting/11821
2020 Update #Decryption - A command line that recreates the famous data decryption effect seen in the 1992 movie Sneakers.
https://t.me/UnderCodeTesting/11822
How to track traffic from a smartphone using Wireshark & hack wifi/phone.... ALL VIDEOS
https://t.me/UnderCodeTesting/11823
Install TWRP on Android devices
https://t.me/UnderCodeTesting/11824
A Lessons about database
https://t.me/UnderCodeTesting/11825
Wifi Hacking/network applications 2020 new list
https://t.me/UnderCodeTesting/11826
How to configure Apache as an external proxy for Node.js
https://t.me/UnderCodeTesting/11827
What is DOM (Document Object Model)?
Setting up Android Studio and Emulators
Basics of adb
Decompiling apks
Insecure Logging
Hardcoding Issues
Insecure Data Storage
Input Valdiation Issues
Drozer
Finding Attack Surfaces
Access Control Issues
Content Provider Injections
General Bug Hunting Tips
https://t.me/UnderCodeTesting/11828
LEANR Awesome course
https://t.me/UnderCodeTesting/11829
COMMAND AND CONTROL WEBSITE/WMI
https://t.me/UnderCodeTesting/11804
https://t.me/UnderCodeTesting/11805
SQLMAP GUIDE & ALOT OF STUFFS PDF
https://t.me/UnderCodeTesting/11806
Become a professional trader 4GB
https://t.me/UnderCodeTesting/11815
New mobile phone battery is dangerous to charge for 12 hours in the first three times #Tip
https://t.me/UnderCodeTesting/11816
run postfix with smtp authentication (sasldb) in a docker container. TLS and OpenDKIM support are optional #tool
https://t.me/UnderCodeTesting/11817
HACK ANY LINUX
https://t.me/UnderCodeTesting/11819
XSS-Finder: a super powerful and advanced cross-site scripting scanner
https://t.me/UnderCodeTesting/11820
How to find out the creation time of a file on Linux using Debugfs
https://t.me/UnderCodeTesting/11821
2020 Update #Decryption - A command line that recreates the famous data decryption effect seen in the 1992 movie Sneakers.
https://t.me/UnderCodeTesting/11822
How to track traffic from a smartphone using Wireshark & hack wifi/phone.... ALL VIDEOS
https://t.me/UnderCodeTesting/11823
Install TWRP on Android devices
https://t.me/UnderCodeTesting/11824
A Lessons about database
https://t.me/UnderCodeTesting/11825
Wifi Hacking/network applications 2020 new list
https://t.me/UnderCodeTesting/11826
How to configure Apache as an external proxy for Node.js
https://t.me/UnderCodeTesting/11827
What is DOM (Document Object Model)?
Setting up Android Studio and Emulators
Basics of adb
Decompiling apks
Insecure Logging
Hardcoding Issues
Insecure Data Storage
Input Valdiation Issues
Drozer
Finding Attack Surfaces
Access Control Issues
Content Provider Injections
General Bug Hunting Tips
https://t.me/UnderCodeTesting/11828
LEANR Awesome course
https://t.me/UnderCodeTesting/11829