▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑2020 most popular site for Virtual CC free-paid plans For trials & transfers
t.me/UndercodeTesting
> https://www.card.com/
> http://bankfreedom.com/
> https://www.neteller.com/en_us
> https://www.americanexpress.com/
> https://www.payoneer.com/
> https://www.netspend.com/
> https://www.entropay.com/
> https://www.beboon.com/
E N J O Y
@UnDERCODETESTING
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑2020 most popular site for Virtual CC free-paid plans For trials & transfers
t.me/UndercodeTesting
> https://www.card.com/
> http://bankfreedom.com/
> https://www.neteller.com/en_us
> https://www.americanexpress.com/
> https://www.payoneer.com/
> https://www.netspend.com/
> https://www.entropay.com/
> https://www.beboon.com/
E N J O Y
@UnDERCODETESTING
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑Qmail + LDAP installation and configuration example full by Undercode :
> t.me/UndercodeTesting
🦑𝕃𝔼𝕋' 𝕊 𝕊𝕋𝔸ℝ𝕋 :
> SMTP access control
Allow the local host to send
messages via SMTP: echo '' 127.:allow,RELAYCLIENT = "" "" '' >> / etc / tcp.smtp
qmailctl cdb to
stop the installed MTA.
🦑 If the MTA is Sendmail, you should use one of the following commands to stop sendmail work:
/etc/init.d/sendmail stop
/ sbin / init.d / sendmail stop
/etc/rc.d/init.d / sendmail stop
or the following command to stop
kill PID-of-sendmail
uninstall Sendmail through the following command:
rpm -e --nodeps sendmail
Finally, use the qmail version of sendmail instead of the system / usr / lib / sendmail sendmail:
mv / usr / lib / sendmail /usr/lib/sendmail.old # ignore errors
mv / usr / sbin / sendmail /usr/sbin/sendmail.old # ignore errors
chmod 0 /usr/lib/sendmail.old / usr / sbin /sendmail.old # ignore errors
ln -s / var / qmail / bin / sendmail / usr / lib
ln -s / var / qmail / bin / sendmail / usr / sbin
🦑 Note: It is important to generate '' sendmail links because there are Many applications involve sending mail.
The last step generates the system alias (aliases)
echo alias> /var/qmail/alias/.qmail-root
echo alias> /var/qmail/alias/.qmail-postmaster
ln -s .qmail-postmaster / var / qmail / alias / .qmail-mailer-daemon
chmod 644 /var/qmail/alias/.qmail-root /var/qmail/alias/.qmail-postmaster
start qmail
qmailctl start
add pop3 service
Generate / var / qmail / supervise / qmail-pop3d / run script contains the following content:
#! / Bin / sh
exec / usr / local / bin / tcpserver -v -R -H -l 0 0 110 / var / qmail / bin / qmail-popup
longshine.com / bin / checkpassword / var / qmail / bin / qmail-pop3d Maildir 2> & 1
Generate / var / qmail / supervise / qmail-pop3d / log / run The script contains the following content:
#! / bin / sh
exec / usr / local / bin / setuidgid qmaill / usr / local / bin / multilog t
/ var / log / qmail / pop3d
creates a log directory so that the script can be executed and links this service to / service:
chmod + t / var / qmail / supervise / qmail-pop3d
mkdir / var / log / qmail / pop3d
chown qmaill / var / log / qmail / pop3d
chmod 755 / var / qmail / supervise / qmail-pop3d / run
chmod 755 / var / qmail / supervise / qmail -pop3d / log / run
ln -s / var / qmail / supervise / qmail-pop3d / service
add the following to the qmailctl script:
in the "" start "" part of qmailctl '':
if svok / service / qmail-pop3d; then
svc -u / service / qmail-pop3d
else
echo qmail-pop3d service not running
fi
in the "" stop "" part of qmailctl '':
echo "" qmail-pop3d ""
svc -d / service / qmail-pop3d
in "" stat "of qmailctl '' "" Part:
svstat / service / qmail-pop3d
svstat / service / qmail-pop3d / log
in the "" pause "" part of qmailctl ":
echo" "Pausing qmail-pop3d" "
svc -p /service/qmail-pop3d
在qmailctl''的 ""cont"" 部分:
echo ""Continuing qmail-pop3d""
svc -c /service/qmail-pop3d
: In qmailctl '' the "" restart "" section
. "* Restarting qmail-pop3d" "echo"
SVC -t /-Service / qmail-pop3d
/ script added to the hosts / etc
172.18.6.111 longshine.com
qmail Test
🦑 Test Installation:
You can refer to the TEST.deliver and TEST.receive documents to test whether it is working properly. Note that the log is generated by multilog instead of splogger.
Test Pop3 and SMTP service
first start qmail mail server, and then test, use the following command:
local testing:
#run_mail
#netstat -na | grep 25
#netstat -na | grep 110
#telnet localhost 110
the User the Test
Pass the Test
List
RETR 1
remote testing :
🦑 Use the graphical mail client (such as outlook, foxmail, etc.) under Windows to test the sending and receiving of mail.
Add LDAP support for qmail
🦑Qmail + LDAP installation and configuration example full by Undercode :
> t.me/UndercodeTesting
🦑𝕃𝔼𝕋' 𝕊 𝕊𝕋𝔸ℝ𝕋 :
> SMTP access control
Allow the local host to send
messages via SMTP: echo '' 127.:allow,RELAYCLIENT = "" "" '' >> / etc / tcp.smtp
qmailctl cdb to
stop the installed MTA.
🦑 If the MTA is Sendmail, you should use one of the following commands to stop sendmail work:
/etc/init.d/sendmail stop
/ sbin / init.d / sendmail stop
/etc/rc.d/init.d / sendmail stop
or the following command to stop
kill PID-of-sendmail
uninstall Sendmail through the following command:
rpm -e --nodeps sendmail
Finally, use the qmail version of sendmail instead of the system / usr / lib / sendmail sendmail:
mv / usr / lib / sendmail /usr/lib/sendmail.old # ignore errors
mv / usr / sbin / sendmail /usr/sbin/sendmail.old # ignore errors
chmod 0 /usr/lib/sendmail.old / usr / sbin /sendmail.old # ignore errors
ln -s / var / qmail / bin / sendmail / usr / lib
ln -s / var / qmail / bin / sendmail / usr / sbin
🦑 Note: It is important to generate '' sendmail links because there are Many applications involve sending mail.
The last step generates the system alias (aliases)
echo alias> /var/qmail/alias/.qmail-root
echo alias> /var/qmail/alias/.qmail-postmaster
ln -s .qmail-postmaster / var / qmail / alias / .qmail-mailer-daemon
chmod 644 /var/qmail/alias/.qmail-root /var/qmail/alias/.qmail-postmaster
start qmail
qmailctl start
add pop3 service
Generate / var / qmail / supervise / qmail-pop3d / run script contains the following content:
#! / Bin / sh
exec / usr / local / bin / tcpserver -v -R -H -l 0 0 110 / var / qmail / bin / qmail-popup
longshine.com / bin / checkpassword / var / qmail / bin / qmail-pop3d Maildir 2> & 1
Generate / var / qmail / supervise / qmail-pop3d / log / run The script contains the following content:
#! / bin / sh
exec / usr / local / bin / setuidgid qmaill / usr / local / bin / multilog t
/ var / log / qmail / pop3d
creates a log directory so that the script can be executed and links this service to / service:
chmod + t / var / qmail / supervise / qmail-pop3d
mkdir / var / log / qmail / pop3d
chown qmaill / var / log / qmail / pop3d
chmod 755 / var / qmail / supervise / qmail-pop3d / run
chmod 755 / var / qmail / supervise / qmail -pop3d / log / run
ln -s / var / qmail / supervise / qmail-pop3d / service
add the following to the qmailctl script:
in the "" start "" part of qmailctl '':
if svok / service / qmail-pop3d; then
svc -u / service / qmail-pop3d
else
echo qmail-pop3d service not running
fi
in the "" stop "" part of qmailctl '':
echo "" qmail-pop3d ""
svc -d / service / qmail-pop3d
in "" stat "of qmailctl '' "" Part:
svstat / service / qmail-pop3d
svstat / service / qmail-pop3d / log
in the "" pause "" part of qmailctl ":
echo" "Pausing qmail-pop3d" "
svc -p /service/qmail-pop3d
在qmailctl''的 ""cont"" 部分:
echo ""Continuing qmail-pop3d""
svc -c /service/qmail-pop3d
: In qmailctl '' the "" restart "" section
. "* Restarting qmail-pop3d" "echo"
SVC -t /-Service / qmail-pop3d
/ script added to the hosts / etc
172.18.6.111 longshine.com
qmail Test
🦑 Test Installation:
You can refer to the TEST.deliver and TEST.receive documents to test whether it is working properly. Note that the log is generated by multilog instead of splogger.
Test Pop3 and SMTP service
first start qmail mail server, and then test, use the following command:
local testing:
#run_mail
#netstat -na | grep 25
#netstat -na | grep 110
#telnet localhost 110
the User the Test
Pass the Test
List
RETR 1
remote testing :
🦑 Use the graphical mail client (such as outlook, foxmail, etc.) under Windows to test the sending and receiving of mail.
Add LDAP support for qmail
> qmail can replace the traditional Pop3 authentication of / etc / passwd through LDAP, in order to improve the efficiency of authentication and effectively support large-volume mail customers. In order to enable qmail to obtain LDAP support, it is necessary to add a LDAP authentication patch on the basis of qmail Package, it is best to use the new compressed package of qmail, specific operations use the following command:
#rm -rf qmail-1.03
#zip-zxvf qmail-1.03.tar.gz
#gunzip qmail-ldap-1_03-20010301_patch.gz
#cd qmail- 1.03
#patch -p1 <../ qmail-ldap-1.03-20010501.patch
After the patch package is printed , you need to modify the qmail
🦑 Makefile to configure the corresponding LDAP information, as follows (here only explain what must be modified, the rest For options, please refer to the QLDAPINSTALL.TXT document):
1) -LDAPFLAGS = -DCLEARTEXTPASSWORD
Configure whether to use a clear text password in the LDAP directory.
2) -LDAPLIBS =
LDAP interface library configured, in this case:
LDAPLIBS = -L / usr / local / lib -L / usr / X11R6 / lib / modules -lldap -llber -lldap_r -lpthread -lresolv
4) -SHADOWLIBS = -lcrypt -lshadow
-SHADOWOPTS = -DPW_SHADOW
Configure the password authentication method used.
After the Makefile settings are modified, recompile the qmail source file, then overwrite and install qmail, use the following command:
#make setup check
install openldap
zip -zxvf openldap-2.07.tgz
cd openldap-2.07
./configure
make depend
make
make test
su root -c '' make install ''
such that openldap installation is completed
Create the corresponding LDAP support file under / var / qmail / control /:
#cat ldapserver
172.18.6.111
#cat ldapbasedn
dc = longshine, dc = com
#cat ldapobjectclass
qmailUser
copies qmail.schema to the corresponding directory of openldap
cp /usr/local/src/qmail/qmail-1.03/qmail.schema / usr / local / etc / openldap / schema /.
Edit the configuration file / usr / local / etc / openldap / slapd.conf)
database ldbm
suffix ""dc=longshine,dc=com""
rootdn ""cn=Manager,dc= longshine ,dc=""
rootpw secret
directory / usr / local / var / openldap-ldbm
add the corresponding shema file
include /usr/local/etc/openldap/schema/cosine.schema
include /usr/local/etc/openldap/schema/nis.schema
include /usr/local/etc/openldap/schema/inetorgperson.schema
include /usr/local/etc/openldap/schema/qmail.schema
start SLAPD.
su root -c / usr / local / libexec / slapd in
order to detect whether openldap is running And configured correctly. You can execute the ldapsearch command to check. By default, ldapsearch is installed in / usr / local / bin / ldapsearch:
ldapsearch -x -b '' '' -s base '' (objectclass = *) '' namingContexts
should see
dn:
namingContexts: dc = longshine,
dc = com increases the initial population of the directory.
Is divided into two steps:
generating an LDIF file
running ldapadd
#rm -rf qmail-1.03
#zip-zxvf qmail-1.03.tar.gz
#gunzip qmail-ldap-1_03-20010301_patch.gz
#cd qmail- 1.03
#patch -p1 <../ qmail-ldap-1.03-20010501.patch
After the patch package is printed , you need to modify the qmail
🦑 Makefile to configure the corresponding LDAP information, as follows (here only explain what must be modified, the rest For options, please refer to the QLDAPINSTALL.TXT document):
1) -LDAPFLAGS = -DCLEARTEXTPASSWORD
Configure whether to use a clear text password in the LDAP directory.
2) -LDAPLIBS =
LDAP interface library configured, in this case:
LDAPLIBS = -L / usr / local / lib -L / usr / X11R6 / lib / modules -lldap -llber -lldap_r -lpthread -lresolv
4) -SHADOWLIBS = -lcrypt -lshadow
-SHADOWOPTS = -DPW_SHADOW
Configure the password authentication method used.
After the Makefile settings are modified, recompile the qmail source file, then overwrite and install qmail, use the following command:
#make setup check
install openldap
zip -zxvf openldap-2.07.tgz
cd openldap-2.07
./configure
make depend
make
make test
su root -c '' make install ''
such that openldap installation is completed
Create the corresponding LDAP support file under / var / qmail / control /:
#cat ldapserver
172.18.6.111
#cat ldapbasedn
dc = longshine, dc = com
#cat ldapobjectclass
qmailUser
copies qmail.schema to the corresponding directory of openldap
cp /usr/local/src/qmail/qmail-1.03/qmail.schema / usr / local / etc / openldap / schema /.
Edit the configuration file / usr / local / etc / openldap / slapd.conf)
database ldbm
suffix ""dc=longshine,dc=com""
rootdn ""cn=Manager,dc= longshine ,dc=""
rootpw secret
directory / usr / local / var / openldap-ldbm
add the corresponding shema file
include /usr/local/etc/openldap/schema/cosine.schema
include /usr/local/etc/openldap/schema/nis.schema
include /usr/local/etc/openldap/schema/inetorgperson.schema
include /usr/local/etc/openldap/schema/qmail.schema
start SLAPD.
su root -c / usr / local / libexec / slapd in
order to detect whether openldap is running And configured correctly. You can execute the ldapsearch command to check. By default, ldapsearch is installed in / usr / local / bin / ldapsearch:
ldapsearch -x -b '' '' -s base '' (objectclass = *) '' namingContexts
should see
dn:
namingContexts: dc = longshine,
dc = com increases the initial population of the directory.
Is divided into two steps:
generating an LDIF file
running ldapadd
is editor generates an LDIF file contains the following:
dn: dc =,dc=
objectclass: dcObject
objectclass: organization
o:
dc:
dn: cn=Manager,dc=,dc=
objectclass: organizationalRole
cn: Manager
The content of my Manager.ldif file is dn: dc = longshine, dc = com, dc = cn
objectclass: dcObject
objectclass: organization
o: longshine
dc: longshine
dn: cn = Manager, dc = longshine , dc = com
objectclass: organizationalRole
cn: Manager
now runs the ldapadd program
ldapadd -x -D "" cn = Manager, dc = longshine, dc = com "" -W -f /root/manager.ldif
if you want to enter the password as secret .
Add qmail user information to generate test.ldif file
dn: cn = testUser, dc = longshine, dc = com
cn: testUser
sn: testUser
objectClass: top
objectClass: person
objectClass: inetOrgPerson
objectClass: qmailUser
mail: test@longshine.com
mailHost: longshine.com
mailMessageStore: / home / test / Maildir /
mailQuota: 1000000S, 100C
uid: test
userPassword: test
qmailUID: 508
qmailGID: 508
Note qmailUID, qmailGID can be queried through the / etc / passwd file. Use the following command to enter
ldapadd -x -D "" cn = Manager, dc = longshine, dc = com "" -W -f /root/test.ldif
if you want to enter the password as secret.
> Include the following content in the / var / qmail / supervise / qmail-pop3d / run script:
#! / Bin / sh
exec / usr / local / bin / tcpserver -v -R -H -l 0 0 110 / var / qmail / bin / qmail-popup
longshine.com / var / qmail / bin / auth_pop / var / qmail / bin / qmail-pop3d Maildir 2> & 1Test
LDAP:
ldapsearch -x -b '' '' -s base '' (objectclass = * ) ''
What command does namingContexts use to check whether the added time is correct. Can be used if not correct
ldapdelete -x -D "" cn = Manager, dc = longshine, dc = com "" -w secret "" cn = testUser, dc = longshine, dc = com ""
Delete, and then add it again.
LDAP-based authentication Pop3 test
after the above steps, the health of the qmail new test system, mainly from the following three tests, using the following command:
local test
Refer TEST.deliver TEST.receive and methods.
Pop3 + SMTP test
telnet localhost 25 and telnet localhost 110
test tool
# / var / qmail / bin / qmail-ldaplookup -u test
# / var / qmail / bin / qmail-ladplookup -m test@exmaple.com
is also available under Windows Graphic mail clients (such as outlook, foxmail, etc.) to test the sending and receiving of mail.
WRITTEN BY UNDERCODE
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
dn: dc =,dc=
objectclass: dcObject
objectclass: organization
o:
dc:
dn: cn=Manager,dc=,dc=
objectclass: organizationalRole
cn: Manager
The content of my Manager.ldif file is dn: dc = longshine, dc = com, dc = cn
objectclass: dcObject
objectclass: organization
o: longshine
dc: longshine
dn: cn = Manager, dc = longshine , dc = com
objectclass: organizationalRole
cn: Manager
now runs the ldapadd program
ldapadd -x -D "" cn = Manager, dc = longshine, dc = com "" -W -f /root/manager.ldif
if you want to enter the password as secret .
Add qmail user information to generate test.ldif file
dn: cn = testUser, dc = longshine, dc = com
cn: testUser
sn: testUser
objectClass: top
objectClass: person
objectClass: inetOrgPerson
objectClass: qmailUser
mail: test@longshine.com
mailHost: longshine.com
mailMessageStore: / home / test / Maildir /
mailQuota: 1000000S, 100C
uid: test
userPassword: test
qmailUID: 508
qmailGID: 508
Note qmailUID, qmailGID can be queried through the / etc / passwd file. Use the following command to enter
ldapadd -x -D "" cn = Manager, dc = longshine, dc = com "" -W -f /root/test.ldif
if you want to enter the password as secret.
> Include the following content in the / var / qmail / supervise / qmail-pop3d / run script:
#! / Bin / sh
exec / usr / local / bin / tcpserver -v -R -H -l 0 0 110 / var / qmail / bin / qmail-popup
longshine.com / var / qmail / bin / auth_pop / var / qmail / bin / qmail-pop3d Maildir 2> & 1Test
LDAP:
ldapsearch -x -b '' '' -s base '' (objectclass = * ) ''
What command does namingContexts use to check whether the added time is correct. Can be used if not correct
ldapdelete -x -D "" cn = Manager, dc = longshine, dc = com "" -w secret "" cn = testUser, dc = longshine, dc = com ""
Delete, and then add it again.
LDAP-based authentication Pop3 test
after the above steps, the health of the qmail new test system, mainly from the following three tests, using the following command:
local test
Refer TEST.deliver TEST.receive and methods.
Pop3 + SMTP test
telnet localhost 25 and telnet localhost 110
test tool
# / var / qmail / bin / qmail-ldaplookup -u test
# / var / qmail / bin / qmail-ladplookup -m test@exmaple.com
is also available under Windows Graphic mail clients (such as outlook, foxmail, etc.) to test the sending and receiving of mail.
WRITTEN BY UNDERCODE
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑Qmail + LDAP installation and configuration example full written by Undercoders
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑Napster Premium Accounts verified login and send screanshoats @Undercode_Testing
twitter.com/UndercodeNews
iclopton0001@gmail.com:bln27222456 | Country = US | Subscription Type = Napster unRadio | Auto-Renew = True
icucclay@msn.com:jc125436 | Country = US | Subscription Type = Napster unRadio | Auto-Renew = True
igor8789@yahoo.com:sweatshirt | Country = US | : Subscription Type = Downloads Only | Auto-Renew = False
ilaiashdot2004@yahoo.com:kadursheleg | Country = US | Subscription Type = Downloads Only | Auto-Renew = False
ilavant@msn.com:nph96jsu | Country = US | Subscription Type = Downloads Only | Auto-Renew = False
ilivmopar@yahoo.com:1971demon | Country = US | Subscription Type = Downloads Only | Auto-Renew = False
imcxs@yahoo.com:091900 | Country = US | Subscription Type = Downloads Only | Auto-Renew = False
immortal8@gmail.com:izabele | Country = US | : Subscription Type = Downloads Only | Auto-Renew = False
incoherently@gmail.com:Smiley04 | Country = US | Subscription Type = Downloads Only | Auto-Renew = False
index28@live.com:toontown1 | Country = US | : Subscription Type = Napster unRadio | Auto-Renew = True
Ingridhendrix2@yahoo.com:Williams1 | Country = US | Subscription Type = Downloads Only | Auto-Renew = False
inkanu2007@yahoo.de:kamczatka26 | Country = DE | Subscription Type = Aldi Life Musik-Flat | Auto-Renew = True
jake.edgar@gmail.com:snake3732 | Country = US | : Subscription Type = Downloads Only | Auto-Renew = False
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑Napster Premium Accounts verified login and send screanshoats @Undercode_Testing
twitter.com/UndercodeNews
iclopton0001@gmail.com:bln27222456 | Country = US | Subscription Type = Napster unRadio | Auto-Renew = True
icucclay@msn.com:jc125436 | Country = US | Subscription Type = Napster unRadio | Auto-Renew = True
igor8789@yahoo.com:sweatshirt | Country = US | : Subscription Type = Downloads Only | Auto-Renew = False
ilaiashdot2004@yahoo.com:kadursheleg | Country = US | Subscription Type = Downloads Only | Auto-Renew = False
ilavant@msn.com:nph96jsu | Country = US | Subscription Type = Downloads Only | Auto-Renew = False
ilivmopar@yahoo.com:1971demon | Country = US | Subscription Type = Downloads Only | Auto-Renew = False
imcxs@yahoo.com:091900 | Country = US | Subscription Type = Downloads Only | Auto-Renew = False
immortal8@gmail.com:izabele | Country = US | : Subscription Type = Downloads Only | Auto-Renew = False
incoherently@gmail.com:Smiley04 | Country = US | Subscription Type = Downloads Only | Auto-Renew = False
index28@live.com:toontown1 | Country = US | : Subscription Type = Napster unRadio | Auto-Renew = True
Ingridhendrix2@yahoo.com:Williams1 | Country = US | Subscription Type = Downloads Only | Auto-Renew = False
inkanu2007@yahoo.de:kamczatka26 | Country = DE | Subscription Type = Aldi Life Musik-Flat | Auto-Renew = True
jake.edgar@gmail.com:snake3732 | Country = US | : Subscription Type = Downloads Only | Auto-Renew = False
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
X (formerly Twitter)
UNDERCODE NEWS (@UndercodeNews) on X
🦑 Latest in Cyber & Tech News with AI-Powered Analysis and Fact Checking.
》join us: https://t.co/YVv330UsjQ
More: @DailyCve @UndercodeUpdate
》join us: https://t.co/YVv330UsjQ
More: @DailyCve @UndercodeUpdate
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑 BEST RATS FOR HACKING :(PAYLOADS)- GITHUB TOPIC :
Thefatrat ⭐️4,123
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .
Quasarrat ⭐️3,071
Remote Administration Tool for Windows
Stitch ⭐️1,525
Python Remote Administration Tool (RAT)
Evilosx ⭐️1,446
An evil RAT (Remote Administration Tool) for macOS / OS X.
Rat ⭐️1,128
Compose shell commands to build interactive terminal applications
Lime Rat ⭐️549
LimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)
Powershell Rat ⭐️524
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Asyncrat C Sharp ⭐️442
Open-Source Remote Administration Tool For Windows C# (RAT)
Awesome Rat ⭐️424
RAT And C&C Resources. 250+ Open Source Projects, 1200+ RAT/C&C blog/video.
Lilith ⭐️414
Lilith, The Open Source C++ Remote Administration Tool (RAT)
Rat Via Telegram ⭐️363
Windows Remote Administration Tool via Telegram
Kage ⭐️354
Kage is Graphical User Interface for Metasploit Meterpreter and Session Handler
Python Rootkit ⭐️309
Python Remote Administration Tool (RAT) to gain meterpreter session
Blacknet ⭐️254
Free advanced and modern Windows botnet with a nice and secure PHP panel.
Ghost ⭐️221
👻 RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Caesar ⭐️211
An HTTP based RAT (Remote Administration Tool) that allows you to remotely control devices from your browser
Androrat ⭐️189
AndroRAT | Remote Administrator Tool for Android OS Hacking
Poet ⭐️182
Post-exploitation tool
Torat ⭐️146
ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
Vanillarat ⭐️146
VanillaRat is an advanced remote administration tool completely coded in C# for Windows.
Ghost ⭐️139
Ghost Framework is an Android post-exploitation framework that uses an Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
N00brat ⭐️135
Remote Administration Toolkit (or Trojan) for POSiX (Linux/Unix) system working as a Web Service
Proton ⭐️127
Proton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Pandasniper ⭐️119
Linux C2 框架demo,为期2周的”黑客编程马拉松“,从学习编程语言开始到实现一个demo的产物
Outis ⭐️107
outis is a custom Remote Administration Tool (RAT) or something like that. It was build to support various transport methods (like DNS) and platforms (like Powershell).
Green Hat Suite ⭐️106
Green-hat-suite is a tool to generate meterpreter/shell which could evade antivirus.
Paradoxia ⭐️106
Advanced Attack toolkit, Fully Undetectable RAT / Botnet, Instagram Brute Force and Password Spraying over Tor, Mass Emailer, Malicious file Sentinel and more.
Client ⭐️89
Windows, OS X and linux RAT client
Spacecow ⭐️81
Windows Rootkit written in Python
Blackworm ⭐️76
Black Worm Offical Repo
Mass Rat ⭐️74
Basic Multiplatform Remote Administration Tool - Xamarin
Teleshadow3 ⭐️69
Telegram Desktop Session Stealer
🦑 BEST RATS FOR HACKING :(PAYLOADS)- GITHUB TOPIC :
Thefatrat ⭐️4,123
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .
Quasarrat ⭐️3,071
Remote Administration Tool for Windows
Stitch ⭐️1,525
Python Remote Administration Tool (RAT)
Evilosx ⭐️1,446
An evil RAT (Remote Administration Tool) for macOS / OS X.
Rat ⭐️1,128
Compose shell commands to build interactive terminal applications
Lime Rat ⭐️549
LimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)
Powershell Rat ⭐️524
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Asyncrat C Sharp ⭐️442
Open-Source Remote Administration Tool For Windows C# (RAT)
Awesome Rat ⭐️424
RAT And C&C Resources. 250+ Open Source Projects, 1200+ RAT/C&C blog/video.
Lilith ⭐️414
Lilith, The Open Source C++ Remote Administration Tool (RAT)
Rat Via Telegram ⭐️363
Windows Remote Administration Tool via Telegram
Kage ⭐️354
Kage is Graphical User Interface for Metasploit Meterpreter and Session Handler
Python Rootkit ⭐️309
Python Remote Administration Tool (RAT) to gain meterpreter session
Blacknet ⭐️254
Free advanced and modern Windows botnet with a nice and secure PHP panel.
Ghost ⭐️221
👻 RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Caesar ⭐️211
An HTTP based RAT (Remote Administration Tool) that allows you to remotely control devices from your browser
Androrat ⭐️189
AndroRAT | Remote Administrator Tool for Android OS Hacking
Poet ⭐️182
Post-exploitation tool
Torat ⭐️146
ToRat is a Remote Administation tool written in Go using Tor as a transport mechanism and RPC for communication
Vanillarat ⭐️146
VanillaRat is an advanced remote administration tool completely coded in C# for Windows.
Ghost ⭐️139
Ghost Framework is an Android post-exploitation framework that uses an Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
N00brat ⭐️135
Remote Administration Toolkit (or Trojan) for POSiX (Linux/Unix) system working as a Web Service
Proton ⭐️127
Proton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Pandasniper ⭐️119
Linux C2 框架demo,为期2周的”黑客编程马拉松“,从学习编程语言开始到实现一个demo的产物
Outis ⭐️107
outis is a custom Remote Administration Tool (RAT) or something like that. It was build to support various transport methods (like DNS) and platforms (like Powershell).
Green Hat Suite ⭐️106
Green-hat-suite is a tool to generate meterpreter/shell which could evade antivirus.
Paradoxia ⭐️106
Advanced Attack toolkit, Fully Undetectable RAT / Botnet, Instagram Brute Force and Password Spraying over Tor, Mass Emailer, Malicious file Sentinel and more.
Client ⭐️89
Windows, OS X and linux RAT client
Spacecow ⭐️81
Windows Rootkit written in Python
Blackworm ⭐️76
Black Worm Offical Repo
Mass Rat ⭐️74
Basic Multiplatform Remote Administration Tool - Xamarin
Teleshadow3 ⭐️69
Telegram Desktop Session Stealer
BlackRAT - Java Based Remote Administrator Tool
Tinkerershell ⭐️53
A simple python reverse shell written just for fun.
Droidjack ⭐️19
Este troyano para Android es uno de los más completos. Con él vamos a poder tener acceso a remoto a todo el dispositivo infectado, desde la agenda, las llamadas y los SMS hasta el micrófono y las cámaras del smartphone. Todo.
Orwell Rat And Botnet ⭐️18
Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.
Skyrat ⭐️16
SkyRAT - Powershell Remote Administration Tool
Technowhorse ⭐️64
TechNowHorse is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python 3.
Slickermaster Rev4 ⭐️62
NSA Hacking Tool Recreation UnitedRake
C Sharp R.a.t Client ⭐️60
This is a c# client for the c# R.A.T server
Blackrat ⭐️59
🦑 BEST RATS FOR HACKING :(PAYLOADS)- GITHUB TOPIC
> FROM WIKI - VERIFIED BY UNDERCODE
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Tinkerershell ⭐️53
A simple python reverse shell written just for fun.
Droidjack ⭐️19
Este troyano para Android es uno de los más completos. Con él vamos a poder tener acceso a remoto a todo el dispositivo infectado, desde la agenda, las llamadas y los SMS hasta el micrófono y las cámaras del smartphone. Todo.
Orwell Rat And Botnet ⭐️18
Orwell is a RAT and Botnet designed as a trio of programs by Landon Powell.
Skyrat ⭐️16
SkyRAT - Powershell Remote Administration Tool
Technowhorse ⭐️64
TechNowHorse is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python 3.
Slickermaster Rev4 ⭐️62
NSA Hacking Tool Recreation UnitedRake
C Sharp R.a.t Client ⭐️60
This is a c# client for the c# R.A.T server
Blackrat ⭐️59
🦑 BEST RATS FOR HACKING :(PAYLOADS)- GITHUB TOPIC
> FROM WIKI - VERIFIED BY UNDERCODE
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
🦑 Network configuration-LAN implementation VLAN example full by Undercode :
instagram.com/UndercodeTesting
🦑 computer network technology has developed from traditional Ethernet (10Mb / s) to Fast Ethernet (100Mb / s ) And Gigabit Ethernet
(1000Mb / s) are only a few years away, and the rapid momentum is surprising. Nowadays, in the construction of large and medium-sized networks,
the mainstream network model called "Gigabit backbone running, 100M to the desktop" with Gigabit Layer 3 switches as the core is numerous. Now, the
network industry is no stranger to the terms "Layer 3 switching" and VLAN.
1. What is Layer 3 switching and VLAN?
To answer this question, let's first look at the working principle of Ethernet. The working principle of Ethernet is to use
bytes formed by binary bits to form a frame of data (in fact, some electrical pulses) to propagate in the wire. First of all,
the nodes on the Ethernet network segment that need to perform data transmission monitor the wires. This process is called CSMA / CD
(Carrier Sense Multiple Access with Collision Detection with collision detection
). If, at this time, another node is transmitting data, the listening node will have to wait until
the transmission task of the transmitting node ends. If there are exactly two workstations ready to transmit data at a time, the Ethernet network segment will issue a
"conflict" signal. At this time, all workstations on the node will detect the conflict signal because the voltage on the wire exceeds the
standard voltage. At this time, any node on the Ethernet segment must wait for the conflict to end before it can transmit data. In other words, in CSMA
In the / CD mode, only one node can transmit data on the wire at a time. The networking
equipment that forwards Ethernet data frames is a hub, which is a layer of equipment with low transmission efficiency.
The occurrence of conflicts reduces the bandwidth of Ethernet, and this situation is inevitable. Therefore, when there are
more and more nodes on the wire, the number of conflicts will increase. The obvious solution is to limit the nodes on the Ethernet wire and need to
physically segment the network. Network devices that physically segment the network use bridges and switches. The basic
function of bridges and switches is to only send information to other physical network segments. Therefore, if all information is only sent to the local physical network segment,
then no information will pass through the bridge and the switch. This can effectively reduce conflicts on the network. Bridges and switches
make forwarding decisions based on the target MAC (Media Access Control) address. They are Layer 2 devices. We already know the
shortcomings of Ethernet and the impact of conflicts in the physical network segment. Now, let's take a look at another reason that causes the network to slow down:
broadcast. Broadcasts exist on all networks. If they are not properly controlled, they will flood the entire network and
generate a lot of network communication. Broadcasting not only consumes bandwidth, but also reduces the processing efficiency of user workstations. Each of various
reasons like, the network operating system (NOS) using broadcast, TCP / IP using the broadcast MAC address resolution from the IP address, so that also
advertises by using broadcasts RIP and IGRP protocol, therefore, is inevitable broadcast . Bridges and switches will
forward all broadcast information, but routers will not. Therefore, in order to control the broadcast, you must use a router. The router
makes the forwarding decision based on the Layer 3 header, target IP addressing, target IPX addressing, or target Appletalk addressing. The router is a
layer 3 device.
Here, we can easily understand the three-layer switching technology. In layman's terms, it is a technology that combines routing and switching into one.
After a first router for routing data stream, will produce a MAC address and IP address mapping table, when the same number of
🦑 Network configuration-LAN implementation VLAN example full by Undercode :
instagram.com/UndercodeTesting
🦑 computer network technology has developed from traditional Ethernet (10Mb / s) to Fast Ethernet (100Mb / s ) And Gigabit Ethernet
(1000Mb / s) are only a few years away, and the rapid momentum is surprising. Nowadays, in the construction of large and medium-sized networks,
the mainstream network model called "Gigabit backbone running, 100M to the desktop" with Gigabit Layer 3 switches as the core is numerous. Now, the
network industry is no stranger to the terms "Layer 3 switching" and VLAN.
1. What is Layer 3 switching and VLAN?
To answer this question, let's first look at the working principle of Ethernet. The working principle of Ethernet is to use
bytes formed by binary bits to form a frame of data (in fact, some electrical pulses) to propagate in the wire. First of all,
the nodes on the Ethernet network segment that need to perform data transmission monitor the wires. This process is called CSMA / CD
(Carrier Sense Multiple Access with Collision Detection with collision detection
). If, at this time, another node is transmitting data, the listening node will have to wait until
the transmission task of the transmitting node ends. If there are exactly two workstations ready to transmit data at a time, the Ethernet network segment will issue a
"conflict" signal. At this time, all workstations on the node will detect the conflict signal because the voltage on the wire exceeds the
standard voltage. At this time, any node on the Ethernet segment must wait for the conflict to end before it can transmit data. In other words, in CSMA
In the / CD mode, only one node can transmit data on the wire at a time. The networking
equipment that forwards Ethernet data frames is a hub, which is a layer of equipment with low transmission efficiency.
The occurrence of conflicts reduces the bandwidth of Ethernet, and this situation is inevitable. Therefore, when there are
more and more nodes on the wire, the number of conflicts will increase. The obvious solution is to limit the nodes on the Ethernet wire and need to
physically segment the network. Network devices that physically segment the network use bridges and switches. The basic
function of bridges and switches is to only send information to other physical network segments. Therefore, if all information is only sent to the local physical network segment,
then no information will pass through the bridge and the switch. This can effectively reduce conflicts on the network. Bridges and switches
make forwarding decisions based on the target MAC (Media Access Control) address. They are Layer 2 devices. We already know the
shortcomings of Ethernet and the impact of conflicts in the physical network segment. Now, let's take a look at another reason that causes the network to slow down:
broadcast. Broadcasts exist on all networks. If they are not properly controlled, they will flood the entire network and
generate a lot of network communication. Broadcasting not only consumes bandwidth, but also reduces the processing efficiency of user workstations. Each of various
reasons like, the network operating system (NOS) using broadcast, TCP / IP using the broadcast MAC address resolution from the IP address, so that also
advertises by using broadcasts RIP and IGRP protocol, therefore, is inevitable broadcast . Bridges and switches will
forward all broadcast information, but routers will not. Therefore, in order to control the broadcast, you must use a router. The router
makes the forwarding decision based on the Layer 3 header, target IP addressing, target IPX addressing, or target Appletalk addressing. The router is a
layer 3 device.
Here, we can easily understand the three-layer switching technology. In layman's terms, it is a technology that combines routing and switching into one.
After a first router for routing data stream, will produce a MAC address and IP address mapping table, when the same number of
time data stream through again, this will be exchanged according to the mapping table directly from the floor rather than re-routing , To provide wire-speed performance, thereby
eliminating the network delay caused by router routing, and improving the efficiency of data packet forwarding.
Switches that use this technology are often referred to as Layer 3 switches.
So, what is VLAN? VLAN (Virtual Local Area Network) means virtual local area network.
VLAN does not consider the user's physical location, but logically divides the user into
working groups with relatively independent functions according to factors such as function and application . Each user host is connected to a VLAN-supporting switch port and belongs to a VLAN .
Members in the same VLAN share the broadcast to form a broadcast domain, and broadcast information between different VLANs is isolated from each other. In this
way, the entire network is divided into multiple different broadcast domains (VLANs).
Generally speaking, if a workstation in a VLAN sends a broadcast, then all workstations in the VLAN will
receive the broadcast, but the switch will not send the broadcast to any port on other VLANs. If you want to send the broadcast
to other VLAN ports, you need to use a Layer 3 switch.
Second, how to configure Layer 3 switches to create VLANs The
following descriptions are all based on VLANs of Cisco switches. Cisco's VLAN implementation is usually port-centric. Section with
a port connected to the determined point VLAN it resides. There are two ways to assign ports to VLANs, which are static and dynamic
The process of forming a static VLAN is the process of forcibly assigning ports to VLANs. That is
, the process of establishing a VLAN on the VTP (VLAN Trunking Protocol) Server, and then assigning each port to the corresponding VLAN.
This is the most common method we use to create VLANs.
The formation of dynamic VLAN is very simple, and the port determines which VLAN it belongs to. That is, we first create a VMPS
(VLAN Membership Policy Server) VLAN management policy server, which contains a text file, which
stores the MAC address table mapped with VLAN. The switch determines which VLAN the port is assigned to based on this mapping table. This method
has great advantages, but creating a database is a very difficult and tedious task.
The following example illustrates how to implement VLAN in a typical fast Ethernet local area network. The so-called typical LAN refers to
a core switch with Layer 3 switching function connected to several branch switches (not necessarily with Layer 3 switching capability). We
assume that the core switch name is: COM; the branch switches are: PAR1, PAR2, PAR3 ..., which are
connected to the core switch through the optical module of Port 1 ; and the VLAN names are COUNTER, MARKET, MANAGING ...
1. Set VTP DOMAIN VTP DOMAIN is called the management domain. All switches that exchange VTP update information must be configured to the same
management domain. If all switches are connected by trunks, as long as a management domain is set on the core switch,
all the switches on the network are added to the domain, so that all switches in the management domain can understand each other's VLAN list.
COM#vlan database ....
eliminating the network delay caused by router routing, and improving the efficiency of data packet forwarding.
Switches that use this technology are often referred to as Layer 3 switches.
So, what is VLAN? VLAN (Virtual Local Area Network) means virtual local area network.
VLAN does not consider the user's physical location, but logically divides the user into
working groups with relatively independent functions according to factors such as function and application . Each user host is connected to a VLAN-supporting switch port and belongs to a VLAN .
Members in the same VLAN share the broadcast to form a broadcast domain, and broadcast information between different VLANs is isolated from each other. In this
way, the entire network is divided into multiple different broadcast domains (VLANs).
Generally speaking, if a workstation in a VLAN sends a broadcast, then all workstations in the VLAN will
receive the broadcast, but the switch will not send the broadcast to any port on other VLANs. If you want to send the broadcast
to other VLAN ports, you need to use a Layer 3 switch.
Second, how to configure Layer 3 switches to create VLANs The
following descriptions are all based on VLANs of Cisco switches. Cisco's VLAN implementation is usually port-centric. Section with
a port connected to the determined point VLAN it resides. There are two ways to assign ports to VLANs, which are static and dynamic
The process of forming a static VLAN is the process of forcibly assigning ports to VLANs. That is
, the process of establishing a VLAN on the VTP (VLAN Trunking Protocol) Server, and then assigning each port to the corresponding VLAN.
This is the most common method we use to create VLANs.
The formation of dynamic VLAN is very simple, and the port determines which VLAN it belongs to. That is, we first create a VMPS
(VLAN Membership Policy Server) VLAN management policy server, which contains a text file, which
stores the MAC address table mapped with VLAN. The switch determines which VLAN the port is assigned to based on this mapping table. This method
has great advantages, but creating a database is a very difficult and tedious task.
The following example illustrates how to implement VLAN in a typical fast Ethernet local area network. The so-called typical LAN refers to
a core switch with Layer 3 switching function connected to several branch switches (not necessarily with Layer 3 switching capability). We
assume that the core switch name is: COM; the branch switches are: PAR1, PAR2, PAR3 ..., which are
connected to the core switch through the optical module of Port 1 ; and the VLAN names are COUNTER, MARKET, MANAGING ...
1. Set VTP DOMAIN VTP DOMAIN is called the management domain. All switches that exchange VTP update information must be configured to the same
management domain. If all switches are connected by trunks, as long as a management domain is set on the core switch,
all the switches on the network are added to the domain, so that all switches in the management domain can understand each other's VLAN list.
COM#vlan database ....