β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦tunnel bear trials accounts
t.me/undercodeTesting
anjana.apps@gmail.com:oracle123 | PaymentStatus = FREE
stryker7301@yahoo.com:Archaeopteryx1 | PaymentStatus = FREE
oskarbrzeski@hotmail.com:oskar2001 | PaymentStatus = FREE
zhur002@gmail.com:nightmare01 | PaymentStatus = FREE
tmking.k08@gmail.com:chodey123 | PaymentStatus = FREE
dolphinman365@gmail.com:jeffhardy35 | PaymentStatus = FREE
stardust342@gmail.com:dustian342 | PaymentStatus = FREE
minnetaki@wp.pl:Jowita2000 | PaymentStatus = FREE
act2007@gmail.com:phytis13 | PaymentStatus = FREE
chrisclements@eastlink.ca:space1497 | PaymentStatus = FREE
woolums84@gmail.com:Mythos05 | PaymentStatus = FREE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦tunnel bear trials accounts
t.me/undercodeTesting
anjana.apps@gmail.com:oracle123 | PaymentStatus = FREE
stryker7301@yahoo.com:Archaeopteryx1 | PaymentStatus = FREE
oskarbrzeski@hotmail.com:oskar2001 | PaymentStatus = FREE
zhur002@gmail.com:nightmare01 | PaymentStatus = FREE
tmking.k08@gmail.com:chodey123 | PaymentStatus = FREE
dolphinman365@gmail.com:jeffhardy35 | PaymentStatus = FREE
stardust342@gmail.com:dustian342 | PaymentStatus = FREE
minnetaki@wp.pl:Jowita2000 | PaymentStatus = FREE
act2007@gmail.com:phytis13 | PaymentStatus = FREE
chrisclements@eastlink.ca:space1497 | PaymentStatus = FREE
woolums84@gmail.com:Mythos05 | PaymentStatus = FREE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ best shorten url services for earning 2020 :
1. Linkvertise
2. Adshrink.it
3. Shrinkme
4. Shrinkearn.com
5. Clk.sh
6. Smoner
7. ouo.io
8. Bc.vc
9. Shorte.st
10. Payskip.me
11. LinkBucks.com
12. Al.ly
13. AdF.ly
14. Oke.io
15. CPMlink.net
16. PowClick
17. Adyou.me
18. Fas.li
19. Link.TL
20. CutWin.com
21. Binbucks.com
22. DZ4Link.com
23. AdHy.pe
24. Spaste.com
25. Adfoc.us
26. URLCash.Net
27. Short.am
28. Shink.in
29. Linkrex.net
30. Wi.cr
31. Uii.io
32. Rom.io
33. Urle.co
34. Shrtfly
URL Shorteners That Does Not Exist
35. SkipLink.pw
36. Excel.Li
37. Blv.me
38. Petty.link
39. Dwindly
40. Uskip.me
41. VivAds
42. ClicksFly
43. Link-earn.com
44. P.PW
45. URLF.LY
46. Admy.link
- powered by wiki
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ best shorten url services for earning 2020 :
1. Linkvertise
2. Adshrink.it
3. Shrinkme
4. Shrinkearn.com
5. Clk.sh
6. Smoner
7. ouo.io
8. Bc.vc
9. Shorte.st
10. Payskip.me
11. LinkBucks.com
12. Al.ly
13. AdF.ly
14. Oke.io
15. CPMlink.net
16. PowClick
17. Adyou.me
18. Fas.li
19. Link.TL
20. CutWin.com
21. Binbucks.com
22. DZ4Link.com
23. AdHy.pe
24. Spaste.com
25. Adfoc.us
26. URLCash.Net
27. Short.am
28. Shink.in
29. Linkrex.net
30. Wi.cr
31. Uii.io
32. Rom.io
33. Urle.co
34. Shrtfly
URL Shorteners That Does Not Exist
35. SkipLink.pw
36. Excel.Li
37. Blv.me
38. Petty.link
39. Dwindly
40. Uskip.me
41. VivAds
42. ClicksFly
43. Link-earn.com
44. P.PW
45. URLF.LY
46. Admy.link
- powered by wiki
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ HBO Now Premium Accounts :
newton2smith@gmail.com:nelluc891
kawika0498@gmail.com:ilovedad042898
tyler.larson12@gmail.com:tydog1148
zoomboomzoom113@gmail.com:Killler123
orlandogarcia1986@gmail.com:Oklahoma1
andrewolvera180@gmail.com:Cats2000
androidbackup739@gmail.com:k1mk1mk1m
davepo99@gmail.com:01278d01278
destrymurray@gmail.com:auburn13
tyler.bateman327@gmail.com:mizzou25
bigbmiller1024@gmail.com:miller54
zepfrost@gmail.com:fallout3
samuelvapor@gmail.com:ballistic500
mynameismatt1010@gmail.com:mjm25735
brent.heinzinger@gmail.com:Brent1996
wto456@gmail.com:wto12345
jeremy3123.jj@gmail.com:miamiheat06
dmorr14@gmail.com:kellie1229
regramp@gmail.com:ryan4301
nomnom8383@gmail.com:bloods6983
jmyers112@gmail.com:yankees2
kendramiller94@gmail.com:Killer1!
uhhplastic@gmail.com:Adam1234
thewebdesigner@gmail.com:Airdale89
jewdini49@gmail.com:poopie12
sumayahaldakheel@gmail.com:ilovehippos123
saw864@gmail.com:shanay76
gabrielpaivaa@gmail.com:taetae4ever
wstubub@gmail.com:05c4cce9
rubenmendoza1121@gmail.com:giraffe11
jeremydbabcock@gmail.com:Brave123
agbelcher21@gmail.com:bigdaddy123
jpayne060481@gmail.com:shannon22
sam.allen.design@gmail.com:dag1ger23
rhazel06@gmail.com:oscar000123
jeremy.pyne@gmail.com:jspjsp12
hayleyhitchenss@gmail.com:hayley4DOGS
aroblast@gmail.com:jevugaz5
gerardoreyes.rc@gmail.com:gereyes92
xerinth13@gmail.com:devour13
Jcpawelkiewicz@gmail.com:Pepper29
cchildress93257@gmail.com:Fuckgirls7
learyjc@gmail.com:M3mories
dwramsey12@gmail.com:Shiloh#87
anthonylewis2011@gmail.com:boohman49
nelsonakajunior@gmail.com:ndny1993
kjbaker17@gmail.com:19943216rtg
superamykins@gmail.com:Beanie25
oscielmr.4sh@gmail.com:dificil10
bigaron8702@gmail.com:Asl26523
eranta55@gmail.com:Oogie111
Margaret.Monroe92@gmail.com:JElt7710
activkino@gmail.com:Cavalry1
MarkummsMD@gmail.com:Rachel1023
talalalammar2@gmail.com:talal2000
kinseyblevins@gmail.com:Kinsey97
copycat409@gmail.com:Chjghk123
thomaswadebrown@gmail.com:WHeezy60
jqueroondo2512@gmail.com:Josh2512
jwright7734@gmail.com:mrshow024
18kevon@gmail.com:kevon726
yeattssp@gmail.com:fuma2002
matt.denning94@gmail.com:rusty300
justinyoung0108@gmail.com:Comadog1
petermaris1@gmail.com:pmar6033
rahalldorson@gmail.com:Marley05
jrodriguez2306@gmail.com:asdf0987
tomaldrich85@gmail.com:monster1
yjbarajas1985@gmail.com:joniel2007
thpackman@gmail.com:Powell22
judecomninos@gmail.com:jude1972
orangegrl22@gmail.com:lowla2212
peogabriel@gmail.com:shadow335
prestonrobertlee@gmail.com:77Cool99
davidkull14@gmail.com:Upton772
ben.rhodes25@gmail.com:baseball25
tjcjrogers@gmail.com:Belmont1
manuel.flrsvz@gmail.com:sniper24
bhsissel@gmail.com:Hawkeye17
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ HBO Now Premium Accounts :
newton2smith@gmail.com:nelluc891
kawika0498@gmail.com:ilovedad042898
tyler.larson12@gmail.com:tydog1148
zoomboomzoom113@gmail.com:Killler123
orlandogarcia1986@gmail.com:Oklahoma1
andrewolvera180@gmail.com:Cats2000
androidbackup739@gmail.com:k1mk1mk1m
davepo99@gmail.com:01278d01278
destrymurray@gmail.com:auburn13
tyler.bateman327@gmail.com:mizzou25
bigbmiller1024@gmail.com:miller54
zepfrost@gmail.com:fallout3
samuelvapor@gmail.com:ballistic500
mynameismatt1010@gmail.com:mjm25735
brent.heinzinger@gmail.com:Brent1996
wto456@gmail.com:wto12345
jeremy3123.jj@gmail.com:miamiheat06
dmorr14@gmail.com:kellie1229
regramp@gmail.com:ryan4301
nomnom8383@gmail.com:bloods6983
jmyers112@gmail.com:yankees2
kendramiller94@gmail.com:Killer1!
uhhplastic@gmail.com:Adam1234
thewebdesigner@gmail.com:Airdale89
jewdini49@gmail.com:poopie12
sumayahaldakheel@gmail.com:ilovehippos123
saw864@gmail.com:shanay76
gabrielpaivaa@gmail.com:taetae4ever
wstubub@gmail.com:05c4cce9
rubenmendoza1121@gmail.com:giraffe11
jeremydbabcock@gmail.com:Brave123
agbelcher21@gmail.com:bigdaddy123
jpayne060481@gmail.com:shannon22
sam.allen.design@gmail.com:dag1ger23
rhazel06@gmail.com:oscar000123
jeremy.pyne@gmail.com:jspjsp12
hayleyhitchenss@gmail.com:hayley4DOGS
aroblast@gmail.com:jevugaz5
gerardoreyes.rc@gmail.com:gereyes92
xerinth13@gmail.com:devour13
Jcpawelkiewicz@gmail.com:Pepper29
cchildress93257@gmail.com:Fuckgirls7
learyjc@gmail.com:M3mories
dwramsey12@gmail.com:Shiloh#87
anthonylewis2011@gmail.com:boohman49
nelsonakajunior@gmail.com:ndny1993
kjbaker17@gmail.com:19943216rtg
superamykins@gmail.com:Beanie25
oscielmr.4sh@gmail.com:dificil10
bigaron8702@gmail.com:Asl26523
eranta55@gmail.com:Oogie111
Margaret.Monroe92@gmail.com:JElt7710
activkino@gmail.com:Cavalry1
MarkummsMD@gmail.com:Rachel1023
talalalammar2@gmail.com:talal2000
kinseyblevins@gmail.com:Kinsey97
copycat409@gmail.com:Chjghk123
thomaswadebrown@gmail.com:WHeezy60
jqueroondo2512@gmail.com:Josh2512
jwright7734@gmail.com:mrshow024
18kevon@gmail.com:kevon726
yeattssp@gmail.com:fuma2002
matt.denning94@gmail.com:rusty300
justinyoung0108@gmail.com:Comadog1
petermaris1@gmail.com:pmar6033
rahalldorson@gmail.com:Marley05
jrodriguez2306@gmail.com:asdf0987
tomaldrich85@gmail.com:monster1
yjbarajas1985@gmail.com:joniel2007
thpackman@gmail.com:Powell22
judecomninos@gmail.com:jude1972
orangegrl22@gmail.com:lowla2212
peogabriel@gmail.com:shadow335
prestonrobertlee@gmail.com:77Cool99
davidkull14@gmail.com:Upton772
ben.rhodes25@gmail.com:baseball25
tjcjrogers@gmail.com:Belmont1
manuel.flrsvz@gmail.com:sniper24
bhsissel@gmail.com:Hawkeye17
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ FortyNorth Security has created a Windows client (thanks to the massive help of Matt Grandy with the stability fixes).
> All you need to do is build it locally (or check the releases), and then provide a path to a file containing the URLs you want scanned! EyeWitness will generate the report within your "AppData\Roaming" directory.
instagram.com/undercodeTesting
π¦ πβπππΈπππππΈπππβ & βπβ :
1) Navigate into the CS directory
2) Load EyeWitness.sln into Visual Studio
3) Go to Build at the top and then Build Solution if no modifications are wanted
π¦ Usage:
> git clone https://github.com/FortyNorthSecurity/EyeWitness.git
EyeWitness.exe --help
EyeWitness.exe -f C:\Path\to\urls.txt
EyeWitness.exe -f C:\Path\to\urls.txt -d [timeout in seconds] -c
> Linux
Supported Linux Distros:
Kali Linux
Debian 7+ (at least stable, looking into testing) (Thanks to
π¦ Usage:
./EyeWitness.py -f filename --timeout optionaltimeout
Examples:
./EyeWitness -f urls.txt --web
./EyeWitness -x urls.xml --timeout 8
./EyeWitness.py -f urls.txt --web --proxy-ip 127.0.0.1 --proxy-port 8080 --proxy-type socks5 --timeout 120
Proxy Usage
The best guide for proxying EyeWitness through a socks proxy was made
π¦Docker
Now you can execute EyeWitness in a docker container and prevent you from install unnecessary dependencies in your host machine.
Note: execute docker run with the folder path in the host which hold your results (/path/to/results)
Note2: in case you want to scan urls from a file, make sure you put it in the volume folder (if you put urls.txt in /path/to/results, then the argument should be -f /tmp/EyeWitness/urls.txt)
π¦Usage
docker build --build-arg user=$USER --tag eyewitness --file ./Python/Dockerfile .
docker run \
--rm \
-it \
-e DISPLAY=$DISPLAY \ # optional flag in order to use vnc protocol
-v /tmp/.X11-unix:/tmp/.X11-unix \ # optional flag in order to use vnc protocol
-v /path/to/results:/tmp/EyeWitness \
eyewitness \
EyeWitness_flags_and_input
Example #1 - headless capturing
docker run \
--rm \
-it \
-v ~/EyeWitness:/tmp/EyeWitness \
eyewitness \
--web \
--single http://www.google.com
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ FortyNorth Security has created a Windows client (thanks to the massive help of Matt Grandy with the stability fixes).
> All you need to do is build it locally (or check the releases), and then provide a path to a file containing the URLs you want scanned! EyeWitness will generate the report within your "AppData\Roaming" directory.
instagram.com/undercodeTesting
π¦ πβπππΈπππππΈπππβ & βπβ :
1) Navigate into the CS directory
2) Load EyeWitness.sln into Visual Studio
3) Go to Build at the top and then Build Solution if no modifications are wanted
π¦ Usage:
> git clone https://github.com/FortyNorthSecurity/EyeWitness.git
EyeWitness.exe --help
EyeWitness.exe -f C:\Path\to\urls.txt
EyeWitness.exe -f C:\Path\to\urls.txt -d [timeout in seconds] -c
> Linux
Supported Linux Distros:
Kali Linux
Debian 7+ (at least stable, looking into testing) (Thanks to
π¦ Usage:
./EyeWitness.py -f filename --timeout optionaltimeout
Examples:
./EyeWitness -f urls.txt --web
./EyeWitness -x urls.xml --timeout 8
./EyeWitness.py -f urls.txt --web --proxy-ip 127.0.0.1 --proxy-port 8080 --proxy-type socks5 --timeout 120
Proxy Usage
The best guide for proxying EyeWitness through a socks proxy was made
π¦Docker
Now you can execute EyeWitness in a docker container and prevent you from install unnecessary dependencies in your host machine.
Note: execute docker run with the folder path in the host which hold your results (/path/to/results)
Note2: in case you want to scan urls from a file, make sure you put it in the volume folder (if you put urls.txt in /path/to/results, then the argument should be -f /tmp/EyeWitness/urls.txt)
π¦Usage
docker build --build-arg user=$USER --tag eyewitness --file ./Python/Dockerfile .
docker run \
--rm \
-it \
-e DISPLAY=$DISPLAY \ # optional flag in order to use vnc protocol
-v /tmp/.X11-unix:/tmp/.X11-unix \ # optional flag in order to use vnc protocol
-v /path/to/results:/tmp/EyeWitness \
eyewitness \
EyeWitness_flags_and_input
Example #1 - headless capturing
docker run \
--rm \
-it \
-v ~/EyeWitness:/tmp/EyeWitness \
eyewitness \
--web \
--single http://www.google.com
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - RedSiege/EyeWitness: EyeWitness is designed to take screenshots of websites, provide some server header info, and identifyβ¦
EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible. - RedSiege/EyeWitness
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Hatch is a brute force tool that is used to brute force most websites
fb.com/undercodeTesting
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/MetaChar/Hatch
python2 main.py
Requirements
2) pip2 install selenium
3) pip2 install requests
π¦How to use :
1). Find a website with a login page
2). Inspect element to find the Selector of the username form
3). Do the same for the password field
4). The the login form
5). When Asked put in the username to brute force
6). Watch it go!
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Hatch is a brute force tool that is used to brute force most websites
fb.com/undercodeTesting
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/MetaChar/Hatch
python2 main.py
Requirements
2) pip2 install selenium
3) pip2 install requests
π¦How to use :
1). Find a website with a login page
2). Inspect element to find the Selector of the username form
3). Do the same for the password field
4). The the login form
5). When Asked put in the username to brute force
6). Watch it go!
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Disney Plus Premium Accounts new :
Dezzi_rover@hotmail.co.uk:Shearer79 | Subscription: Disney Plus Yearly - UK - Web | Expiration: 2021-03-25
================
: d152386@gmail.com:Db162386 | Subscription: Disney Plus Monthly - UK - Web | Expiration: 2020-05-11
================
: jjoyner77@gmail.com:Mysaab93 | Subscription: Disney Plus Yearly with 7 Day Free Trial | Expiration:
================
: mcbridesbills@gmail.com:Mistymcb60 | Subscription: Disney Plus Non-Recurring - US - Verizon | Expiration: 2022-11-13
================
: kellyhead@live.com.au:Jenny230490 | Subscription: Disney Plus Monthly - AUS - Web | Expiration: 2020-01-13
================
: eriknyu@hotmail.com:Vandeep9 | Subscription: Disney Plus Non-Recurring - US - Verizon | Expiration: 2022-11-16
================
: TomaszMK@bigpond.com:Zefcol2325 | Subscription: Disney Plus Monthly - AUS - Web | Expiration: 2019-12-07
================
: chevy0104@bellsouth.net:Rocket09 | Subscription: Disney Plus Monthly Pre-Sales - US - Web | Expiration: 2020-04-20
================
: jnorton78@bigpond.com:snorty30 | Subscription: Disney Plus Yearly - AUS - Web | Expiration: 2021-04-01
================
: andrewchaupc@gmail.com:Kicker94 | Subscription: Disney Plus Non-Recurring - US - Verizon | Expiration: 2022-12-30
================
: arnaud.arhancet@wanadoo.fr:Roselier77 | Subscription: Disney Plus Non-Recurring - FR - Canal Plus - Bundle | Expiration:
================
: sh022275@buckeye-express.com:Meijers2 | Subscription: Disney Plus Monthly - US - Web | Expiration: 2020-05-05
================
rahshakes@gmail.com:brooklyn84 | Subscription: Disney Plus Monthly With 7 Day FT | Expiration:
================
: kevingr78@gmail.com:Schuss12 | Subscription: Disney Plus Monthly - CH - Web | Expiration: 2020-04-12
================
: sabbiedf@hotmail.co.uk:madeira2k9 | Subscription: Disney Plus Monthly - UK - Web | Expiration: 2020-05-10
================
: lainarc@gmail.com:vocaloid38 | Subscription: Disney Plus Non-Recurring - ES - Movistar - Bundle | Expiration: 2023-03-26
================
: chaynap@hotmail.com:Hardware18 | Subscription: Disney Plus Non-Recurring - US - Verizon | Expiration: 2022-11-18
================:
mburk@optonline.net:knicks23 | Subscription: Disney Plus Monthly - US - Web | Expiration: 2020-05-16
================
: amanda.orosco.01@gmail.com:Ilovehim01 | Subscription: Disney Plus Monthly - US - Web | Expiration: 2020-05-13
================
: Anthonycastellon99@gmail.com:Airsoft99 | Subscription: Disney Plus Non-Recurring - US - Verizon | Expiration: 2022-11-12
================
: jsmikalson@mac.com:June1398 | Subscription: Disney Plus Non-Recurring - US - Verizon | Expiration: 2022-11-24
================
: nwo655@yahoo.com:Xkd6vbiq | Subscription: Disney Plus Monthly - US - Web | Expiration: 2020-04-27
================
: danielclarke7@hotmail.co.uk:Clarkey123 | Subscription: Disney Plus Monthly - UK - Web | Expiration: 2020-05-02
================
gordon89wu@gmail.com:Iamawesome89 | Subscription: Disney Plus Monthly - AUS - Web | Expiration: 2020-03-01
================
: kaylynrome@gmail.com:Kaiden08 | Subscription: Disney Plus Monthly - US - Web | Expiration: 2020-05-09
================
: kimmyc3@ymail.com:Apache2013 | Subscription: Disney Plus Yearly Pre-Sales - US - Web | Expiration: 2020-11-20
================
: angelo59778@gmail.com:Abc12333 | Subscription: Disney Plus Monthly - US - XBox | Expiration: 2020-03-02
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Disney Plus Premium Accounts new :
Dezzi_rover@hotmail.co.uk:Shearer79 | Subscription: Disney Plus Yearly - UK - Web | Expiration: 2021-03-25
================
: d152386@gmail.com:Db162386 | Subscription: Disney Plus Monthly - UK - Web | Expiration: 2020-05-11
================
: jjoyner77@gmail.com:Mysaab93 | Subscription: Disney Plus Yearly with 7 Day Free Trial | Expiration:
================
: mcbridesbills@gmail.com:Mistymcb60 | Subscription: Disney Plus Non-Recurring - US - Verizon | Expiration: 2022-11-13
================
: kellyhead@live.com.au:Jenny230490 | Subscription: Disney Plus Monthly - AUS - Web | Expiration: 2020-01-13
================
: eriknyu@hotmail.com:Vandeep9 | Subscription: Disney Plus Non-Recurring - US - Verizon | Expiration: 2022-11-16
================
: TomaszMK@bigpond.com:Zefcol2325 | Subscription: Disney Plus Monthly - AUS - Web | Expiration: 2019-12-07
================
: chevy0104@bellsouth.net:Rocket09 | Subscription: Disney Plus Monthly Pre-Sales - US - Web | Expiration: 2020-04-20
================
: jnorton78@bigpond.com:snorty30 | Subscription: Disney Plus Yearly - AUS - Web | Expiration: 2021-04-01
================
: andrewchaupc@gmail.com:Kicker94 | Subscription: Disney Plus Non-Recurring - US - Verizon | Expiration: 2022-12-30
================
: arnaud.arhancet@wanadoo.fr:Roselier77 | Subscription: Disney Plus Non-Recurring - FR - Canal Plus - Bundle | Expiration:
================
: sh022275@buckeye-express.com:Meijers2 | Subscription: Disney Plus Monthly - US - Web | Expiration: 2020-05-05
================
rahshakes@gmail.com:brooklyn84 | Subscription: Disney Plus Monthly With 7 Day FT | Expiration:
================
: kevingr78@gmail.com:Schuss12 | Subscription: Disney Plus Monthly - CH - Web | Expiration: 2020-04-12
================
: sabbiedf@hotmail.co.uk:madeira2k9 | Subscription: Disney Plus Monthly - UK - Web | Expiration: 2020-05-10
================
: lainarc@gmail.com:vocaloid38 | Subscription: Disney Plus Non-Recurring - ES - Movistar - Bundle | Expiration: 2023-03-26
================
: chaynap@hotmail.com:Hardware18 | Subscription: Disney Plus Non-Recurring - US - Verizon | Expiration: 2022-11-18
================:
mburk@optonline.net:knicks23 | Subscription: Disney Plus Monthly - US - Web | Expiration: 2020-05-16
================
: amanda.orosco.01@gmail.com:Ilovehim01 | Subscription: Disney Plus Monthly - US - Web | Expiration: 2020-05-13
================
: Anthonycastellon99@gmail.com:Airsoft99 | Subscription: Disney Plus Non-Recurring - US - Verizon | Expiration: 2022-11-12
================
: jsmikalson@mac.com:June1398 | Subscription: Disney Plus Non-Recurring - US - Verizon | Expiration: 2022-11-24
================
: nwo655@yahoo.com:Xkd6vbiq | Subscription: Disney Plus Monthly - US - Web | Expiration: 2020-04-27
================
: danielclarke7@hotmail.co.uk:Clarkey123 | Subscription: Disney Plus Monthly - UK - Web | Expiration: 2020-05-02
================
gordon89wu@gmail.com:Iamawesome89 | Subscription: Disney Plus Monthly - AUS - Web | Expiration: 2020-03-01
================
: kaylynrome@gmail.com:Kaiden08 | Subscription: Disney Plus Monthly - US - Web | Expiration: 2020-05-09
================
: kimmyc3@ymail.com:Apache2013 | Subscription: Disney Plus Yearly Pre-Sales - US - Web | Expiration: 2020-11-20
================
: angelo59778@gmail.com:Abc12333 | Subscription: Disney Plus Monthly - US - XBox | Expiration: 2020-03-02
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ x3 Bins For Amazon Shopping 30$
[BIN]
442788001889xxxx
44278800100xxxx3
44278800449xxx00
10/20
CCV: 000
IP USA
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
[BIN]
442788001889xxxx
44278800100xxxx3
44278800449xxx00
10/20
CCV: 000
IP USA
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How to change proxy settings in Browsers :
t.me/UndercodeTesting
π¦ Mozilla Firefox
1. Open Mozilla Firefox.
2. Click on Tools then click on Optionsβ¦.
3. Click on the Advance tab, then click on the Network sub-tab and finally on the Settings⦠button.
4. Tick the Manual Proxy Configuration: radio button.
5. In the HTTP Proxy: box, type the IP address of the proxy server.
6. In the Port: box, type the in the port number that is used by the proxy server.
7. Click OK to close the Connection Settings window.
8. Click OK to close the Options window.
9. DONE
π¦ Internet Explorer
1. On the Tools menu in Internet Explorer, click Internet Options, click the Connections tab, and then click LAN Settings.
2. Under Proxy server, click to select the Use a proxy server for your LAN check box.
3. In the Address box, type the IP address of the proxy server.
4. In the Port box, type the port number that is used by the proxy server for client connections (by default, 8080).
5. You can click to select the Bypass proxy server for local addresses check box if you do not want the proxy server computer to be used when you connect to a computer on the local network (this may speed up performance).
6. Click OK to close the LAN Settings dialog box.
7. Click OK again to close the Internet Options dialog box.
π¦ proxy settings In Google Chrome.
* To change proxy settings: Click βCustomize and control Google Chromeβ icon right under the βwindow closeβ button.
* A popup menu will be dipslayed. Click βOptionsβ.
* Select the βUnder the Hoodβ tab.
* Scroll down and Click βchange proxy settingsβ button.
* A popup dialog will be display. Select the Connections tab on this dialg.
* If you are using LAN, click βLAN Settingsβ button. If you are using Dial-up or Virtual Private Network connection, select necessary connection and click βSettingsβ button.
* Make sure the βautomatically detect proxy settingsβ and βuse a proxy automatic configuration scriptβ options are not checked.
* In the βProxy Serverβ area, click the check box next to Use a proxy server for this connection.
* If nessesary, enable βbypass proxy server for local addressesβ.
* Click the βAdvancedβ button and set Proxy Server address (proxy IP), proxy server port.
* Click OK.
* Done
π¦ proxy settings in Safari.
* To change proxy settings: Open Safari
* Click Safari on top of the screen.
* Click βPreferencesβ.
* In the menu bar at the top of the window, Click βAdvancedβ.
* Click on the βChange Settingsβ button next to the Proxies label
* Click on the check box button next to Web Proxy (HTTP)
* Enter proxy server and port information
* Select βApply Nowβ to save settings.
* Done.
powered by wiki
@undercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How to change proxy settings in Browsers :
t.me/UndercodeTesting
π¦ Mozilla Firefox
1. Open Mozilla Firefox.
2. Click on Tools then click on Optionsβ¦.
3. Click on the Advance tab, then click on the Network sub-tab and finally on the Settings⦠button.
4. Tick the Manual Proxy Configuration: radio button.
5. In the HTTP Proxy: box, type the IP address of the proxy server.
6. In the Port: box, type the in the port number that is used by the proxy server.
7. Click OK to close the Connection Settings window.
8. Click OK to close the Options window.
9. DONE
π¦ Internet Explorer
1. On the Tools menu in Internet Explorer, click Internet Options, click the Connections tab, and then click LAN Settings.
2. Under Proxy server, click to select the Use a proxy server for your LAN check box.
3. In the Address box, type the IP address of the proxy server.
4. In the Port box, type the port number that is used by the proxy server for client connections (by default, 8080).
5. You can click to select the Bypass proxy server for local addresses check box if you do not want the proxy server computer to be used when you connect to a computer on the local network (this may speed up performance).
6. Click OK to close the LAN Settings dialog box.
7. Click OK again to close the Internet Options dialog box.
π¦ proxy settings In Google Chrome.
* To change proxy settings: Click βCustomize and control Google Chromeβ icon right under the βwindow closeβ button.
* A popup menu will be dipslayed. Click βOptionsβ.
* Select the βUnder the Hoodβ tab.
* Scroll down and Click βchange proxy settingsβ button.
* A popup dialog will be display. Select the Connections tab on this dialg.
* If you are using LAN, click βLAN Settingsβ button. If you are using Dial-up or Virtual Private Network connection, select necessary connection and click βSettingsβ button.
* Make sure the βautomatically detect proxy settingsβ and βuse a proxy automatic configuration scriptβ options are not checked.
* In the βProxy Serverβ area, click the check box next to Use a proxy server for this connection.
* If nessesary, enable βbypass proxy server for local addressesβ.
* Click the βAdvancedβ button and set Proxy Server address (proxy IP), proxy server port.
* Click OK.
* Done
π¦ proxy settings in Safari.
* To change proxy settings: Open Safari
* Click Safari on top of the screen.
* Click βPreferencesβ.
* In the menu bar at the top of the window, Click βAdvancedβ.
* Click on the βChange Settingsβ button next to the Proxies label
* Click on the check box button next to Web Proxy (HTTP)
* Enter proxy server and port information
* Select βApply Nowβ to save settings.
* Done.
powered by wiki
@undercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ CVS Server Quick GuideCVS server Quick Guide by Undercode
t.me/undercodeTesting
π¦ 1) introduction
CVS is the Concurrent Version System (Concurrent Versions System) is an abbreviation for version management. If you have ever participated in a project developed by many people, you must have such a painful experience: because multiple people modify the same file at the same time, the program that you worked hard to modify was completely deleted by others. In addition, if your software / program has been released in three versions, and the user requires you to modify the second version at this time, you may cry because you only keep the latest version. Another thing is that you have made some changes to the program, but the changes are very few. You only want to send a difference file between the two versions to colleagues in the distance, so that you can avoid problems such as the mailbox is not large enough, and the network speed is too slow. . In order to solve problems like this, as well as generating patch files, historical revisions, etc., a group of hackers (commendations) developed CVS on the basis of SCCS and RCS, which were very mature in the original Unix system. (SCCS: Source Code Control System, RCS: Revision Control System).
2) The basic working idea of ββCVS is this: build a warehouse on a server, and the source code of many different projects can be stored in the warehouse. These source programs are managed by the warehouse administrator. In this way, it seems as if only one person is modifying the file. Avoid conflicts. Before using the warehouse, each user must first download the project files in the warehouse to the local. Any changes made by the user are first made locally, and then submitted with the cvs command, which is uniformly modified by the cvs warehouse administrator. In this way, you can track file changes, conflict control, and so on.
3) Since CVS is a typical C / S structured software, it is also divided into two parts, server and client. However, most CVS software combines them into one. Here we discuss the use of cvs from the perspective of the server and the client.
π¦ Cvs server installation :
> First make sure that the system has cvs installed:
[root @ mail xinetd.d] # rpm -qa | grep cvs
cvs-1.11.1p1-3
If the command output is similar to the above output, it means that the system has installed cvs, otherwise you need to install the cvs rpm package from the installation CD .
1. Create a CVS owner user:
# useradd -d / cvsroot cvs
# chmod 771 / cv sroot
2. Establish a CVS warehouse (initialize cvs)
# su cvs
$ cvs -d / cvsroot init
$ exit
#
4. Start the cvs server
in / etc Create a file cvspserver in the /xinetd.d/ directory, the content is as follows:
# default: on
# description: The cvs server sessions;
service cvspserver
{
socket_type = stream
wait = no
user = root
server = / usr / bin / cvs
server_args = -f --allow-root = / cvsroot pserver
log_on_failure + = USERID
only_from = 192.168.0.0/24
}
Among them only_from is used to restrict access, you can not according to the actual situation or modify.
Modify the file permissions:
# chmod 644 cvspserver
and restart xinetd:
# /etc/rc.d/init.d/xined restart
Then check whether the cvs server is already running:
[root @ mail xinetd.d] # netstat -lnp | grep 2401
tcp 0 0 0.0.0.0:2401 0.0.0.0:* LISTEN 7866 / xinetd
indicates that the cvs server is already running.
Fifth, create a user to access cvs The cvs user
created earlier is a cvs warehouse management user, and in order to allow users to access, you also need an access user:
# useradd cvspub
# usemod -G cvs cvspub
Here, a user cvspub is added, and the The user is added to the cvs group.
Six, manage cvs server
π¦ CVS Server Quick GuideCVS server Quick Guide by Undercode
t.me/undercodeTesting
π¦ 1) introduction
CVS is the Concurrent Version System (Concurrent Versions System) is an abbreviation for version management. If you have ever participated in a project developed by many people, you must have such a painful experience: because multiple people modify the same file at the same time, the program that you worked hard to modify was completely deleted by others. In addition, if your software / program has been released in three versions, and the user requires you to modify the second version at this time, you may cry because you only keep the latest version. Another thing is that you have made some changes to the program, but the changes are very few. You only want to send a difference file between the two versions to colleagues in the distance, so that you can avoid problems such as the mailbox is not large enough, and the network speed is too slow. . In order to solve problems like this, as well as generating patch files, historical revisions, etc., a group of hackers (commendations) developed CVS on the basis of SCCS and RCS, which were very mature in the original Unix system. (SCCS: Source Code Control System, RCS: Revision Control System).
2) The basic working idea of ββCVS is this: build a warehouse on a server, and the source code of many different projects can be stored in the warehouse. These source programs are managed by the warehouse administrator. In this way, it seems as if only one person is modifying the file. Avoid conflicts. Before using the warehouse, each user must first download the project files in the warehouse to the local. Any changes made by the user are first made locally, and then submitted with the cvs command, which is uniformly modified by the cvs warehouse administrator. In this way, you can track file changes, conflict control, and so on.
3) Since CVS is a typical C / S structured software, it is also divided into two parts, server and client. However, most CVS software combines them into one. Here we discuss the use of cvs from the perspective of the server and the client.
π¦ Cvs server installation :
> First make sure that the system has cvs installed:
[root @ mail xinetd.d] # rpm -qa | grep cvs
cvs-1.11.1p1-3
If the command output is similar to the above output, it means that the system has installed cvs, otherwise you need to install the cvs rpm package from the installation CD .
1. Create a CVS owner user:
# useradd -d / cvsroot cvs
# chmod 771 / cv sroot
2. Establish a CVS warehouse (initialize cvs)
# su cvs
$ cvs -d / cvsroot init
$ exit
#
4. Start the cvs server
in / etc Create a file cvspserver in the /xinetd.d/ directory, the content is as follows:
# default: on
# description: The cvs server sessions;
service cvspserver
{
socket_type = stream
wait = no
user = root
server = / usr / bin / cvs
server_args = -f --allow-root = / cvsroot pserver
log_on_failure + = USERID
only_from = 192.168.0.0/24
}
Among them only_from is used to restrict access, you can not according to the actual situation or modify.
Modify the file permissions:
# chmod 644 cvspserver
and restart xinetd:
# /etc/rc.d/init.d/xined restart
Then check whether the cvs server is already running:
[root @ mail xinetd.d] # netstat -lnp | grep 2401
tcp 0 0 0.0.0.0:2401 0.0.0.0:* LISTEN 7866 / xinetd
indicates that the cvs server is already running.
Fifth, create a user to access cvs The cvs user
created earlier is a cvs warehouse management user, and in order to allow users to access, you also need an access user:
# useradd cvspub
# usemod -G cvs cvspub
Here, a user cvspub is added, and the The user is added to the cvs group.
Six, manage cvs server
Manage cvs server. The server is ready for use. Now everyone is most concerned about how to manage the server. For example, I want some people to have the authority to read and / or write the CVS repository, but what if I do nβt want to give it system authority? It is not difficult, after the initialization of cvs, there is a CVSROOT directory in the main directory of the administrator user (here is the cvs user), and there are three configuration files in this directory: passwd, readers, writers. We can configure the CVS server by setting these three files. The functions of these files are described below:
passwd: the user list file of the cvs user. Its format is much like the shadow file:
{cvs user name}: [encrypted password ]: [Equivalent system user name]
If you want a user to be only a cvs user, not a system user, then you need to set this file. This file may not exist immediately after installation, you need to be a cvs administrator (su cvs) Created by the user manually, of course, according to the above format; the
second field is the user βs encrypted password, which is encrypted with crypt (3), you can write a program to do the encryption yourself, or you can use two lazy methods : Create a system user with the same name as the cvs user. The password is the password of the cvs user to be prepared for it. After the creation, copy the second field of the user from / etc / shadow, and then delete the user. This method is more convenient for a small number of users. It is not suitable if there are more people, and there are hidden security risks of conflict conditions (race condition), and root permissions are not very good, but it is a matter of rights and interests; another method Is to use apche's htpasswd command to create a passwd user, add users only need htpasswd passwd username to add users to the passwd file, but need to add a "": "" colon at the end of the corresponding line in the file and the corresponding equivalent system user The best thing is to write a program to generate this passwd file.
The third field is the equivalent system user name. In fact, it is the right to give a cvs user an equivalent system user. See the following example to understand its function.
readers: A user list file with cvs read permission is a one-dimensional list. The users in this file
only have read access to cvs .
writers: A list file of users with cvs write permissions, like readers, is a one-dimensional list. The users in this file have write permission for cvs.
The above three files may not exist during the default installation, we need to create our own, well, now let us use an example to teach it. Suppose we have the following users who need to use cvs:
cvsuser1, cvsuser2, henry, betty, anonymous
where laser and gumpwu are system users, and henry, betty, anonymous we do not want to give system user permissions, and betty and anonymous are both read-only Users, and anonymous even has no password.
Then edit cvs administrator home directory CVSROOT / passwd file, you add the following lines:
Laser: $ xxefajfka; faffa33: cvspub
gumpwu: $ ajfaal; 323r0ofeeanv: cvspub
henry: $ fajkdpaieje: cvspub
Betty: fjkal; ffjieinfn /: cvspub
Anonymous: : cvspub
Note: The second field above (the delimiter is :) is the cipher text password, you have to use the program or use my local method to generate.
Edit readers file, add the following lines:
Anonymous
Betty
editor writer file, add the following lines:
Laser
gumpwu
henry
so ok, then you are landing a few test users, you will find everything is ok. I don't want to say more about the principles and explanations here. In fact, it is very simple, and the concept of system management users is the same.
Seven, the establishment of a new CVS project
passwd: the user list file of the cvs user. Its format is much like the shadow file:
{cvs user name}: [encrypted password ]: [Equivalent system user name]
If you want a user to be only a cvs user, not a system user, then you need to set this file. This file may not exist immediately after installation, you need to be a cvs administrator (su cvs) Created by the user manually, of course, according to the above format; the
second field is the user βs encrypted password, which is encrypted with crypt (3), you can write a program to do the encryption yourself, or you can use two lazy methods : Create a system user with the same name as the cvs user. The password is the password of the cvs user to be prepared for it. After the creation, copy the second field of the user from / etc / shadow, and then delete the user. This method is more convenient for a small number of users. It is not suitable if there are more people, and there are hidden security risks of conflict conditions (race condition), and root permissions are not very good, but it is a matter of rights and interests; another method Is to use apche's htpasswd command to create a passwd user, add users only need htpasswd passwd username to add users to the passwd file, but need to add a "": "" colon at the end of the corresponding line in the file and the corresponding equivalent system user The best thing is to write a program to generate this passwd file.
The third field is the equivalent system user name. In fact, it is the right to give a cvs user an equivalent system user. See the following example to understand its function.
readers: A user list file with cvs read permission is a one-dimensional list. The users in this file
only have read access to cvs .
writers: A list file of users with cvs write permissions, like readers, is a one-dimensional list. The users in this file have write permission for cvs.
The above three files may not exist during the default installation, we need to create our own, well, now let us use an example to teach it. Suppose we have the following users who need to use cvs:
cvsuser1, cvsuser2, henry, betty, anonymous
where laser and gumpwu are system users, and henry, betty, anonymous we do not want to give system user permissions, and betty and anonymous are both read-only Users, and anonymous even has no password.
Then edit cvs administrator home directory CVSROOT / passwd file, you add the following lines:
Laser: $ xxefajfka; faffa33: cvspub
gumpwu: $ ajfaal; 323r0ofeeanv: cvspub
henry: $ fajkdpaieje: cvspub
Betty: fjkal; ffjieinfn /: cvspub
Anonymous: : cvspub
Note: The second field above (the delimiter is :) is the cipher text password, you have to use the program or use my local method to generate.
Edit readers file, add the following lines:
Anonymous
Betty
editor writer file, add the following lines:
Laser
gumpwu
henry
so ok, then you are landing a few test users, you will find everything is ok. I don't want to say more about the principles and explanations here. In fact, it is very simple, and the concept of system management users is the same.
Seven, the establishment of a new CVS project
π¦ Generally we already have one or more projects, so that we can use the following steps to generate a new CVS project.
Putting a project file in CVs for version control is called import in CVS terminology. As you can see from the name, you need to make some preparations before importing.
The basic requirement for input operations is to have a "clean" directory structure. "" Clean "" means that files that do not require version control are removed (such as files generated by compilation, backup files, etc.). This is important if the project has been started for a while. There may be some files in the directory that you don't plan to put under version control, but you want to put them here. In this case, you need to remove them before entering and then move them back.
Note that CVS believes that empty directories do not exist. If you want to add a directory that contains neither files nor subdirectories, you need to create a dummy file under it. It is recommended that you create a file named README.txt, which contains a brief description of the directory.
Enter the directory of the existing project, for example, cvstest:
$ cd cvstest
Run command to import the project file into the cvs warehouse:
$ cvs import -m "" this is a cvstest project "" cvstest v_0_0_1 start
Description: import is one of the commands of cvs, which means to input the project file to the cvs warehouse.
The string after the -m parameter is the description text, which describes the project. If the -m parameter is not added, cvs will automatically run an editor (usually vi, but you can change it to your favorite by modifying the environment variable EDITOR Editor) allows you to enter information, cvstest is the project name (actually the name of the warehouse, it will be stored in the warehouse named after this name on the CVS server)
v_0_0_1 is the total mark of this branch. Useless (or not commonly used)
start is a mark that identifies the input level of the file each time it is imported, and is useless.
In this way, we have established a CVS warehouse, and then, we can delete the files of this test project, and experiment how to obtain files from the warehouse.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Putting a project file in CVs for version control is called import in CVS terminology. As you can see from the name, you need to make some preparations before importing.
The basic requirement for input operations is to have a "clean" directory structure. "" Clean "" means that files that do not require version control are removed (such as files generated by compilation, backup files, etc.). This is important if the project has been started for a while. There may be some files in the directory that you don't plan to put under version control, but you want to put them here. In this case, you need to remove them before entering and then move them back.
Note that CVS believes that empty directories do not exist. If you want to add a directory that contains neither files nor subdirectories, you need to create a dummy file under it. It is recommended that you create a file named README.txt, which contains a brief description of the directory.
Enter the directory of the existing project, for example, cvstest:
$ cd cvstest
Run command to import the project file into the cvs warehouse:
$ cvs import -m "" this is a cvstest project "" cvstest v_0_0_1 start
Description: import is one of the commands of cvs, which means to input the project file to the cvs warehouse.
The string after the -m parameter is the description text, which describes the project. If the -m parameter is not added, cvs will automatically run an editor (usually vi, but you can change it to your favorite by modifying the environment variable EDITOR Editor) allows you to enter information, cvstest is the project name (actually the name of the warehouse, it will be stored in the warehouse named after this name on the CVS server)
v_0_0_1 is the total mark of this branch. Useless (or not commonly used)
start is a mark that identifies the input level of the file each time it is imported, and is useless.
In this way, we have established a CVS warehouse, and then, we can delete the files of this test project, and experiment how to obtain files from the warehouse.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 updated The Browser Exploitation Framework Project https://beefproject.com
fb.com/undercodeTesting
π¦ πβπππΈπππππΈπππβ & βπβ :
1) In order to install BeEF and RVM you will need to install Git and Curl first, as they do not come out of the box with Ubuntu.
$ sudo apt-get install git
$ sudo apt-get install curl
2) To install RVM, firstly go to https://rvm.io/rvm/install and install the GPG keys. Then install RVM, without dependencies:
$ \curl -sSL https://get.rvm.io | bash -s -- --autolibs=install-packages
Now install those dependencies as root while in the applications users $HOME directory:
$ sudo .rvm/bin/rvm requirements
3) Now that the dependencies are installed we need to install the stable releases of both RVM and Ruby. As the application user enter:
$ \curl -sSL https://get.rvm.io | bash -s stable --ruby
4) BeEF requires Ruby 2.5.x. Before navigating to the beef directory run:
$ rvm install "ruby-2.5.3"
5) Then simply reload your shell!
You can verify your installation of RVM and Ruby by running:
$ rvm -v
$ ruby -v
5) Once a suitable version of Ruby is installed, run the install script in the BeEF directory:
$ ./install
This script installs the required operating system packages and all the prerequisite Ruby gems.
6) Upon successful installation, be sure to read the Configuration page on the wiki for important details on configuring and securing BeEF.
7) Start BeEF
To start BeEF, first change the username and password config.yaml and then simply run:
$ ./beef
π¦Testing
If you want to install the test pre-requisites just run:
$ bundle install --with test
This will install the pre-requisite gem's for tests.
If you want to run the test suit run:
$ bundle exec rake
π¦ tested by undercode on
> ubuntu last version
@UnderodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 updated The Browser Exploitation Framework Project https://beefproject.com
fb.com/undercodeTesting
π¦ πβπππΈπππππΈπππβ & βπβ :
1) In order to install BeEF and RVM you will need to install Git and Curl first, as they do not come out of the box with Ubuntu.
$ sudo apt-get install git
$ sudo apt-get install curl
2) To install RVM, firstly go to https://rvm.io/rvm/install and install the GPG keys. Then install RVM, without dependencies:
$ \curl -sSL https://get.rvm.io | bash -s -- --autolibs=install-packages
Now install those dependencies as root while in the applications users $HOME directory:
$ sudo .rvm/bin/rvm requirements
3) Now that the dependencies are installed we need to install the stable releases of both RVM and Ruby. As the application user enter:
$ \curl -sSL https://get.rvm.io | bash -s stable --ruby
4) BeEF requires Ruby 2.5.x. Before navigating to the beef directory run:
$ rvm install "ruby-2.5.3"
5) Then simply reload your shell!
You can verify your installation of RVM and Ruby by running:
$ rvm -v
$ ruby -v
5) Once a suitable version of Ruby is installed, run the install script in the BeEF directory:
$ ./install
This script installs the required operating system packages and all the prerequisite Ruby gems.
6) Upon successful installation, be sure to read the Configuration page on the wiki for important details on configuring and securing BeEF.
7) Start BeEF
To start BeEF, first change the username and password config.yaml and then simply run:
$ ./beef
π¦Testing
If you want to install the test pre-requisites just run:
$ bundle install --with test
This will install the pre-requisite gem's for tests.
If you want to run the test suit run:
$ bundle exec rake
π¦ tested by undercode on
> ubuntu last version
@UnderodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Beefproject
BeEF - The Browser Exploitation Framework Project
BeEF is a security tool, allowing a penetration tester or system administrator additional attack vectors when assessing the posture of a target
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Netdiscover is a network address discovering
tool, developed mainly for those wireless networks without dhcp server, it
also works on hub/switched networks. Its based on arp packets, it will send arp
requests and sniff for replys.
instagram.com/undercodeTesting
π¦REQUIREMENTS :
Requeriments
============
- libpcap
- libnet > 1.1.2
- Tested to work on Linux, Solaris MacOS X and OpenBSD, other unixes may work
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/alexxy/netdiscover
2) cd netdiscover
3) $ sh update-oui-database.sh (optional)
4) $ cmake .
5) $ make
6) # make install
π¦ HOW TO USE :
> ./netdiscover [-i device] [-r range | -p] [-s time] [-n node] [-c count] [-f] [-S]
-i device
The network device to sniff at and inject packets. If no device was
specified, first available will be used.
-r range
Scan a given range instead of auto scan. Valid range values are:
192.168.0.0/24, 192.168.0.0/16 or 192.168.0.0/8
-p
Enable passive mode do not send anything, only sniff
-s time
It will sleep given time in milliseconds between each arp request
injection. (default 1)
-c count
Number of times to send each arp reques. Usefull for networks with
packet loss, so it will scan given times for each host.
-n node
Last ip octet used for scanning as source host, you can change it
if the default host is already used (from 2 to 253) (default 66)
-S
Enable sleep time supression betwen each request. I will sleep each 255
scanned hosts instead of do it by each one, this mode was used on 0.3 beta4
and older releases. Avoid this option on networks with packet lossing,
or in wireless networks with low signal level. (also called hardcore mode)
-f
Enable fastmode scan, it will only scan for hosts .1, .100, .254 on each
network, usefull when searching for addresses being used, after find one
you can make a specific range scan to see online boxes.
Scanned hosts can be easily modified at fast_ips[] array on main.c source.
If -p or -r options are not used, netdiscover will automatically scan for common
lan addresses. Those address lists can be modified at common_net[] on main.c
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Netdiscover is a network address discovering
tool, developed mainly for those wireless networks without dhcp server, it
also works on hub/switched networks. Its based on arp packets, it will send arp
requests and sniff for replys.
instagram.com/undercodeTesting
π¦REQUIREMENTS :
Requeriments
============
- libpcap
- libnet > 1.1.2
- Tested to work on Linux, Solaris MacOS X and OpenBSD, other unixes may work
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/alexxy/netdiscover
2) cd netdiscover
3) $ sh update-oui-database.sh (optional)
4) $ cmake .
5) $ make
6) # make install
π¦ HOW TO USE :
> ./netdiscover [-i device] [-r range | -p] [-s time] [-n node] [-c count] [-f] [-S]
-i device
The network device to sniff at and inject packets. If no device was
specified, first available will be used.
-r range
Scan a given range instead of auto scan. Valid range values are:
192.168.0.0/24, 192.168.0.0/16 or 192.168.0.0/8
-p
Enable passive mode do not send anything, only sniff
-s time
It will sleep given time in milliseconds between each arp request
injection. (default 1)
-c count
Number of times to send each arp reques. Usefull for networks with
packet loss, so it will scan given times for each host.
-n node
Last ip octet used for scanning as source host, you can change it
if the default host is already used (from 2 to 253) (default 66)
-S
Enable sleep time supression betwen each request. I will sleep each 255
scanned hosts instead of do it by each one, this mode was used on 0.3 beta4
and older releases. Avoid this option on networks with packet lossing,
or in wireless networks with low signal level. (also called hardcore mode)
-f
Enable fastmode scan, it will only scan for hosts .1, .100, .254 on each
network, usefull when searching for addresses being used, after find one
you can make a specific range scan to see online boxes.
Scanned hosts can be easily modified at fast_ips[] array on main.c source.
If -p or -r options are not used, netdiscover will automatically scan for common
lan addresses. Those address lists can be modified at common_net[] on main.c
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - alexxy/netdiscover: netdiscover
netdiscover. Contribute to alexxy/netdiscover development by creating an account on GitHub.