Forwarded from UNDERCODE SECURITY
MALWARE & DRIVES MALWARE GUIDES BY UNDERCODE
Forwarded from UNDERCODE SECURITY
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦HACK WIFI VIA LINUX GOOD 2020 SCRIPT :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£sudo apt-get update && apt-get install git
2οΈβ£sudo git clone https://github.com/ankit0183/Wifi-Hacking
3οΈβ£cd Wifi-Hacking/
4οΈβ£sudo python3 Wifi-Hacking.py
π¦FEATURES :
1)Start monitor mode
2)Stop monitor mode
3)Scan Networks
4)Getting Handshake
5)Create wordlist
6)Install Wireless tools
7)WPS Networks attacks
8)Scan for WPS Networks
9)Crack Handshake with rockyou.txt
10)Crack Handshake with wordlist
11)Crack Handshake without wordlist
β git sources 2020
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦HACK WIFI VIA LINUX GOOD 2020 SCRIPT :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£sudo apt-get update && apt-get install git
2οΈβ£sudo git clone https://github.com/ankit0183/Wifi-Hacking
3οΈβ£cd Wifi-Hacking/
4οΈβ£sudo python3 Wifi-Hacking.py
π¦FEATURES :
1)Start monitor mode
2)Stop monitor mode
3)Scan Networks
4)Getting Handshake
5)Create wordlist
6)Install Wireless tools
7)WPS Networks attacks
8)Scan for WPS Networks
9)Crack Handshake with rockyou.txt
10)Crack Handshake with wordlist
11)Crack Handshake without wordlist
β git sources 2020
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - ankit0183/Wifi-Hacking: Cyber Security Tool For Hacking Wireless Connections Using Built-In Kali Tools. Supports All Securitiesβ¦
Cyber Security Tool For Hacking Wireless Connections Using Built-In Kali Tools. Supports All Securities (WEP, WPS, WPA, WPA2/TKIP/IES) - ankit0183/Wifi-Hacking
Forwarded from UNDERCODE SECURITY
π¦ GUYS JOIN OUR FACEBOOK GROUPS :
- fb.com/groups/UndercodeTesting (private- no adds )
- fb.com/groups/UndercodeCommunity ( ADDS ALLOWED- YOUTUBE- GOOD LINK- - SELLING NOT ALLOWED E N J O Y )
- fb.com/groups/UndercodeTesting (private- no adds )
- fb.com/groups/UndercodeCommunity ( ADDS ALLOWED- YOUTUBE- GOOD LINK- - SELLING NOT ALLOWED E N J O Y )
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦How to get NordVPN for free- from NORDVPN.COM OFFICIAL
There are two ways to access some form of NordVPN for free or at a too-good-to-be-true discount, and both are a bad deal:
1οΈβ£#NordVPN crack
If youβre here, chances are youβve been looking for a NordVPN crack. Well, before you go ahead and download it, check out what our security analysts found inside some of these βcrackedβ copies of NordVPN:
1) Root access viruses/malware: Reputable websites donβt host stolen, cracked copies of NordVPN or other software if they can help it. Instead, youβll be downloading a file from some anonymous mirror or server, or from a link someone gave you on a forum. This is the perfect way to deliver a virus.
Once youβre downloading a file from random online sources, thereβs very little thatβll help you (click here to learn about different hacking methods). Even antivirus software canβt identify 100% of viruses (especially if the hacker wrote their own unique virus). If antiviruses recognize the threat, you may be reassured by the file hoster: βItβs just a false positive because of how the crack works, donβt worry, itβs not a virus.β Sure. You know what they say β thereβs a sucker born every minute! Malware can be very damaging to your system β click here to find out about the different types.
2) Adware: If youβre lucky, youβll download some adware instead of a virus. Instead of stealing your identity, theyβll simply fill your computer with ads. Some adware injects ads into your browser and every site you visit, while other adware programs can inject ads into your entire device. Imagine getting annoying pop-ups on your desktop! These types of programs also usually slow down your computer.
3) Random software: This find was actually a puzzling one for our security analysts. They found some cracked NordVPN downloads that sent them clean versions of other programs when they were downloaded. One NordVPN crack download actually sent them Adobe Flash Player
2οΈβ£Stolen NordVPN accounts for sale
Thatβs what youβre buying β but whatβs the problem?
1) You donβt know how long the account will work. You arenβt forming a new subscription, youβre simply intruding upon someone elseβs already-active subscription. If you paid the hacker for a 3-year subscription and find that there are only 2 years and 3 months left, tough luck β the hacker already has your money. Go ahead and ask for a refund. Weβll wait.
2) You can lose the account at any time. When you pay for the account, all you get are its current username and password. Most vendors will warn you that you shouldnβt change these. Thatβs because if you do, youβll also make it impossible for the actual owner to connect. They will then be able to restore access to their account by contacting customer support, changing their password and rendering your purchase useless. You are completely at their mercy. The account is yours to use only as long as the real owner doesnβt change the password.
3) You wonβt be able to use as many devices on it. Each NordVPN account supports up to six devices, but things can get crowded when thereβs more than one user on an account.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦How to get NordVPN for free- from NORDVPN.COM OFFICIAL
There are two ways to access some form of NordVPN for free or at a too-good-to-be-true discount, and both are a bad deal:
1οΈβ£#NordVPN crack
If youβre here, chances are youβve been looking for a NordVPN crack. Well, before you go ahead and download it, check out what our security analysts found inside some of these βcrackedβ copies of NordVPN:
1) Root access viruses/malware: Reputable websites donβt host stolen, cracked copies of NordVPN or other software if they can help it. Instead, youβll be downloading a file from some anonymous mirror or server, or from a link someone gave you on a forum. This is the perfect way to deliver a virus.
Once youβre downloading a file from random online sources, thereβs very little thatβll help you (click here to learn about different hacking methods). Even antivirus software canβt identify 100% of viruses (especially if the hacker wrote their own unique virus). If antiviruses recognize the threat, you may be reassured by the file hoster: βItβs just a false positive because of how the crack works, donβt worry, itβs not a virus.β Sure. You know what they say β thereβs a sucker born every minute! Malware can be very damaging to your system β click here to find out about the different types.
2) Adware: If youβre lucky, youβll download some adware instead of a virus. Instead of stealing your identity, theyβll simply fill your computer with ads. Some adware injects ads into your browser and every site you visit, while other adware programs can inject ads into your entire device. Imagine getting annoying pop-ups on your desktop! These types of programs also usually slow down your computer.
3) Random software: This find was actually a puzzling one for our security analysts. They found some cracked NordVPN downloads that sent them clean versions of other programs when they were downloaded. One NordVPN crack download actually sent them Adobe Flash Player
2οΈβ£Stolen NordVPN accounts for sale
Thatβs what youβre buying β but whatβs the problem?
1) You donβt know how long the account will work. You arenβt forming a new subscription, youβre simply intruding upon someone elseβs already-active subscription. If you paid the hacker for a 3-year subscription and find that there are only 2 years and 3 months left, tough luck β the hacker already has your money. Go ahead and ask for a refund. Weβll wait.
2) You can lose the account at any time. When you pay for the account, all you get are its current username and password. Most vendors will warn you that you shouldnβt change these. Thatβs because if you do, youβll also make it impossible for the actual owner to connect. They will then be able to restore access to their account by contacting customer support, changing their password and rendering your purchase useless. You are completely at their mercy. The account is yours to use only as long as the real owner doesnβt change the password.
3) You wonβt be able to use as many devices on it. Each NordVPN account supports up to six devices, but things can get crowded when thereβs more than one user on an account.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE SECURITY
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦HACK GMAIL/INSTAGRAM BRUTEFORCE
> PHISHING ALSO IN ONE TOOL :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
π¦SUPPORT :
Kali Linux
Cyborg
Parrot
BackTrack
Backbox
β Git POPULAR sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦HACK GMAIL/INSTAGRAM BRUTEFORCE
> PHISHING ALSO IN ONE TOOL :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£git clone https://github.com/xHak9x/Hak9Tools.git5οΈβ£CHOOSE OPTIONS VIA NUMBERS EASY AND SIMPLE
2οΈβ£cd Hak9Tools
3οΈβ£chmod +x hak9tools.sh
4οΈβ£./hak9tools.sh
π¦SUPPORT :
Kali Linux
Cyborg
Parrot
BackTrack
Backbox
β Git POPULAR sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦from few days Multi-stage APT attack uses C2 function to reduce Cobalt Strike
#UndercodeNews
1οΈβ£Multi-stage APT attack uses C2 function to reduce Cobalt Strike
2οΈβ£On June 10, we found a malicious Word document disguised as a resume, which used template injection to delete a Net Loader. This is a part of what we think is an APT attack. In the final stage, the threat actor uses Cobalt Strike's C2 feature to download the final payload and perform C2 communication.
3οΈβ£The attack was particularly smart because of its evasion skills. As we observe, there is an intentional delay in executing the payload from the malicious Word macro. In addition, by hiding the shell code in a harmless JavaScript and loading it without touching the disk, APT can further prevent security detection.
@UndercodeNews
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦from few days Multi-stage APT attack uses C2 function to reduce Cobalt Strike
#UndercodeNews
1οΈβ£Multi-stage APT attack uses C2 function to reduce Cobalt Strike
2οΈβ£On June 10, we found a malicious Word document disguised as a resume, which used template injection to delete a Net Loader. This is a part of what we think is an APT attack. In the final stage, the threat actor uses Cobalt Strike's C2 feature to download the final payload and perform C2 communication.
3οΈβ£The attack was particularly smart because of its evasion skills. As we observe, there is an intentional delay in executing the payload from the malicious Word macro. In addition, by hiding the shell code in a harmless JavaScript and loading it without touching the disk, APT can further prevent security detection.
@UndercodeNews
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#Cloud Security 2020 Topic Resources :
* [Cloud Security Resources from AWS](https://aws.amazon.com/security/security-resources)
* [Penetration Testing in Microsoft Azure](https://docs.microsoft.com/en-us/azure/security/azure-security-pen-testing)
* [Penetration Testing in AWS](https://aws.amazon.com/security/penetration-testing)
* [Penetration Testing in Google Cloud Platform](https://cloud.google.com/security/overview)
* [Google Cloud Security Center](https://cloud.google.com/security)
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#Cloud Security 2020 Topic Resources :
* [Cloud Security Resources from AWS](https://aws.amazon.com/security/security-resources)
* [Penetration Testing in Microsoft Azure](https://docs.microsoft.com/en-us/azure/security/azure-security-pen-testing)
* [Penetration Testing in AWS](https://aws.amazon.com/security/penetration-testing)
* [Penetration Testing in Google Cloud Platform](https://cloud.google.com/security/overview)
* [Google Cloud Security Center](https://cloud.google.com/security)
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Amazon
Cloud Security Learning Resources - Amazon Web Services (AWS)
To learn more about cloud security on the AWS Cloud infrastructure, browse through our developer documents, whitepapers and tutorials here.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦General trend to share file permission management software, company internal file sharing, enterprise shared file solution
>Background of enterprise shared file management
At present, there are usually the following measures for setting access rights for shared files and managing access to shared files in enterprise LANs:
1οΈβ£File access permission control based on the local account of the Windows server operating system. The specific implementation method is: set a shared file on a Windows server operating system, the file system type is ntfs, and then configure the corresponding access rights of the local account to the shared file. When other computers on the LAN access the shared file, you need to enter the server local account to log in first Access, and then control their access to shared files.
2οΈβ£ File access permission control based on Windows domain users. Set the shared file on a server, the file system type is ntfs, and then set the corresponding permissions of the domain account to access different shared files through the domain controller. When the user accesses the shared file, enter the domain account to log in, and then control their access to the shared file .
3οΈβ£By adding a file sharing proxy server between the user computer and the file sharing server, the user computer connects to the file sharing proxy server, the file sharing proxy server connects to the file sharing server, and the file sharing proxy server implements the user computer to file Access control of files in the shared server.
Although through the above methods, you can control the access permissions of Windows server shared files. However, with the increasing number of important confidential documents and key data of enterprises, higher requirements are put on the protection of server file data. The original technical methods have been unable to meet the protection of enterprises to protect these important files and key data, especially when these files are accessed by LAN users in the form of shared files, how to protect the security of these file data has become an important aspect of enterprise network management.
Written by Undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦General trend to share file permission management software, company internal file sharing, enterprise shared file solution
>Background of enterprise shared file management
At present, there are usually the following measures for setting access rights for shared files and managing access to shared files in enterprise LANs:
1οΈβ£File access permission control based on the local account of the Windows server operating system. The specific implementation method is: set a shared file on a Windows server operating system, the file system type is ntfs, and then configure the corresponding access rights of the local account to the shared file. When other computers on the LAN access the shared file, you need to enter the server local account to log in first Access, and then control their access to shared files.
2οΈβ£ File access permission control based on Windows domain users. Set the shared file on a server, the file system type is ntfs, and then set the corresponding permissions of the domain account to access different shared files through the domain controller. When the user accesses the shared file, enter the domain account to log in, and then control their access to the shared file .
3οΈβ£By adding a file sharing proxy server between the user computer and the file sharing server, the user computer connects to the file sharing proxy server, the file sharing proxy server connects to the file sharing server, and the file sharing proxy server implements the user computer to file Access control of files in the shared server.
Although through the above methods, you can control the access permissions of Windows server shared files. However, with the increasing number of important confidential documents and key data of enterprises, higher requirements are put on the protection of server file data. The original technical methods have been unable to meet the protection of enterprises to protect these important files and key data, especially when these files are accessed by LAN users in the form of shared files, how to protect the security of these file data has become an important aspect of enterprise network management.
Written by Undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦TOPIC 2020 Free admin dashboard template based on Bootstrap 4
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£ DOWNLOAD : https://github.com/ColorlibHQ/AdminLTE/releases
2οΈβ£Command Line
> Via NPM
npm install admin-lte@^3.0 --save
> Via Yarn
yarn add admin-lte@^3.0
> Via Composer
composer require "almasaeed2010/adminlte=~3.0"
> Via Git
git clone https://github.com/ColorlibHQ/AdminLTE.gitAdminLTE can be installed using multiple methods. Pick your favorite method from the list below. Please be sure to check the dependencies section before continuing.
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦TOPIC 2020 Free admin dashboard template based on Bootstrap 4
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£ DOWNLOAD : https://github.com/ColorlibHQ/AdminLTE/releases
2οΈβ£Command Line
> Via NPM
npm install admin-lte@^3.0 --save
> Via Yarn
yarn add admin-lte@^3.0
> Via Composer
composer require "almasaeed2010/adminlte=~3.0"
> Via Git
git clone https://github.com/ColorlibHQ/AdminLTE.gitAdminLTE can be installed using multiple methods. Pick your favorite method from the list below. Please be sure to check the dependencies section before continuing.
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
Releases Β· ColorlibHQ/AdminLTE
AdminLTE - Free admin dashboard template based on Bootstrap 5 - ColorlibHQ/AdminLTE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦7 NETWORK SECURITY TIPS BY UNDERCODE
#Secure before hacked !
1. The log file inside the operating system is an important clue to detect whether there is a network intrusion. Of course, this assumes that your logfile is not damaged by the intruder. If you have a server connected directly to the Internet with a dedicated line, this means your IP The address is permanently fixed. You will find that many people make telnet/ftp login attempts to your system, try to run #more /var/log/secure | grep refused to check.
2. Limit the number of programs with the SUID permission flag. Programs with the permission flag run as root, which is a potential security hole. Of course, some programs must have the flag, like the passwd program.
3. BIOS security. Set the BIOS password and modify the boot sequence to prevent the system from booting from the floppy disk.
4. User password. User passwords are a basic starting point for Linux security. The user passwords used by many people are simple'passwords, which is equivalent to opening the door to intruders, although theoretically there are no user passwords that cannot be confirmed, as long as there are enough Time and resources are available. A good user password is a string of characters that only he can easily remember and understand, and never write it anywhere.
5. /etc/exports file. If you use the NFS network file system service, then make sure that your /etc/exports has the most restrictive access permission settings, which means do not use any wildcards, do not allow root write permissions, and mount into a read-only file system. Edit the file /etc/exports and add: for example:
γγ/dir/to/export host1.mydomain.com(ro,root_squash)
γγ/dir/to/export host2.mydomain.com(ro,root_squash)
γγ/dir/to/export is the directory you want to output, host.mydomain.com Is the machine name for logging into this directory, ro means mount as a read-only system, and root_squash prohibits root from writing to this directory.
γγIn order for the above changes to take effect, run /usr/sbin/exportfs -a
6. Make sure that the owner of /etc/inetd.conf is root and the file permissions are set to 600.
[root@deep]# chmod 600 /etc/inetd.conf
ENSURE that the owner is root.
[root@deep]# stat /etc/inetd.conf
File: "/etc/inetd.conf"
Size: 2869 Filetype: Regular File
Mode: (0600/-rw-------) Uid: (0/ root) Gid: (0/ root)
Device: 8,6 Inode: 18219 Links: 1
Access: Wed Sep 22 16:24: 16 1999(00000.00:10:44)
Modify: Mon Sep 20 10:22:44 1999(00002.06:12:16)
Change:Mon Sep 20 10:22:44 1999(00002.06:12:16)
Edit /etc/inetd.conf to prohibit the following services:
ftp, telnet, shell, login, exec, talk, ntalk, imap, pop-2, pop -3, finger, auth, etc. unless you really want to use it. Especially prohibit those r commands. If you use ssh/scp, then you can also disable telnet/ftp.
For the changes to take effect, run #killall -HUP inetd You can also run #chattr +i /etc/inetd.conf to make the file unchangeable. Only root can unlock it, use the command #chattr -i /etc/inetd.conf
7. TCP_WRAPPERS
By default, Redhat Linux allows all requests. Using TCP_WRAPPERS to enhance the security of your site is a handy effort. You can put
"ALL: ALLβ to /etc/hosts.deny to prohibit all requests, and then put those explicitly allowed requests to /etc/hosts.allow, such as:
sshd: 192.168.1.10/255.255.255.0 gate.openarch.com
to the IP address 192.168.1.10 and the host name gate.openarch.com allow connection via ssh. After the configuration is complete, use tcpdchk to check
[root@deep]# tcpdchk
tcpchk is a TCP_Wrapper configuration check tool that checks your tcp wrapper configuration and reports any potential/existing problems found.
written by Undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦7 NETWORK SECURITY TIPS BY UNDERCODE
#Secure before hacked !
1. The log file inside the operating system is an important clue to detect whether there is a network intrusion. Of course, this assumes that your logfile is not damaged by the intruder. If you have a server connected directly to the Internet with a dedicated line, this means your IP The address is permanently fixed. You will find that many people make telnet/ftp login attempts to your system, try to run #more /var/log/secure | grep refused to check.
2. Limit the number of programs with the SUID permission flag. Programs with the permission flag run as root, which is a potential security hole. Of course, some programs must have the flag, like the passwd program.
3. BIOS security. Set the BIOS password and modify the boot sequence to prevent the system from booting from the floppy disk.
4. User password. User passwords are a basic starting point for Linux security. The user passwords used by many people are simple'passwords, which is equivalent to opening the door to intruders, although theoretically there are no user passwords that cannot be confirmed, as long as there are enough Time and resources are available. A good user password is a string of characters that only he can easily remember and understand, and never write it anywhere.
5. /etc/exports file. If you use the NFS network file system service, then make sure that your /etc/exports has the most restrictive access permission settings, which means do not use any wildcards, do not allow root write permissions, and mount into a read-only file system. Edit the file /etc/exports and add: for example:
γγ/dir/to/export host1.mydomain.com(ro,root_squash)
γγ/dir/to/export host2.mydomain.com(ro,root_squash)
γγ/dir/to/export is the directory you want to output, host.mydomain.com Is the machine name for logging into this directory, ro means mount as a read-only system, and root_squash prohibits root from writing to this directory.
γγIn order for the above changes to take effect, run /usr/sbin/exportfs -a
6. Make sure that the owner of /etc/inetd.conf is root and the file permissions are set to 600.
[root@deep]# chmod 600 /etc/inetd.conf
ENSURE that the owner is root.
[root@deep]# stat /etc/inetd.conf
File: "/etc/inetd.conf"
Size: 2869 Filetype: Regular File
Mode: (0600/-rw-------) Uid: (0/ root) Gid: (0/ root)
Device: 8,6 Inode: 18219 Links: 1
Access: Wed Sep 22 16:24: 16 1999(00000.00:10:44)
Modify: Mon Sep 20 10:22:44 1999(00002.06:12:16)
Change:Mon Sep 20 10:22:44 1999(00002.06:12:16)
Edit /etc/inetd.conf to prohibit the following services:
ftp, telnet, shell, login, exec, talk, ntalk, imap, pop-2, pop -3, finger, auth, etc. unless you really want to use it. Especially prohibit those r commands. If you use ssh/scp, then you can also disable telnet/ftp.
For the changes to take effect, run #killall -HUP inetd You can also run #chattr +i /etc/inetd.conf to make the file unchangeable. Only root can unlock it, use the command #chattr -i /etc/inetd.conf
7. TCP_WRAPPERS
By default, Redhat Linux allows all requests. Using TCP_WRAPPERS to enhance the security of your site is a handy effort. You can put
"ALL: ALLβ to /etc/hosts.deny to prohibit all requests, and then put those explicitly allowed requests to /etc/hosts.allow, such as:
sshd: 192.168.1.10/255.255.255.0 gate.openarch.com
to the IP address 192.168.1.10 and the host name gate.openarch.com allow connection via ssh. After the configuration is complete, use tcpdchk to check
[root@deep]# tcpdchk
tcpchk is a TCP_Wrapper configuration check tool that checks your tcp wrapper configuration and reports any potential/existing problems found.
written by Undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 TOPIC get Facebook data, and some Facebook bots, and extra tools found on Facebook Toolkit ++.
π¦FEATURES :
Get Access Token β get access token your facebook account
Account Information β view your account information
Dump ID β retrieve all your friend's ID data
Dump Email β retrieve all your friend's Email data
Dump Name β retrieve all your friend's Name data
Dump Birthday β retrieve all your friend's Birthday data
Dump Gender β retrieve all your friend's Gender data
Dump Location β retrieve all your friend's Location data
Dump URL Profile β retrieve all your friend's url profile data
Dump Mobile Number β retrieve all your friend's mobile number data
Dump Religion β retrieve all your friend's religion data
Dump Username β retrieve all your friend's username data
Dump Bio β retrieve all your friend's bio data
Dump About β retrieve all your friend's about data
Filter Yahoo Mail β separate all Yahoo e-mails [yahoo.com]
Yahoo Mail Validation β validate all Yahoo e-mails
Clean Result β clean the result folder
Delete ALL Post β clean all your posts
Unfriend ALL β clean all your friends
Confirmation ALL β confirm all friend requests
Confirmation ALL [Male] β confirm all friend requests based on male sex
Confirmation ALL [Female] β onfirm all friend requests based on female sex
View Data β see your friends data based on your username or ID
Dump ID Member Group β retrieve all ID member on group database
Dump Username Profile Member Group β retrieve all username member on group database
Dump URL Profile Member Group β retrieve all url profile member on group database
Brute Force ID β brute force your friends by ID
Brute Force ID Member Group β brute force Member Group by ID
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
TERMUX -LINUX
1οΈβ£pkg install php
2οΈβ£pkg install curl
3οΈβ£pkg update
4οΈβ£git clone https://github.com/warifp/FacebookToolkit
5οΈβ£Enough to execute the command :
php run.php
Cek list menu tools, use the command :
php run.php -m
Cek author, use the command :
php run.php -a
Cek version, use the command :
php run.php -v
Cek update, use the command :
php run.php -u
and help, use the command :
php run.php -h
β Git 2020 sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 TOPIC get Facebook data, and some Facebook bots, and extra tools found on Facebook Toolkit ++.
π¦FEATURES :
Get Access Token β get access token your facebook account
Account Information β view your account information
Dump ID β retrieve all your friend's ID data
Dump Email β retrieve all your friend's Email data
Dump Name β retrieve all your friend's Name data
Dump Birthday β retrieve all your friend's Birthday data
Dump Gender β retrieve all your friend's Gender data
Dump Location β retrieve all your friend's Location data
Dump URL Profile β retrieve all your friend's url profile data
Dump Mobile Number β retrieve all your friend's mobile number data
Dump Religion β retrieve all your friend's religion data
Dump Username β retrieve all your friend's username data
Dump Bio β retrieve all your friend's bio data
Dump About β retrieve all your friend's about data
Filter Yahoo Mail β separate all Yahoo e-mails [yahoo.com]
Yahoo Mail Validation β validate all Yahoo e-mails
Clean Result β clean the result folder
Delete ALL Post β clean all your posts
Unfriend ALL β clean all your friends
Confirmation ALL β confirm all friend requests
Confirmation ALL [Male] β confirm all friend requests based on male sex
Confirmation ALL [Female] β onfirm all friend requests based on female sex
View Data β see your friends data based on your username or ID
Dump ID Member Group β retrieve all ID member on group database
Dump Username Profile Member Group β retrieve all username member on group database
Dump URL Profile Member Group β retrieve all url profile member on group database
Brute Force ID β brute force your friends by ID
Brute Force ID Member Group β brute force Member Group by ID
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
TERMUX -LINUX
1οΈβ£pkg install php
2οΈβ£pkg install curl
3οΈβ£pkg update
4οΈβ£git clone https://github.com/warifp/FacebookToolkit
5οΈβ£Enough to execute the command :
php run.php
Cek list menu tools, use the command :
php run.php -m
Cek author, use the command :
php run.php -a
Cek version, use the command :
php run.php -v
Cek update, use the command :
php run.php -u
and help, use the command :
php run.php -h
β Git 2020 sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - warifp/FacebookToolkit: a tool to get Facebook data, and some Facebook bots, and extra tools found on Facebook Toolkitβ¦
a tool to get Facebook data, and some Facebook bots, and extra tools found on Facebook Toolkit ++. - warifp/FacebookToolkit
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦FASTEST WAY TRACKING IP ADRESS FOR NOOBS :
-Termux Linux new release :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
apt update
apt install git -y
git clone https://github.com/rajkumardusad/IP-Tracer.git
cd IP-Tracer
chmod +x install
sh install or ./install
How to use IP-Tracer
trace -m to track your own ip address.
trace -t target-ip to track other's ip address for example ip-tracer -t 127.0.0.1
trace for more information.
OR
ip-tracer -m to track your own ip address.
ip-tracer -t target-ip to track other's ip address for example ip-tracer -t 127.0.0.1
β git 2020 sources
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦FASTEST WAY TRACKING IP ADRESS FOR NOOBS :
-Termux Linux new release :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
apt update
apt install git -y
git clone https://github.com/rajkumardusad/IP-Tracer.git
cd IP-Tracer
chmod +x install
sh install or ./install
How to use IP-Tracer
trace -m to track your own ip address.
trace -t target-ip to track other's ip address for example ip-tracer -t 127.0.0.1
trace for more information.
OR
ip-tracer -m to track your own ip address.
ip-tracer -t target-ip to track other's ip address for example ip-tracer -t 127.0.0.1
β git 2020 sources
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - rajkumardusad/IP-Tracer: Track any ip address with IP-Tracer. IP-Tracer is developed for Linux and Termux. you can retrieveβ¦
Track any ip address with IP-Tracer. IP-Tracer is developed for Linux and Termux. you can retrieve any ip address information using IP-Tracer. - GitHub - rajkumardusad/IP-Tracer: Track any ip addr...
π¦NETFLIX CHECKER ON GITHUB
https://github.com/AbdeslemSmahi/NetflixChecker
π¦Features:
Python 3.x
Simple readable code
Mass Accounts checker
Combolist support
HTTP Proxy Support
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
https://github.com/AbdeslemSmahi/NetflixChecker
π¦Features:
Python 3.x
Simple readable code
Mass Accounts checker
Combolist support
HTTP Proxy Support
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - AbdeslemSmahi/NetflixChecker: a mass account Netflix checker using Proxy
a mass account Netflix checker using Proxy. Contribute to AbdeslemSmahi/NetflixChecker development by creating an account on GitHub.
Forwarded from UNDERCODE SECURITY
π¦WIFI IN USA & UK NOW :
> In some countries it is not allowed to use the frequencies of some Wi-Fi channels (for example, in the USA you cannot use channels 12, 13 and 14).
> Most countries have a Wi-Fi signal limit of 20.0 dBm. But there are countries in which there is a limit of 30.0 dBm. You can take advantage of this loophole (to make a Wi-Fi card think that it is in a country where 30.0 dBm is allowed) and raise its power (TX Power) to a value of 30.0 dBm.
> In some countries it is not allowed to use the frequencies of some Wi-Fi channels (for example, in the USA you cannot use channels 12, 13 and 14).
> Most countries have a Wi-Fi signal limit of 20.0 dBm. But there are countries in which there is a limit of 30.0 dBm. You can take advantage of this loophole (to make a Wi-Fi card think that it is in a country where 30.0 dBm is allowed) and raise its power (TX Power) to a value of 30.0 dBm.
Forwarded from UNDERCODE SECURITY
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦BEST WIFI ADPATER FOR KALI 2020
> 5 GHz band support
Two band, including those with 5 GHz support, are, for example, cards:
1-Alfa AWUS051NH
http://rover.ebay.com/rover/1/711-53200-19255-0/1?icep_ff3=9&pub=5575132165&toolid=10001&campid=5337870315&customid=&icep_uq=Alfa+AWUS051NH&icep_sellerId=&icep_ex_kw=&icep_sortBy=12&icep_catId=&icep_minPrice=&icep_maxPrice=&ipn=psmain&icep_vectorid=229466&kwid=902099&mtid=824&kw=lg
2-Alfa AWUS052NH
http://rover.ebay.com/rover/1/711-53200-19255-0/1?icep_ff3=9&pub=5575132165&toolid=10001&campid=5337870315&customid=&icep_uq=Alfa+AWUS052NH&icep_sellerId=&icep_ex_kw=&icep_sortBy=12&icep_catId=&icep_minPrice=&icep_maxPrice=&ipn=psmain&icep_vectorid=229466&kwid=902099&mtid=824&kw=lg
π¦Intel's latest Wi-Fi adapters built into laptops
> They show 5 GHz APs and are capable of intercepting data.
However, when testing the ability to inject, different users receive different data. For some users, everything works, for some at 5 GHz it can only inject on channels 36 to 48. On others (52 to 116), where there is radar detection, there are some problems with the injection of deauthentication packets. In some, the injections do not work on all channels. I belong to the latter - my injection test failed on all tried and tested channels. It is possible that such a spread is associated with a bug in aireplay-ng , the author of the program on the forum confirmed its presence, at the moment the
error has not been fixed.
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦BEST WIFI ADPATER FOR KALI 2020
> 5 GHz band support
Two band, including those with 5 GHz support, are, for example, cards:
1-Alfa AWUS051NH
http://rover.ebay.com/rover/1/711-53200-19255-0/1?icep_ff3=9&pub=5575132165&toolid=10001&campid=5337870315&customid=&icep_uq=Alfa+AWUS051NH&icep_sellerId=&icep_ex_kw=&icep_sortBy=12&icep_catId=&icep_minPrice=&icep_maxPrice=&ipn=psmain&icep_vectorid=229466&kwid=902099&mtid=824&kw=lg
2-Alfa AWUS052NH
http://rover.ebay.com/rover/1/711-53200-19255-0/1?icep_ff3=9&pub=5575132165&toolid=10001&campid=5337870315&customid=&icep_uq=Alfa+AWUS052NH&icep_sellerId=&icep_ex_kw=&icep_sortBy=12&icep_catId=&icep_minPrice=&icep_maxPrice=&ipn=psmain&icep_vectorid=229466&kwid=902099&mtid=824&kw=lg
π¦Intel's latest Wi-Fi adapters built into laptops
> They show 5 GHz APs and are capable of intercepting data.
However, when testing the ability to inject, different users receive different data. For some users, everything works, for some at 5 GHz it can only inject on channels 36 to 48. On others (52 to 116), where there is radar detection, there are some problems with the injection of deauthentication packets. In some, the injections do not work on all channels. I belong to the latter - my injection test failed on all tried and tested channels. It is possible that such a spread is associated with a bug in aireplay-ng , the author of the program on the forum confirmed its presence, at the moment the
error has not been fixed.
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
eBay
alfa awus051nh for sale | eBay
Get the best deals for alfa awus051nh at eBay.com. We have a great online selection at the lowest prices with Fast & Free shipping on many items!
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦BASIC WIFI HACKING BY UNDERCODE
BSSID is the MAC address of the wireless card. Example MAC address: 50: 46: 5D: 6E: 8C: 20. They are described in more detail in the note β How to find out the MAC address and How to find out the manufacturer by MAC address β.
Handshake (also hendsheyk , handshake ) - data exchanged between the station and the access point at the time of the creation of Wi-Fi connection. This data contains information that allows you to select a password from a Wi-Fi network.
Brute-force (also full search ) is a method of attacking a password, which consists in enumerating all possible password options. It requires a lot of time and computing resources.
Dictionary search ( dictionary attack ) is a method of attacking a password, which consists in enumerating frequently occurring password options. It has a good ratio of resources spent to the results obtained.
Wi-Fi password brute force is a password guessing method that involves connecting to an Access Point with various password candidates. Practically not applicable due to the extremely low speed of search.
Offline Wi-Fi password guessing is a password guessing method that involves grabbing a Handshake and picking up a password that matches that handshake. This selection does not require connection to an Access Point and is performed many orders of magnitude faster than online search. It can also be performed on the computing power of video cards, which increases the speed of search by several orders of magnitude.
WPA and WPA2 - technology for secure access to Wi-Fi, has replaced the outdated technology of WEP.
A wireless Wi-Fi card (or a wireless Wi-Fi adapter ) is any network card that can connect to a Wi-Fi network. On laptops and phones, they are built into the case; on desktop computers, they usually represent an external device that connects via USB.
Monitor mode ( Monitor-Mode ) - the property of some wireless cards receive data packets, which are designed not only for them but also for other wireless devices.
Network interface - the name, symbol in Linux for network cards / adapters.
A Wi-Fi network channel is a conventional digital designation of the frequency at which the Access Point is currently operating.
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦BASIC WIFI HACKING BY UNDERCODE
BSSID is the MAC address of the wireless card. Example MAC address: 50: 46: 5D: 6E: 8C: 20. They are described in more detail in the note β How to find out the MAC address and How to find out the manufacturer by MAC address β.
Handshake (also hendsheyk , handshake ) - data exchanged between the station and the access point at the time of the creation of Wi-Fi connection. This data contains information that allows you to select a password from a Wi-Fi network.
Brute-force (also full search ) is a method of attacking a password, which consists in enumerating all possible password options. It requires a lot of time and computing resources.
Dictionary search ( dictionary attack ) is a method of attacking a password, which consists in enumerating frequently occurring password options. It has a good ratio of resources spent to the results obtained.
Wi-Fi password brute force is a password guessing method that involves connecting to an Access Point with various password candidates. Practically not applicable due to the extremely low speed of search.
Offline Wi-Fi password guessing is a password guessing method that involves grabbing a Handshake and picking up a password that matches that handshake. This selection does not require connection to an Access Point and is performed many orders of magnitude faster than online search. It can also be performed on the computing power of video cards, which increases the speed of search by several orders of magnitude.
WPA and WPA2 - technology for secure access to Wi-Fi, has replaced the outdated technology of WEP.
A wireless Wi-Fi card (or a wireless Wi-Fi adapter ) is any network card that can connect to a Wi-Fi network. On laptops and phones, they are built into the case; on desktop computers, they usually represent an external device that connects via USB.
Monitor mode ( Monitor-Mode ) - the property of some wireless cards receive data packets, which are designed not only for them but also for other wireless devices.
Network interface - the name, symbol in Linux for network cards / adapters.
A Wi-Fi network channel is a conventional digital designation of the frequency at which the Access Point is currently operating.
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#Wi-Fi Hacking Software list 4
This list Special for Kali Users
1οΈβ£airodump-ng is a tool for capturing wireless packets. Very often used to capture four-stage handshakes, which are later used to crack a Wi-Fi network password. It can capture any frames of wireless networks for further analysis.
https://kali.tools/?p=411
2οΈβ£airodump-ng is a tool for capturing wireless packets. Very often used to capture four-stage handshakes, which are later used to crack a Wi-Fi network password. It can capture any frames of wireless networks for further analysis.
https://kali.tools/?p=411
3οΈβ£boopsniff - a program from the BoopSuite package to show access points in the range of accessibility and capture handshakes.
https://kali.tools/?p=3409
4οΈβ£WPA2-HalfHandshake-Crack is a working concept to demonstrate the possibility of hacking a WPA2 network by grabbing a handshake from a user trying to connect to a fake AP. Those. grabs a half handshake.
https://kali.tools/?p=2794
5οΈβ£Reaver is designed to select the WPS (Wifi Protected Setup) pin by brute force. Reaver was created for a reliable and practical attack on WPS; it was tested on a large number of access points with different WPS implementations. On average, Reaver reveals the WPA / WPA2 password in plain text to the target access point (AP) for 4-10 hours, depending on the AP. In practice, he usually needs half this time to guess the WPS pin and guess the password.
https://kali.tools/?p=355
6οΈβ£Pixiewps is a tool written in C that is used to offline brute force the WPS pin by exploiting the low or nonexistent entropy of some access points (pixie dust attack).
> https://kali.tools/?p=351
π¦Those some from kali wifi hacking tools - Kali is a good hacking os
but don't even mind the Undercode Linux Os that we use their include more than those tools and more automation for wifi hacking ...
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#Wi-Fi Hacking Software list 4
This list Special for Kali Users
1οΈβ£airodump-ng is a tool for capturing wireless packets. Very often used to capture four-stage handshakes, which are later used to crack a Wi-Fi network password. It can capture any frames of wireless networks for further analysis.
https://kali.tools/?p=411
2οΈβ£airodump-ng is a tool for capturing wireless packets. Very often used to capture four-stage handshakes, which are later used to crack a Wi-Fi network password. It can capture any frames of wireless networks for further analysis.
https://kali.tools/?p=411
3οΈβ£boopsniff - a program from the BoopSuite package to show access points in the range of accessibility and capture handshakes.
https://kali.tools/?p=3409
4οΈβ£WPA2-HalfHandshake-Crack is a working concept to demonstrate the possibility of hacking a WPA2 network by grabbing a handshake from a user trying to connect to a fake AP. Those. grabs a half handshake.
https://kali.tools/?p=2794
5οΈβ£Reaver is designed to select the WPS (Wifi Protected Setup) pin by brute force. Reaver was created for a reliable and practical attack on WPS; it was tested on a large number of access points with different WPS implementations. On average, Reaver reveals the WPA / WPA2 password in plain text to the target access point (AP) for 4-10 hours, depending on the AP. In practice, he usually needs half this time to guess the WPS pin and guess the password.
https://kali.tools/?p=355
6οΈβ£Pixiewps is a tool written in C that is used to offline brute force the WPS pin by exploiting the low or nonexistent entropy of some access points (pixie dust attack).
> https://kali.tools/?p=351
π¦Those some from kali wifi hacking tools - Kali is a good hacking os
but don't even mind the Undercode Linux Os that we use their include more than those tools and more automation for wifi hacking ...
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β