β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Hack into Windows: Reset a local account password using Sticky Keys
> If the System Restore method doesnβt work, there is an alternative that manipulates the Sticky Keys shortcut on the Windows login screen (Sticky Keys lets you use key combinations such as Ctrl+Alt+Delete by pressing one key). This tip only works with local accounts, so skip to the next section if youβre using a Microsoft account.
1) First, restart your computer with the Windows installation media as described above. Click βRepair your computerβ | Troubleshoot | Command Prompt. (You can take some of the following commands from this Pastebin page to save you the hassle of typing everything out).
2) In Command Prompt type βcopy c:windowssystem32sethc.exe c:β then press Enter (replace c: with another letter if your Windows installation is on a different drive). This step ensures you can reverse the process once youβre back into Windows.
3) Next, type βcopy c:windowssystem32cmd.exe c:windowssystem32sethc.exeβ and confirm the copy. This replaces the Sticky Keys program with Command Prompt, but keeps its filename and, therefore, the shortcut to it.
4) Restart your computer and, when the Windows login screen appears, tap the Shift key five times in quick succession. Youβll hear a beep, then a Command Prompt window will appear (if not, try repeating the key taps).
5) In this window, type βnet user [username] [password]β β replacing [username] with your Windows account username and [password] with your new password
6) Press Enter. If you canβt remember what your username is, type βnet userβ and press Enter to display all Windows accounts.
7) Close the Command Prompt window and log into Windows using your new password.
8) Now youβre back into Windows, you can revert the Sticky Keys file back to its previous state. Click Start, type cmd and press Enter, then type βcopy c:sethc.exe c:windowssystem32sethc.exeβ and confirm the copy.
USE FOR LEARN
-POWERED BY WIKI
E N J O Y β€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Hack into Windows: Reset a local account password using Sticky Keys
> If the System Restore method doesnβt work, there is an alternative that manipulates the Sticky Keys shortcut on the Windows login screen (Sticky Keys lets you use key combinations such as Ctrl+Alt+Delete by pressing one key). This tip only works with local accounts, so skip to the next section if youβre using a Microsoft account.
1) First, restart your computer with the Windows installation media as described above. Click βRepair your computerβ | Troubleshoot | Command Prompt. (You can take some of the following commands from this Pastebin page to save you the hassle of typing everything out).
2) In Command Prompt type βcopy c:windowssystem32sethc.exe c:β then press Enter (replace c: with another letter if your Windows installation is on a different drive). This step ensures you can reverse the process once youβre back into Windows.
3) Next, type βcopy c:windowssystem32cmd.exe c:windowssystem32sethc.exeβ and confirm the copy. This replaces the Sticky Keys program with Command Prompt, but keeps its filename and, therefore, the shortcut to it.
4) Restart your computer and, when the Windows login screen appears, tap the Shift key five times in quick succession. Youβll hear a beep, then a Command Prompt window will appear (if not, try repeating the key taps).
5) In this window, type βnet user [username] [password]β β replacing [username] with your Windows account username and [password] with your new password
6) Press Enter. If you canβt remember what your username is, type βnet userβ and press Enter to display all Windows accounts.
7) Close the Command Prompt window and log into Windows using your new password.
8) Now youβre back into Windows, you can revert the Sticky Keys file back to its previous state. Click Start, type cmd and press Enter, then type βcopy c:sethc.exe c:windowssystem32sethc.exeβ and confirm the copy.
USE FOR LEARN
-POWERED BY WIKI
E N J O Y β€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How To Find Windows 10 Product Key Using CMD, PowerShell, And Windows Registry?
1) To go ahead with this method, you need to boot into your Windows computer. Now, using a simple VBScriptβsome of you might have seen it on Microsoft forumsβyou can read all the binary gibberish written in Windows Registry. This script translates the Registry values into a readable format.
2) So, just copy and paste the following script in a Notepad window and save its as productkey.vbs by choosing the βAll Filesβ option in βSave as type.β
enjoyβ€οΈππ»
@UndercodeTesting
(code by wiki)β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How To Find Windows 10 Product Key Using CMD, PowerShell, And Windows Registry?
1) To go ahead with this method, you need to boot into your Windows computer. Now, using a simple VBScriptβsome of you might have seen it on Microsoft forumsβyou can read all the binary gibberish written in Windows Registry. This script translates the Registry values into a readable format.
2) So, just copy and paste the following script in a Notepad window and save its as productkey.vbs by choosing the βAll Filesβ option in βSave as type.β
Set WshShell = CreateObject("WScript.Shell")
MsgBox ConvertToKey(WshShell.RegRead("HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\DigitalProductId"))
Function ConvertToKey(Key)
Const KeyOffset = 52
i = 28
Chars = "BCDFGHJKMPQRTVWXY2346789"
Do
Cur = 0
x = 14
Do
Cur = Cur * 256
Cur = Key(x + KeyOffset) + Cur
Key(x + KeyOffset) = (Cur \ 24) And 255
Cur = Cur Mod 24
x = x -1
Loop While x >= 0
i = i -1
KeyOutput = Mid(Chars, Cur + 1, 1) & KeyOutput
If (((29 - i) Mod 6) = 0) And (i <> -1) Then
i = i -1
KeyOutput = "-" & KeyOutput
End If
Loop While i >= 0
ConvertToKey = KeyOutput
End Function
3) After saving this file, just click on it and a new popup window will show your Windows product key in the registry. You can copy or note this down somewhere to use it later.enjoyβ€οΈππ»
@UndercodeTesting
(code by wiki)β
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Malware reposity
> theZoo is a project created to make the possibility of malware analysis open and available to the public. Since we have found out that almost all versions of malware are very hard to come by in a way which will allow analysis, we have decided to gather all of them for you in an accessible and safe way. theZoo was born by Yuval tisf Nativ and is now maintained by Shahak Shalev.
Clone the repository with git clone https://www.github.com/ytisf/theZoo. Go to the directory and run pip install --user -r requirements.txt. This should install all latest requirements needed. In total can be "scripted" like so:
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://www.github.com/ytisf/theZoo
2) cd theZoo
3) pip install --user -r requirements.txt
4) Start by running the console:
> python theZoo.py
5)
/conf - The conf folder holds files relevant to the particular running of the program but are not part of the application. You can find the EULA file in the conf and more.
/imports - Contains .py import files used by the rest of the application
/malwares/Binaries - The actual malwares samples - be careful! These are very live.
/malware/Source - Malware source code.
Malware under the folder Original is supposed to be (NO PROMISES!) the original source of the malware that leaked. Malware under the folder Reversed is either reversed, decompiled or partially reconstructed.
π¦COMPATIBLE WITH ANY LINUX DISTRO
enjoyβ€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Malware reposity
> theZoo is a project created to make the possibility of malware analysis open and available to the public. Since we have found out that almost all versions of malware are very hard to come by in a way which will allow analysis, we have decided to gather all of them for you in an accessible and safe way. theZoo was born by Yuval tisf Nativ and is now maintained by Shahak Shalev.
Clone the repository with git clone https://www.github.com/ytisf/theZoo. Go to the directory and run pip install --user -r requirements.txt. This should install all latest requirements needed. In total can be "scripted" like so:
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://www.github.com/ytisf/theZoo
2) cd theZoo
3) pip install --user -r requirements.txt
4) Start by running the console:
> python theZoo.py
5)
/conf - The conf folder holds files relevant to the particular running of the program but are not part of the application. You can find the EULA file in the conf and more.
/imports - Contains .py import files used by the rest of the application
/malwares/Binaries - The actual malwares samples - be careful! These are very live.
/malware/Source - Malware source code.
Malware under the folder Original is supposed to be (NO PROMISES!) the original source of the malware that leaked. Malware under the folder Reversed is either reversed, decompiled or partially reconstructed.
π¦COMPATIBLE WITH ANY LINUX DISTRO
enjoyβ€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - ytisf/theZoo: A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibilityβ¦
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public. - ytisf/theZoo
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦The Linux Foundation joins forces to establish the Open Source Security Foundation OpenSSF
> The Linux Foundation announced the cooperation with a number of hardware and software vendors to jointly establish the Open Source Security Foundation (OpenSSF), which is a cross-industry cooperation, through the establishment of a broader community of targeted programs and best practices, And gather leaders together to improve the security of open source software.
> OpenSSF members come from the Core Infrastructure Initiative, the GitHub Open Source Security Alliance and other founding board members such as GitHub, Google, IBM, JPMorgan Chase, Microsoft, NCC Group, OWASP Foundation and Red Hat. Other founding members include ElevenPaths, GitLab, HackerOne, Intel, Okta, Purdue, SAFECode, StackHawk, Trail of Bits, Uber and VMware.
> According to the introduction of the OpenSSF official website, the governance of the foundation, the technical community and its decision-making will be transparent, and any specifications and projects developed will have nothing to do with suppliers. OpenSSF is committed to collaboration and cooperation with upstream communities and with existing communities to improve open source security. In other words, they aim to become a transparent organization to promote cooperation between manufacturers and improve security.
#News
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦The Linux Foundation joins forces to establish the Open Source Security Foundation OpenSSF
> The Linux Foundation announced the cooperation with a number of hardware and software vendors to jointly establish the Open Source Security Foundation (OpenSSF), which is a cross-industry cooperation, through the establishment of a broader community of targeted programs and best practices, And gather leaders together to improve the security of open source software.
> OpenSSF members come from the Core Infrastructure Initiative, the GitHub Open Source Security Alliance and other founding board members such as GitHub, Google, IBM, JPMorgan Chase, Microsoft, NCC Group, OWASP Foundation and Red Hat. Other founding members include ElevenPaths, GitLab, HackerOne, Intel, Okta, Purdue, SAFECode, StackHawk, Trail of Bits, Uber and VMware.
> According to the introduction of the OpenSSF official website, the governance of the foundation, the technical community and its decision-making will be transparent, and any specifications and projects developed will have nothing to do with suppliers. OpenSSF is committed to collaboration and cooperation with upstream communities and with existing communities to improve open source security. In other words, they aim to become a transparent organization to promote cooperation between manufacturers and improve security.
#News
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE HACKING
Reverse_engineering_'Black_Desert_Online'_1_Preface.pdf
264.4 KB
Detect modiο¬ed of function about time Detect time modiο¬ed via using time server Detect of game client local time modiο¬cation Detect of major kernel function modiο¬cation Detect DLL injection Detect virtual memory code injection Detect illegal control of DHCP Detect call speciο¬c function in game Detect game resource modiο¬cation Reject game process memory accessing Reject game process handle accessing Reject game process message transmission Reject game process keyboard/mouse input transmission
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to prohibit downloading server sharing files at will, prohibit β sharing files:
shared file management system also has some special functions, such as:
1) Shared file access permission program management.
When a user accesses a shared file on the server, he sets a list of applications that he is allowed to use. Programs that are not in the list cannot be opened to prevent the shared file from leaking. For example, you can disable QQ to send files, disable email to send files, and prohibit opening or editing shared files through special software.
2) It can be hidden if there is no right to visit.
All or part of the shared files (folders) on the local area network server can be hidden for some users who do not have the right to access them. They canβt see the names of the shared files or folders at all, and users can only see the ones they have permission to view. shared documents.
3) Users are prohibited from saving files locally.
The system can implement a file saving mode similar to a diskless workstation. Users are forbidden to create, edit and save files locally. All operations can only be performed on the file server to prevent the risk of leakage caused by files stored on local disks.
4) It is forbidden for users to gain unauthorized access to shared files after local login/remote desktop.
After the user logs in locally or accesses the shared files on the server through the remote desktop, it is prohibited to copy and paste them into the shared folder of their own computer, or they can be prohibited from dragging the shared files to their own computer disk through the disk mode during the remote desktop.
5) Access action black and white lists are added independently.
When a user accesses a shared file on the server, it is forbidden to open certain windows or perform certain actions to prevent the shared file from leaking and being edited. For example, it is forbidden to open the "Output" window, disable the "Print" action of some software, and disable the "Add" action of the right-click menu.
6) Remote user verification function.
In order to prevent some users with advanced permissions from leaving the computer midway when accessing shared files, and others use this computer to operate shared files, or delete, or copy, etc., the system has a remote user verification function, that is, every time a shared file is opened You need to enter an account and password to strengthen the protection of shared files.
7) Intelligent disaster recovery backup.
Dashizhi shared file management system can set automatic backup before deletion, and selectively restore a certain shared file as needed to prevent users from deliberately or unintentionally deleting shared files, causing important data loss and unrecoverable.
8) Binding authentication.
IP, MAC, user name, and machine name are four-fold bound. If you modify any of them, you will not be able to access shared files. Prevent users from modifying IP, MAC or logging in with other people's accounts to access shared files. At the same time, it can also restrict external computers or unauthorized computers from accessing shared files.
enjoyβ€οΈππ»
written
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to prohibit downloading server sharing files at will, prohibit β sharing files:
shared file management system also has some special functions, such as:
1) Shared file access permission program management.
When a user accesses a shared file on the server, he sets a list of applications that he is allowed to use. Programs that are not in the list cannot be opened to prevent the shared file from leaking. For example, you can disable QQ to send files, disable email to send files, and prohibit opening or editing shared files through special software.
2) It can be hidden if there is no right to visit.
All or part of the shared files (folders) on the local area network server can be hidden for some users who do not have the right to access them. They canβt see the names of the shared files or folders at all, and users can only see the ones they have permission to view. shared documents.
3) Users are prohibited from saving files locally.
The system can implement a file saving mode similar to a diskless workstation. Users are forbidden to create, edit and save files locally. All operations can only be performed on the file server to prevent the risk of leakage caused by files stored on local disks.
4) It is forbidden for users to gain unauthorized access to shared files after local login/remote desktop.
After the user logs in locally or accesses the shared files on the server through the remote desktop, it is prohibited to copy and paste them into the shared folder of their own computer, or they can be prohibited from dragging the shared files to their own computer disk through the disk mode during the remote desktop.
5) Access action black and white lists are added independently.
When a user accesses a shared file on the server, it is forbidden to open certain windows or perform certain actions to prevent the shared file from leaking and being edited. For example, it is forbidden to open the "Output" window, disable the "Print" action of some software, and disable the "Add" action of the right-click menu.
6) Remote user verification function.
In order to prevent some users with advanced permissions from leaving the computer midway when accessing shared files, and others use this computer to operate shared files, or delete, or copy, etc., the system has a remote user verification function, that is, every time a shared file is opened You need to enter an account and password to strengthen the protection of shared files.
7) Intelligent disaster recovery backup.
Dashizhi shared file management system can set automatic backup before deletion, and selectively restore a certain shared file as needed to prevent users from deliberately or unintentionally deleting shared files, causing important data loss and unrecoverable.
8) Binding authentication.
IP, MAC, user name, and machine name are four-fold bound. If you modify any of them, you will not be able to access shared files. Prevent users from modifying IP, MAC or logging in with other people's accounts to access shared files. At the same time, it can also restrict external computers or unauthorized computers from accessing shared files.
enjoyβ€οΈππ»
written
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
Live alexmaier974@gmail.com:1a2b3c4d5 Expry: 2022-02-22 18:50:12 19.07.2020 05:53:58
Live deeptorment@gmail.com:sb127gx35 Expry: 2022-02-08 10:01:02 19.07.2020 05:54:23
Live georgeburton1996@yahoo.co.uk:a7x4rever Expry: 2022-02-02 21:23:35 19.07.2020 05:54:47
Live dmcleod12@gmail.com:Mormodes15 Expry: 2022-01-07 19:53:44 19.07.2020 05:54:58
Live nickwinn12@hotmail.com:Invision1 Expry: 2021-12-31 10:24:28 19.07.2020 05:55:51
Live b.beasley79@yahoo.com:Sc00ter08 Expry: 2021-12-29 05:46:31 19.07.2020 05:55:58
Live poundjared@gmail.com:Blvd2583 Expry: 2021-12-28 07:45:15 19.07.2020 05:56:35
Live k.k.matzke@gmail.com:majken06 Expry: 2021-12-25 15:19:47 19.07.2020 05:56:45
Live alikhodrali@msn.com:123Cooldude Expry: 2021-12-25 03:15:25 19.07.2020 05:57:52
Live seejapan@aim.com:Blink117 Expry: 2021-12-21 06:47:50 19.07.2020 05:57:56
Live andywinn69@gmail.com:Sagawa123 Expry: 2021-12-07 02:58:46 19.07.2020 05:58:49
Live humood710@gmail.com:Humood9909 Expry: 2021-12-06 18:08:11 19.07.2020 05:58:55
Live austinlevesque13@yahoo.com:Danyelle0815!! Expry: 2021-12-03 02:02:08 19.07.2020 05:59:12
Live parker.traikoff@gmail.com:Parker221 Expry: 2021-12-01 16:38:55 19.07.2020 05:59:19
Live theodorepahany@gmail.com:FiuL89ty Expry: 2021-11-30 10:41:38 19.07.2020 05:59:41
Live lukas.bonk@web.de:Maxi3928lbm Expry: 2021-11-29 15:53:11 19.07.2020 05:59:48
Live jgarne13@gmail.com:Sherwood1 Expry: 2021-11-28 22:32:39 19.07.2020 05:59:53
Live bowdenta@yahoo.com:Trkstpl1 Expry: 2021-11-27 03:02:43 19.07.2020 06:01:23
Live gudrunbjork321@gmail.com:sims1997 Expry: 2021-11-11 01:01:39 19.07.2020 06:02:56
Live e_hollands@hotmail.com:Myrtle6740 Expry: 2021-11-10 02:20:19 19.07.2020 06:03:01
Live brianaustin2@gmail.com:W@K@d3k3 Expry: 2021-11-03 00:00:00 19.07.2020 06:04:25
Live rakiciva@msu.edu:Nino29Kica Expry: 2021-09-18 02:37:39 19.07.2020 06:06:46
Live selfbias@gmail.com:Paranoid1 Expry: 2021-09-17 21:12:29 19.07.2020 06:06:51
Live octaviojr619@msn.com:Octavio0! Expry: 2021-08-29 08:39:24 19.07.2020 06:07:24
Live shadowjohnson1985@gmail.com:sh4d0wm4n Expry: 2021-08-27 19:15:41 19.07.2020 06:08:41
Live stmurray5@gmail.com:Kicker15 Expry: 2021-08-26 22:35:15 19.07.2020 06:08:47
Live jjohnson031982@gmail.com:Drafting2! Expry: 2021-08-26 00:00:00 19.07.2020 06:09:27
Live dravenkish@gmail.com:Roo123dog Expry: 2021-08-25 23:35:13 19.07.2020 06:09:31
Live bazarjani.kian@gmail.com:Kiasadrifeb97 Expry: 2021-08-12 03:20:30 19.07.2020 06:09:39
Live cap_thecrazykid@yahoo.com:Shemale97 Expry: 2021-07-29 21:20:41 19.07.2020 06:11:20
Live adrian.richter1@gmx.de:kaktusse8 Expry: 2021-07-29 16:40:27 19.07.2020 06:11:24
Live ZINDEL.ADAM@GMAIL.COM:09Zman-46 Expry: 2021-07-23 21:57:05 19.07.2020 06:12:03
Live mrtoel@gmail.com:Trumpet1! Expry: 2021-07-09 08:38:43 19.07.2020 06:12:07
Live richardsonalex69@yahoo.com:july1973 Expry: 2020-07-16 14:46:07 19.07.2020 06:12:33
Live sandrosurbakti@gmail.com:sandro135 Expry: 2020-07-24 12:08:14 19.07.2020 06:12:37
Live bill.wheeler101@yahoo.com:Kisses69 Expry: 2021-07-06 19:43:08 19.07.2020 06:12:41
Live thephillipta@gmail.com:padamon00 Expry: 2021-07-04 15:44:37 19.07.2020 06:13:15
Live kennyroy02@aol.com:Knight02 Expry: 2021-07-03 22:42:39 19.07.2020 06:13:20
Live twingenicide@gmail.com:wallnut8545 Expry: 2021-06-28 17:23:37 19.07.2020 06:14:06
Live rossspearman68@gmail.com:Blue1216 Expry: 2021-06-25 23:53:14 19.07.2020 06:14:28
Live angel36s@swbell.net:IFi81u812 Expry: 2021-06-25 14:15:22 19.07.2020 06:14:31
Live robertban666@gmail.com:hastur11 Expry: 2021-06-25 12:18:00 19.07.2020 06:14:34
Live ryanragsdale2001@gmail.com:Ryry2001 Expry: 2021-06-24 13:59:35 19.07.2020 06:14:38
Live sbernard608@gmail.com:00bf35137cf4 Expry: 2021-06-24 05:09:41 19.07.2020 06:15:47
Live alexlockwood550@gmail.com:locky1997 Expry: 2021-06-18 02:43:12 19.07.2020 06:15:51
Live Thedrewster357@gmail.com:DrewHudson357 Expry: 2021-06-16 15:14:04 19.07.2020 06:15:55
Live deeptorment@gmail.com:sb127gx35 Expry: 2022-02-08 10:01:02 19.07.2020 05:54:23
Live georgeburton1996@yahoo.co.uk:a7x4rever Expry: 2022-02-02 21:23:35 19.07.2020 05:54:47
Live dmcleod12@gmail.com:Mormodes15 Expry: 2022-01-07 19:53:44 19.07.2020 05:54:58
Live nickwinn12@hotmail.com:Invision1 Expry: 2021-12-31 10:24:28 19.07.2020 05:55:51
Live b.beasley79@yahoo.com:Sc00ter08 Expry: 2021-12-29 05:46:31 19.07.2020 05:55:58
Live poundjared@gmail.com:Blvd2583 Expry: 2021-12-28 07:45:15 19.07.2020 05:56:35
Live k.k.matzke@gmail.com:majken06 Expry: 2021-12-25 15:19:47 19.07.2020 05:56:45
Live alikhodrali@msn.com:123Cooldude Expry: 2021-12-25 03:15:25 19.07.2020 05:57:52
Live seejapan@aim.com:Blink117 Expry: 2021-12-21 06:47:50 19.07.2020 05:57:56
Live andywinn69@gmail.com:Sagawa123 Expry: 2021-12-07 02:58:46 19.07.2020 05:58:49
Live humood710@gmail.com:Humood9909 Expry: 2021-12-06 18:08:11 19.07.2020 05:58:55
Live austinlevesque13@yahoo.com:Danyelle0815!! Expry: 2021-12-03 02:02:08 19.07.2020 05:59:12
Live parker.traikoff@gmail.com:Parker221 Expry: 2021-12-01 16:38:55 19.07.2020 05:59:19
Live theodorepahany@gmail.com:FiuL89ty Expry: 2021-11-30 10:41:38 19.07.2020 05:59:41
Live lukas.bonk@web.de:Maxi3928lbm Expry: 2021-11-29 15:53:11 19.07.2020 05:59:48
Live jgarne13@gmail.com:Sherwood1 Expry: 2021-11-28 22:32:39 19.07.2020 05:59:53
Live bowdenta@yahoo.com:Trkstpl1 Expry: 2021-11-27 03:02:43 19.07.2020 06:01:23
Live gudrunbjork321@gmail.com:sims1997 Expry: 2021-11-11 01:01:39 19.07.2020 06:02:56
Live e_hollands@hotmail.com:Myrtle6740 Expry: 2021-11-10 02:20:19 19.07.2020 06:03:01
Live brianaustin2@gmail.com:W@K@d3k3 Expry: 2021-11-03 00:00:00 19.07.2020 06:04:25
Live rakiciva@msu.edu:Nino29Kica Expry: 2021-09-18 02:37:39 19.07.2020 06:06:46
Live selfbias@gmail.com:Paranoid1 Expry: 2021-09-17 21:12:29 19.07.2020 06:06:51
Live octaviojr619@msn.com:Octavio0! Expry: 2021-08-29 08:39:24 19.07.2020 06:07:24
Live shadowjohnson1985@gmail.com:sh4d0wm4n Expry: 2021-08-27 19:15:41 19.07.2020 06:08:41
Live stmurray5@gmail.com:Kicker15 Expry: 2021-08-26 22:35:15 19.07.2020 06:08:47
Live jjohnson031982@gmail.com:Drafting2! Expry: 2021-08-26 00:00:00 19.07.2020 06:09:27
Live dravenkish@gmail.com:Roo123dog Expry: 2021-08-25 23:35:13 19.07.2020 06:09:31
Live bazarjani.kian@gmail.com:Kiasadrifeb97 Expry: 2021-08-12 03:20:30 19.07.2020 06:09:39
Live cap_thecrazykid@yahoo.com:Shemale97 Expry: 2021-07-29 21:20:41 19.07.2020 06:11:20
Live adrian.richter1@gmx.de:kaktusse8 Expry: 2021-07-29 16:40:27 19.07.2020 06:11:24
Live ZINDEL.ADAM@GMAIL.COM:09Zman-46 Expry: 2021-07-23 21:57:05 19.07.2020 06:12:03
Live mrtoel@gmail.com:Trumpet1! Expry: 2021-07-09 08:38:43 19.07.2020 06:12:07
Live richardsonalex69@yahoo.com:july1973 Expry: 2020-07-16 14:46:07 19.07.2020 06:12:33
Live sandrosurbakti@gmail.com:sandro135 Expry: 2020-07-24 12:08:14 19.07.2020 06:12:37
Live bill.wheeler101@yahoo.com:Kisses69 Expry: 2021-07-06 19:43:08 19.07.2020 06:12:41
Live thephillipta@gmail.com:padamon00 Expry: 2021-07-04 15:44:37 19.07.2020 06:13:15
Live kennyroy02@aol.com:Knight02 Expry: 2021-07-03 22:42:39 19.07.2020 06:13:20
Live twingenicide@gmail.com:wallnut8545 Expry: 2021-06-28 17:23:37 19.07.2020 06:14:06
Live rossspearman68@gmail.com:Blue1216 Expry: 2021-06-25 23:53:14 19.07.2020 06:14:28
Live angel36s@swbell.net:IFi81u812 Expry: 2021-06-25 14:15:22 19.07.2020 06:14:31
Live robertban666@gmail.com:hastur11 Expry: 2021-06-25 12:18:00 19.07.2020 06:14:34
Live ryanragsdale2001@gmail.com:Ryry2001 Expry: 2021-06-24 13:59:35 19.07.2020 06:14:38
Live sbernard608@gmail.com:00bf35137cf4 Expry: 2021-06-24 05:09:41 19.07.2020 06:15:47
Live alexlockwood550@gmail.com:locky1997 Expry: 2021-06-18 02:43:12 19.07.2020 06:15:51
Live Thedrewster357@gmail.com:DrewHudson357 Expry: 2021-06-16 15:14:04 19.07.2020 06:15:55
Live let_your_soulfly@hotmail.com:Incubus311! Expry: 2021-06-15 10:27:24 19.07.2020 06:16:23
Live kernreeves1998@hotmail.com:TryhardTac0 Expry: 2021-06-14 03:42:50 19.07.2020 06:16:49
Live cmhazelton1998@gmail.com:agletzip1998 Expry: 2021-06-13 07:17:45 19.07.2020 06:16:52
Live matclaxton@hotmail.com:r44267171 Expry: 2021-06-10 11:25:23 19.07.2020 06:16:56
Live elseyenrique@yahoo.com:Goldenchild1 Expry: 2021-06-08 05:09:44 19.07.2020 06:16:59
Live johnkomperda@gmail.com:letgoandletgod1 Expry: 2021-06-03 12:28:37 19.07.2020 06:17:28
Live yousefalnajjar8@gmail.com:Yusuf987 Expry: 2021-06-03 05:04:12 19.07.2020 06:18:06
π¦NORDVPN PREMIUM (only verified by us)
Live kernreeves1998@hotmail.com:TryhardTac0 Expry: 2021-06-14 03:42:50 19.07.2020 06:16:49
Live cmhazelton1998@gmail.com:agletzip1998 Expry: 2021-06-13 07:17:45 19.07.2020 06:16:52
Live matclaxton@hotmail.com:r44267171 Expry: 2021-06-10 11:25:23 19.07.2020 06:16:56
Live elseyenrique@yahoo.com:Goldenchild1 Expry: 2021-06-08 05:09:44 19.07.2020 06:16:59
Live johnkomperda@gmail.com:letgoandletgod1 Expry: 2021-06-03 12:28:37 19.07.2020 06:17:28
Live yousefalnajjar8@gmail.com:Yusuf987 Expry: 2021-06-03 05:04:12 19.07.2020 06:18:06
π¦NORDVPN PREMIUM (only verified by us)
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦all popular Types of Ransomwares from most dangerous till less :
1)CryptoLocker
CryptoLocker botnet is one of the oldest forms of cyber attacks which has been around for the past two decades. The CryptoLocker ransomware came into existence in 2013 when hackers used the original CryptoLocker botnet approach in ransomware.
CryptoLocker is the most destructive form of ransomware since it uses strong encryption algorithms. It is often impossible to decrypt (restore) the Crypto ransomware-infected computer and files without paying the ransom.
2) WannaCry
WannaCry is the most widely known ransomware variant across the globe. The WannaCry has infected nearly 125,000 organizations in over 150 countries. Some of the alternative names given to the WannaCry ransomware are WCry or WanaCrypt0r.
3) Bad Rabbit
Bad Rabbit is another strain of Ransomware which has infected organizations across Russia and Eastern Europe. It usually spreads through a fake Adobe Flash update on compromised websites.
4) Cerber
Cerber is another ransomware variant which targets cloud-based Office 365 users. Millions of Office 365 users have fallen prey to an elaborate phishing campaign carried out by the Cerber ransomware.
5) Crysis
Crysis is a special type of ransomware which encrypts files on fixed drives, removable drives, and network drives. It spreads through malicious email attachments with double-file extension. It uses strong encryption algorithms making it difficult to decrypt within a fair amount of time.
6) CryptoWall
CryptoWall is an advanced form of CryptoLocker ransomware. It came into existence since early 2014 after the downfall of the original CryptoLocker variant. Today, there are multiple variants of CryptoWall in existence. It includes CryptoDefense, CryptoBit, CryptoWall 2.0, and CryptoWall 3.0.
7) GoldenEye
GoldenEye is similar to the infamous Petya ransomware. It spreads through a massive social engineering campaign that targets human resources departments. When a user downloads a GoldenEye-infected file, it silently launches a macro which encrypts files on the victim's computer.
8) Jigsaw
Jigsaw is one of the most destructive types of ransomware which encrypts and progressively deletes the encrypted files until a ransom is paid. It starts deleting the files one after the other on an hourly basis until the 72-hour mark- when all the remaining files are deleted.
9) Locky
Locky is another ransomware variant which is designed to lock the victim's computer and prevent them from using it until a ransom is paid. It usually spread through seemingly benign email message disguised as an invoice.
When a user opens the email attachment, the invoice gets deleted automatically, and the victim is directed to enable macros to read the document. When the victim enables macros, Locky begins encrypting multiple file types using AES encryption.
Apart from the list of attacks mentioned above, Petya, NotPetya, TeslaCrypt, TorrentLocker, ZCryptor, etc., are some of the other ransomware variants that are well-known for their malicious activities.
source wiki
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦all popular Types of Ransomwares from most dangerous till less :
1)CryptoLocker
CryptoLocker botnet is one of the oldest forms of cyber attacks which has been around for the past two decades. The CryptoLocker ransomware came into existence in 2013 when hackers used the original CryptoLocker botnet approach in ransomware.
CryptoLocker is the most destructive form of ransomware since it uses strong encryption algorithms. It is often impossible to decrypt (restore) the Crypto ransomware-infected computer and files without paying the ransom.
2) WannaCry
WannaCry is the most widely known ransomware variant across the globe. The WannaCry has infected nearly 125,000 organizations in over 150 countries. Some of the alternative names given to the WannaCry ransomware are WCry or WanaCrypt0r.
3) Bad Rabbit
Bad Rabbit is another strain of Ransomware which has infected organizations across Russia and Eastern Europe. It usually spreads through a fake Adobe Flash update on compromised websites.
4) Cerber
Cerber is another ransomware variant which targets cloud-based Office 365 users. Millions of Office 365 users have fallen prey to an elaborate phishing campaign carried out by the Cerber ransomware.
5) Crysis
Crysis is a special type of ransomware which encrypts files on fixed drives, removable drives, and network drives. It spreads through malicious email attachments with double-file extension. It uses strong encryption algorithms making it difficult to decrypt within a fair amount of time.
6) CryptoWall
CryptoWall is an advanced form of CryptoLocker ransomware. It came into existence since early 2014 after the downfall of the original CryptoLocker variant. Today, there are multiple variants of CryptoWall in existence. It includes CryptoDefense, CryptoBit, CryptoWall 2.0, and CryptoWall 3.0.
7) GoldenEye
GoldenEye is similar to the infamous Petya ransomware. It spreads through a massive social engineering campaign that targets human resources departments. When a user downloads a GoldenEye-infected file, it silently launches a macro which encrypts files on the victim's computer.
8) Jigsaw
Jigsaw is one of the most destructive types of ransomware which encrypts and progressively deletes the encrypted files until a ransom is paid. It starts deleting the files one after the other on an hourly basis until the 72-hour mark- when all the remaining files are deleted.
9) Locky
Locky is another ransomware variant which is designed to lock the victim's computer and prevent them from using it until a ransom is paid. It usually spread through seemingly benign email message disguised as an invoice.
When a user opens the email attachment, the invoice gets deleted automatically, and the victim is directed to enable macros to read the document. When the victim enables macros, Locky begins encrypting multiple file types using AES encryption.
Apart from the list of attacks mentioned above, Petya, NotPetya, TeslaCrypt, TorrentLocker, ZCryptor, etc., are some of the other ransomware variants that are well-known for their malicious activities.
source wiki
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Show Detailed Information on Startup- Windows :
#fastTips
1) If your PC is experiencing slowdowns or inexplicable crashes, then you should make it your priority to diagnose whatβs causing those problems. One possible way to do this is to set Windows 10 startup to βVerbose Modeβ, which will give you a much more detailed breakdown of the processes happening on your PC as you boot.
2) To activate this, go to the following registry key:
>HKEYLOCALMACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Policies\System
3) Next, right-click an empty space in the right-hand pane, then select βNew -> DWORD (32-bit) Valueβ.
4) Name the value βVerboseStatusβ, right-click it then select Modify, and in the βValue dataβ box enter 1.
β β β Uππ»βΊπ«Δπ¬πβ β β β
#fastTips
1) If your PC is experiencing slowdowns or inexplicable crashes, then you should make it your priority to diagnose whatβs causing those problems. One possible way to do this is to set Windows 10 startup to βVerbose Modeβ, which will give you a much more detailed breakdown of the processes happening on your PC as you boot.
2) To activate this, go to the following registry key:
>HKEYLOCALMACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Policies\System
3) Next, right-click an empty space in the right-hand pane, then select βNew -> DWORD (32-bit) Valueβ.
4) Name the value βVerboseStatusβ, right-click it then select Modify, and in the βValue dataβ box enter 1.
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BlackBerry open source reverse engineering tool PE Tree to reduce the complexity of reverse engineering
>BlackBerry announced the launch of a new open source tool "PE Tree" designed to reduce the time and effort required to reverse engineer malware. The company stated that PE Tree allows reverse engineers to use pefile and PyQt5 to view Portable Executable (PE) files in a tree view, thereby reducing the threshold for dumping and rebuilding malware from memory, while providing An open source PE viewer code base that the community can build.
> PE Tree is also integrated with HexRays' IDA Pro decompiler, so that you can easily navigate the PE structure, dump the PE files in the memory and perform import reconstruction, which is essential in identifying and preventing various malicious software.
> The tool is developed in Python and supports Windows, Linux and Mac operating systems. It can be installed and run as a standalone application or IDAPython plug-in, allowing users to inspect any executable Windows file and view its composition.
> Use Ero Carrera's pefile module to analyze the PE file, and then map it to the tree view. There, users can view the summary of headers, including MZ header, DOS stub, Rich headers, data directory, etc.
> In addition, the "rainbow view" on the left provides a high-level overview of the PE file structure and conveys the offset/size/ratio of each area. Users can click each area to jump to the tree view, or right-click to save to a file or export to CyberChef.
> Eric Milam, vice president of research and operations at BlackBerry, said: βAs cybercriminals continue to evolve, the cybersecurity community needs to use new tools in its arsenal to defend and protect organizations and people. Now on the market There have been more than 1 billion malicious software, and this number continues to grow at more than 100 million per year. So we created this solution to help the cybersecurity community in this fight."
> For more details, please check the official blog: https://blogs.blackberry.com/en/2020/08/blackberry-open-source-pe-tree-tool-for-malware-reverse-engineers
#News
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BlackBerry open source reverse engineering tool PE Tree to reduce the complexity of reverse engineering
>BlackBerry announced the launch of a new open source tool "PE Tree" designed to reduce the time and effort required to reverse engineer malware. The company stated that PE Tree allows reverse engineers to use pefile and PyQt5 to view Portable Executable (PE) files in a tree view, thereby reducing the threshold for dumping and rebuilding malware from memory, while providing An open source PE viewer code base that the community can build.
> PE Tree is also integrated with HexRays' IDA Pro decompiler, so that you can easily navigate the PE structure, dump the PE files in the memory and perform import reconstruction, which is essential in identifying and preventing various malicious software.
> The tool is developed in Python and supports Windows, Linux and Mac operating systems. It can be installed and run as a standalone application or IDAPython plug-in, allowing users to inspect any executable Windows file and view its composition.
> Use Ero Carrera's pefile module to analyze the PE file, and then map it to the tree view. There, users can view the summary of headers, including MZ header, DOS stub, Rich headers, data directory, etc.
> In addition, the "rainbow view" on the left provides a high-level overview of the PE file structure and conveys the offset/size/ratio of each area. Users can click each area to jump to the tree view, or right-click to save to a file or export to CyberChef.
> Eric Milam, vice president of research and operations at BlackBerry, said: βAs cybercriminals continue to evolve, the cybersecurity community needs to use new tools in its arsenal to defend and protect organizations and people. Now on the market There have been more than 1 billion malicious software, and this number continues to grow at more than 100 million per year. So we created this solution to help the cybersecurity community in this fight."
> For more details, please check the official blog: https://blogs.blackberry.com/en/2020/08/blackberry-open-source-pe-tree-tool-for-malware-reverse-engineers
#News
β β β Uππ»βΊπ«Δπ¬πβ β β β
Blackberry
BlackBerryβs Open Source PE Tree Tool for Malware Reverse Engineers
Today at BlackHat, we announced the availability of PE Tree β a new open-source tool developed by the BlackBerry Research and Intelligence team for viewing Portable Executable (PE) files in a tree-view using pefile and PyQt5.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Administrator status - Termux
π °οΈ Phone without root
1) Use proottools to simulate certain environments that require root
> pkg install proot
2) Then enter in the terminal:
> termux-chroot
3) That is, the simulation rootenvironment is
under this prootenvironment, which is equivalent to entering the homedirectory, and some configurations can be easily performed.+
π ±οΈPhone is rooted
1) Installation tsu, this is a suversion of termux, used to replace termux su:
> pkg install tsu
2) Then enter in the terminal:
> tsu
3) You can switch rootusers. At this time root, an authorization prompt will pop up and give them rootpermissions.
E N J O Y β€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Administrator status - Termux
π °οΈ Phone without root
1) Use proottools to simulate certain environments that require root
> pkg install proot
2) Then enter in the terminal:
> termux-chroot
3) That is, the simulation rootenvironment is
under this prootenvironment, which is equivalent to entering the homedirectory, and some configurations can be easily performed.+
π ±οΈPhone is rooted
1) Installation tsu, this is a suversion of termux, used to replace termux su:
> pkg install tsu
2) Then enter in the terminal:
> tsu
3) You can switch rootusers. At this time root, an authorization prompt will pop up and give them rootpermissions.
E N J O Y β€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Termux Fasttips :
#FastTips
1) RouterSploit
RouteSploit framework is an open source router and other embedded device vulnerability detection and utilization framework.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
> pip2 install requests git clone https://github.com/reverse-shell/routersploit cd routersploit python2 rsf.py
2) Slowloris
Low bandwidth DoS tools
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
git clone https://github.com/gkbrk/slowloris.git cd slowloris chmod +x slowloris.py
3) RED_HAWK
An all-in-one penetration testing tool developed using PHP language, it can help us complete tasks such as information collection, SQL vulnerability scanning and resource crawling.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
pkg install php git clone https://github.com/Tuhinshubhra/RED\_HAWK.git cd RED_HAWK php rhawk.php
4) Cupp
Cupp is an interactive dictionary generation script written in Python. It is especially suitable for social engineering. After you collect specific information about the target, you can use this tool to intelligently generate a dictionary about the target.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
git clone https://github.com/Mebus/cupp.git cd cupp python2 cupp.py
5) Hash-Buster
Hash Buster is an online Hash cracking script written in python. The official said that it can be cracked within 5 seconds, and the actual speed test is not bad~
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
git clone https://github.com/UltimateHackers/Hash-Buster.git cd Hash-Buster python2 hash.py
6) D-TECT
D-TECT is an advanced penetration testing tool written in Python,
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
wordpress username enumeration
Sensitive document detection
Subdomain blasting
Port scan
Wordperss scan
XSS scan
SQL injection scanning, etc.
git clone https://github.com/shawarkhanethicalhacker/D-TECT.git cd D-TECT python2 d-tect.py
7) WPSeku
WPSeku is a simple WordPress vulnerability scanner written in Python. It can be used to scan local and remote WordPress installations to find security issues. Rated as the top ten most popular open source hacking tools in 2017.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
git clone https://github.com/m4ll0k/WPSeku.git cd WPSeku pip3 install -r requirements.txt python3 wpseku.py
8) XSStrike
XSStrike is an advanced XSS detection tool. It has a powerful fuzzing engine.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
git clone https://github.com/UltimateHackers/XSStrike.git cd XSStrike pip2 install -r requirements.txt python2 xsstrike
9) editor
Have a terminal vimartifact, and the government has also been packaged vim-python, of vimthe relevant optimization of the Python.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
> pkg install vim-python
Solve the garbled Chinese characters in vim under termux
> Create a new .vimrcfile in the home directory
vim .vimrc
Add the following content:
> set fileencodings=utf-8,gb2312,gb18030,gbk,ucs-bom,cp936,latin1 set enc=utf8 set fencs=utf8,gbk,gb2312,gb18030
> Then sourcethe variables:
source .vimrc
E N J O Y β€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Termux Fasttips :
#FastTips
1) RouterSploit
RouteSploit framework is an open source router and other embedded device vulnerability detection and utilization framework.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
> pip2 install requests git clone https://github.com/reverse-shell/routersploit cd routersploit python2 rsf.py
2) Slowloris
Low bandwidth DoS tools
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
git clone https://github.com/gkbrk/slowloris.git cd slowloris chmod +x slowloris.py
3) RED_HAWK
An all-in-one penetration testing tool developed using PHP language, it can help us complete tasks such as information collection, SQL vulnerability scanning and resource crawling.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
pkg install php git clone https://github.com/Tuhinshubhra/RED\_HAWK.git cd RED_HAWK php rhawk.php
4) Cupp
Cupp is an interactive dictionary generation script written in Python. It is especially suitable for social engineering. After you collect specific information about the target, you can use this tool to intelligently generate a dictionary about the target.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
git clone https://github.com/Mebus/cupp.git cd cupp python2 cupp.py
5) Hash-Buster
Hash Buster is an online Hash cracking script written in python. The official said that it can be cracked within 5 seconds, and the actual speed test is not bad~
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
git clone https://github.com/UltimateHackers/Hash-Buster.git cd Hash-Buster python2 hash.py
6) D-TECT
D-TECT is an advanced penetration testing tool written in Python,
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
wordpress username enumeration
Sensitive document detection
Subdomain blasting
Port scan
Wordperss scan
XSS scan
SQL injection scanning, etc.
git clone https://github.com/shawarkhanethicalhacker/D-TECT.git cd D-TECT python2 d-tect.py
7) WPSeku
WPSeku is a simple WordPress vulnerability scanner written in Python. It can be used to scan local and remote WordPress installations to find security issues. Rated as the top ten most popular open source hacking tools in 2017.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
git clone https://github.com/m4ll0k/WPSeku.git cd WPSeku pip3 install -r requirements.txt python3 wpseku.py
8) XSStrike
XSStrike is an advanced XSS detection tool. It has a powerful fuzzing engine.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
git clone https://github.com/UltimateHackers/XSStrike.git cd XSStrike pip2 install -r requirements.txt python2 xsstrike
9) editor
Have a terminal vimartifact, and the government has also been packaged vim-python, of vimthe relevant optimization of the Python.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
> pkg install vim-python
Solve the garbled Chinese characters in vim under termux
> Create a new .vimrcfile in the home directory
vim .vimrc
Add the following content:
> set fileencodings=utf-8,gb2312,gb18030,gbk,ucs-bom,cp936,latin1 set enc=utf8 set fencs=utf8,gbk,gb2312,gb18030
> Then sourcethe variables:
source .vimrc
E N J O Y β€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - threat9/routersploit: Exploitation Framework for Embedded Devices
Exploitation Framework for Embedded Devices. Contribute to threat9/routersploit development by creating an account on GitHub.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦TERMUX LIBS :
apt update
apt upgrade
apt install python python-dev python2 python2-dev
apt-get install clang
apt-get install libxml2 libxml2-dev libxslt libxslt-dev
apt install openssl libffi libffi-dev
apt install openssl openssl-tool openssl-dev
apt install clang g++ libxml2-dev libxslt-dev python python-dev
apt install clang python python-dev
apt install fftw libzmq libzmq-dev
apt install freetype freetype-dev libpng libpng-dev pkg-config
pip install BeautifulSoup4 requests
pip install lxml
pip install scrapy
pip install numpy==1.12.1
LDFLAGS=' -lm -lcompilerrt' pip install numpy==1.12.1
LDFLAGS=' -lm -lcompilerrt' pip install matplotlib pandas jupyter
pip install ipython
pip install demjson tushare colorama
E N J O Y β€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦TERMUX LIBS :
apt update
apt upgrade
apt install python python-dev python2 python2-dev
apt-get install clang
apt-get install libxml2 libxml2-dev libxslt libxslt-dev
apt install openssl libffi libffi-dev
apt install openssl openssl-tool openssl-dev
apt install clang g++ libxml2-dev libxslt-dev python python-dev
apt install clang python python-dev
apt install fftw libzmq libzmq-dev
apt install freetype freetype-dev libpng libpng-dev pkg-config
pip install BeautifulSoup4 requests
pip install lxml
pip install scrapy
pip install numpy==1.12.1
LDFLAGS=' -lm -lcompilerrt' pip install numpy==1.12.1
LDFLAGS=' -lm -lcompilerrt' pip install matplotlib pandas jupyter
pip install ipython
pip install demjson tushare colorama
E N J O Y β€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Detailed method of manually handling IE hijacked manual handling method of IE browser hijacked by undercode :
1) First, locate the registry
Start - Run
2) Copy codecode show as below:
cmd /c reg add "HKEYCURRENTUSER\Software\Microsoft\Windows\CurrentVersion\Applets\Regedit" /v "LastKey" /d "HKEYLOCALMACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace" /f & start regedit. exe
3) WIN7-10-XP system standard display
{1f4de370-d627-11d1-ba4f-00a0c91eedba}
{450D8FBA-AD25-11D0-98A8-0800361B1103}
{645FF040-5081-101B-9F08-00AA002F954E}
{e17d4fc0-5564-11d1-83f2-00a0c90dc849}
4) IE repair processing
starts-run
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Detailed method of manually handling IE hijacked manual handling method of IE browser hijacked by undercode :
1) First, locate the registry
Start - Run
2) Copy codecode show as below:
cmd /c reg add "HKEYCURRENTUSER\Software\Microsoft\Windows\CurrentVersion\Applets\Regedit" /v "LastKey" /d "HKEYLOCALMACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace" /f & start regedit. exe
3) WIN7-10-XP system standard display
{1f4de370-d627-11d1-ba4f-00a0c91eedba}
{450D8FBA-AD25-11D0-98A8-0800361B1103}
{645FF040-5081-101B-9F08-00AA002F954E}
{e17d4fc0-5564-11d1-83f2-00a0c90dc849}
4) IE repair processing
starts-run
Copy codecode show as below:E N J O Y β€οΈππ»
cmd /k reg delete HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace /f
cmd /k reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{1f4de370-d627-11d1- ba4f-00a0c91eedba} /ve /t REG_SZ /d "Computer Search Results Folder" /f
cmd /k reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{450D8FBA-AD25-11D0-98A8-0800361B1103 } /ve /t REG_SZ /f
cmd /k reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{450D8FBA-AD25-11D0-98A8-0800361B1103} /v "Removal Messagee" /t REG_SZ / d "@mydocs.dll,-900" /f
cmd /k reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{645FF040-5081-101B-9F08-00AA002F954E} /ve /t REG_SZ /d "Recycle Bin" /f
cmd /k reg add HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849} /ve /t REG_SZ /d "Search Results Folder" /f
6) Note: In a second step, when generating extra CLSID = {XXXXXXXX-XXXXXXXX-XXXX- XXXXXXXXXXXXX}, is performed cmd / k reg delete HKEY_CLASSES_ROOT \ CLSID \ {XXXXXXXX-XXXXXXXX-XXXX-XXXXXXXXXXXXX} / f
four , If it is the IE icon that is changed from the network neighborhood or my document or the recycle bin, you can execute the subordinate command
my document first:
7) Copy codecode show as below:
cmd /k reg delete HKEY_CLASSES_ROOT\CLSID\{450D8FBA-AD25-11D0-98A8-0800361B1103} /f
my computer:
8) Copy codecode show as below:
cmd /k reg delete HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D} /f
Network Neighborhood:
8) Copy codecode show as below:
cmd /k reg delete HKEY_CLASSES_ROOT\CLSID\{208D2C60-3AEA-1069-A2D7-08002B30309D} /f
9) Recycle Bin:
Copy codecode show as below:
cmd /k reg delete HKEY_CLASSES_ROOT\CLSID\{645FF040-5081-101B-9F08-00AA002F954E} /f
10) After completing the above operations, double-click the attached file and import it into the registry.
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦One-sentence Trojan horse and prevention method of PHP through security dog/D shield/360
F U L L C O D E :
chineese
https://pastebin.com/zYemD3LF
E N J O Y β€οΈππ»
π¦One-sentence Trojan horse and prevention method of PHP through security dog/D shield/360
F U L L C O D E :
chineese
https://pastebin.com/zYemD3LF
E N J O Y β€οΈππ»
Pastebin
-code - Pastebin.com
Pastebin.com is the number one paste tool since 2002. Pastebin is a website where you can store text online for a set period of time.