Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Watching 4K YouTube Videos on iPhone :
Why is YouTube 4K video only available on iOS 14?
1) IOS 14 received support for the VP9 video codec. A video codec is a program that deals with video processing. Apple uses the H.265 codec in its 4K video processing services, and Google VP9.
2) For this reason, 4K and 4K HDR videos were not previously allowed on any Apple device on YouTube. This also applies to the YouTube app for iOS and the Safari browser on iOS and macOS.
3) Apple is now bringing VP9 support to all of its devices. The company does not always do this. For example, iOS never came to support Flash. IPhone owners will now be able to watch YouTube videos in full resolution.
4) Not all 4K videos are the same
There are two main varieties of 4K. It is standard 4K and 4K HDR. In the second case, the resolution is the same, but the pixel contains more information to create a richer image. In the YouTube app, 2160p is displayed as 4K and 2160 HDR as 4K HDR. In both cases, it is Ultra HD (3840 x 2160).
5) Is my iPhone compatible?
Apple has not released official information on which iPhones support HD YouTube videos on iOS 14. The company hasn't even publicly acknowledged the possibility, apart from briefly mentioning new features in tvOS 14 for Apple TV 4K.
Any model with iPhone 8 supports Dolby Vision and HDR10 or High Dynamic Range with Dolby Vision and HDR10, but not 4K. The App Store says the iPhone 8 and later can play 4K and 4K HDR videos, depending on the app. This does not mean that VP9 codec is being applied unless it is iOS 14.
6) 4K and 4K HDR YouTube Playback for iPhone
If you have an iPhone compatible with YouTube 4K and 4K HDR, you need to update it to iOS 14 and update the YouTube app. Now there is only a beta version of iOS 14, which anyone can install on their device.
Then you can watch 4K on YouTube. Launch the application, select the video at the desired resolution and click on the three dots in the upper right corner of the video. Here, choose 2160p or 2160p HDR at any frame rate. You can also choose from 1440p, 1440p HDR and Quad HD.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Watching 4K YouTube Videos on iPhone :
Why is YouTube 4K video only available on iOS 14?
1) IOS 14 received support for the VP9 video codec. A video codec is a program that deals with video processing. Apple uses the H.265 codec in its 4K video processing services, and Google VP9.
2) For this reason, 4K and 4K HDR videos were not previously allowed on any Apple device on YouTube. This also applies to the YouTube app for iOS and the Safari browser on iOS and macOS.
3) Apple is now bringing VP9 support to all of its devices. The company does not always do this. For example, iOS never came to support Flash. IPhone owners will now be able to watch YouTube videos in full resolution.
4) Not all 4K videos are the same
There are two main varieties of 4K. It is standard 4K and 4K HDR. In the second case, the resolution is the same, but the pixel contains more information to create a richer image. In the YouTube app, 2160p is displayed as 4K and 2160 HDR as 4K HDR. In both cases, it is Ultra HD (3840 x 2160).
5) Is my iPhone compatible?
Apple has not released official information on which iPhones support HD YouTube videos on iOS 14. The company hasn't even publicly acknowledged the possibility, apart from briefly mentioning new features in tvOS 14 for Apple TV 4K.
Any model with iPhone 8 supports Dolby Vision and HDR10 or High Dynamic Range with Dolby Vision and HDR10, but not 4K. The App Store says the iPhone 8 and later can play 4K and 4K HDR videos, depending on the app. This does not mean that VP9 codec is being applied unless it is iOS 14.
6) 4K and 4K HDR YouTube Playback for iPhone
If you have an iPhone compatible with YouTube 4K and 4K HDR, you need to update it to iOS 14 and update the YouTube app. Now there is only a beta version of iOS 14, which anyone can install on their device.
Then you can watch 4K on YouTube. Launch the application, select the video at the desired resolution and click on the three dots in the upper right corner of the video. Here, choose 2160p or 2160p HDR at any frame rate. You can also choose from 1440p, 1440p HDR and Quad HD.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to put a custom theme on any Samsung smartphone using Hex Installer ?
1) Installing Hex Installer
The Hex Installer can be downloaded from the Play Store.
the application has the "Early Access" status, the program works quite stably.
https://play.google.com/store/apps/details?id=project.vivid.hex.bodhi
2) Apply the default theme
Hex Installer works by modifying themes in the Galaxy Themes store. If this is your first time using the app, you need to apply the default theme first.
Open the settings and select "Themes". Open the hamburger menu in the upper left corner and select My stuff. Make sure you see a white check mark on the default theme. If not, select the desired theme and click "Apply".
3) Theme setting
Open Hex Installer and follow the instructions on the screen. Give the app the required permissions. When the main page opens, you can start customizing your theme. The changes made will be displayed at the top of the page, including various sections of the graphical interface.
Β» UI Mode. These are the plugins that are the foundation of the theme. Here you can find plugins for pure Android and TouchWiz. Select Find More Plugins on Google Play to add new plugins, some of which are paid.
Β»Colors. You can change the colors of various GUI systems, including quick settings, text, and applications.
Applications. Select the apps you want to apply the theme to. All supported applications are selected by default.
Β»Custom fonts. Change the text style. This does not work on Android 10 and newer.
Β»Settings. Various changes, such as symbols in the charging status, changes in the transparency of icons in the quick settings panel, etc.
4) Creating your theme
When you're done making changes, click Create and Install. You will be redirected to Galaxy Themes and you will be prompted to download High Contrast Theme: Sky Black. After downloading, do not click "Apply".
5) Instead, click on the Back button to go to the Hex Installer. Then click "Build and Install" again. Hex Installer will apply changes to High Contrast Theme. A series of pop-up windows will appear asking you to remove or install various parts of the theme. Select Yes to each suggestion and you will be taken to the Galaxy Themes homepage.
6) Apply your Hex Theme
If this is your first time installing a theme using the Hex Installer, restart your smartphone. A reboot fixes problems with the colors of the icons in the status bar. When the smartphone has rebooted, go back to Galaxy Themes and select High_contrast_theme_II, click βApplyβ. Once the download is complete, you will see a new theme.
7) Apply more themes in the future
After the first time, you will not need to switch to the default theme first. Instead, you need to switch to the default theme after creating a new theme, but before switching to High_contrast_theme_II to apply the changes. Also, no need to reboot the smartphone before applying future themes.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to put a custom theme on any Samsung smartphone using Hex Installer ?
1) Installing Hex Installer
The Hex Installer can be downloaded from the Play Store.
the application has the "Early Access" status, the program works quite stably.
https://play.google.com/store/apps/details?id=project.vivid.hex.bodhi
2) Apply the default theme
Hex Installer works by modifying themes in the Galaxy Themes store. If this is your first time using the app, you need to apply the default theme first.
Open the settings and select "Themes". Open the hamburger menu in the upper left corner and select My stuff. Make sure you see a white check mark on the default theme. If not, select the desired theme and click "Apply".
3) Theme setting
Open Hex Installer and follow the instructions on the screen. Give the app the required permissions. When the main page opens, you can start customizing your theme. The changes made will be displayed at the top of the page, including various sections of the graphical interface.
Β» UI Mode. These are the plugins that are the foundation of the theme. Here you can find plugins for pure Android and TouchWiz. Select Find More Plugins on Google Play to add new plugins, some of which are paid.
Β»Colors. You can change the colors of various GUI systems, including quick settings, text, and applications.
Applications. Select the apps you want to apply the theme to. All supported applications are selected by default.
Β»Custom fonts. Change the text style. This does not work on Android 10 and newer.
Β»Settings. Various changes, such as symbols in the charging status, changes in the transparency of icons in the quick settings panel, etc.
4) Creating your theme
When you're done making changes, click Create and Install. You will be redirected to Galaxy Themes and you will be prompted to download High Contrast Theme: Sky Black. After downloading, do not click "Apply".
5) Instead, click on the Back button to go to the Hex Installer. Then click "Build and Install" again. Hex Installer will apply changes to High Contrast Theme. A series of pop-up windows will appear asking you to remove or install various parts of the theme. Select Yes to each suggestion and you will be taken to the Galaxy Themes homepage.
6) Apply your Hex Theme
If this is your first time installing a theme using the Hex Installer, restart your smartphone. A reboot fixes problems with the colors of the icons in the status bar. When the smartphone has rebooted, go back to Galaxy Themes and select High_contrast_theme_II, click βApplyβ. Once the download is complete, you will see a new theme.
7) Apply more themes in the future
After the first time, you will not need to switch to the default theme first. Instead, you need to switch to the default theme after creating a new theme, but before switching to High_contrast_theme_II to apply the changes. Also, no need to reboot the smartphone before applying future themes.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Google Play
Hex Installer: OneUI themes - Apps on Google Play
Create Personalized Themes for your Samsung Galaxy OneUI.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to improve sound quality in voice memos on iPhone :
1) Lossless sound is not for everyone. If you cannot distinguish such sound from other formats by ear, then you do not need it. If you are a musician and share your ideas with other professionals or a journalist interviewing, it is advisable to get the highest quality sound. This is exactly what the Lossless formats give. Among other things, they support the Voice Memos application on the iPhone.
2) There are audio files with and without loss of quality. Lossy file formats such as MP3 and AAC lose certain data when compressing files that the human ear cannot perceive. This reduces the size of the files, but the data is lost forever.
3) Lossless formats such as FLAC and Apple Lossless (ALAC) intelligently compress files, similar to ZIP archiving. No data is lost. The file remains high quality as an uncompressed version. Its size is much larger than when compressed.
4) By default, the Voice Notes app in iOS 12 and later records audio in lossy compressed formats. If you wish, you can upgrade to a higher quality. The size of the audio file will be larger, but if you use iCloud storage, you can be patient.
5) You won't find the option you want directly in the Voice Notes app. Instead, launch System Preferences, click Voice Notes and the Sound Quality option in Settings. The default is "Compressed". Select No Loss of Quality.
6) Below you can see two audio files of the same sound, each one minute long. The file without loss of quality is larger and weighs almost 3 MB versus just over 500 KB.
7) Lossless recording is not a guarantee against bad sound. It is recommended to point the microphone towards the sound source when recording. The distance should be such that the maximum volume is between -3 and 0 dB.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to improve sound quality in voice memos on iPhone :
1) Lossless sound is not for everyone. If you cannot distinguish such sound from other formats by ear, then you do not need it. If you are a musician and share your ideas with other professionals or a journalist interviewing, it is advisable to get the highest quality sound. This is exactly what the Lossless formats give. Among other things, they support the Voice Memos application on the iPhone.
2) There are audio files with and without loss of quality. Lossy file formats such as MP3 and AAC lose certain data when compressing files that the human ear cannot perceive. This reduces the size of the files, but the data is lost forever.
3) Lossless formats such as FLAC and Apple Lossless (ALAC) intelligently compress files, similar to ZIP archiving. No data is lost. The file remains high quality as an uncompressed version. Its size is much larger than when compressed.
4) By default, the Voice Notes app in iOS 12 and later records audio in lossy compressed formats. If you wish, you can upgrade to a higher quality. The size of the audio file will be larger, but if you use iCloud storage, you can be patient.
5) You won't find the option you want directly in the Voice Notes app. Instead, launch System Preferences, click Voice Notes and the Sound Quality option in Settings. The default is "Compressed". Select No Loss of Quality.
6) Below you can see two audio files of the same sound, each one minute long. The file without loss of quality is larger and weighs almost 3 MB versus just over 500 KB.
7) Lossless recording is not a guarantee against bad sound. It is recommended to point the microphone towards the sound source when recording. The distance should be such that the maximum volume is between -3 and 0 dB.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Securing Web Applications.pdf
728.8 KB
A. Explain the current state of Web application security
B. Analyze basic application functionality
C. Secure data stores and back-end components
D. Protect users from other users
E. Demonstrate common exploits and patch their root causes
F. Implement servers and firewalls effectively
B. Analyze basic application functionality
C. Secure data stores and back-end components
D. Protect users from other users
E. Demonstrate common exploits and patch their root causes
F. Implement servers and firewalls effectively
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Social Engineering Videos :
* [Chris Hadnagy - 7 Jedi Mind Tricks Influence Your Target without a Word](https://www.youtube.com/watch?v=OOQGsFlTHMQ)
* [Robert Anderson - US Interrogation Techniques and Social Engineering](https://www.youtube.com/watch?v=nQqp6yqf4Ao)
* [Ian Harris - Understanding Social Engineering Attacks with Natural Language Processing](https://www.youtube.com/watch?v=H3gfMkvw76o)
* [Chris Hadnagy - Social Engineering for Fun and Profit](https://www.youtube.com/watch?v=cI9xOR7xEi0)
* [Chris Hadnagy - Decoding humans live](https://www.youtube.com/watch?v=DoDWBe9atIo) - DerbyCon 2015
* [This is how hackers hack you using simple social engineering](https://www.youtube.com/watch?v=lc7scxvKQOo)
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Social Engineering Videos :
* [Chris Hadnagy - 7 Jedi Mind Tricks Influence Your Target without a Word](https://www.youtube.com/watch?v=OOQGsFlTHMQ)
* [Robert Anderson - US Interrogation Techniques and Social Engineering](https://www.youtube.com/watch?v=nQqp6yqf4Ao)
* [Ian Harris - Understanding Social Engineering Attacks with Natural Language Processing](https://www.youtube.com/watch?v=H3gfMkvw76o)
* [Chris Hadnagy - Social Engineering for Fun and Profit](https://www.youtube.com/watch?v=cI9xOR7xEi0)
* [Chris Hadnagy - Decoding humans live](https://www.youtube.com/watch?v=DoDWBe9atIo) - DerbyCon 2015
* [This is how hackers hack you using simple social engineering](https://www.youtube.com/watch?v=lc7scxvKQOo)
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
YouTube
DEF CON 23 - Social Engineering Village - Ian Harris - Understanding Social Engineering Attacks
Understanding Social Engineering Attacks with Natural Language Processing
Ian Harris
Social engineering attacks are a growing problem and there is very little defense against them since they target the human directly, circumventing many computer-based defenses.β¦
Ian Harris
Social engineering attacks are a growing problem and there is very little defense against them since they target the human directly, circumventing many computer-based defenses.β¦
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to easily root your Pixel 4 with Magisk :
1) Unlock the bootloader
First you need to unlock the bootloader. This will allow you to install unofficial firmware like Magisk. Installing the bootloader automatically deletes all data.
2) Install TWRP
Once the bootloader is unlocked, you need to use TWRP to install custom mods. TWRP is the easiest way to install mods, especially Magisk for root. If you don't already have TWRP for Android 10 on your Pixel 4 or 4 XL, install it.
3) Download Magisk
Now you need to take the Magisk ZIP installation file, with which you can root. It includes the Magisk Manager application for managing modules. Download the latest version of Magisk and save it to your Downloads folder on your smartphone.
https://github.com/topjohnwu/Magisk/releases
4) Boot into TWRP
There are several ways to boot your device into recovery mode. The easiest is to use the bootloader menu, also known as Fastboot Mode. There are separate articles to describe this process.
5) From the main bootloader screen, you need to open the menu using the volume buttons. When you have selected the "Recovery Mode" option, press the Power button to confirm your selection and the TWRP main menu will open. TWRP for Pixel 4 is still in the testing process, so you need to download it from your computer every time.
6) Installing Magisk
From the TWRP main menu, click Install, then open the Downloads folder where the Magisk installation file is located. Click on it and slide your finger across the slider to start installation.
The procedure for making changes to the boot image for root access will begin. When finished, click the "Restart" button.
7) Confirmation of root access
In the Magisk Manager app, click on the arrow next to Click to Run SafetyNet Test. You should see the message "SafetyNet check successful", but it is not correct. As stated above, the SafetyNet test fails on most devices with an unlocked bootloader. You can use your mods, but SafetyNet apps may not work. These include financial programs, PokΓ©mon GO, Google Pay.
8) This means Magisk is working fine and has been updated to the latest version. At this point, you have full root access, but there may be problems with SafetyNet checks.
E N J O Y β€οΈππ»
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to easily root your Pixel 4 with Magisk :
1) Unlock the bootloader
First you need to unlock the bootloader. This will allow you to install unofficial firmware like Magisk. Installing the bootloader automatically deletes all data.
2) Install TWRP
Once the bootloader is unlocked, you need to use TWRP to install custom mods. TWRP is the easiest way to install mods, especially Magisk for root. If you don't already have TWRP for Android 10 on your Pixel 4 or 4 XL, install it.
3) Download Magisk
Now you need to take the Magisk ZIP installation file, with which you can root. It includes the Magisk Manager application for managing modules. Download the latest version of Magisk and save it to your Downloads folder on your smartphone.
https://github.com/topjohnwu/Magisk/releases
4) Boot into TWRP
There are several ways to boot your device into recovery mode. The easiest is to use the bootloader menu, also known as Fastboot Mode. There are separate articles to describe this process.
5) From the main bootloader screen, you need to open the menu using the volume buttons. When you have selected the "Recovery Mode" option, press the Power button to confirm your selection and the TWRP main menu will open. TWRP for Pixel 4 is still in the testing process, so you need to download it from your computer every time.
6) Installing Magisk
From the TWRP main menu, click Install, then open the Downloads folder where the Magisk installation file is located. Click on it and slide your finger across the slider to start installation.
The procedure for making changes to the boot image for root access will begin. When finished, click the "Restart" button.
7) Confirmation of root access
In the Magisk Manager app, click on the arrow next to Click to Run SafetyNet Test. You should see the message "SafetyNet check successful", but it is not correct. As stated above, the SafetyNet test fails on most devices with an unlocked bootloader. You can use your mods, but SafetyNet apps may not work. These include financial programs, PokΓ©mon GO, Google Pay.
8) This means Magisk is working fine and has been updated to the latest version. At this point, you have full root access, but there may be problems with SafetyNet checks.
E N J O Y β€οΈππ»
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
Releases Β· topjohnwu/Magisk
The Magic Mask for Android. Contribute to topjohnwu/Magisk development by creating an account on GitHub.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to make iPhone automatically switch between light and dark interface :
#FAStTips
1) The dark interface in iOS 13 and above allows you to look at the screen with comfort. You can use it at any time of the day, but if you prefer to do it only in the dark, it is not very convenient to switch yourself every time. There is a setting that you can set once and forget about it.
2) Dark mode on the iPhone will turn on automatically at dusk, and at sunrise it will switch to the light interface. Sunset and sunrise times are taken from the Weather app, but often the mode is activated earlier. To install it, do the following.
3) Go to Settings> Display & brightness> Appearance> Automatic. Below the Options menu will appear and there are commands βLight until sunsetβ or βDark until sunriseβ. It depends on which interface is currently enabled. Activate one of these commands.
4) If you previously set your own schedule and have already forgotten about it, instead of sunset and sunrise, a specific time is shown. To switch, click on the settings, "Sunset or sunrise" or "Sunrise or sunset" so that the light interface is during the day and the dark one at night.
5) Now, at sunset, the system will switch from a light interface to a dark one, at sunrise back. You don't even have to move your finger to do this. However, switching does not always happen strictly at sunset and sunrise. In addition, switching occurs when you are not using the device.
6) If you want, you can change the interface manually in the "Screen and brightness" section, through the control center or using the Siri assistant. In this case, you are extending the light or dark period. For example, if you manually set the dark interface at 2 am, the switch to the light interface will occur at sunrise the next day.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to make iPhone automatically switch between light and dark interface :
#FAStTips
1) The dark interface in iOS 13 and above allows you to look at the screen with comfort. You can use it at any time of the day, but if you prefer to do it only in the dark, it is not very convenient to switch yourself every time. There is a setting that you can set once and forget about it.
2) Dark mode on the iPhone will turn on automatically at dusk, and at sunrise it will switch to the light interface. Sunset and sunrise times are taken from the Weather app, but often the mode is activated earlier. To install it, do the following.
3) Go to Settings> Display & brightness> Appearance> Automatic. Below the Options menu will appear and there are commands βLight until sunsetβ or βDark until sunriseβ. It depends on which interface is currently enabled. Activate one of these commands.
4) If you previously set your own schedule and have already forgotten about it, instead of sunset and sunrise, a specific time is shown. To switch, click on the settings, "Sunset or sunrise" or "Sunrise or sunset" so that the light interface is during the day and the dark one at night.
5) Now, at sunset, the system will switch from a light interface to a dark one, at sunrise back. You don't even have to move your finger to do this. However, switching does not always happen strictly at sunset and sunrise. In addition, switching occurs when you are not using the device.
6) If you want, you can change the interface manually in the "Screen and brightness" section, through the control center or using the Siri assistant. In this case, you are extending the light or dark period. For example, if you manually set the dark interface at 2 am, the switch to the light interface will occur at sunrise the next day.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BEST ROOT APPLICATIONS FOR WINDOWS :
http://www.kingoapp.com/android-root.html
http://www.iroot.com/
https://drfone.wondershare.com/
https://forum.xda-developers.com/android/apps-games/one-click-root-tool-android-2-x-5-0-t3107461
https://www.oneclickroot.com/?tap_a=12473-7742d5&tap_s=443817-24b632
https://www.oneclickroot.com/?tap_a=12473-7742d5&tap_s=443817-24b632
https://rootmaster.co/
ENJOY β€οΈππ»
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BEST ROOT APPLICATIONS FOR WINDOWS :
http://www.kingoapp.com/android-root.html
http://www.iroot.com/
https://drfone.wondershare.com/
https://forum.xda-developers.com/android/apps-games/one-click-root-tool-android-2-x-5-0-t3107461
https://www.oneclickroot.com/?tap_a=12473-7742d5&tap_s=443817-24b632
https://www.oneclickroot.com/?tap_a=12473-7742d5&tap_s=443817-24b632
https://rootmaster.co/
ENJOY β€οΈππ»
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦free penetration testing toolkit :
Information Gathering
Exploitation
Post Exploitation
Bruteforcing
Phishing
Cryptography/Stenography
Information Gathering:
Nmap
IP Info
Tcpdump (In The Works)
Datasploit (In The Works)
Censys Lookup
DNS Lookup
Raccoon
Cloudflare Bypasser
Exploitation:
Searchsploit
ReverseShell Wizard
FTP Buffer Overflow Scan
WPSeku WordPress Vuln Scanner
Post Exploitation:
In The Works
Bruteforcing:
FTP Bruteforcer
WPSeku WordPress Login Bruteforce
Phishing:
BlackEye Python
Crypto/Stegano:
MetaKiller
PDFMeta
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
Using Pip
1) sudo apt-get update
2) sudo apt-get upgrade
3) sudo apt-get install exploitdb netcat nmap perl php7.0
# on macOS
1) brew install exploitdb netcat nmap perl
2) pip3 install babysploit
3) babysploit
4) In order to use search command you must follow steps here to install the searchsploit binary!
Building From Source
1) sudo apt-get update
2) sudo apt-get upgrade
3) sudo apt-get install exploitdb netcat nmap perl php7.0
# on macOS
1) brew install exploitdb netcat nmap perl
2) git clone https://github.com/M4cs/BabySploit.git
3) cd BabySploit/
4) python3 setup.py install
5) babysploit
6) Docker Run Command
7) docker run --rm -idt --name babysploit xshuden/babysploit # container is deleted when you're done
OR
docker run -idt --name babysploit xshuden/babysploit
π¦7) BabySploit uses ConfigParser in order to write and read configuration. Your config file is automatically generated and located at ./babysploit/config/config.cfg. You can manually change configuration settings by opening up the file and editing with a text editor or you can use the set command to set a new value for a key. Use the set command like so:
set rhost
>> Enter Value For rhost: 10
>> Config Key Saved!
If before running this command the rhost key had a value of 80, the rhost key after running this command has a value of
8) You can also add configuration variables to the config by using the set command with a new key after it like so:
set newkey
>> Enter Value For newkey: hello
>> Config Key Saved!
9) Before running this there was no key named "newkey". After running this you will have a key named "newkey" in your config until you use the reset command which resets the saved configuration.
U S E F O R L E A R N
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦free penetration testing toolkit :
Information Gathering
Exploitation
Post Exploitation
Bruteforcing
Phishing
Cryptography/Stenography
Information Gathering:
Nmap
IP Info
Tcpdump (In The Works)
Datasploit (In The Works)
Censys Lookup
DNS Lookup
Raccoon
Cloudflare Bypasser
Exploitation:
Searchsploit
ReverseShell Wizard
FTP Buffer Overflow Scan
WPSeku WordPress Vuln Scanner
Post Exploitation:
In The Works
Bruteforcing:
FTP Bruteforcer
WPSeku WordPress Login Bruteforce
Phishing:
BlackEye Python
Crypto/Stegano:
MetaKiller
PDFMeta
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
Using Pip
1) sudo apt-get update
2) sudo apt-get upgrade
3) sudo apt-get install exploitdb netcat nmap perl php7.0
# on macOS
1) brew install exploitdb netcat nmap perl
2) pip3 install babysploit
3) babysploit
4) In order to use search command you must follow steps here to install the searchsploit binary!
Building From Source
1) sudo apt-get update
2) sudo apt-get upgrade
3) sudo apt-get install exploitdb netcat nmap perl php7.0
# on macOS
1) brew install exploitdb netcat nmap perl
2) git clone https://github.com/M4cs/BabySploit.git
3) cd BabySploit/
4) python3 setup.py install
5) babysploit
6) Docker Run Command
7) docker run --rm -idt --name babysploit xshuden/babysploit # container is deleted when you're done
OR
docker run -idt --name babysploit xshuden/babysploit
π¦7) BabySploit uses ConfigParser in order to write and read configuration. Your config file is automatically generated and located at ./babysploit/config/config.cfg. You can manually change configuration settings by opening up the file and editing with a text editor or you can use the set command to set a new value for a key. Use the set command like so:
set rhost
>> Enter Value For rhost: 10
>> Config Key Saved!
If before running this command the rhost key had a value of 80, the rhost key after running this command has a value of
8) You can also add configuration variables to the config by using the set command with a new key after it like so:
set newkey
>> Enter Value For newkey: hello
>> Config Key Saved!
9) Before running this there was no key named "newkey". After running this you will have a key named "newkey" in your config until you use the reset command which resets the saved configuration.
U S E F O R L E A R N
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - M4cs/BabySploit: :baby: BabySploit Beginner Pentesting Toolkit/Framework Written in Python :snake:
:baby: BabySploit Beginner Pentesting Toolkit/Framework Written in Python :snake: - M4cs/BabySploit
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Hidden "Notification History" widget on Android
#Fasttips
1) It so happens that you delete an important notification without thinking or having time to read it. Or you click on the "Delete everything" button. Fortunately, there are ways to read these notifications at least partially.
2) Since Android 4.1 Jelly Bean there is a hidden feature that allows you to watch recently received notifications. To access it, long press on an empty spot on the home screen and select "Widgets". Long press on the Settings widget and drag it to your home screen. A page with several options will appear. Select "Notifications".
3) now you can see the history of all notifications. In this case, we managed to see notifications for the last two days, but depending on their number, the period may be longer or shorter. Shows the title of the notification that sent its apps and the time or date it was sent.
4) In Android 11, this list has been redesigned to show the content of the notification along with other information.
For users of Samsung Galaxy devices, this method does not work. They need to download the Good Lock app from the
> Galaxy Store, install the NotiStar extension https://galaxystore.samsung.com/detail/com.samsung.systemui.notilus
and launch Good Lock from the main menu. The function is also not supported on LG smartphones running Android 10.
> https://galaxystore.samsung.com/detail/com.samsung.android.goodlock
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Hidden "Notification History" widget on Android
#Fasttips
1) It so happens that you delete an important notification without thinking or having time to read it. Or you click on the "Delete everything" button. Fortunately, there are ways to read these notifications at least partially.
2) Since Android 4.1 Jelly Bean there is a hidden feature that allows you to watch recently received notifications. To access it, long press on an empty spot on the home screen and select "Widgets". Long press on the Settings widget and drag it to your home screen. A page with several options will appear. Select "Notifications".
3) now you can see the history of all notifications. In this case, we managed to see notifications for the last two days, but depending on their number, the period may be longer or shorter. Shows the title of the notification that sent its apps and the time or date it was sent.
4) In Android 11, this list has been redesigned to show the content of the notification along with other information.
For users of Samsung Galaxy devices, this method does not work. They need to download the Good Lock app from the
> Galaxy Store, install the NotiStar extension https://galaxystore.samsung.com/detail/com.samsung.systemui.notilus
and launch Good Lock from the main menu. The function is also not supported on LG smartphones running Android 10.
> https://galaxystore.samsung.com/detail/com.samsung.android.goodlock
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Samsung
NotiStar
NotiStar is new notification management service
[Description]
NotiStar is new notification management service
By using this, You can manage many of the notifications you have received so far
...
[Description]
NotiStar is new notification management service
By using this, You can manage many of the notifications you have received so far
...
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HELPFUL HACKING SPYWARES & TOOLS FOR ANY HACKER :
3proxy 0.7.1.1 Tiny free proxy server. http://3proxy.ru/
3proxy-win32 0.7.1.1 Tiny free proxy server. http://3proxy.ru/
42zip 42 Recursive Zip archive bomb. http://blog.fefe.de/?ts=b6cea88d
acccheck 0.2.1 A password dictionary attack tool that targets windows authentication via the SMB protocol. http://labs.portcullis.co.uk/tools/acccheck/
Spyse OSINT gathering tool that scans the entire web, enrich and collect all the data in its own DB for instant access.
Provided data: IPv4 hosts, sub/domains/whois, ports/banners/protocols, technologies, OS, AS, wide SSL/TLS DB and more. https://spyse.com/
findsubdomains Complete subdomains sacnning service.(works using OSINT). https://findsubdomains.com
sublist3r subdomains enumeration tool for penetration testers https://github.com/aboul3la/Sublist3r
ASlookup Made for identifying the owner of an IP range(CIDR), ASN, related ASN, registry, etc... http://aslookup.com
ace 1.10 Automated Corporate Enumerator. A simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of an IP Phone in order to download the name and extension entries that a given phone can display on its screen interface http://ucsniff.sourceforge.net/ace.html
admid-pack 0.1 ADM DNS spoofing tools - Uses a variety of active and passive methods to spoof DNS packets. Very powerful. http://packetstormsecurity.com/files/10080/ADMid-pkg.tgz.html
adminpagefinder 0.1 This python script looks for a large amount of possible administrative interfaces on a given site.
http://packetstormsecurity.com/files/112855/Admin-Page-Finder-Script.html
admsnmp 0.1 ADM SNMP audit scanner.
aesfix 1.0.1 A tool to find AES key in RAM http://
citp.princeton.edu/memory/code/
aeskeyfind 1.0 A tool to find AES key in RAM http://citp.princeton.edu/memory/code/
aespipe 2.4c Reads data from stdin and outputs encrypted or decrypted results to stdout. http://loop-aes.sourceforge.net/aespipe/
afflib 3.7.3 An extensible open format for the storage of disk images and related forensic information. http://www.afflib.org
afpfs-ng 0.8.1 A client for the Apple Filing Protocol (AFP) http://alexthepuffin.googlepages.com/
against 0.2 A very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible targets and a multithreaded brute-forcing module which attacks parallel all discovered hosts or given ip addresses from a list. http://nullsecurity.net/tools/cracker.html
aiengine 339.58dfb85 A packet inspection engine with capabilities of learning without any human intervention. https://bitbucket.org/camp0/aiengine/
aimage 3.2.5 A program to create aff-images. http://www.afflib.org
air 2.0.0 A GUI front-end to dd/dc3dd designed for easily creating forensic images. http://air-imager.sourceforge.net/
airflood 0.1 A modification of aireplay that allows for a DOS in in the AP. This program fills the table of clients of the AP with random MACs doing impossible new connections. http://packetstormsecurity.com/files/51127/airflood.1.tar.gz.html
airgraph-ng 2371 Graphing tool for the aircrack suite http://www.aircrack-ng.org
airoscript 45.0a122ee A script to simplify the use of aircrack-ng tools. http://midnightresearch.com/projects/wicrawl/
airpwn 1.4 A tool for generic packet injection on an 802.11 network. http://airpwn.sourceforge.net
allthevhosts 1.0 A vhost discovery tool that scrapes various web applications http://labs.portcullis.co.uk/tools/finding-all-the-vhosts/
U S E F O R L E A R N !!
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HELPFUL HACKING SPYWARES & TOOLS FOR ANY HACKER :
3proxy 0.7.1.1 Tiny free proxy server. http://3proxy.ru/
3proxy-win32 0.7.1.1 Tiny free proxy server. http://3proxy.ru/
42zip 42 Recursive Zip archive bomb. http://blog.fefe.de/?ts=b6cea88d
acccheck 0.2.1 A password dictionary attack tool that targets windows authentication via the SMB protocol. http://labs.portcullis.co.uk/tools/acccheck/
Spyse OSINT gathering tool that scans the entire web, enrich and collect all the data in its own DB for instant access.
Provided data: IPv4 hosts, sub/domains/whois, ports/banners/protocols, technologies, OS, AS, wide SSL/TLS DB and more. https://spyse.com/
findsubdomains Complete subdomains sacnning service.(works using OSINT). https://findsubdomains.com
sublist3r subdomains enumeration tool for penetration testers https://github.com/aboul3la/Sublist3r
ASlookup Made for identifying the owner of an IP range(CIDR), ASN, related ASN, registry, etc... http://aslookup.com
ace 1.10 Automated Corporate Enumerator. A simple yet powerful VoIP Corporate Directory enumeration tool that mimics the behavior of an IP Phone in order to download the name and extension entries that a given phone can display on its screen interface http://ucsniff.sourceforge.net/ace.html
admid-pack 0.1 ADM DNS spoofing tools - Uses a variety of active and passive methods to spoof DNS packets. Very powerful. http://packetstormsecurity.com/files/10080/ADMid-pkg.tgz.html
adminpagefinder 0.1 This python script looks for a large amount of possible administrative interfaces on a given site.
http://packetstormsecurity.com/files/112855/Admin-Page-Finder-Script.html
admsnmp 0.1 ADM SNMP audit scanner.
aesfix 1.0.1 A tool to find AES key in RAM http://
citp.princeton.edu/memory/code/
aeskeyfind 1.0 A tool to find AES key in RAM http://citp.princeton.edu/memory/code/
aespipe 2.4c Reads data from stdin and outputs encrypted or decrypted results to stdout. http://loop-aes.sourceforge.net/aespipe/
afflib 3.7.3 An extensible open format for the storage of disk images and related forensic information. http://www.afflib.org
afpfs-ng 0.8.1 A client for the Apple Filing Protocol (AFP) http://alexthepuffin.googlepages.com/
against 0.2 A very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible targets and a multithreaded brute-forcing module which attacks parallel all discovered hosts or given ip addresses from a list. http://nullsecurity.net/tools/cracker.html
aiengine 339.58dfb85 A packet inspection engine with capabilities of learning without any human intervention. https://bitbucket.org/camp0/aiengine/
aimage 3.2.5 A program to create aff-images. http://www.afflib.org
air 2.0.0 A GUI front-end to dd/dc3dd designed for easily creating forensic images. http://air-imager.sourceforge.net/
airflood 0.1 A modification of aireplay that allows for a DOS in in the AP. This program fills the table of clients of the AP with random MACs doing impossible new connections. http://packetstormsecurity.com/files/51127/airflood.1.tar.gz.html
airgraph-ng 2371 Graphing tool for the aircrack suite http://www.aircrack-ng.org
airoscript 45.0a122ee A script to simplify the use of aircrack-ng tools. http://midnightresearch.com/projects/wicrawl/
airpwn 1.4 A tool for generic packet injection on an 802.11 network. http://airpwn.sourceforge.net
allthevhosts 1.0 A vhost discovery tool that scrapes various web applications http://labs.portcullis.co.uk/tools/finding-all-the-vhosts/
U S E F O R L E A R N !!
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
3proxy.ru
3proxy tiny free proxy server for Windows, Linux, Unix: SOCKS, HTTP, FTP proxy
3proxy freeware proxy server for Windows and Unix. HTTP, SOCKS, FTP, POP3
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BEST 2020 FREE & ANONYMOUS VPN WITH 4- 5 RATING :
https://play.google.com/store/apps/details?id=com.tunnelbear.android
https://play.google.com/store/apps/details?id=com.kaspersky.secure.connection
https://play.google.com/store/apps/details?id=hotspotshield.android.vpn
https://play.google.com/store/apps/details?id=com.avira.vpn
https://play.google.com/store/apps/details?id=com.speedify.speedifyandroid&hl=en
https://play.google.com/store/apps/details?id=com.windscribe.vpn
https://play.google.com/store/apps/details?id=ch.protonvpn.android
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BEST 2020 FREE & ANONYMOUS VPN WITH 4- 5 RATING :
https://play.google.com/store/apps/details?id=com.tunnelbear.android
https://play.google.com/store/apps/details?id=com.kaspersky.secure.connection
https://play.google.com/store/apps/details?id=hotspotshield.android.vpn
https://play.google.com/store/apps/details?id=com.avira.vpn
https://play.google.com/store/apps/details?id=com.speedify.speedifyandroid&hl=en
https://play.google.com/store/apps/details?id=com.windscribe.vpn
https://play.google.com/store/apps/details?id=ch.protonvpn.android
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Google Play
TunnelBear VPN - Apps on Google Play
Censorship? Not With Us
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦FREE SS7 HACKING 2020 UPDATE :
SigPloit a signaling security testing framework dedicated to Telecom Security professionals and reasearchers to pentest and exploit vulnerabilites in the signaling protocols used in mobile operators regardless of the geneartion being in use. SigPloit aims to cover all used protocols used in the operators interconnects SS7, GTP (3G), Diameter (4G) or even SIP for IMS and VoLTE infrastructures used in the access layer and SS7 message encapsulation into SIP-T. Recommendations for each vulnerability will be provided to guide the tester and the operator the steps that should be done to enhance their security posture
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
Version 1: SS7
SigPloit will initially start with SS7 vulnerabilities providing the messages used to test the below attacking scenarios
A- Location Tracking
B- Call and SMS Interception
C- Fraud
Version 2: GTP
This Version will focus on the data roaming attacks that occur on the IPX/GRX interconnects.
Version 3: Diameter
This Version will focus on the attacks occurring on the LTE roaming interconnects using Diameter as the signaling protocol.
Version 4: SIP
This is Version will be concerned with SIP as the signaling protocol used in the access layer for voice over LTE(VoLTE) and IMS infrastructure. Also, SIP will be used to encapsulate SS7 messages (ISUP) to be relayed over VoIP providers to SS7 networks taking advantage of SIP-T protocol, a protocol extension for SIP to provide intercompatability between VoIP and SS7 networks
Version 5: Reporting
This last Version will introduce the reporting feature. A comprehensive report with the tests done along with the recommendations provided for each vulnerability that has been exploited.
BETA Version of SigPloit will have the Location Tracking attacks of the SS7 phase 1
Installation and requirements
The requirements for this project are:
1) Python 2.7
2) Java version 1.7 +
3) sudo apt-get install lksctp-tools
4) Linux machine
To run use
5) cd SigPloit
6) sudo pip2 install -r requirements.txt
7) python sigploit.py
β GIT 2020
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦FREE SS7 HACKING 2020 UPDATE :
SigPloit a signaling security testing framework dedicated to Telecom Security professionals and reasearchers to pentest and exploit vulnerabilites in the signaling protocols used in mobile operators regardless of the geneartion being in use. SigPloit aims to cover all used protocols used in the operators interconnects SS7, GTP (3G), Diameter (4G) or even SIP for IMS and VoLTE infrastructures used in the access layer and SS7 message encapsulation into SIP-T. Recommendations for each vulnerability will be provided to guide the tester and the operator the steps that should be done to enhance their security posture
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
Version 1: SS7
SigPloit will initially start with SS7 vulnerabilities providing the messages used to test the below attacking scenarios
A- Location Tracking
B- Call and SMS Interception
C- Fraud
Version 2: GTP
This Version will focus on the data roaming attacks that occur on the IPX/GRX interconnects.
Version 3: Diameter
This Version will focus on the attacks occurring on the LTE roaming interconnects using Diameter as the signaling protocol.
Version 4: SIP
This is Version will be concerned with SIP as the signaling protocol used in the access layer for voice over LTE(VoLTE) and IMS infrastructure. Also, SIP will be used to encapsulate SS7 messages (ISUP) to be relayed over VoIP providers to SS7 networks taking advantage of SIP-T protocol, a protocol extension for SIP to provide intercompatability between VoIP and SS7 networks
Version 5: Reporting
This last Version will introduce the reporting feature. A comprehensive report with the tests done along with the recommendations provided for each vulnerability that has been exploited.
BETA Version of SigPloit will have the Location Tracking attacks of the SS7 phase 1
Installation and requirements
The requirements for this project are:
1) Python 2.7
2) Java version 1.7 +
3) sudo apt-get install lksctp-tools
4) Linux machine
To run use
5) cd SigPloit
6) sudo pip2 install -r requirements.txt
7) python sigploit.py
β GIT 2020
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Traffic Tampering with dnSpy.pdf
900.3 KB
General Trafc Manipulation Intro Previously we used Wireshark to capture network trafc. Passive snifng is usually easy but only useful to a degree. If the application was using TLS, we would have seen garbage after the TLS handshake . In these cases, Man-in-the-Middling (MitM-ing) the trafc with a proxy tool (e.g. Burp) is usually the way to go. But that introduces new challenges.
1. Redirecting the trafc to the proxy.
2. Masquerading as the server (e.g. make client accept our proxy's certicate instead of server).
3. Modifying packets.
I will need a lot of pages to talk about these and document what I have learned through the years. This is not the place for it.
1. Redirecting the trafc to the proxy.
2. Masquerading as the server (e.g. make client accept our proxy's certicate instead of server).
3. Modifying packets.
I will need a lot of pages to talk about these and document what I have learned through the years. This is not the place for it.