β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HACK ANDROID:
free real Android-Exploits:
A collection of android Exploits and guide on android exploitation
root@n3x7:~$ ls -l
drwxr-xr-x dos - Denial Of Service exploits
drwxr-xr-x local - Local Exploits
drwxr-xr-x remote - remote exploits
drwxr-xr-x webapps - webapp exploits
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1)git clone https://github.com/sundaysec/Android-Exploits.git
Recommend you grab exploitpack latest version
2) wget https://github.com/juansacco/exploitpack/archive/master.zip
3) Extract then Navigate into the folder and type:
4) java -jar ExploitPack.jar
5) Load the exploits
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HACK ANDROID:
free real Android-Exploits:
A collection of android Exploits and guide on android exploitation
root@n3x7:~$ ls -l
drwxr-xr-x dos - Denial Of Service exploits
drwxr-xr-x local - Local Exploits
drwxr-xr-x remote - remote exploits
drwxr-xr-x webapps - webapp exploits
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1)git clone https://github.com/sundaysec/Android-Exploits.git
Recommend you grab exploitpack latest version
2) wget https://github.com/juansacco/exploitpack/archive/master.zip
3) Extract then Navigate into the folder and type:
4) java -jar ExploitPack.jar
5) Load the exploits
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - sundaysec/Android-Exploits: A collection of android Exploits and Hacks
A collection of android Exploits and Hacks. Contribute to sundaysec/Android-Exploits development by creating an account on GitHub.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦VERIFIED INSTAGRAM HACK/PENTESTING VIDEOS :
Phishing termux:
https://www.youtube.com/watch?v=S6uoa7BDICc
https://securityequifax2017.com/how-to-hack-instagram-password-tutorial/ (8 meth)
https://youtu.be/Y0TdkocnrlY (bruteforce)
https://www.youtube.com/watch?v=zFo8okxBKDc&list=PLPEAmW0c6WNATuUIw0T8iG5J-0-30F61o&index=55
https://www.youtube.com/watch?v=KZEcFn3Z5L0
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦VERIFIED INSTAGRAM HACK/PENTESTING VIDEOS :
Phishing termux:
https://www.youtube.com/watch?v=S6uoa7BDICc
https://securityequifax2017.com/how-to-hack-instagram-password-tutorial/ (8 meth)
https://youtu.be/Y0TdkocnrlY (bruteforce)
https://www.youtube.com/watch?v=zFo8okxBKDc&list=PLPEAmW0c6WNATuUIw0T8iG5J-0-30F61o&index=55
https://www.youtube.com/watch?v=KZEcFn3Z5L0
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 BUG HUNTING :
Basics
Setup
Tools
Labs & Testing Environments
Vulnerability Types
Mobile Hacking
Smart Contracts
Coding & Scripting
Hardware & IoT
Blog posts & Talks
Media Resources
Certifications
Mindset & Mental Health
FREE NOW : https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 BUG HUNTING :
Basics
Setup
Tools
Labs & Testing Environments
Vulnerability Types
Mobile Hacking
Smart Contracts
Coding & Scripting
Hardware & IoT
Blog posts & Talks
Media Resources
Certifications
Mindset & Mental Health
FREE NOW : https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters: A list of resources for those interested in getting started in bugβ¦
A list of resources for those interested in getting started in bug bounties - nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦FREE LEAKS & VULN SEARCH ENGINES:
https://leakix.net/
http://punkspider.org/
https://code.google.com/p/skipfish/
http://www.arachni-scanner.com/
http://wapiti.sourceforge.net/
https://www.rapid7.com/products/nexpose/
https://subgraph.com/vega/index.en.html
https://ivre.rocks/
shodan.io
enjoy
Your not allowed to copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦FREE LEAKS & VULN SEARCH ENGINES:
https://leakix.net/
http://punkspider.org/
https://code.google.com/p/skipfish/
http://www.arachni-scanner.com/
http://wapiti.sourceforge.net/
https://www.rapid7.com/products/nexpose/
https://subgraph.com/vega/index.en.html
https://ivre.rocks/
shodan.io
enjoy
Your not allowed to copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦NMAP COMMANDS LEARN :
1) Basic Nmap Scan against IP or host
nmap 1.1.1.1
Now, if you want to scan a hostname, simply replace the IP for the host, as you see below:
nmap cloudflare.com
These kinds of basic scans are perfect for your first steps when starting with Nmap.
2. Scan specific ports or scan entire port ranges on a local or remote server
nmap -p 1-65535 localhost
In this example, we scanned all 65535 ports for our localhost computer.
Nmap is able to scan all possible ports, but you can also scan specific ports, which will report faster results. See below:
nmap -p 80,443 8.8.8.8
3. Scan multiple IP addresses
Letβs try to scan multiple IP addresses. For this you need to use this syntax:
nmap 1.1.1.1 8.8.8.8
You can also scan consecutive IP addresses:
nmap -p 1.1.1.1,2,3,4
This will scan 1.1.1.1, 1.1.1.2, 1.1.1.3 and 1.1.1.4.
4. Scan IP ranges
You can also use Nmap to scan entire CIDR IP ranges, for example:
nmap -p 8.8.8.0/28
This will scan 14 consecutive IP ranges, from 8.8.8.1 to 8.8.8.14.
An alternative is to simply use this kind of range:
nmap 8.8.8.1-14
You can even use wildcards to scan the entire C class IP range, for example:
nmap 8.8.8.*
This will scan 256 IP addresses from 8.8.8.1 to 8.8.8.256.
If you ever need to exclude certain IPs from the IP range scan, you can use the ββexcludeβ option, as you see below:
nmap -p 8.8.8.* --exclude 8.8.8.1
5. Scan the most popular ports
Using ββtop-portsβ parameter along with a specific number lets you scan the top X most common ports for that host, as we can see:
nmap --top-ports 20 192.168.1.106
Replace β20β with the desired number. Output example:
[root@securitytrails:~]nmap --top-ports 20 localhost
Starting Nmap 6.40 ( http://nmap.org ) at 2018-10-01 10:02 EDT
Nmap scan report for localhost (127.0.0.1)
Host is up (0.000016s latency).
Other addresses for localhost (not scanned): 127.0.0.1
PORT STATE SERVICE
21/tcp closed ftp
22/tcp closed ssh
23/tcp closed telnet
25/tcp closed smtp
53/tcp closed domain
80/tcp filtered http
110/tcp closed pop3
111/tcp closed rpcbind
135/tcp closed msrpc
139/tcp closed netbios-ssn
143/tcp closed imap
443/tcp filtered https
445/tcp closed microsoft-ds
993/tcp closed imaps
995/tcp closed pop3s
1723/tcp closed pptp
3306/tcp closed mysql
3389/tcp closed ms-wbt-server
5900/tcp closed vnc
8080/tcp closed http-proxy
6. Scan hosts and IP addresses reading from a text file
In this case, Nmap is also useful to read files that contain hosts and IPs inside.
Letβs suppose you create a list.txt file that contains these lines inside:
192.168.1.106
cloudflare.com
microsoft.com
securitytrails.com
The β-iLβ parameter lets you read from that file, and scan all those hosts for you:
nmap -iL list.txt
7. Save your Nmap scan results to a file
On the other hand, in the following example we will not be reading from a file, but exporting/saving our results into a text file:
nmap -oN output.txt securitytrails.com
Nmap has the ability to export files into XML format as well, see the next example:
nmap -oX output.xml securitytrails.com
8. Disabling DNS name resolution
If you need to speed up your scans a little bit, you can always choose to disable reverse DNS resolution for all your scans. Just add the β-nβ parameter
source wiki
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦NMAP COMMANDS LEARN :
1) Basic Nmap Scan against IP or host
nmap 1.1.1.1
Now, if you want to scan a hostname, simply replace the IP for the host, as you see below:
nmap cloudflare.com
These kinds of basic scans are perfect for your first steps when starting with Nmap.
2. Scan specific ports or scan entire port ranges on a local or remote server
nmap -p 1-65535 localhost
In this example, we scanned all 65535 ports for our localhost computer.
Nmap is able to scan all possible ports, but you can also scan specific ports, which will report faster results. See below:
nmap -p 80,443 8.8.8.8
3. Scan multiple IP addresses
Letβs try to scan multiple IP addresses. For this you need to use this syntax:
nmap 1.1.1.1 8.8.8.8
You can also scan consecutive IP addresses:
nmap -p 1.1.1.1,2,3,4
This will scan 1.1.1.1, 1.1.1.2, 1.1.1.3 and 1.1.1.4.
4. Scan IP ranges
You can also use Nmap to scan entire CIDR IP ranges, for example:
nmap -p 8.8.8.0/28
This will scan 14 consecutive IP ranges, from 8.8.8.1 to 8.8.8.14.
An alternative is to simply use this kind of range:
nmap 8.8.8.1-14
You can even use wildcards to scan the entire C class IP range, for example:
nmap 8.8.8.*
This will scan 256 IP addresses from 8.8.8.1 to 8.8.8.256.
If you ever need to exclude certain IPs from the IP range scan, you can use the ββexcludeβ option, as you see below:
nmap -p 8.8.8.* --exclude 8.8.8.1
5. Scan the most popular ports
Using ββtop-portsβ parameter along with a specific number lets you scan the top X most common ports for that host, as we can see:
nmap --top-ports 20 192.168.1.106
Replace β20β with the desired number. Output example:
[root@securitytrails:~]nmap --top-ports 20 localhost
Starting Nmap 6.40 ( http://nmap.org ) at 2018-10-01 10:02 EDT
Nmap scan report for localhost (127.0.0.1)
Host is up (0.000016s latency).
Other addresses for localhost (not scanned): 127.0.0.1
PORT STATE SERVICE
21/tcp closed ftp
22/tcp closed ssh
23/tcp closed telnet
25/tcp closed smtp
53/tcp closed domain
80/tcp filtered http
110/tcp closed pop3
111/tcp closed rpcbind
135/tcp closed msrpc
139/tcp closed netbios-ssn
143/tcp closed imap
443/tcp filtered https
445/tcp closed microsoft-ds
993/tcp closed imaps
995/tcp closed pop3s
1723/tcp closed pptp
3306/tcp closed mysql
3389/tcp closed ms-wbt-server
5900/tcp closed vnc
8080/tcp closed http-proxy
6. Scan hosts and IP addresses reading from a text file
In this case, Nmap is also useful to read files that contain hosts and IPs inside.
Letβs suppose you create a list.txt file that contains these lines inside:
192.168.1.106
cloudflare.com
microsoft.com
securitytrails.com
The β-iLβ parameter lets you read from that file, and scan all those hosts for you:
nmap -iL list.txt
7. Save your Nmap scan results to a file
On the other hand, in the following example we will not be reading from a file, but exporting/saving our results into a text file:
nmap -oN output.txt securitytrails.com
Nmap has the ability to export files into XML format as well, see the next example:
nmap -oX output.xml securitytrails.com
8. Disabling DNS name resolution
If you need to speed up your scans a little bit, you can always choose to disable reverse DNS resolution for all your scans. Just add the β-nβ parameter
source wiki
β β β Uππ»βΊπ«Δπ¬πβ β β β
nmap.org
Nmap: the Network Mapper - Free Security Scanner
Nmap Free Security Scanner, Port Scanner, & Network Exploration Tool. Download open source software for Linux, Windows, UNIX, FreeBSD, etc.