β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦iOs Hacking apps list 3 :
https://spytomobile.com/ru
https://phonespector.com/
https://hellospy.soft112.com/
https://www.cocospy.com/iphone-spy-app.html
https://www.elcomsoft.com/eppb.html
https://github.com/GeoSn0w/Myriam
https://github.com/BishopFox/iSpy
https://www.cydiahacks.net/xsellize-repo-source.html
https://www.veracode.com/resources?assettype=toolkit#resources-results
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦iOs Hacking apps list 3 :
https://spytomobile.com/ru
https://phonespector.com/
https://hellospy.soft112.com/
https://www.cocospy.com/iphone-spy-app.html
https://www.elcomsoft.com/eppb.html
https://github.com/GeoSn0w/Myriam
https://github.com/BishopFox/iSpy
https://www.cydiahacks.net/xsellize-repo-source.html
https://www.veracode.com/resources?assettype=toolkit#resources-results
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Windows Hacking tools :
http://www.ettercap-project.org/
https://www.wireshark.org/
https://intruder.io/?utm_source=referral&utm_campaign=softwaretestinghelp-ethical-hacking-tools
https://www.metasploit.com/
https://www.softwaretestinghelp.com/Kiuwan-Hacking
https://www.acunetix.com/vulnerability-scanner/
https://www.paterva.com/web6/products/maltego.php
https://www.netsparker.com/web-vulnerability-scanner/
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Windows Hacking tools :
http://www.ettercap-project.org/
https://www.wireshark.org/
https://intruder.io/?utm_source=referral&utm_campaign=softwaretestinghelp-ethical-hacking-tools
https://www.metasploit.com/
https://www.softwaretestinghelp.com/Kiuwan-Hacking
https://www.acunetix.com/vulnerability-scanner/
https://www.paterva.com/web6/products/maltego.php
https://www.netsparker.com/web-vulnerability-scanner/
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
www.intruder.io
Intruder | Stop Breaches Before They Start
Use Intruder for real-time discovery and prioritization of attack surface issues, so you can focus on fixes that matter. Try for free.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ IP address and DNS Lookup Tools :
- [bgp](https://bgp.he.net/)
- [Bgpview](https://bgpview.io/)
- [DataSploit (IP Address Modules)](https://github.com/DataSploit/datasploit/tree/master/ip)
- [Domain Dossier](https://centralops.net/co/domaindossier.aspx)
- [Domaintoipconverter](http://domaintoipconverter.com/)
- [Googleapps Dig](https://toolbox.googleapps.com/apps/dig/)
- [Hurricane Electric BGP Toolkit](https://bgp.he.net/)
- [ICANN Whois](https://whois.icann.org/en)
- [Massdns](https://github.com/blechschmidt/massdns)
- [Mxtoolbox](https://mxtoolbox.com/BulkLookup.aspx)
- [Ultratools ipv6Info](https://www.ultratools.com/tools/ipv6Info)
- [Viewdns](https://viewdns.info/)
- [Umbrella (OpenDNS) Popularity List](http://s3-us-west-1.amazonaws.com/umbrella-static/index.html)
git 2020
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ IP address and DNS Lookup Tools :
- [bgp](https://bgp.he.net/)
- [Bgpview](https://bgpview.io/)
- [DataSploit (IP Address Modules)](https://github.com/DataSploit/datasploit/tree/master/ip)
- [Domain Dossier](https://centralops.net/co/domaindossier.aspx)
- [Domaintoipconverter](http://domaintoipconverter.com/)
- [Googleapps Dig](https://toolbox.googleapps.com/apps/dig/)
- [Hurricane Electric BGP Toolkit](https://bgp.he.net/)
- [ICANN Whois](https://whois.icann.org/en)
- [Massdns](https://github.com/blechschmidt/massdns)
- [Mxtoolbox](https://mxtoolbox.com/BulkLookup.aspx)
- [Ultratools ipv6Info](https://www.ultratools.com/tools/ipv6Info)
- [Viewdns](https://viewdns.info/)
- [Umbrella (OpenDNS) Popularity List](http://s3-us-west-1.amazonaws.com/umbrella-static/index.html)
git 2020
β β β Uππ»βΊπ«Δπ¬πβ β β β
bgpview.io
BGPView - BGP Toolkit and BGP ASN Routing Lookup Tool
BGPView allows you to debug and investigate information about IP addresses, ASN, IXs, BGP, ISPs, Prefixes and Domain names.
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦bUILD YOUR OWN OTP :
building massively scalable soft real-time systems with requirements on high availability.
Binary Distributions
Erlang/OTP is available as pre-built binary packages by most OS package managers.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) apt-get install erlang
Compiling from source
2) git clone https://github.com/erlang/otp.git
3) cd otp
4) ./otp_build autoconf
5) ./configure
6) make
7) make install
π¦EXAMPLE :
-module(hello).
-export([world/0]).
world() -> io:format("Hello, world\n").
Save the file as hello.erl and run erl to enter the Erlang shell to compile the module.
Erlang/OTP 19 [erts-8.2] [source] [64-bit] [smp:4:4] [async-threads:10] [hipe] [kernel-poll:false] [dtrace]
Eshell V8.2 (abort with ^G)
1> c(hello).
{ok,hello}
2> hello:world().
Hello, world
ok
git 2020
don't clone our tutorials
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦bUILD YOUR OWN OTP :
building massively scalable soft real-time systems with requirements on high availability.
Binary Distributions
Erlang/OTP is available as pre-built binary packages by most OS package managers.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) apt-get install erlang
Compiling from source
2) git clone https://github.com/erlang/otp.git
3) cd otp
4) ./otp_build autoconf
5) ./configure
6) make
7) make install
π¦EXAMPLE :
-module(hello).
-export([world/0]).
world() -> io:format("Hello, world\n").
Save the file as hello.erl and run erl to enter the Erlang shell to compile the module.
Erlang/OTP 19 [erts-8.2] [source] [64-bit] [smp:4:4] [async-threads:10] [hipe] [kernel-poll:false] [dtrace]
Eshell V8.2 (abort with ^G)
1> c(hello).
{ok,hello}
2> hello:world().
Hello, world
ok
git 2020
don't clone our tutorials
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - erlang/otp: Erlang/OTP
Erlang/OTP. Contribute to erlang/otp development by creating an account on GitHub.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦This API is inspired by and loosely based on the following discussions:
https://github.com/whatwg/html/issues/3745#issuecomment-395327173
https://developers.google.com/identity/sms-retriever/overview
Β» The Web OTP API tutorials :
https://discourse.wicg.io/t/sms-otp-retrieval/3499
https://groups.google.com/a/chromium.org/d/msg/blink-dev/-bdqHhCyBwM/yFoKtQQRAQAJ
https://github.com/w3ctag/design-reviews/issues/391
https://web.dev/sms-receiver-api-announcement/
β git 2020
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦This API is inspired by and loosely based on the following discussions:
https://github.com/whatwg/html/issues/3745#issuecomment-395327173
https://developers.google.com/identity/sms-retriever/overview
Β» The Web OTP API tutorials :
https://discourse.wicg.io/t/sms-otp-retrieval/3499
https://groups.google.com/a/chromium.org/d/msg/blink-dev/-bdqHhCyBwM/yFoKtQQRAQAJ
https://github.com/w3ctag/design-reviews/issues/391
https://web.dev/sms-receiver-api-announcement/
β git 2020
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
Add `one-time-code` autocomplete field Β· Issue #3745 Β· whatwg/html
Sites often require users to demonstrate their identity by providing a one-time-code that is sent to the user out-of-band. For example, the site may email the user's email address on file, ...
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦in 4 steps How to set the discrete graphics card as the default graphics card in win10 dual graphics card environment:
1) Right-click on the desktop and select the Nivida control panel
2) Click "Manage 3D Settings
3) Click here to select the default graphics card
4) Select "High-performance NVIDIA processor (discrete graphics card)
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦in 4 steps How to set the discrete graphics card as the default graphics card in win10 dual graphics card environment:
1) Right-click on the desktop and select the Nivida control panel
2) Click "Manage 3D Settings
3) Click here to select the default graphics card
4) Select "High-performance NVIDIA processor (discrete graphics card)
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦What is ping of death ?
#forbeginers
Ping of Death is a type of Denial of Service ( DoS) attack in which, by sending malformed or oversized packets using a simple ping order, an attacker attempts to crash, destabilize, or freeze the targeted device or service.
While PoD attacks are leveraging legacy flaws in target systems that may have been patched. The attack is still important and dangerous in an unpatched scheme, however. A new form of PoD attack has become common recently. The targeted device is hit by this attack, commonly known as a Ping flood, with ICMP packets sent rapidly via ping without waiting for replies.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦What is ping of death ?
#forbeginers
Ping of Death is a type of Denial of Service ( DoS) attack in which, by sending malformed or oversized packets using a simple ping order, an attacker attempts to crash, destabilize, or freeze the targeted device or service.
While PoD attacks are leveraging legacy flaws in target systems that may have been patched. The attack is still important and dangerous in an unpatched scheme, however. A new form of PoD attack has become common recently. The targeted device is hit by this attack, commonly known as a Ping flood, with ICMP packets sent rapidly via ping without waiting for replies.
β β β Uππ»βΊπ«Δπ¬πβ β β β