β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦X Brute Forcer Tool π WordPress , Joomla , DruPal , OpenCart , Magento :
[1] WordPress (Auto Detect Username)
[2] Joomla
[3] DruPal
[4] OpenCart
[5] Magento
[6] All (Auto Detect CMS)
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
A) FOR LINUX:
1) git clone https://github.com/Moham3dRiahi/XBruteForcer.git
2) cd XBruteForcer
3) perl XBruteForcer.pl -l list.txt -p passwords.txt
4) Installation Android alt tag
B) FOR Termux
cpan install LWP::UserAgent
cpan install HTTP::Request
git clone https://github.com/Moham3dRiahi/XBruteForcer.git
cd XBruteForcer
perl XBruteForcer.pl -l list.txt -p passwords.txt
C) Installation Windows alt tag
Download Perl
Download XBruteForcer
Extract XBruteForcer into Desktop
Open CMD and type the following commands:
cd Desktop/XBruteForcer-master/
perl XBruteForcer.pl -l list.txt -p passwords.txt
Version
VERIFIED
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦X Brute Forcer Tool π WordPress , Joomla , DruPal , OpenCart , Magento :
[1] WordPress (Auto Detect Username)
[2] Joomla
[3] DruPal
[4] OpenCart
[5] Magento
[6] All (Auto Detect CMS)
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
A) FOR LINUX:
1) git clone https://github.com/Moham3dRiahi/XBruteForcer.git
2) cd XBruteForcer
3) perl XBruteForcer.pl -l list.txt -p passwords.txt
4) Installation Android alt tag
B) FOR Termux
cpan install LWP::UserAgent
cpan install HTTP::Request
git clone https://github.com/Moham3dRiahi/XBruteForcer.git
cd XBruteForcer
perl XBruteForcer.pl -l list.txt -p passwords.txt
C) Installation Windows alt tag
Download Perl
Download XBruteForcer
Extract XBruteForcer into Desktop
Open CMD and type the following commands:
cd Desktop/XBruteForcer-master/
perl XBruteForcer.pl -l list.txt -p passwords.txt
Version
VERIFIED
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
Moham3dRiahi/XAttackProV30
XAttacker Tool PRO V30 Website Vulnerability Scanner & Auto Exploiter - Moham3dRiahi/XAttackProV30
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Methods for Using Parental Controls on Android :
A)1) Open system preferences . On the home screen or app, find the gear-shaped settings icon. Click on it.
2) Find users . In the settings go to the section "Users" or "Accounts". Click on the "Add Account" command.
3) There is a section here called "Restricted Profile" . A user with limited access rights to the system and applications is created.
4) Setting a pin code . The system will ask you to set a pin code.
5) Later, you will need to enter a pin code to change the settings. It is better to enter a complex password so that children cannot guess it.
6) Application selection . Then a complete list of installed applications will appear. If you deactivate an app, it will not appear on the restricted profile. You can also restrict access to social networks.
7) Profile name . Choose any name.
Exit . After making all the changes, you can leave the settings section.
8) Restricted Access Activation . Now check the created profile. You will be asked which user to select. Click on the name of the restricted profile and enter the pin code. After that, you can use your smartphone with this profile.
9) Disabled apps are not shown here. If you need them, return to your main profile.
B) Using the app
Keeping track of what kids are doing on their smartphones and on the internet is not easy. To make sure they are using the machine for learning, you can install the app. One of the best is Kidgy Android Parental Control . This program can be downloaded from the Play Store. It has many functionalities:
1) Location tracker . In order not to worry about the safety of children, you need to know where they are. The program allows you to see them on the map.
2) Call and message logs . Allows you to monitor how children use the Internet and smartphones. You can track all phone calls and text messages sent and received.
3) Restriction of social networks and websites . There are materials on the Internet that are useful for learning, but there are also materials that are not suitable for children. With this application, you can restrict access to social networks and any sites.
Your not allowed to copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Methods for Using Parental Controls on Android :
A)1) Open system preferences . On the home screen or app, find the gear-shaped settings icon. Click on it.
2) Find users . In the settings go to the section "Users" or "Accounts". Click on the "Add Account" command.
3) There is a section here called "Restricted Profile" . A user with limited access rights to the system and applications is created.
4) Setting a pin code . The system will ask you to set a pin code.
5) Later, you will need to enter a pin code to change the settings. It is better to enter a complex password so that children cannot guess it.
6) Application selection . Then a complete list of installed applications will appear. If you deactivate an app, it will not appear on the restricted profile. You can also restrict access to social networks.
7) Profile name . Choose any name.
Exit . After making all the changes, you can leave the settings section.
8) Restricted Access Activation . Now check the created profile. You will be asked which user to select. Click on the name of the restricted profile and enter the pin code. After that, you can use your smartphone with this profile.
9) Disabled apps are not shown here. If you need them, return to your main profile.
B) Using the app
Keeping track of what kids are doing on their smartphones and on the internet is not easy. To make sure they are using the machine for learning, you can install the app. One of the best is Kidgy Android Parental Control . This program can be downloaded from the Play Store. It has many functionalities:
1) Location tracker . In order not to worry about the safety of children, you need to know where they are. The program allows you to see them on the map.
2) Call and message logs . Allows you to monitor how children use the Internet and smartphones. You can track all phone calls and text messages sent and received.
3) Restriction of social networks and websites . There are materials on the Internet that are useful for learning, but there are also materials that are not suitable for children. With this application, you can restrict access to social networks and any sites.
Your not allowed to copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦FREE WEBSITES FOR PHONES INFORMATIONS :
https://sync.me/
https://www.truecaller.com/
https://www.opencnam.com/
(request a trial)
https://thatsthem.com/reverse-phone-lookup
https://www.whocalledme.com/choose-your-country
https://freecarrierlookup.com/
https://nuwber.com/
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦FREE WEBSITES FOR PHONES INFORMATIONS :
https://sync.me/
https://www.truecaller.com/
https://www.opencnam.com/
(request a trial)
https://thatsthem.com/reverse-phone-lookup
https://www.whocalledme.com/choose-your-country
https://freecarrierlookup.com/
https://nuwber.com/
β β β Uππ»βΊπ«Δπ¬πβ β β β
Sync.me
Find out who called - Sync.ME
Search any phone number worldwide and block unwanted spam calls.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦The easiest way to share data on a Wi-Fi connection :
Β» An NFC tag can be used, but it does not work on all devices. We
will use a QR code that can be printed and hung at a convenient place in the house. There it can be scanned and connected.
This is where Waflee comes to the rescue https://waflee.app/
1) Step 1. Generating a QR Code with Waflee
Open waflee.app in a browser, type in the SSID and password for it. Then click Show Advanced Settings to select WPA or WEP.
Most likely the network is using WPA, since the other option is considered outdated and not so reliable. If you are unsure, check the sticker on the router where the password is written. Usually the protocol is listed there. If not, use WPA.
Then click Bake it! to generate a QR code.
2) Step 2. Choose an exchange option
After creating the QR code, you will see a preview of the virtual map with it. Under the code, the name of the network and its password are indicated in plain text. This data is not saved anywhere.
Next, you can allow guests to scan the code using the app and camera. It is not very convenient to do this every time you go to visit. There are other options:
>Create a QR code web link that you can share or save on your device's home screen.
> Download the A4 PDF version of the QR code so you can print it and hang it at home.
> Download the PDF version of the QR code for business cards that you can distribute to people.
If you select "Get a link for a virtual map", you will see the web address with the network name and password in it. All calculations are done inside the browser and the part of the address after the # is not sent to the developer's servers.
3) Step 3. Let your friends scan the code
To connect to the network, ask the guest to open the camera and scan the QR code. On Android, depending on the camera, they may receive a notification that says "Click here to connect to [name] network." After clicking, it is redirected to the Wi-Fi settings, where the device connects to the network.
> On iOS, a notification will be given when using the Camera app or QR scanner control. It says "Join [name] network." After clicking, a pop-up window appears asking you to connect to the network. If you click "Connect", the network connection will occur in the background.
Your not allowed to copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦The easiest way to share data on a Wi-Fi connection :
Β» An NFC tag can be used, but it does not work on all devices. We
will use a QR code that can be printed and hung at a convenient place in the house. There it can be scanned and connected.
This is where Waflee comes to the rescue https://waflee.app/
1) Step 1. Generating a QR Code with Waflee
Open waflee.app in a browser, type in the SSID and password for it. Then click Show Advanced Settings to select WPA or WEP.
Most likely the network is using WPA, since the other option is considered outdated and not so reliable. If you are unsure, check the sticker on the router where the password is written. Usually the protocol is listed there. If not, use WPA.
Then click Bake it! to generate a QR code.
2) Step 2. Choose an exchange option
After creating the QR code, you will see a preview of the virtual map with it. Under the code, the name of the network and its password are indicated in plain text. This data is not saved anywhere.
Next, you can allow guests to scan the code using the app and camera. It is not very convenient to do this every time you go to visit. There are other options:
>Create a QR code web link that you can share or save on your device's home screen.
> Download the A4 PDF version of the QR code so you can print it and hang it at home.
> Download the PDF version of the QR code for business cards that you can distribute to people.
If you select "Get a link for a virtual map", you will see the web address with the network name and password in it. All calculations are done inside the browser and the part of the address after the # is not sent to the developer's servers.
3) Step 3. Let your friends scan the code
To connect to the network, ask the guest to open the camera and scan the QR code. On Android, depending on the camera, they may receive a notification that says "Click here to connect to [name] network." After clicking, it is redirected to the Wi-Fi settings, where the device connects to the network.
> On iOS, a notification will be given when using the Camera app or QR scanner control. It says "Join [name] network." After clicking, a pop-up window appears asking you to connect to the network. If you click "Connect", the network connection will occur in the background.
Your not allowed to copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦for beginers PowerShell
>Surface translation: a powerful Shell.
γγpowerful?
If you talk about popularity and user usage, PowerShell should be far inferior to some popular object-oriented languages. However, as a built-in scripting language in the system, compared with Linux Like Shell, it is certainly not acceptable to say that it is powerful.
γγWindows PowerShell is a command-line shell and scripting environment. It is a command-line scripting environment that runs on windows machines to automate system and application management. It enables command-line users and script writers to take advantage of the powerful features of the .NET Framework. You can think of it as an extension of the command line prompt cmd.exe. No, it should be a subversion. Powershell needs the support of the .NET environment and also supports .NET objects. Microsoft's positioning of Powershell as Power is not an exaggeration because it fully supports objects. Its readability and ease of use can rank first among all current shells.
π¦How to open PowerShell
γγ1) Win key + R, enter cmd, and then enter powershell in the cmd session box
γγ2) Win key + R, enter powershell, you will come to its dialog box
γγ3) Or directly find the Windows PowerShell program to open
π¦ Learn PowerShell
γγWhen I first came into contact with PowerShell, I was a little confused, but it was somewhat similar to DOS and Shell commands. Just get used to it.
γγRecommended learning
> https://www.youtube.com/watch?v=IHrGresKu2w
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦for beginers PowerShell
>Surface translation: a powerful Shell.
γγpowerful?
If you talk about popularity and user usage, PowerShell should be far inferior to some popular object-oriented languages. However, as a built-in scripting language in the system, compared with Linux Like Shell, it is certainly not acceptable to say that it is powerful.
γγWindows PowerShell is a command-line shell and scripting environment. It is a command-line scripting environment that runs on windows machines to automate system and application management. It enables command-line users and script writers to take advantage of the powerful features of the .NET Framework. You can think of it as an extension of the command line prompt cmd.exe. No, it should be a subversion. Powershell needs the support of the .NET environment and also supports .NET objects. Microsoft's positioning of Powershell as Power is not an exaggeration because it fully supports objects. Its readability and ease of use can rank first among all current shells.
π¦How to open PowerShell
γγ1) Win key + R, enter cmd, and then enter powershell in the cmd session box
γγ2) Win key + R, enter powershell, you will come to its dialog box
γγ3) Or directly find the Windows PowerShell program to open
π¦ Learn PowerShell
γγWhen I first came into contact with PowerShell, I was a little confused, but it was somewhat similar to DOS and Shell commands. Just get used to it.
γγRecommended learning
> https://www.youtube.com/watch?v=IHrGresKu2w
β β β Uππ»βΊπ«Δπ¬πβ β β β
YouTube
Microsoft PowerShell for Beginners - Video 1 Learn PowerShell
This part 1 of a multi-part series for learning PowerShell. This video covers the basics to get you up and running.
* Get-Command
* Get-Help
* Get-Alias
* Get-Member
* Get-History
* Start-Transcript
Update! Microsoft changed the process name to msedge :(β¦
* Get-Command
* Get-Help
* Get-Alias
* Get-Member
* Get-History
* Start-Transcript
Update! Microsoft changed the process name to msedge :(β¦
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Tools used for exploiting Windows:
- [Exploitation](https://github.com/hacksysteam/Exploitation) : Windows Software Exploitation
- [hacking-team-windows-kernel-lpe](https://github.com/vlad902/hacking-team-windows-kernel-lpe) : Previously-0day exploit from the Hacking Team leak, written by Eugene Ching/Qavar.
- [mimikatz](https://github.com/gentilkiwi/mimikatz) : A little tool to play with Windows security - extract plaintexts passwords, hash, PIN code and kerberos tickets from memory.
- [Pazuzu](https://github.com/BorjaMerino/Pazuzu) : Reflective DLL to run binaries from memory
- [Potato](https://github.com/foxglovesec/Potato) : Privilege Escalation on Windows 7,8,10, Server 2008, Server 2012
- [UACME](https://github.com/hfiref0x/UACME) : Defeating Windows User Account Control
- [Windows-Exploit-Suggester](https://github.com/GDSSecurity/Windows-Exploit-Suggester) : This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Tools used for exploiting Windows:
- [Exploitation](https://github.com/hacksysteam/Exploitation) : Windows Software Exploitation
- [hacking-team-windows-kernel-lpe](https://github.com/vlad902/hacking-team-windows-kernel-lpe) : Previously-0day exploit from the Hacking Team leak, written by Eugene Ching/Qavar.
- [mimikatz](https://github.com/gentilkiwi/mimikatz) : A little tool to play with Windows security - extract plaintexts passwords, hash, PIN code and kerberos tickets from memory.
- [Pazuzu](https://github.com/BorjaMerino/Pazuzu) : Reflective DLL to run binaries from memory
- [Potato](https://github.com/foxglovesec/Potato) : Privilege Escalation on Windows 7,8,10, Server 2008, Server 2012
- [UACME](https://github.com/hfiref0x/UACME) : Defeating Windows User Account Control
- [Windows-Exploit-Suggester](https://github.com/GDSSecurity/Windows-Exploit-Suggester) : This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - hacksysteam/Exploitation: Windows Software Exploitation
Windows Software Exploitation. Contribute to hacksysteam/Exploitation development by creating an account on GitHub.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Installing video drivers in Linux
A) On Kali Linux
1) Installing video drivers for NVIDIA on Linux
> sudo apt install -y ocl-icd-libopencl1 nvidia-driver nvidia-cuda-toolkit
2) Enabling OpenCL for Intel
If your CPU supports OpenCL, then install the following packages:
sudo apt install firmware-misc-nonfree intel-opencl-icd
B) On Arch Linux, BlackArch
Enabling OpenCL for NVIDIA
Remove xf86-video-nouveau there it is:
sudo pacman -R xf86-video-nouveau
> Install proprietary NVIDIA driver, CUDA and other required packages:
sudo pacman -S nvidia nvidia-utils opencl-nvidia opencl-headers cuda
C) Enabling OpenCL for Intel
sudo pacman -S linux-firmware intel-compute-runtime pocl
Friends, I need your support - if you have a different distribution kit or AMD video card, write in the comments how you installed the video driver - I will add this information here.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Installing video drivers in Linux
A) On Kali Linux
1) Installing video drivers for NVIDIA on Linux
> sudo apt install -y ocl-icd-libopencl1 nvidia-driver nvidia-cuda-toolkit
2) Enabling OpenCL for Intel
If your CPU supports OpenCL, then install the following packages:
sudo apt install firmware-misc-nonfree intel-opencl-icd
B) On Arch Linux, BlackArch
Enabling OpenCL for NVIDIA
Remove xf86-video-nouveau there it is:
sudo pacman -R xf86-video-nouveau
> Install proprietary NVIDIA driver, CUDA and other required packages:
sudo pacman -S nvidia nvidia-utils opencl-nvidia opencl-headers cuda
C) Enabling OpenCL for Intel
sudo pacman -S linux-firmware intel-compute-runtime pocl
Friends, I need your support - if you have a different distribution kit or AMD video card, write in the comments how you installed the video driver - I will add this information here.
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦PowerShell Hacking
- [BloodHound](https://github.com/adaptivethreat/BloodHound) : Six Degrees of Domain Admin
- [Empire](https://github.com/adaptivethreat/Empire) : Empire is a PowerShell and Python post-exploitation agent
- [Generate-Macro](https://github.com/enigma0x3/Generate-Macro) : Powershell script will generate a malicious Microsoft Office document with a specified payload and persistence method
- [Invoke-AltDSBackdoor](https://github.com/enigma0x3/Invoke-AltDSBackdoor) : This script will obtain persistence on a Windows 7+ machine under both Standard and Administrative accounts by using two Alternate Data Streams
- [Old-Powershell-payload-Excel-Delivery](https://github.com/enigma0x3/Old-Powershell-payload-Excel-Delivery) : This version touches disk for registry persistence
- [PSRecon](https://github.com/gfoss/PSRecon) : PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted data, hashes PowerShell and various system properties, and sends the data off to the security team
- [PowerShell-Suite](https://github.com/FuzzySecurity/PowerShell-Suite) : Some useful scripts in powershell
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦PowerShell Hacking
- [BloodHound](https://github.com/adaptivethreat/BloodHound) : Six Degrees of Domain Admin
- [Empire](https://github.com/adaptivethreat/Empire) : Empire is a PowerShell and Python post-exploitation agent
- [Generate-Macro](https://github.com/enigma0x3/Generate-Macro) : Powershell script will generate a malicious Microsoft Office document with a specified payload and persistence method
- [Invoke-AltDSBackdoor](https://github.com/enigma0x3/Invoke-AltDSBackdoor) : This script will obtain persistence on a Windows 7+ machine under both Standard and Administrative accounts by using two Alternate Data Streams
- [Old-Powershell-payload-Excel-Delivery](https://github.com/enigma0x3/Old-Powershell-payload-Excel-Delivery) : This version touches disk for registry persistence
- [PSRecon](https://github.com/gfoss/PSRecon) : PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted data, hashes PowerShell and various system properties, and sends the data off to the security team
- [PowerShell-Suite](https://github.com/FuzzySecurity/PowerShell-Suite) : Some useful scripts in powershell
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - SpecterOps/BloodHound-Legacy: Six Degrees of Domain Admin
Six Degrees of Domain Admin. Contribute to SpecterOps/BloodHound-Legacy development by creating an account on GitHub.