โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆWEB HACKING FROM ANDROID:
http://faceniff.ponury.net/
https://github.com/pjlantz/droidbox
https://droidsheep.info/
https://www.zimperium.com/zanti-mobile-penetration-testing
https://github.com/cSploit/android
https://apkpure.com/hackode/com.techfond.hackode
https://play.google.com/store/apps/details?id=org.kost.nmap.android.networkmapper
https://play.google.com/store/apps/details?id=jp.co.taosoftware.android.packetcapture
@UndercodeTesting
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆWEB HACKING FROM ANDROID:
http://faceniff.ponury.net/
https://github.com/pjlantz/droidbox
https://droidsheep.info/
https://www.zimperium.com/zanti-mobile-penetration-testing
https://github.com/cSploit/android
https://apkpure.com/hackode/com.techfond.hackode
https://play.google.com/store/apps/details?id=org.kost.nmap.android.networkmapper
https://play.google.com/store/apps/details?id=jp.co.taosoftware.android.packetcapture
@UndercodeTesting
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
GitHub
GitHub - pjlantz/droidbox: Dynamic analysis of Android apps
Dynamic analysis of Android apps. Contribute to pjlantz/droidbox development by creating an account on GitHub.
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆLinux privilege escalation auditing tool
LES tool is designed to assist in detecting security deficiencies for given Linux kernel/Linux-based machine
๐ธ๐ฝ๐ ๐ ๐ฐ๐ป๐ป๐ธ๐ ๐ฐ๐ ๐ธ๐พ๐ฝ & ๐ ๐ ๐ฝ :
Quick download:
@UndercodeTesting
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆLinux privilege escalation auditing tool
LES tool is designed to assist in detecting security deficiencies for given Linux kernel/Linux-based machine
๐ธ๐ฝ๐ ๐ ๐ฐ๐ป๐ป๐ธ๐ ๐ฐ๐ ๐ธ๐พ๐ฝ & ๐ ๐ ๐ฝ :
Quick download:
wget https://raw.githubusercontent.com/mzet-/linux-exploit-suggester/master/linux-exploit-suggester.sh -O les.sh4) MORE USAGE https://github.com/mzet-/linux-exploit-suggester
Details about LES usage and inner workings:
https://mzet-.github.io/2019/05/10/les-paper.html
Additional resources for the LES:
https://github.com/mzet-/les-res
2) Assess exposure of the Linux box on publicly known exploits:
$ ./linux-exploit-suggester.sh
Show state of security features on the Linux box:
3) $ ./linux-exploit-suggester.sh --checksec
Assess exposure of Linux kernel on publicly known exploits based on the provided 'uname' string (i.e. output of uname -a command):
$ ./linux-exploit-suggester.sh --uname <uname-string>
@UndercodeTesting
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
GitHub
GitHub - The-Z-Labs/linux-exploit-suggester: Linux privilege escalation auditing tool
Linux privilege escalation auditing tool. Contribute to The-Z-Labs/linux-exploit-suggester development by creating an account on GitHub.
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆcdaengine0400.dll manual deletion method:
cdaEngine0400.dll has earlier been reported as spyware, but new reports show that newer versions of the file is clean. We still don't have the file though, and only provide removal instructions.
1) Uninstall notice for WildTangent
Notice that removing WildTangent may cause the program that bundled
it to not function as intended.
2) Uninstall procedure
Uninstall WildTangent from "Add/Remove Programs" in the Windowsยฎ Control Panel.
3) The vendor is also offering uninstall instructions. If you run into problems
uninstalling, please contact the vendor for support. Note that you will not be able to play WildTangent games if you decide to uninstall.
4) Earlier versions of WildTangent's uninstaller leaved a large number of files
in the "%WinDir%\wt\" folder which can be deleted manually after running the
uninstaller.
Note: %WinDir% is a variable (?)
@UndercodeTesting
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆcdaengine0400.dll manual deletion method:
cdaEngine0400.dll has earlier been reported as spyware, but new reports show that newer versions of the file is clean. We still don't have the file though, and only provide removal instructions.
1) Uninstall notice for WildTangent
Notice that removing WildTangent may cause the program that bundled
it to not function as intended.
2) Uninstall procedure
Uninstall WildTangent from "Add/Remove Programs" in the Windowsยฎ Control Panel.
3) The vendor is also offering uninstall instructions. If you run into problems
uninstalling, please contact the vendor for support. Note that you will not be able to play WildTangent games if you decide to uninstall.
4) Earlier versions of WildTangent's uninstaller leaved a large number of files
in the "%WinDir%\wt\" folder which can be deleted manually after running the
uninstaller.
Note: %WinDir% is a variable (?)
@UndercodeTesting
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆSUB DOMAINS FINDER TOOLS KALI :
A) Sublist3r
Sublist3r - a tool in Python, intended for the transfer of sub-domains of websites using OSINT.
It helps penetration testers and bug hunters collect subdomains from the domain they are targeting.
Sublist3r lists subdomains using many search engines such as Google, Yahoo, Bing, Baidu, and Ask.
Sublist3r also lists subdomains with Netcraft, Virustotal, ThreatCrowd, DNSdumpster and ReverseDNS.
This very nice tool is hosted on github, although when I last checked there were some complaints about it crashing with some of its engines mentioned above.
๐ฆHow to install sublist3r
git clone https://github.com/about3la/Sublist3r.git
Then, in the directory where you cloned the repository, run:
python3 setup.py install
Then you can just run it like normal Linux commands
sublist3r -d itsecforu.ru
B) Dnscan
Dnscan is a Python wordlist based DNS subdomain scanner.
The script will first try to transfer the zone using each of the target domain name servers.
If that fails, it will look up the domain's TXT and MX records and then recursively scan the subdomains using the provided dictionary.
The tool is dictionary based, which means it will use its internal wordlist to try and check if the subdomain actually exists.
Some of the dictionaries it contains include:
subdomains-1000.txt
subdomains-10000.txt
subdomains-500.txt
subdomains-uk-1000.txt
subdomains-uk-500.txt
subdomains.txt
As you can see, subdomain scanning depends entirely on the above files.
Also this tool is available on the Internet, you can test it:
https://www.nmmapper.com/sys/tools/subdomainfinder/
@UndercodeTesting
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆSUB DOMAINS FINDER TOOLS KALI :
A) Sublist3r
Sublist3r - a tool in Python, intended for the transfer of sub-domains of websites using OSINT.
It helps penetration testers and bug hunters collect subdomains from the domain they are targeting.
Sublist3r lists subdomains using many search engines such as Google, Yahoo, Bing, Baidu, and Ask.
Sublist3r also lists subdomains with Netcraft, Virustotal, ThreatCrowd, DNSdumpster and ReverseDNS.
This very nice tool is hosted on github, although when I last checked there were some complaints about it crashing with some of its engines mentioned above.
๐ฆHow to install sublist3r
git clone https://github.com/about3la/Sublist3r.git
Then, in the directory where you cloned the repository, run:
python3 setup.py install
Then you can just run it like normal Linux commands
sublist3r -d itsecforu.ru
B) Dnscan
Dnscan is a Python wordlist based DNS subdomain scanner.
The script will first try to transfer the zone using each of the target domain name servers.
If that fails, it will look up the domain's TXT and MX records and then recursively scan the subdomains using the provided dictionary.
The tool is dictionary based, which means it will use its internal wordlist to try and check if the subdomain actually exists.
Some of the dictionaries it contains include:
subdomains-1000.txt
subdomains-10000.txt
subdomains-500.txt
subdomains-uk-1000.txt
subdomains-uk-500.txt
subdomains.txt
As you can see, subdomain scanning depends entirely on the above files.
Also this tool is available on the Internet, you can test it:
https://www.nmmapper.com/sys/tools/subdomainfinder/
@UndercodeTesting
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
nmmapper.com
Online Platform for network pentesting and mapping tool for penetration testers and System administrators
Nmmapper.com offers Online network penetration and mapping tool for penetration testers and System administrators.
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆMay you interested in those links :
1) The Hacker Playbook : Practical Guide To Penetration Testing
Link : http://www.allitebooks.com/the-hacker-playbook-practical-guide-to-penetration-testing/
2) The Hacker Playbook 2: Practical Guide To Penetration Testing
Link : http://www.allitebooks.com/the-hacker-playbook-2-practical-guide-to-penetration-testing/
3) Android Hacker's Handbook
Link : http://www.allitebooks.com/android-hackers-handbook/
4) BackTrack 5 Wireless Penetration Testing Beginner's Guide
Link : http://www.allitebooks.com/backtrack-5-wireless-penetration-testing-beginners-guide/
5) Black Hat Python
Link : http://www.allitebooks.com/black-hat-python/
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆMay you interested in those links :
1) The Hacker Playbook : Practical Guide To Penetration Testing
Link : http://www.allitebooks.com/the-hacker-playbook-practical-guide-to-penetration-testing/
2) The Hacker Playbook 2: Practical Guide To Penetration Testing
Link : http://www.allitebooks.com/the-hacker-playbook-2-practical-guide-to-penetration-testing/
3) Android Hacker's Handbook
Link : http://www.allitebooks.com/android-hackers-handbook/
4) BackTrack 5 Wireless Penetration Testing Beginner's Guide
Link : http://www.allitebooks.com/backtrack-5-wireless-penetration-testing-beginners-guide/
5) Black Hat Python
Link : http://www.allitebooks.com/black-hat-python/
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow to solve the problem that there is a black border around the Windows 10 monitor that cannot be displayed in full screen?
Some friends reported that in the actual application of their win10 system, the display cannot be displayed in full screen and there is a black border around it! How to solve the problem of a black border around the display in win10 cannot be displayed in full screen? Today, the editor brings you a solution to the black border around the win10 monitor that cannot be displayed in full screen. Interested friends should not miss it.
๐ฆHow to solve the problem that there is a black border around the Windows 10 monitor that cannot be displayed in full screen:
1) Press win+r to enter the run window, enter "regedit" and press Enter.
2) In the registry editor window, locate [HKEY_CURRENT_USER/SOFTWARE/BLIZZARD ENTERTAIMENT/WARCRAFTIII/Video].
3) Open the reshight file (screen height) in the left margin and change the numerical data inside to "768", then open the reswidth file (screen width) and change the numerical data to "1366".
4) In the blank area of โโthe desktop, right-click and select "Display Settings".
5) In the window, select "Advanced Display Settings", then change the resolution to "1366 x 768" and click Apply.
#fASTtIPS
@UndercodeTesting
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow to solve the problem that there is a black border around the Windows 10 monitor that cannot be displayed in full screen?
Some friends reported that in the actual application of their win10 system, the display cannot be displayed in full screen and there is a black border around it! How to solve the problem of a black border around the display in win10 cannot be displayed in full screen? Today, the editor brings you a solution to the black border around the win10 monitor that cannot be displayed in full screen. Interested friends should not miss it.
๐ฆHow to solve the problem that there is a black border around the Windows 10 monitor that cannot be displayed in full screen:
1) Press win+r to enter the run window, enter "regedit" and press Enter.
2) In the registry editor window, locate [HKEY_CURRENT_USER/SOFTWARE/BLIZZARD ENTERTAIMENT/WARCRAFTIII/Video].
3) Open the reshight file (screen height) in the left margin and change the numerical data inside to "768", then open the reswidth file (screen width) and change the numerical data to "1366".
4) In the blank area of โโthe desktop, right-click and select "Display Settings".
5) In the window, select "Advanced Display Settings", then change the resolution to "1366 x 768" and click Apply.
#fASTtIPS
@UndercodeTesting
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ# ๏ธโฃ What is HMAC (Hach-based Message Authentication Code) ?
Hach-based Message Authentication Code or HMAC is used to authenticate a message using hash functions.
Message authentication is an important mechanism in cybersecurity and is used to authenticate a message.
There are different ways and mechanisms for message authentication.
๐ป๐ด๐ '๐ ๐ ๐ ๐ฐ๐ ๐ :
1) Message
A message is data, text, image, or whatever we want to authenticate.
The message is verified for authenticity with the key by hashing them.
2) Key
The key is used by both parties to authenticate the message.
As stated earlier, the message and the key are used together and the hash value is calculated.
3) Hash function
The hash function is used to compute a hash value that is unique.
The hash function can be sha1, sha256, or use a different algorithm.
ยปEncryption and Hashing. Difference and application
@UndercodeTesting
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ# ๏ธโฃ What is HMAC (Hach-based Message Authentication Code) ?
Hach-based Message Authentication Code or HMAC is used to authenticate a message using hash functions.
Message authentication is an important mechanism in cybersecurity and is used to authenticate a message.
There are different ways and mechanisms for message authentication.
๐ป๐ด๐ '๐ ๐ ๐ ๐ฐ๐ ๐ :
1) Message
A message is data, text, image, or whatever we want to authenticate.
The message is verified for authenticity with the key by hashing them.
2) Key
The key is used by both parties to authenticate the message.
As stated earlier, the message and the key are used together and the hash value is calculated.
3) Hash function
The hash function is used to compute a hash value that is unique.
The hash function can be sha1, sha256, or use a different algorithm.
ยปEncryption and Hashing. Difference and application
@UndercodeTesting
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow to create an HMAC using OpenSSL
1) We can use the OpenSSL tool to generate some HMAC or hash value.
2) We will use the echo and openssl commands.
3) We will also use sha256 as our hash algorithm.
4) We will provide data or messages to HMAC, and then we will have it with the -hmac switch and mysecretkey as shown :
$ echo -n "secretmessage.txt" | openssl dgst -sha256 -hmac "mysecretkey"
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow to create an HMAC using OpenSSL
1) We can use the OpenSSL tool to generate some HMAC or hash value.
2) We will use the echo and openssl commands.
3) We will also use sha256 as our hash algorithm.
4) We will provide data or messages to HMAC, and then we will have it with the -hmac switch and mysecretkey as shown :
$ echo -n "secretmessage.txt" | openssl dgst -sha256 -hmac "mysecretkey"
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Which Programming language is the fastest in 2020, compared to 27 languages
4k
https://youtu.be/NSiVo1t5ncQ
4k
https://youtu.be/NSiVo1t5ncQ
YouTube
Fastest Programming language in 2020-2021
FOR MORE VISIT: https://www.UndercodeNews.com
ูููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููู
To watch more videos, please subscribe to the channel
You can also follow UndercodeNews on otherโฆ
ูููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููู
To watch more videos, please subscribe to the channel
You can also follow UndercodeNews on otherโฆ
๐ฆPHP Ransomware 2020:
Ransomware will self-destruct upon running, which means you only have one chance at decrypting your data.
Keep also in mind that each decryption file has a uniquely generated salt used in encryption and as such cannot be replaced with another decryption file.
๐ธ๐ฝ๐ ๐ ๐ฐ๐ป๐ป๐ธ๐ ๐ฐ๐ ๐ธ๐พ๐ฝ & ๐ ๐ ๐ฝ :
1) download the code https://github.com/ivan-sincek/php-ransomware
2) cd php-ransomware
3) Requires PHP v5.5.0 or greater because openssl_pbkdf2() is being used.
4) Copy \src\encrypt.php to your server's web root directory (e.g. to \xampp\htdocs\ on XAMPP).
Navigate to the encryption file with your preferred web browser.
5) Decryption file will be created automaticly after the encryption phase.
P.S. On web servers other than XAMPP (Apache) you might need to load OpenSSL and Multibyte String libraries within PHP.
6) In XAMPP it is as simple as uncommenting the following in the "php.ini" file:
> extension=php_openssl.dll
> extension=mbstring
โ git 2020
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Ransomware will self-destruct upon running, which means you only have one chance at decrypting your data.
Keep also in mind that each decryption file has a uniquely generated salt used in encryption and as such cannot be replaced with another decryption file.
๐ธ๐ฝ๐ ๐ ๐ฐ๐ป๐ป๐ธ๐ ๐ฐ๐ ๐ธ๐พ๐ฝ & ๐ ๐ ๐ฝ :
1) download the code https://github.com/ivan-sincek/php-ransomware
2) cd php-ransomware
3) Requires PHP v5.5.0 or greater because openssl_pbkdf2() is being used.
4) Copy \src\encrypt.php to your server's web root directory (e.g. to \xampp\htdocs\ on XAMPP).
Navigate to the encryption file with your preferred web browser.
5) Decryption file will be created automaticly after the encryption phase.
P.S. On web servers other than XAMPP (Apache) you might need to load OpenSSL and Multibyte String libraries within PHP.
6) In XAMPP it is as simple as uncommenting the following in the "php.ini" file:
> extension=php_openssl.dll
> extension=mbstring
โ git 2020
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
TODAY TOPICS :
EC-Council - Computer Hacking Forensic Investigator (CHFIv9)
https://t.me/UnderCodeTesting/11684
How JavaScript email attachments may carry malicious code ?
https://t.me/UnderCodeTesting/11685
Some good fresh sock5
https://t.me/UnderCodeTesting/11686
Vulnserver 5 tutorials + pictures (pdf)
https://t.me/UnderCodeTesting/11688
Linux privilege escalation auditing tool
https://t.me/UnderCodeTesting/11695
cdaengine0400.dll manual deletion method
https://t.me/UnderCodeTesting/11696
SUB DOMAINS FINDER TOOLS KALI
https://t.me/UnderCodeTesting/11697
May you interested in those links
(collection hack)
https://t.me/UnderCodeTesting/11698
How to solve the problem that there is a black border around the Windows 10 monitor that cannot be displayed in full screen?
https://t.me/UnderCodeTesting/11699
6 days Lab vulnhub tutorial
https://t.me/UnderCodeTesting/11700
What is HMAC (Hach-based Message Authentication Code) ?
https://t.me/UnderCodeTesting/11701
How to create an HMAC using OpenSSL tip
https://t.me/UnderCodeTesting/11702
Which Programming language is the fastest in 2020, compared to 27 languages
https://t.me/UnderCodeTesting/11703
PHP Ransomware 2020
https://t.me/UnderCodeTesting/11704
ENJOY FRIENDSโค๏ธ๐๐ป
@UndercodeTesting
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
EC-Council - Computer Hacking Forensic Investigator (CHFIv9)
https://t.me/UnderCodeTesting/11684
How JavaScript email attachments may carry malicious code ?
https://t.me/UnderCodeTesting/11685
Some good fresh sock5
https://t.me/UnderCodeTesting/11686
Vulnserver 5 tutorials + pictures (pdf)
https://t.me/UnderCodeTesting/11688
Linux privilege escalation auditing tool
https://t.me/UnderCodeTesting/11695
cdaengine0400.dll manual deletion method
https://t.me/UnderCodeTesting/11696
SUB DOMAINS FINDER TOOLS KALI
https://t.me/UnderCodeTesting/11697
May you interested in those links
(collection hack)
https://t.me/UnderCodeTesting/11698
How to solve the problem that there is a black border around the Windows 10 monitor that cannot be displayed in full screen?
https://t.me/UnderCodeTesting/11699
6 days Lab vulnhub tutorial
https://t.me/UnderCodeTesting/11700
What is HMAC (Hach-based Message Authentication Code) ?
https://t.me/UnderCodeTesting/11701
How to create an HMAC using OpenSSL tip
https://t.me/UnderCodeTesting/11702
Which Programming language is the fastest in 2020, compared to 27 languages
https://t.me/UnderCodeTesting/11703
PHP Ransomware 2020
https://t.me/UnderCodeTesting/11704
ENJOY FRIENDSโค๏ธ๐๐ป
@UndercodeTesting
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
YouTube
Fastest Programming language in 2020-2021
FOR MORE VISIT: https://www.UndercodeNews.com
ูููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููู
To watch more videos, please subscribe to the channel
You can also follow UndercodeNews on otherโฆ
ูููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููููู
To watch more videos, please subscribe to the channel
You can also follow UndercodeNews on otherโฆ