β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦New mobile phone battery is dangerous to charge for 12 hours in the first three times :
#Tip
>< How to choose a safe and reliable battery and how to use the mobile phone battery correctly to reduce accidents?
γγ
> When buying a mobile phone or changing the battery of a mobile phone, the shopping guide lady will repeatedly ask: charge the battery of the mobile phone for the first three times and charge it for 12 hours, which can extend the service life. In fact, this kind of mobile phone battery usage method is very incorrect, which can easily lead to danger. Mobile phone batteries, no matter how old or new, just need to be fully charged. If it is charged for twelve hours, the possibility of explosion will greatly increase.
γγ
> This also reminds us that we should stop as soon as the battery is fully charged when charging the mobile phone battery. This is often ignored by consumers. Normally charging the mobile phone, as long as two to four hours is enough. The habit of many consumers is to charge when sleeping at night and stop charging when they wake up the next day. In this way, the mobile phone battery far exceeds the normal charging time. Get up in the morning and take the cell phone battery that is being charged. We can obviously feel that the temperature of the cell phone battery is much higher. This is a dangerous sign.
γγ
> In order to prevent the occurrence of mobile phone battery explosion accidents, the most credible is to use original batteries. At present, there are a lot of unqualified fake and shoddy mobile phone batteries on the market, and the price is relatively cheap. Many consumers prefer to choose cheap "counterfeit batteries" when changing batteries. This creates hidden dangers for mobile phone battery accidents. Experts suggest that even if you change the battery of your mobile phone, it is best to buy the original manufacturer's mobile phone battery at a regular store.
γγ
> In addition, high temperature occasions, violent impact, and direct connection of the positive and negative poles of the mobile phone battery with conductors, etc., can easily cause the mobile phone battery to explode.
γγ
> Not afraid of ten thousand, just in case. Now mobile phones have become a must-have for us to carry around, and in many cases are inseparable. The correct choice and use of mobile phone batteries, avoid accidents, and build a safety line of defense for our lives are the wishes of every consumer.
γγ
>Finally, give consumers a warm reminder: try not to put the mobile phone directly in your pocket, so that even if an accident occurs, there will be a buffer zone to avoid possible injuries.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦New mobile phone battery is dangerous to charge for 12 hours in the first three times :
#Tip
>< How to choose a safe and reliable battery and how to use the mobile phone battery correctly to reduce accidents?
γγ
> When buying a mobile phone or changing the battery of a mobile phone, the shopping guide lady will repeatedly ask: charge the battery of the mobile phone for the first three times and charge it for 12 hours, which can extend the service life. In fact, this kind of mobile phone battery usage method is very incorrect, which can easily lead to danger. Mobile phone batteries, no matter how old or new, just need to be fully charged. If it is charged for twelve hours, the possibility of explosion will greatly increase.
γγ
> This also reminds us that we should stop as soon as the battery is fully charged when charging the mobile phone battery. This is often ignored by consumers. Normally charging the mobile phone, as long as two to four hours is enough. The habit of many consumers is to charge when sleeping at night and stop charging when they wake up the next day. In this way, the mobile phone battery far exceeds the normal charging time. Get up in the morning and take the cell phone battery that is being charged. We can obviously feel that the temperature of the cell phone battery is much higher. This is a dangerous sign.
γγ
> In order to prevent the occurrence of mobile phone battery explosion accidents, the most credible is to use original batteries. At present, there are a lot of unqualified fake and shoddy mobile phone batteries on the market, and the price is relatively cheap. Many consumers prefer to choose cheap "counterfeit batteries" when changing batteries. This creates hidden dangers for mobile phone battery accidents. Experts suggest that even if you change the battery of your mobile phone, it is best to buy the original manufacturer's mobile phone battery at a regular store.
γγ
> In addition, high temperature occasions, violent impact, and direct connection of the positive and negative poles of the mobile phone battery with conductors, etc., can easily cause the mobile phone battery to explode.
γγ
> Not afraid of ten thousand, just in case. Now mobile phones have become a must-have for us to carry around, and in many cases are inseparable. The correct choice and use of mobile phone batteries, avoid accidents, and build a safety line of defense for our lives are the wishes of every consumer.
γγ
>Finally, give consumers a warm reminder: try not to put the mobile phone directly in your pocket, so that even if an accident occurs, there will be a buffer zone to avoid possible injuries.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦run postfix with smtp authentication (sasldb) in a docker container. TLS and OpenDKIM support are optional.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) clone https://github.com/catatnight/docker-postfix
2) cd docker-postfix
3) Create postfix container with smtp authentication
$ sudo docker run -p 25:25 \
-e maildomain=mail.example.com -e smtp_user=user:pwd \
--name postfix -d catatnight/postfix
4) # Set multiple user credentials: -e smtp_user=user1:pwd1,user2:pwd2,...,userN:pwdN
Enable OpenDKIM: save your domain key .private in /path/to/domainkeys
$ sudo docker run -p 25:25 \
-e maildomain=mail.example.com -e smtp_user=user:pwd \
-v /path/to/domainkeys:/etc/opendkim/domainkeys \
--name postfix -d catatnight/postfix
5) Enable TLS(587): save your SSL certificates .key and .crt to /path/to/certs
$ sudo docker run -p 587:587 \
-e maildomain=mail.example.com -e smtp_user=user:pwd \
-v /path/to/certs:/etc/postfix/certs \
--name postfix -d catatnight/postfix
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦run postfix with smtp authentication (sasldb) in a docker container. TLS and OpenDKIM support are optional.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) clone https://github.com/catatnight/docker-postfix
2) cd docker-postfix
3) Create postfix container with smtp authentication
$ sudo docker run -p 25:25 \
-e maildomain=mail.example.com -e smtp_user=user:pwd \
--name postfix -d catatnight/postfix
4) # Set multiple user credentials: -e smtp_user=user1:pwd1,user2:pwd2,...,userN:pwdN
Enable OpenDKIM: save your domain key .private in /path/to/domainkeys
$ sudo docker run -p 25:25 \
-e maildomain=mail.example.com -e smtp_user=user:pwd \
-v /path/to/domainkeys:/etc/opendkim/domainkeys \
--name postfix -d catatnight/postfix
5) Enable TLS(587): save your SSL certificates .key and .crt to /path/to/certs
$ sudo docker run -p 587:587 \
-e maildomain=mail.example.com -e smtp_user=user:pwd \
-v /path/to/certs:/etc/postfix/certs \
--name postfix -d catatnight/postfix
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - catatnight/docker-postfix: run postfix with smtp authentication (sasldb) in a docker container
run postfix with smtp authentication (sasldb) in a docker container - catatnight/docker-postfix
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HACK ANY LINUX :
F E A T U R E S :
QEMU emulation.
Currently supporting x86_64, i386, arm, mips, aarch64.
Small images built w/ buildroot.
Radare2 based static analysis.
Dynamic (behavioral) analysis using SystemTap kernel modules - captured syscalls, openfiles, process trees.
Network statistics and analysis of DNS, HTTP, Telnet and IRC communication.
Endpoints analysis and blacklists configuration.
Scaled with celery and RabbitMQ.
REST API | frontend.
Extensible through sub-analysis modules and custom images.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) $ git clone https://github.com/danieluhricek/lisa
2) $ cd lisa
Build.
# docker-compose build
3) Run the sandbox (default location: http://localhost:4242).
# docker-compose up
π¦Configuration
MaxMind GeoLite2
Sign up to get your API key. Use API key in docker-compose.yml build args section.
.
.
worker:
image: lisa-worker
build:
context: .
dockerfile: ./docker/worker/Dockerfile
args:
maxmind_key: YOUR_KEY
volumes:
- "./data/storage:/home/lisa/data/storage"
MORE CONFIG
https://github.com/danieluhricek/LiSa
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HACK ANY LINUX :
F E A T U R E S :
QEMU emulation.
Currently supporting x86_64, i386, arm, mips, aarch64.
Small images built w/ buildroot.
Radare2 based static analysis.
Dynamic (behavioral) analysis using SystemTap kernel modules - captured syscalls, openfiles, process trees.
Network statistics and analysis of DNS, HTTP, Telnet and IRC communication.
Endpoints analysis and blacklists configuration.
Scaled with celery and RabbitMQ.
REST API | frontend.
Extensible through sub-analysis modules and custom images.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) $ git clone https://github.com/danieluhricek/lisa
2) $ cd lisa
Build.
# docker-compose build
3) Run the sandbox (default location: http://localhost:4242).
# docker-compose up
π¦Configuration
MaxMind GeoLite2
Sign up to get your API key. Use API key in docker-compose.yml build args section.
.
.
worker:
image: lisa-worker
build:
context: .
dockerfile: ./docker/worker/Dockerfile
args:
maxmind_key: YOUR_KEY
volumes:
- "./data/storage:/home/lisa/data/storage"
MORE CONFIG
https://github.com/danieluhricek/LiSa
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - danieluhricek/LiSa: Sandbox for automated Linux malware analysis.
Sandbox for automated Linux malware analysis. Contribute to danieluhricek/LiSa development by creating an account on GitHub.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦β XSS-Finder: a super powerful and advanced cross-site scripting scanner :
F E A T U R E S :
Blind XSS
Saved XSS using file
Persistent XSS using file
Reflected XSS
Reflecting XSS URLs in Paths
DOM XSS
Java XSS Special Payloads
By eshirovannye page XSS
Form-based XSS
H TTP Link XSS
HTTP Host XSS
HTTP Referer XSS
HTTP XSS cookies
HTTP Location XSS
Dump server values
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
Dump and write information
1) Dumper can create parameters for server, form, etc.
The registrar will write the response to the results file
Use grep to check for reflections
DOM scanner for sync
Example:
<script> var x = document.URL.substring (document.URL.indexOf (βname =β) + 5); document.write (name + β!β); </script>
Payloads
Use payloads, update payloads, add more payloads
2) False positives
Make sure to remove all new lines, tabs, etc. to reduce false positives in reports
π¦Installation on Kali, ParrotOS, Termux
1) git clone https://github.com/tegal1337/XSS-Finder
2) cd XSS-Finder
chmod u + x Kali_Installer.ss && ./Kali_Installer.sh
chmod u + x Parrot_Os_Installer.sh && ./Parrot_Os_Installer.sh
chmod u + x Termux_Installer.sh && ./interface.sh
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦β XSS-Finder: a super powerful and advanced cross-site scripting scanner :
F E A T U R E S :
Blind XSS
Saved XSS using file
Persistent XSS using file
Reflected XSS
Reflecting XSS URLs in Paths
DOM XSS
Java XSS Special Payloads
By eshirovannye page XSS
Form-based XSS
H TTP Link XSS
HTTP Host XSS
HTTP Referer XSS
HTTP XSS cookies
HTTP Location XSS
Dump server values
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
Dump and write information
1) Dumper can create parameters for server, form, etc.
The registrar will write the response to the results file
Use grep to check for reflections
DOM scanner for sync
Example:
<script> var x = document.URL.substring (document.URL.indexOf (βname =β) + 5); document.write (name + β!β); </script>
Payloads
Use payloads, update payloads, add more payloads
2) False positives
Make sure to remove all new lines, tabs, etc. to reduce false positives in reports
π¦Installation on Kali, ParrotOS, Termux
1) git clone https://github.com/tegal1337/XSS-Finder
2) cd XSS-Finder
chmod u + x Kali_Installer.ss && ./Kali_Installer.sh
chmod u + x Parrot_Os_Installer.sh && ./Parrot_Os_Installer.sh
chmod u + x Termux_Installer.sh && ./interface.sh
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - tegal1337/XSS-Finder: World's most Powerful and Advanced Cross Site Scripting Software
World's most Powerful and Advanced Cross Site Scripting Software - GitHub - tegal1337/XSS-Finder: World's most Powerful and Advanced Cross Site Scripting Software
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π How to find out the creation time of a file on Linux using Debugfs :
How to find the creation time of a file using debugfs
To find out the creation time of a file, you first need to find the inode number of the target file using the stat command.
The stat command is a command line tool used to display detailed information about a file's metadata, for example:
-file size
-Inode number
-File UID and GID
-I / O block
-Access times, modifications and changes.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) You can use the stat command in its basic form to check the inode number of a file using the syntax:
$ stat filename
2) For instance:
$ stat file1.txt
To skip all other information and just display only the inode number, use the syntax:
$ stat -c% i file_name
For instance:
$ stat -c% i file1.txt
Once you have the inode number, you can easily navigate to getting the file creation time with the debugfs command using the syntax shown:
$ sudo debugfs -R 'stat <inode number>' DEVICE
DEVICE is the block device where your file resides, for example / dev / sda1, / dev / sda2, etc.
3) To check the block device, run the command:
$ lsblk
Using the inode number we got earlier, the command looks like this:
$ sudo debugfs -R 'stat < 951356 >' / dev / sda
We see that the file was created on ... 2020 at 11:48:19
Alternatively, instead of specifying the inode number, you can pass the full path to the file, as shown here:
$ sudo debugfs -R 'stat /home/itsecforu/file1.txt ' / dev / sda1
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π How to find out the creation time of a file on Linux using Debugfs :
How to find the creation time of a file using debugfs
To find out the creation time of a file, you first need to find the inode number of the target file using the stat command.
The stat command is a command line tool used to display detailed information about a file's metadata, for example:
-file size
-Inode number
-File UID and GID
-I / O block
-Access times, modifications and changes.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) You can use the stat command in its basic form to check the inode number of a file using the syntax:
$ stat filename
2) For instance:
$ stat file1.txt
To skip all other information and just display only the inode number, use the syntax:
$ stat -c% i file_name
For instance:
$ stat -c% i file1.txt
Once you have the inode number, you can easily navigate to getting the file creation time with the debugfs command using the syntax shown:
$ sudo debugfs -R 'stat <inode number>' DEVICE
DEVICE is the block device where your file resides, for example / dev / sda1, / dev / sda2, etc.
3) To check the block device, run the command:
$ lsblk
Using the inode number we got earlier, the command looks like this:
$ sudo debugfs -R 'stat < 951356 >' / dev / sda
We see that the file was created on ... 2020 at 11:48:19
Alternatively, instead of specifying the inode number, you can pass the full path to the file, as shown here:
$ sudo debugfs -R 'stat /home/itsecforu/file1.txt ' / dev / sda1
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 Update #Decryption - A command line that recreates the famous data decryption effect seen in the 1992 movie Sneakers.
> This command works on piped data. Pipe any ASCII or UTF-8 text to nms, and it will apply the Hollywood effect, initially showing encrypted data, then starting a decryption sequence to reveal the original plain-text characters.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) $ git clone https://github.com/bartobri/no-more-secrets.git
2) $ cd ./no-more-secrets
3) $ make nms
4) $ make sneakers ## Optional
5) $ sudo make install
π¦Install with Ncurses Support
If your terminal does not support ANSI/VT100 escape sequences, the effect may not render properly. This project provides a ncurses implementation for such cases. You will need the ncurses library installed. Install this library from your package manager. Next, follow these instructions:
$ git clone https://github.com/bartobri/no-more-secrets.git
$ cd ./no-more-secrets
$ make nms-ncurses
$ make sneakers-ncurses ## Optional
$ sudo make install
π¦HOW TO USE ?
nms works on piped data. Pipe any ASCII or UTF-8 characters to it and enjoy the magic. In the below examples, I use a simple directory listing.
$ ls -l | nms
$ ls -l | nms -a // Set auto-decrypt flag
$ ls -l | nms -s // Set flag to mask space characters
$ ls -l | nms -f green // Set foreground color to green
$ ls -l | nms -c // Clear screen
$ nms -v // Display version
Note that by default, after the initial encrypted characters are displayed, nms will wait for the user to press a key before initiating the decryption sequence. This is how the it is depicted in the movie.
β GIT 2020 TOPIC
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 Update #Decryption - A command line that recreates the famous data decryption effect seen in the 1992 movie Sneakers.
> This command works on piped data. Pipe any ASCII or UTF-8 text to nms, and it will apply the Hollywood effect, initially showing encrypted data, then starting a decryption sequence to reveal the original plain-text characters.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) $ git clone https://github.com/bartobri/no-more-secrets.git
2) $ cd ./no-more-secrets
3) $ make nms
4) $ make sneakers ## Optional
5) $ sudo make install
π¦Install with Ncurses Support
If your terminal does not support ANSI/VT100 escape sequences, the effect may not render properly. This project provides a ncurses implementation for such cases. You will need the ncurses library installed. Install this library from your package manager. Next, follow these instructions:
$ git clone https://github.com/bartobri/no-more-secrets.git
$ cd ./no-more-secrets
$ make nms-ncurses
$ make sneakers-ncurses ## Optional
$ sudo make install
π¦HOW TO USE ?
nms works on piped data. Pipe any ASCII or UTF-8 characters to it and enjoy the magic. In the below examples, I use a simple directory listing.
$ ls -l | nms
$ ls -l | nms -a // Set auto-decrypt flag
$ ls -l | nms -s // Set flag to mask space characters
$ ls -l | nms -f green // Set foreground color to green
$ ls -l | nms -c // Clear screen
$ nms -v // Display version
Note that by default, after the initial encrypted characters are displayed, nms will wait for the user to press a key before initiating the decryption sequence. This is how the it is depicted in the movie.
β GIT 2020 TOPIC
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - bartobri/no-more-secrets: A command line tool that recreates the famous data decryption effect seen in the 1992 movieβ¦
A command line tool that recreates the famous data decryption effect seen in the 1992 movie Sneakers. - bartobri/no-more-secrets
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to track traffic from a smartphone using Wireshark & hack wifi/phone.... ALL VIDEOS:
https://www.youtube.com/watch?v=4_7A8Ikp5Cc
https://www.youtube.com/watch?v=50DNcpDRjB8
https://hackertarget.com/wireshark-tutorial-and-cheat-sheet/
https://www.youtube.com/watch?v=Yo8zGbCbqd0
https://www.youtube.com/watch?v=jvuiI1Leg6w
https://www.youtube.com/watch?v=uhA8qLCj1Z8
https://www.youtube.com/watch?v=Lu05owzpSb8
well now your's expert in wireshark
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to track traffic from a smartphone using Wireshark & hack wifi/phone.... ALL VIDEOS:
https://www.youtube.com/watch?v=4_7A8Ikp5Cc
https://www.youtube.com/watch?v=50DNcpDRjB8
https://hackertarget.com/wireshark-tutorial-and-cheat-sheet/
https://www.youtube.com/watch?v=Yo8zGbCbqd0
https://www.youtube.com/watch?v=jvuiI1Leg6w
https://www.youtube.com/watch?v=uhA8qLCj1Z8
https://www.youtube.com/watch?v=Lu05owzpSb8
well now your's expert in wireshark
β β β Uππ»βΊπ«Δπ¬πβ β β β
YouTube
Wireshark Tutorial - Installation and Password sniffing
In this Wireshark Tutorial, I demonstrate how to install Wireshark and then capturing packets with Wireshark. Get my full Wireshark Course for $10 here on Udemy: http://bit.ly/2IXZnn8 or GNS3 Academy: http://bit.ly/2J4PzIb
I analyze Telnet and HTTP in thisβ¦
I analyze Telnet and HTTP in thisβ¦
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Install TWRP on Android devices :
1) Switch off your device. Press Volume Down, Home and Power button altogether until you see the warning triangle. Now press the Volume Up button to enter into Download Mode.
2) Now connect your device to the PC via USB cable.
3) Run Odin3 v3.07.exe with Administrator privileges
4) You will see the COM port number in the ID: COM box, which means the connection has been established successfully.
5) In the Odin window, click on the PDA button and select the openrecovery-twrp-xy....tar
6) Make sure Auto-Reboot and F.Reset Time are checked.
7) Click on the Start button to initiate the process and observe the on-going process in the Message screen on the bottom-left of the Odin window.
8) Once the process is complete, you will be indicated by a PASS message.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Install TWRP on Android devices :
1) Switch off your device. Press Volume Down, Home and Power button altogether until you see the warning triangle. Now press the Volume Up button to enter into Download Mode.
2) Now connect your device to the PC via USB cable.
3) Run Odin3 v3.07.exe with Administrator privileges
4) You will see the COM port number in the ID: COM box, which means the connection has been established successfully.
5) In the Odin window, click on the PDA button and select the openrecovery-twrp-xy....tar
6) Make sure Auto-Reboot and F.Reset Time are checked.
7) Click on the Start button to initiate the process and observe the on-going process in the Message screen on the bottom-left of the Odin window.
8) Once the process is complete, you will be indicated by a PASS message.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Wifi Hacking/network applications 2020 new list
https://github.com/kost/nmap-android/releases
https://play.google.com/store/apps/details?id=com.tester.wpswpatester&hl=en
https://play.google.com/store/apps/details?id=teampro.wifi.wpsconnect&hl=en_US
https://sourceforge.net/projects/netspoof/
https://github.com/robclemons/Arpspoof
https://play.google.com/store/apps/details?id=com.xti.wifiwarden&hl=en_IN
https://play.google.com/store/apps/details?id=com.ngb.wpsconnect
https://play.google.com/store/apps/details?id=com.overlook.android.fing
https://play.google.com/store/apps/details?id=lksystems.wifiintruder
https://play.google.com/store/apps/details?id=com.arcai.netcut
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Wifi Hacking/network applications 2020 new list
https://github.com/kost/nmap-android/releases
https://play.google.com/store/apps/details?id=com.tester.wpswpatester&hl=en
https://play.google.com/store/apps/details?id=teampro.wifi.wpsconnect&hl=en_US
https://sourceforge.net/projects/netspoof/
https://github.com/robclemons/Arpspoof
https://play.google.com/store/apps/details?id=com.xti.wifiwarden&hl=en_IN
https://play.google.com/store/apps/details?id=com.ngb.wpsconnect
https://play.google.com/store/apps/details?id=com.overlook.android.fing
https://play.google.com/store/apps/details?id=lksystems.wifiintruder
https://play.google.com/store/apps/details?id=com.arcai.netcut
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
Releases Β· kost/nmap-android
Nmap on Android - Makefile/diff/scripts to build it with Android NDK - kost/nmap-android
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π How to configure Apache as an external proxy for Node.js :
1) Step 1 - Creating the Sample Application
Since you are here πat the you must be running Node.js application at some port.
We assume that you are running your application on port 3000.
2) For demonstration, I'll create a sample web application in Node.js and run it on port 3000.
So that it is easier for you to understand.
vi myapp.js
3) Then add the following content to your javascript file.
var http = require ('http');
http.createServer (function (req, res) {
res.writeHead (200, {'Content-Type': 'text / plain'});
res.end ('Hello World');
}). listen (3000, "127.0.0.1");
console.log ('Server running at http://127.0.0.1:3000/');
4) Your Node application is ready to run on port 3000. Let's run the Node.js application in the background.
node myapp.js &
And we will access this application in the browser.
5) Step 2 - Install Apache Server
sudo apt install apache2 ### Debians of the system
sudo yum install httpd ### CentOS 7/6
sudo dnf install httpd ### Fedora & CentOS 8
6) After installing Apache web server, you must have the proxy module enabled.
This module is included in Apache for users who have installed using rpm packages.
7) If you have not enabled it, change your Apache config /etc/httpd/conf/httpd.conf or for Apache 2.4 /etc/httpd/conf.modules.d/00-proxy.conf and uncomment the following lines or put them in a file.
8) LoadModule proxy_module modules / mod_proxy.so
LoadModule proxy_http_module modules / mod_proxy_http.so
For Debian based systems use the following command to enable the Proxy module with Apache.
sudo a2enmod proxy proxy_http
8) Step 3 - Configure Apache VirtualHost
Create a virtual host configuration file for your domain
π¦ Debian Based Systems :
sudo vim /etc/apache2/sites-enabled/example.com.conf
### Redhat based systems
sudo vim /etc/httpd/conf.d/example.com.conf
and add the following content.
\
< VirtualHost *: 80 >
ServerName example . com
ProxyRequests On
ProxyPass / http : / / localhost : 3000
ProxyPassReverse / http : / / localhost : 3000
< / VirtualHost >
Β» Check the setup
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π How to configure Apache as an external proxy for Node.js :
1) Step 1 - Creating the Sample Application
Since you are here πat the you must be running Node.js application at some port.
We assume that you are running your application on port 3000.
2) For demonstration, I'll create a sample web application in Node.js and run it on port 3000.
So that it is easier for you to understand.
vi myapp.js
3) Then add the following content to your javascript file.
var http = require ('http');
http.createServer (function (req, res) {
res.writeHead (200, {'Content-Type': 'text / plain'});
res.end ('Hello World');
}). listen (3000, "127.0.0.1");
console.log ('Server running at http://127.0.0.1:3000/');
4) Your Node application is ready to run on port 3000. Let's run the Node.js application in the background.
node myapp.js &
And we will access this application in the browser.
5) Step 2 - Install Apache Server
sudo apt install apache2 ### Debians of the system
sudo yum install httpd ### CentOS 7/6
sudo dnf install httpd ### Fedora & CentOS 8
6) After installing Apache web server, you must have the proxy module enabled.
This module is included in Apache for users who have installed using rpm packages.
7) If you have not enabled it, change your Apache config /etc/httpd/conf/httpd.conf or for Apache 2.4 /etc/httpd/conf.modules.d/00-proxy.conf and uncomment the following lines or put them in a file.
8) LoadModule proxy_module modules / mod_proxy.so
LoadModule proxy_http_module modules / mod_proxy_http.so
For Debian based systems use the following command to enable the Proxy module with Apache.
sudo a2enmod proxy proxy_http
8) Step 3 - Configure Apache VirtualHost
Create a virtual host configuration file for your domain
π¦ Debian Based Systems :
sudo vim /etc/apache2/sites-enabled/example.com.conf
### Redhat based systems
sudo vim /etc/httpd/conf.d/example.com.conf
and add the following content.
\
< VirtualHost *: 80 >
ServerName example . com
ProxyRequests On
ProxyPass / http : / / localhost : 3000
ProxyPassReverse / http : / / localhost : 3000
< / VirtualHost >
Β» Check the setup
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦What is DOM (Document Object Model)?
The DOM provides a structured and hierarchical presentation of a document.
The DOM is primarily used for web pages where they contain many different elements related to each other.
The DOM can be edited with JavaScript which will reflect the web page.
The DOM provides object-oriented presentations for JavaScript where these objects can be used for manipulation.
π¦ DOM standard:
The DOM standard was created by the W3C in 1998 under the name Dom Level 1, which provides a complete model for all HTML or XML documents.
DOM Level 2 was published in 200, which introduces the getElementByID function.
DOM Level 3 published in 2004, added XPath support and event handling.
DOM Level 4 was published in 2015 by the WHATWG and W3C.
π¦How do I access the DOM?
The DOM can be accessed in a variety of ways and with tools such as JavaScript, the web browser's DOM editor, etc.
But for making robust changes and automating them, JavaScript is the best way to go.
JavaScript stores the complete DOM in the document with the object name.
We can use various properties of the document object to access DOM objects.
document.head
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦What is DOM (Document Object Model)?
The DOM provides a structured and hierarchical presentation of a document.
The DOM is primarily used for web pages where they contain many different elements related to each other.
The DOM can be edited with JavaScript which will reflect the web page.
The DOM provides object-oriented presentations for JavaScript where these objects can be used for manipulation.
π¦ DOM standard:
The DOM standard was created by the W3C in 1998 under the name Dom Level 1, which provides a complete model for all HTML or XML documents.
DOM Level 2 was published in 200, which introduces the getElementByID function.
DOM Level 3 published in 2004, added XPath support and event handling.
DOM Level 4 was published in 2015 by the WHATWG and W3C.
π¦How do I access the DOM?
The DOM can be accessed in a variety of ways and with tools such as JavaScript, the web browser's DOM editor, etc.
But for making robust changes and automating them, JavaScript is the best way to go.
JavaScript stores the complete DOM in the document with the object name.
We can use various properties of the document object to access DOM objects.
document.head
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦FREE UDEMY #LIMITED
Setting up Android Studio and Emulators
Basics of adb
Decompiling apks
Insecure Logging
Hardcoding Issues
Insecure Data Storage
Input Valdiation Issues
Drozer
Finding Attack Surfaces
Access Control Issues
Content Provider Injections
General Bug Hunting Tips
https://www.udemy.com/course/foundations-of-hacking-and-pentesting-android-apps/
Setting up Android Studio and Emulators
Basics of adb
Decompiling apks
Insecure Logging
Hardcoding Issues
Insecure Data Storage
Input Valdiation Issues
Drozer
Finding Attack Surfaces
Access Control Issues
Content Provider Injections
General Bug Hunting Tips
https://www.udemy.com/course/foundations-of-hacking-and-pentesting-android-apps/
Udemy
Free Ethical Hacking Tutorial - Foundations of Hacking and Pentesting Android Apps
Learn how to hack Android apps, and find vulnerabilties - Free Course
TODAY TOPIC :
COMMAND AND CONTROL WEBSITE/WMI
https://t.me/UnderCodeTesting/11804
https://t.me/UnderCodeTesting/11805
SQLMAP GUIDE & ALOT OF STUFFS PDF
https://t.me/UnderCodeTesting/11806
Become a professional trader 4GB
https://t.me/UnderCodeTesting/11815
New mobile phone battery is dangerous to charge for 12 hours in the first three times #Tip
https://t.me/UnderCodeTesting/11816
run postfix with smtp authentication (sasldb) in a docker container. TLS and OpenDKIM support are optional #tool
https://t.me/UnderCodeTesting/11817
HACK ANY LINUX
https://t.me/UnderCodeTesting/11819
XSS-Finder: a super powerful and advanced cross-site scripting scanner
https://t.me/UnderCodeTesting/11820
How to find out the creation time of a file on Linux using Debugfs
https://t.me/UnderCodeTesting/11821
2020 Update #Decryption - A command line that recreates the famous data decryption effect seen in the 1992 movie Sneakers.
https://t.me/UnderCodeTesting/11822
How to track traffic from a smartphone using Wireshark & hack wifi/phone.... ALL VIDEOS
https://t.me/UnderCodeTesting/11823
Install TWRP on Android devices
https://t.me/UnderCodeTesting/11824
A Lessons about database
https://t.me/UnderCodeTesting/11825
Wifi Hacking/network applications 2020 new list
https://t.me/UnderCodeTesting/11826
How to configure Apache as an external proxy for Node.js
https://t.me/UnderCodeTesting/11827
What is DOM (Document Object Model)?
Setting up Android Studio and Emulators
Basics of adb
Decompiling apks
Insecure Logging
Hardcoding Issues
Insecure Data Storage
Input Valdiation Issues
Drozer
Finding Attack Surfaces
Access Control Issues
Content Provider Injections
General Bug Hunting Tips
https://t.me/UnderCodeTesting/11828
LEANR Awesome course
https://t.me/UnderCodeTesting/11829
COMMAND AND CONTROL WEBSITE/WMI
https://t.me/UnderCodeTesting/11804
https://t.me/UnderCodeTesting/11805
SQLMAP GUIDE & ALOT OF STUFFS PDF
https://t.me/UnderCodeTesting/11806
Become a professional trader 4GB
https://t.me/UnderCodeTesting/11815
New mobile phone battery is dangerous to charge for 12 hours in the first three times #Tip
https://t.me/UnderCodeTesting/11816
run postfix with smtp authentication (sasldb) in a docker container. TLS and OpenDKIM support are optional #tool
https://t.me/UnderCodeTesting/11817
HACK ANY LINUX
https://t.me/UnderCodeTesting/11819
XSS-Finder: a super powerful and advanced cross-site scripting scanner
https://t.me/UnderCodeTesting/11820
How to find out the creation time of a file on Linux using Debugfs
https://t.me/UnderCodeTesting/11821
2020 Update #Decryption - A command line that recreates the famous data decryption effect seen in the 1992 movie Sneakers.
https://t.me/UnderCodeTesting/11822
How to track traffic from a smartphone using Wireshark & hack wifi/phone.... ALL VIDEOS
https://t.me/UnderCodeTesting/11823
Install TWRP on Android devices
https://t.me/UnderCodeTesting/11824
A Lessons about database
https://t.me/UnderCodeTesting/11825
Wifi Hacking/network applications 2020 new list
https://t.me/UnderCodeTesting/11826
How to configure Apache as an external proxy for Node.js
https://t.me/UnderCodeTesting/11827
What is DOM (Document Object Model)?
Setting up Android Studio and Emulators
Basics of adb
Decompiling apks
Insecure Logging
Hardcoding Issues
Insecure Data Storage
Input Valdiation Issues
Drozer
Finding Attack Surfaces
Access Control Issues
Content Provider Injections
General Bug Hunting Tips
https://t.me/UnderCodeTesting/11828
LEANR Awesome course
https://t.me/UnderCodeTesting/11829
Hacking The Art of Exploitation Ebook
Download Link : http://www.mediafire.com/file/ht5dy5dwmf4h0j7/hacking-the-art-of-exploitation.pdf
Download Link : http://www.mediafire.com/file/ht5dy5dwmf4h0j7/hacking-the-art-of-exploitation.pdf
MediaFire
hacking-the-art-of-exploitation
MediaFire is a simple to use free service that lets you put all your photos, documents, music, and video in a single place so you can access them anywhere and share them everywhere.
The Hacker's Underground Hand Book.
Download Link : http://www.mediafire.com/file/kb94m3pa9zahrv9/The-Hackers-Underground-Handbook.pdf
Download Link : http://www.mediafire.com/file/kb94m3pa9zahrv9/The-Hackers-Underground-Handbook.pdf
MediaFire
The-Hackers-Underground-Handbook
MediaFire is a simple to use free service that lets you put all your photos, documents, music, and video in a single place so you can access them anywhere and share them everywhere.