β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Clone sim card tools & utilities- free & paid :
Download URL: http://www.mobiledit.com/sim-cloning/
Download URL: https://www.amazon.com/Cellphone-Reader-Cloner-Writer-Backup/dp/B00ZWNGPX6/
Download URL: https://www.dekart.com/products/card_management/sim_explorer/
Download URL: http://mister-sim.software.informer.com/
https://ssl-download.wondershare.com/win-drfone_full3368.exe?_ga=2.134805297.1511422653.1607299188-871126172.1605370455
https://www.coolmuster.com/mobile-transfer.html
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Clone sim card tools & utilities- free & paid :
Download URL: http://www.mobiledit.com/sim-cloning/
Download URL: https://www.amazon.com/Cellphone-Reader-Cloner-Writer-Backup/dp/B00ZWNGPX6/
Download URL: https://www.dekart.com/products/card_management/sim_explorer/
Download URL: http://mister-sim.software.informer.com/
https://ssl-download.wondershare.com/win-drfone_full3368.exe?_ga=2.134805297.1511422653.1607299188-871126172.1605370455
https://www.coolmuster.com/mobile-transfer.html
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦#Hacking A Sponge minecraft server plugin for second factor authentication:
1) SpongeCommon introduced a bug for not capturing the inventory changes on crafting with number press usage. This allows inventory item duplication in combination with FlexibleLogin if the user is not logged in. Sponge fixed in the mentioned above build and commit. So you should update your server version. If that's not possible, FlexibleLogin 0.18.1 includes a workaround. Alternative you could remove the inventory until the player logs in.
2) FlexibleLogin had an incorrect permission check for using the change password command. This allowed unauthorized players to use the command. There is no known usage that this was actively used.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) download:
https://github.com/games647/FlexibleLogin/releases
2) https://www.youtube.com/watch?v=wpYc0hfbL24
3) User Commands
User commands:
/reg /register <password> <password> - Registers using a specific password
/register - Generates your secret code for TOTP
/changepw /cp /changepassword <password> <password> - Changes your current password
/log /l /login <password|code> - Login using your password or time based code
/logout - Logs you out
/mail /setemail - Sets your mail address
/forgot /forgotpassword - Sends a recovery mail to the mail address
/unregister <uuid|name> - delete an account
Admin commands: (you can use /flexiblelogin as an alias)
/fl <reload|rl> - reloads the config
/fl forcelogin <name> - Force login the user
/fl <accounts|acc> <name|ip> - Get list of user accounts
/fl <unregister|unreg> <name|uuid|--all> - Deletes the account of a user or all using the -a flag
/fl <register|reg> <name|uuid> <pass> - Register the user with a specific password
/fl <resetpw|resetpassword> <name> - Sets a new temp password for a new user
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦#Hacking A Sponge minecraft server plugin for second factor authentication:
1) SpongeCommon introduced a bug for not capturing the inventory changes on crafting with number press usage. This allows inventory item duplication in combination with FlexibleLogin if the user is not logged in. Sponge fixed in the mentioned above build and commit. So you should update your server version. If that's not possible, FlexibleLogin 0.18.1 includes a workaround. Alternative you could remove the inventory until the player logs in.
2) FlexibleLogin had an incorrect permission check for using the change password command. This allowed unauthorized players to use the command. There is no known usage that this was actively used.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) download:
https://github.com/games647/FlexibleLogin/releases
2) https://www.youtube.com/watch?v=wpYc0hfbL24
3) User Commands
User commands:
/reg /register <password> <password> - Registers using a specific password
/register - Generates your secret code for TOTP
/changepw /cp /changepassword <password> <password> - Changes your current password
/log /l /login <password|code> - Login using your password or time based code
/logout - Logs you out
/mail /setemail - Sets your mail address
/forgot /forgotpassword - Sends a recovery mail to the mail address
/unregister <uuid|name> - delete an account
Admin commands: (you can use /flexiblelogin as an alias)
/fl <reload|rl> - reloads the config
/fl forcelogin <name> - Force login the user
/fl <accounts|acc> <name|ip> - Get list of user accounts
/fl <unregister|unreg> <name|uuid|--all> - Deletes the account of a user or all using the -a flag
/fl <register|reg> <name|uuid> <pass> - Register the user with a specific password
/fl <resetpw|resetpassword> <name> - Sets a new temp password for a new user
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
Releases Β· games647/FlexibleLogin
A Sponge minecraft server plugin for second factor authentication - games647/FlexibleLogin
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Mitsubishi Electric advances vehicle control technology, also on general highways, for autonomous level 3 driving
#Technologies
#Technologies
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Windows security trips :
1) Safe Wi-Fi in your home. This may seem like an easy task to some, but insecure or simple passwords in your home are a major problem that you can face day in and day out. The defaults are a bad idea in any advanced community. So make sure you change the default settings or ask your local professional to help you with this. When this is done, make sure the invited expert does not know your WPA2 password, so cover your keyboard while you set it. Remember that you are only responsible for providing the password to those you choose to trust.
2) Consider a VPN. Once you implement a virtual private network (VPN), your work from home is likely to be much safer. Identity thieves and hackers are more likely to extract your identity from outgoing traffic, so filtering is a good idea. Do not connect your devices to a VPN, as this makes your settings vulnerable and easier to hack.
3) Keep your devices locked. Data is largely stolen and re-hashed via insecure devices that are used without any passwords or security software. Any security, such as passwords, fingerprints, templates, or graphical passes, reduces the risk of data disclosure. However, be careful with facial recognition software as you can likely run into problems in financial operating systems when your face is imprinted on the system. Remember, your devices know what you look like, so use fingerprints.
4) Protect your smart TVs and smartphones with additional software. They are the most insecure and can reveal your personal information. This approach is absolutely unacceptable. However, you cannot let others spy on you through their devices. Look out for sophisticated antivirus software that allows you to use browser extensions, smartphone apps, and security gateways for your IoT environment.
5) Enhance your knowledge. Explore as many options as you can of how the Internet of Things is attacked daily by hackers and identity thieves. Improve your information security competencies. Be aware of internet security and remember that your interconnected gadgets are your weakness. As machine learning (ML) and artificial intelligence (AI) become more advanced, consider them as your key weapons against cyber attacks.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Windows security trips :
1) Safe Wi-Fi in your home. This may seem like an easy task to some, but insecure or simple passwords in your home are a major problem that you can face day in and day out. The defaults are a bad idea in any advanced community. So make sure you change the default settings or ask your local professional to help you with this. When this is done, make sure the invited expert does not know your WPA2 password, so cover your keyboard while you set it. Remember that you are only responsible for providing the password to those you choose to trust.
2) Consider a VPN. Once you implement a virtual private network (VPN), your work from home is likely to be much safer. Identity thieves and hackers are more likely to extract your identity from outgoing traffic, so filtering is a good idea. Do not connect your devices to a VPN, as this makes your settings vulnerable and easier to hack.
3) Keep your devices locked. Data is largely stolen and re-hashed via insecure devices that are used without any passwords or security software. Any security, such as passwords, fingerprints, templates, or graphical passes, reduces the risk of data disclosure. However, be careful with facial recognition software as you can likely run into problems in financial operating systems when your face is imprinted on the system. Remember, your devices know what you look like, so use fingerprints.
4) Protect your smart TVs and smartphones with additional software. They are the most insecure and can reveal your personal information. This approach is absolutely unacceptable. However, you cannot let others spy on you through their devices. Look out for sophisticated antivirus software that allows you to use browser extensions, smartphone apps, and security gateways for your IoT environment.
5) Enhance your knowledge. Explore as many options as you can of how the Internet of Things is attacked daily by hackers and identity thieves. Improve your information security competencies. Be aware of internet security and remember that your interconnected gadgets are your weakness. As machine learning (ML) and artificial intelligence (AI) become more advanced, consider them as your key weapons against cyber attacks.
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Exposure to the production by Samsung of a 600 million pixel sensor lens area covering 12% of the back of the phone.
#Technologies
#Technologies
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦list 3 ransomware real decrytors :
https://www.nomoreransom.org/en/decryption-tools.html
https://www.softpedia.com/get/Antivirus/Removal-Tools/Trend-Micro-Ransomware-File-Decryptor.shtml
https://noransom.kaspersky.com/
https://www.avast.com/en-us/ransomware-decryption-tools
https://www.emsisoft.com/ransomware-decryption-tools/free-download
https://www.mcafee.com/enterprise/en-us/downloads/free-tools/ransomware-decryption.html
https://www.quickheal.com/free-ransomware-decryption-tool/
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦list 3 ransomware real decrytors :
https://www.nomoreransom.org/en/decryption-tools.html
https://www.softpedia.com/get/Antivirus/Removal-Tools/Trend-Micro-Ransomware-File-Decryptor.shtml
https://noransom.kaspersky.com/
https://www.avast.com/en-us/ransomware-decryption-tools
https://www.emsisoft.com/ransomware-decryption-tools/free-download
https://www.mcafee.com/enterprise/en-us/downloads/free-tools/ransomware-decryption.html
https://www.quickheal.com/free-ransomware-decryption-tool/
β β β Uππ»βΊπ«Δπ¬πβ β β β
softpedia
Trend Micro Ransomware File Decryptor Download Free (Windows) - 1.0.0.1668 | Softpedia
Download Trend Micro Ransomware File Decryptor 1.0.0.1668 - An anti-ransomware application that tries to unlock infected files on your computer, providing support for various ransomware families
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Network hacking exercice:
This is a short introduction on methods that use neural networks in an offensive manner (bug hunting, shellcode obfuscation, etc.) and how to exploit neural networks found in the wild (information extraction, malware injection, backdooring, etc.).
0 - Last Layer Attack
1 - Backdooring
2 - Extracting Information
3 - Brute Forcing
4 - Neural Overflow
5 - Malware Injection
6 - Neural Obfuscation
7 - Bug Hunting
8 - GPU Attack
Download:
https://github.com/Kayzaks/HackingNeuralNetworks
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Network hacking exercice:
This is a short introduction on methods that use neural networks in an offensive manner (bug hunting, shellcode obfuscation, etc.) and how to exploit neural networks found in the wild (information extraction, malware injection, backdooring, etc.).
0 - Last Layer Attack
1 - Backdooring
2 - Extracting Information
3 - Brute Forcing
4 - Neural Overflow
5 - Malware Injection
6 - Neural Obfuscation
7 - Bug Hunting
8 - GPU Attack
Download:
https://github.com/Kayzaks/HackingNeuralNetworks
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - Kayzaks/HackingNeuralNetworks: A small course on exploiting and defending neural networks
A small course on exploiting and defending neural networks - Kayzaks/HackingNeuralNetworks