https://github.com/Awan check the contributions, I think I'm gonna get award of the year 2020 for most commits/contributions I have made ๐
Recommended repo by a friend
Recommended repo by a friend
GitHub
Awan - Overview
Lover of Prophet Muhammed PBUH. Awan has 44 repositories available. Follow their code on GitHub.
Forwarded from UNDERCODE NEWS
New critical vulnerability in Eclipse, an attacker to gain full access to the victim's workspace.
#Vulnerabilities
#Vulnerabilities
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆUpdated free Backtest trading strategies in Python:
1) download https://github.com/kernc/backtesting.py.git
2) $ pip install backtesting
Usage
from backtesting import Backtest, Strategy
from backtesting.lib import crossover
from backtesting.test import SMA, GOOG
class SmaCross(Strategy):
def init(self):
price = self.data.Close
self.ma1 = self.I(SMA, price, 10)
self.ma2 = self.I(SMA, price, 20)
def next(self):
if crossover(self.ma1, self.ma2):
self.buy()
elif crossover(self.ma2, self.ma1):
self.sell()
bt = Backtest(GOOG, SmaCross, commission=.002,
exclusive_orders=True)
stats = bt.run()
bt.plot()
๐ฆSTILL NOT GETTING ??
Checkout : https://kernc.github.io/backtesting.py/doc/backtesting/#manuals
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆUpdated free Backtest trading strategies in Python:
Sub-modules๐ธ๐ฝ๐ ๐ ๐ฐ๐ป๐ป๐ธ๐ ๐ฐ๐ ๐ธ๐พ๐ฝ & ๐ ๐ ๐ฝ :
backtesting.backtesting
Core framework data structures. Objects from this module can also be imported from the top-level module directly, e.g โฆ
backtesting.lib
Collection of common building blocks, helper auxiliary functions and composable strategy classes for reuse โฆ
backtesting.test
Data and utilities for testing.
1) download https://github.com/kernc/backtesting.py.git
2) $ pip install backtesting
Usage
from backtesting import Backtest, Strategy
from backtesting.lib import crossover
from backtesting.test import SMA, GOOG
class SmaCross(Strategy):
def init(self):
price = self.data.Close
self.ma1 = self.I(SMA, price, 10)
self.ma2 = self.I(SMA, price, 20)
def next(self):
if crossover(self.ma1, self.ma2):
self.buy()
elif crossover(self.ma2, self.ma1):
self.sell()
bt = Backtest(GOOG, SmaCross, commission=.002,
exclusive_orders=True)
stats = bt.run()
bt.plot()
๐ฆSTILL NOT GETTING ??
Checkout : https://kernc.github.io/backtesting.py/doc/backtesting/#manuals
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
GitHub
GitHub - kernc/backtesting.py: :mag_right: :snake: Backtest trading strategies in Python.
:mag_right: :chart_with_upwards_trend: :snake: :moneybag: Backtest trading strategies in Python. - GitHub - kernc/backtesting.py: :mag_right: :snake: Backtest trading strategies in Python.
Forwarded from UNDERCODE NEWS
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆExplain the process management system calls in Linux?
1) fork (): used to create a new process.
2) exec(): execute a new process.
3) wait(): Wait until the process is executed.
4) exit(): Exit the process.
ยป System call to get the process ID:
1) getpid(): Find the unique process ID.
2) getppid(): Find the unique parent process ID.
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆExplain the process management system calls in Linux?
1) fork (): used to create a new process.
2) exec(): execute a new process.
3) wait(): Wait until the process is executed.
4) exit(): Exit the process.
ยป System call to get the process ID:
1) getpid(): Find the unique process ID.
2) getppid(): Find the unique parent process ID.
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE NEWS
Hakuhodo DYMP offers streamlined dashboards for unified TV management and digital advertising efficiency.
#Updates
#Updates
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆCREATE YOUR OWN LINUX RANSOMWARE WITH ANY OS :
F E A T U R E S :
open terminal and type :
1) download https://github.com/tarcisio-marinho/GonnaCry/tree/master/src
GonnaCry requires the pycrypto library and requests, installation below
~$ sudo pip install -r requeriments.txt
2) Compiling the code
~$ pyinstaller -F --clean main.py -n gonnacry
3) ~$ pyinstaller -F --clean decryptor.py -n decryptor
4) RUN AS PYTHON :
main.py GonnaCry start file
daemon.py dropped by main.py and run
dropper.py drop the malware on the computer
decryptor.py communicate with the server, decrypt keys and files
symmetric.py AES encryption
asymmetric.py RSA encryption
generate_keys.py Generate random AES keys
persistence.py Persistence routines for linux OS
get_files.py Find files to be encrypted
environment.py environment variables
variables.py Images and malware binaries
utils.py Utilities routines
Enjoy
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆCREATE YOUR OWN LINUX RANSOMWARE WITH ANY OS :
F E A T U R E S :
encrypts all user files with AES-256-CBC.
Random AES key and IV for each file.
Works even without internet connection.
Communication with the server to decrypt Client-private-key.
encrypts AES key with client-public-key RSA-2048.
encrypts client-private-key with RSA-2048 server-public-key.
Changes computer wallpaper -> Gnome, LXDE, KDE, XFCE.
Decryptor that communicate to server to send keys.
python webserver
Daemon
Dropper
Kills databases
About
A Linux Ransomware
๐ธ๐ฝ๐
๐
๐ฐ๐ป๐ป๐ธ๐
๐ฐ๐
๐ธ๐พ๐ฝ & ๐
๐
๐ฝ :open terminal and type :
1) download https://github.com/tarcisio-marinho/GonnaCry/tree/master/src
GonnaCry requires the pycrypto library and requests, installation below
~$ sudo pip install -r requeriments.txt
2) Compiling the code
~$ pyinstaller -F --clean main.py -n gonnacry
3) ~$ pyinstaller -F --clean decryptor.py -n decryptor
4) RUN AS PYTHON :
main.py GonnaCry start file
daemon.py dropped by main.py and run
dropper.py drop the malware on the computer
decryptor.py communicate with the server, decrypt keys and files
symmetric.py AES encryption
asymmetric.py RSA encryption
generate_keys.py Generate random AES keys
persistence.py Persistence routines for linux OS
get_files.py Find files to be encrypted
environment.py environment variables
variables.py Images and malware binaries
utils.py Utilities routines
Enjoy
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
GitHub
GonnaCry/src at master ยท tarcisio-marinho/GonnaCry
A Linux Ransomware. Contribute to tarcisio-marinho/GonnaCry development by creating an account on GitHub.
Forwarded from UNDERCODE NEWS
The high-tech unemployed? The opportunity to educate non-technological employees under the shadow of the crown.
#international
#international
Forwarded from UNDERCODE NEWS
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
golang http request package code:
package utils
import (
"crypto/tls"
"encoding/json"
"errors"
"fmt"
"io/ioutil"
"net/http"
"net/url"
"strings"
"sync"
)
var (
GET_METHOD = "GET"
POST_METHOD = "POST"
SENDTYPE_FROM = "from"
SENDTYPE_JSON = "json"
)
type HttpSend struct {
Link string
SendType string
Header map[string]string
Body map[string]string
sync.RWMutex
}
func NewHttpSend(link string) *HttpSend {
return &HttpSend{
Link: link,
SendType: SENDTYPE_FROM,
}
}
func (h *HttpSend) SetBody(body map[string]string) {
h.Lock()
defer h.Unlock()
h.Body = body
}
func (h *HttpSend) SetHeader(header map[string]string) {
h.Lock()
defer h.Unlock()
h.Header = header
}
func (h *HttpSend) SetSendType(send_type string) {
h.Lock()
defer h.Unlock()
h.SendType = send_type
}
func (h *HttpSend) Get() ([]byte, error) {
return h.send(GET_METHOD)
}
func (h *HttpSend) Post() ([]byte, error) {
return h.send(POST_METHOD)
}
func GetUrlBuild(link string, data map[string]string) string {
u, _ := url.Parse(link)
q := u.Query()
for k, v := range data {
q.Set(k, v)
}
u.RawQuery = q.Encode()
return u.String()
}
func (h *HttpSend) send(method string) ([]byte, error) {
var (
req *http.Request
resp *http.Response
client http.Client
send_data string
err error
)
if len(h.Body) > 0 {
if strings.ToLower(h.SendType) == SENDTYPE_JSON {
send_body, json_err := json.Marshal(h.Body)
if json_err != nil {
return nil, json_err
}
send_data = string(send_body)
} else {
send_body := http.Request{}
send_body.ParseForm()
for k, v := range h.Body {
send_body.Form.Add(k, v)
}
send_data = send_body.Form.Encode()
}
}
client.Transport = &http.Transport{
TLSClientConfig: &tls.Config{InsecureSkipVerify: true},
}
req, err = http.NewRequest(method, h.Link, strings.NewReader(send_data))
if err != nil {
return nil, err
}
defer req.Body.Close()
//่ฎพ็ฝฎ้ป่ฎคheader
if len(h.Header) == 0 {
//json
if strings.ToLower(h.SendType) == SENDTYPE_JSON {
h.Header = map[string]string{
"Content-Type": "application/json; charset=utf-8",
}
} else { //form
h.Header = map[string]string{
"Content-Type": "application/x-www-form-urlencoded",
}
}
}
for k, v := range h.Header {
if strings.ToLower(k) == "host" {
req.Host = v
} else {
req.Header.Add(k, v)
}
}
resp, err = client.Do(req)
if err != nil {
return nil, err
}
defer resp.Body.Close()
if resp.StatusCode != http.StatusOK {
return nil, errors.New(fmt.Sprintf("error http code :%d", resp.StatusCode))
}
return ioutil.ReadAll(resp.Body)
}
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
golang http request package code:
package utils
import (
"crypto/tls"
"encoding/json"
"errors"
"fmt"
"io/ioutil"
"net/http"
"net/url"
"strings"
"sync"
)
var (
GET_METHOD = "GET"
POST_METHOD = "POST"
SENDTYPE_FROM = "from"
SENDTYPE_JSON = "json"
)
type HttpSend struct {
Link string
SendType string
Header map[string]string
Body map[string]string
sync.RWMutex
}
func NewHttpSend(link string) *HttpSend {
return &HttpSend{
Link: link,
SendType: SENDTYPE_FROM,
}
}
func (h *HttpSend) SetBody(body map[string]string) {
h.Lock()
defer h.Unlock()
h.Body = body
}
func (h *HttpSend) SetHeader(header map[string]string) {
h.Lock()
defer h.Unlock()
h.Header = header
}
func (h *HttpSend) SetSendType(send_type string) {
h.Lock()
defer h.Unlock()
h.SendType = send_type
}
func (h *HttpSend) Get() ([]byte, error) {
return h.send(GET_METHOD)
}
func (h *HttpSend) Post() ([]byte, error) {
return h.send(POST_METHOD)
}
func GetUrlBuild(link string, data map[string]string) string {
u, _ := url.Parse(link)
q := u.Query()
for k, v := range data {
q.Set(k, v)
}
u.RawQuery = q.Encode()
return u.String()
}
func (h *HttpSend) send(method string) ([]byte, error) {
var (
req *http.Request
resp *http.Response
client http.Client
send_data string
err error
)
if len(h.Body) > 0 {
if strings.ToLower(h.SendType) == SENDTYPE_JSON {
send_body, json_err := json.Marshal(h.Body)
if json_err != nil {
return nil, json_err
}
send_data = string(send_body)
} else {
send_body := http.Request{}
send_body.ParseForm()
for k, v := range h.Body {
send_body.Form.Add(k, v)
}
send_data = send_body.Form.Encode()
}
}
client.Transport = &http.Transport{
TLSClientConfig: &tls.Config{InsecureSkipVerify: true},
}
req, err = http.NewRequest(method, h.Link, strings.NewReader(send_data))
if err != nil {
return nil, err
}
defer req.Body.Close()
//่ฎพ็ฝฎ้ป่ฎคheader
if len(h.Header) == 0 {
//json
if strings.ToLower(h.SendType) == SENDTYPE_JSON {
h.Header = map[string]string{
"Content-Type": "application/json; charset=utf-8",
}
} else { //form
h.Header = map[string]string{
"Content-Type": "application/x-www-form-urlencoded",
}
}
}
for k, v := range h.Header {
if strings.ToLower(k) == "host" {
req.Host = v
} else {
req.Header.Add(k, v)
}
}
resp, err = client.Do(req)
if err != nil {
return nil, err
}
defer resp.Body.Close()
if resp.StatusCode != http.StatusOK {
return nil, errors.New(fmt.Sprintf("error http code :%d", resp.StatusCode))
}
return ioutil.ReadAll(resp.Body)
}
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE NEWS
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆSpecial extractor tool for windows :
F E A T U R E S :
password recovery
network monitoring
retrieving information from web browsers
work with video / audio
work with the Internet
command line utilities
tabletop
work with Outlook / Office
programming tools
disk utilities
system utilities
other utilities
download:
http://www.nirsoft.net/utils/index.html
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆSpecial extractor tool for windows :
F E A T U R E S :
password recovery
network monitoring
retrieving information from web browsers
work with video / audio
work with the Internet
command line utilities
tabletop
work with Outlook / Office
programming tools
disk utilities
system utilities
other utilities
download:
http://www.nirsoft.net/utils/index.html
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
NirSoft
Freeware Tools and System Utilities for Windows
Unique collection of freeware utilities and freeware password recovery tools
Forwarded from UNDERCODE NEWS
Lastest report: Solarwinds FTP โsolarwinds123โ secret revealed in plain text?
#international
#international
Forwarded from UNDERCODE NEWS
Net One employees illegally leaked $US 2,126,795.66, purchased real estate in Okinawa using a privately owned company
#Leaks
#Leaks
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ๐ป How to scan your local network using the terminal on macOS:
1) Scanning open ports of your local network with nmap
Nmap is the king of command line port scanners on macOS, but you'll need to install it first.
2) Install nmap with Homebrew
If you have Homebrew installed, run
brew install nmap
this will download and install nmap and any required dependencies.
3) Scanning with Nmap
Nmap is designed to scan the provided hostname or network address and return a list of open ports.
The name stands for "network mappe" but looks more like a port mapper.
The easiest way to run nmap is to target an IP address or range of IP addresses; replace it with the corresponding IP address for LAN scanning.
4) This particular command scans the nmap educational test server at scanme.org.
nmap 74.207.244.221
nmap scanme.org
nmap 74.207.244.221
nmap scanme.org
5) Use the forward slash to find open ports on a range of IP addresses.
nmap 192.181.0.0/24
6) To find the IP addresses of your router and various devices on your network, you can run arp or ipconfig.
sudo nmap -A scanme.org
7) Using the -A flag will cause nmap to scan more aggressively, returning significantly more information, but transparently revealing your presence in the server logs.
The -A flag must be run with sudo.
sudo nmap -O scanme.org
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ๐ป How to scan your local network using the terminal on macOS:
1) Scanning open ports of your local network with nmap
Nmap is the king of command line port scanners on macOS, but you'll need to install it first.
2) Install nmap with Homebrew
If you have Homebrew installed, run
brew install nmap
this will download and install nmap and any required dependencies.
3) Scanning with Nmap
Nmap is designed to scan the provided hostname or network address and return a list of open ports.
The name stands for "network mappe" but looks more like a port mapper.
The easiest way to run nmap is to target an IP address or range of IP addresses; replace it with the corresponding IP address for LAN scanning.
4) This particular command scans the nmap educational test server at scanme.org.
nmap 74.207.244.221
nmap scanme.org
nmap 74.207.244.221
nmap scanme.org
5) Use the forward slash to find open ports on a range of IP addresses.
nmap 192.181.0.0/24
6) To find the IP addresses of your router and various devices on your network, you can run arp or ipconfig.
sudo nmap -A scanme.org
7) Using the -A flag will cause nmap to scan more aggressively, returning significantly more information, but transparently revealing your presence in the server logs.
The -A flag must be run with sudo.
sudo nmap -O scanme.org
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE NEWS
In Russia, the first automated population census has started. How can Rostelecom pay nine billion on it?
#Updates
#Updates
Forwarded from UNDERCODE NEWS
Another example for:''Nothing is safe''.Crackers would sell security officials' communications
#DataBreaches
#DataBreaches