Forwarded from UNDERCODE NEWS
Enjoy Today's list of free pro Android applications and games(Google Play) of the day is amazing.
#Updates
#Updates
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BetterBackdoor can create and control a backdoor.
F E A T U R E S :
Execute command line commands
Run PowerShell scripts
Run DuckyScripts to input keystrokes
Exfiltrate files based on extension
Exfiltrate Microsoft Edge and WiFi Passwords
Send and receive files to the victim's computer
Run KeyLogger
Get a screenshot of the victim's computer
Get text copied to victim's clipboard
Get the contents of the victim's file (cat)
This backdoor uses a client-server socket connection for communication.
The attacker starts the server and the victim connects to that server as a client.
Once the connection is established, commands can be sent to the client to control the backdoor.
To create a backdoor, BetterBackdoor:
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) Download: https://github.com/ThatcherDev/
1) Create "run.jar", the backdoor jar file, and copy it to the "backdoor" directory.
2) D obavte text file containing IPv4-address of the server to the Β«run.jarΒ».
Optionally copy the Java Runtime Environment to "backdoor" and create a batch file "run.bat" to run the backdoor in the packaged Java Runtime Environment.tterBackdoor:
3) To run the backdoor on the victim's computer, transfer all files from the "backdoor" directory to the victim's computer.
4) If the JRE is packaged with a backdoor, run run.bat, otherwise run run.jar.
5) This will launch a backdoor on the victim's computer.
6) Once launched, to control the backdoor, you must go back to BetterBackdoor and run option 1 at startup, connected to the same Wi-Fi network as the victim's computer.
π¦BetterBackdoor can create and control a backdoor.
F E A T U R E S :
Execute command line commands
Run PowerShell scripts
Run DuckyScripts to input keystrokes
Exfiltrate files based on extension
Exfiltrate Microsoft Edge and WiFi Passwords
Send and receive files to the victim's computer
Run KeyLogger
Get a screenshot of the victim's computer
Get text copied to victim's clipboard
Get the contents of the victim's file (cat)
This backdoor uses a client-server socket connection for communication.
The attacker starts the server and the victim connects to that server as a client.
Once the connection is established, commands can be sent to the client to control the backdoor.
To create a backdoor, BetterBackdoor:
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) Download: https://github.com/ThatcherDev/
1) Create "run.jar", the backdoor jar file, and copy it to the "backdoor" directory.
2) D obavte text file containing IPv4-address of the server to the Β«run.jarΒ».
Optionally copy the Java Runtime Environment to "backdoor" and create a batch file "run.bat" to run the backdoor in the packaged Java Runtime Environment.tterBackdoor:
3) To run the backdoor on the victim's computer, transfer all files from the "backdoor" directory to the victim's computer.
4) If the JRE is packaged with a backdoor, run run.bat, otherwise run run.jar.
5) This will launch a backdoor on the victim's computer.
6) Once launched, to control the backdoor, you must go back to BetterBackdoor and run option 1 at startup, connected to the same Wi-Fi network as the victim's computer.
(don't clone our tips)β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
In Europe, Samsung is entering the 5G race to overtake Huawei, but consumers have big reservations
#Technologies
#Technologies
Forwarded from UNDERCODE NEWS
To try live streaming, Walmart partnered up with TikTok, recommending fashion designer items.
#Updates
#Updates
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Recommended free Threat intelligence and IOC resources
* [FireEye IOCs](https://github.com/fireeye/iocs) - Indicators of Compromise
shared publicly by FireEye.
* [FireHOL IP Lists](https://iplists.firehol.org/) - Analytics for 350+ IP lists
with a focus on attacks, malware and abuse. Evolution, Changes History,
Country Maps, Age of IPs listed, Retention Policy, Overlaps.
* [HoneyDB](https://riskdiscovery.com/honeydb) - Community driven honeypot sensor data collection and aggregation.
* [hpfeeds](https://github.com/rep/hpfeeds) - Honeypot feed protocol.
* [Infosec - CERT-PA lists](https://infosec.cert-pa.it/analyze/statistics.html) ([IPs](https://infosec.cert-pa.it/analyze/listip.txt) - [Domains](https://infosec.cert-pa.it/analyze/listdomains.txt) - [URLs](https://infosec.cert-pa.it/analyze/listurls.txt)) - Blocklist service.
* [InQuest REPdb](https://labs.inquest.net/repdb) - Continuous aggregation of IOCs from a variety of open reputation sources.
* [InQuest IOCdb](https://labs.inquest.net/iocdb) - Continuous aggregation of IOCs from a variety of blogs, Github repos, and Twitter.
* [Internet Storm Center (DShield)](https://isc.sans.edu/) - Diary and
* [SystemLookup](https://www.systemlookup.com/) - SystemLookup hosts a collection of lists that provide information on
the components of legitimate and potentially unwanted programs.
* [ThreatMiner](https://www.threatminer.org/) - Data mining portal for threat
intelligence, with search.
* [threatRECON](https://threatrecon.co/) - Search for indicators, up to 1000
free per month.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Recommended free Threat intelligence and IOC resources
* [FireEye IOCs](https://github.com/fireeye/iocs) - Indicators of Compromise
shared publicly by FireEye.
* [FireHOL IP Lists](https://iplists.firehol.org/) - Analytics for 350+ IP lists
with a focus on attacks, malware and abuse. Evolution, Changes History,
Country Maps, Age of IPs listed, Retention Policy, Overlaps.
* [HoneyDB](https://riskdiscovery.com/honeydb) - Community driven honeypot sensor data collection and aggregation.
* [hpfeeds](https://github.com/rep/hpfeeds) - Honeypot feed protocol.
* [Infosec - CERT-PA lists](https://infosec.cert-pa.it/analyze/statistics.html) ([IPs](https://infosec.cert-pa.it/analyze/listip.txt) - [Domains](https://infosec.cert-pa.it/analyze/listdomains.txt) - [URLs](https://infosec.cert-pa.it/analyze/listurls.txt)) - Blocklist service.
* [InQuest REPdb](https://labs.inquest.net/repdb) - Continuous aggregation of IOCs from a variety of open reputation sources.
* [InQuest IOCdb](https://labs.inquest.net/iocdb) - Continuous aggregation of IOCs from a variety of blogs, Github repos, and Twitter.
* [Internet Storm Center (DShield)](https://isc.sans.edu/) - Diary and
* [SystemLookup](https://www.systemlookup.com/) - SystemLookup hosts a collection of lists that provide information on
the components of legitimate and potentially unwanted programs.
* [ThreatMiner](https://www.threatminer.org/) - Data mining portal for threat
intelligence, with search.
* [threatRECON](https://threatrecon.co/) - Search for indicators, up to 1000
free per month.
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - mandiant/iocs: FireEye Publicly Shared Indicators of Compromise (IOCs)
FireEye Publicly Shared Indicators of Compromise (IOCs) - GitHub - mandiant/iocs: FireEye Publicly Shared Indicators of Compromise (IOCs)
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
Git tips:
The hooks directory contains client or server hook scripts, which are automatically executed under specific operations.
info contains a global exclusion file, which can be ignored by the configuration file
logs save log information
The objects directory stores all data content, and the local version repository is placed
The refs directory stores a pointer (branch) to the commit object of the data
The config file contains project-specific configuration options
description is used to display the description of the warehouse
The HEAD file indicates the branch that is currently checked out
index Temporary area data
Remember: Do not manually modify the contents of the .git folder*
Work area (code editing area): represents the local development code
Temporary storage area (modification to be submitted area): represents the address of the temporary storage code of the local warehouse
Warehouse area (code storage area): representative code enters local version control
β β β Uππ»βΊπ«Δπ¬πβ β β β
Git tips:
The hooks directory contains client or server hook scripts, which are automatically executed under specific operations.
info contains a global exclusion file, which can be ignored by the configuration file
logs save log information
The objects directory stores all data content, and the local version repository is placed
The refs directory stores a pointer (branch) to the commit object of the data
The config file contains project-specific configuration options
description is used to display the description of the warehouse
The HEAD file indicates the branch that is currently checked out
index Temporary area data
Remember: Do not manually modify the contents of the .git folder*
Work area (code editing area): represents the local development code
Temporary storage area (modification to be submitted area): represents the address of the temporary storage code of the local warehouse
Warehouse area (code storage area): representative code enters local version control
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
wpa2 wifi hacking :
1)pkg update && pkg upgrade
2)pkg install bash
3) pkg install git
4) git clone https://github.com/Anonymous3-SIT/wifi-hacker
5) cd wifi-hacker
6)ls
7) bash wifi-hacker.sh
8) choose otption
β β β Uππ»βΊπ«Δπ¬πβ β β β
1)pkg update && pkg upgrade
2)pkg install bash
3) pkg install git
4) git clone https://github.com/Anonymous3-SIT/wifi-hacker
5) cd wifi-hacker
6)ls
7) bash wifi-hacker.sh
8) choose otption
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS