Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
FSIN installed on thousands of PCs "My Office" and Russian Linux "Alt"
#International
#International
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Breakthrough technologies for batteries! It is said that in 2024, Apple will start producing
#Technologies
#Technologies
β β β Uππ»βΊπ«Δπ¬πβ β β β
Hack whatsapp web via a cloned website:
1) git clone https://github.com/raptored01/whatsapp_hack.git
install the requirements
2) cd path/to/the/repo
3) pip install -r requirements.txt
4) first run the grabber
5) python3 grabber.py
6) then run the server
python3 server.py
7) as the victim scans the qr on the fake website, whatsapp web on the browser spawned by the grabber will be connected to the victim's number.
8) change the last line of the server.py script to fit your needs (if run on port 80, you might need to run as superuser)
9) router configuration might be necessary (port mapping)
β β β Uππ»βΊπ«Δπ¬πβ β β β
Hack whatsapp web via a cloned website:
1) git clone https://github.com/raptored01/whatsapp_hack.git
install the requirements
2) cd path/to/the/repo
3) pip install -r requirements.txt
4) first run the grabber
5) python3 grabber.py
6) then run the server
python3 server.py
7) as the victim scans the qr on the fake website, whatsapp web on the browser spawned by the grabber will be connected to the victim's number.
8) change the last line of the server.py script to fit your needs (if run on port 80, you might need to run as superuser)
9) router configuration might be necessary (port mapping)
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Google defends allegations of anti-monopoly: it did not compel anyone to search on Google, and there was no monopoly.
#International
#International
Forwarded from UNDERCODE NEWS
FREE BUG BOUNTY :
Basics
Setup
Tools
Labs & Testing Environments
Vulnerability Types
Mobile Hacking
Smart Contracts
Coding & Scripting
Hardware & IoT
Blog posts & Talks
Media Resources
Certifications
Mindset & Mental Health
> Download:
https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters
β β β Uππ»βΊπ«Δπ¬πβ β β β
Basics
Setup
Tools
Labs & Testing Environments
Vulnerability Types
Mobile Hacking
Smart Contracts
Coding & Scripting
Hardware & IoT
Blog posts & Talks
Media Resources
Certifications
Mindset & Mental Health
> Download:
https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters: A list of resources for those interested in getting started in bugβ¦
A list of resources for those interested in getting started in bug bounties - nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more. The goal is to enable a security tester to pull this repository onto a new testing box and have access to every type of list that may be needed.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) wget -c https://github.com/danielmiessler/SecLists/archive/master.zip -O SecList.zip \
&& unzip SecList.zip \
&& rm -f SecList.zip
2) git clone --depth 1 https://github.com/danielmiessler/SecLists.git
for kali :
apt -y install seclists
F E A T U R E S :
Fuzzing
dos2unix
IOCs
Miscellaneous
Add Invisible control characters
Passwords
Pattern-Matching
Update Angular dangerous functions
Payloads
Add more zip-bombs
Web-Shells
β β β Uππ»βΊπ«Δπ¬πβ β β β
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more. The goal is to enable a security tester to pull this repository onto a new testing box and have access to every type of list that may be needed.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) wget -c https://github.com/danielmiessler/SecLists/archive/master.zip -O SecList.zip \
&& unzip SecList.zip \
&& rm -f SecList.zip
2) git clone --depth 1 https://github.com/danielmiessler/SecLists.git
for kali :
apt -y install seclists
F E A T U R E S :
Fuzzing
dos2unix
IOCs
Miscellaneous
Add Invisible control characters
Passwords
Pattern-Matching
Update Angular dangerous functions
Payloads
Add more zip-bombs
Web-Shells
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - danielmiessler/SecLists: SecLists is the security tester's companion. It's a collection of multiple types of lists usedβ¦
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, pas...
Forwarded from UNDERCODE NEWS
OnePlus is speculated to announce the architecture and configuration of OnePlus Nord SE with big upgrades.
#Technologies
#Technologies
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
for termux djangohunter - Tool designed to help identify incorrectly configured Django applications that are exposing sensitive information..->
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
pkg update && pkg upgrade
You can use the apt command if your prefer.
apt update && apt upgrade
Tip: Enlarge the font size by pressing CTRL+Alt++
Setup External Storage
Create a storage directory to access other areas of the device.
termux-setup-storage
Install Python
Install Python
pkg install python
Install Git
Install Git
pkg install git
Project Setup
Local Directory
Change directories to the newly created storage folder.
cd storage
Create a directory to store our project files.
mkdir myapp && cd myapp
Virtual Environment
Now that we are in our newly created project folder it's time to setup a virtual environment for our app.
Create Virtual Environment
python -m venv <virtual environment name>
Example:
python -m venv venv
Activate Virtual Environmemt
What good is a virtual environment if it's not being used? That's right, we need to activate it to use it.
source <venv>/bin/activate
Example:
source venv/bin/activate
Tip: Close out of a virtual environment by typing deactivate and then hitting Enter
Install Django
Our virtual environment is activated and we're ready to install Django.
pip install django
Save installed packages to a text file
pip freeze > requirements.txt
Django Setup
Start Project
Tell Django admin to start a new project with your project name.
django-admin startproject <project name>
Example:
django-admin startproject myapp
Change into the Django project directory to view the files Django generated
cd <project name>
Example:
cd myapp
Start App
Tell Django to run a local server and watch for changes
python manage.py runserver
Open your web browser and navigate to localhost:8000 to confirm the Django app is running successfully!
Tip: Stop the local server from running by hitting CTRL+c
β β β Uππ»βΊπ«Δπ¬πβ β β β
for termux djangohunter - Tool designed to help identify incorrectly configured Django applications that are exposing sensitive information..->
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
pkg update && pkg upgrade
You can use the apt command if your prefer.
apt update && apt upgrade
Tip: Enlarge the font size by pressing CTRL+Alt++
Setup External Storage
Create a storage directory to access other areas of the device.
termux-setup-storage
Install Python
Install Python
pkg install python
Install Git
Install Git
pkg install git
Project Setup
Local Directory
Change directories to the newly created storage folder.
cd storage
Create a directory to store our project files.
mkdir myapp && cd myapp
Virtual Environment
Now that we are in our newly created project folder it's time to setup a virtual environment for our app.
Create Virtual Environment
python -m venv <virtual environment name>
Example:
python -m venv venv
Activate Virtual Environmemt
What good is a virtual environment if it's not being used? That's right, we need to activate it to use it.
source <venv>/bin/activate
Example:
source venv/bin/activate
Tip: Close out of a virtual environment by typing deactivate and then hitting Enter
Install Django
Our virtual environment is activated and we're ready to install Django.
pip install django
Save installed packages to a text file
pip freeze > requirements.txt
Django Setup
Start Project
Tell Django admin to start a new project with your project name.
django-admin startproject <project name>
Example:
django-admin startproject myapp
Change into the Django project directory to view the files Django generated
cd <project name>
Example:
cd myapp
Start App
Tell Django to run a local server and watch for changes
python manage.py runserver
Open your web browser and navigate to localhost:8000 to confirm the Django app is running successfully!
Tip: Stop the local server from running by hitting CTRL+c
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
What kind of PC setup will seamlessly play the light chase game?
#Technologies
#Technologies
β β β Uππ»βΊπ«Δπ¬πβ β β β
Blind Attacking Framework :
F E A T U R E S :
> because blind attacking makes every vulnerable & exposed host to the internet a targeted one , hence increases the awareness of potential threats
> because the best way to prevent knowlege abuse under the hood is sharing it with everyone
> because it will always add new to the community and will never be a replica
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) fire up a terminal and sudo apt-get update && apt-get upgrade && apt-get dist-upgrade
2) install [ requests , httplib , urllib , time , bs4 "BeautifulSoup" , colored , selenium , sys ] python modules
3) python BAF_0.1.0.py
4) use BAF authentication to atomatically authenticate with shodan via premium account to get access to all search results or enter your shodan's account username and pass for custom account login
5) choose 1 , let it do it's job , press y , close the previous tab , press y ,close the previous tabs ...etc till u have the vulnerable cams only
6) choose 2 , enter what do u want to search for (ie: NSA) , when it's done , refer to the targets text file , it will contain the targets ip:port
that's all
7) DON'T close a loading webpage
beta versions will make automated browser open for better understanding ,but you can close the webcam tabs freely
TESTED ON:
Ubuntu
Termux
Kali
β β β Uππ»βΊπ«Δπ¬πβ β β β
Blind Attacking Framework :
F E A T U R E S :
> because blind attacking makes every vulnerable & exposed host to the internet a targeted one , hence increases the awareness of potential threats
> because the best way to prevent knowlege abuse under the hood is sharing it with everyone
> because it will always add new to the community and will never be a replica
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) fire up a terminal and sudo apt-get update && apt-get upgrade && apt-get dist-upgrade
2) install [ requests , httplib , urllib , time , bs4 "BeautifulSoup" , colored , selenium , sys ] python modules
3) python BAF_0.1.0.py
4) use BAF authentication to atomatically authenticate with shodan via premium account to get access to all search results or enter your shodan's account username and pass for custom account login
5) choose 1 , let it do it's job , press y , close the previous tab , press y ,close the previous tabs ...etc till u have the vulnerable cams only
6) choose 2 , enter what do u want to search for (ie: NSA) , when it's done , refer to the targets text file , it will contain the targets ip:port
that's all
7) DON'T close a loading webpage
beta versions will make automated browser open for better understanding ,but you can close the webcam tabs freely
TESTED ON:
Ubuntu
Termux
Kali
β β β Uππ»βΊπ«Δπ¬πβ β β β