โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆSo Lets Start some malwares: TESTED
Nginx Block Bad Bots, Spam Referrer Blocker, Vulnerability Scanners, User-Agents, Malware, Adware, Ransomware, Malicious Sites, with anti-DDOS, Wordpress Theme Detector Blocking and Fail2Ban Jail for Repeat Offenders
t.me/UnderCodeTestingOfficial
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) Download install-ngxblocker to your /usr/local/sbin/directory and make the script executable:
> sudo wget https://raw.githubusercontent.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker/master/install-ngxblocker -O /usr/local/sbin/install-ngxblocker
3) sudo chmod +x /usr/local/sbin/install-ngxblocker
4) If your Linux distribution does not have wget you can replace the wget command above using curl as follows:
> curl -sL https://raw.githubusercontent.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker/master/install-ngxblocker -o /usr/local/sbin/install-ngxblocker
5) Now run the install-ngxblocker script in DRY-MODE which will show you what changes it will make and what files it will download for you. This is only a DRY-RUN so no changes are being made yet.
> The install-ngxblocker downloads all required files including the setup and update scripts.
6) cd /usr/local/sbin
7) sudo ./install-ngxblocker
8) Vsudo chmod +x /usr/local/sbin/setup-ngxblocker
9) sudo chmod +x /usr/local/sbin/update-ngxblocker
10) setup-ngxblocker, install-ngxblocker and update-ngxblocker can all be configured with custom installation / update locations from the command line.
11) Run any of the setup, install or update scripts with --help or -h to view options.
12) Now run the setup-ngxblocker script in DRY-MODE which will show you what changes it will make and what files it will download for you. This is only a DRY-RUN so no changes are being made yet.
> cd /usr/local/sbin/
> sudo ./setup-ngxblocker
13) sudo ./setup-ngxblocker -x -e conf
So now let's run the setup script and let it make all the changes we need to make the Bot Blocker active on all your sites.
> cd /usr/local/sbin/
> sudo ./setup-ngxblocker -x
14) Now test your nginx configuration
> sudo nginx -t
and you should see
nginx: the configuration file /etc/nginx/nginx.conf syntax is ok
nginx: configuration file /etc/nginx/nginx.conf test is successful
15) sudo nginx -t && sudo nginx -s reload
or
sudo service nginx restart
16) Now setup cron to automatically update the blocker for you every day so you always have the latest up to date protection.
> sudo crontab -e
17) Add the following line at the end of your crontab file. Note adding the -e command line parameter to specify your email address where the update report is sent to. Obviously substitute yourname@youremail.com with your real email address or you will not receive the email when the script has updated.
00 22 * * * sudo /usr/local/sbin/update-ngxblocker -e yourname@youremail.com
> This will update the blocker every night for you at 10 PM.
If you want it to update more frequently (as sometimes I push out 3-4 updates a day) you can set it as follows to run the cron every 8 hours, although just once a day is more than enough.
00 */8 * * * sudo /usr/local/sbin/update-ngxblocker -e yourname@youremail.com
> If you don't want any email notification after an update (not advisable in case Nginx ever has an EMERG when reloading), then simply run your cron as follows.
00 */8 * * * sudo /usr/local/sbin/update-ngxblocker -n
If you would rather send e-mail via mailgun then run your cron as so:
00 22 * * * sudo /usr/local/sbin/update-ngxblocker -g yourname@yourdomain.com -d yourdomain.com -a mailgun api key -f from@yourdomain.com
That's it
18) You can now customize any of the following files below to suit your environment or requirements
> /etc/nginx/bots.d/whitelist-ips.conf
/etc/nginx/bots.d/whitelist-domains.conf
/etc/nginx/bots.d/blacklist-user-agents.conf
/etc/nginx/bots.d/blacklist-ips.conf
/etc/nginx/bots.d/bad-referrer-words.conf
/etc/nginx/bots.d/custom-bad-referrers.
๐ฆSo Lets Start some malwares: TESTED
Nginx Block Bad Bots, Spam Referrer Blocker, Vulnerability Scanners, User-Agents, Malware, Adware, Ransomware, Malicious Sites, with anti-DDOS, Wordpress Theme Detector Blocking and Fail2Ban Jail for Repeat Offenders
t.me/UnderCodeTestingOfficial
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) Download install-ngxblocker to your /usr/local/sbin/directory and make the script executable:
> sudo wget https://raw.githubusercontent.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker/master/install-ngxblocker -O /usr/local/sbin/install-ngxblocker
3) sudo chmod +x /usr/local/sbin/install-ngxblocker
4) If your Linux distribution does not have wget you can replace the wget command above using curl as follows:
> curl -sL https://raw.githubusercontent.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker/master/install-ngxblocker -o /usr/local/sbin/install-ngxblocker
5) Now run the install-ngxblocker script in DRY-MODE which will show you what changes it will make and what files it will download for you. This is only a DRY-RUN so no changes are being made yet.
> The install-ngxblocker downloads all required files including the setup and update scripts.
6) cd /usr/local/sbin
7) sudo ./install-ngxblocker
8) Vsudo chmod +x /usr/local/sbin/setup-ngxblocker
9) sudo chmod +x /usr/local/sbin/update-ngxblocker
10) setup-ngxblocker, install-ngxblocker and update-ngxblocker can all be configured with custom installation / update locations from the command line.
11) Run any of the setup, install or update scripts with --help or -h to view options.
12) Now run the setup-ngxblocker script in DRY-MODE which will show you what changes it will make and what files it will download for you. This is only a DRY-RUN so no changes are being made yet.
> cd /usr/local/sbin/
> sudo ./setup-ngxblocker
13) sudo ./setup-ngxblocker -x -e conf
So now let's run the setup script and let it make all the changes we need to make the Bot Blocker active on all your sites.
> cd /usr/local/sbin/
> sudo ./setup-ngxblocker -x
14) Now test your nginx configuration
> sudo nginx -t
and you should see
nginx: the configuration file /etc/nginx/nginx.conf syntax is ok
nginx: configuration file /etc/nginx/nginx.conf test is successful
15) sudo nginx -t && sudo nginx -s reload
or
sudo service nginx restart
16) Now setup cron to automatically update the blocker for you every day so you always have the latest up to date protection.
> sudo crontab -e
17) Add the following line at the end of your crontab file. Note adding the -e command line parameter to specify your email address where the update report is sent to. Obviously substitute yourname@youremail.com with your real email address or you will not receive the email when the script has updated.
00 22 * * * sudo /usr/local/sbin/update-ngxblocker -e yourname@youremail.com
> This will update the blocker every night for you at 10 PM.
If you want it to update more frequently (as sometimes I push out 3-4 updates a day) you can set it as follows to run the cron every 8 hours, although just once a day is more than enough.
00 */8 * * * sudo /usr/local/sbin/update-ngxblocker -e yourname@youremail.com
> If you don't want any email notification after an update (not advisable in case Nginx ever has an EMERG when reloading), then simply run your cron as follows.
00 */8 * * * sudo /usr/local/sbin/update-ngxblocker -n
If you would rather send e-mail via mailgun then run your cron as so:
00 22 * * * sudo /usr/local/sbin/update-ngxblocker -g yourname@yourdomain.com -d yourdomain.com -a mailgun api key -f from@yourdomain.com
That's it
18) You can now customize any of the following files below to suit your environment or requirements
> /etc/nginx/bots.d/whitelist-ips.conf
/etc/nginx/bots.d/whitelist-domains.conf
/etc/nginx/bots.d/blacklist-user-agents.conf
/etc/nginx/bots.d/blacklist-ips.conf
/etc/nginx/bots.d/bad-referrer-words.conf
/etc/nginx/bots.d/custom-bad-referrers.
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆThe tool to check the availability or syntax of domains, IPv4 or URL
Its main objective is to provide the availability of domains, IPs and since recently URL by generating an accurate result based on results from WHOIS, NSLOOKUP and HTTP status codes.
> PyFunceble is currently running actively and daily with the help of Travis CI under 60+ repositories. It is used to clean or test the availability of data which are present in hosts files, list of IP, list of domains, block lists or even AdBlock filter lists.
instagram.com/UnderCodeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/funilrys/PyFunceble
2) cd docs/
3) make html
4) chromium _build/html/index.html # Chromium or whatever browser you use.
๐ฆWhat can PyFunceble do?
1) Test of the availability of a domain.
2) Test of the availability of an IPv4.
3) Test of the availability of an URL.
4) Test of the availability of a domain/DNS name in a private or local network.
5) Test of the availability of an IPv4 in a private or local network.
6) Test of the availability of an URL in a private or local network.
7) Test of the syntax of a domain.
8) Test of the syntax of an IPv4.
9) Test of the syntax of an URL.
10) Test of domain or IP which are present into an Adblock formatted file.
11) Test from a given raw link.
12) Save test result(s) on file(s) (hosts file, plain text and/or JSON format).
13) Show test result(s) on screen.
14) Show percentage of each status (ACTIVE, INACTIVE, INVALID)
15) Sort outputs hierarchically.
16) "Mining" of domain or IP which are related to the tested element.
17) Auto-continuation of tests in case of system crash or script stop.
Filtering of a file content.
18) This feature will let us for example test all blogspot domain of the given file no matter the content of the file.
19) Set the user-agent to use for the tests.
20) Give some analytic depending of the HTTP status code (ACTIVE, POTENTIALLY_ACTIVE, POTENTIALLY_INACTIVE, SUSPICIOUS).
21) Retest overtime of INACTIVE and INVALID domains.
22) Print the execution time on screen and file.
23) Customization of the different option via command-line arguments or configuration file.
24) Continuous tests under Travis CI with the help of an auto saving and database system.
25) Set branch to push the result to for the autosaving system.
26) Set the minimal time before we autosave in order to avoid Travis CI limitation.
27) Set a command to execute at the end of the test.
28) Set the commit message for the autosaving system.
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆThe tool to check the availability or syntax of domains, IPv4 or URL
Its main objective is to provide the availability of domains, IPs and since recently URL by generating an accurate result based on results from WHOIS, NSLOOKUP and HTTP status codes.
> PyFunceble is currently running actively and daily with the help of Travis CI under 60+ repositories. It is used to clean or test the availability of data which are present in hosts files, list of IP, list of domains, block lists or even AdBlock filter lists.
instagram.com/UnderCodeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/funilrys/PyFunceble
2) cd docs/
3) make html
4) chromium _build/html/index.html # Chromium or whatever browser you use.
๐ฆWhat can PyFunceble do?
1) Test of the availability of a domain.
2) Test of the availability of an IPv4.
3) Test of the availability of an URL.
4) Test of the availability of a domain/DNS name in a private or local network.
5) Test of the availability of an IPv4 in a private or local network.
6) Test of the availability of an URL in a private or local network.
7) Test of the syntax of a domain.
8) Test of the syntax of an IPv4.
9) Test of the syntax of an URL.
10) Test of domain or IP which are present into an Adblock formatted file.
11) Test from a given raw link.
12) Save test result(s) on file(s) (hosts file, plain text and/or JSON format).
13) Show test result(s) on screen.
14) Show percentage of each status (ACTIVE, INACTIVE, INVALID)
15) Sort outputs hierarchically.
16) "Mining" of domain or IP which are related to the tested element.
17) Auto-continuation of tests in case of system crash or script stop.
Filtering of a file content.
18) This feature will let us for example test all blogspot domain of the given file no matter the content of the file.
19) Set the user-agent to use for the tests.
20) Give some analytic depending of the HTTP status code (ACTIVE, POTENTIALLY_ACTIVE, POTENTIALLY_INACTIVE, SUSPICIOUS).
21) Retest overtime of INACTIVE and INVALID domains.
22) Print the execution time on screen and file.
23) Customization of the different option via command-line arguments or configuration file.
24) Continuous tests under Travis CI with the help of an auto saving and database system.
25) Set branch to push the result to for the autosaving system.
26) Set the minimal time before we autosave in order to avoid Travis CI limitation.
27) Set a command to execute at the end of the test.
28) Set the commit message for the autosaving system.
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆFail2Ban Blacklist JAIL for Repeat Offenders
> A customised jail with action and filter file for Fail2Ban. This jail is based on the recidive jail but makes use of a simple text file to enable extended and permanent bans even across reboots.
> This is intended to replace the recidive filter so make sure that recidive is set to enabled = false do not have both this jail and recidive running at the same time
t.me/UnderCodeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
Download or clone https://github.com/mitchellkrogza/Fail2Ban-Blacklist-JAIL-for-Repeat-Offenders-with-Perma-Extended-Banning
1) requires blacklist.conf in /etc/fail2ban/filter.d folder
> cd /etc/fail2ban/filter.d
2) sudo wget https://raw.githubusercontent.com/mitchellkrogza/Fail2Ban-Blacklist-JAIL-for-Repeat-Offenders-with-Perma-Extended-Banning/master/filter.d/blacklist.conf -O blacklist.conf
3) requires blacklist.conf in /etc/fail2ban/action.d folder
> cd /etc/fail2ban/action.d
4) sudo wget https://raw.githubusercontent.com/mitchellkrogza/Fail2Ban-Blacklist-JAIL-for-Repeat-Offenders-with-Perma-Extended-Banning/master/action.d/blacklist.conf -O blacklist.conf
5) requires jail settings called [blacklist]
> sudo nano /etc/fail2ban/jail.local
6) add this to the bottom of the file
[DEFAULT]
port = 0:65535
filter = %(name)s
[blacklist]
enabled = true
logpath = /var/log/fail2ban.*
filter = blacklist
banaction = blacklist
bantime = 31536000 ; 1 year
findtime = 31536000 ; 1 year
maxretry = 10
7) exclamation To stop all email notifications of bans, especially after a server reboot, add the jail as follows:
[DEFAULT]
port = 0:65535
filter = %(name)s
[blacklist]
enabled = true
logpath = /var/log/fail2ban.*
filter = blacklist
banaction = blacklist
action = %(action_)s
bantime = 31536000 ; 1 year
findtime = 31536000 ; 1 year
maxretry = 10
7) requires ip.blacklist file in /etc/fail2ban
> create the file
> sudo touch /etc/fail2ban/ip.blacklist
> make the file writable
8) sudo chmod 755 /etc/fail2ban/ip.blacklist
9) recidive filter must be disabled (do not run both at same time)
๐ฆHow it works ?
1) This jail monitors all your Fail2Ban log files including any rotated log files because the log file location setting in the jail is wild-carded
2) It requires an action.d file called blacklist.conf in your /etc/fail2ban/action.d folder It requires an filter.d file called blacklist.conf in your /etc/fail2ban/filter.d folder It requires the jail [blacklist] settings in your jail.local file
3) Example :
In my jail settings I have set a findtime of 1 year (31536000 seconds) bantime of 1 year (31536000 seconds) maxretry of 10 attempts
> This means Fail2Ban will scan through it's log files over a full year's period. If it finds the same attack pattern, let's say an SSH attack for instance, from the same IP address on 10 different occasions anywhere within 1 year, that IP address is then regarded as a repeat offender and can very well be blacklisted for the 1 year period or even forever.
@UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆFail2Ban Blacklist JAIL for Repeat Offenders
> A customised jail with action and filter file for Fail2Ban. This jail is based on the recidive jail but makes use of a simple text file to enable extended and permanent bans even across reboots.
> This is intended to replace the recidive filter so make sure that recidive is set to enabled = false do not have both this jail and recidive running at the same time
t.me/UnderCodeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
Download or clone https://github.com/mitchellkrogza/Fail2Ban-Blacklist-JAIL-for-Repeat-Offenders-with-Perma-Extended-Banning
1) requires blacklist.conf in /etc/fail2ban/filter.d folder
> cd /etc/fail2ban/filter.d
2) sudo wget https://raw.githubusercontent.com/mitchellkrogza/Fail2Ban-Blacklist-JAIL-for-Repeat-Offenders-with-Perma-Extended-Banning/master/filter.d/blacklist.conf -O blacklist.conf
3) requires blacklist.conf in /etc/fail2ban/action.d folder
> cd /etc/fail2ban/action.d
4) sudo wget https://raw.githubusercontent.com/mitchellkrogza/Fail2Ban-Blacklist-JAIL-for-Repeat-Offenders-with-Perma-Extended-Banning/master/action.d/blacklist.conf -O blacklist.conf
5) requires jail settings called [blacklist]
> sudo nano /etc/fail2ban/jail.local
6) add this to the bottom of the file
[DEFAULT]
port = 0:65535
filter = %(name)s
[blacklist]
enabled = true
logpath = /var/log/fail2ban.*
filter = blacklist
banaction = blacklist
bantime = 31536000 ; 1 year
findtime = 31536000 ; 1 year
maxretry = 10
7) exclamation To stop all email notifications of bans, especially after a server reboot, add the jail as follows:
[DEFAULT]
port = 0:65535
filter = %(name)s
[blacklist]
enabled = true
logpath = /var/log/fail2ban.*
filter = blacklist
banaction = blacklist
action = %(action_)s
bantime = 31536000 ; 1 year
findtime = 31536000 ; 1 year
maxretry = 10
7) requires ip.blacklist file in /etc/fail2ban
> create the file
> sudo touch /etc/fail2ban/ip.blacklist
> make the file writable
8) sudo chmod 755 /etc/fail2ban/ip.blacklist
9) recidive filter must be disabled (do not run both at same time)
๐ฆHow it works ?
1) This jail monitors all your Fail2Ban log files including any rotated log files because the log file location setting in the jail is wild-carded
2) It requires an action.d file called blacklist.conf in your /etc/fail2ban/action.d folder It requires an filter.d file called blacklist.conf in your /etc/fail2ban/filter.d folder It requires the jail [blacklist] settings in your jail.local file
3) Example :
In my jail settings I have set a findtime of 1 year (31536000 seconds) bantime of 1 year (31536000 seconds) maxretry of 10 attempts
> This means Fail2Ban will scan through it's log files over a full year's period. If it finds the same attack pattern, let's say an SSH attack for instance, from the same IP address on 10 different occasions anywhere within 1 year, that IP address is then regarded as a repeat offender and can very well be blacklisted for the 1 year period or even forever.
@UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆSimple Linux Bash Server Administration Scripts
> FTP Backup Script For any linux server which backs up critical system files and folders and also all your MySQL Databases.
> The script uses the NCFTP client, it deletes backups older than X days and also emails you with a success or failure message.
Twitter.com/UnderCodeTC
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/mitchellkrogza/linux-server-administration-scripts
2) cd linux-server-administration-scripts
3) chmod 777 ftpbackup.sh
4) ./ftpbackup.sh
That s all
@UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ
๐ฆSimple Linux Bash Server Administration Scripts
> FTP Backup Script For any linux server which backs up critical system files and folders and also all your MySQL Databases.
> The script uses the NCFTP client, it deletes backups older than X days and also emails you with a success or failure message.
Twitter.com/UnderCodeTC
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/mitchellkrogza/linux-server-administration-scripts
2) cd linux-server-administration-scripts
3) chmod 777 ftpbackup.sh
4) ./ftpbackup.sh
That s all
@UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ
๐ฆThe Ultimate Unified Hosts file
t.me/UnderCodeTestingOfficial
> for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites.
> Protect your children and family from gaining access to bad web sites and protect your devices and pc from being infected with Malware or Ransomware.
> Without any Paid services !
๐ฆDAILY UPDATED !!!!!!!!!!!๐ฆ
๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/mitchellkrogza/Ultimate.Hosts.Blacklist
2) AUTOMATe Run:
> cd installer-windows
3) Now
> Press โ Win+R. This opens the Run dialog.
4) If you need to run the batch file as an administrator, see this method instead.
> go to file then
5) OPEn cmd & Click Run as Administrator
> windows-install-hosts.bat
6 ) MANUAL
Now its not installing like a normal script so you need to edit some in your ip & dns / adapter & Hosts settings
> A hosts file, named hosts (with no file extension), is a plain-text file used by all operating systems to map hostnames to IP addresses.
> In most operating systems, the hosts file is preferential to DNS. Therefore if a domain name is resolved by the hosts file, the request never leaves your computer.
> Having a smart hosts file goes a long way towards blocking malware, adware, ransomware, porn and other nuisance web sites.
> A hosts file like this causes any lookups to any of the listed domains to resolve back to your localhost so it prevents any outgoing connections to the listed domains.
๐ฆFor example, to drop all requests to certain domains or servers, adding lines to your hosts file as below will achieve this for you. You can create your own custom hosts or simply use ours which covers you for well over 1 million bad domains and web sites out there.
# Block Bad Domains and Servers with Hosts File
0.0.0.0 doubleclick.net
0.0.0.0 18chinese.com
0.0.0.0 gatekeeper.tss.net
0.0.0.0 www.gatekeeper.tss.net
0.0.0.0 cdn.gatekeeper.tss.net
0.0.0.0 youporn.com
0.0.0.0 www.youporn.com
0.0.0.0 x-lime.net
0.0.0.0 www.x-lime.net
# etc ... etc .... etc ...
3) So go to hosts file
example on windows :
> C:\Windows\System32\drivers\etc\hosts
4) open it in any text editor app example Notpad
> change hosts by adding this repo hosts
Or
๐ฆFor linux
1) hosts.deny
is a plain-text file for Linux/Unix based operating systems only which blocks a list of IP addresses on the outside of your network from gaining any access to your computer.
2) A hosts.deny file will not work on a Windows operating system.
3) same in Linux You can modifie hosts file by opening in leafpad example
๐ฆ Or Automate run :
1) cd Installer-Linux
2) Chmod 777 linux-hosts-installer.sh
3) ./ linux-hosts-installer.sh
E N J O Y NO NEED FOR PAID SERVICES FOR BLOCKING MALWARES ADDS......
WRITTEN BY @UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ
๐ฆThe Ultimate Unified Hosts file
t.me/UnderCodeTestingOfficial
> for protecting your network, computer, smartphones and Wi-Fi devices against millions of bad web sites.
> Protect your children and family from gaining access to bad web sites and protect your devices and pc from being infected with Malware or Ransomware.
> Without any Paid services !
๐ฆDAILY UPDATED !!!!!!!!!!!๐ฆ
๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/mitchellkrogza/Ultimate.Hosts.Blacklist
2) AUTOMATe Run:
> cd installer-windows
3) Now
> Press โ Win+R. This opens the Run dialog.
4) If you need to run the batch file as an administrator, see this method instead.
> go to file then
5) OPEn cmd & Click Run as Administrator
> windows-install-hosts.bat
6 ) MANUAL
Now its not installing like a normal script so you need to edit some in your ip & dns / adapter & Hosts settings
> A hosts file, named hosts (with no file extension), is a plain-text file used by all operating systems to map hostnames to IP addresses.
> In most operating systems, the hosts file is preferential to DNS. Therefore if a domain name is resolved by the hosts file, the request never leaves your computer.
> Having a smart hosts file goes a long way towards blocking malware, adware, ransomware, porn and other nuisance web sites.
> A hosts file like this causes any lookups to any of the listed domains to resolve back to your localhost so it prevents any outgoing connections to the listed domains.
๐ฆFor example, to drop all requests to certain domains or servers, adding lines to your hosts file as below will achieve this for you. You can create your own custom hosts or simply use ours which covers you for well over 1 million bad domains and web sites out there.
# Block Bad Domains and Servers with Hosts File
0.0.0.0 doubleclick.net
0.0.0.0 18chinese.com
0.0.0.0 gatekeeper.tss.net
0.0.0.0 www.gatekeeper.tss.net
0.0.0.0 cdn.gatekeeper.tss.net
0.0.0.0 youporn.com
0.0.0.0 www.youporn.com
0.0.0.0 x-lime.net
0.0.0.0 www.x-lime.net
# etc ... etc .... etc ...
3) So go to hosts file
example on windows :
> C:\Windows\System32\drivers\etc\hosts
4) open it in any text editor app example Notpad
> change hosts by adding this repo hosts
Or
๐ฆFor linux
1) hosts.deny
is a plain-text file for Linux/Unix based operating systems only which blocks a list of IP addresses on the outside of your network from gaining any access to your computer.
2) A hosts.deny file will not work on a Windows operating system.
3) same in Linux You can modifie hosts file by opening in leafpad example
๐ฆ Or Automate run :
1) cd Installer-Linux
2) Chmod 777 linux-hosts-installer.sh
3) ./ linux-hosts-installer.sh
E N J O Y NO NEED FOR PAID SERVICES FOR BLOCKING MALWARES ADDS......
WRITTEN BY @UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ
โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ
๐ฆ2019 Phishing Database Tested by UndercOde:
Phishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing domains and provide stats to reveal how many unique domains used for Phishing are still active.
t.me/UnderCodeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
๐ฆPhishing Domaines Status
1) Active :
>Database On
https://raw.githubusercontent.com/mitchellkrogza/Phishing.Database/master/phishing-domains-ACTIVE.txt
2) Anactive :
> https://raw.githubusercontent.com/mitchellkrogza/Phishing.Database/master/phishing-domains-INACTIVE.txt
3) Invalid :
> https://github.com/mitchellkrogza/Phishing.Database
๐ฆPhishing Links Status
1)Active :
https://raw.githubusercontent.com/mitchellkrogza/Phishing.Database/master/phishing-links-ACTIVE.txt
2) Inactive:
> https://raw.githubusercontent.com/mitchellkrogza/Phishing.Database/master/phishing-links-INACTIVE.txt
3) Invalid :
> https://raw.githubusercontent.com/mitchellkrogza/Phishing.Database/master/phishing-links-INVALID.txt
๐ฆ All the following HTTP status codes we regard as ACTIVE or still POTENTIALLY ACTIVE.
๐ฆACTIVE HTTP Codes
- 100
- 101
- 200
- 201
- 202
- 203
- 204
- 205
- 206
๐ฆ POTENTIALLY ACTIVE HTTP Codes
- 000
- 300
- 301
- 302
- 303
- 304
- 305
- 307
- 403
- 405
- 406
- 407
- 408
- 411
- 413
- 417
- 500
- 501
- 502
- 503
- 504
- 505
๐ฆPOTENTIALLY INACTIVE HTTP Codes
- 400
- 402
- 403
- 404
- 409
- 410
- 412
- 414
- 415
- 416
๐ฆCriminals planting Phishing links often resort to a variety of techniques like returning a variety of HTTP failure codes to trick people into thinking the link is gone but in reality if you test a bit later it is often back.
WRITTEN BY @UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ
๐ฆ2019 Phishing Database Tested by UndercOde:
Phishing Domains, urls websites and threats database. We use the PyFunceble testing tool to validate the status of all known Phishing domains and provide stats to reveal how many unique domains used for Phishing are still active.
t.me/UnderCodeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
๐ฆPhishing Domaines Status
1) Active :
>Database On
https://raw.githubusercontent.com/mitchellkrogza/Phishing.Database/master/phishing-domains-ACTIVE.txt
2) Anactive :
> https://raw.githubusercontent.com/mitchellkrogza/Phishing.Database/master/phishing-domains-INACTIVE.txt
3) Invalid :
> https://github.com/mitchellkrogza/Phishing.Database
๐ฆPhishing Links Status
1)Active :
https://raw.githubusercontent.com/mitchellkrogza/Phishing.Database/master/phishing-links-ACTIVE.txt
2) Inactive:
> https://raw.githubusercontent.com/mitchellkrogza/Phishing.Database/master/phishing-links-INACTIVE.txt
3) Invalid :
> https://raw.githubusercontent.com/mitchellkrogza/Phishing.Database/master/phishing-links-INVALID.txt
๐ฆ All the following HTTP status codes we regard as ACTIVE or still POTENTIALLY ACTIVE.
๐ฆACTIVE HTTP Codes
- 100
- 101
- 200
- 201
- 202
- 203
- 204
- 205
- 206
๐ฆ POTENTIALLY ACTIVE HTTP Codes
- 000
- 300
- 301
- 302
- 303
- 304
- 305
- 307
- 403
- 405
- 406
- 407
- 408
- 411
- 413
- 417
- 500
- 501
- 502
- 503
- 504
- 505
๐ฆPOTENTIALLY INACTIVE HTTP Codes
- 400
- 402
- 403
- 404
- 409
- 410
- 412
- 414
- 415
- 416
๐ฆCriminals planting Phishing links often resort to a variety of techniques like returning a variety of HTTP failure codes to trick people into thinking the link is gone but in reality if you test a bit later it is often back.
WRITTEN BY @UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ
๐ฆ2019 from 2 months All in One
> Apache Block Bad Bots
> (Referer) Spam Referrer Blocker,
> Vulnerability Scanners, Malware, Adware, Ransomware, Malicious Sites,
> Wordpress Theme Detectors and Fail2Ban Jail for Repeat Offenders
instagram.com/UnderCodeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) clone https://github.com/mitchellkrogza/apache-ultimate-bad-bot-blocker
2) COPY THE GLOBALBLACKLIST.CONF FILE FROM THE REPO $APACHE_CONF is generally located at /etc/apache2 or /etc/httpd depending on OS
3) Copy the contents of globalblacklist.conf into your $APACHE_CONF/custom.d folder. e.g. /etc/apache2/custom.d on Ubuntu/Debian /etc/httpd on RHEL/centos You need to create this folder.
4) The following directions use /etc/apache2 as an example.
> sudo mkdir /etc/apache2/custom.d
> sudo wget https://raw.githubusercontent.com/mitchellkrogza/apache-ultimate-bad-bot-blocker/master/Apache_2.2/custom.d/globalblacklist.conf -O /etc/apache2/custom.d/globalblacklist.conf
5) If your Linux distribution does not have wget you can replace the wget commands using curl as follows:
> curl -sL https://raw.githubusercontent.com/mitchellkrogza/apache-ultimate-bad-bot-blocker/master/Apache_2.2/custom.d/globalblacklist.conf -o /etc/apache2/custom.d/globalblacklist.conf
6) Please do NOT ever use 127.0.0.1 as a whitelisted IP address in whitelist-ips.conf it will cause the blocker to stop functioning.
> copy the whitelist-ips.conf file into that folder
7) sudo wget https://raw.githubusercontent.com/mitchellkrogza/apache-ultimate-bad-bot-blocker/master/Apache_2.2/custom.d/whitelist-ips.conf -O /etc/apache2/custom.d/whitelist-ips.conf
8) copy the whitelist-domains.conf file into the same folder
9) sudo wget https://raw.githubusercontent.com/mitchellkrogza/apache-ultimate-bad-bot-blocker/master/Apache_2.2/custom.d/whitelist-domains.conf -O /etc/apache2/custom.d/whitelist-domains.conf
10) Use nano, vim or any other text editor to edit both whitelist-ips.conf and whitelist-domains.conf to include all your own domain names and IP addresses that you want to specifically whitelist from the blocker script.
11) copy the blacklist-ips.conf file into that folder
> sudo wget https://raw.githubusercontent.com/mitchellkrogza/apache-ultimate-bad-bot-blocker/master/Apache_2.2/custom.d/blacklist-ips.conf -O /etc/apache2/custom.d/blacklist-ips.conf
12) copy the bad-referrer-words.conf file into that folder
> sudo wget https://raw.githubusercontent.com/mitchellkrogza/apache-ultimate-bad-bot-blocker/master/Apache_2.2/custom.d/bad-referrer-words.conf -O /etc/apache2/custom.d/bad-referrer-words.conf
13) Allows you to add your own custom list of user agents with this new include file.
> copy the blacklist-user-agents.conf file into that folder
> sudo wget https://raw.githubusercontent.com/mitchellkrogza/apache-ultimate-bad-bot-blocker/master/Apache_2.2/custom.d/blacklist-user-agents.conf -O /etc/apache2/custom.d/blacklist-user-agents.conf
14) INCLUDE THE GLOBALBLACKLIST.CONF
Include the globalblacklist.conf file in the beginning of a directory block just after your opening Options statements and before the rest of your host config example below. Remove the "<<<<<< This needs to be added" part
<VirtualHost *:80>
ServerName local.dev
DocumentRoot /var/www/html
ErrorLog /tmp/error.log
<Directory "/var/www/html">
Options +Includes
Options +FollowSymLinks -Indexes
Include custom.d/globalblacklist.conf
</Directory>
</VirtualHost>
15) You can include globalblacklist.conf globally (for all virtual hosts) if you put the following configuration after virtual host configuration.
16) Do an Apache2 Config Test
> sudo apache2ctl configtest
> sudo service apache2 reload
17) Now Open Terminal & Type :
> curl -A "googlebot" http://yourdomain.com
Should respond with 200 OK
> curl -A "80legs" http://yourdomain.com
> curl -A "masscan" http://yourdomain.com
Should respond with 403 Forbidden
> curl -I http://yourdomain.com -e http://100dollars-seo.com
> curl -I http://yourdomain.com -e http://zx6.ru
๐ฆ2019 from 2 months All in One
> Apache Block Bad Bots
> (Referer) Spam Referrer Blocker,
> Vulnerability Scanners, Malware, Adware, Ransomware, Malicious Sites,
> Wordpress Theme Detectors and Fail2Ban Jail for Repeat Offenders
instagram.com/UnderCodeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) clone https://github.com/mitchellkrogza/apache-ultimate-bad-bot-blocker
2) COPY THE GLOBALBLACKLIST.CONF FILE FROM THE REPO $APACHE_CONF is generally located at /etc/apache2 or /etc/httpd depending on OS
3) Copy the contents of globalblacklist.conf into your $APACHE_CONF/custom.d folder. e.g. /etc/apache2/custom.d on Ubuntu/Debian /etc/httpd on RHEL/centos You need to create this folder.
4) The following directions use /etc/apache2 as an example.
> sudo mkdir /etc/apache2/custom.d
> sudo wget https://raw.githubusercontent.com/mitchellkrogza/apache-ultimate-bad-bot-blocker/master/Apache_2.2/custom.d/globalblacklist.conf -O /etc/apache2/custom.d/globalblacklist.conf
5) If your Linux distribution does not have wget you can replace the wget commands using curl as follows:
> curl -sL https://raw.githubusercontent.com/mitchellkrogza/apache-ultimate-bad-bot-blocker/master/Apache_2.2/custom.d/globalblacklist.conf -o /etc/apache2/custom.d/globalblacklist.conf
6) Please do NOT ever use 127.0.0.1 as a whitelisted IP address in whitelist-ips.conf it will cause the blocker to stop functioning.
> copy the whitelist-ips.conf file into that folder
7) sudo wget https://raw.githubusercontent.com/mitchellkrogza/apache-ultimate-bad-bot-blocker/master/Apache_2.2/custom.d/whitelist-ips.conf -O /etc/apache2/custom.d/whitelist-ips.conf
8) copy the whitelist-domains.conf file into the same folder
9) sudo wget https://raw.githubusercontent.com/mitchellkrogza/apache-ultimate-bad-bot-blocker/master/Apache_2.2/custom.d/whitelist-domains.conf -O /etc/apache2/custom.d/whitelist-domains.conf
10) Use nano, vim or any other text editor to edit both whitelist-ips.conf and whitelist-domains.conf to include all your own domain names and IP addresses that you want to specifically whitelist from the blocker script.
11) copy the blacklist-ips.conf file into that folder
> sudo wget https://raw.githubusercontent.com/mitchellkrogza/apache-ultimate-bad-bot-blocker/master/Apache_2.2/custom.d/blacklist-ips.conf -O /etc/apache2/custom.d/blacklist-ips.conf
12) copy the bad-referrer-words.conf file into that folder
> sudo wget https://raw.githubusercontent.com/mitchellkrogza/apache-ultimate-bad-bot-blocker/master/Apache_2.2/custom.d/bad-referrer-words.conf -O /etc/apache2/custom.d/bad-referrer-words.conf
13) Allows you to add your own custom list of user agents with this new include file.
> copy the blacklist-user-agents.conf file into that folder
> sudo wget https://raw.githubusercontent.com/mitchellkrogza/apache-ultimate-bad-bot-blocker/master/Apache_2.2/custom.d/blacklist-user-agents.conf -O /etc/apache2/custom.d/blacklist-user-agents.conf
14) INCLUDE THE GLOBALBLACKLIST.CONF
Include the globalblacklist.conf file in the beginning of a directory block just after your opening Options statements and before the rest of your host config example below. Remove the "<<<<<< This needs to be added" part
<VirtualHost *:80>
ServerName local.dev
DocumentRoot /var/www/html
ErrorLog /tmp/error.log
<Directory "/var/www/html">
Options +Includes
Options +FollowSymLinks -Indexes
Include custom.d/globalblacklist.conf
</Directory>
</VirtualHost>
15) You can include globalblacklist.conf globally (for all virtual hosts) if you put the following configuration after virtual host configuration.
16) Do an Apache2 Config Test
> sudo apache2ctl configtest
> sudo service apache2 reload
17) Now Open Terminal & Type :
> curl -A "googlebot" http://yourdomain.com
Should respond with 200 OK
> curl -A "80legs" http://yourdomain.com
> curl -A "masscan" http://yourdomain.com
Should respond with 403 Forbidden
> curl -I http://yourdomain.com -e http://100dollars-seo.com
> curl -I http://yourdomain.com -e http://zx6.ru
Should respond with 403 Forbidden
E N J O Y WITH Under Code:
WRITTEN BY @UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ
E N J O Y WITH Under Code:
WRITTEN BY @UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ
๐ฆTermux 2019 tool :
PentBox is a tool that allows us to create honeypot in systema this is written in ruby language
t.me/UnderCodeTestingOfficial
๐ฆFeatures:
> Command execution in gets (STDIN) implemented. (!command)
> Honeypot now shows attacker's IP and port (thx Shyish)
> Ip grabber direct targeting from email: yahoo,gmail,hotmail & sites like facebook gmail ...etc
> Included log options.
> Wordlist is bigger now.
> Included "back" option on menus. New tools:
> Included new area, Web tools.
> Included new module MAC address geolocation (samy.pl).
> Included new module HTTP directory bruteforce.
> Included new module HTTP common files bruteforce.
> Included exploits for DoS [other/http] 3Com SuperStack Switch DoS [other/http] 3Com OfficeConnect Routers DoS (Content-Type) [windows/
>ftp] Windows 7 IIS7.5 FTPSVC UNAUTH'D DoS [windows/ftp] Solar FTP Server 2.1 DoS [windows/pptp] MS02-063 PPTP Malformed Control Data
>Kernel DoS [windows/smb] Windows Vista/7 SMB2.0 Negotiate Protocol Request DoS BSOD
> Included pb_update.rb to update PenTBox from the SVN repository. Bugfixing:
> Fixed issue with SHODAN API.
> Deleted l33t speak and extra menu.
> Improved permissions checking, now it's done by euid, not username (thx r4mosg)
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/technicaldada/pentbox
2) cd pentbox
3) tar -zxvf pentbox.tar.gz
4) cd pentbox
5) chmod 777 pentbox.rb
6) ./pentbox.rb
Written by ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆTermux 2019 tool :
PentBox is a tool that allows us to create honeypot in systema this is written in ruby language
t.me/UnderCodeTestingOfficial
๐ฆFeatures:
> Command execution in gets (STDIN) implemented. (!command)
> Honeypot now shows attacker's IP and port (thx Shyish)
> Ip grabber direct targeting from email: yahoo,gmail,hotmail & sites like facebook gmail ...etc
> Included log options.
> Wordlist is bigger now.
> Included "back" option on menus. New tools:
> Included new area, Web tools.
> Included new module MAC address geolocation (samy.pl).
> Included new module HTTP directory bruteforce.
> Included new module HTTP common files bruteforce.
> Included exploits for DoS [other/http] 3Com SuperStack Switch DoS [other/http] 3Com OfficeConnect Routers DoS (Content-Type) [windows/
>ftp] Windows 7 IIS7.5 FTPSVC UNAUTH'D DoS [windows/ftp] Solar FTP Server 2.1 DoS [windows/pptp] MS02-063 PPTP Malformed Control Data
>Kernel DoS [windows/smb] Windows Vista/7 SMB2.0 Negotiate Protocol Request DoS BSOD
> Included pb_update.rb to update PenTBox from the SVN repository. Bugfixing:
> Fixed issue with SHODAN API.
> Deleted l33t speak and extra menu.
> Improved permissions checking, now it's done by euid, not username (thx r4mosg)
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/technicaldada/pentbox
2) cd pentbox
3) tar -zxvf pentbox.tar.gz
4) cd pentbox
5) chmod 777 pentbox.rb
6) ./pentbox.rb
Written by ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆTermux/Kali/Parrot package manager script 2019
package manager for hacker's. onex manage large number's of hacking tools that can be installed on single click. Using onex, you can install all hacking tools in Termux and other Linux based distributions. onex can install more than 370+ kali linux hacking tools. use onex install [tool_name] command to install any hacking tool.
instagram.com/UnderCodeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
Open the terminal and type following commands.
1) apt update
2) apt install git
3) git clone https://github.com/Rajkumrdusad/onex.git
4) chmod +x onex/install
5) sh onex/install if not work than use ./onex/install
๐ฆonex start to start onex menu mode:
> Enter a Number for a specific output:
(1) : To show all available tools and type the number of a tool which you want to install.
(2) : To show tools category.
(3) : If you want to update onex.
(4) : If you want to know About Us.
(5) : To exit the tool.
Written by ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆTermux/Kali/Parrot package manager script 2019
package manager for hacker's. onex manage large number's of hacking tools that can be installed on single click. Using onex, you can install all hacking tools in Termux and other Linux based distributions. onex can install more than 370+ kali linux hacking tools. use onex install [tool_name] command to install any hacking tool.
instagram.com/UnderCodeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
Open the terminal and type following commands.
1) apt update
2) apt install git
3) git clone https://github.com/Rajkumrdusad/onex.git
4) chmod +x onex/install
5) sh onex/install if not work than use ./onex/install
๐ฆonex start to start onex menu mode:
> Enter a Number for a specific output:
(1) : To show all available tools and type the number of a tool which you want to install.
(2) : To show tools category.
(3) : If you want to update onex.
(4) : If you want to know About Us.
(5) : To exit the tool.
Written by ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆRemote Access Tool/Botnet
Loki is Remote Access Tool.
Loki uses RSA-2048 with AES-256 to keep your communication secure.
Warning: DO NOT upload any samples generated by this program to online scanners.
instagram.com/UnderCodeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/Pure-L0G1C/Loki
2) pip install -r requirements.txt
3)open /lib/const.py & configure your private and public IP's
4) start loki.py
5) navigate to http://127.0.0.1:5000
6) login, Username: loki Password: ikol
7) navigate to settings, selected server tab and start the server on the same IP as your private IP
8) Click the home button
9) Generate a payload
10) Navigate to the agent directory
> Run: python builder.py -h
It will not compile inside a virtual enivornment
> After connection
11) You can click the hostname of the bot once it connects
> Explore
๐ฆFeatures:
>Upload & Download
> Chrome Launching
> Persistence
> Screenshot
> Keylogger
> Ddos
> SFTP
> SSH
Written by ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆRemote Access Tool/Botnet
Loki is Remote Access Tool.
Loki uses RSA-2048 with AES-256 to keep your communication secure.
Warning: DO NOT upload any samples generated by this program to online scanners.
instagram.com/UnderCodeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/Pure-L0G1C/Loki
2) pip install -r requirements.txt
3)open /lib/const.py & configure your private and public IP's
4) start loki.py
5) navigate to http://127.0.0.1:5000
6) login, Username: loki Password: ikol
7) navigate to settings, selected server tab and start the server on the same IP as your private IP
8) Click the home button
9) Generate a payload
10) Navigate to the agent directory
> Run: python builder.py -h
It will not compile inside a virtual enivornment
> After connection
11) You can click the hostname of the bot once it connects
> Explore
๐ฆFeatures:
>Upload & Download
> Chrome Launching
> Persistence
> Screenshot
> Keylogger
> Ddos
> SFTP
> SSH
Written by ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow to get MacOs ? And How To convert to .iso?
instagram.com/UnderCodeTestingCompany
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) There is no way to legitimately get the file without having access to a Mac, and a licensed copy of the OS via a purchase (unless you are a member of the Developer Program, for which you can expect to pay far more than the cost of the OS, what with it being free)
2) But if you can blag some access time on a Mac, then you can download the OS from the Mac App Store (You may need to Option+Click the Purchased section to force it to reshow them if you have downloaded them at least once already).
3)Once you have the installer downloaded and sat in your dock, you can simply pick it apart and get to the image file that is inside it.
4) This is the official way to get the file direct from Apple, but there is still work to do to make it into an ISO
5) Once youโve downloaded Mavericks, find the installer on your Mac. Itโs called Install OS X Mavericks.app and it should have been downloaded to your main Applications folder or be sat in your Dock.
6) Right-click (or Control+click) the installer, and choose Show Package Contents from the resulting contextual menu.
7) In the folder that appears, open Contents > Shared Support; youโll see a disk image file called InstallESD.dmg
8) This dmg file is in essence an ISO file in s slightly different format. We'll need to convert it. Open up Disk Utility and:
9) From the menu bar, select Images > Convert and point it to your .dmg file
10) In the Save As dialog that follows, select DVD/CD master. Disk Utility will insist on saving the new ISO as a .cdr file, but it is really an ISO.
11) When complete, you can rename it to .iso in Finder.
12) Use an external HD or thumb drive which is in ExFAT format (Compared to FAT format, this allows for single files larger than 4GB).
13) Copy the .iso file and access it on the other system or vm...
Wrtten by Steave
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow to get MacOs ? And How To convert to .iso?
instagram.com/UnderCodeTestingCompany
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) There is no way to legitimately get the file without having access to a Mac, and a licensed copy of the OS via a purchase (unless you are a member of the Developer Program, for which you can expect to pay far more than the cost of the OS, what with it being free)
2) But if you can blag some access time on a Mac, then you can download the OS from the Mac App Store (You may need to Option+Click the Purchased section to force it to reshow them if you have downloaded them at least once already).
3)Once you have the installer downloaded and sat in your dock, you can simply pick it apart and get to the image file that is inside it.
4) This is the official way to get the file direct from Apple, but there is still work to do to make it into an ISO
5) Once youโve downloaded Mavericks, find the installer on your Mac. Itโs called Install OS X Mavericks.app and it should have been downloaded to your main Applications folder or be sat in your Dock.
6) Right-click (or Control+click) the installer, and choose Show Package Contents from the resulting contextual menu.
7) In the folder that appears, open Contents > Shared Support; youโll see a disk image file called InstallESD.dmg
8) This dmg file is in essence an ISO file in s slightly different format. We'll need to convert it. Open up Disk Utility and:
9) From the menu bar, select Images > Convert and point it to your .dmg file
10) In the Save As dialog that follows, select DVD/CD master. Disk Utility will insist on saving the new ISO as a .cdr file, but it is really an ISO.
11) When complete, you can rename it to .iso in Finder.
12) Use an external HD or thumb drive which is in ExFAT format (Compared to FAT format, this allows for single files larger than 4GB).
13) Copy the .iso file and access it on the other system or vm...
Wrtten by Steave
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆwhat is AOXdeface tools?
AOXdeface is a tool for defacing dozens or hundreds of sites at once,depending on the number of sites that have been determined by you, this is not dangerous, and this is only the file upload method
t.me/UnderCodeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
A)Termux:
pkg install python2
pip2 install requests
pkg install git
git clone https://github.com/Ranginang67/AOXdeface
cd AOXdeface
python2 aox.py
B)Linux:
apt-get install python
apt-get install pthon-pip
pip install requests
apt-get install git
git clone https://github.com/Ranginang67/AOXdeface
cd AOXdeface
python aox.py
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆwhat is AOXdeface tools?
AOXdeface is a tool for defacing dozens or hundreds of sites at once,depending on the number of sites that have been determined by you, this is not dangerous, and this is only the file upload method
t.me/UnderCodeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
A)Termux:
pkg install python2
pip2 install requests
pkg install git
git clone https://github.com/Ranginang67/AOXdeface
cd AOXdeface
python2 aox.py
B)Linux:
apt-get install python
apt-get install pthon-pip
pip install requests
apt-get install git
git clone https://github.com/Ranginang67/AOXdeface
cd AOXdeface
python aox.py
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆwhat is Crypton tools?
cryton this a tools usefull for penetration testing, information gathering,
and for ethical hacking and this tools easy to use and easy to install
instagram.com/UnderCodeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
> install on kali, ubuntu, and parrot:
1) apt-get install git
2) git clone https://github.com/Ranginang67/Crypton
3) chmod 777 install.sh
4) ./install.sh
5) type crypton in term to run it
๐ฆFeatures:
feature information
> credit card validator checker to check whether the credit card is active
> Facebook account information to see all the information on your Facebook account
> social media name checker search for social media users associated with that username
> website backdoor scanner looking for a backdoor shell that is embedded on the website
>http header information get http header information from website
website analyze scanner scanning website vulnerability
>find admin login page for find the admin login page
gmail account checker checking if gmail account is exists
>find my facebook id find facebook user id
>dump all friend id dump all your friend ID on Facebook
domain age checker checking age of domain
>md5 hash cracker crack md5 password
ip adres checker search for information from the ip
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆwhat is Crypton tools?
cryton this a tools usefull for penetration testing, information gathering,
and for ethical hacking and this tools easy to use and easy to install
instagram.com/UnderCodeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
> install on kali, ubuntu, and parrot:
1) apt-get install git
2) git clone https://github.com/Ranginang67/Crypton
3) chmod 777 install.sh
4) ./install.sh
5) type crypton in term to run it
๐ฆFeatures:
feature information
> credit card validator checker to check whether the credit card is active
> Facebook account information to see all the information on your Facebook account
> social media name checker search for social media users associated with that username
> website backdoor scanner looking for a backdoor shell that is embedded on the website
>http header information get http header information from website
website analyze scanner scanning website vulnerability
>find admin login page for find the admin login page
gmail account checker checking if gmail account is exists
>find my facebook id find facebook user id
>dump all friend id dump all your friend ID on Facebook
domain age checker checking age of domain
>md5 hash cracker crack md5 password
ip adres checker search for information from the ip
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆSo we ve heared alot about Md5 and Still alot don t know exact definition for it so :
t.me/iOsDeveloppers
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) MD5 is a type of algorithm that is known as a cryptographic hash algorithm.
2) MD5 produces a hash value in a hexadecimal format. This competes with other designs where hash functions take in a certain piece of data, and change it to provide a key or value that can be used in place of the original value.
3) Security engineers and others are familiar with long lists of hash algorithms with different properties.
4) MD5 and other types of hash algorithms are often referred to as "message digest" functions.
5) The idea here is that a hash "digests" an original value and outputs a replacement value that is significantly different from the original.
6) Hashes have several main uses in security and database efficiency, related to the use of replacement values in searches and in data storage.
7) With the development of various hash algorithms, experts have noted that engineers found MD5 to have serious weaknesses in terms of not being "collision resistant." A collision happens when two hash values are found to be similar or the same.
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆSo we ve heared alot about Md5 and Still alot don t know exact definition for it so :
t.me/iOsDeveloppers
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) MD5 is a type of algorithm that is known as a cryptographic hash algorithm.
2) MD5 produces a hash value in a hexadecimal format. This competes with other designs where hash functions take in a certain piece of data, and change it to provide a key or value that can be used in place of the original value.
3) Security engineers and others are familiar with long lists of hash algorithms with different properties.
4) MD5 and other types of hash algorithms are often referred to as "message digest" functions.
5) The idea here is that a hash "digests" an original value and outputs a replacement value that is significantly different from the original.
6) Hashes have several main uses in security and database efficiency, related to the use of replacement values in searches and in data storage.
7) With the development of various hash algorithms, experts have noted that engineers found MD5 to have serious weaknesses in terms of not being "collision resistant." A collision happens when two hash values are found to be similar or the same.
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Telegram
iUNDERCODE IOS JAILBREAK SUPPORT & HELP
WELCOME TO iUNDERCODE BY UNDERCODE TESTING FOR IOS JAILBREAK & TWEAKS GROUP RULES @UNDERCODERULES
๐๐พ๐๐๐๐ฑ๐ ด
Youtube.com/c/Undercode
๐ ต๐ฐ๐ ฒ๐ ด๐ฑ๐พ๐พ๐ บ
@UndercOdeTesting
@iUNDERCODE
๐ ธ๐ ฝ๐๐๐ฐ๐ ถ๐๐ฐ๐ ผ
@UndercOdeTestinG
@iUNDERCODE
๐๐๐ ธ๐๐๐ ด๐
@iUNDERCODE
@UNDERCODENEWS
๐๐พ๐๐๐๐ฑ๐ ด
Youtube.com/c/Undercode
๐ ต๐ฐ๐ ฒ๐ ด๐ฑ๐พ๐พ๐ บ
@UndercOdeTesting
@iUNDERCODE
๐ ธ๐ ฝ๐๐๐ฐ๐ ถ๐๐ฐ๐ ผ
@UndercOdeTestinG
@iUNDERCODE
๐๐๐ ธ๐๐๐ ด๐
@iUNDERCODE
@UNDERCODENEWS
This media is not supported in your browser
VIEW IN TELEGRAM
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Passwords Attack The Popular tool Medusa :
> Medusa is a speedy, parallel, and modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application
instagram.com/UnderCodeTestingCompany
๐ฆFeatures :
1) Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently.
2) Flexible user input. Target information (host/user/password) can be specified in a variety of ways. For example, each item can be either a single entry or a file containing multiple entries. Additionally, a combination file format allows the user to refine their target listing.
3) Modular design. Each service module exists as an independent .mod file. This means that no modifications are necessary to the core application in order to extend the supported list of services for brute-forcing.
4) Multiple protocols supported. Many services are currently supported (e.g. SMB, HTTP, POP3, MS-SQL, SSHv2, among others).
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
> its preinstalled on kali os
Or
1) git clone https://github.com/jmk-foofus/medusa/blob/master
2) `cd' to the directory containing the package's source code and type
`./configure' to configure the package for your system.
3) using `csh' on an old version of System V, you might need to type
`sh ./configure' instead to prevent `csh' from trying to execute
`configure' itself.
4) Running `configure' takes a while. While running, it prints some
messages telling which features it is checking for.
5) Type `make' to compile the package.
6) Type `make install' to install the programs and any data files and
documentation.
7) You can remove the program binaries and object files from the
source code directory by typing `make clean'.
8) Note:
Some systems require unusual options for compilation or linking that
the `configure' script does not know about. You can give `configure'
initial values for variables by setting them in the environment. Using
a Bourne-compatible shell, you can do that on the command line like
this:
> CC=c89 CFLAGS=-O2 LIBS=-lposix ./configure
Or on systems that have the `env' program, you can do it like this:
env CPPFLAGS=-I/usr/local/include LDFLAGS=-s ./configure
๐ฆMacOs :
1) git clone https://github.com/jmk-foofus/medusa
2) cd medusa
3) macOS dependencies
brew install freerdp
> export FREERDP2_CFLAGS='-I/usr/local/include'
> export FREERDP2_LIBS='-I/usr/local/lib/freerdp'
4 )./configure
5) make
6 )./src/medusa
Wrtten by Steave
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Passwords Attack The Popular tool Medusa :
> Medusa is a speedy, parallel, and modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application
instagram.com/UnderCodeTestingCompany
๐ฆFeatures :
1) Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently.
2) Flexible user input. Target information (host/user/password) can be specified in a variety of ways. For example, each item can be either a single entry or a file containing multiple entries. Additionally, a combination file format allows the user to refine their target listing.
3) Modular design. Each service module exists as an independent .mod file. This means that no modifications are necessary to the core application in order to extend the supported list of services for brute-forcing.
4) Multiple protocols supported. Many services are currently supported (e.g. SMB, HTTP, POP3, MS-SQL, SSHv2, among others).
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
> its preinstalled on kali os
Or
1) git clone https://github.com/jmk-foofus/medusa/blob/master
2) `cd' to the directory containing the package's source code and type
`./configure' to configure the package for your system.
3) using `csh' on an old version of System V, you might need to type
`sh ./configure' instead to prevent `csh' from trying to execute
`configure' itself.
4) Running `configure' takes a while. While running, it prints some
messages telling which features it is checking for.
5) Type `make' to compile the package.
6) Type `make install' to install the programs and any data files and
documentation.
7) You can remove the program binaries and object files from the
source code directory by typing `make clean'.
8) Note:
Some systems require unusual options for compilation or linking that
the `configure' script does not know about. You can give `configure'
initial values for variables by setting them in the environment. Using
a Bourne-compatible shell, you can do that on the command line like
this:
> CC=c89 CFLAGS=-O2 LIBS=-lposix ./configure
Or on systems that have the `env' program, you can do it like this:
env CPPFLAGS=-I/usr/local/include LDFLAGS=-s ./configure
๐ฆMacOs :
1) git clone https://github.com/jmk-foofus/medusa
2) cd medusa
3) macOS dependencies
brew install freerdp
> export FREERDP2_CFLAGS='-I/usr/local/include'
> export FREERDP2_LIBS='-I/usr/local/lib/freerdp'
4 )./configure
5) make
6 )./src/medusa
Wrtten by Steave
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Crack hashes in seconds: Md5 Cracker 2019 :
t.me/UnderCodeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/s0md3v/Hash-Buster
2) cd Hash-Buster
3) Hash-Buster can be run directly from the python script but I highly suggest you to install it with
> make install
4) python hash.py/
5) buster -s <hash>
6) Finding hashes from a directory
just specify a directory and Hash Buster will go through all the files and directories present in it, looking for hashes.
> buster -d /root/Documents
7) Hash Buster can find your hashes even if they are stored in a file like this
๐ฆTested On:
> Kali
> Debian
Written by ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Crack hashes in seconds: Md5 Cracker 2019 :
t.me/UnderCodeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/s0md3v/Hash-Buster
2) cd Hash-Buster
3) Hash-Buster can be run directly from the python script but I highly suggest you to install it with
> make install
4) python hash.py/
5) buster -s <hash>
6) Finding hashes from a directory
just specify a directory and Hash Buster will go through all the files and directories present in it, looking for hashes.
> buster -d /root/Documents
7) Hash Buster can find your hashes even if they are stored in a file like this
๐ฆTested On:
> Kali
> Debian
Written by ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ