π¦Stone River eLearning - Common PHP Errors You Will Encounter β165 MB
https://www.oreilly.com/library/view/common-php-errors/100000006A0493/
>Download<
https://www.oreilly.com/library/view/common-php-errors/100000006A0493/
>Download<
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦CyberScan is an open source penetration testing tool that can analyse packets , decoding , scanning ports, pinging and geolocation of an IP including (latitude, longitude , region , country ...)
> termux-linux
π¦ πβπππΈπππππΈπππβ & βπβ :
1)git clone https://github.com/medbenali/CyberScan.git
2)cd CyberScan/
3)python CyberScan.py -v
ARP Ping
$ CyberScan -s 192.168.1.0/24 -p arp
* Starting Ping ARP for 192.168.1.0/24
Begin emission:
Finished to send 256 packets.
Received 0 packets, got 0 answers, remaining 256 packets
ICMP Ping
In other cases we can use ICMP ping:
$ CyberScan -s 192.168.1.1-254 -p icmp
* Starting Ping ARP for 192.168.1.0/24
Begin emission:
Finished to send 256 packets.
Received 0 packets, got 0 answers, remaining 256 packets
TCP Ping
In case when ICMP echo requests are blocked, we can still use TCP:
$ CyberScan -s 192.168.1.1-254 -p tcp -d 80
UDP Ping
Or even UDP (which produces ICMP port unreachable errors from live hosts). We can pick any port which is most likely to be closed, such as port 0:
$ CyberScan -s 192.168..... -p udp
β @undercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦CyberScan is an open source penetration testing tool that can analyse packets , decoding , scanning ports, pinging and geolocation of an IP including (latitude, longitude , region , country ...)
> termux-linux
π¦ πβπππΈπππππΈπππβ & βπβ :
1)git clone https://github.com/medbenali/CyberScan.git
2)cd CyberScan/
3)python CyberScan.py -v
ARP Ping
$ CyberScan -s 192.168.1.0/24 -p arp
* Starting Ping ARP for 192.168.1.0/24
Begin emission:
Finished to send 256 packets.
Received 0 packets, got 0 answers, remaining 256 packets
ICMP Ping
In other cases we can use ICMP ping:
$ CyberScan -s 192.168.1.1-254 -p icmp
* Starting Ping ARP for 192.168.1.0/24
Begin emission:
Finished to send 256 packets.
Received 0 packets, got 0 answers, remaining 256 packets
TCP Ping
In case when ICMP echo requests are blocked, we can still use TCP:
$ CyberScan -s 192.168.1.1-254 -p tcp -d 80
UDP Ping
Or even UDP (which produces ICMP port unreachable errors from live hosts). We can pick any port which is most likely to be closed, such as port 0:
$ CyberScan -s 192.168..... -p udp
β @undercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦CyberScan is an open source penetration testing tool that can analyse packets , decoding , scanning ports, pinging and geolocation of an IP including (latitude, longitude , region , country ...)
> termux-linux
π¦ πβπππΈπππππΈπππβ & βπβ :
1)git clone https://github.com/medbenali/CyberScan.git
2)cd CyberScan/
3)python CyberScan.py -v
ARP Ping
$ CyberScan -s 192.168.1.0/24 -p arp
* Starting Ping ARP for 192.168.1.0/24
Begin emission:
Finished to send 256 packets.
Received 0 packets, got 0 answers, remaining 256 packets
ICMP Ping
In other cases we can use ICMP ping:
$ CyberScan -s 192.168.1.1-254 -p icmp
* Starting Ping ARP for 192.168.1.0/24
Begin emission:
Finished to send 256 packets.
Received 0 packets, got 0 answers, remaining 256 packets
TCP Ping
In case when ICMP echo requests are blocked, we can still use TCP:
$ CyberScan -s 192.168.1.1-254 -p tcp -d 80
UDP Ping
Or even UDP (which produces ICMP port unreachable errors from live hosts). We can pick any port which is most likely to be closed, such as port 0:
$ CyberScan -s 192.168..... -p udp
β @undercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦CyberScan is an open source penetration testing tool that can analyse packets , decoding , scanning ports, pinging and geolocation of an IP including (latitude, longitude , region , country ...)
> termux-linux
π¦ πβπππΈπππππΈπππβ & βπβ :
1)git clone https://github.com/medbenali/CyberScan.git
2)cd CyberScan/
3)python CyberScan.py -v
ARP Ping
$ CyberScan -s 192.168.1.0/24 -p arp
* Starting Ping ARP for 192.168.1.0/24
Begin emission:
Finished to send 256 packets.
Received 0 packets, got 0 answers, remaining 256 packets
ICMP Ping
In other cases we can use ICMP ping:
$ CyberScan -s 192.168.1.1-254 -p icmp
* Starting Ping ARP for 192.168.1.0/24
Begin emission:
Finished to send 256 packets.
Received 0 packets, got 0 answers, remaining 256 packets
TCP Ping
In case when ICMP echo requests are blocked, we can still use TCP:
$ CyberScan -s 192.168.1.1-254 -p tcp -d 80
UDP Ping
Or even UDP (which produces ICMP port unreachable errors from live hosts). We can pick any port which is most likely to be closed, such as port 0:
$ CyberScan -s 192.168..... -p udp
β @undercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Damn Small XSS Scanner
Damn Small XSS Scanner (DSXS) is a fully functional Cross-site scripting vulnerability scanner (supporting GET and POST parameters) written in under 100 lines of code.
> As of optional settings it supports HTTP proxy together with HTTP header values User-Agent, Referer and Cookie.
> termux-linux
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/stamparm/DSXS.git
2) cd DSXS
3) python3 dsxs.py -h
Damn Small XSS Scanner (DSXS) < 100 LoC (Lines of Code) #v0.3a
by: Miroslav Stampar (@stamparm)
π¦Usage: dsxs.py options
Options:
--version show program's version number and exit
-h, --help show this help message and exit
-u URL, --url=URL Target URL (e.g. "http://www.target.com/page.htm?id=1")
--data=DATA POST data (e.g. "query=test")
--cookie=COOKIE HTTP Cookie header value
--user-agent=UA HTTP User-Agent header value
--referer=REFERER HTTP Referer header value
--proxy=PROXY HTTP proxy address (e.g. "http://127.0.0.1:8080")
$ python3 dsxs.py -u "http://testphp.vulnweb.com/search.php?test=query" --data="s
earchFor=foobar"
Damn Small XSS Scanner (DSXS) < 100 LoC (Lines of Code) #v0.3a
by: Miroslav Stampar (@stamparm)
scanning GET parameter 'test'
scanning POST parameter 'searchFor'
(i) POST parameter 'searchFor' appears to be XSS vulnerable (">.xss.<", outside
of tags, no filtering)
scan results: possible vulnerabilities found
$ python3 dsxs.py -u "http://public-firing-range.appspot.com/address/location.has
h/replace"
Damn Small XSS Scanner (DSXS) < 100 LoC (Lines of Code) #v0.3a
by: Miroslav Stampar (@stamparm)
(i) page itself appears to be XSS vulnerable (DOM)
(o) ...<script>
var payload = window.location.hash.substr(1);location.replace(payload);
</script>...
(x) no usable GET/POST parameters found
scan results: possible vulnerabilities found
β Verified by Undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Damn Small XSS Scanner
Damn Small XSS Scanner (DSXS) is a fully functional Cross-site scripting vulnerability scanner (supporting GET and POST parameters) written in under 100 lines of code.
> As of optional settings it supports HTTP proxy together with HTTP header values User-Agent, Referer and Cookie.
> termux-linux
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/stamparm/DSXS.git
2) cd DSXS
3) python3 dsxs.py -h
Damn Small XSS Scanner (DSXS) < 100 LoC (Lines of Code) #v0.3a
by: Miroslav Stampar (@stamparm)
π¦Usage: dsxs.py options
Options:
--version show program's version number and exit
-h, --help show this help message and exit
-u URL, --url=URL Target URL (e.g. "http://www.target.com/page.htm?id=1")
--data=DATA POST data (e.g. "query=test")
--cookie=COOKIE HTTP Cookie header value
--user-agent=UA HTTP User-Agent header value
--referer=REFERER HTTP Referer header value
--proxy=PROXY HTTP proxy address (e.g. "http://127.0.0.1:8080")
$ python3 dsxs.py -u "http://testphp.vulnweb.com/search.php?test=query" --data="s
earchFor=foobar"
Damn Small XSS Scanner (DSXS) < 100 LoC (Lines of Code) #v0.3a
by: Miroslav Stampar (@stamparm)
scanning GET parameter 'test'
scanning POST parameter 'searchFor'
(i) POST parameter 'searchFor' appears to be XSS vulnerable (">.xss.<", outside
of tags, no filtering)
scan results: possible vulnerabilities found
$ python3 dsxs.py -u "http://public-firing-range.appspot.com/address/location.has
h/replace"
Damn Small XSS Scanner (DSXS) < 100 LoC (Lines of Code) #v0.3a
by: Miroslav Stampar (@stamparm)
(i) page itself appears to be XSS vulnerable (DOM)
(o) ...<script>
var payload = window.location.hash.substr(1);location.replace(payload);
</script>...
(x) no usable GET/POST parameters found
scan results: possible vulnerabilities found
β Verified by Undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Forwarded from Backup Legal Mega
107 - Java Swing [-PUNISHER-].pdf
7 MB
Forwarded from Backup Legal Mega
109_Java_Programming_From_Problem_Analysis_To_Program_Design_4th.pdf
8.5 MB
Forwarded from Backup Legal Mega
121_Metasploit_The_Penetration_Testers_Guide_2011_PUNISHER_.pdf
6.9 MB
Forwarded from Backup Legal Mega
124 - Msaccessebook [-PUNISHER-].pdf
449.9 KB
Forwarded from Backup Legal Mega
125_Nessus,_Snort,_&_Ethereal_Power_Tools_Customizing_Open_Source.pdf
7.1 MB
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 best list of firefox plugins :
>Speedup-Block adds...
https://addons.mozilla.org/en-US/firefox/addon/adblock-plus/
https://addons.mozilla.org/en-US/firefox/addon/ghostery/
https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/
https://addons.mozilla.org/en-US/firefox/addon/greasemonkey/
https://addons.mozilla.org/en-US/firefox/addon/lightshot/
https://addons.mozilla.org/en-US/firefox/addon/umatrix/
https://addons.mozilla.org/en-US/firefox/addon/darkreader/
https://addons.mozilla.org/en-US/firefox/addon/clippings/
https://addons.mozilla.org/en-US/firefox/addon/grammarly-1/
https://addons.mozilla.org/en-US/firefox/addon/videospeed/
https://addons.mozilla.org/en-US/firefox/addon/tabliss/
https://addons.mozilla.org/en-US/firefox/addon/gesturefy/
https://addons.mozilla.org/en-US/firefox/addon/image-search-options/
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 best list of firefox plugins :
>Speedup-Block adds...
https://addons.mozilla.org/en-US/firefox/addon/adblock-plus/
https://addons.mozilla.org/en-US/firefox/addon/ghostery/
https://addons.mozilla.org/en-US/firefox/addon/ublock-origin/
https://addons.mozilla.org/en-US/firefox/addon/greasemonkey/
https://addons.mozilla.org/en-US/firefox/addon/lightshot/
https://addons.mozilla.org/en-US/firefox/addon/umatrix/
https://addons.mozilla.org/en-US/firefox/addon/darkreader/
https://addons.mozilla.org/en-US/firefox/addon/clippings/
https://addons.mozilla.org/en-US/firefox/addon/grammarly-1/
https://addons.mozilla.org/en-US/firefox/addon/videospeed/
https://addons.mozilla.org/en-US/firefox/addon/tabliss/
https://addons.mozilla.org/en-US/firefox/addon/gesturefy/
https://addons.mozilla.org/en-US/firefox/addon/image-search-options/
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
addons.mozilla.org
Adblock Plus β Get this Extension for π¦ Firefox (en-US)
Download Adblock Plus for Firefox. One of the most popular free ad blockers for Firefox. Block annoying ads on sites like Facebook, YouTube and all other websites.
Adblock Plus blocks all annoying ads, and supports websites by not blocking unobtrusive adsβ¦
Adblock Plus blocks all annoying ads, and supports websites by not blocking unobtrusive adsβ¦
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 best ad blocker apps for Android
https://f-droid.org/en/packages/org.adaway/
https://adblockplus.org/android-about
https://adguard.com/en/adguard-android/overview.html
http://andauth.co/chrome
https://block-this.com/
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 best ad blocker apps for Android
https://f-droid.org/en/packages/org.adaway/
https://adblockplus.org/android-about
https://adguard.com/en/adguard-android/overview.html
http://andauth.co/chrome
https://block-this.com/
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
f-droid.org
AdAway | F-Droid - Free and Open Source Android App Repository
A free and Open Source ad blocker for Android.
π¦TypeScript for JavaScript Developers β522 MB
https://www.packtpub.com/web-development/typescript-for-javascript-developers-video
>Download<
https://www.packtpub.com/web-development/typescript-for-javascript-developers-video
>Download<
Packt
Search | Packt Subscription
Search over 7,500 Programming & Development eBooks and videos to advance your IT skills, including Web Development, Application Development and Networking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Interpretation of apache configuration file http.conf
1) interpretation apache configuration file http.conf
recently wanted to do with their own server machines, because I know enough about the contents of http.conf, as well as their own path detours. Now explain the meaning of several options that need to be modified frequently in this file, I hope it will be helpful to everyone.
2) Bindaddress 127.0.0.1, this option means to bind your own IP address. If you are a stand-alone, this is your IP address; if your machine is online, then Bindaddress is followed by your IP address (I wasted a lot of time because I did not change the IP address here to my own IP address ).
3) Servername localhost, this option is the domain name of your machine. If you are a stand-alone computer, the domain name is localhost; if you are connected to the Internet, you should connect the domain name behind Servername, and if you do not have a domain name, connect your own IP address.
Port 80, this option is to indicate the port the server is listening on, generally defaults to 80, and can be changed to 80 or 8080.
ScriptAlias ββ/ php4 / \ "C: / php4 / \"
AddType application / x-httpd-php4 .php
AddType application / x-httpd-php4 .php3
AddType application / x-httpd-php4 .php4
Action application / x-httpd- php4 \ "/ php4 / php.exe \" The
above options allow your APACHE to support PHP4.
About the default startup document: Apache's default startup document is index.html DirectoryIndex index.html Change it to the default startup document you want. Want to support more documents like this:
DirectoryIndex index.htm
DirectoryIndex index.php
DirectoryIndex index.php3
DirectoryIndex index.php4
Well, with these options APACHE should basically be able to run normally!
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Interpretation of apache configuration file http.conf
1) interpretation apache configuration file http.conf
recently wanted to do with their own server machines, because I know enough about the contents of http.conf, as well as their own path detours. Now explain the meaning of several options that need to be modified frequently in this file, I hope it will be helpful to everyone.
2) Bindaddress 127.0.0.1, this option means to bind your own IP address. If you are a stand-alone, this is your IP address; if your machine is online, then Bindaddress is followed by your IP address (I wasted a lot of time because I did not change the IP address here to my own IP address ).
3) Servername localhost, this option is the domain name of your machine. If you are a stand-alone computer, the domain name is localhost; if you are connected to the Internet, you should connect the domain name behind Servername, and if you do not have a domain name, connect your own IP address.
Port 80, this option is to indicate the port the server is listening on, generally defaults to 80, and can be changed to 80 or 8080.
ScriptAlias ββ/ php4 / \ "C: / php4 / \"
AddType application / x-httpd-php4 .php
AddType application / x-httpd-php4 .php3
AddType application / x-httpd-php4 .php4
Action application / x-httpd- php4 \ "/ php4 / php.exe \" The
above options allow your APACHE to support PHP4.
About the default startup document: Apache's default startup document is index.html DirectoryIndex index.html Change it to the default startup document you want. Want to support more documents like this:
DirectoryIndex index.htm
DirectoryIndex index.php
DirectoryIndex index.php3
DirectoryIndex index.php4
Well, with these options APACHE should basically be able to run normally!
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Advertising on Facebook β-385 MB
https://www.lynda.com/Facebook-tutorials/Advertising-Facebook/2809360-2.html
>Download<
https://www.lynda.com/Facebook-tutorials/Advertising-Facebook/2809360-2.html
>Download<
LinkedIn
Advertising on Facebook Online Class | LinkedIn Learning, formerly Lynda.com
Amplify your reach with Facebook advertising. Learn how to create and manage Facebook ads campaigns that grow your business and boost your brand.