β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦To browse .onion Deep Web links, install Tor Browser from http://torproject.org/
π¦ Hidden Service lists and search engines: to find any :
> use tor browser to open
> avaible 7/24 or 24/24 β
http://3g2upl4pq6kufc4m.onion/ β DuckDuckGo Search Engine
http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page β Uncensored Hidden Wiki
http://idnxcnkne4qt76tg.onion/ β Tor Project: Anonymity Online
http://torlinkbgs6aabns.onion/ β TorLinks
http://jh32yv5zgayyyts3.onion/ β Hidden Wiki .Onion Urls
http://wikitjerrta4qgz4.onion/ β Hidden Wiki β Tor Wiki
http://xdagknwjc7aaytzh.onion/ β Anonet Webproxy
http://2vlqpcqpjlhmd5r2.onion/ β Gateway to Freenet
http://nlmymchrmnlmbnii.onion/ β Is It Up?
http://wiki5kauuihowqi5.onion/ β Onion Wiki β 650+ working 05.2017 deep web links
http://j6im4v42ur6dpic3.onion/ β TorProject Archive
http://p3igkncehackjtib.onion/ β TorProject Media
http://kbhpodhnfxl3clb4.onion β Tor Search
http://cipollatnumrrahd.onion/ β Cipolla 2.0 (Italian)
@UndercodeTesting
> source hidden wiki
π¦To browse .onion Deep Web links, install Tor Browser from http://torproject.org/
π¦ Hidden Service lists and search engines: to find any :
> use tor browser to open
> avaible 7/24 or 24/24 β
http://3g2upl4pq6kufc4m.onion/ β DuckDuckGo Search Engine
http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page β Uncensored Hidden Wiki
http://idnxcnkne4qt76tg.onion/ β Tor Project: Anonymity Online
http://torlinkbgs6aabns.onion/ β TorLinks
http://jh32yv5zgayyyts3.onion/ β Hidden Wiki .Onion Urls
http://wikitjerrta4qgz4.onion/ β Hidden Wiki β Tor Wiki
http://xdagknwjc7aaytzh.onion/ β Anonet Webproxy
http://2vlqpcqpjlhmd5r2.onion/ β Gateway to Freenet
http://nlmymchrmnlmbnii.onion/ β Is It Up?
http://wiki5kauuihowqi5.onion/ β Onion Wiki β 650+ working 05.2017 deep web links
http://j6im4v42ur6dpic3.onion/ β TorProject Archive
http://p3igkncehackjtib.onion/ β TorProject Media
http://kbhpodhnfxl3clb4.onion β Tor Search
http://cipollatnumrrahd.onion/ β Cipolla 2.0 (Italian)
@UndercodeTesting
> source hidden wiki
www.torproject.org
The Tor Project | Privacy & Freedom Online
Defend yourself against tracking and surveillance. Circumvent censorship.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦SlingTV Premium Accounts β
amy19ucf@yahoo.com:ilovedave12
mariececilia84@yahoo.com:nickel34
terence.siemon@gmail.com:12siemon
samc.tang@gmail.com:PwnageSince1917
amykaptein@yahoo.com:Hannah1998
jerenenicole1@gmail.com:simmons74
meko1123@gmail.com:carter718
morsedustin@yahoo.com:Broncos7
stowjacob@yahoo.com:weanbean4
brandonchavez719@live.com:Br4nd0!!
bostickarrington@yahoo.com:Shower23
jaceslater1501@gmail.com:Apple1015
lindarolon0228@yahoo.com:lrjr0228
haydenss123@gmail.com:worraps123
emily.c.claffey@gmail.com:calipso11
harry.adams37@gmail.com:NaHa1029
Tatyanapayne17@gmail.com:Tatylove1
Got2bloom@gmail.com:bart0772
tiffanylsmith0715@gmail.com:Purple0715
jakedotson17@gmail.com:d2394664
kevinbeharry2002@gmail.com:mangohouse827
tennflgirl@aol.com:Audie0812
brandibellville@yahoo.com:karter2013
alimwade@gmail.com:jacw4930
larsonfin@gmail.com:luok1230
ramirezanamaria594@gmail.com:Ballerina05
monroelazer@gmail.com:Chomp123
johara92ali@gmail.com:Sparkle92
hannahswenson4@gmail.com:Trevor02
ijace_gt@yahoo.com:dingo142315
miranda.allen8711@gmail.com:Miranda21
paulinaeimre@gmail.com:linux123
ameliaharms13@gmail.com:Emilysarah12
hollyahynek@gmail.com:N8329park
lynngullatte@yahoo.com:chelle71
melbell524@gmail.com:Welcome1
calebthomas15@gmail.com:tornado13
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦SlingTV Premium Accounts β
amy19ucf@yahoo.com:ilovedave12
mariececilia84@yahoo.com:nickel34
terence.siemon@gmail.com:12siemon
samc.tang@gmail.com:PwnageSince1917
amykaptein@yahoo.com:Hannah1998
jerenenicole1@gmail.com:simmons74
meko1123@gmail.com:carter718
morsedustin@yahoo.com:Broncos7
stowjacob@yahoo.com:weanbean4
brandonchavez719@live.com:Br4nd0!!
bostickarrington@yahoo.com:Shower23
jaceslater1501@gmail.com:Apple1015
lindarolon0228@yahoo.com:lrjr0228
haydenss123@gmail.com:worraps123
emily.c.claffey@gmail.com:calipso11
harry.adams37@gmail.com:NaHa1029
Tatyanapayne17@gmail.com:Tatylove1
Got2bloom@gmail.com:bart0772
tiffanylsmith0715@gmail.com:Purple0715
jakedotson17@gmail.com:d2394664
kevinbeharry2002@gmail.com:mangohouse827
tennflgirl@aol.com:Audie0812
brandibellville@yahoo.com:karter2013
alimwade@gmail.com:jacw4930
larsonfin@gmail.com:luok1230
ramirezanamaria594@gmail.com:Ballerina05
monroelazer@gmail.com:Chomp123
johara92ali@gmail.com:Sparkle92
hannahswenson4@gmail.com:Trevor02
ijace_gt@yahoo.com:dingo142315
miranda.allen8711@gmail.com:Miranda21
paulinaeimre@gmail.com:linux123
ameliaharms13@gmail.com:Emilysarah12
hollyahynek@gmail.com:N8329park
lynngullatte@yahoo.com:chelle71
melbell524@gmail.com:Welcome1
calebthomas15@gmail.com:tornado13
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Linuxx64_Password_Protected_Bindshell_+_Null_free_Shellcode_272.c
6.2 KB
2020 Shell Linux64 - Password Protected Bindshell + Null-free Shellcode (272 Bytes)
π¦About free domaine names :
> many sites gives trials even via fake cc
> any sites can get prm acc via bins(bad hackers)
> some websites gives free domaine name such :
https://www.freenom.com/en/index.html?lang=en
this site tempory all domaines used
> many sites gives trials even via fake cc
> any sites can get prm acc via bins(bad hackers)
> some websites gives free domaine name such :
https://www.freenom.com/en/index.html?lang=en
this site tempory all domaines used
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Automatically brute force all services running on a target.
> Termux-Linux
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/1N3/BruteX.git
2) cd BruteX
3) ./install.sh
4) brutex target <port>
5) DOCKER:
> docker build -t brutex .
> docker run -it brutex target <port>
π¦π΅π΄π°π π π π΄π :
Automatically brute force all services running on a target
Open ports
Usernames
Passwords
β
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Automatically brute force all services running on a target.
> Termux-Linux
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/1N3/BruteX.git
2) cd BruteX
3) ./install.sh
4) brutex target <port>
5) DOCKER:
> docker build -t brutex .
> docker run -it brutex target <port>
π¦π΅π΄π°π π π π΄π :
Automatically brute force all services running on a target
Open ports
Usernames
Passwords
β
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Fast Gmail Hacking for newbies
Generate Gmail Emailing Keyloggers to Windows :
Using Termux-Linux :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/4w4k3/BeeLogger.git
Running:
2) cd BeeLogger
3)sudo su
4) chmod +x install.sh
5) ./install.sh
6) python bee.py
7) If you have another version of Python:
> python2.7 bee.py
π¦π΅π΄π°π π π π΄π :
1) Send logs each 120 seconds.
2) Send logs when chars > 50.
3) Send logs with GMAIL.
4) Some Phishing methods are included.
5) Multiple Session disabled.
6) Auto Persistence.
π¦Tested on:
Kali Linux - SANA
Kali Linux - ROLLING
Ubuntu 14.04-16.04 LTS
Debian 8.5
Linux Mint 18.1
β
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Fast Gmail Hacking for newbies
Generate Gmail Emailing Keyloggers to Windows :
Using Termux-Linux :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/4w4k3/BeeLogger.git
Running:
2) cd BeeLogger
3)sudo su
4) chmod +x install.sh
5) ./install.sh
6) python bee.py
7) If you have another version of Python:
> python2.7 bee.py
π¦π΅π΄π°π π π π΄π :
1) Send logs each 120 seconds.
2) Send logs when chars > 50.
3) Send logs with GMAIL.
4) Some Phishing methods are included.
5) Multiple Session disabled.
6) Auto Persistence.
π¦Tested on:
Kali Linux - SANA
Kali Linux - ROLLING
Ubuntu 14.04-16.04 LTS
Debian 8.5
Linux Mint 18.1
β
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Looking for good keyloggers apps Windows :
1) refog
> http://www.filesriver.com/app/272/refog-free-keylogger
2) kidLogger :
> http://www.filesriver.com/app/273/kidlogger
3) Spyrix :
> http://www.spyrix.com/spyrix-free-keylogger.php?__c=1
4) revealed
> https://www.logixoft.com/index?__c=1#compare
5) KidLogger
> http://kidlogger.net/
6) free
https://bestxsoftware.com/index.html
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Looking for good keyloggers apps Windows :
1) refog
> http://www.filesriver.com/app/272/refog-free-keylogger
2) kidLogger :
> http://www.filesriver.com/app/273/kidlogger
3) Spyrix :
> http://www.spyrix.com/spyrix-free-keylogger.php?__c=1
4) revealed
> https://www.logixoft.com/index?__c=1#compare
5) KidLogger
> http://kidlogger.net/
6) free
https://bestxsoftware.com/index.html
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Filesriver
Refog Free Keylogger Freeware Download and Review
Refog Free Keylogger Free Download. Invisible program to track keystrokes, visited websites, screen captures. Refog Free Keylogger is able to record all keystrokes, but also to automatically capture screenshots of the entire screen or
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 updated Web Application Attack and Audit Framework :
> w3af is an open source web application security scanner which helps developers and penetration testers identify and exploit vulnerabilities in their web applications.
The scanner is able to identify 200+ vulnerabilities, including Cross-Site Scripting, SQL injection and OS commanding.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/andresriancho/w3af.git
2) cd w3af/
3) ./w3afconsole
4) . /tmp/w3afdependencyinstall.sh
π¦FOR KALI :
1) apt-get update
2) apt-get install -y w3af
> This will install the latest packaged version, which might not be the latest available from our repositories. If the latest version is needed these steps are recommended:
3) cd ~
4) apt-get update
5) apt-get install -y python-pip w3af
6) pip install --upgrade pip
7) git clone https://github.com/andresriancho/w3af.git
8) cd w3af
9) ./w3afconsole
10) . /tmp/w3afdependencyinstall.sh
β
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 updated Web Application Attack and Audit Framework :
> w3af is an open source web application security scanner which helps developers and penetration testers identify and exploit vulnerabilities in their web applications.
The scanner is able to identify 200+ vulnerabilities, including Cross-Site Scripting, SQL injection and OS commanding.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/andresriancho/w3af.git
2) cd w3af/
3) ./w3afconsole
4) . /tmp/w3afdependencyinstall.sh
π¦FOR KALI :
1) apt-get update
2) apt-get install -y w3af
> This will install the latest packaged version, which might not be the latest available from our repositories. If the latest version is needed these steps are recommended:
3) cd ~
4) apt-get update
5) apt-get install -y python-pip w3af
6) pip install --upgrade pip
7) git clone https://github.com/andresriancho/w3af.git
8) cd w3af
9) ./w3afconsole
10) . /tmp/w3afdependencyinstall.sh
β
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - andresriancho/w3af: w3af: web application attack and audit framework, the open source web vulnerability scanner.
w3af: web application attack and audit framework, the open source web vulnerability scanner. - andresriancho/w3af
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦New good wifi Hacking
A Suite of Tools written in Python for wireless auditing and security testing.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/MisterBianco/BoopSuite.git
2) go dir
3) Both a library and a toolset
Enumerate wireless interfaces
sudo python3 -m boop interface
Need additional information about a wireless interface?
sudo python3 -m boop interface {INTERFACE} -vvvv
Changing a cards mode
sudo python3 -m boop mode {INTERFACE} {monitor|managed}
4) To install open a terminal and type:
* work in progress adding to pypi
π¦π΅π΄π°π π π π΄π :
BoopSuite is a wireless testing suite with extensible and independent components.
1)Need to hop wireless channels? ... β
2)Need to only work with beacon packets? ... β
3)Need to Monitor Deauth requests? ... β
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦New good wifi Hacking
A Suite of Tools written in Python for wireless auditing and security testing.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/MisterBianco/BoopSuite.git
2) go dir
3) Both a library and a toolset
Enumerate wireless interfaces
sudo python3 -m boop interface
Need additional information about a wireless interface?
sudo python3 -m boop interface {INTERFACE} -vvvv
Changing a cards mode
sudo python3 -m boop mode {INTERFACE} {monitor|managed}
4) To install open a terminal and type:
* work in progress adding to pypi
π¦π΅π΄π°π π π π΄π :
BoopSuite is a wireless testing suite with extensible and independent components.
1)Need to hop wireless channels? ... β
2)Need to only work with beacon packets? ... β
3)Need to Monitor Deauth requests? ... β
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - MisterBianco/BoopSuite: A Suite of Tools written in Python for wireless auditing and security testing.
A Suite of Tools written in Python for wireless auditing and security testing. - GitHub - MisterBianco/BoopSuite: A Suite of Tools written in Python for wireless auditing and security testing.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Docker Images for Penetration Testing & Security :
1 )Docker Images for Penetration Testing & Security
docker pull kalilinux/kali-linux-docker` [official Kali Linux](https://hub.docker.com/r/kalilinux/kali-linux-docker/)
2) docker pull owasp/zap2docker-stable` - [official OWASP ZAP](https://github.com/zaproxy/zaproxy)
3) docker pull wpscanteam/wpscan` - [official WPScan](https://hub.docker.com/r/wpscanteam/wpscan/)
4) docker pull pandrew/metasploit` - [docker-metasploit](https://hub.docker.com/r/pandrew/metasploit/)
5) docker pull citizenstig/dvwa` - [Damn Vulnerable Web Application (DVWA)](https://hub.docker.com/r/citizenstig/dvwa/)
6) docker pull wpscanteam/vulnerablewordpress` - [Vulnerable WordPress Installation](https://hub.docker.com/r/wpscanteam/vulnerablewordpress/)
7) docker pull hmlio/vaas-cve-2014-6271` - [Vulnerability as a service: Shellshock](https://hub.docker.com/r/hmlio/vaas-cve-2014-6271/)
8) docker pull hmlio/vaas-cve-2014-0160` - [Vulnerability as a service: Heartbleed](https://hub.docker.com/r/hmlio/vaas-cve-2014-0160/)
9) docker pull opendns/security-ninjas` - [Security Ninjas](https://hub.docker.com/r/opendns/security-ninjas/)
10) docker pull usertaken/archlinux-pentest-lxde` - [Arch Linux Penetration Tester](https://hub.docker.com/r/usertaken/archlinux-pentest-lxde/)
11) docker pull diogomonica/docker-bench-security` - [Docker Bench for Security](https://hub.docker.com/r/diogomonica/docker-bench-security/)
12) docker pull ismisepaul/securityshepherd` - [OWASP Security Shepherd](https://hub.docker.com/r/ismisepaul/securityshepherd/)
13) docker pull danmx/docker-owasp-webgoat` - [OWASP WebGoat Project docker image](https://hub.docker.com/r/danmx/docker-owasp-webgoat/)
14) docker-compose build && docker-compose up` - [OWASP NodeGoat](https://github.com/owasp/nodegoat#option-3---run-nodegoat-on-docker)
15) docker pull citizenstig/nowasp` - [OWASP Mutillidae II Web Pen-Test Practice Application](https://hub.docker.com/r/citizenstig/nowasp/)
16) docker pull bkimminich/juice-shop` - [OWASP Juice Shop](https://github.com/bkimminich/juice-shop#docker-container--)
17) docker pull phocean/msf` - [Docker Metasploit](https://hub.docker.com/r/phocean/msf/)
git sources
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Docker Images for Penetration Testing & Security :
1 )Docker Images for Penetration Testing & Security
docker pull kalilinux/kali-linux-docker` [official Kali Linux](https://hub.docker.com/r/kalilinux/kali-linux-docker/)
2) docker pull owasp/zap2docker-stable` - [official OWASP ZAP](https://github.com/zaproxy/zaproxy)
3) docker pull wpscanteam/wpscan` - [official WPScan](https://hub.docker.com/r/wpscanteam/wpscan/)
4) docker pull pandrew/metasploit` - [docker-metasploit](https://hub.docker.com/r/pandrew/metasploit/)
5) docker pull citizenstig/dvwa` - [Damn Vulnerable Web Application (DVWA)](https://hub.docker.com/r/citizenstig/dvwa/)
6) docker pull wpscanteam/vulnerablewordpress` - [Vulnerable WordPress Installation](https://hub.docker.com/r/wpscanteam/vulnerablewordpress/)
7) docker pull hmlio/vaas-cve-2014-6271` - [Vulnerability as a service: Shellshock](https://hub.docker.com/r/hmlio/vaas-cve-2014-6271/)
8) docker pull hmlio/vaas-cve-2014-0160` - [Vulnerability as a service: Heartbleed](https://hub.docker.com/r/hmlio/vaas-cve-2014-0160/)
9) docker pull opendns/security-ninjas` - [Security Ninjas](https://hub.docker.com/r/opendns/security-ninjas/)
10) docker pull usertaken/archlinux-pentest-lxde` - [Arch Linux Penetration Tester](https://hub.docker.com/r/usertaken/archlinux-pentest-lxde/)
11) docker pull diogomonica/docker-bench-security` - [Docker Bench for Security](https://hub.docker.com/r/diogomonica/docker-bench-security/)
12) docker pull ismisepaul/securityshepherd` - [OWASP Security Shepherd](https://hub.docker.com/r/ismisepaul/securityshepherd/)
13) docker pull danmx/docker-owasp-webgoat` - [OWASP WebGoat Project docker image](https://hub.docker.com/r/danmx/docker-owasp-webgoat/)
14) docker-compose build && docker-compose up` - [OWASP NodeGoat](https://github.com/owasp/nodegoat#option-3---run-nodegoat-on-docker)
15) docker pull citizenstig/nowasp` - [OWASP Mutillidae II Web Pen-Test Practice Application](https://hub.docker.com/r/citizenstig/nowasp/)
16) docker pull bkimminich/juice-shop` - [OWASP Juice Shop](https://github.com/bkimminich/juice-shop#docker-container--)
17) docker pull phocean/msf` - [Docker Metasploit](https://hub.docker.com/r/phocean/msf/)
git sources
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - zaproxy/zaproxy: The ZAP by Checkmarx Core project
The ZAP by Checkmarx Core project. Contribute to zaproxy/zaproxy development by creating an account on GitHub.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Tools Disassemblers and debuggers :
1) IDA - IDA is a Windows, Linux or Mac OS X hosted multi-processor disassembler and debugger
2) OllyDbg - A 32-bit assembler level analysing debugger for Windows
3) x64dbg - An open-source x64/x32 debugger for Windows
4) radare2 - A portable reversing framework
5) plasma - Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code.
6) ScratchABit - Easily retargetable and hackable interactive disassembler with IDAPython-compatible plugin API
7) Capstone
git sources
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Tools Disassemblers and debuggers :
1) IDA - IDA is a Windows, Linux or Mac OS X hosted multi-processor disassembler and debugger
2) OllyDbg - A 32-bit assembler level analysing debugger for Windows
3) x64dbg - An open-source x64/x32 debugger for Windows
4) radare2 - A portable reversing framework
5) plasma - Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code.
6) ScratchABit - Easily retargetable and hackable interactive disassembler with IDAPython-compatible plugin API
7) Capstone
git sources
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
www.ollydbg.de
OllyDbg v1.10
32-bit assembler-level debugger