β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Looking for good keyloggers apps Windows :
1) refog
> http://www.filesriver.com/app/272/refog-free-keylogger
2) kidLogger :
> http://www.filesriver.com/app/273/kidlogger
3) Spyrix :
> http://www.spyrix.com/spyrix-free-keylogger.php?__c=1
4) revealed
> https://www.logixoft.com/index?__c=1#compare
5) KidLogger
> http://kidlogger.net/
6) free
https://bestxsoftware.com/index.html
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Looking for good keyloggers apps Windows :
1) refog
> http://www.filesriver.com/app/272/refog-free-keylogger
2) kidLogger :
> http://www.filesriver.com/app/273/kidlogger
3) Spyrix :
> http://www.spyrix.com/spyrix-free-keylogger.php?__c=1
4) revealed
> https://www.logixoft.com/index?__c=1#compare
5) KidLogger
> http://kidlogger.net/
6) free
https://bestxsoftware.com/index.html
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Filesriver
Refog Free Keylogger Freeware Download and Review
Refog Free Keylogger Free Download. Invisible program to track keystrokes, visited websites, screen captures. Refog Free Keylogger is able to record all keystrokes, but also to automatically capture screenshots of the entire screen or
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 updated Web Application Attack and Audit Framework :
> w3af is an open source web application security scanner which helps developers and penetration testers identify and exploit vulnerabilities in their web applications.
The scanner is able to identify 200+ vulnerabilities, including Cross-Site Scripting, SQL injection and OS commanding.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/andresriancho/w3af.git
2) cd w3af/
3) ./w3afconsole
4) . /tmp/w3afdependencyinstall.sh
π¦FOR KALI :
1) apt-get update
2) apt-get install -y w3af
> This will install the latest packaged version, which might not be the latest available from our repositories. If the latest version is needed these steps are recommended:
3) cd ~
4) apt-get update
5) apt-get install -y python-pip w3af
6) pip install --upgrade pip
7) git clone https://github.com/andresriancho/w3af.git
8) cd w3af
9) ./w3afconsole
10) . /tmp/w3afdependencyinstall.sh
β
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 updated Web Application Attack and Audit Framework :
> w3af is an open source web application security scanner which helps developers and penetration testers identify and exploit vulnerabilities in their web applications.
The scanner is able to identify 200+ vulnerabilities, including Cross-Site Scripting, SQL injection and OS commanding.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/andresriancho/w3af.git
2) cd w3af/
3) ./w3afconsole
4) . /tmp/w3afdependencyinstall.sh
π¦FOR KALI :
1) apt-get update
2) apt-get install -y w3af
> This will install the latest packaged version, which might not be the latest available from our repositories. If the latest version is needed these steps are recommended:
3) cd ~
4) apt-get update
5) apt-get install -y python-pip w3af
6) pip install --upgrade pip
7) git clone https://github.com/andresriancho/w3af.git
8) cd w3af
9) ./w3afconsole
10) . /tmp/w3afdependencyinstall.sh
β
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - andresriancho/w3af: w3af: web application attack and audit framework, the open source web vulnerability scanner.
w3af: web application attack and audit framework, the open source web vulnerability scanner. - andresriancho/w3af
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦New good wifi Hacking
A Suite of Tools written in Python for wireless auditing and security testing.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/MisterBianco/BoopSuite.git
2) go dir
3) Both a library and a toolset
Enumerate wireless interfaces
sudo python3 -m boop interface
Need additional information about a wireless interface?
sudo python3 -m boop interface {INTERFACE} -vvvv
Changing a cards mode
sudo python3 -m boop mode {INTERFACE} {monitor|managed}
4) To install open a terminal and type:
* work in progress adding to pypi
π¦π΅π΄π°π π π π΄π :
BoopSuite is a wireless testing suite with extensible and independent components.
1)Need to hop wireless channels? ... β
2)Need to only work with beacon packets? ... β
3)Need to Monitor Deauth requests? ... β
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦New good wifi Hacking
A Suite of Tools written in Python for wireless auditing and security testing.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/MisterBianco/BoopSuite.git
2) go dir
3) Both a library and a toolset
Enumerate wireless interfaces
sudo python3 -m boop interface
Need additional information about a wireless interface?
sudo python3 -m boop interface {INTERFACE} -vvvv
Changing a cards mode
sudo python3 -m boop mode {INTERFACE} {monitor|managed}
4) To install open a terminal and type:
* work in progress adding to pypi
π¦π΅π΄π°π π π π΄π :
BoopSuite is a wireless testing suite with extensible and independent components.
1)Need to hop wireless channels? ... β
2)Need to only work with beacon packets? ... β
3)Need to Monitor Deauth requests? ... β
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - MisterBianco/BoopSuite: A Suite of Tools written in Python for wireless auditing and security testing.
A Suite of Tools written in Python for wireless auditing and security testing. - GitHub - MisterBianco/BoopSuite: A Suite of Tools written in Python for wireless auditing and security testing.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Docker Images for Penetration Testing & Security :
1 )Docker Images for Penetration Testing & Security
docker pull kalilinux/kali-linux-docker` [official Kali Linux](https://hub.docker.com/r/kalilinux/kali-linux-docker/)
2) docker pull owasp/zap2docker-stable` - [official OWASP ZAP](https://github.com/zaproxy/zaproxy)
3) docker pull wpscanteam/wpscan` - [official WPScan](https://hub.docker.com/r/wpscanteam/wpscan/)
4) docker pull pandrew/metasploit` - [docker-metasploit](https://hub.docker.com/r/pandrew/metasploit/)
5) docker pull citizenstig/dvwa` - [Damn Vulnerable Web Application (DVWA)](https://hub.docker.com/r/citizenstig/dvwa/)
6) docker pull wpscanteam/vulnerablewordpress` - [Vulnerable WordPress Installation](https://hub.docker.com/r/wpscanteam/vulnerablewordpress/)
7) docker pull hmlio/vaas-cve-2014-6271` - [Vulnerability as a service: Shellshock](https://hub.docker.com/r/hmlio/vaas-cve-2014-6271/)
8) docker pull hmlio/vaas-cve-2014-0160` - [Vulnerability as a service: Heartbleed](https://hub.docker.com/r/hmlio/vaas-cve-2014-0160/)
9) docker pull opendns/security-ninjas` - [Security Ninjas](https://hub.docker.com/r/opendns/security-ninjas/)
10) docker pull usertaken/archlinux-pentest-lxde` - [Arch Linux Penetration Tester](https://hub.docker.com/r/usertaken/archlinux-pentest-lxde/)
11) docker pull diogomonica/docker-bench-security` - [Docker Bench for Security](https://hub.docker.com/r/diogomonica/docker-bench-security/)
12) docker pull ismisepaul/securityshepherd` - [OWASP Security Shepherd](https://hub.docker.com/r/ismisepaul/securityshepherd/)
13) docker pull danmx/docker-owasp-webgoat` - [OWASP WebGoat Project docker image](https://hub.docker.com/r/danmx/docker-owasp-webgoat/)
14) docker-compose build && docker-compose up` - [OWASP NodeGoat](https://github.com/owasp/nodegoat#option-3---run-nodegoat-on-docker)
15) docker pull citizenstig/nowasp` - [OWASP Mutillidae II Web Pen-Test Practice Application](https://hub.docker.com/r/citizenstig/nowasp/)
16) docker pull bkimminich/juice-shop` - [OWASP Juice Shop](https://github.com/bkimminich/juice-shop#docker-container--)
17) docker pull phocean/msf` - [Docker Metasploit](https://hub.docker.com/r/phocean/msf/)
git sources
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Docker Images for Penetration Testing & Security :
1 )Docker Images for Penetration Testing & Security
docker pull kalilinux/kali-linux-docker` [official Kali Linux](https://hub.docker.com/r/kalilinux/kali-linux-docker/)
2) docker pull owasp/zap2docker-stable` - [official OWASP ZAP](https://github.com/zaproxy/zaproxy)
3) docker pull wpscanteam/wpscan` - [official WPScan](https://hub.docker.com/r/wpscanteam/wpscan/)
4) docker pull pandrew/metasploit` - [docker-metasploit](https://hub.docker.com/r/pandrew/metasploit/)
5) docker pull citizenstig/dvwa` - [Damn Vulnerable Web Application (DVWA)](https://hub.docker.com/r/citizenstig/dvwa/)
6) docker pull wpscanteam/vulnerablewordpress` - [Vulnerable WordPress Installation](https://hub.docker.com/r/wpscanteam/vulnerablewordpress/)
7) docker pull hmlio/vaas-cve-2014-6271` - [Vulnerability as a service: Shellshock](https://hub.docker.com/r/hmlio/vaas-cve-2014-6271/)
8) docker pull hmlio/vaas-cve-2014-0160` - [Vulnerability as a service: Heartbleed](https://hub.docker.com/r/hmlio/vaas-cve-2014-0160/)
9) docker pull opendns/security-ninjas` - [Security Ninjas](https://hub.docker.com/r/opendns/security-ninjas/)
10) docker pull usertaken/archlinux-pentest-lxde` - [Arch Linux Penetration Tester](https://hub.docker.com/r/usertaken/archlinux-pentest-lxde/)
11) docker pull diogomonica/docker-bench-security` - [Docker Bench for Security](https://hub.docker.com/r/diogomonica/docker-bench-security/)
12) docker pull ismisepaul/securityshepherd` - [OWASP Security Shepherd](https://hub.docker.com/r/ismisepaul/securityshepherd/)
13) docker pull danmx/docker-owasp-webgoat` - [OWASP WebGoat Project docker image](https://hub.docker.com/r/danmx/docker-owasp-webgoat/)
14) docker-compose build && docker-compose up` - [OWASP NodeGoat](https://github.com/owasp/nodegoat#option-3---run-nodegoat-on-docker)
15) docker pull citizenstig/nowasp` - [OWASP Mutillidae II Web Pen-Test Practice Application](https://hub.docker.com/r/citizenstig/nowasp/)
16) docker pull bkimminich/juice-shop` - [OWASP Juice Shop](https://github.com/bkimminich/juice-shop#docker-container--)
17) docker pull phocean/msf` - [Docker Metasploit](https://hub.docker.com/r/phocean/msf/)
git sources
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - zaproxy/zaproxy: The ZAP by Checkmarx Core project
The ZAP by Checkmarx Core project. Contribute to zaproxy/zaproxy development by creating an account on GitHub.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Tools Disassemblers and debuggers :
1) IDA - IDA is a Windows, Linux or Mac OS X hosted multi-processor disassembler and debugger
2) OllyDbg - A 32-bit assembler level analysing debugger for Windows
3) x64dbg - An open-source x64/x32 debugger for Windows
4) radare2 - A portable reversing framework
5) plasma - Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code.
6) ScratchABit - Easily retargetable and hackable interactive disassembler with IDAPython-compatible plugin API
7) Capstone
git sources
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Tools Disassemblers and debuggers :
1) IDA - IDA is a Windows, Linux or Mac OS X hosted multi-processor disassembler and debugger
2) OllyDbg - A 32-bit assembler level analysing debugger for Windows
3) x64dbg - An open-source x64/x32 debugger for Windows
4) radare2 - A portable reversing framework
5) plasma - Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code.
6) ScratchABit - Easily retargetable and hackable interactive disassembler with IDAPython-compatible plugin API
7) Capstone
git sources
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
www.ollydbg.de
OllyDbg v1.10
32-bit assembler-level debugger
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Decompilers :
1) JVM-based languages
Krakatau - the best decompiler I have used. Is able to decompile apps written in Scala and Kotlin into Java code. JD-GUI and Luyten have failed to do it fully.
2) JD-GUI
procyon
3) Luyten - one of the best, though a bit slow, hangs on some binaries and not very well maintained.
4) JAD - JAD Java Decompiler (closed-source, unmaintained)
5) JADX - a decompiler for Android apps. Not related to JAD.
6) Dotnet-based languages
dotPeek - a free-of-charge
7) .NET decompiler from JetBrains
ILSpy - an open-source .NET assembly browser and decompiler
8) dnSpy - .NET assembly editor, decompiler, and debugger
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Decompilers :
1) JVM-based languages
Krakatau - the best decompiler I have used. Is able to decompile apps written in Scala and Kotlin into Java code. JD-GUI and Luyten have failed to do it fully.
2) JD-GUI
procyon
3) Luyten - one of the best, though a bit slow, hangs on some binaries and not very well maintained.
4) JAD - JAD Java Decompiler (closed-source, unmaintained)
5) JADX - a decompiler for Android apps. Not related to JAD.
6) Dotnet-based languages
dotPeek - a free-of-charge
7) .NET decompiler from JetBrains
ILSpy - an open-source .NET assembly browser and decompiler
8) dnSpy - .NET assembly editor, decompiler, and debugger
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - Storyyeller/Krakatau: Java decompiler, assembler, and disassembler
Java decompiler, assembler, and disassembler. Contribute to Storyyeller/Krakatau development by creating an account on GitHub.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦best Deobfuscators tools :
1) de4dot - .NET deobfuscator and unpacker.
2) JS Beautifier
3) JS Nice - a web service guessing JS variables names and types based on the model derived from open source.
π¦Others :
1) nudge4j - Java tool to let the browser talk to the JVM
2) dex2jar - Tools to work with Android .dex and Java .class files
3) androguard - Reverse engineering, malware and goodware analysis of Android applications
4) antinet - .NET anti-managed debugger and anti-profiler code
5) UPX - the Ultimate Packer (and unpacker) for eXecutables
@UndercodeTesting
git sources
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦best Deobfuscators tools :
1) de4dot - .NET deobfuscator and unpacker.
2) JS Beautifier
3) JS Nice - a web service guessing JS variables names and types based on the model derived from open source.
π¦Others :
1) nudge4j - Java tool to let the browser talk to the JVM
2) dex2jar - Tools to work with Android .dex and Java .class files
3) androguard - Reverse engineering, malware and goodware analysis of Android applications
4) antinet - .NET anti-managed debugger and anti-profiler code
5) UPX - the Ultimate Packer (and unpacker) for eXecutables
@UndercodeTesting
git sources
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - de4dot/de4dot: .NET deobfuscator and unpacker.
.NET deobfuscator and unpacker. Contribute to de4dot/de4dot development by creating an account on GitHub.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Execution logging and tracing :
π¦ Wireshark - A free and open-source packet analyzer
π¦ tcpdump - A powerful command-line packet analyzer; and libpcap, a portable C/C++ library for network traffic capture
π¦ mitmproxy - An interactive, SSL-capable man-in-the-middle proxy for HTTP with a console interface
π¦ Charles Proxy - A cross-platform GUI web debugging proxy to view intercepted HTTP and HTTPS/SSL live traffic
π¦ usbmon - USB capture for Linux.
π¦ USBPcap - USB capture for Windows.
π¦ dynStruct - structures recovery via dynamic instrumentation.
π¦ drltrace - shared library calls tracing.
@UndercodeTesting
git sources
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Execution logging and tracing :
π¦ Wireshark - A free and open-source packet analyzer
π¦ tcpdump - A powerful command-line packet analyzer; and libpcap, a portable C/C++ library for network traffic capture
π¦ mitmproxy - An interactive, SSL-capable man-in-the-middle proxy for HTTP with a console interface
π¦ Charles Proxy - A cross-platform GUI web debugging proxy to view intercepted HTTP and HTTPS/SSL live traffic
π¦ usbmon - USB capture for Linux.
π¦ USBPcap - USB capture for Windows.
π¦ dynStruct - structures recovery via dynamic instrumentation.
π¦ drltrace - shared library calls tracing.
@UndercodeTesting
git sources
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
www.tcpdump.org
Home | TCPDUMP & LIBPCAP
Web site of Tcpdump and Libpcap
Forwarded from Backup Legal Mega
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Core Technology-Code Example :
EXPERT HACKING BY UNDERCODE :
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
***********************************************************************/
/* 1 */
#define KERNEL
#include <linux/kernel.h>
#include <linux/sched.h>
#include <linux/tty.h>
#include <linux/signal.h>
#include <linux/errno.h>
#include <linux/malloc.h>
#include <asm/io.h>
#include <asm/segment.h>
#include <asm/system.h>
#include <asm/irq.h>
#include "tdd.h"
/* 2 */
static int tdd_trace;
static int write_busy;
static int read_busy;
static struct tdd_buf *qhead;
static struct tdd_buf *qtail;
/* 3 */
static int tdd_read(struct inode *, struct file *, char *, int);
static int tdd_write(struct inode *, struct file *, char *, int);
static int tdd_ioctl(struct inode *, struct file *, unsigned int,
unsigned long);
static int tdd_open(struct inode *, struct file *);
static void tdd_release(struct inode *, struct file *);
extern void console_print(char *);
struct file_operations tdd_fops =
{
NULL,
tdd_read,
tdd_write,
NULL,
NULL,
tdd_ioctl,
NULL,
tdd_open,
tdd_release,
NULL,
NULL,
NULL,
NULL
};
]
init.c
/*******************************************************
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
***********************************************************************/
void tdd_init(void)
{
tdd_trace = TRUE;
if (register_chrdev(30, "tdd", &tdd_fops))
TRACE_TXT("Cannot register tdd driver as major device 30")
else
TRACE_TXT("Tiny device driver registered successfully")
--------------------------------------------------------------------------------
newthread
/*******************************************************
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
***********************************************************************/
new_thread(int (*start_addr)(void), int stack_size)
{
struct context *ptr;
int esp;
/* 1 */
if (!(ptr = (struct context *)malloc(sizeof(struct context))))
return 0;
/* 2 */
if (!(ptr->stack = (char *)malloc(stack_size)))
return 0;
/* 3 */
esp = (int)(ptr->stack+(stack_size-4));
*(int *)esp = (int)exit_thread;
*(int *)(esp-4) = (int)start_addr;
*(int *)(esp-icon_cool.gif = esp-4;
ptr->ebp = esp-8;
π¦Core Technology-Code Example :
EXPERT HACKING BY UNDERCODE :
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
***********************************************************************/
/* 1 */
#define KERNEL
#include <linux/kernel.h>
#include <linux/sched.h>
#include <linux/tty.h>
#include <linux/signal.h>
#include <linux/errno.h>
#include <linux/malloc.h>
#include <asm/io.h>
#include <asm/segment.h>
#include <asm/system.h>
#include <asm/irq.h>
#include "tdd.h"
/* 2 */
static int tdd_trace;
static int write_busy;
static int read_busy;
static struct tdd_buf *qhead;
static struct tdd_buf *qtail;
/* 3 */
static int tdd_read(struct inode *, struct file *, char *, int);
static int tdd_write(struct inode *, struct file *, char *, int);
static int tdd_ioctl(struct inode *, struct file *, unsigned int,
unsigned long);
static int tdd_open(struct inode *, struct file *);
static void tdd_release(struct inode *, struct file *);
extern void console_print(char *);
struct file_operations tdd_fops =
{
NULL,
tdd_read,
tdd_write,
NULL,
NULL,
tdd_ioctl,
NULL,
tdd_open,
tdd_release,
NULL,
NULL,
NULL,
NULL
};
]
init.c
/*******************************************************
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
***********************************************************************/
void tdd_init(void)
{
tdd_trace = TRUE;
if (register_chrdev(30, "tdd", &tdd_fops))
TRACE_TXT("Cannot register tdd driver as major device 30")
else
TRACE_TXT("Tiny device driver registered successfully")
--------------------------------------------------------------------------------
newthread
/*******************************************************
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
***********************************************************************/
new_thread(int (*start_addr)(void), int stack_size)
{
struct context *ptr;
int esp;
/* 1 */
if (!(ptr = (struct context *)malloc(sizeof(struct context))))
return 0;
/* 2 */
if (!(ptr->stack = (char *)malloc(stack_size)))
return 0;
/* 3 */
esp = (int)(ptr->stack+(stack_size-4));
*(int *)esp = (int)exit_thread;
*(int *)(esp-4) = (int)start_addr;
*(int *)(esp-icon_cool.gif = esp-4;
ptr->ebp = esp-8;
Forwarded from Backup Legal Mega
/* 4 */
if (thread_count++)
{
/* 5 */
ptr->next = current->next;
ptr->prev = current;
current->next->prev = ptr;
current->next = ptr;
}
else
{
/* 6 */
ptr->next = ptr;
ptr->prev = ptr;
current = ptr;
switch_context(&main_thread, current);
}
return 1;
}
--------------------------------------------------------------------------------
exitthead
/*******************************************************
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
***********************************************************************/
static exit_thread(void)
{
struct context dump, *ptr;
/* 1 */
if (--thread_count)
{
/* 2 */
ptr = current;
current->prev->next = current->next;
current->next->prev = current->prev;
current = current->next;
free(ptr->stack);
free(ptr);
switch_context(&dump, current);
}
else
{
/* 3 */
free(current->stack);
free(current);
switch_context(&dump, &main_thread);
}
}
getchannel
/*******************************************************
written by @Undercoder
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
if (thread_count++)
{
/* 5 */
ptr->next = current->next;
ptr->prev = current;
current->next->prev = ptr;
current->next = ptr;
}
else
{
/* 6 */
ptr->next = ptr;
ptr->prev = ptr;
current = ptr;
switch_context(&main_thread, current);
}
return 1;
}
--------------------------------------------------------------------------------
exitthead
/*******************************************************
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
***********************************************************************/
static exit_thread(void)
{
struct context dump, *ptr;
/* 1 */
if (--thread_count)
{
/* 2 */
ptr = current;
current->prev->next = current->next;
current->next->prev = current->prev;
current = current->next;
free(ptr->stack);
free(ptr);
switch_context(&dump, current);
}
else
{
/* 3 */
free(current->stack);
free(current);
switch_context(&dump, &main_thread);
}
}
getchannel
/*******************************************************
written by @Undercoder
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Forwarded from iUNDERCODE - iOs JAILBREAK & MODS
Telegram
iUNDERCODE - iOs JAILBREAK & MODS
WELCOME TO iUNDERCODE CHANNEL FOR iOS UPDATES | TIPS | IPA & much more..
iUndercode.com
@UndercodeTesting @iUndercode @Dailycve @UndercodeNews
Follow us :
youtube.com/undercode
instagram.com/iUndercode
fb.com/iUndercode
Twitter.com/iUndercode
iUndercode.com
@UndercodeTesting @iUndercode @Dailycve @UndercodeNews
Follow us :
youtube.com/undercode
instagram.com/iUndercode
fb.com/iUndercode
Twitter.com/iUndercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
2020 Hex editors :
π¦ HxD - A hex editor which, additionally to raw disk editing and modifying of main memory (RAM), handles files of any size
π¦ WinHex - A hexadecimal editor, helpful in the realm of computer forensics, data recovery, low-level data processing, and IT security
π¦ wxHexEditor
π¦ Synalize It/Hexinator -
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
2020 Hex editors :
π¦ HxD - A hex editor which, additionally to raw disk editing and modifying of main memory (RAM), handles files of any size
π¦ WinHex - A hexadecimal editor, helpful in the realm of computer forensics, data recovery, low-level data processing, and IT security
π¦ wxHexEditor
π¦ Synalize It/Hexinator -
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
mh-nexus.de
HxD - Freeware Hex Editor and Disk Editor | mh-nexus
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
USEFULL TOOLS FOR PRO HACKERS :
π¦ Binwalk - Detects signatures, unpacks archives, visualizes entropy.
π¦ Veles - a visualizer for statistical properties of blobs.
π¦ Kaitai Struct - a DSL for creating parsers in a variety of programming languages. The Web IDE is particulary useful fir reverse-engineering.
π¦ Protobuf inspector
π¦ DarunGrim - executable differ.
π¦ DBeaver - a DB editor.
π¦ Dependencies - a FOSS replacement to Dependency Walker.
π¦ PEview - A quick and easy way to view the structure and content of 32-bit Portable Executable (PE) and Component Object File Format (COFF) files
π¦ BinText - A small, very fast and powerful text extractor that will be of particular interest to programmers.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
USEFULL TOOLS FOR PRO HACKERS :
π¦ Binwalk - Detects signatures, unpacks archives, visualizes entropy.
π¦ Veles - a visualizer for statistical properties of blobs.
π¦ Kaitai Struct - a DSL for creating parsers in a variety of programming languages. The Web IDE is particulary useful fir reverse-engineering.
π¦ Protobuf inspector
π¦ DarunGrim - executable differ.
π¦ DBeaver - a DB editor.
π¦ Dependencies - a FOSS replacement to Dependency Walker.
π¦ PEview - A quick and easy way to view the structure and content of 32-bit Portable Executable (PE) and Component Object File Format (COFF) files
π¦ BinText - A small, very fast and powerful text extractor that will be of particular interest to programmers.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - ReFirmLabs/binwalk: Firmware Analysis Tool
Firmware Analysis Tool. Contribute to ReFirmLabs/binwalk development by creating an account on GitHub.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
USEFULL TOOLS FOR PRO HACKERS :
π¦ Binwalk - Detects signatures, unpacks archives, visualizes entropy.
π¦ Veles - a visualizer for statistical properties of blobs.
π¦ Kaitai Struct - a DSL for creating parsers in a variety of programming languages. The Web IDE is particulary useful fir reverse-engineering.
π¦ Protobuf inspector
π¦ DarunGrim - executable differ.
π¦ DBeaver - a DB editor.
π¦ Dependencies - a FOSS replacement to Dependency Walker.
π¦ PEview - A quick and easy way to view the structure and content of 32-bit Portable Executable (PE) and Component Object File Format (COFF) files
π¦ BinText - A small, very fast and powerful text extractor that will be of particular interest to programmers.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
USEFULL TOOLS FOR PRO HACKERS :
π¦ Binwalk - Detects signatures, unpacks archives, visualizes entropy.
π¦ Veles - a visualizer for statistical properties of blobs.
π¦ Kaitai Struct - a DSL for creating parsers in a variety of programming languages. The Web IDE is particulary useful fir reverse-engineering.
π¦ Protobuf inspector
π¦ DarunGrim - executable differ.
π¦ DBeaver - a DB editor.
π¦ Dependencies - a FOSS replacement to Dependency Walker.
π¦ PEview - A quick and easy way to view the structure and content of 32-bit Portable Executable (PE) and Component Object File Format (COFF) files
π¦ BinText - A small, very fast and powerful text extractor that will be of particular interest to programmers.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - ReFirmLabs/binwalk: Firmware Analysis Tool
Firmware Analysis Tool. Contribute to ReFirmLabs/binwalk development by creating an account on GitHub.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
2020 Web Hacking tools :
> source git
π¦ Spyse - Data gathering service that collects web info using OSINT. Provided info: IPv4 hosts, domains/whois, ports/banners/protocols, technologies, OS, AS, maintains huge SSL/TLS DB, and more... All the data is stored in its own database allowing get the data without scanning.
π¦ sqlmap - Automatic SQL injection and database takeover tool
π¦ NoSQLMap - Automated NoSQL database enumeration and web application exploitation tool.
π¦ tools.web-max.ca - base64 base85 md4,5 hash, sha1 hash encoding/decoding
π¦ VHostScan - A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages.
π¦ SubFinder - SubFinder is a subdomain discovery tool that discovers valid subdomains for any target using passive online sources.
π¦ Findsubdomains - A subdomains discovery tool that collects all possible subdomains from open source internet and validates them through various tools to provide accurate results.
π¦ badtouch - Scriptable network authentication cracker
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
2020 Web Hacking tools :
> source git
π¦ Spyse - Data gathering service that collects web info using OSINT. Provided info: IPv4 hosts, domains/whois, ports/banners/protocols, technologies, OS, AS, maintains huge SSL/TLS DB, and more... All the data is stored in its own database allowing get the data without scanning.
π¦ sqlmap - Automatic SQL injection and database takeover tool
π¦ NoSQLMap - Automated NoSQL database enumeration and web application exploitation tool.
π¦ tools.web-max.ca - base64 base85 md4,5 hash, sha1 hash encoding/decoding
π¦ VHostScan - A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages.
π¦ SubFinder - SubFinder is a subdomain discovery tool that discovers valid subdomains for any target using passive online sources.
π¦ Findsubdomains - A subdomains discovery tool that collects all possible subdomains from open source internet and validates them through various tools to provide accurate results.
π¦ badtouch - Scriptable network authentication cracker
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 Hacking Network TOP RATED TOOLS :
>SOURCE GIT
π¦ NetworkMiner - A Network Forensic Analysis Tool (NFAT)
π¦ Paros - A Java-based HTTP/HTTPS proxy for assessing web application vulnerability
π¦ pig - A Linux packet crafting tool
π¦ findsubdomains - really fast subdomains scanning service that has much greater opportunities than simple subs finder(works using OSINT).
π¦ cirt-fuzzer - A simple TCP/UDP protocol fuzzer.
π¦ ASlookup - a useful tool for exploring autonomous systems and all related info (CIDR, ASN, Org...)
π¦ ZAP - The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications
π¦ mitmsocks4j - Man-in-the-middle SOCKS Proxy for Java
π¦ ssh-mitm - An SSH/SFTP man-in-the-middle tool that logs interactive sessions and passwords.
π¦ nmap - Nmap (Network Mapper) is a security scanner
π¦ Aircrack-ng - An 802.11 WEP and WPA-PSK keys cracking program
π¦ Nipe - A script to make Tor Network your default gateway.
π¦ Habu - Python Network Hacking Toolkit
π¦ Wifi Jammer - Free program to jam all wifi clients in range
π¦ Firesheep - Free program for HTTP session hijacking attacks.
π¦ Scapy - A Python tool and library for low level packet creation and manipulation
π¦ Amass - In-depth subdomain enumeration tool that performs scraping, recursive brute forcing, crawling of web archives, name altering and reverse DNS sweeping
π¦ sniffglue - Secure multithreaded packet sniffer
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 Hacking Network TOP RATED TOOLS :
>SOURCE GIT
π¦ NetworkMiner - A Network Forensic Analysis Tool (NFAT)
π¦ Paros - A Java-based HTTP/HTTPS proxy for assessing web application vulnerability
π¦ pig - A Linux packet crafting tool
π¦ findsubdomains - really fast subdomains scanning service that has much greater opportunities than simple subs finder(works using OSINT).
π¦ cirt-fuzzer - A simple TCP/UDP protocol fuzzer.
π¦ ASlookup - a useful tool for exploring autonomous systems and all related info (CIDR, ASN, Org...)
π¦ ZAP - The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications
π¦ mitmsocks4j - Man-in-the-middle SOCKS Proxy for Java
π¦ ssh-mitm - An SSH/SFTP man-in-the-middle tool that logs interactive sessions and passwords.
π¦ nmap - Nmap (Network Mapper) is a security scanner
π¦ Aircrack-ng - An 802.11 WEP and WPA-PSK keys cracking program
π¦ Nipe - A script to make Tor Network your default gateway.
π¦ Habu - Python Network Hacking Toolkit
π¦ Wifi Jammer - Free program to jam all wifi clients in range
π¦ Firesheep - Free program for HTTP session hijacking attacks.
π¦ Scapy - A Python tool and library for low level packet creation and manipulation
π¦ Amass - In-depth subdomain enumeration tool that performs scraping, recursive brute forcing, crawling of web archives, name altering and reverse DNS sweeping
π¦ sniffglue - Secure multithreaded packet sniffer
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Netresec
NetworkMiner - The NSM and Network Forensics Analysis Tool β
Network Miner is a network forensics tool for analyzing network traffic