β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦New good wifi Hacking
A Suite of Tools written in Python for wireless auditing and security testing.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/MisterBianco/BoopSuite.git
2) go dir
3) Both a library and a toolset
Enumerate wireless interfaces
sudo python3 -m boop interface
Need additional information about a wireless interface?
sudo python3 -m boop interface {INTERFACE} -vvvv
Changing a cards mode
sudo python3 -m boop mode {INTERFACE} {monitor|managed}
4) To install open a terminal and type:
* work in progress adding to pypi
π¦π΅π΄π°π π π π΄π :
BoopSuite is a wireless testing suite with extensible and independent components.
1)Need to hop wireless channels? ... β
2)Need to only work with beacon packets? ... β
3)Need to Monitor Deauth requests? ... β
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦New good wifi Hacking
A Suite of Tools written in Python for wireless auditing and security testing.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/MisterBianco/BoopSuite.git
2) go dir
3) Both a library and a toolset
Enumerate wireless interfaces
sudo python3 -m boop interface
Need additional information about a wireless interface?
sudo python3 -m boop interface {INTERFACE} -vvvv
Changing a cards mode
sudo python3 -m boop mode {INTERFACE} {monitor|managed}
4) To install open a terminal and type:
* work in progress adding to pypi
π¦π΅π΄π°π π π π΄π :
BoopSuite is a wireless testing suite with extensible and independent components.
1)Need to hop wireless channels? ... β
2)Need to only work with beacon packets? ... β
3)Need to Monitor Deauth requests? ... β
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - MisterBianco/BoopSuite: A Suite of Tools written in Python for wireless auditing and security testing.
A Suite of Tools written in Python for wireless auditing and security testing. - GitHub - MisterBianco/BoopSuite: A Suite of Tools written in Python for wireless auditing and security testing.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Docker Images for Penetration Testing & Security :
1 )Docker Images for Penetration Testing & Security
docker pull kalilinux/kali-linux-docker` [official Kali Linux](https://hub.docker.com/r/kalilinux/kali-linux-docker/)
2) docker pull owasp/zap2docker-stable` - [official OWASP ZAP](https://github.com/zaproxy/zaproxy)
3) docker pull wpscanteam/wpscan` - [official WPScan](https://hub.docker.com/r/wpscanteam/wpscan/)
4) docker pull pandrew/metasploit` - [docker-metasploit](https://hub.docker.com/r/pandrew/metasploit/)
5) docker pull citizenstig/dvwa` - [Damn Vulnerable Web Application (DVWA)](https://hub.docker.com/r/citizenstig/dvwa/)
6) docker pull wpscanteam/vulnerablewordpress` - [Vulnerable WordPress Installation](https://hub.docker.com/r/wpscanteam/vulnerablewordpress/)
7) docker pull hmlio/vaas-cve-2014-6271` - [Vulnerability as a service: Shellshock](https://hub.docker.com/r/hmlio/vaas-cve-2014-6271/)
8) docker pull hmlio/vaas-cve-2014-0160` - [Vulnerability as a service: Heartbleed](https://hub.docker.com/r/hmlio/vaas-cve-2014-0160/)
9) docker pull opendns/security-ninjas` - [Security Ninjas](https://hub.docker.com/r/opendns/security-ninjas/)
10) docker pull usertaken/archlinux-pentest-lxde` - [Arch Linux Penetration Tester](https://hub.docker.com/r/usertaken/archlinux-pentest-lxde/)
11) docker pull diogomonica/docker-bench-security` - [Docker Bench for Security](https://hub.docker.com/r/diogomonica/docker-bench-security/)
12) docker pull ismisepaul/securityshepherd` - [OWASP Security Shepherd](https://hub.docker.com/r/ismisepaul/securityshepherd/)
13) docker pull danmx/docker-owasp-webgoat` - [OWASP WebGoat Project docker image](https://hub.docker.com/r/danmx/docker-owasp-webgoat/)
14) docker-compose build && docker-compose up` - [OWASP NodeGoat](https://github.com/owasp/nodegoat#option-3---run-nodegoat-on-docker)
15) docker pull citizenstig/nowasp` - [OWASP Mutillidae II Web Pen-Test Practice Application](https://hub.docker.com/r/citizenstig/nowasp/)
16) docker pull bkimminich/juice-shop` - [OWASP Juice Shop](https://github.com/bkimminich/juice-shop#docker-container--)
17) docker pull phocean/msf` - [Docker Metasploit](https://hub.docker.com/r/phocean/msf/)
git sources
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Docker Images for Penetration Testing & Security :
1 )Docker Images for Penetration Testing & Security
docker pull kalilinux/kali-linux-docker` [official Kali Linux](https://hub.docker.com/r/kalilinux/kali-linux-docker/)
2) docker pull owasp/zap2docker-stable` - [official OWASP ZAP](https://github.com/zaproxy/zaproxy)
3) docker pull wpscanteam/wpscan` - [official WPScan](https://hub.docker.com/r/wpscanteam/wpscan/)
4) docker pull pandrew/metasploit` - [docker-metasploit](https://hub.docker.com/r/pandrew/metasploit/)
5) docker pull citizenstig/dvwa` - [Damn Vulnerable Web Application (DVWA)](https://hub.docker.com/r/citizenstig/dvwa/)
6) docker pull wpscanteam/vulnerablewordpress` - [Vulnerable WordPress Installation](https://hub.docker.com/r/wpscanteam/vulnerablewordpress/)
7) docker pull hmlio/vaas-cve-2014-6271` - [Vulnerability as a service: Shellshock](https://hub.docker.com/r/hmlio/vaas-cve-2014-6271/)
8) docker pull hmlio/vaas-cve-2014-0160` - [Vulnerability as a service: Heartbleed](https://hub.docker.com/r/hmlio/vaas-cve-2014-0160/)
9) docker pull opendns/security-ninjas` - [Security Ninjas](https://hub.docker.com/r/opendns/security-ninjas/)
10) docker pull usertaken/archlinux-pentest-lxde` - [Arch Linux Penetration Tester](https://hub.docker.com/r/usertaken/archlinux-pentest-lxde/)
11) docker pull diogomonica/docker-bench-security` - [Docker Bench for Security](https://hub.docker.com/r/diogomonica/docker-bench-security/)
12) docker pull ismisepaul/securityshepherd` - [OWASP Security Shepherd](https://hub.docker.com/r/ismisepaul/securityshepherd/)
13) docker pull danmx/docker-owasp-webgoat` - [OWASP WebGoat Project docker image](https://hub.docker.com/r/danmx/docker-owasp-webgoat/)
14) docker-compose build && docker-compose up` - [OWASP NodeGoat](https://github.com/owasp/nodegoat#option-3---run-nodegoat-on-docker)
15) docker pull citizenstig/nowasp` - [OWASP Mutillidae II Web Pen-Test Practice Application](https://hub.docker.com/r/citizenstig/nowasp/)
16) docker pull bkimminich/juice-shop` - [OWASP Juice Shop](https://github.com/bkimminich/juice-shop#docker-container--)
17) docker pull phocean/msf` - [Docker Metasploit](https://hub.docker.com/r/phocean/msf/)
git sources
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - zaproxy/zaproxy: The ZAP by Checkmarx Core project
The ZAP by Checkmarx Core project. Contribute to zaproxy/zaproxy development by creating an account on GitHub.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Tools Disassemblers and debuggers :
1) IDA - IDA is a Windows, Linux or Mac OS X hosted multi-processor disassembler and debugger
2) OllyDbg - A 32-bit assembler level analysing debugger for Windows
3) x64dbg - An open-source x64/x32 debugger for Windows
4) radare2 - A portable reversing framework
5) plasma - Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code.
6) ScratchABit - Easily retargetable and hackable interactive disassembler with IDAPython-compatible plugin API
7) Capstone
git sources
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Tools Disassemblers and debuggers :
1) IDA - IDA is a Windows, Linux or Mac OS X hosted multi-processor disassembler and debugger
2) OllyDbg - A 32-bit assembler level analysing debugger for Windows
3) x64dbg - An open-source x64/x32 debugger for Windows
4) radare2 - A portable reversing framework
5) plasma - Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code.
6) ScratchABit - Easily retargetable and hackable interactive disassembler with IDAPython-compatible plugin API
7) Capstone
git sources
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
www.ollydbg.de
OllyDbg v1.10
32-bit assembler-level debugger
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Decompilers :
1) JVM-based languages
Krakatau - the best decompiler I have used. Is able to decompile apps written in Scala and Kotlin into Java code. JD-GUI and Luyten have failed to do it fully.
2) JD-GUI
procyon
3) Luyten - one of the best, though a bit slow, hangs on some binaries and not very well maintained.
4) JAD - JAD Java Decompiler (closed-source, unmaintained)
5) JADX - a decompiler for Android apps. Not related to JAD.
6) Dotnet-based languages
dotPeek - a free-of-charge
7) .NET decompiler from JetBrains
ILSpy - an open-source .NET assembly browser and decompiler
8) dnSpy - .NET assembly editor, decompiler, and debugger
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Decompilers :
1) JVM-based languages
Krakatau - the best decompiler I have used. Is able to decompile apps written in Scala and Kotlin into Java code. JD-GUI and Luyten have failed to do it fully.
2) JD-GUI
procyon
3) Luyten - one of the best, though a bit slow, hangs on some binaries and not very well maintained.
4) JAD - JAD Java Decompiler (closed-source, unmaintained)
5) JADX - a decompiler for Android apps. Not related to JAD.
6) Dotnet-based languages
dotPeek - a free-of-charge
7) .NET decompiler from JetBrains
ILSpy - an open-source .NET assembly browser and decompiler
8) dnSpy - .NET assembly editor, decompiler, and debugger
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - Storyyeller/Krakatau: Java decompiler, assembler, and disassembler
Java decompiler, assembler, and disassembler. Contribute to Storyyeller/Krakatau development by creating an account on GitHub.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦best Deobfuscators tools :
1) de4dot - .NET deobfuscator and unpacker.
2) JS Beautifier
3) JS Nice - a web service guessing JS variables names and types based on the model derived from open source.
π¦Others :
1) nudge4j - Java tool to let the browser talk to the JVM
2) dex2jar - Tools to work with Android .dex and Java .class files
3) androguard - Reverse engineering, malware and goodware analysis of Android applications
4) antinet - .NET anti-managed debugger and anti-profiler code
5) UPX - the Ultimate Packer (and unpacker) for eXecutables
@UndercodeTesting
git sources
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦best Deobfuscators tools :
1) de4dot - .NET deobfuscator and unpacker.
2) JS Beautifier
3) JS Nice - a web service guessing JS variables names and types based on the model derived from open source.
π¦Others :
1) nudge4j - Java tool to let the browser talk to the JVM
2) dex2jar - Tools to work with Android .dex and Java .class files
3) androguard - Reverse engineering, malware and goodware analysis of Android applications
4) antinet - .NET anti-managed debugger and anti-profiler code
5) UPX - the Ultimate Packer (and unpacker) for eXecutables
@UndercodeTesting
git sources
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - de4dot/de4dot: .NET deobfuscator and unpacker.
.NET deobfuscator and unpacker. Contribute to de4dot/de4dot development by creating an account on GitHub.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Execution logging and tracing :
π¦ Wireshark - A free and open-source packet analyzer
π¦ tcpdump - A powerful command-line packet analyzer; and libpcap, a portable C/C++ library for network traffic capture
π¦ mitmproxy - An interactive, SSL-capable man-in-the-middle proxy for HTTP with a console interface
π¦ Charles Proxy - A cross-platform GUI web debugging proxy to view intercepted HTTP and HTTPS/SSL live traffic
π¦ usbmon - USB capture for Linux.
π¦ USBPcap - USB capture for Windows.
π¦ dynStruct - structures recovery via dynamic instrumentation.
π¦ drltrace - shared library calls tracing.
@UndercodeTesting
git sources
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Execution logging and tracing :
π¦ Wireshark - A free and open-source packet analyzer
π¦ tcpdump - A powerful command-line packet analyzer; and libpcap, a portable C/C++ library for network traffic capture
π¦ mitmproxy - An interactive, SSL-capable man-in-the-middle proxy for HTTP with a console interface
π¦ Charles Proxy - A cross-platform GUI web debugging proxy to view intercepted HTTP and HTTPS/SSL live traffic
π¦ usbmon - USB capture for Linux.
π¦ USBPcap - USB capture for Windows.
π¦ dynStruct - structures recovery via dynamic instrumentation.
π¦ drltrace - shared library calls tracing.
@UndercodeTesting
git sources
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
www.tcpdump.org
Home | TCPDUMP & LIBPCAP
Web site of Tcpdump and Libpcap
Forwarded from Backup Legal Mega
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Core Technology-Code Example :
EXPERT HACKING BY UNDERCODE :
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
***********************************************************************/
/* 1 */
#define KERNEL
#include <linux/kernel.h>
#include <linux/sched.h>
#include <linux/tty.h>
#include <linux/signal.h>
#include <linux/errno.h>
#include <linux/malloc.h>
#include <asm/io.h>
#include <asm/segment.h>
#include <asm/system.h>
#include <asm/irq.h>
#include "tdd.h"
/* 2 */
static int tdd_trace;
static int write_busy;
static int read_busy;
static struct tdd_buf *qhead;
static struct tdd_buf *qtail;
/* 3 */
static int tdd_read(struct inode *, struct file *, char *, int);
static int tdd_write(struct inode *, struct file *, char *, int);
static int tdd_ioctl(struct inode *, struct file *, unsigned int,
unsigned long);
static int tdd_open(struct inode *, struct file *);
static void tdd_release(struct inode *, struct file *);
extern void console_print(char *);
struct file_operations tdd_fops =
{
NULL,
tdd_read,
tdd_write,
NULL,
NULL,
tdd_ioctl,
NULL,
tdd_open,
tdd_release,
NULL,
NULL,
NULL,
NULL
};
]
init.c
/*******************************************************
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
***********************************************************************/
void tdd_init(void)
{
tdd_trace = TRUE;
if (register_chrdev(30, "tdd", &tdd_fops))
TRACE_TXT("Cannot register tdd driver as major device 30")
else
TRACE_TXT("Tiny device driver registered successfully")
--------------------------------------------------------------------------------
newthread
/*******************************************************
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
***********************************************************************/
new_thread(int (*start_addr)(void), int stack_size)
{
struct context *ptr;
int esp;
/* 1 */
if (!(ptr = (struct context *)malloc(sizeof(struct context))))
return 0;
/* 2 */
if (!(ptr->stack = (char *)malloc(stack_size)))
return 0;
/* 3 */
esp = (int)(ptr->stack+(stack_size-4));
*(int *)esp = (int)exit_thread;
*(int *)(esp-4) = (int)start_addr;
*(int *)(esp-icon_cool.gif = esp-4;
ptr->ebp = esp-8;
π¦Core Technology-Code Example :
EXPERT HACKING BY UNDERCODE :
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
***********************************************************************/
/* 1 */
#define KERNEL
#include <linux/kernel.h>
#include <linux/sched.h>
#include <linux/tty.h>
#include <linux/signal.h>
#include <linux/errno.h>
#include <linux/malloc.h>
#include <asm/io.h>
#include <asm/segment.h>
#include <asm/system.h>
#include <asm/irq.h>
#include "tdd.h"
/* 2 */
static int tdd_trace;
static int write_busy;
static int read_busy;
static struct tdd_buf *qhead;
static struct tdd_buf *qtail;
/* 3 */
static int tdd_read(struct inode *, struct file *, char *, int);
static int tdd_write(struct inode *, struct file *, char *, int);
static int tdd_ioctl(struct inode *, struct file *, unsigned int,
unsigned long);
static int tdd_open(struct inode *, struct file *);
static void tdd_release(struct inode *, struct file *);
extern void console_print(char *);
struct file_operations tdd_fops =
{
NULL,
tdd_read,
tdd_write,
NULL,
NULL,
tdd_ioctl,
NULL,
tdd_open,
tdd_release,
NULL,
NULL,
NULL,
NULL
};
]
init.c
/*******************************************************
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
***********************************************************************/
void tdd_init(void)
{
tdd_trace = TRUE;
if (register_chrdev(30, "tdd", &tdd_fops))
TRACE_TXT("Cannot register tdd driver as major device 30")
else
TRACE_TXT("Tiny device driver registered successfully")
--------------------------------------------------------------------------------
newthread
/*******************************************************
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
***********************************************************************/
new_thread(int (*start_addr)(void), int stack_size)
{
struct context *ptr;
int esp;
/* 1 */
if (!(ptr = (struct context *)malloc(sizeof(struct context))))
return 0;
/* 2 */
if (!(ptr->stack = (char *)malloc(stack_size)))
return 0;
/* 3 */
esp = (int)(ptr->stack+(stack_size-4));
*(int *)esp = (int)exit_thread;
*(int *)(esp-4) = (int)start_addr;
*(int *)(esp-icon_cool.gif = esp-4;
ptr->ebp = esp-8;
Forwarded from Backup Legal Mega
/* 4 */
if (thread_count++)
{
/* 5 */
ptr->next = current->next;
ptr->prev = current;
current->next->prev = ptr;
current->next = ptr;
}
else
{
/* 6 */
ptr->next = ptr;
ptr->prev = ptr;
current = ptr;
switch_context(&main_thread, current);
}
return 1;
}
--------------------------------------------------------------------------------
exitthead
/*******************************************************
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
***********************************************************************/
static exit_thread(void)
{
struct context dump, *ptr;
/* 1 */
if (--thread_count)
{
/* 2 */
ptr = current;
current->prev->next = current->next;
current->next->prev = current->prev;
current = current->next;
free(ptr->stack);
free(ptr);
switch_context(&dump, current);
}
else
{
/* 3 */
free(current->stack);
free(current);
switch_context(&dump, &main_thread);
}
}
getchannel
/*******************************************************
written by @Undercoder
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
if (thread_count++)
{
/* 5 */
ptr->next = current->next;
ptr->prev = current;
current->next->prev = ptr;
current->next = ptr;
}
else
{
/* 6 */
ptr->next = ptr;
ptr->prev = ptr;
current = ptr;
switch_context(&main_thread, current);
}
return 1;
}
--------------------------------------------------------------------------------
exitthead
/*******************************************************
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.
This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
***********************************************************************/
static exit_thread(void)
{
struct context dump, *ptr;
/* 1 */
if (--thread_count)
{
/* 2 */
ptr = current;
current->prev->next = current->next;
current->next->prev = current->prev;
current = current->next;
free(ptr->stack);
free(ptr);
switch_context(&dump, current);
}
else
{
/* 3 */
free(current->stack);
free(current);
switch_context(&dump, &main_thread);
}
}
getchannel
/*******************************************************
written by @Undercoder
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Forwarded from iUNDERCODE - iOs JAILBREAK & MODS
Telegram
iUNDERCODE - iOs JAILBREAK & MODS
WELCOME TO iUNDERCODE CHANNEL FOR iOS UPDATES | TIPS | IPA & much more..
iUndercode.com
@UndercodeTesting @iUndercode @Dailycve @UndercodeNews
Follow us :
youtube.com/undercode
instagram.com/iUndercode
fb.com/iUndercode
Twitter.com/iUndercode
iUndercode.com
@UndercodeTesting @iUndercode @Dailycve @UndercodeNews
Follow us :
youtube.com/undercode
instagram.com/iUndercode
fb.com/iUndercode
Twitter.com/iUndercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
2020 Hex editors :
π¦ HxD - A hex editor which, additionally to raw disk editing and modifying of main memory (RAM), handles files of any size
π¦ WinHex - A hexadecimal editor, helpful in the realm of computer forensics, data recovery, low-level data processing, and IT security
π¦ wxHexEditor
π¦ Synalize It/Hexinator -
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
2020 Hex editors :
π¦ HxD - A hex editor which, additionally to raw disk editing and modifying of main memory (RAM), handles files of any size
π¦ WinHex - A hexadecimal editor, helpful in the realm of computer forensics, data recovery, low-level data processing, and IT security
π¦ wxHexEditor
π¦ Synalize It/Hexinator -
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
mh-nexus.de
HxD - Freeware Hex Editor and Disk Editor | mh-nexus
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
USEFULL TOOLS FOR PRO HACKERS :
π¦ Binwalk - Detects signatures, unpacks archives, visualizes entropy.
π¦ Veles - a visualizer for statistical properties of blobs.
π¦ Kaitai Struct - a DSL for creating parsers in a variety of programming languages. The Web IDE is particulary useful fir reverse-engineering.
π¦ Protobuf inspector
π¦ DarunGrim - executable differ.
π¦ DBeaver - a DB editor.
π¦ Dependencies - a FOSS replacement to Dependency Walker.
π¦ PEview - A quick and easy way to view the structure and content of 32-bit Portable Executable (PE) and Component Object File Format (COFF) files
π¦ BinText - A small, very fast and powerful text extractor that will be of particular interest to programmers.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
USEFULL TOOLS FOR PRO HACKERS :
π¦ Binwalk - Detects signatures, unpacks archives, visualizes entropy.
π¦ Veles - a visualizer for statistical properties of blobs.
π¦ Kaitai Struct - a DSL for creating parsers in a variety of programming languages. The Web IDE is particulary useful fir reverse-engineering.
π¦ Protobuf inspector
π¦ DarunGrim - executable differ.
π¦ DBeaver - a DB editor.
π¦ Dependencies - a FOSS replacement to Dependency Walker.
π¦ PEview - A quick and easy way to view the structure and content of 32-bit Portable Executable (PE) and Component Object File Format (COFF) files
π¦ BinText - A small, very fast and powerful text extractor that will be of particular interest to programmers.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - ReFirmLabs/binwalk: Firmware Analysis Tool
Firmware Analysis Tool. Contribute to ReFirmLabs/binwalk development by creating an account on GitHub.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
USEFULL TOOLS FOR PRO HACKERS :
π¦ Binwalk - Detects signatures, unpacks archives, visualizes entropy.
π¦ Veles - a visualizer for statistical properties of blobs.
π¦ Kaitai Struct - a DSL for creating parsers in a variety of programming languages. The Web IDE is particulary useful fir reverse-engineering.
π¦ Protobuf inspector
π¦ DarunGrim - executable differ.
π¦ DBeaver - a DB editor.
π¦ Dependencies - a FOSS replacement to Dependency Walker.
π¦ PEview - A quick and easy way to view the structure and content of 32-bit Portable Executable (PE) and Component Object File Format (COFF) files
π¦ BinText - A small, very fast and powerful text extractor that will be of particular interest to programmers.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
USEFULL TOOLS FOR PRO HACKERS :
π¦ Binwalk - Detects signatures, unpacks archives, visualizes entropy.
π¦ Veles - a visualizer for statistical properties of blobs.
π¦ Kaitai Struct - a DSL for creating parsers in a variety of programming languages. The Web IDE is particulary useful fir reverse-engineering.
π¦ Protobuf inspector
π¦ DarunGrim - executable differ.
π¦ DBeaver - a DB editor.
π¦ Dependencies - a FOSS replacement to Dependency Walker.
π¦ PEview - A quick and easy way to view the structure and content of 32-bit Portable Executable (PE) and Component Object File Format (COFF) files
π¦ BinText - A small, very fast and powerful text extractor that will be of particular interest to programmers.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - ReFirmLabs/binwalk: Firmware Analysis Tool
Firmware Analysis Tool. Contribute to ReFirmLabs/binwalk development by creating an account on GitHub.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
2020 Web Hacking tools :
> source git
π¦ Spyse - Data gathering service that collects web info using OSINT. Provided info: IPv4 hosts, domains/whois, ports/banners/protocols, technologies, OS, AS, maintains huge SSL/TLS DB, and more... All the data is stored in its own database allowing get the data without scanning.
π¦ sqlmap - Automatic SQL injection and database takeover tool
π¦ NoSQLMap - Automated NoSQL database enumeration and web application exploitation tool.
π¦ tools.web-max.ca - base64 base85 md4,5 hash, sha1 hash encoding/decoding
π¦ VHostScan - A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages.
π¦ SubFinder - SubFinder is a subdomain discovery tool that discovers valid subdomains for any target using passive online sources.
π¦ Findsubdomains - A subdomains discovery tool that collects all possible subdomains from open source internet and validates them through various tools to provide accurate results.
π¦ badtouch - Scriptable network authentication cracker
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
2020 Web Hacking tools :
> source git
π¦ Spyse - Data gathering service that collects web info using OSINT. Provided info: IPv4 hosts, domains/whois, ports/banners/protocols, technologies, OS, AS, maintains huge SSL/TLS DB, and more... All the data is stored in its own database allowing get the data without scanning.
π¦ sqlmap - Automatic SQL injection and database takeover tool
π¦ NoSQLMap - Automated NoSQL database enumeration and web application exploitation tool.
π¦ tools.web-max.ca - base64 base85 md4,5 hash, sha1 hash encoding/decoding
π¦ VHostScan - A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages.
π¦ SubFinder - SubFinder is a subdomain discovery tool that discovers valid subdomains for any target using passive online sources.
π¦ Findsubdomains - A subdomains discovery tool that collects all possible subdomains from open source internet and validates them through various tools to provide accurate results.
π¦ badtouch - Scriptable network authentication cracker
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 Hacking Network TOP RATED TOOLS :
>SOURCE GIT
π¦ NetworkMiner - A Network Forensic Analysis Tool (NFAT)
π¦ Paros - A Java-based HTTP/HTTPS proxy for assessing web application vulnerability
π¦ pig - A Linux packet crafting tool
π¦ findsubdomains - really fast subdomains scanning service that has much greater opportunities than simple subs finder(works using OSINT).
π¦ cirt-fuzzer - A simple TCP/UDP protocol fuzzer.
π¦ ASlookup - a useful tool for exploring autonomous systems and all related info (CIDR, ASN, Org...)
π¦ ZAP - The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications
π¦ mitmsocks4j - Man-in-the-middle SOCKS Proxy for Java
π¦ ssh-mitm - An SSH/SFTP man-in-the-middle tool that logs interactive sessions and passwords.
π¦ nmap - Nmap (Network Mapper) is a security scanner
π¦ Aircrack-ng - An 802.11 WEP and WPA-PSK keys cracking program
π¦ Nipe - A script to make Tor Network your default gateway.
π¦ Habu - Python Network Hacking Toolkit
π¦ Wifi Jammer - Free program to jam all wifi clients in range
π¦ Firesheep - Free program for HTTP session hijacking attacks.
π¦ Scapy - A Python tool and library for low level packet creation and manipulation
π¦ Amass - In-depth subdomain enumeration tool that performs scraping, recursive brute forcing, crawling of web archives, name altering and reverse DNS sweeping
π¦ sniffglue - Secure multithreaded packet sniffer
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 Hacking Network TOP RATED TOOLS :
>SOURCE GIT
π¦ NetworkMiner - A Network Forensic Analysis Tool (NFAT)
π¦ Paros - A Java-based HTTP/HTTPS proxy for assessing web application vulnerability
π¦ pig - A Linux packet crafting tool
π¦ findsubdomains - really fast subdomains scanning service that has much greater opportunities than simple subs finder(works using OSINT).
π¦ cirt-fuzzer - A simple TCP/UDP protocol fuzzer.
π¦ ASlookup - a useful tool for exploring autonomous systems and all related info (CIDR, ASN, Org...)
π¦ ZAP - The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications
π¦ mitmsocks4j - Man-in-the-middle SOCKS Proxy for Java
π¦ ssh-mitm - An SSH/SFTP man-in-the-middle tool that logs interactive sessions and passwords.
π¦ nmap - Nmap (Network Mapper) is a security scanner
π¦ Aircrack-ng - An 802.11 WEP and WPA-PSK keys cracking program
π¦ Nipe - A script to make Tor Network your default gateway.
π¦ Habu - Python Network Hacking Toolkit
π¦ Wifi Jammer - Free program to jam all wifi clients in range
π¦ Firesheep - Free program for HTTP session hijacking attacks.
π¦ Scapy - A Python tool and library for low level packet creation and manipulation
π¦ Amass - In-depth subdomain enumeration tool that performs scraping, recursive brute forcing, crawling of web archives, name altering and reverse DNS sweeping
π¦ sniffglue - Secure multithreaded packet sniffer
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Netresec
NetworkMiner - The NSM and Network Forensics Analysis Tool β
Network Miner is a network forensics tool for analyzing network traffic
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 Forensic tools- top rated :
> git sources
π¦ Autopsy - A digital forensics platform and graphical interface to The Sleuth Kit and other digital forensics tools
π¦ sleuthkit - A library and collection of command-line digital forensics tools
π¦ EnCase - The shared technology within a suite of digital investigations products by Guidance Software
π¦ malzilla - Malware hunting tool
π¦ IPED - Indexador e Processador de EvidΓΒͺncias Digitais - Brazilian Federal Police Tool for Forensic Investigation
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 Forensic tools- top rated :
> git sources
π¦ Autopsy - A digital forensics platform and graphical interface to The Sleuth Kit and other digital forensics tools
π¦ sleuthkit - A library and collection of command-line digital forensics tools
π¦ EnCase - The shared technology within a suite of digital investigations products by Guidance Software
π¦ malzilla - Malware hunting tool
π¦ IPED - Indexador e Processador de EvidΓΒͺncias Digitais - Brazilian Federal Police Tool for Forensic Investigation
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
www.sleuthkit.org
Autopsy
Autopsy is an open source graphical interface to The Sleuth Kit and other digital forensics tools.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
2020 Cryptography tools-top rated
> git sources
1) xortool - A tool to analyze multi-byte XOR cipher
2) John the Ripper - A fast password cracker
3) Aircrack - Aircrack is 802.11 WEP and WPA-PSK keys cracking program.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
2020 Cryptography tools-top rated
> git sources
1) xortool - A tool to analyze multi-byte XOR cipher
2) John the Ripper - A fast password cracker
3) Aircrack - Aircrack is 802.11 WEP and WPA-PSK keys cracking program.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - hellman/xortool: A tool to analyze multi-byte xor cipher
A tool to analyze multi-byte xor cipher. Contribute to hellman/xortool development by creating an account on GitHub.