β β β Uππ»βΊπ«6π¬πβ β β β
π¦TikTok European user privacy protection work will be handed over to Ireland and UK branches on July 29 :
#News
( if you a hater for tiktok call this tracking ennemiesπΊ & and if you love tiktok call this a simple news)
> According to a news release issued by ByteDance on Monday, the responsibility for providing privacy protection for European TikTok users will be transferred to branches in Ireland and the United Kingdom. After the adjustment, the service provider of users in the EEA-Swiss region will be changed to TikTok Ireland, and the same adjustment will be made in the UK region.
>In a statement released today, TikTokβs director of trust and security in Europe, the Middle East, and Africa, Cormac Keenan, and Madeline Moncrieff, director of corporate affairs for EMEA, said the adjustment will take effect on July 29.
π¦In the statement:
> Since the introduction of TikTok to Europe, we have invested in local talent, created a regional senior leadership team, and established the necessary business functions in the region, because we believe this is the best to support our growing TikTok community here the way.
> From July 29, TikTok's Irish and British branches will succeed our US TikTok Inc, provide TikTok to European users, and manage and protect their personal data.
>TikTok has more than 1,000 employees in Europe, of which 800 employees work in the United Kingdom and Ireland. London remains the companyβs main office and its second largest office, and the Trust and Security Center in Dublin is led by Mr. Keenan. In January this year, the company said it would establish a new European base in Dublin, employing 100 employees.
>In the statement: βAs we expand throughout the region, TikTok Ireland has been responsible for maintaining the privacy and security of users in Europe. Our Trust and Security Center in Dublin allows us to focus on strengthening policies, technologies and control strategies, To ensure the safety of our community, our new data privacy team will focus on maintaining the highest standards of data protection. This work is overseen by the Office of the Data Protection Officer to promote accountability and encourage privacy awareness and a culture of compliance."
#News
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦TikTok European user privacy protection work will be handed over to Ireland and UK branches on July 29 :
#News
( if you a hater for tiktok call this tracking ennemiesπΊ & and if you love tiktok call this a simple news)
> According to a news release issued by ByteDance on Monday, the responsibility for providing privacy protection for European TikTok users will be transferred to branches in Ireland and the United Kingdom. After the adjustment, the service provider of users in the EEA-Swiss region will be changed to TikTok Ireland, and the same adjustment will be made in the UK region.
>In a statement released today, TikTokβs director of trust and security in Europe, the Middle East, and Africa, Cormac Keenan, and Madeline Moncrieff, director of corporate affairs for EMEA, said the adjustment will take effect on July 29.
π¦In the statement:
> Since the introduction of TikTok to Europe, we have invested in local talent, created a regional senior leadership team, and established the necessary business functions in the region, because we believe this is the best to support our growing TikTok community here the way.
> From July 29, TikTok's Irish and British branches will succeed our US TikTok Inc, provide TikTok to European users, and manage and protect their personal data.
>TikTok has more than 1,000 employees in Europe, of which 800 employees work in the United Kingdom and Ireland. London remains the companyβs main office and its second largest office, and the Trust and Security Center in Dublin is led by Mr. Keenan. In January this year, the company said it would establish a new European base in Dublin, employing 100 employees.
>In the statement: βAs we expand throughout the region, TikTok Ireland has been responsible for maintaining the privacy and security of users in Europe. Our Trust and Security Center in Dublin allows us to focus on strengthening policies, technologies and control strategies, To ensure the safety of our community, our new data privacy team will focus on maintaining the highest standards of data protection. This work is overseen by the Office of the Data Protection Officer to promote accountability and encourage privacy awareness and a culture of compliance."
#News
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Vulnerability Scanners
#FastTips :
> Vulnerability scanners automate security auditing and can play a vital part in your IT security by scanning your network and websites for different security risks. These scanners are also capable of generating a prioritized list of those you should patch, and they also describe the vulnerabilities and provide steps on how to remediate them. It is also possible for some to even automate the patching process.
> One of the best lists of popular vulnerability scanners is maintained by OWASP at:
https://www.owasp.org/index.php/Category:Vulnerability_Scanning_Tools
enjoyβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Vulnerability Scanners
#FastTips :
> Vulnerability scanners automate security auditing and can play a vital part in your IT security by scanning your network and websites for different security risks. These scanners are also capable of generating a prioritized list of those you should patch, and they also describe the vulnerabilities and provide steps on how to remediate them. It is also possible for some to even automate the patching process.
> One of the best lists of popular vulnerability scanners is maintained by OWASP at:
https://www.owasp.org/index.php/Category:Vulnerability_Scanning_Tools
enjoyβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
owasp.org
Vulnerability Scanning Tools | OWASP Foundation
Vulnerability Scanning Tools on the main website for The OWASP Foundation. OWASP is a nonprofit foundation that works to improve the security of software.
β β β Uππ»βΊπ«6π¬πβ β β β
π¦maybee you have Toolx THE GREAT TOOL
Still need more ?
#tool
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
$ apt update
$ apt upgrade
$ apt install git
$ git clone https://github.com/Ranginang67/DarkFly-Tool
$ cd DarkFly-Tool
$ chmod +x
$ sh install
Run :
$ DarkFly
enjoyβ€οΈππ»
β β β Uππ»βΊπ«6π¬πβ β β β
π¦maybee you have Toolx THE GREAT TOOL
Still need more ?
#tool
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
$ apt update
$ apt upgrade
$ apt install git
$ git clone https://github.com/Ranginang67/DarkFly-Tool
$ cd DarkFly-Tool
$ chmod +x
$ sh install
Run :
$ DarkFly
enjoyβ€οΈππ»
β β β Uππ»βΊπ«6π¬πβ β β β
GitHub
GitHub - Ranginang67/DarkFly-Tool: DarkFly tool V.4.0
DarkFly tool V.4.0. Contribute to Ranginang67/DarkFly-Tool development by creating an account on GitHub.
IP Cams from around the world.pdf
299.3 KB
IP Cams from around the world
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Gain access to unsecured IP cameras with these Google dorks.
β 2020 git source
inurl:/view.shtml
intitle:βLive View / - AXISβ | inurl:view/view.shtml^
inurl:ViewerFrame?Mode=
inurl:ViewerFrame?Mode=Refresh
inurl:axis-cgi/jpg
inurl:axis-cgi/mjpg (motion-JPEG)
inurl:view/indexFrame.shtml
inurl:view/index.shtml
inurl:view/view.shtml
liveapplet
intitle:βlive viewβ intitle:axis
intitle:liveapplet
allintitle:βNetwork Camera NetworkCameraβ
intitle:axis intitle:βvideo serverβ
intitle:liveapplet inurl:LvAppl
intitle:βEvoCamβ inurl:βwebcam.htmlβ
intitle:βLive NetSnap Cam-Server feedβ
intitle:βLive View / - AXISβ
intitle:βLive View / - AXIS 206Mβ
intitle:βLive View / - AXIS 206Wβ
intitle:βLive View / - AXIS 210β³
inurl:indexFrame.shtml Axis
inurl:βMultiCameraFrame?Mode=Motionβ
intitle:start inurl:cgistart
intitle:βWJ-NT104 Main Pageβ
intext:βMOBOTIX M1β³ intext:βOpen Menuβ
intext:βMOBOTIX M10β³ intext:βOpen Menuβ
intext:βMOBOTIX D10β³ intext:βOpen Menuβ
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:βsony network camera snc-p1β³
intitle:βsony network camera snc-m1β³
site:.viewnetcam.com -www.viewnetcam.com
intitle:βToshiba Network Cameraβ user login
intitle:βnetcam live imageβ
intitle:βi-Catcher Console - Web Monitorβ
enjoyβ€οΈππ»
β 2020 git source
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Gain access to unsecured IP cameras with these Google dorks.
β 2020 git source
inurl:/view.shtml
intitle:βLive View / - AXISβ | inurl:view/view.shtml^
inurl:ViewerFrame?Mode=
inurl:ViewerFrame?Mode=Refresh
inurl:axis-cgi/jpg
inurl:axis-cgi/mjpg (motion-JPEG)
inurl:view/indexFrame.shtml
inurl:view/index.shtml
inurl:view/view.shtml
liveapplet
intitle:βlive viewβ intitle:axis
intitle:liveapplet
allintitle:βNetwork Camera NetworkCameraβ
intitle:axis intitle:βvideo serverβ
intitle:liveapplet inurl:LvAppl
intitle:βEvoCamβ inurl:βwebcam.htmlβ
intitle:βLive NetSnap Cam-Server feedβ
intitle:βLive View / - AXISβ
intitle:βLive View / - AXIS 206Mβ
intitle:βLive View / - AXIS 206Wβ
intitle:βLive View / - AXIS 210β³
inurl:indexFrame.shtml Axis
inurl:βMultiCameraFrame?Mode=Motionβ
intitle:start inurl:cgistart
intitle:βWJ-NT104 Main Pageβ
intext:βMOBOTIX M1β³ intext:βOpen Menuβ
intext:βMOBOTIX M10β³ intext:βOpen Menuβ
intext:βMOBOTIX D10β³ intext:βOpen Menuβ
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:βsony network camera snc-p1β³
intitle:βsony network camera snc-m1β³
site:.viewnetcam.com -www.viewnetcam.com
intitle:βToshiba Network Cameraβ user login
intitle:βnetcam live imageβ
intitle:βi-Catcher Console - Web Monitorβ
enjoyβ€οΈππ»
β 2020 git source
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Whatsapp Spam via Termux :
> unimited messages- Spam Does Not Make You Hackers, Cyber, Cracker, Anonymous And Minions. Spamming Only For Good Purposes Does Not Violate Religious Law And Rules
#FastTips
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£
That's All !
enjoyβ€οΈππ»
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Whatsapp Spam via Termux :
> unimited messages- Spam Does Not Make You Hackers, Cyber, Cracker, Anonymous And Minions. Spamming Only For Good Purposes Does Not Violate Religious Law And Rules
#FastTips
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£
$ pkg update upgrade
2οΈβ£$ pkg install git python2 toilet figlet php
3οΈβ£$ git clone https://github.com/4L13199/LITESPAM
4οΈβ£$ cd LITESPAM
use for learnThat's All !
enjoyβ€οΈππ»
β β β Uππ»βΊπ«6π¬πβ β β β
β β β Uππ»βΊπ«6π¬πβ β β β
π¦What is Cloud Commander ?
Cloud Commander is a two-pane web file manager with a console and editor. It will help you manage the server and work with files, directories and programs in a browser on any computer, smartphone or tablet.
π¦Benefits :
>Open source (MIT License).
>Two classic panels.
>Possibility of authorization.
>The client works in a web browser.
>The server runs on Windows, Linux, Mac OS and Android (using Termux).
It can be used locally or remotely.
>Adapts to Screen size.
>3 built-in editors with syntax highlighting support: Dword, Edward and Deepword.
>Console with support for the standard OS command line.
>Written in JavaScript / Node.js.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£<font style="vertical-align: inherit;"><font style="vertical-align: inherit;">curl -sL https://deb.nodesource.com/setup_6.x | </font><font style="vertical-align: inherit;">sudo -E bash -</font></font><font></font><font style="vertical-align: inherit;"><font style="vertical-align: inherit;">
2οΈβ£-------- For version Node.js v7 --------</font></font><font></font><font style="vertical-align: inherit;"><font style="vertical-align: inherit;">
3οΈβ£curl -sL https://deb.nodesource.com/setup_7.x | </font><font style="vertical-align: inherit;">sudo -E bash -</font></font><font></font><font style="vertical-align: inherit;"><font style="vertical-align: inherit;">
4οΈβ£sudo apt-get install -y nodejs</font></font>
(html commandsπ)
5οΈβ£After installing the nodejs and npm packages, let's move on to installing Cloud Commander with the following commands
> <font style="vertical-align: inherit;"><font style="vertical-align: inherit;">sudo npm i cloudcmd -g</font></font><font></font><font style="vertical-align: inherit;"><font style="vertical-align: inherit;">
> sudo npm i cloudcmd -g --force</font></font>
6οΈβ£to run :
<font style="vertical-align: inherit;"><font style="vertical-align: inherit;">cloudcmd</font></font>
7οΈβ£run as root :
<font style="vertical-align: inherit;"><font style="vertical-align: inherit;">sudo cloudcmd</font></font>
8οΈβ£Starting from the superuser will allow you to perform any operations and work with any files.
By default, the file manager is available in the browser at http: // localhost: 8000
enjoyβ€οΈππ»
written by
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦What is Cloud Commander ?
Cloud Commander is a two-pane web file manager with a console and editor. It will help you manage the server and work with files, directories and programs in a browser on any computer, smartphone or tablet.
π¦Benefits :
>Open source (MIT License).
>Two classic panels.
>Possibility of authorization.
>The client works in a web browser.
>The server runs on Windows, Linux, Mac OS and Android (using Termux).
It can be used locally or remotely.
>Adapts to Screen size.
>3 built-in editors with syntax highlighting support: Dword, Edward and Deepword.
>Console with support for the standard OS command line.
>Written in JavaScript / Node.js.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£<font style="vertical-align: inherit;"><font style="vertical-align: inherit;">curl -sL https://deb.nodesource.com/setup_6.x | </font><font style="vertical-align: inherit;">sudo -E bash -</font></font><font></font><font style="vertical-align: inherit;"><font style="vertical-align: inherit;">
2οΈβ£-------- For version Node.js v7 --------</font></font><font></font><font style="vertical-align: inherit;"><font style="vertical-align: inherit;">
3οΈβ£curl -sL https://deb.nodesource.com/setup_7.x | </font><font style="vertical-align: inherit;">sudo -E bash -</font></font><font></font><font style="vertical-align: inherit;"><font style="vertical-align: inherit;">
4οΈβ£sudo apt-get install -y nodejs</font></font>
(html commandsπ)
5οΈβ£After installing the nodejs and npm packages, let's move on to installing Cloud Commander with the following commands
> <font style="vertical-align: inherit;"><font style="vertical-align: inherit;">sudo npm i cloudcmd -g</font></font><font></font><font style="vertical-align: inherit;"><font style="vertical-align: inherit;">
> sudo npm i cloudcmd -g --force</font></font>
6οΈβ£to run :
<font style="vertical-align: inherit;"><font style="vertical-align: inherit;">cloudcmd</font></font>
7οΈβ£run as root :
<font style="vertical-align: inherit;"><font style="vertical-align: inherit;">sudo cloudcmd</font></font>
8οΈβ£Starting from the superuser will allow you to perform any operations and work with any files.
By default, the file manager is available in the browser at http: // localhost: 8000
enjoyβ€οΈππ»
written by
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Now you got :
> Two classic panels.
>Possibility of authorization.
>The client works in a web browser.
>The server runs on Windows, Linux, Mac OS and Android (using Termux).
It can be used locally or remotely.
>Adapts to Screen size.
>3 built-in editors with syntax highlighting support: Dword, Edward and Deepword.
>Console with support for the standard OS command line.
>Written in JavaScript / Node.js.
> Two classic panels.
>Possibility of authorization.
>The client works in a web browser.
>The server runs on Windows, Linux, Mac OS and Android (using Termux).
It can be used locally or remotely.
>Adapts to Screen size.
>3 built-in editors with syntax highlighting support: Dword, Edward and Deepword.
>Console with support for the standard OS command line.
>Written in JavaScript / Node.js.
β β β Uππ»βΊπ«6π¬πβ β β β
π¦1οΈβ£AIRMON-NG TUTORIAL
Switch to monitor mode
airmon-ng is a bash script designed to put wireless cards into surveillance (monitor) mode. It also has the option to close programs that interfere with monitor mode. Sometimes it may fail - in these cases it is recommended to use the βmanualβ translation into monitor mode.
π¦1οΈβ£AIRMON-NG TUTORIAL
Switch to monitor mode
airmon-ng is a bash script designed to put wireless cards into surveillance (monitor) mode. It also has the option to close programs that interfere with monitor mode. Sometimes it may fail - in these cases it is recommended to use the βmanualβ translation into monitor mode.
2οΈβ£boop is a program from the BoopSuite package for putting a wireless card into monitor mode and in controlled mode.
> https://kali.tools/?p=3409
3οΈβ£Handshake capture
airodump-ng is a tool for capturing wireless packets. Very often used to capture four-stage handshakes, which are later used to crack a Wi-Fi network password. It can capture any frames of wireless networks for further analysis.
https://kali.tools/?p=411
> https://kali.tools/?p=3409
3οΈβ£Handshake capture
airodump-ng is a tool for capturing wireless packets. Very often used to capture four-stage handshakes, which are later used to crack a Wi-Fi network password. It can capture any frames of wireless networks for further analysis.
https://kali.tools/?p=411
4οΈβ£boopsniff - a program from the BoopSuite package to display access points in the range of accessibility and capture handshakes.
https://kali.tools/?p=3409
https://kali.tools/?p=3409
5οΈβ£Airbase-ng is a multi-purpose tool designed to attack customers, not access points. It can be used to capture half-handshakes, the attack algorithm is as follows: Airbase-ng looks at which access points clients are looking for (for example, a cell phone with Wi-Fi enabled) and creates an access point with this name; the client tries to connect to this fake access point, as a result, half the handshake is captured, which is suitable for cracking the password from a true Wi-Fi network.
>< https://kali.tools/?p=2377
6οΈβ£WPA2-HalfHandshake-Crack is a working concept to demonstrate the possibility of hacking a WPA2 network by grabbing a handshake from a user trying to connect to a fake AP. Those. grabs a half handshake.
> https://kali.tools/?p=2794
7οΈβ£zizzania automates handshake capture for all access points within reach.
https://kali.tools/?p=1075
>< https://kali.tools/?p=2377
6οΈβ£WPA2-HalfHandshake-Crack is a working concept to demonstrate the possibility of hacking a WPA2 network by grabbing a handshake from a user trying to connect to a fake AP. Those. grabs a half handshake.
> https://kali.tools/?p=2794
7οΈβ£zizzania automates handshake capture for all access points within reach.
https://kali.tools/?p=1075