β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ARP SNIFF CODE- not git :
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ARP SNIFF CODE- not git :
@UndercodeTesting
from scapy.all import sniff,ARP
from signal import signal,SIGINT
import sys
ip_mac = {}
def watchArp(pkt):
if point [ARP] .op == 2:
print pkt[ARP].hwsrc + " " + pkt[ARP].psrc
# Device is new. Remember it.
if ip_mac.get(pkt[ARP].psrc) == None:
print "Found new device " + \
pkt[ARP].hwsrc + " " + \
pkt[ARP].psrc
ip_mac[pkt[ARP].psrc] = pkt[ARP].hwsrc
# Device is known but has a different IP
elif ip_mac.get(pkt[ARP].psrc) and ip_mac[pkt[ARP].psrc] != pkt[ARP].hwsrc:
print pkt[ARP].hwsrc + \
" has got new ip " + \
pkt[ARP].psrc + \
" (old " + ip_mac[pkt[ARP].psrc] + ")"
ip_mac[pkt[ARP].psrc] = pkt[ARP].hwsrc
sniff(prn=watchArp,filter="arp",iface="eth0",store=0);
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Building_a_Keyword_Monitoring_Pipeline_with_Python,_Pastebin_and.pdf
543.3 KB
Building a Keyword Monitoring Pipeline with Python, Pastebin and Searx
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Discover and Hack URL handlers :
URL handlers are the bits in the front of the URLs (e.g. http:, https:, ftp:, skype:). They add things a web page can do to you and your device. Surprising applications have a nasty habit to register these without asking
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone git clone https://github.com/ouspg/urlhandlers.git
2) cd handlers/web
3) ./osx/handlers-list.py > handlers.json
4) python -m SimpleHTTPServer 8080
F E A T U R E S :
-Launcher for the OSX Launch Services
-OSX open CLI tool
-Online JavaScript based testing UI for the Browsers
-HTML file with direct invocation (e.g. iframe)
-HTML redirects
β GIT TOPIC
@undercodeTesting
@UndercodeHacking
@Undercodesecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Discover and Hack URL handlers :
URL handlers are the bits in the front of the URLs (e.g. http:, https:, ftp:, skype:). They add things a web page can do to you and your device. Surprising applications have a nasty habit to register these without asking
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone git clone https://github.com/ouspg/urlhandlers.git
2) cd handlers/web
3) ./osx/handlers-list.py > handlers.json
4) python -m SimpleHTTPServer 8080
F E A T U R E S :
-Launcher for the OSX Launch Services
-OSX open CLI tool
-Online JavaScript based testing UI for the Browsers
-HTML file with direct invocation (e.g. iframe)
-HTML redirects
β GIT TOPIC
@undercodeTesting
@UndercodeHacking
@Undercodesecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - ouspg/urlhandlers: Discover and Hack URL handlers
Discover and Hack URL handlers. Contribute to ouspg/urlhandlers development by creating an account on GitHub.
From broken link to subfolder takeover on Bukalapak.pdf
187.4 KB
From broken link to subfolder takeover on Bukalapak #requested
Forwarded from UNDERCODE SECURITY
Password Spraying Outlook Web Access_ Remote Shell.pdf
617.7 KB
Full with pictures
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦INSTAGRAM HACKING TOOLS "
https://github.com/fuck3erboy/instahack
https://github.com/Pure-L0G1C/Instagram
https://github.com/04x/instagramCracker
https://github.com/DarkSecDevelopers/HiddenEye
https://github.com/suljot/shellphish
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦INSTAGRAM HACKING TOOLS "
https://github.com/fuck3erboy/instahack
https://github.com/Pure-L0G1C/Instagram
https://github.com/04x/instagramCracker
https://github.com/DarkSecDevelopers/HiddenEye
https://github.com/suljot/shellphish
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
YouTube
UNDERCODE NEWS PREVIEW
FOR MORE VISIT: https://www.UndercodeNews.com
ΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩ
To watch more videos, please subscribe to the channel
You can also follow UndercodeNews on otherβ¦
ΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩΩ
To watch more videos, please subscribe to the channel
You can also follow UndercodeNews on otherβ¦
Forwarded from UNDERCODE NEWS
Mac malware spreads and exploits vulnerabilities in WebKit and Data Vault through the Xcode project
Forwarded from UNDERCODE NEWS
NSA and FBI jointly reveal Drvorub, a malicious Linux system built in Russia
Forwarded from UNDERCODE NEWS
Reports reveal that the United States treats DDS as a terrorist hacking enterprise
UNDERCODE START A HACKERS NEWS SITE
FOR MORE VISIT: https://www.UndercodeNews.com
To watch more videos, please subscribe to the channel
You can also follow UndercodeNews on other social media platforms:
Twitter https://twitter.com/UndercodeNews
Instagram https://www.instagram.com/UndercodeNews
Facebook https://www.facebook.com/UndercodeNews
Telegram @UndercodeNews
Under code channel provides a news service around the clock, related to hacking & programming & much more... to follow up on events as soon as they happen.
FOR MORE VISIT: https://www.UndercodeNews.com
To watch more videos, please subscribe to the channel
You can also follow UndercodeNews on other social media platforms:
Twitter https://twitter.com/UndercodeNews
Instagram https://www.instagram.com/UndercodeNews
Facebook https://www.facebook.com/UndercodeNews
Telegram @UndercodeNews
Under code channel provides a news service around the clock, related to hacking & programming & much more... to follow up on events as soon as they happen.
X (formerly Twitter)
UNDERCODE NEWS (@UndercodeNews) on X
π¦ Latest in Cyber & Tech News with AI-Powered Analysis and Fact Checking.
γjoin us: https://t.co/YVv330UsjQ
More: @DailyCve @UndercodeUpdate
γjoin us: https://t.co/YVv330UsjQ
More: @DailyCve @UndercodeUpdate
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦topic updated web hacking-GoLismero is an open source framework for security testing. It's currently geared towards web security, but it can easily be expanded to other kinds of scans.
F E A T U R E S :
-Real platform independence. Tested on Windows, Linux, *BSD and OS X.
-No native library dependencies. All of the framework has been written in pure Python.
-Good performance when compared with other frameworks written in Python and other scripting languages.
Very easy to use.
-Plugin development is extremely simple.
-The framework also collects and unifies the results of well known tools: sqlmap, xsser, openvas, dnsrecon, theharvester...
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
-Integration with standards: CWE, CVE and OWASP.
1) sudo bash
2) apt-get install python2.7 python2.7-dev python-pip python-docutils git perl nmap sslscan
3) cd /opt
4) git clone https://github.com/golismero/golismero.git
5) cd golismero
6) pip install -r requirements.txt
7) pip install -r requirements_unix.txt
8) ln -s ${PWD}/golismero.py /usr/bin/golismero
9) exit
π¦ If you have an API key for Shodan, or an OpenVAS server or SpiderFoot server you want to integrate with GoLismero, run the following commands:
1) mkdir ~/.golismero
2) touch ~/.golismero/user.conf
3) chmod 600 ~/.golismero/user.conf
4) nano ~/.golismero/user.conf
5) At the editor, add the following sections to the file, as appropriate:
[shodan:Configuration]
apikey = <INSERT YOUR SHODAN API KEY HERE>
[openvas]
host = <INSERT THE OPENVAS HOST HERE>
user = <INSERT THE OPENVAS USERNAME HERE>
*password = <INSERT THE OPENVAS PASSWORD HERE>
[spiderfoot]
url = <INSERT THE SPIDERFOOT URL HERE>
β GIT TOPIC
@undercodeTesting
@UndercodeHacking
@Undercodesecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦topic updated web hacking-GoLismero is an open source framework for security testing. It's currently geared towards web security, but it can easily be expanded to other kinds of scans.
F E A T U R E S :
-Real platform independence. Tested on Windows, Linux, *BSD and OS X.
-No native library dependencies. All of the framework has been written in pure Python.
-Good performance when compared with other frameworks written in Python and other scripting languages.
Very easy to use.
-Plugin development is extremely simple.
-The framework also collects and unifies the results of well known tools: sqlmap, xsser, openvas, dnsrecon, theharvester...
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
-Integration with standards: CWE, CVE and OWASP.
1) sudo bash
2) apt-get install python2.7 python2.7-dev python-pip python-docutils git perl nmap sslscan
3) cd /opt
4) git clone https://github.com/golismero/golismero.git
5) cd golismero
6) pip install -r requirements.txt
7) pip install -r requirements_unix.txt
8) ln -s ${PWD}/golismero.py /usr/bin/golismero
9) exit
π¦ If you have an API key for Shodan, or an OpenVAS server or SpiderFoot server you want to integrate with GoLismero, run the following commands:
1) mkdir ~/.golismero
2) touch ~/.golismero/user.conf
3) chmod 600 ~/.golismero/user.conf
4) nano ~/.golismero/user.conf
5) At the editor, add the following sections to the file, as appropriate:
[shodan:Configuration]
apikey = <INSERT YOUR SHODAN API KEY HERE>
[openvas]
host = <INSERT THE OPENVAS HOST HERE>
user = <INSERT THE OPENVAS USERNAME HERE>
*password = <INSERT THE OPENVAS PASSWORD HERE>
[spiderfoot]
url = <INSERT THE SPIDERFOOT URL HERE>
β GIT TOPIC
@undercodeTesting
@UndercodeHacking
@Undercodesecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - golismero/golismero: GoLismero - The Web Knife
GoLismero - The Web Knife. Contribute to golismero/golismero development by creating an account on GitHub.
How to Get and Set Up a Free Windows VM for Malware Analysis.pdf
1.1 MB
How to Get and Set Up a Free Windows VM for Malware Analysis #full with pictures β€οΈππ»
Forwarded from UNDERCODE NEWS
Microsoft has fixed a vulnerability of 0-day Windows file signature that exists since 2018
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Auto Scanning to SSL Vulnerability :
HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc
A. Support Vulnerability
- CVE-2007-1858] Anonymous Cipher
- CVE-2012-4929] CRIME(SPDY)
- CVE-2014-0160] CCS Injection
- CVE-2014-0224] HeartBleed
- CVE-2014-3566] SSLv3 POODLE
- CVE-2015-0204] FREAK Attack
- CVE-2015-4000] LOGJAM Attack
- CVE-2016-0800] SSLv2 DROWN
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
A. Download(clone) & Unpack A2SV
1) $ git clone https://github.com/hahwul/a2sv.git
2) $ cd a2sv
B. Install Python Package / OpenSSL
3) $ pip install argparse
4) $ pip install netaddr
5) $ apt-get install openssl
C. Run A2SV
6) $ python a2sv.py -h
π¦How to Use?
usage: a2sv [-h] [-t TARGET] [-tf TARGETFILE] [-p PORT] [-m MODULE]
[-d DISPLAY] [-u] [-v]
β GIT TOPIC
@undercodeTesting
@UndercodeHacking
@Undercodesecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Auto Scanning to SSL Vulnerability :
HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc
A. Support Vulnerability
- CVE-2007-1858] Anonymous Cipher
- CVE-2012-4929] CRIME(SPDY)
- CVE-2014-0160] CCS Injection
- CVE-2014-0224] HeartBleed
- CVE-2014-3566] SSLv3 POODLE
- CVE-2015-0204] FREAK Attack
- CVE-2015-4000] LOGJAM Attack
- CVE-2016-0800] SSLv2 DROWN
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
A. Download(clone) & Unpack A2SV
1) $ git clone https://github.com/hahwul/a2sv.git
2) $ cd a2sv
B. Install Python Package / OpenSSL
3) $ pip install argparse
4) $ pip install netaddr
5) $ apt-get install openssl
C. Run A2SV
6) $ python a2sv.py -h
π¦How to Use?
usage: a2sv [-h] [-t TARGET] [-tf TARGETFILE] [-p PORT] [-m MODULE]
[-d DISPLAY] [-u] [-v]
β GIT TOPIC
@undercodeTesting
@UndercodeHacking
@Undercodesecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - hahwul/a2sv: Auto Scanning to SSL Vulnerability
Auto Scanning to SSL Vulnerability. Contribute to hahwul/a2sv development by creating an account on GitHub.
osif.png
47.5 KB
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦FACEBOOK info gathering :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) $ pkg update upgrade
2) $ pkg install git python2
3) $ git clone https://github.com/ciku370/OSIF
4) $ cd OSIF
5) $ pip2 install -r requirements.txt
6) $ python2 osif.py
7) if you are confused how to use it, please type 'help' to display the help menu
8) [Warn] please turn off your VPN before using this program !!!
9) [Tips] do not overuse this program !!!
β git topic/verified
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦FACEBOOK info gathering :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) $ pkg update upgrade
2) $ pkg install git python2
3) $ git clone https://github.com/ciku370/OSIF
4) $ cd OSIF
5) $ pip2 install -r requirements.txt
6) $ python2 osif.py
7) if you are confused how to use it, please type 'help' to display the help menu
8) [Warn] please turn off your VPN before using this program !!!
9) [Tips] do not overuse this program !!!
β git topic/verified
β β β Uππ»βΊπ«Δπ¬πβ β β β