β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦BEST ANDROID HACKING APPS 2020 :
1) DroidBox
https://downloadapks.net/app/droidbox-apk/
2) Kali Net Hunter
https://www.kali.org/kali-linux-nethunter/
3) Zanti
https://zanti.en.softonic.com/android
4) CSploit
http://www.csploit.org/downloads/
5) Hackod
https://apkpure.com/hackode/com.techfond.hackode
6) Network mapper
https://www.malavida.com/en/soft/network-mapper/android/#gref
7)androrat
https://www.apkfirm.com/androrat/
8) DroidSheep - Wi-Fi Kill -
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦BEST ANDROID HACKING APPS 2020 :
1) DroidBox
https://downloadapks.net/app/droidbox-apk/
2) Kali Net Hunter
https://www.kali.org/kali-linux-nethunter/
3) Zanti
https://zanti.en.softonic.com/android
4) CSploit
http://www.csploit.org/downloads/
5) Hackod
https://apkpure.com/hackode/com.techfond.hackode
6) Network mapper
https://www.malavida.com/en/soft/network-mapper/android/#gref
7)androrat
https://www.apkfirm.com/androrat/
8) DroidSheep - Wi-Fi Kill -
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Alexa Skills Fundamentals (New 2019-2020) β2.16 GB
https://www.udemy.com/course/alexa-skills-fundamentals/
https://mega.nz/folder/YdAz1SqJ#8EtGtN2j_WX7DZNd4w31Hg
https://www.udemy.com/course/alexa-skills-fundamentals/
https://mega.nz/folder/YdAz1SqJ#8EtGtN2j_WX7DZNd4w31Hg
Udemy
Alexa Skills Fundamentals (New 2019)
No Coding Experience Required!
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#BUG BOUNTIES :
- [Awesome Bug Bounty Writeups](https://github.com/devanshbatham/Awesome-Bugbounty-Writeups)
## Bug Bounty Platforms
- [AntiHACK](https://www.antihack.me/)
- [Bounty Factory](https://bountyfactory.io/)
- [Bountysource](https://www.bountysource.com/)
- [BugbountyHQ](https://www.bugbountyhq.com/)
- [Bugbountyjp](https://bugbounty.jp/)
- [Bugcrowd](https://bugcrowd.com/)
- [CESPPA](https://www.cesppa.com/)
- [Cobalt](https://cobalt.io/)
- [Coder Bounty](http://www.coderbounty.com/)
- [Detectify](https://cs.detectify.com/)
- [FOSS Factory](http://www.fossfactory.org/)
- [FreedomSponsors](https://freedomsponsors.org/)
- [HackenProof](https://hackenproof.com/)
- [Hackerhive](https://hackerhive.io/)
- [HackerOne](https://hackerone.com/)
- [intigriti](https://intigriti.com/)
- [Safehats](https://safehats.com/)
- [Synack](https://www.synack.com/)
- [YesWeHack](https://yeswehack.com/)
@UndercodeTesting
> git sources
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#BUG BOUNTIES :
- [Awesome Bug Bounty Writeups](https://github.com/devanshbatham/Awesome-Bugbounty-Writeups)
## Bug Bounty Platforms
- [AntiHACK](https://www.antihack.me/)
- [Bounty Factory](https://bountyfactory.io/)
- [Bountysource](https://www.bountysource.com/)
- [BugbountyHQ](https://www.bugbountyhq.com/)
- [Bugbountyjp](https://bugbounty.jp/)
- [Bugcrowd](https://bugcrowd.com/)
- [CESPPA](https://www.cesppa.com/)
- [Cobalt](https://cobalt.io/)
- [Coder Bounty](http://www.coderbounty.com/)
- [Detectify](https://cs.detectify.com/)
- [FOSS Factory](http://www.fossfactory.org/)
- [FreedomSponsors](https://freedomsponsors.org/)
- [HackenProof](https://hackenproof.com/)
- [Hackerhive](https://hackerhive.io/)
- [HackerOne](https://hackerone.com/)
- [intigriti](https://intigriti.com/)
- [Safehats](https://safehats.com/)
- [Synack](https://www.synack.com/)
- [YesWeHack](https://yeswehack.com/)
@UndercodeTesting
> git sources
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - devanshbatham/Awesome-Bugbounty-Writeups: A curated list of bugbounty writeups (Bug type wise) , inspired from https:β¦
A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference - devanshbatham/Awesome-Bugbounty-Writeups
Forwarded from iUNDERCODE - iOs JAILBREAK & MODS
).c
3.3 KB
Apple macOS - Reverse (::1:4444/TCP) Shell (/bin/sh) +IPv6 Shellcode (119 bytes)
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Memory #Analysis Tools topic 2020 :
* [Evolve](https://github.com/JamesHabben/evolve) - Web interface for the Volatility Memory Forensics Framework
* [inVtero.net](https://github.com/ShaneK2/inVtero.net) - Advanced memory analysis for Windows x64 with nested hypervisor support
* [KnTList](http://www.gmgsystemsinc.com/knttools/) - Computer memory analysis tools
* [LiME](https://github.com/504ensicsLabs/LiME) - LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices
* [Memoryze](https://www.fireeye.com/services/freeware/memoryze.html) - Memoryze by Mandiant is a free memory forensic software that helps incident responders find evil in live memory. Memoryze can acquire and/or analyze memory images, and on live systems, can include the paging file in its analysis
* [Memoryze for Mac](https://www.fireeye.com/services/freeware/memoryze-for-the-mac.html) - Memoryze for Mac is Memoryze but then for Macs. A lower number of features, however
* [Rekall](http://www.rekall-forensic.com/) - Open source tool (and library) for the extraction of digital artifacts from volatile memory (RAM) samples
* [Responder PRO](http://www.countertack.com/responder-pro) - Responder PRO is the industry standard physical memory and automated malware analysis solution
* [Volatility](https://github.com/volatilityfoundation/volatility) - An advanced memory forensics framework
* [VolatilityBot](https://github.com/mkorman90/VolatilityBot) - VolatilityBot is an automation tool for researchers cuts all the guesswork and manual tasks out of the binary extraction phase, or to help the investigator in the first steps of performing a memory analysis investigation
* [VolDiff](https://github.com/aim4r/VolDiff) - Malware Memory Footprint Analysis based on Volatility
* [WindowsSCOPE](http://www.windowsscope.com/index.php?page=shop.product_details&flypage=flypage.tpl&product_id=35&category_id=3&option=com_virtuemart) - another memory forensics and reverse engineering tool used for analyzing volatile memory. It is basically used for reverse engineering of malwares. It provides the capability of analyzing the Windows kernel, drivers, DLLs, virtual and physical memory
> git resources
@UndercodeTesting
@UndercodeSecurity
@UndercodeCourses
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Memory #Analysis Tools topic 2020 :
* [Evolve](https://github.com/JamesHabben/evolve) - Web interface for the Volatility Memory Forensics Framework
* [inVtero.net](https://github.com/ShaneK2/inVtero.net) - Advanced memory analysis for Windows x64 with nested hypervisor support
* [KnTList](http://www.gmgsystemsinc.com/knttools/) - Computer memory analysis tools
* [LiME](https://github.com/504ensicsLabs/LiME) - LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices
* [Memoryze](https://www.fireeye.com/services/freeware/memoryze.html) - Memoryze by Mandiant is a free memory forensic software that helps incident responders find evil in live memory. Memoryze can acquire and/or analyze memory images, and on live systems, can include the paging file in its analysis
* [Memoryze for Mac](https://www.fireeye.com/services/freeware/memoryze-for-the-mac.html) - Memoryze for Mac is Memoryze but then for Macs. A lower number of features, however
* [Rekall](http://www.rekall-forensic.com/) - Open source tool (and library) for the extraction of digital artifacts from volatile memory (RAM) samples
* [Responder PRO](http://www.countertack.com/responder-pro) - Responder PRO is the industry standard physical memory and automated malware analysis solution
* [Volatility](https://github.com/volatilityfoundation/volatility) - An advanced memory forensics framework
* [VolatilityBot](https://github.com/mkorman90/VolatilityBot) - VolatilityBot is an automation tool for researchers cuts all the guesswork and manual tasks out of the binary extraction phase, or to help the investigator in the first steps of performing a memory analysis investigation
* [VolDiff](https://github.com/aim4r/VolDiff) - Malware Memory Footprint Analysis based on Volatility
* [WindowsSCOPE](http://www.windowsscope.com/index.php?page=shop.product_details&flypage=flypage.tpl&product_id=35&category_id=3&option=com_virtuemart) - another memory forensics and reverse engineering tool used for analyzing volatile memory. It is basically used for reverse engineering of malwares. It provides the capability of analyzing the Windows kernel, drivers, DLLs, virtual and physical memory
> git resources
@UndercodeTesting
@UndercodeSecurity
@UndercodeCourses
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - JamesHabben/evolve: Web interface for the Volatility Memory Forensics Framework
Web interface for the Volatility Memory Forensics Framework - JamesHabben/evolve
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Installing a USRP Device-driver on Linux ?
(used for cellular-pentesting)
1) sudo add-apt-repository ppa:ettusresearch/uhd
2) sudo apt-get update
3) sudo apt-get install libuhd-dev libuhd003 uhd-host
4) uhd_find_devices
5) cd /usr/lib/uhd/utils/
6) ./uhd_images_downloader.py
7) sudo uhd_usrp_probe
8) sudo uhd_usrp_probe
π¦STARTING :
[INFO] [UHD] linux; GNU C++ version 7.4.0; Boost_106501; UHD_3.14.1.1-release
[INFO] [B200] Detected Device: B*****
[INFO] [B200] Operating over USB 3.
[INFO] [B200] Initialize CODEC control...
[INFO] [B200] Initialize Radio control...
[INFO] [B200] Performing register loopback test...
[INFO] [B200] Register loopback test passed
[INFO] [B200] Setting master clock rate selection to 'automatic'.
[INFO] [B200] Asking for clock rate 16.000000 MHz...
[INFO] [B200] Actually got clock rate 16.000000 MHz.
_________________________________________________
/
| Device: B-Series Device
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Installing a USRP Device-driver on Linux ?
(used for cellular-pentesting)
1) sudo add-apt-repository ppa:ettusresearch/uhd
2) sudo apt-get update
3) sudo apt-get install libuhd-dev libuhd003 uhd-host
4) uhd_find_devices
5) cd /usr/lib/uhd/utils/
6) ./uhd_images_downloader.py
7) sudo uhd_usrp_probe
8) sudo uhd_usrp_probe
π¦STARTING :
[INFO] [UHD] linux; GNU C++ version 7.4.0; Boost_106501; UHD_3.14.1.1-release
[INFO] [B200] Detected Device: B*****
[INFO] [B200] Operating over USB 3.
[INFO] [B200] Initialize CODEC control...
[INFO] [B200] Initialize Radio control...
[INFO] [B200] Performing register loopback test...
[INFO] [B200] Register loopback test passed
[INFO] [B200] Setting master clock rate selection to 'automatic'.
[INFO] [B200] Asking for clock rate 16.000000 MHz...
[INFO] [B200] Actually got clock rate 16.000000 MHz.
_________________________________________________
/
| Device: B-Series Device
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#Reverse Proxy
- docker-flow-proxy - Reconfigures proxy every time a new service is deployed, or when a service is scaled. By @vfarcicvfarcic
- fabio - A fast, modern, zero-conf load balancing HTTP(S) router for deploying microservices managed by consul. By @magiconair (Frank Schroeder)
- Let's Encrypt Nginx-proxy Companion - A lightweight companion container for the nginx-proxy. It allow the creation/renewal of Let's Encrypt certificates automatically. By @JrCs
- muguet - DNS Server & Reverse proxy for Docker environments. By @mattallty
- nginx-proxynginxproxy - Automated nginx proxy for Docker containers using docker-gen by @jwilderjwilder
- Swarm Ingress Router - Route DNS names to Swarm services based on labels. By @tpbowden
- Swarm Router - A ΓΒ«zero configΓΒ» service name based router for docker swarm mode with a fresh and more secure approach. By @flavioaiello
- TrΓΒ¦fΓΒͺk - Automated reverse proxy and load-balancer for Docker, Mesos, Consul, Etcd... By @EmileVauge
> git sources
@UndercodeTesting
@undercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#Reverse Proxy
- docker-flow-proxy - Reconfigures proxy every time a new service is deployed, or when a service is scaled. By @vfarcicvfarcic
- fabio - A fast, modern, zero-conf load balancing HTTP(S) router for deploying microservices managed by consul. By @magiconair (Frank Schroeder)
- Let's Encrypt Nginx-proxy Companion - A lightweight companion container for the nginx-proxy. It allow the creation/renewal of Let's Encrypt certificates automatically. By @JrCs
- muguet - DNS Server & Reverse proxy for Docker environments. By @mattallty
- nginx-proxynginxproxy - Automated nginx proxy for Docker containers using docker-gen by @jwilderjwilder
- Swarm Ingress Router - Route DNS names to Swarm services based on labels. By @tpbowden
- Swarm Router - A ΓΒ«zero configΓΒ» service name based router for docker swarm mode with a fresh and more secure approach. By @flavioaiello
- TrΓΒ¦fΓΒͺk - Automated reverse proxy and load-balancer for Docker, Mesos, Consul, Etcd... By @EmileVauge
> git sources
@UndercodeTesting
@undercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - vfarcic/docker-flow-proxy: Docker Flow Proxy
Docker Flow Proxy. Contribute to vfarcic/docker-flow-proxy development by creating an account on GitHub.