Forwarded from Backup Legal Mega
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦CCTV HACKING TERMUX-LINUX :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½
Mode Of Execution:
1)
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦CCTV HACKING TERMUX-LINUX :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½
Mode Of Execution:
1)
apt-get install python3
2) apt-get install git
3) git clone https://github.com/AngelSecurityTeam/Cam-Hackers
4) pip3 install requests
5) cd Cam-Hackers
6) python3 cam-hackers.py
β
@UndercodeTesting@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Those tutorials related to cellular hacking (focus on data-3g-4g ) & jamming :)
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
#Exploit Development References
π¦Tutorials and Examples :
* [Shellcode Tutorial](http://www.vividmachines.com/shellcode/shellcode.html)
* [Shellcode Examples](http://shell-storm.org/shellcode/)
* [Exploit Writing Tutorials](https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/)
* [Exploit Exercises](https://exploit-exercises.com/)
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
#Exploit Development References
π¦Tutorials and Examples :
* [Shellcode Tutorial](http://www.vividmachines.com/shellcode/shellcode.html)
* [Shellcode Examples](http://shell-storm.org/shellcode/)
* [Exploit Writing Tutorials](https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/)
* [Exploit Exercises](https://exploit-exercises.com/)
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦The Complete Foundation Stock Trading Course β3.99 GB
https://www.udemy.com/course/foundation-course/
https://mega.nz/folder/QJJDFK6a#6QJKj9KntES3nQgKlV4j1Q
https://www.udemy.com/course/foundation-course/
https://mega.nz/folder/QJJDFK6a#6QJKj9KntES3nQgKlV4j1Q
Udemy
Learn the Foundations of Stock Market Trading Course Online
Learn To Trade The Stock Market. #1 Trading course. Inc: Technical Analysis, Candlesticks, Stocks, Day Trading +++
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦HACKERS GIFT :))
1οΈβ£#Reverse Enginnering Tools
- IDA Pro
- GDB
- Radare2
2οΈβ£#MQTT
- Introduction
- Hacking the IoT with MQTT
- thoughts about using IoT MQTT for V2V and Connected Car from CES 2014
- Nmap
- The Seven Best MQTT Client Tools
- A Guide to MQTT by Hacking a Doorbell to send Push Notifications
3οΈβ£#CoAP
- Introduction
- CoAP client Tools
- CoAP Pentest Tools
- Nmap
4οΈβ£#Automobile
- Introduction and protocol Overview
- PENTESTING VEHICLES WITH CANTOOLZ
- Building a Car Hacking Development Workbench: Part1
- CANToolz - Black-box CAN network analysis framework
> git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦HACKERS GIFT :))
1οΈβ£#Reverse Enginnering Tools
- IDA Pro
- GDB
- Radare2
2οΈβ£#MQTT
- Introduction
- Hacking the IoT with MQTT
- thoughts about using IoT MQTT for V2V and Connected Car from CES 2014
- Nmap
- The Seven Best MQTT Client Tools
- A Guide to MQTT by Hacking a Doorbell to send Push Notifications
3οΈβ£#CoAP
- Introduction
- CoAP client Tools
- CoAP Pentest Tools
- Nmap
4οΈβ£#Automobile
- Introduction and protocol Overview
- PENTESTING VEHICLES WITH CANTOOLZ
- Building a Car Hacking Development Workbench: Part1
- CANToolz - Black-box CAN network analysis framework
> git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
YouTube
How to Reverse Engineer with IDA Pro Disassembler Part1
π₯ Learn How to Reverse Engineer With IDA Pro Disassembler
π¨βπ» Buy Our Courses: https://guidedhacking.com/register/
π° Donate on Patreon: https://patreon.com/guidedhacking
β€οΈ Follow us on Social Media: https://linktr.ee/guidedhacking
π Article Link: httpsβ¦
π¨βπ» Buy Our Courses: https://guidedhacking.com/register/
π° Donate on Patreon: https://patreon.com/guidedhacking
β€οΈ Follow us on Social Media: https://linktr.ee/guidedhacking
π Article Link: httpsβ¦
π¦SIM CARD GSM SOFTWARES FREE :
> This is the source code for the pySimReader application.
> It requires a PCSC compatible SIM reader to be attached to the computer.
> The main product page is here: http://twhiteman.netfirms.com/pySIM.html
(You can download the Windows installer from here: https://github.com/toddw-as/SimReader/blob/master/installer/pySimReader_v14_setup.exe?raw=true )
> The application uses Python for the user interface and data processing, as well as a binary Python module (DLL) to utilize the Microsoft SmartCard Base Component APIs (note that if I were to rewrite this code today, I'd probably utilize Python ctypes instead of this wrapper library - as that would simplify the build process - removing the Microsoft Visual Studio and Swig dependencies).
#Requested
β
> This is the source code for the pySimReader application.
> It requires a PCSC compatible SIM reader to be attached to the computer.
> The main product page is here: http://twhiteman.netfirms.com/pySIM.html
(You can download the Windows installer from here: https://github.com/toddw-as/SimReader/blob/master/installer/pySimReader_v14_setup.exe?raw=true )
> The application uses Python for the user interface and data processing, as well as a binary Python module (DLL) to utilize the Microsoft SmartCard Base Component APIs (note that if I were to rewrite this code today, I'd probably utilize Python ctypes instead of this wrapper library - as that would simplify the build process - removing the Microsoft Visual Studio and Swig dependencies).
#Requested
β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ #GSM & #SS7 Pentesting
- [Introduction to GSM Security](http://www.pentestingexperts.com/introduction-to-gsm-security/)
- [GSM Security 2](https://www.ehacking.net/2011/02/gsm-security-2.html)
- [vulnerabilities in GSM security with USRP B200](https://ieeexplore.ieee.org/document/7581461/)
- [Security Testing 4G (LTE) Networks](https://labs.mwrinfosecurity.com/assets/BlogFiles/mwri-44con-lte-presentation-2012-09-11.pdf)
- [Case Study of SS7/SIGTRAN Assessment](https://nullcon.net/website/archives/pdf/goa-2017/case-study-of-SS7-sigtran.pdf)
- [Telecom Signaling Exploitation Framework - SS7, GTP, Diameter & SIP](https://github.com/SigPloiter/SigPloit)
- [ss7MAPer Γ’β¬β A SS7 pen testing toolkit](https://n0where.net/ss7-pentesting-toolkit-ss7maper)
- [Introduction to SIGTRAN and SIGTRAN Licensing](https://www.youtube.com/watch?v=XUY6pyoRKsg)
- [SS7 Network Architecture](https://youtu.be/pg47dDUL1T0)
- [Introduction to SS7 Signaling](https://www.patton.com/whitepapers/Intro_to_SS7_Tutorial.pdf)
> git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ #GSM & #SS7 Pentesting
- [Introduction to GSM Security](http://www.pentestingexperts.com/introduction-to-gsm-security/)
- [GSM Security 2](https://www.ehacking.net/2011/02/gsm-security-2.html)
- [vulnerabilities in GSM security with USRP B200](https://ieeexplore.ieee.org/document/7581461/)
- [Security Testing 4G (LTE) Networks](https://labs.mwrinfosecurity.com/assets/BlogFiles/mwri-44con-lte-presentation-2012-09-11.pdf)
- [Case Study of SS7/SIGTRAN Assessment](https://nullcon.net/website/archives/pdf/goa-2017/case-study-of-SS7-sigtran.pdf)
- [Telecom Signaling Exploitation Framework - SS7, GTP, Diameter & SIP](https://github.com/SigPloiter/SigPloit)
- [ss7MAPer Γ’β¬β A SS7 pen testing toolkit](https://n0where.net/ss7-pentesting-toolkit-ss7maper)
- [Introduction to SIGTRAN and SIGTRAN Licensing](https://www.youtube.com/watch?v=XUY6pyoRKsg)
- [SS7 Network Architecture](https://youtu.be/pg47dDUL1T0)
- [Introduction to SS7 Signaling](https://www.patton.com/whitepapers/Intro_to_SS7_Tutorial.pdf)
> git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
CIP Cyber
GSM Security 2 - CIP Cyber
On the previous article on GSM security here. We have briefly discussed about the network element and the network architecture of GSM, including the encryption that are widely used in GSM network. At the end of that article as we have discussed about howβ¦