UNDERCODE SECURITY
225 subscribers
295 photos
1.03K files
1.73K links
๐Ÿฆ‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Crack-Sniffer-Keylogger-webcam modules :

# Common crack module
Auxiliary/scanner/mssql/mssqllogin
Auxiliary/scanner/ftp/ftp
login
Auxiliary/scanner/ssh/sshlogin
Auxiliary/scanner/telnet/telnet
login
Auxiliary/scanner/smb/smblogin
Auxiliary/scanner/mssql/mssql
login
Auxiliary/scanner/mysql/mysqllogin
Auxiliary/scanner/oracle/oracle
login
Auxiliary/scanner/postgres/postgreslogin
Auxiliary/scanner/vnc/vnc
login
Auxiliary/scanner/pcanywhere/pcanywherelogin
Auxiliary/scanner/snmp/snmp
login
Auxiliary/scanner/ftp/anonymous

# Keylogger
Keyscanstart # Start key record
keyscan
dump # Export record data
keyscanstop # End key record

# Sniffer capture package
Use sniffer
Sniffer
interfaces # View NIC
snifferstart 1 # Select NIC 1 to start capturing
sniffer
stats 1 # View NIC 1 status
snifferdump 1 /tmp/wlan1.pcap # Export pcap packet
sniffer
stop 1 # Stop NIC 1 capture
snifferrelease 1 # Release NIC 1 traffic

# Webcam
record
mic # audio recording
webcamchat # open a video chat (the other party pop)
webcam
list # view camera
webcamsnap # through the camera to take pictures
webcam
stream # open by video surveillance cameras (to monitor โ‰ˆ live as a web page)

# Screen capture
Screenshot # Screenshots
use espia # Use espia module
screengrab # screenshot

ENJOYโค๏ธ๐Ÿ‘๐Ÿป
โœ…git sources
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘The latest variant of the eternal blue downloader restarts the EXE file attack, and the new variant has infected 15,000 servers :

> A new variant of the eternal blue downloader Trojan. This variant uses Python to package EXE executable files for attacks. The organization used a similar method at the end of 2018. Tencent security big data monitoring data shows that the latest variant of the eternal blue downloader quickly spread after it appeared. It has infected about 15,000 servers. The poisoning system is finally used to download and run the Monero mining Trojan.

> In the process of continuous evolution and update, the eternal blue downloader Trojan has gradually switched the EXE attack mode to use Powershell scripts to achieve fileless attacks. After its functions became more and more huge, the gang of gangsters again added the code of exploiting the eternal blue vulnerability attack and mssql blasting attack to the EXE Trojan, and shielded the relevant code in Powershell.

> The system trapped by this variant attack will download if.bin, download and run an EXE attack module named by a random string for large-scale vulnerability scanning and attack propagation, and will also download the Monero coin mining Trojan to occupy a large amount of CPU resources on the server Mining will cause severe productivity losses to the injured enterprises.

enjoyโค๏ธ๐Ÿ‘๐Ÿป
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘Best Boot - Repair access to operating systems
GRUB reinstall, MBR restore, UEFI, SecureBoot, RAID, LVM, Wubi, filesystem repair...
:

Download : https://sourceforge.net/p/boot-repair/home

#FastTips
Forwarded from UNDERCODE COMMUNITY
GitHub Enterprise Remote Code Execution.pdf
208 KB
GitHub Enterprise Remote Code Execution
Forwarded from WEB UNDERCODE - PRIVATE
HQL for pentesters .pdf
390 KB
Forwarded from Backup Legal Mega
๐Ÿฆ‘Grow a Profitable Affiliate Website with Long Tail Keywords That Ranks in Google. Learn from people with experience, and build a successful online businessโ€ฆ

https://insider.nichepursuits.com/sign-up

Mega link:
https://mega.nz/folder/RYxmyIDS#dG6ASQ2bFuqbYMncFrtuZg
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘WHAt Network Tools should you choose ?
#FastTips

> The most advanced network monitoring tools can also perform the following 5 functions :

1. Network and application monitoring

2. Network problem analysis

3. Application data and stream interception analysis

4. Virtualization and operating system problem detection

5. Root cause analysis

Different network performance monitoring vendors have different granularities in performing these tasks. Moreover, the more precise the task, the more complicated it will be when it is implemented and managed. Therefore, we must accurately understand the needs of our organization, and then properly balance the granularity and complexity.

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
BIN Multifunctional:(PUBG)

BIN: 431732027035xxxx
DATE: 02/23
CVV: RANDOM
IP: USA ๐Ÿ‡บ๐Ÿ‡ธ

Working For :
Pubg Uc
Prime Video
PlayStore
Spotify (Paid & Auto Renew)
Netflix
Ding (Charged Card Needed)

Note: Lives CVV Needed.

- Working on more Sites.

(Only verified, not created by us)
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘We all know what happen's to twitter but the real details :
#news

?Twitter mass hacking may evolve into a global security crisis

Sina Technology News, July 16th, Beijing time, according to foreign media reports, Bitcoin scammers will not be the last person to steal a certified account-we should be vigilant, because there will be other people to steal our account .

Everything is expected.

The hacker attack on July 15, 2020 is TwitterThe worst security breach in company history. No matter how the company ultimately tells the story, one thing must be acknowledged that the crisis has been brewing as early as a few years ago.

Since the spring of 2018, scammers have been posing as well-known cryptocurrency enthusiast Elon Musk. They use Musk's avatar, choose a similar username, and then post an effective invitation that looks like a pie in the sky: lend him some cryptocurrency and he will give you back more. Sometimes scammers will reply to a connected and authenticated account (such as Musk's SpaceX) to make the fake account look more real. Scammers also spread false tweets through botnets, also to increase authenticity.

The events of 2018 let us see three things. First, there are always people who are deceived, and every time someone is deceived, it is enough to inspire further fraud; second, Twitter's handling of this threat is slow, far less than the company's promise to take these issues seriously in the morning; Third, the needs of scammers and Twitterโ€™s initial countermeasures formed a cat-and-mouse game, which in turn encouraged criminals to take more aggressive actions to create damage.

So there is today's largest attack. Nick Statt reports:

โ€œLarge companies and individualsโ€™ Twitter accounts have recently encountered the largest hacker attack on the platform ever. All attacks are aimed at promoting bitcoin scams, and the initiators seem to have earned a small amount of money from them. We donโ€™t know how the attack happened Yes, I donโ€™t know how much damage to Twitterโ€™s own system. The hackers seem to have stopped, but the authentication account has been posting new scam tweets from 4 pm Eastern time, which has lasted for more than two hours. It has been silent for more than one hour At last, Twitter finally admitted the time of the hacker attack. At 5:45 ET, it wrote on the company's user support account:'We have been informed of the security incidents affecting users of our platform. We are investigating and actively taking measures to respond to the attack. We We will provide you with the latest information as soon as possible.'"

Including former President Barack Obama, Joe Biden, AmazonCEOs Jeff Bezos, Bill Gates and pop singer Kanye West among others and AppleAnd UberThe authentication accounts of other technology companies were hacked.

But they are all later things. Who was the first celebrity account to be attacked? Elon Musk, no doubt.

In the first few hours of hacking, the deceived people sent more than 118,000 dollars to the hackers. In addition, hackers may also access a large number of personal direct messages. Even more disturbing is the speed and scale of hacker attacks, as well as deeper national security issues.

Of course, the most important and most obvious question is, who is the initiator of the attack and how did they do it? As of press time, we have no answer. According to a report by security reporter Joseph Cox, screenshots shared among members of the underground hacker community show that someone can access the tools used to manage accounts within Twitter. Cox wrote:

ใ€€ใ€€"Two sources of the underground hacker community provided a screenshot of an internal control panel to the media. It is alleged that Twitter employees use this internal control panel to manage user accounts. A source said that this control panel of Twitter is also used to Change the ownership of certain so-called OG accounts. Twitter has deleted screenshots of these control panels and suspended the user accounts that posted these screenshots, saying the content violates community rules."
Continuing speculation will inevitably appear irresponsible, but Coxโ€™s report has at least stated that this is not a simple and ordinary hacking incident. One possibility is that a hacker broke Twitterโ€™s internal tools; Cox also proposed another possibility. There are ghosts in Twitter employees who participated in this attack-if that is the case, then Twitter is really a lottery in the year. Twice.

In either case, Twitterโ€™s response to this incident has caused further confusion. The companyโ€™s earliest tweet about this matter basically did not mention any substantive content. Two hours later, Twitter simply stated that the company has disabled the tweet function of the authenticated account, or has reset their password. Try to investigate the root cause of the attack. But just before Twitter explained the situation, many users were already forced to find that they couldn't tweet.

Politicians, celebrities, and national news media will not be able to tweet, but save Twitter some public relations trouble. Although ordinary users are ridiculous, but think about more serious problems. Twitter, whether good or bad, is always one of the most important communication systems in the world. Many of its users are related to emergency medical services. For example, the National Weather Service of Lincoln, Illinois just issued a tornado warning before the certification account was banned. Those who rely on this account to understand the follow-up of the tornado may be unlucky.

Of course, Twitter's ban on certified account statements is also a last resort. People probably prefer that the National Meteorological Service can't push, or want hackers to sell their accounts to criminals and then the latter took the opportunity to log in to the account to post some false information, such as falsely claiming that the tornado fee swept the major cities of the United States and so on. But using this clumsy method to solve the problem-prohibiting most of the 359,000 certified accounts from publishing messages-reflects the wide scope of the incident.

Then you can't help but wonder what emergency measures the company will take if it is not a greedy bitcoin scammer next time, but a national-level person or a mental patient. After this incident, it is not difficult to imagine that if someone controls the account of a world leader and then attempts to launch a nuclear war, it is possible.

At this point, what the Senator Josh Hawley of the Republic of Missouri mentioned in his letter to Twitter CEO Jack Dorsey is very resonant. Holly said:

"I am concerned that this incident is not just a series of planned and premeditated independent hacker attacks, but also a successful attack on Twitter's own security. As you know, your millions of users not only rely on your service for public release Tweets also use your direct messaging service to communicate with each other in private. Successful attacks on your system's servers will pose a threat to the privacy and data security of all users."

However, Holly did not say comprehensively. Here, not only user privacy and data security are threatened. More importantly, impostor and fraud on Twitter are very likely to cause turmoil in the real world. To this day, we have seen this assumption actually happen. With less than four months left before the 2020 election, God knows exactly what will happen.

In the next few days, Twitter may investigate the cause of the security incident. The company may not be able to give a completely satisfactory explanation. But the important thing is that Twitter shares with the public what it has learned about the incident in a timely manner-and what measures the company will take in the future to prevent such a thing from happening again. (noob)

@โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
the real history of twitter-few days..
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘SPEEDUP ANY LINUX -WIKI SOURCES :

1. Reduce the default grub load time:
The grub gives you 10 seconds to change between dual boot OS or to go in recovery etc. To me, itโ€™s too much. It also means you will have to sit beside your computer and press the enter key to boot into Ubuntu as soon as possible. A little time taking, ainโ€™t it? The first trick would be to change this boot time. If you are more comfortable with a GUI tool, read this article to change grub time and boot order with Grub Customizer.

For the rest of us, you can simply use the following command to open grub configuration:

sudo gedit /etc/default/grub &
And change GRUB_TIMEOUT=10 to GRUB_TIMEOUT=2. This will change the boot time to 2 seconds. Prefer not to put 0 here as you will lose the privilege to change between OS and recovery options. Once you have changed the grub configuration, update grub to make the change count:

sudo update-grub
2. Manage startup applications:
Over the time you tend to start installing applications. If you are a regular Itโ€™s FOSS reader, you might have installed many apps from App of the week series.

Some of these apps are started at each startup and of course resources will be busy in running these applications. Result: a slow computer for a significant time duration at each boot. Go in Unity Dash and look for Startup Applications:

start up application Ubuntu 13.10
In here, look at what applications are loaded at startup. Now think if there are any applications which you donโ€™t require to be started up every time you boot in to Ubuntu. Feel free to remove them:

change start up applications Ubuntu 13.10
But what if you donโ€™t want to remove the applications from startup? For example, if you installed one of the best indicator applets for Ubuntu, you will want them to be started automatically at each boot.

What you can do here is to delay some the start of some of the programs. This way you will free up the resource at boot time and your applications will be started automatically, after some time. In the previous picture click on Edit and change the run command with a sleep option.

For example, if you want to delay the running of Dropbox indicator for letโ€™s say 20 seconds, you just need to add a command like this in the existing command:

sleep 10;
So, the command โ€˜dropbox start -iโ€˜ changes to โ€˜sleep 20; drobox start -iโ€˜. Which means that now Dropbox will start with a 20 seconds delay. You can change the start time of another start up applications in the similar fashion.

Edit start up applications to make Ubuntu 13.10 run faster
3. Install preload to speed up application load time:
Preload is a daemon that runs in the background and analyzes user behavior and frequently run applications. Open a terminal and use the following command to install preload:

sudo apt-get install preload
After installing it, restart your computer and forget about it. It will be working in the background. Read more about preload.

4. Choose the best mirror for software updates:
Itโ€™s good to verify that you are using the best mirror to update the software. Ubuntu software repository are mirrored across the globe and it is quite advisable to use the one which is nearest to you. This will result in a quicker system update as it reduces the time to get the packages from the server.

In Software & Updates->Ubuntu Software tab->Download From choose Other and thereafter click on Select Best Server:

Change mirrors to speed up Ubuntu 13.10
It will run a test and tell you which is the best mirror for you. Normally, the best mirror is already set but as I said, no harm in verifying it. Also, this may result in some delay in getting the updates if the nearest mirror where the repository is cached is not updated frequently. This is useful for people with a relatively slower internet connection. You can also these tips to speed up wifi speed in Ubuntu.
5. Use apt-fast instead of apt-get for a speedy update:
apt-fast is a shell script wrapper for โ€œapt-getโ€ that improves updated and package download speed by downloading packages from multiple connections simultaneously. If you frequently use terminal and apt-get to install and update the packages, you may want to give apt-fast a try. Install apt-fast via official PPA using the following commands:

sudo add-apt-repository ppa:apt-fast/stable
sudo apt-get update
sudo apt-get install apt-fast
6. Remove language related ign from apt-get update:
Have you ever noticed the output of sudo apt-get update? There are three kinds of lines in it, hit, ign and get. You can read their meaning here. If you look at IGN lines, you will find that most of them are related to language translation. If you use all the applications, packages in English, there is absolutely no need for a translation of package database from English to English.

If you suppress this language related updates from apt-get, it will slightly increase the apt-get update speed. To do that, open the following file:

sudo gedit /etc/apt/apt.conf.d/00aptitude
And add the following line at the end of this file:

Acquire::Languages "none";
speed up apt get update in Ubuntu
7. Reduce overheating:
Overheating is a common problem in computers these days. An overheated computer runs quite slow. It takes ages to open a program when your CPU fan is running like Usain Bolt. There are two tools which you can use to reduce overheating and thus get a better system performance in Ubuntu, TLP and CPUFREQ.

To install and use TLP, use the following commands in a terminal:

sudo add-apt-repository ppa:linrunner/tlp
sudo apt-get update
sudo apt-get install tlp tlp-rdw
sudo tlp start
You donโ€™t need to do anything after installing TLP. It works in the background.

To install CPUFREQ indicator use the following command:

sudo apt-get install indicator-cpufreq
Restart your computer and use the Powersave mode in it:

CPUFREQ Indicator Applet
8. Tweak LibreOffice to make it faster:
If you are a frequent user of office product, then you may want to tweak the default LibreOffice a bit to make it faster. You will be tweaking memory option here. Open LibreOffice and go to Tools->Options. In there, choose Memory from the left sidebar and enable Systray Quickstarter along with increasing memory allocation.

Improve Libre Office performance
You can read more about how to speed up LibreOffice in detail.

9. Use a lightweight desktop environment (if you can)
If you chose to install the default Unity of GNOME desktop environment, you may choose to opt for a lightweight desktop environment like Xfce or LXDE.

These desktop environments use less RAM and consume less CPU. They also come with their own set of lightweight applications that further helps in running Ubuntu faster. You can refer to this detailed guide to learn how to install Xfce on Ubuntu.

Of course, the desktop might not look as modern as Unity or GNOME. Thatโ€™s a compromise you have to make.

10. Use lighter alternatives for different applications:
This is more of a suggestion and liking. Some of the default or popular applications are resource heavy and may not be suitable for a low-end computer. What you can do is to use some alternates to these applications. For example, use AppGrid instead of Ubuntu Software Center. Use Gdebi to install packages. Use AbiWord instead of LibreOffice Writer etc.

That concludes the collection of tips to make Ubuntu 18.04, 16.04 and other versions faster. I am sure these tips would provide overall a better system performance.

โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
10 real tips speedup any linux
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Fake Card Transactions-In Carding :

> This type of fraud accounts for the largest share of payment system losses.

The mechanism of fraud can be different: a fraudster receives a regular card in a bank in a lawful manner, deposits the minimum necessary amount to a special card account. Then he obtains the necessary information about the holder of the plastic card of the same company, but with a more solid account, and enters the new data thus obtained into his card. To implement this method of fraud, the offender must obtain information about the code numbers, surname, name, patronymic of the card holder, sample signature, etc.

๐Ÿฆ‘There are various ways to fake such a fake:

1) changing the information available on magnetic media;

2) changing the information embossed (squeezed out) on the front side;

3) having done both;

4) having falsified the signature of the legal card holder.

When faking a signature, several options are used, but it takes into account that it is impossible to erase a signature sample, because when you try to do this, the word VOID will appear in the signature field - "invalid". Therefore, it is often simply painted over with white paint.

One of the most dangerous tricks for counterfeiting plastic cards is the production of completely fake cards. The most widely used method of full copying is in some countries in Southeast Asia. This method is most often used by organized criminal groups, which, as a rule, include employees of restaurants and other service establishments. The latter are used to collect information about credit cards that fall into their hands when paying for restaurant and other services.

Credit information used in the manufacture of fake credit cards can be collected in various countries around the world. The most commonly used data are from Canada, the United States of America, European countries, as well as from the Asian region.

written by Undercode
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Pentesting With Burp Suite.pdf
737.9 KB
๐Ÿฆ‘No waste time, Full burpsuite :

๏ฎ Intro to Web App Testing
๏ฎ Scoping with Burp
๏ฎ Mapping with Burp Spider, Intruder, and Engagement Tools ๏ฎ Replacing Some good common methodology tasks
๏ฎ Automated Scanner Breakdown
๏ฎ Stealing from other tools and Modifying your Attacks
๏ฎ Fuzzing with Intruder and FuzzDB
๏ฎ Auth Bruting with Burp Intruder
๏ฎ Random Burping, IBurpExtender ++
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Crunch VS Hashcat by Undercode ;

Crunch - a dictionary generator with passwords in which you can define a standard or specified encoding. Crunch can create a list of words with all kinds of combinations and permutations according to the given criteria. The data that crunch displays can be displayed on the screen, saved to a file, or transferred to another program.

This is a very flexible dictionary generation program.

Hashcat is the world's fastest password recovery (cracker). But we are not interested in this function. Hashcat can also generate dictionaries. In order not to crack passwords, but only to show candidates for Hashcat there is an option --stdout

Hashcat uses various methods for generating passwords (by mask, combinatorial, permutation, rule-based attack and others). The most popular way is to generate passwords by mask.

In order not to get confused in terms, we will call the symbol in a certain place of the mask or pattern (pattern) โ€œpositionโ€. For example, the first character in the candidates for passwords is the first position. The second character is the second position, etc.

Using a mask, we can gain control over each position.

For example, we want to make one of the positions a static symbol (always the same in all candidates for passwords) - so maybe Crunch. But we can also use custom character sets for certain positions. For example, we know that in the second position there are only numbers from 1, 3, 5. In Hashcat we can create a custom character set that includes the numbers 1, 3, 5 and put this user set in the second position in the mask.

In Crunch there is no concept of โ€œmaskโ€, but there is a concept of โ€œpatternโ€, โ€œpatternโ€. In essence, it is equivalent to a mask. Moreover, Crunch can also create up to four custom character sets. Those. in terms of functionality, Crunch is not inferior to the capabilities of Hashcat.

Crunch has a couple of options that are not available in Hashcat. For example, -d allows you to specify the maximum number of duplicate characters. And the -p option creates dictionaries without duplicate characters. Those. This program has its own unique features.

written by Undercode
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–


๐Ÿฆ‘TOR-BOT UPDATEDโ•

F e a t u r e s

Onion
Crawler (.onion).(Completed)
Returns Page title and address with a short description about the site.(Partially Completed)
Save links to database.(PR to be reviewed)
Get emails from site.(Completed)
Save crawl info to JSON file.(Completed)
Crawl custom domains.(Completed)
Check if the link is live.(Completed)
Built-in Updater.(Completed)
TorBot GUI(see branch front_end)
Social Media integration.(not Started) ...(will be updated)

๐Ÿ„ธ๐Ÿ„ฝ๐Ÿ…‚๐Ÿ…ƒ๐Ÿ„ฐ๐Ÿ„ป๐Ÿ„ป๐Ÿ„ธ๐Ÿ…‚๐Ÿ„ฐ๐Ÿ…ƒ๐Ÿ„ธ๐Ÿ„พ๐Ÿ„ฝ & ๐Ÿ…๐Ÿ…„๐Ÿ„ฝ :

1๏ธโƒฃDependencies :

beautifulsoup4
pyinstaller
PySocks
termcolor
requests
requests_mock
yattag

2๏ธโƒฃGET TOR - TORPROJECT.COM

3๏ธโƒฃBefore you run the torBot make sure the following things are done properly:

> Run tor service sudo service tor start


> Make sure that your torrc is configured to SOCKS_PORT localhost:9050


> CLONE https://github.com/DedSecInside/TorBot then

>Install TorBot Python requirements pip3 install -r requirements.txt

4๏ธโƒฃOn Linux platforms, you can make an executable for TorBot by using the install.sh script. You will need to give the script the correct permissions using chmod +x install.sh Now you can run ./install.sh to create the torBot binary. Run ./torBot to execute the program.

5๏ธโƒฃAn alternative way of running torBot is shown below, along with help instructions.

> python3 torBot.py or use the -h/--help argument

โœ…git topic
ENJOYโค๏ธ๐Ÿ‘๐Ÿป
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–