β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Disk Image Creation Tools 2020
* [AccessData FTK Imager](http://accessdata.com/product-download/?/support/adownloads#FTKImager) - AccessData FTK Imager is a forensics tool whose main purpose is to preview recoverable data from a disk of any kind. FTK Imager can also acquire live memory and paging file on 32bit and 64bit systems
* [Bitscout](https://github.com/vitaly-kamluk/bitscout) - Bitscout by Vitaly Kamluk helps you build your fully-trusted customizable LiveCD/LiveUSB image to be used for remote digital forensics (or perhaps any other task of your choice). It is meant to be transparent and monitorable by the owner of the system, forensically sound, customizable and compact.
* [GetData Forensic Imager](http://www.forensicimager.com/) - GetData Forensic Imager is a Windows based program that will acquire, convert, or verify a forensic image in one of the following common forensic file formats
* [Guymager](http://guymager.sourceforge.net) - Guymager is a free forensic imager for media acquisition on Linux
* [Magnet ACQUIRE](https://www.magnetforensics.com/magnet-acquire/) - ACQUIRE by Magnet Forensics allows various types of disk acquisitions to be performed on Windows, Linux, and OS X as well as mobile operating systems.
> git sources
@UndercodeTesting
@undercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Disk Image Creation Tools 2020
* [AccessData FTK Imager](http://accessdata.com/product-download/?/support/adownloads#FTKImager) - AccessData FTK Imager is a forensics tool whose main purpose is to preview recoverable data from a disk of any kind. FTK Imager can also acquire live memory and paging file on 32bit and 64bit systems
* [Bitscout](https://github.com/vitaly-kamluk/bitscout) - Bitscout by Vitaly Kamluk helps you build your fully-trusted customizable LiveCD/LiveUSB image to be used for remote digital forensics (or perhaps any other task of your choice). It is meant to be transparent and monitorable by the owner of the system, forensically sound, customizable and compact.
* [GetData Forensic Imager](http://www.forensicimager.com/) - GetData Forensic Imager is a Windows based program that will acquire, convert, or verify a forensic image in one of the following common forensic file formats
* [Guymager](http://guymager.sourceforge.net) - Guymager is a free forensic imager for media acquisition on Linux
* [Magnet ACQUIRE](https://www.magnetforensics.com/magnet-acquire/) - ACQUIRE by Magnet Forensics allows various types of disk acquisitions to be performed on Windows, Linux, and OS X as well as mobile operating systems.
> git sources
@UndercodeTesting
@undercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Exterro
Exterro - E-Discovery & Information Governance Software
Exterroβs Legal Governance, Risk and Compliance (GRC) solutions enable you to address your privacy, compliance, investigation and litigation risks more effectively and at lower costs.
β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦BEST ANDROID HACKING APPS 2020 :
1) DroidBox
https://downloadapks.net/app/droidbox-apk/
2) Kali Net Hunter
https://www.kali.org/kali-linux-nethunter/
3) Zanti
https://zanti.en.softonic.com/android
4) CSploit
http://www.csploit.org/downloads/
5) Hackod
https://apkpure.com/hackode/com.techfond.hackode
6) Network mapper
https://www.malavida.com/en/soft/network-mapper/android/#gref
7)androrat
https://www.apkfirm.com/androrat/
8) DroidSheep - Wi-Fi Kill -
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦BEST ANDROID HACKING APPS 2020 :
1) DroidBox
https://downloadapks.net/app/droidbox-apk/
2) Kali Net Hunter
https://www.kali.org/kali-linux-nethunter/
3) Zanti
https://zanti.en.softonic.com/android
4) CSploit
http://www.csploit.org/downloads/
5) Hackod
https://apkpure.com/hackode/com.techfond.hackode
6) Network mapper
https://www.malavida.com/en/soft/network-mapper/android/#gref
7)androrat
https://www.apkfirm.com/androrat/
8) DroidSheep - Wi-Fi Kill -
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Alexa Skills Fundamentals (New 2019-2020) β2.16 GB
https://www.udemy.com/course/alexa-skills-fundamentals/
https://mega.nz/folder/YdAz1SqJ#8EtGtN2j_WX7DZNd4w31Hg
https://www.udemy.com/course/alexa-skills-fundamentals/
https://mega.nz/folder/YdAz1SqJ#8EtGtN2j_WX7DZNd4w31Hg
Udemy
Alexa Skills Fundamentals (New 2019)
No Coding Experience Required!
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#BUG BOUNTIES :
- [Awesome Bug Bounty Writeups](https://github.com/devanshbatham/Awesome-Bugbounty-Writeups)
## Bug Bounty Platforms
- [AntiHACK](https://www.antihack.me/)
- [Bounty Factory](https://bountyfactory.io/)
- [Bountysource](https://www.bountysource.com/)
- [BugbountyHQ](https://www.bugbountyhq.com/)
- [Bugbountyjp](https://bugbounty.jp/)
- [Bugcrowd](https://bugcrowd.com/)
- [CESPPA](https://www.cesppa.com/)
- [Cobalt](https://cobalt.io/)
- [Coder Bounty](http://www.coderbounty.com/)
- [Detectify](https://cs.detectify.com/)
- [FOSS Factory](http://www.fossfactory.org/)
- [FreedomSponsors](https://freedomsponsors.org/)
- [HackenProof](https://hackenproof.com/)
- [Hackerhive](https://hackerhive.io/)
- [HackerOne](https://hackerone.com/)
- [intigriti](https://intigriti.com/)
- [Safehats](https://safehats.com/)
- [Synack](https://www.synack.com/)
- [YesWeHack](https://yeswehack.com/)
@UndercodeTesting
> git sources
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#BUG BOUNTIES :
- [Awesome Bug Bounty Writeups](https://github.com/devanshbatham/Awesome-Bugbounty-Writeups)
## Bug Bounty Platforms
- [AntiHACK](https://www.antihack.me/)
- [Bounty Factory](https://bountyfactory.io/)
- [Bountysource](https://www.bountysource.com/)
- [BugbountyHQ](https://www.bugbountyhq.com/)
- [Bugbountyjp](https://bugbounty.jp/)
- [Bugcrowd](https://bugcrowd.com/)
- [CESPPA](https://www.cesppa.com/)
- [Cobalt](https://cobalt.io/)
- [Coder Bounty](http://www.coderbounty.com/)
- [Detectify](https://cs.detectify.com/)
- [FOSS Factory](http://www.fossfactory.org/)
- [FreedomSponsors](https://freedomsponsors.org/)
- [HackenProof](https://hackenproof.com/)
- [Hackerhive](https://hackerhive.io/)
- [HackerOne](https://hackerone.com/)
- [intigriti](https://intigriti.com/)
- [Safehats](https://safehats.com/)
- [Synack](https://www.synack.com/)
- [YesWeHack](https://yeswehack.com/)
@UndercodeTesting
> git sources
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - devanshbatham/Awesome-Bugbounty-Writeups: A curated list of bugbounty writeups (Bug type wise) , inspired from https:β¦
A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference - devanshbatham/Awesome-Bugbounty-Writeups
Forwarded from iUNDERCODE - iOs JAILBREAK & MODS
).c
3.3 KB
Apple macOS - Reverse (::1:4444/TCP) Shell (/bin/sh) +IPv6 Shellcode (119 bytes)
