β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BEST 2020 FREE RANSOMWARE DECRYPTORS BY AVAST :
β N E V E R P A Y F O R A R A N S O M W A R E β
https://files.avast.com/files/decryptor/avast_decryptor_globe.exe
https://files.avast.com/files/decryptor/avast_decryptor_hiddentear.exe
https://files.avast.com/files/decryptor/avast_decryptor_jigsaw.exe
https://files.avast.com/files/decryptor/avast_decryptor_lambdalocker.exe
https://files.avast.com/files/decryptor/avast_decryptor_legion.exe
https://files.avast.com/files/decryptor/avast_decryptor_noobcrypt.exe
https://files.avast.com/files/decryptor/avast_decryptor_stampado.exe
https://files.avast.com/files/decryptor/avast_decryptor_szflocker.exe
https://files.avast.com/files/decryptor/avast_decryptor_teslacrypt3.exe
https://files.avast.com/files/decryptor/avast_decryptor_troldesh.exe
https://files.avast.com/files/decryptor/avast_decryptor_xdata.exe
ENJOYβ€οΈππ»
MORE DETAILS: https://www.avast.com/ransomware-decryption-tools
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BEST 2020 FREE RANSOMWARE DECRYPTORS BY AVAST :
β N E V E R P A Y F O R A R A N S O M W A R E β
https://files.avast.com/files/decryptor/avast_decryptor_globe.exe
https://files.avast.com/files/decryptor/avast_decryptor_hiddentear.exe
https://files.avast.com/files/decryptor/avast_decryptor_jigsaw.exe
https://files.avast.com/files/decryptor/avast_decryptor_lambdalocker.exe
https://files.avast.com/files/decryptor/avast_decryptor_legion.exe
https://files.avast.com/files/decryptor/avast_decryptor_noobcrypt.exe
https://files.avast.com/files/decryptor/avast_decryptor_stampado.exe
https://files.avast.com/files/decryptor/avast_decryptor_szflocker.exe
https://files.avast.com/files/decryptor/avast_decryptor_teslacrypt3.exe
https://files.avast.com/files/decryptor/avast_decryptor_troldesh.exe
https://files.avast.com/files/decryptor/avast_decryptor_xdata.exe
ENJOYβ€οΈππ»
MORE DETAILS: https://www.avast.com/ransomware-decryption-tools
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
Avast
Free Ransomware Decryption Tools | Unlock Your Files | Avast
Hit by ransomware? Donβt pay the ransom! Our free ransomware decryption tools can help you get your files back right now. Free download!
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Transparent proxies(mitmproxy) that you can use to intercept and manipulate HTTP traffic modifying requests and responses, that allow to inject javascripts into the targets visited. You can easily implement a module to inject data into pages creating a python file in directory "plugins/extension/" automatically will be listed on Pumpkin-Proxy tab.
The Code Plugins Dev
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Transparent proxies(mitmproxy) that you can use to intercept and manipulate HTTP traffic modifying requests and responses, that allow to inject javascripts into the targets visited. You can easily implement a module to inject data into pages creating a python file in directory "plugins/extension/" automatically will be listed on Pumpkin-Proxy tab.
The Code Plugins Dev
from mitmproxy.models import decoded # for decode content html
from plugins.extension.plugin import PluginTemplate
class Nameplugin(PluginTemplate):
meta = {
'Name' : 'Nameplugin',
'Version' : '1.0',
'Description' : 'Brief description of the new plugin',
'Author' : 'by dev'
}
def __init__(self):
for key,value in self.meta.items():
self.__dict__[key] = value
# if you want set arguments check refer wiki more info.
self.ConfigParser = False # No require arguments
def request(self, flow):
print flow.__dict__
print flow.request.__dict__
print flow.request.headers.__dict__ # request headers
host = flow.request.pretty_host # get domain on the fly requests
versionH = flow.request.http_version # get http version
# get redirect domains example
# pretty_host takes the "Host" header of the request into account,
if flow.request.pretty_host == "example.org":
flow.request.host = "mitmproxy.org"
# get all request Header example
self.send_output.emit("\n[{}][HTTP REQUEST HEADERS]".format(self.Name))
for name, valur in flow.request.headers.iteritems():
self.send_output.emit('{}: {}'.format(name,valur))
print flow.request.method # show method request
# the model printer data
self.send_output.emit('[NamePlugin]:: this is model for save data logging')
def response(self, flow):
print flow.__dict__
print flow.response.__dict__
print flow.response.headers.__dict__ #convert headers for python dict
print flow.response.headers['Content-Type'] # get content type
#every HTTP response before it is returned to the client
with decoded(flow.response):
print flow.response.content # content html
flow.response.content.replace('</body>','<h1>injected</h1></body>') # replace content tag
del flow.response.headers["X-XSS-Protection"] # remove protection Header
flow.response.headers["newheader"] = "foo" # adds a new header
#and the new header will be added to all responses passing through the proxy
(not coded by under code)
E N J O Y β€οΈππ»β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 new EXPLOITS AND ADVISORIES TUTORIALS :
Http://www.exploit-db.com/
Http://www.cvedetails.com/
Http://www.packetstormsecurity.org/
http://www.securityforest.com/wiki/index.php/Main_Page
Http://www.securityfocus.com/bid
Http://nvd.nist.gov/
Http://osvdb.org/
http://www.nullbyte.org.il/Index.html
Http://secdocs.lonerunners.net/
http://www.phenoelit-us.org/whatSAP/index.html
Http://secunia.com/
Http://cve.mitre.org/
π¦CHEATSHEETS AND SYNTAX
Http://www.cheat-sheets.org/
Http://blog.securitymonks.com/2009/08/15/whats-in-your-folder-security-cheat-sheets/Http://www.exploit-db.com/
Http://www.cvedetails.com/
Http://www.packetstormsecurity.org/
http://www.securityforest.com/wiki/index.php/Main_Page
Http://www.securityfocus.com/bid
Http://nvd.nist.gov/
Http://osvdb.org/
http://www.nullbyte.org.il/Index.html
Http://secdocs.lonerunners.net/
http://www.phenoelit-us.org/whatSAP/index.html
Http://secunia.com/
Http://cve.mitre.org/
E N J O Y β€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 new EXPLOITS AND ADVISORIES TUTORIALS :
Http://www.exploit-db.com/
Http://www.cvedetails.com/
Http://www.packetstormsecurity.org/
http://www.securityforest.com/wiki/index.php/Main_Page
Http://www.securityfocus.com/bid
Http://nvd.nist.gov/
Http://osvdb.org/
http://www.nullbyte.org.il/Index.html
Http://secdocs.lonerunners.net/
http://www.phenoelit-us.org/whatSAP/index.html
Http://secunia.com/
Http://cve.mitre.org/
π¦CHEATSHEETS AND SYNTAX
Http://www.cheat-sheets.org/
Http://blog.securitymonks.com/2009/08/15/whats-in-your-folder-security-cheat-sheets/Http://www.exploit-db.com/
Http://www.cvedetails.com/
Http://www.packetstormsecurity.org/
http://www.securityforest.com/wiki/index.php/Main_Page
Http://www.securityfocus.com/bid
Http://nvd.nist.gov/
Http://osvdb.org/
http://www.nullbyte.org.il/Index.html
Http://secdocs.lonerunners.net/
http://www.phenoelit-us.org/whatSAP/index.html
Http://secunia.com/
Http://cve.mitre.org/
E N J O Y β€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
Exploit-Db
OffSecβs Exploit Database Archive
The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦AGILE HACKING/Injections sources :
#resources
Http://www.gnucitizen.org/blog/agile-hacking-a-homegrown-telnet-based-portscanner/
Http://blog.commandlinekungfu.com/
Http://www.securityaegis.com/simple-yet-effective-directory-bruteforcing/
Http://isc.sans.edu/diary.html?storyid=2376
Http://isc.sans.edu/diary.html?storyid=1229
Http://ss64.com/nt/
Http://pauldotcom.com/2010/02/running-a-command-on-every-
mac.html
Http://synjunkie.blogspot.com/2008/03/command-line-ninjitsu.html
Http://www.zonbi.org/2010/06/09/wmic-the-other-other-white-meat/
Http://rstcenter.com/forum/22324-hacking-without-tools-windows.rst
http://www.coresecurity.com/files/attachments/Core_Define_and_Win_Cmd_Line.pdf
http://www.scribd.com/Penetration-Testing-Ninjitsu2-Infrastructure-and-Netcat-without-Netcat/d/3064507
Http://www.pentesterscripting.com/
Http://www.sans.org/reading_room/whitepapers/hackers/windows-script-host-hack-windows_33583
http://www.blackhat.com/presentations/bh-dc-10/Bannedit/BlackHat-DC-2010-Bannedit-Advanced-Command-Injection-Exploitation-1-wp.pdf
E N J O Y β€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦AGILE HACKING/Injections sources :
#resources
Http://www.gnucitizen.org/blog/agile-hacking-a-homegrown-telnet-based-portscanner/
Http://blog.commandlinekungfu.com/
Http://www.securityaegis.com/simple-yet-effective-directory-bruteforcing/
Http://isc.sans.edu/diary.html?storyid=2376
Http://isc.sans.edu/diary.html?storyid=1229
Http://ss64.com/nt/
Http://pauldotcom.com/2010/02/running-a-command-on-every-
mac.html
Http://synjunkie.blogspot.com/2008/03/command-line-ninjitsu.html
Http://www.zonbi.org/2010/06/09/wmic-the-other-other-white-meat/
Http://rstcenter.com/forum/22324-hacking-without-tools-windows.rst
http://www.coresecurity.com/files/attachments/Core_Define_and_Win_Cmd_Line.pdf
http://www.scribd.com/Penetration-Testing-Ninjitsu2-Infrastructure-and-Netcat-without-Netcat/d/3064507
Http://www.pentesterscripting.com/
Http://www.sans.org/reading_room/whitepapers/hackers/windows-script-host-hack-windows_33583
http://www.blackhat.com/presentations/bh-dc-10/Bannedit/BlackHat-DC-2010-Bannedit-Advanced-Command-Injection-Exploitation-1-wp.pdf
E N J O Y β€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
www.gnucitizen.org
Agile Hacking - A Homegrown Telnet-based Portscanner
So here is the scenario: the attacker has limited access to a box and he/she needs to perform a portscan from it. However, he/she does not want to download any tools to the target system. There might be various reasons for not wanting to upload a portscannerβ¦
RDP Pivoting with Metasploit .pdf
1.4 MB
Full good tutorial with pictures :)
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SwiftUI Injection- hack ios apps :
It is possible to inject SwiftUI applications but if you add elements to an interface or use modifiers that change their type, this changes the type of the body properties' Content which causes a crash. To avoid this you need to erase the type.
> The easiest way to do this is add the following extension to your source and use the modifier .eraseToAnyView() at the very end of any declaration of a view's body property you want to iterate over:
π¦FULL ALL INJECTIONS REAL CODES :
> https://github.com/johnno1962/InjectionIII
E N J O Y β€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SwiftUI Injection- hack ios apps :
It is possible to inject SwiftUI applications but if you add elements to an interface or use modifiers that change their type, this changes the type of the body properties' Content which causes a crash. To avoid this you need to erase the type.
> The easiest way to do this is add the following extension to your source and use the modifier .eraseToAnyView() at the very end of any declaration of a view's body property you want to iterate over:
var loadInjection = {
Bundle(path: "/Applications/InjectionIII.app/Contents/Resources/iOSInjection.bundle")!.load()
}()
extension View {
#if DEBUG
func eraseToAnyView() -> AnyView {
_ = loadInjection
return AnyView(self)
}
#else
func eraseToAnyView() -> some View {
return self
}
#endif
}
After this, you can put the final touches to your interface interactively on a fully live app.π¦FULL ALL INJECTIONS REAL CODES :
> https://github.com/johnno1962/InjectionIII
E N J O Y β€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - johnno1962/InjectionIII: Re-write of Injection for Xcode in (mostly) Swift
Re-write of Injection for Xcode in (mostly) Swift. Contribute to johnno1962/InjectionIII development by creating an account on GitHub.
π¦Host script- termux topic - port forwards :
1) apt update
2) apt install git curl php openssh -y
3) git clone git://github.com/htr-tech/host.git
4) cd host
5) Run : bash host.sh
6) choose option via numbers
1) apt update
2) apt install git curl php openssh -y
3) git clone git://github.com/htr-tech/host.git
4) cd host
5) Run : bash host.sh
6) choose option via numbers
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦topic wordlists 12gb and more download for cracking :
> https://crackstation.net/crackstation-wordlist-password-cracking-dictionary.htm
> http://www.insidepro.team/
> https://wiki.skullsecurity.org/Passwords
> https://github.com/danielmiessler/SecLists/tree/master/Passwords
> https://github.com/berzerk0/Probable-Wordlists
> https://github.com/topics/password-cracking
E N J O Y β€οΈππ»
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦topic wordlists 12gb and more download for cracking :
> https://crackstation.net/crackstation-wordlist-password-cracking-dictionary.htm
> http://www.insidepro.team/
> https://wiki.skullsecurity.org/Passwords
> https://github.com/danielmiessler/SecLists/tree/master/Passwords
> https://github.com/berzerk0/Probable-Wordlists
> https://github.com/topics/password-cracking
E N J O Y β€οΈππ»
β β β Uππ»βΊπ«Δπ¬πβ β β β
crackstation.net
CrackStation's Password Cracking Dictionary (Pay what you want!)
Download CrackStation's password cracking wordlist.
Forwarded from Backup Legal Mega
π¦Expert white hats (certificated) courses 202 0 :
Another paid packs
1) Linux Essentials Certification
> https://mega.nz/folder/nU1RRJKJ#WXy2dbCZC2zXpBmzLCwgWg
2) Google Cloud Platform Essentials
> https://mega.nz/folder/KV0nVZhD#90whmx3JNeNc_uxC_mrDFg
3) Linux+ and LPIC-1. System Administrator - Exam 101
> https://mega.nz/folder/Pdt1CZrT#rzDxLGouWhGH4BXTNQduKg
4) Learning Python 2.7 Development
> https://mega.nz/folder/DZ83ibIS#VKf_VJFmqfQ-SVbM5yUBww
Another paid packs
1) Linux Essentials Certification
> https://mega.nz/folder/nU1RRJKJ#WXy2dbCZC2zXpBmzLCwgWg
2) Google Cloud Platform Essentials
> https://mega.nz/folder/KV0nVZhD#90whmx3JNeNc_uxC_mrDFg
3) Linux+ and LPIC-1. System Administrator - Exam 101
> https://mega.nz/folder/Pdt1CZrT#rzDxLGouWhGH4BXTNQduKg
4) Learning Python 2.7 Development
> https://mega.nz/folder/DZ83ibIS#VKf_VJFmqfQ-SVbM5yUBww
mega.nz
File folder on MEGA
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Hack into Windows: Reset a local account password using Sticky Keys
> If the System Restore method doesnβt work, there is an alternative that manipulates the Sticky Keys shortcut on the Windows login screen (Sticky Keys lets you use key combinations such as Ctrl+Alt+Delete by pressing one key). This tip only works with local accounts, so skip to the next section if youβre using a Microsoft account.
1) First, restart your computer with the Windows installation media as described above. Click βRepair your computerβ | Troubleshoot | Command Prompt. (You can take some of the following commands from this Pastebin page to save you the hassle of typing everything out).
2) In Command Prompt type βcopy c:windowssystem32sethc.exe c:β then press Enter (replace c: with another letter if your Windows installation is on a different drive). This step ensures you can reverse the process once youβre back into Windows.
3) Next, type βcopy c:windowssystem32cmd.exe c:windowssystem32sethc.exeβ and confirm the copy. This replaces the Sticky Keys program with Command Prompt, but keeps its filename and, therefore, the shortcut to it.
4) Restart your computer and, when the Windows login screen appears, tap the Shift key five times in quick succession. Youβll hear a beep, then a Command Prompt window will appear (if not, try repeating the key taps).
5) In this window, type βnet user [username] [password]β β replacing [username] with your Windows account username and [password] with your new password
6) Press Enter. If you canβt remember what your username is, type βnet userβ and press Enter to display all Windows accounts.
7) Close the Command Prompt window and log into Windows using your new password.
8) Now youβre back into Windows, you can revert the Sticky Keys file back to its previous state. Click Start, type cmd and press Enter, then type βcopy c:sethc.exe c:windowssystem32sethc.exeβ and confirm the copy.
USE FOR LEARN
-POWERED BY WIKI
E N J O Y β€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Hack into Windows: Reset a local account password using Sticky Keys
> If the System Restore method doesnβt work, there is an alternative that manipulates the Sticky Keys shortcut on the Windows login screen (Sticky Keys lets you use key combinations such as Ctrl+Alt+Delete by pressing one key). This tip only works with local accounts, so skip to the next section if youβre using a Microsoft account.
1) First, restart your computer with the Windows installation media as described above. Click βRepair your computerβ | Troubleshoot | Command Prompt. (You can take some of the following commands from this Pastebin page to save you the hassle of typing everything out).
2) In Command Prompt type βcopy c:windowssystem32sethc.exe c:β then press Enter (replace c: with another letter if your Windows installation is on a different drive). This step ensures you can reverse the process once youβre back into Windows.
3) Next, type βcopy c:windowssystem32cmd.exe c:windowssystem32sethc.exeβ and confirm the copy. This replaces the Sticky Keys program with Command Prompt, but keeps its filename and, therefore, the shortcut to it.
4) Restart your computer and, when the Windows login screen appears, tap the Shift key five times in quick succession. Youβll hear a beep, then a Command Prompt window will appear (if not, try repeating the key taps).
5) In this window, type βnet user [username] [password]β β replacing [username] with your Windows account username and [password] with your new password
6) Press Enter. If you canβt remember what your username is, type βnet userβ and press Enter to display all Windows accounts.
7) Close the Command Prompt window and log into Windows using your new password.
8) Now youβre back into Windows, you can revert the Sticky Keys file back to its previous state. Click Start, type cmd and press Enter, then type βcopy c:sethc.exe c:windowssystem32sethc.exeβ and confirm the copy.
USE FOR LEARN
-POWERED BY WIKI
E N J O Y β€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How To Find Windows 10 Product Key Using CMD, PowerShell, And Windows Registry?
1) To go ahead with this method, you need to boot into your Windows computer. Now, using a simple VBScriptβsome of you might have seen it on Microsoft forumsβyou can read all the binary gibberish written in Windows Registry. This script translates the Registry values into a readable format.
2) So, just copy and paste the following script in a Notepad window and save its as productkey.vbs by choosing the βAll Filesβ option in βSave as type.β
enjoyβ€οΈππ»
@UndercodeTesting
(code by wiki)β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How To Find Windows 10 Product Key Using CMD, PowerShell, And Windows Registry?
1) To go ahead with this method, you need to boot into your Windows computer. Now, using a simple VBScriptβsome of you might have seen it on Microsoft forumsβyou can read all the binary gibberish written in Windows Registry. This script translates the Registry values into a readable format.
2) So, just copy and paste the following script in a Notepad window and save its as productkey.vbs by choosing the βAll Filesβ option in βSave as type.β
Set WshShell = CreateObject("WScript.Shell")
MsgBox ConvertToKey(WshShell.RegRead("HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\DigitalProductId"))
Function ConvertToKey(Key)
Const KeyOffset = 52
i = 28
Chars = "BCDFGHJKMPQRTVWXY2346789"
Do
Cur = 0
x = 14
Do
Cur = Cur * 256
Cur = Key(x + KeyOffset) + Cur
Key(x + KeyOffset) = (Cur \ 24) And 255
Cur = Cur Mod 24
x = x -1
Loop While x >= 0
i = i -1
KeyOutput = Mid(Chars, Cur + 1, 1) & KeyOutput
If (((29 - i) Mod 6) = 0) And (i <> -1) Then
i = i -1
KeyOutput = "-" & KeyOutput
End If
Loop While i >= 0
ConvertToKey = KeyOutput
End Function
3) After saving this file, just click on it and a new popup window will show your Windows product key in the registry. You can copy or note this down somewhere to use it later.enjoyβ€οΈππ»
@UndercodeTesting
(code by wiki)β
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from Backup Legal Mega
π¦more for py developers 2020 Vim - The improved Editor
β 868.18 MB β
> https://mega.nz/folder/zYsRnDaD#yiZMTNsl6XQDH0n65PGNLw
β 868.18 MB β
> https://mega.nz/folder/zYsRnDaD#yiZMTNsl6XQDH0n65PGNLw
mega.nz
868.18 MB folder on MEGA
32 files and 5 subfolders
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Malware reposity
> theZoo is a project created to make the possibility of malware analysis open and available to the public. Since we have found out that almost all versions of malware are very hard to come by in a way which will allow analysis, we have decided to gather all of them for you in an accessible and safe way. theZoo was born by Yuval tisf Nativ and is now maintained by Shahak Shalev.
Clone the repository with git clone https://www.github.com/ytisf/theZoo. Go to the directory and run pip install --user -r requirements.txt. This should install all latest requirements needed. In total can be "scripted" like so:
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://www.github.com/ytisf/theZoo
2) cd theZoo
3) pip install --user -r requirements.txt
4) Start by running the console:
> python theZoo.py
5)
/conf - The conf folder holds files relevant to the particular running of the program but are not part of the application. You can find the EULA file in the conf and more.
/imports - Contains .py import files used by the rest of the application
/malwares/Binaries - The actual malwares samples - be careful! These are very live.
/malware/Source - Malware source code.
Malware under the folder Original is supposed to be (NO PROMISES!) the original source of the malware that leaked. Malware under the folder Reversed is either reversed, decompiled or partially reconstructed.
π¦COMPATIBLE WITH ANY LINUX DISTRO
enjoyβ€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Malware reposity
> theZoo is a project created to make the possibility of malware analysis open and available to the public. Since we have found out that almost all versions of malware are very hard to come by in a way which will allow analysis, we have decided to gather all of them for you in an accessible and safe way. theZoo was born by Yuval tisf Nativ and is now maintained by Shahak Shalev.
Clone the repository with git clone https://www.github.com/ytisf/theZoo. Go to the directory and run pip install --user -r requirements.txt. This should install all latest requirements needed. In total can be "scripted" like so:
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://www.github.com/ytisf/theZoo
2) cd theZoo
3) pip install --user -r requirements.txt
4) Start by running the console:
> python theZoo.py
5)
/conf - The conf folder holds files relevant to the particular running of the program but are not part of the application. You can find the EULA file in the conf and more.
/imports - Contains .py import files used by the rest of the application
/malwares/Binaries - The actual malwares samples - be careful! These are very live.
/malware/Source - Malware source code.
Malware under the folder Original is supposed to be (NO PROMISES!) the original source of the malware that leaked. Malware under the folder Reversed is either reversed, decompiled or partially reconstructed.
π¦COMPATIBLE WITH ANY LINUX DISTRO
enjoyβ€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - ytisf/theZoo: A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibilityβ¦
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public. - ytisf/theZoo
Forwarded from Backup Legal Mega
π¦courses :
1) Git Quick Start for beginers 2019
> https://mega.nz/folder/DdtFSLoC#rsLt_cEhU6hkKV2gNR4reQ
2) Jenkins Quick start 2020
https://mega.nz/folder/rAkGAaQI#Fsc-WXfw13U5Z4r6E40pjA
3) 2019 Bootloading with GRUB
https://mega.nz/folder/rQ90iQ5I#GwtTPEkFfOFyacB9Vo0esA
4) Google Cloud Platform for the AWS User
https://mega.nz/folder/XJty2SgS#xiGzzcwIFXhMVnDtamnUag
1) Git Quick Start for beginers 2019
> https://mega.nz/folder/DdtFSLoC#rsLt_cEhU6hkKV2gNR4reQ
2) Jenkins Quick start 2020
https://mega.nz/folder/rAkGAaQI#Fsc-WXfw13U5Z4r6E40pjA
3) 2019 Bootloading with GRUB
https://mega.nz/folder/rQ90iQ5I#GwtTPEkFfOFyacB9Vo0esA
4) Google Cloud Platform for the AWS User
https://mega.nz/folder/XJty2SgS#xiGzzcwIFXhMVnDtamnUag
mega.nz
446.9 MB folder on MEGA
9 files
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦The Linux Foundation joins forces to establish the Open Source Security Foundation OpenSSF
> The Linux Foundation announced the cooperation with a number of hardware and software vendors to jointly establish the Open Source Security Foundation (OpenSSF), which is a cross-industry cooperation, through the establishment of a broader community of targeted programs and best practices, And gather leaders together to improve the security of open source software.
> OpenSSF members come from the Core Infrastructure Initiative, the GitHub Open Source Security Alliance and other founding board members such as GitHub, Google, IBM, JPMorgan Chase, Microsoft, NCC Group, OWASP Foundation and Red Hat. Other founding members include ElevenPaths, GitLab, HackerOne, Intel, Okta, Purdue, SAFECode, StackHawk, Trail of Bits, Uber and VMware.
> According to the introduction of the OpenSSF official website, the governance of the foundation, the technical community and its decision-making will be transparent, and any specifications and projects developed will have nothing to do with suppliers. OpenSSF is committed to collaboration and cooperation with upstream communities and with existing communities to improve open source security. In other words, they aim to become a transparent organization to promote cooperation between manufacturers and improve security.
#News
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦The Linux Foundation joins forces to establish the Open Source Security Foundation OpenSSF
> The Linux Foundation announced the cooperation with a number of hardware and software vendors to jointly establish the Open Source Security Foundation (OpenSSF), which is a cross-industry cooperation, through the establishment of a broader community of targeted programs and best practices, And gather leaders together to improve the security of open source software.
> OpenSSF members come from the Core Infrastructure Initiative, the GitHub Open Source Security Alliance and other founding board members such as GitHub, Google, IBM, JPMorgan Chase, Microsoft, NCC Group, OWASP Foundation and Red Hat. Other founding members include ElevenPaths, GitLab, HackerOne, Intel, Okta, Purdue, SAFECode, StackHawk, Trail of Bits, Uber and VMware.
> According to the introduction of the OpenSSF official website, the governance of the foundation, the technical community and its decision-making will be transparent, and any specifications and projects developed will have nothing to do with suppliers. OpenSSF is committed to collaboration and cooperation with upstream communities and with existing communities to improve open source security. In other words, they aim to become a transparent organization to promote cooperation between manufacturers and improve security.
#News
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from Backup Legal Mega
π¦Linux+ and LPIC-1. System Administrator - Exam 102 2019new β-2.27 GBβ-
#requested
https://mega.nz/folder/jIVETI5J#kahEzA8YVczQMzmyV4S_xg
#requested
https://mega.nz/folder/jIVETI5J#kahEzA8YVczQMzmyV4S_xg
mega.nz
2.27 GB folder on MEGA
37 files and 8 subfolders
Forwarded from UNDERCODE HACKING
Reverse_engineering_'Black_Desert_Online'_1_Preface.pdf
264.4 KB
Detect modiο¬ed of function about time Detect time modiο¬ed via using time server Detect of game client local time modiο¬cation Detect of major kernel function modiο¬cation Detect DLL injection Detect virtual memory code injection Detect illegal control of DHCP Detect call speciο¬c function in game Detect game resource modiο¬cation Reject game process memory accessing Reject game process handle accessing Reject game process message transmission Reject game process keyboard/mouse input transmission
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to prohibit downloading server sharing files at will, prohibit β sharing files:
shared file management system also has some special functions, such as:
1) Shared file access permission program management.
When a user accesses a shared file on the server, he sets a list of applications that he is allowed to use. Programs that are not in the list cannot be opened to prevent the shared file from leaking. For example, you can disable QQ to send files, disable email to send files, and prohibit opening or editing shared files through special software.
2) It can be hidden if there is no right to visit.
All or part of the shared files (folders) on the local area network server can be hidden for some users who do not have the right to access them. They canβt see the names of the shared files or folders at all, and users can only see the ones they have permission to view. shared documents.
3) Users are prohibited from saving files locally.
The system can implement a file saving mode similar to a diskless workstation. Users are forbidden to create, edit and save files locally. All operations can only be performed on the file server to prevent the risk of leakage caused by files stored on local disks.
4) It is forbidden for users to gain unauthorized access to shared files after local login/remote desktop.
After the user logs in locally or accesses the shared files on the server through the remote desktop, it is prohibited to copy and paste them into the shared folder of their own computer, or they can be prohibited from dragging the shared files to their own computer disk through the disk mode during the remote desktop.
5) Access action black and white lists are added independently.
When a user accesses a shared file on the server, it is forbidden to open certain windows or perform certain actions to prevent the shared file from leaking and being edited. For example, it is forbidden to open the "Output" window, disable the "Print" action of some software, and disable the "Add" action of the right-click menu.
6) Remote user verification function.
In order to prevent some users with advanced permissions from leaving the computer midway when accessing shared files, and others use this computer to operate shared files, or delete, or copy, etc., the system has a remote user verification function, that is, every time a shared file is opened You need to enter an account and password to strengthen the protection of shared files.
7) Intelligent disaster recovery backup.
Dashizhi shared file management system can set automatic backup before deletion, and selectively restore a certain shared file as needed to prevent users from deliberately or unintentionally deleting shared files, causing important data loss and unrecoverable.
8) Binding authentication.
IP, MAC, user name, and machine name are four-fold bound. If you modify any of them, you will not be able to access shared files. Prevent users from modifying IP, MAC or logging in with other people's accounts to access shared files. At the same time, it can also restrict external computers or unauthorized computers from accessing shared files.
enjoyβ€οΈππ»
written
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to prohibit downloading server sharing files at will, prohibit β sharing files:
shared file management system also has some special functions, such as:
1) Shared file access permission program management.
When a user accesses a shared file on the server, he sets a list of applications that he is allowed to use. Programs that are not in the list cannot be opened to prevent the shared file from leaking. For example, you can disable QQ to send files, disable email to send files, and prohibit opening or editing shared files through special software.
2) It can be hidden if there is no right to visit.
All or part of the shared files (folders) on the local area network server can be hidden for some users who do not have the right to access them. They canβt see the names of the shared files or folders at all, and users can only see the ones they have permission to view. shared documents.
3) Users are prohibited from saving files locally.
The system can implement a file saving mode similar to a diskless workstation. Users are forbidden to create, edit and save files locally. All operations can only be performed on the file server to prevent the risk of leakage caused by files stored on local disks.
4) It is forbidden for users to gain unauthorized access to shared files after local login/remote desktop.
After the user logs in locally or accesses the shared files on the server through the remote desktop, it is prohibited to copy and paste them into the shared folder of their own computer, or they can be prohibited from dragging the shared files to their own computer disk through the disk mode during the remote desktop.
5) Access action black and white lists are added independently.
When a user accesses a shared file on the server, it is forbidden to open certain windows or perform certain actions to prevent the shared file from leaking and being edited. For example, it is forbidden to open the "Output" window, disable the "Print" action of some software, and disable the "Add" action of the right-click menu.
6) Remote user verification function.
In order to prevent some users with advanced permissions from leaving the computer midway when accessing shared files, and others use this computer to operate shared files, or delete, or copy, etc., the system has a remote user verification function, that is, every time a shared file is opened You need to enter an account and password to strengthen the protection of shared files.
7) Intelligent disaster recovery backup.
Dashizhi shared file management system can set automatic backup before deletion, and selectively restore a certain shared file as needed to prevent users from deliberately or unintentionally deleting shared files, causing important data loss and unrecoverable.
8) Binding authentication.
IP, MAC, user name, and machine name are four-fold bound. If you modify any of them, you will not be able to access shared files. Prevent users from modifying IP, MAC or logging in with other people's accounts to access shared files. At the same time, it can also restrict external computers or unauthorized computers from accessing shared files.
enjoyβ€οΈππ»
written
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from Backup Legal Mega
π¦Google Container Engine new
β830.72 MBβ
https://mega.nz/folder/LRtFGaDC#-H7OweypGx-8JkCWjZ_ALg
β830.72 MBβ
https://mega.nz/folder/LRtFGaDC#-H7OweypGx-8JkCWjZ_ALg
mega.nz
830.72 MB folder on MEGA
26 files and 8 subfolders