β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Amazon Alexa vulnerability: may expose user personal information and voice history :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/esmog/nodexp.git
2) cd nodexp
3) To get a list of all options run:
python2.7 nodexp -h
4) Setting up and Use Testbeds
In order get familiar with NodeXP you might need to set the Node.js testing services provided (/testbeds) and start using the tool. A local machine running Node.js server will be necessary.
5) Firstly, you should install 'body-parser' and 'express' packages, in the GET and POST directories.
6) Go to 'testbeds/GET' directory on your local machine and paste the command below in terminal:
npm install express --save
7) Go to 'testbeds/POST' directory and paste the commands below in terminal:
npm install body-parser --save
nmp install express --save
8) After the correct installment of the packages you could run each service by running the command 'node' and the desirable js file (ex. node eval.js).
9) After you server is up and running, you are ready to run NodeXP and test it upon those services!
π¦Example for GET case shown below:
> python2.7 nodexp.py --url=http://localiprunningnodejsserver:3001/?name=[INJECT_HERE]
Example for POST case shown below:
> python2.7 nodexp.py --url=http://localiprunningnodejsserver:3001/post.js --pdata=username=[INJECT_HERE]
E N J O Y β€οΈππ»
written @undercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Amazon Alexa vulnerability: may expose user personal information and voice history :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/esmog/nodexp.git
2) cd nodexp
3) To get a list of all options run:
python2.7 nodexp -h
4) Setting up and Use Testbeds
In order get familiar with NodeXP you might need to set the Node.js testing services provided (/testbeds) and start using the tool. A local machine running Node.js server will be necessary.
5) Firstly, you should install 'body-parser' and 'express' packages, in the GET and POST directories.
6) Go to 'testbeds/GET' directory on your local machine and paste the command below in terminal:
npm install express --save
7) Go to 'testbeds/POST' directory and paste the commands below in terminal:
npm install body-parser --save
nmp install express --save
8) After the correct installment of the packages you could run each service by running the command 'node' and the desirable js file (ex. node eval.js).
9) After you server is up and running, you are ready to run NodeXP and test it upon those services!
π¦Example for GET case shown below:
> python2.7 nodexp.py --url=http://localiprunningnodejsserver:3001/?name=[INJECT_HERE]
Example for POST case shown below:
> python2.7 nodexp.py --url=http://localiprunningnodejsserver:3001/post.js --pdata=username=[INJECT_HERE]
E N J O Y β€οΈππ»
written @undercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - esmog/nodexp: NodeXP - A Server Side Javascript Injection tool capable of detecting and exploiting Node.js vulnerabilities
NodeXP - A Server Side Javascript Injection tool capable of detecting and exploiting Node.js vulnerabilities - GitHub - esmog/nodexp: NodeXP - A Server Side Javascript Injection tool capable of det...
Forwarded from Backup Legal Mega
π¦ Cyber Security Awareness - Social Engineering
https://mega.nz/folder/Tg8lxa4Z#IjDlgYKDXXAluZrB1napdQ
1. Introduction
https://mega.nz/folder/Ts8xQYTY#lk4g0uyFXvWYTQZfsxGM_g
2. Getting Started
https://mega.nz/folder/Tx1zWS4S#l4mkiUlE-9-EWLSrbcuKaA
3. Tactics
https://mega.nz/folder/G0sX2QBD#tYoqQkqxGiAx_kbgC1LMWA
4. Best Practices
https://mega.nz/folder/Cx0DzIiR#WzsO0O-IUIhLtt5Lk2JftA
https://mega.nz/folder/Tg8lxa4Z#IjDlgYKDXXAluZrB1napdQ
1. Introduction
https://mega.nz/folder/Ts8xQYTY#lk4g0uyFXvWYTQZfsxGM_g
2. Getting Started
https://mega.nz/folder/Tx1zWS4S#l4mkiUlE-9-EWLSrbcuKaA
3. Tactics
https://mega.nz/folder/G0sX2QBD#tYoqQkqxGiAx_kbgC1LMWA
4. Best Practices
https://mega.nz/folder/Cx0DzIiR#WzsO0O-IUIhLtt5Lk2JftA
mega.nz
112.74 MB folder on MEGA
16 files and 4 subfolders
Forwarded from UNDERCODE COMMUNITY
Ghidra_Collaborative_Reversing_1_2_β_How_to_setup_a_Ghidra_server.pdf
2.3 MB
if you have a problem in using the, NSAπ awesome tool, this will teach you :)
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦YouTube bans videos containing hacker information, fearing that it may interfere with the US election :
#news
-As the Democrats and Republicans prepare to hold the National Convention starting next week, YouTube announced on Thursday that it will update its policies on deceptive videos and other content aimed at disrupting the election. The worldβs largest video platform with more than 2 billion users per month will ban videos containing hacked videos that may interfere with elections or the census. This will include materials like campaign emails obtained by hackers with details about candidates.
> After the update, Google, which owns YouTube, announced similar rules earlier this month to prohibit ads containing hacker information. Google will begin to implement this policy on September 1. YouTube also said it will remove videos that encourage people to interfere in voting and other democratic processes. For example, videos that tell people to line up at a polling place to stifle voting will not be allowed.
> The new policy was introduced before the Democratic National Convention, which began on Monday, followed by Republican events later this month. These conventions marked the beginning of the US presidential election season. As the election climaxed and former Vice President Joe Biden appointed California Senator Kamala Harris as his running mate earlier this week, Silicon Valley companies have been eager to prove that they can avoid the traps they encountered in 2016. That election was interfered by Russia, which used the platforms of Google, Facebook and Twitter to try to influence the election results.
Earlier this week, several large technology companies including Google, Facebook, Twitter, Reddit and Microsoft announced the formation of an alliance to work with US government agencies to protect the integrity of the election. YouTube said that it will broadcast the two conferences live, in order to curb the spread of the coronavirus, the broadcast of the two conferences will be conducted in a virtual way. The video platform also said that when people search for president and federal candidates on YouTube, it will add new information panels. These panels will include the personβs name, party affiliation, and a link to the candidateβs official video channel.
#news
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦YouTube bans videos containing hacker information, fearing that it may interfere with the US election :
#news
-As the Democrats and Republicans prepare to hold the National Convention starting next week, YouTube announced on Thursday that it will update its policies on deceptive videos and other content aimed at disrupting the election. The worldβs largest video platform with more than 2 billion users per month will ban videos containing hacked videos that may interfere with elections or the census. This will include materials like campaign emails obtained by hackers with details about candidates.
> After the update, Google, which owns YouTube, announced similar rules earlier this month to prohibit ads containing hacker information. Google will begin to implement this policy on September 1. YouTube also said it will remove videos that encourage people to interfere in voting and other democratic processes. For example, videos that tell people to line up at a polling place to stifle voting will not be allowed.
> The new policy was introduced before the Democratic National Convention, which began on Monday, followed by Republican events later this month. These conventions marked the beginning of the US presidential election season. As the election climaxed and former Vice President Joe Biden appointed California Senator Kamala Harris as his running mate earlier this week, Silicon Valley companies have been eager to prove that they can avoid the traps they encountered in 2016. That election was interfered by Russia, which used the platforms of Google, Facebook and Twitter to try to influence the election results.
Earlier this week, several large technology companies including Google, Facebook, Twitter, Reddit and Microsoft announced the formation of an alliance to work with US government agencies to protect the integrity of the election. YouTube said that it will broadcast the two conferences live, in order to curb the spread of the coronavirus, the broadcast of the two conferences will be conducted in a virtual way. The video platform also said that when people search for president and federal candidates on YouTube, it will add new information panels. These panels will include the personβs name, party affiliation, and a link to the candidateβs official video channel.
#news
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ Netflix GiftCard Methodβ
1) Go to : https://www.randomcodegenerator.com/en/generate-codes
2) Click Generate Using Pattern
3) Put this Pattern : LEQ9X999999
4) Untick the Exclude Characters Box
5) Generate Some Codes You can generate in the site [ but max is 1k ] , Or export to .txt File
6)choose the netflix checker :
https://t.me/UnderCodeTesting/9401
E N J O Y β€οΈππ»
(not by us)
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ Netflix GiftCard Methodβ
1) Go to : https://www.randomcodegenerator.com/en/generate-codes
2) Click Generate Using Pattern
3) Put this Pattern : LEQ9X999999
4) Untick the Exclude Characters Box
5) Generate Some Codes You can generate in the site [ but max is 1k ] , Or export to .txt File
6)choose the netflix checker :
https://t.me/UnderCodeTesting/9401
E N J O Y β€οΈππ»
(not by us)
β β β Uππ»βΊπ«Δπ¬πβ β β β
RandomCodeGenerator
Random code examples
Examples of different types of unique random codes What kind of random are needed, can and often will be different for each client and/or project. Some clients need random serial codes, where others might need strong passwords or pronounceable codes. Toβ¦
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦WEB VULNERABILITIES SCANN & ANALYSE FREE CODES :
https://github.com/neuroo/grabber
https://subgraph.com/vega/
https://github.com/zaproxy/zaproxy
http://wapiti.sourceforge.net/
http://w3af.org/
https://www.owasp.org/index.php/Category:OWASP_WebScarab_Project
http://code.google.com/p/skipfish/
https://github.com/sqlmapproject/sqlmap
http://sourceforge.net/projects/grendel/
http://code.google.com/p/wfuzz/
http://xss.codeplex.com/
http://www.arachni-scanner.com/
E N J O Y β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦WEB VULNERABILITIES SCANN & ANALYSE FREE CODES :
https://github.com/neuroo/grabber
https://subgraph.com/vega/
https://github.com/zaproxy/zaproxy
http://wapiti.sourceforge.net/
http://w3af.org/
https://www.owasp.org/index.php/Category:OWASP_WebScarab_Project
http://code.google.com/p/skipfish/
https://github.com/sqlmapproject/sqlmap
http://sourceforge.net/projects/grendel/
http://code.google.com/p/wfuzz/
http://xss.codeplex.com/
http://www.arachni-scanner.com/
E N J O Y β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - neuroo/grabber: [DON'T USE ME] plain ol' web apps scanner
[DON'T USE ME] plain ol' web apps scanner. Contribute to neuroo/grabber development by creating an account on GitHub.
sniff-paste_ Pastebin OSINT Harvester.pdf
120 KB
-Database Structure
-sniο¬_paste
-root db pastes
- stores paste with full text, date, link, title, and language emails
-stores emails with extension to paste links
-stores urls with extension to paste ip -stores ip with connectivity and extension to paste phones
-stores phone numbers with extension to paste secrets
-stores secret type with extension to paste
-sniο¬_paste
-root db pastes
- stores paste with full text, date, link, title, and language emails
-stores emails with extension to paste links
-stores urls with extension to paste ip -stores ip with connectivity and extension to paste phones
-stores phone numbers with extension to paste secrets
-stores secret type with extension to paste
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Creating a Helpers File :
#protips
1) Problem
You have common functions you want available for every request.
But you donβt want to dirty up app\start\global.php with a bunch of functions.
2) Solution
Create a helpers.php file.
> First create the file app/helpers.php.
<?php
// My common functions
function somethingOrOther()
{
return (mtrand(1,2) == 1) ? 'something' : 'other';
}
?>
π¦ Then either load it at the bottom of app\start\global.php as follows :
// at the bottom of the file
require apppath().'/helpers.php';
Or change your composer.json file and dump the autoloader.
{
"autoload": {
"files":
"app/helpers.php"
}
}
3) $ composer dump-auto
4) some suggestions.
>app/helpers.php β For general purpose functions.
>app/composers.php β To initialize all your View composers in one place.
>app/listeners.php β To set up all your event listeners in one place.
>app/observers.php β Or, if you like observers better than listeners use this filename for event listeners.
> Itβs really up to you and the demands of your application
#protips
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Creating a Helpers File :
#protips
1) Problem
You have common functions you want available for every request.
But you donβt want to dirty up app\start\global.php with a bunch of functions.
2) Solution
Create a helpers.php file.
> First create the file app/helpers.php.
<?php
// My common functions
function somethingOrOther()
{
return (mtrand(1,2) == 1) ? 'something' : 'other';
}
?>
π¦ Then either load it at the bottom of app\start\global.php as follows :
// at the bottom of the file
require apppath().'/helpers.php';
Or change your composer.json file and dump the autoloader.
{
"autoload": {
"files":
"app/helpers.php"
}
}
3) $ composer dump-auto
4) some suggestions.
>app/helpers.php β For general purpose functions.
>app/composers.php β To initialize all your View composers in one place.
>app/listeners.php β To set up all your event listeners in one place.
>app/observers.php β Or, if you like observers better than listeners use this filename for event listeners.
> Itβs really up to you and the demands of your application
#protips
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ Advanced search in search engines, enables analysis provided to exploit GET / POST capturing emails & urls, with an internal custom validation junction for each target / url found..->
R E Q U I R E M E N T S :
1) sudo apt-get install php5-curl
2) INSTALLING LIB CLI: sudo apt-get install php5-cli
3) INSTALLING PROXY TOR https://www.torproject.org/docs/debian.html.en
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/googleinurl/SCANNER-INURLBR.git
2) cd SCANNER-INURLBR
3) $chmod +x inurlbr.php
4) Executar: ./inurlbr.php
5) to get a list of basic options and switches use:
php inurlbr.php -h
6) To get a list of all options and switches use:
php inurlbr.php --help
E N J O Y β€οΈππ»
U S E F O R L E A R N
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ Advanced search in search engines, enables analysis provided to exploit GET / POST capturing emails & urls, with an internal custom validation junction for each target / url found..->
R E Q U I R E M E N T S :
1) sudo apt-get install php5-curl
2) INSTALLING LIB CLI: sudo apt-get install php5-cli
3) INSTALLING PROXY TOR https://www.torproject.org/docs/debian.html.en
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/googleinurl/SCANNER-INURLBR.git
2) cd SCANNER-INURLBR
3) $chmod +x inurlbr.php
4) Executar: ./inurlbr.php
5) to get a list of basic options and switches use:
php inurlbr.php -h
6) To get a list of all options and switches use:
php inurlbr.php --help
E N J O Y β€οΈππ»
U S E F O R L E A R N
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SIMCARD CLONING TOOLS :
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SIMCARD CLONING TOOLS :
http://mister-sim.software.informer.com/βMUCH MORE SIM CARD CLONING TOOLS BUT THOSE VERIFIED BEST TOOLS _
> https://www.dekart.com/products/card_management/sim_explorer/
> https://www.amazon.com/Cellphone-Reader-Cloner-Writer-Backup/dp/B00ZWNGPX6/
> https://ssl-download.cnet.com/MagicSIM/3000-2094_4-10601728.html
> http://www.mobiledit.com/sim-cloning/
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦NSA and FBI jointly expose the Linux malicious program Drvorub developed in Russia
#News
> The US National Security Agency (NSA) and the Federal Bureau of Investigation (FBI) recently issued a press release that jointly disclosed the malicious software used by Russian military hackers in cyber espionage. In the detailed report disclosed on Thursday, hackers working for the Special Service Center of the 85th Army of the General Intelligence Service of the Russian General Staff (Unit 26165) used a malicious program called "Drovorub" to launch attacks specifically against Linux systems.
> These hackers are also known as APT28 or Fancy Bear. They invaded the Democratic National Committee in 2016 and often attacked defense, government, aerospace and other fields.
Although the alert did not contain specific details about the victims of "Drovorub", US officials said that they had issued alerts to multiple agencies this Thursday to raise awareness of hacking and vulnerabilities in the defense sector.
The National Security Agency and the FBI stated in the report: "The malware has posed a threat because Linux systems are widely used in the US national security system, the Department of Defense and the National Defense Industry Base."
#news
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦NSA and FBI jointly expose the Linux malicious program Drvorub developed in Russia
#News
> The US National Security Agency (NSA) and the Federal Bureau of Investigation (FBI) recently issued a press release that jointly disclosed the malicious software used by Russian military hackers in cyber espionage. In the detailed report disclosed on Thursday, hackers working for the Special Service Center of the 85th Army of the General Intelligence Service of the Russian General Staff (Unit 26165) used a malicious program called "Drovorub" to launch attacks specifically against Linux systems.
> These hackers are also known as APT28 or Fancy Bear. They invaded the Democratic National Committee in 2016 and often attacked defense, government, aerospace and other fields.
Although the alert did not contain specific details about the victims of "Drovorub", US officials said that they had issued alerts to multiple agencies this Thursday to raise awareness of hacking and vulnerabilities in the defense sector.
The National Security Agency and the FBI stated in the report: "The malware has posed a threat because Linux systems are widely used in the US national security system, the Department of Defense and the National Defense Industry Base."
#news
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from Backup Legal Mega
π¦ new Getting Started with Power BI
https://mega.nz/folder/3hkWUIiZ#5t9B2m0ZpWjfTedRvLq2Mw
1. Course Overview
https://mega.nz/folder/zttgEYBa#3UJOgFMwGFDMcemHAqlpeA
2. Introducing Power BI
https://mega.nz/folder/mp1whaKS#54KE32IkxVVcGJfLqPP9FQ
3. Getting Data
https://mega.nz/folder/Ks00kYrR#BzLpq3QL-FAsJst8-4wv7Q
4. Transforming Data
https://mega.nz/folder/qptylQjZ#qYGZiSBQwQ6b-w2QzpuiiQ
5. Modeling Data for Analysis
https://mega.nz/folder/Xo9kxSAA#-uP-2apxePHzPCPLfUCxBw
6. Enhancing the Data Model
https://mega.nz/folder/D81WBaaC#zRbOaawl-JHmDCy9YvZNHA
7. Visualizing Data
https://mega.nz/folder/as9kkYrZ#id2e6o2gaCflZ9ql7qfg8g
8. Refreshing Data
https://mega.nz/folder/X110CaZC#-R87IA58vNObGcS3X0ephw
https://mega.nz/folder/3hkWUIiZ#5t9B2m0ZpWjfTedRvLq2Mw
1. Course Overview
https://mega.nz/folder/zttgEYBa#3UJOgFMwGFDMcemHAqlpeA
2. Introducing Power BI
https://mega.nz/folder/mp1whaKS#54KE32IkxVVcGJfLqPP9FQ
3. Getting Data
https://mega.nz/folder/Ks00kYrR#BzLpq3QL-FAsJst8-4wv7Q
4. Transforming Data
https://mega.nz/folder/qptylQjZ#qYGZiSBQwQ6b-w2QzpuiiQ
5. Modeling Data for Analysis
https://mega.nz/folder/Xo9kxSAA#-uP-2apxePHzPCPLfUCxBw
6. Enhancing the Data Model
https://mega.nz/folder/D81WBaaC#zRbOaawl-JHmDCy9YvZNHA
7. Visualizing Data
https://mega.nz/folder/as9kkYrZ#id2e6o2gaCflZ9ql7qfg8g
8. Refreshing Data
https://mega.nz/folder/X110CaZC#-R87IA58vNObGcS3X0ephw
mega.nz
631.88 MB folder on MEGA
113 files and 8 subfolders
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦hack.chat is a minimal, distraction-free, accountless, logless, disappearing chat service which is easily deployable as your own service. The current client comes bundled with LaTeX rendering provided by KaTeX and code syntax highlighting provided by highlight.js.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) Clone the repository: git clone https://github.com/hack-chat/main.git
2) Change the directory: cd main
Install the dependencies: npm install
3) Launch: npm start
4) If you change the websocketPort option during the config setup then these changes will need to be reflected on line 60 of client.js.
R E Q U I R E M E N T S :
node.js 8.10.0 or higher
npm 5.7.1 or higher
@undercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦hack.chat is a minimal, distraction-free, accountless, logless, disappearing chat service which is easily deployable as your own service. The current client comes bundled with LaTeX rendering provided by KaTeX and code syntax highlighting provided by highlight.js.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) Clone the repository: git clone https://github.com/hack-chat/main.git
2) Change the directory: cd main
Install the dependencies: npm install
3) Launch: npm start
4) If you change the websocketPort option during the config setup then these changes will need to be reflected on line 60 of client.js.
R E Q U I R E M E N T S :
node.js 8.10.0 or higher
npm 5.7.1 or higher
@undercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - hack-chat/main: a minimal, distraction-free chat application
a minimal, distraction-free chat application. Contribute to hack-chat/main development by creating an account on GitHub.
Forwarded from UNDERCODE HACKING
What is mad-metasploit, db_autopwn.pdf
1.8 MB
What is mad-metasploit, db_autopwn
#FULL WITH PICTURES
#FULL WITH PICTURES
Forwarded from Backup Legal Mega
π¦Introduction to ABAP Objects - Concepts & Class Builder
https://mega.nz/folder/DgNmBS6S#RaQ7t0rJEUBDw5GbiMXJvQ
1. Course Overview
https://mega.nz/folder/SkdgCSSK#JD4RmcTXpjzbONxUkHN9eQ
2. Concepts & Class Builder
https://mega.nz/folder/ewNiRYST#Yb4yWctfpe5tpQiR--4Uh
3. Creating a Local Class in Your Report
https://mega.nz/folder/v5EExC4a#0G-8CwMZhVzB_5Yx6sit8Q
4. Constructor Method, Method Parameters, Adding Methods to a Class
https://mega.nz/folder/ukNUFKTb#_TZofGEpVWwDfwQwkLRNeg
5. Converting the Local Class to a Reusable Global Class
https://mega.nz/folder/H4Um0QoI#G6g42f1uC_c3zkzux7GOEA
6. Using Exceptions for Error Handling
https://mega.nz/folder/GlEAQIaa#dgQIWQF-9l0WWMypYuKs5w
7. Reusing Existing Classes with Inheritance
https://mega.nz/folder/boUCSSgK#Hl6Ys9NsMT6UsXIRR2P3Fw
8. Beyond the Basics
https://mega.nz/folder/bgEkTYBI#WmFP_arr0_3PtdT0W6cLiA
E N J O Y β€οΈππ»
https://mega.nz/folder/DgNmBS6S#RaQ7t0rJEUBDw5GbiMXJvQ
1. Course Overview
https://mega.nz/folder/SkdgCSSK#JD4RmcTXpjzbONxUkHN9eQ
2. Concepts & Class Builder
https://mega.nz/folder/ewNiRYST#Yb4yWctfpe5tpQiR--4Uh
3. Creating a Local Class in Your Report
https://mega.nz/folder/v5EExC4a#0G-8CwMZhVzB_5Yx6sit8Q
4. Constructor Method, Method Parameters, Adding Methods to a Class
https://mega.nz/folder/ukNUFKTb#_TZofGEpVWwDfwQwkLRNeg
5. Converting the Local Class to a Reusable Global Class
https://mega.nz/folder/H4Um0QoI#G6g42f1uC_c3zkzux7GOEA
6. Using Exceptions for Error Handling
https://mega.nz/folder/GlEAQIaa#dgQIWQF-9l0WWMypYuKs5w
7. Reusing Existing Classes with Inheritance
https://mega.nz/folder/boUCSSgK#Hl6Ys9NsMT6UsXIRR2P3Fw
8. Beyond the Basics
https://mega.nz/folder/bgEkTYBI#WmFP_arr0_3PtdT0W6cLiA
E N J O Y β€οΈππ»
mega.nz
254.66 MB folder on MEGA
22 files and 8 subfolders
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦TOOLS REQUIRED FOR PENTESTING IN ANY LINUX OS :
pscan examiner ht
flawfinder srm driftnet
rats nwipe binwalk
ddrescue firstaidkit-gui scalpel
gparted xmount pdfcrack
testdisk dc3dd wipe
foremost afftools safecopy
sectool-gui scanmem hfsutils
unhide sleuthkit cmospwd
examiner macchanger secuirty-menus
srm ngrep nc6
nwipe ntfs-3g mc
firstaidkit-gui ntfsprogs screen
net-snmp pcapdiff openvas-scanner
hexedit netsed rkhunter
irssi dnstop labrea
powertop sslstrip nebula
mutt bonesi tripwire
nano proxychains prelude-lml
vim-enhanced prewikka iftop
wget prelude-manager scamper
yum-utils picviz-gui iptraf-ng
mcabber telnet iperf
firstaidkit-plugin-all onenssh nethogs
vnstat dnstracer uperf
aircrack-ng chkrootkit nload
airsnort aide ntop
kismet pads trafshow
weplab cowpatty wavemon
@undercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦TOOLS REQUIRED FOR PENTESTING IN ANY LINUX OS :
pscan examiner ht
flawfinder srm driftnet
rats nwipe binwalk
ddrescue firstaidkit-gui scalpel
gparted xmount pdfcrack
testdisk dc3dd wipe
foremost afftools safecopy
sectool-gui scanmem hfsutils
unhide sleuthkit cmospwd
examiner macchanger secuirty-menus
srm ngrep nc6
nwipe ntfs-3g mc
firstaidkit-gui ntfsprogs screen
net-snmp pcapdiff openvas-scanner
hexedit netsed rkhunter
irssi dnstop labrea
powertop sslstrip nebula
mutt bonesi tripwire
nano proxychains prelude-lml
vim-enhanced prewikka iftop
wget prelude-manager scamper
yum-utils picviz-gui iptraf-ng
mcabber telnet iperf
firstaidkit-plugin-all onenssh nethogs
vnstat dnstracer uperf
aircrack-ng chkrootkit nload
airsnort aide ntop
kismet pads trafshow
weplab cowpatty wavemon
@undercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from Backup Legal Mega
π¦nordvpn premium :
kesono123@gmail.com:tatica123 | Expiration = 2020-08-11 15:37:50
keung517@gmail.com:Kk93177319* | Expiration = 2022-04-06 16:19:49
keval.smith@yahoo.com:Beverly7 | Expiration = 2021-04-07 00:13:05
kevinrocks@bellsouth.net:theking123 | Expiration = 2022-08-19 04:40:53
kfwnvg@gmail.com:2Kassandra3 | Expiration = 2020-09-25 12:38:26
kgloblek@gmail.com:Kyle3230 | Expiration = 2022-09-01 15:23:09
khalif.sabirsamuels@gmail.com:musicians | Expiration = 2021-03-26 00:55:22
kieronmacaulay@gmail.com:Mymom12345 | Expiration = 2021-01-12 01:08:34
jaymie.bush@gmail.com:Snotty88 | Expiration = 2020-08-01 01:55:11
jayshuffleburg@gmail.com:dovejenn1 | Expiration = 2020-10-04 17:47:00
JAYYAGNIK@gmail.com:10million | Expiration = 2020-10-12 00:28:11
jcadbury@hotmail.com:Chocolate69 | Expiration = 2021-01-02 06:44:05
jcarwright1990@yahoo.com:Vergilis1 | Expiration = 2021-05-18 10:55:09
jchung07@yahoo.co.uk:Goldblend1 | Expiration = 2022-02-23 12:48:22
kesono123@gmail.com:tatica123 | Expiration = 2020-08-11 15:37:50
keung517@gmail.com:Kk93177319* | Expiration = 2022-04-06 16:19:49
keval.smith@yahoo.com:Beverly7 | Expiration = 2021-04-07 00:13:05
kevinrocks@bellsouth.net:theking123 | Expiration = 2022-08-19 04:40:53
kfwnvg@gmail.com:2Kassandra3 | Expiration = 2020-09-25 12:38:26
kgloblek@gmail.com:Kyle3230 | Expiration = 2022-09-01 15:23:09
khalif.sabirsamuels@gmail.com:musicians | Expiration = 2021-03-26 00:55:22
kieronmacaulay@gmail.com:Mymom12345 | Expiration = 2021-01-12 01:08:34
jaymie.bush@gmail.com:Snotty88 | Expiration = 2020-08-01 01:55:11
jayshuffleburg@gmail.com:dovejenn1 | Expiration = 2020-10-04 17:47:00
JAYYAGNIK@gmail.com:10million | Expiration = 2020-10-12 00:28:11
jcadbury@hotmail.com:Chocolate69 | Expiration = 2021-01-02 06:44:05
jcarwright1990@yahoo.com:Vergilis1 | Expiration = 2021-05-18 10:55:09
jchung07@yahoo.co.uk:Goldblend1 | Expiration = 2022-02-23 12:48:22