β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦UTILITIES/TOOLS & CHECKERS & tutorials 2020 :
| Utility/TOOLBOX | CyberChef | The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis | !
(https://img.shields.io/github/stars/gchq/CyberChef) | !(https://img.shields.io/github/languages/top/gchq/CyberChef) |
| Utility/URL | anew | A tool for adding new lines to files, skipping duplicates | !(https://img.shields.io/github/stars/tomnomnom/anew) | !(https://img.shields.io/github/languages/top/tomnomnom/anew) |
| Utility/URL | burl
| A Broken-URL Checker | !(https://img.shields.io/github/stars/tomnomnom/burl) | !(https://img.shields.io/github/languages/top/tomnomnom/burl) |
| Utility/URL | cf-check | Cloudflare Checker written in Go | !(https://img.shields.io/github/stars/dwisiswant0/cf-check) | !(https://img.shields.io/github/languages/top/dwisiswant0/cf-check) |
| Utility/URL | gau | Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl. | !(https://img.shields.io/github/stars/lc/gau) | !(https://img.shields.io/github/languages/top/lc/gau) |
| Utility/URL | hacks | remove bad urls | !(https://img.shields.io/github/stars/tomnomnom/hacks/tree/master/anti-burl) | !(https://img.shields.io/github/languages/top/tomnomnom/hacks/tree/master/anti-burl) |
| Utility/URL | qsreplace | Accept URLs on stdin, replace all query string values with a user-supplied value | !(https://img.shields.io/github/stars/tomnomnom/qsreplace) | !(https://img.shields.io/github/languages/top/tomnomnom/qsreplace) |
| Utility/URL | unfurl | Pull out bits of URLs provided on stdin | !(https://img.shields.io/github/stars/tomnomnom/unfurl) | !(https://img.shields.io/github/languages/top/tomnomnom/unfurl) |
| Utility/URL | urlprobe | Urls status code & content length checker | !(https://img.shields.io/github/stars/1ndianl33t/urlprobe) | !(https://img.shields.io/github/languages/top/1ndianl33t/urlprobe) |
| Utility/VULN | Gopherus | This tool generates gopher link for exploiting SSRF and gaining RCE in various servers | !(https://img.shields.io/github/stars/tarunkant/Gopherus) | !(https://img.shields.io/github/languages/top/tarunkant/Gopherus) |
| Utility/VULN | hinject | Host Header Injection Checker | !(https://img.shields.io/github/stars/dwisiswant0/hinject) | !(https://img.shields.io/github/languages/top/dwisiswant0/hinject) |
| Utility/VULN | oxml_xxe | A tool for embedding XXE/XML exploits into different filetypes | !(https://img.shields.io/github/stars/BuffaloWill/oxmlxxe) |  |
| Utility/VULN | pentest-tools | Custom pentesting tools |
E N J O Y β€οΈππ»
use for learn
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦UTILITIES/TOOLS & CHECKERS & tutorials 2020 :
| Utility/TOOLBOX | CyberChef | The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis | !
(https://img.shields.io/github/stars/gchq/CyberChef) | !(https://img.shields.io/github/languages/top/gchq/CyberChef) |
| Utility/URL | anew | A tool for adding new lines to files, skipping duplicates | !(https://img.shields.io/github/stars/tomnomnom/anew) | !(https://img.shields.io/github/languages/top/tomnomnom/anew) |
| Utility/URL | burl
| A Broken-URL Checker | !(https://img.shields.io/github/stars/tomnomnom/burl) | !(https://img.shields.io/github/languages/top/tomnomnom/burl) |
| Utility/URL | cf-check | Cloudflare Checker written in Go | !(https://img.shields.io/github/stars/dwisiswant0/cf-check) | !(https://img.shields.io/github/languages/top/dwisiswant0/cf-check) |
| Utility/URL | gau | Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl. | !(https://img.shields.io/github/stars/lc/gau) | !(https://img.shields.io/github/languages/top/lc/gau) |
| Utility/URL | hacks | remove bad urls | !(https://img.shields.io/github/stars/tomnomnom/hacks/tree/master/anti-burl) | !(https://img.shields.io/github/languages/top/tomnomnom/hacks/tree/master/anti-burl) |
| Utility/URL | qsreplace | Accept URLs on stdin, replace all query string values with a user-supplied value | !(https://img.shields.io/github/stars/tomnomnom/qsreplace) | !(https://img.shields.io/github/languages/top/tomnomnom/qsreplace) |
| Utility/URL | unfurl | Pull out bits of URLs provided on stdin | !(https://img.shields.io/github/stars/tomnomnom/unfurl) | !(https://img.shields.io/github/languages/top/tomnomnom/unfurl) |
| Utility/URL | urlprobe | Urls status code & content length checker | !(https://img.shields.io/github/stars/1ndianl33t/urlprobe) | !(https://img.shields.io/github/languages/top/1ndianl33t/urlprobe) |
| Utility/VULN | Gopherus | This tool generates gopher link for exploiting SSRF and gaining RCE in various servers | !(https://img.shields.io/github/stars/tarunkant/Gopherus) | !(https://img.shields.io/github/languages/top/tarunkant/Gopherus) |
| Utility/VULN | hinject | Host Header Injection Checker | !(https://img.shields.io/github/stars/dwisiswant0/hinject) | !(https://img.shields.io/github/languages/top/dwisiswant0/hinject) |
| Utility/VULN | oxml_xxe | A tool for embedding XXE/XML exploits into different filetypes | !(https://img.shields.io/github/stars/BuffaloWill/oxmlxxe) |  |
| Utility/VULN | pentest-tools | Custom pentesting tools |
E N J O Y β€οΈππ»
use for learn
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - gchq/CyberChef: The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis - gchq/CyberChef
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BEST WEB SCANNERS :
| Scanner/LFI | dotdotpwn | DotDotPwn - The Directory Traversal Fuzzer | !(https://img.shields.io/github/stars/wireghoul/dotdotpwn)
| !(https://img.shields.io/github/languages/top/wireghoul/dotdotpwn) |
| Scanner/NOSQL | NoSQLMap | Automated NoSQL database enumeration and web application exploitation tool. | !(https://img.shields.io/github/stars/codingo/NoSQLMap) | !(https://img.shields.io/github/languages/top/codingo/NoSQLMap) |
| Scanner/RECON | Osmedeus | Fully automated offensive security framework for reconnaissance and vulnerability scanning | !(https://img.shields.io/github/stars/j3ssie/Osmedeus) | !(https://img.shields.io/github/languages/top/j3ssie/Osmedeus) |
| Scanner/RECON | Sn1per | Automated pentest framework for offensive security experts | !(https://img.shields.io/github/stars/1N3/Sn1per) | !(https://img.shields.io/github/languages/top/1N3/Sn1per) |
| Scanner/RECON | megplus | Automated reconnaissance wrapper Γ’β¬β TomNomNom's meg on steroids. DEPRECATED | !(https://img.shields.io/github/stars/EdOverflow/megplus) | !(https://img.shields.io/github/languages/top/EdOverflow/megplus) |
| Scanner/S3 | S3Scanner | Scan for open AWS S3 buckets and dump the contents | !(https://img.shields.io/github/stars/sa7mon/S3Scanner) | !(https://img.shields.io/github/languages/top/sa7mon/S3Scanner) |
| Scanner/SMUGGLE | smuggler | Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3 | !(https://img.shields.io/github/stars/defparam/smuggler) | !(https://img.shields.io/github/languages/top/defparam/smuggler) |
| Scanner/SQL | SQLNinja | SQL Injection scanner|!(https://img.shields.io/static/v1?label=&message=it%27s%20not%20github&color=gray) | !(https://img.shields.io/static/v1?label=&message=it%27s%20not%20github&color=gray)|
| Scanner/SQL | sqlmap | Automatic SQL injection and database takeover tool | !(https://img.shields.io/github/stars/sqlmapproject/sqlmap) | !(
| Scanner/SSL | a2sv | Auto Scanning to SSL Vulnerability | !(https://img.shields.io/github/stars/hahwul/a2sv) | !(https://img.shields.io/github/languages/top/hahwul/a2sv) |
| Scanner/SSL | testssl.sh | Testing TLS/SSL encryption anywhere on any port | !(https://img.shields.io/github/stars/drwetter/testssl.sh) | !(https://img.shields.io/github/languages/top/drwetter/testssl.sh) |
| Scanner/SSRF | SSRFmap | Automatic SSRF fuzzer and exploitation tool | !(https://img.shields.io/github/stars/swisskyrepo/SSRFmap) | !(https://img.shields.io/github/languages/top/swisskyrepo/SSRFmap) |
| Scanner/SSRF | ssrf-sheriff | A simple SSRF-testing sheriff written in Go | !(https://img.shields.io/github/stars/teknogeek/ssrf-sheriff) | !(https://img.shields.io/github/languages/top/teknogeek/ssrf-sheriff) |
E N J O Y β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BEST WEB SCANNERS :
| Scanner/LFI | dotdotpwn | DotDotPwn - The Directory Traversal Fuzzer | !(https://img.shields.io/github/stars/wireghoul/dotdotpwn)
| !(https://img.shields.io/github/languages/top/wireghoul/dotdotpwn) |
| Scanner/NOSQL | NoSQLMap | Automated NoSQL database enumeration and web application exploitation tool. | !(https://img.shields.io/github/stars/codingo/NoSQLMap) | !(https://img.shields.io/github/languages/top/codingo/NoSQLMap) |
| Scanner/RECON | Osmedeus | Fully automated offensive security framework for reconnaissance and vulnerability scanning | !(https://img.shields.io/github/stars/j3ssie/Osmedeus) | !(https://img.shields.io/github/languages/top/j3ssie/Osmedeus) |
| Scanner/RECON | Sn1per | Automated pentest framework for offensive security experts | !(https://img.shields.io/github/stars/1N3/Sn1per) | !(https://img.shields.io/github/languages/top/1N3/Sn1per) |
| Scanner/RECON | megplus | Automated reconnaissance wrapper Γ’β¬β TomNomNom's meg on steroids. DEPRECATED | !(https://img.shields.io/github/stars/EdOverflow/megplus) | !(https://img.shields.io/github/languages/top/EdOverflow/megplus) |
| Scanner/S3 | S3Scanner | Scan for open AWS S3 buckets and dump the contents | !(https://img.shields.io/github/stars/sa7mon/S3Scanner) | !(https://img.shields.io/github/languages/top/sa7mon/S3Scanner) |
| Scanner/SMUGGLE | smuggler | Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3 | !(https://img.shields.io/github/stars/defparam/smuggler) | !(https://img.shields.io/github/languages/top/defparam/smuggler) |
| Scanner/SQL | SQLNinja | SQL Injection scanner|!(https://img.shields.io/static/v1?label=&message=it%27s%20not%20github&color=gray) | !(https://img.shields.io/static/v1?label=&message=it%27s%20not%20github&color=gray)|
| Scanner/SQL | sqlmap | Automatic SQL injection and database takeover tool | !(https://img.shields.io/github/stars/sqlmapproject/sqlmap) | !(
| Scanner/SSL | a2sv | Auto Scanning to SSL Vulnerability | !(https://img.shields.io/github/stars/hahwul/a2sv) | !(https://img.shields.io/github/languages/top/hahwul/a2sv) |
| Scanner/SSL | testssl.sh | Testing TLS/SSL encryption anywhere on any port | !(https://img.shields.io/github/stars/drwetter/testssl.sh) | !(https://img.shields.io/github/languages/top/drwetter/testssl.sh) |
| Scanner/SSRF | SSRFmap | Automatic SSRF fuzzer and exploitation tool | !(https://img.shields.io/github/stars/swisskyrepo/SSRFmap) | !(https://img.shields.io/github/languages/top/swisskyrepo/SSRFmap) |
| Scanner/SSRF | ssrf-sheriff | A simple SSRF-testing sheriff written in Go | !(https://img.shields.io/github/stars/teknogeek/ssrf-sheriff) | !(https://img.shields.io/github/languages/top/teknogeek/ssrf-sheriff) |
E N J O Y β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - wireghoul/dotdotpwn: DotDotPwn - The Directory Traversal Fuzzer
DotDotPwn - The Directory Traversal Fuzzer. Contribute to wireghoul/dotdotpwn development by creating an account on GitHub.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Getting a 500 Internal Server Error on Laravel 5+ Ubuntu :
#requested :
1) This is my first version of Laravel on Ubuntu, and I'm still running into 500 glitches, problems. I've done it on Windows OS several times before, and never had a problem.
2) This 500 internal server normally happens while the application "mod rewrite" is not turned on.
3) On Ubuntu, I have installed rewritemod but itβs also not working. Iβve given access to all my folders and files inside i.e.
/var/www/html/laravelproject
Still it doesnβt work. Changed .htaccess as well from original to this.
π¦Solution
It is not your .htaccess. The problem was simply in folder permissions. Windows is a bit more flexible when it comes to permissions. With Ubuntu, and Linux in general you have to be a bit more careful and explicit.
Run the following commands through terminal.
1οΈβ£sudo chmod -R 755 laravelblog
and then type below to allow Laravel to write file to storage folder
2οΈβ£chmod -R o+w laravelblog/storage
These two commands will solve the problem :)
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Getting a 500 Internal Server Error on Laravel 5+ Ubuntu :
#requested :
1) This is my first version of Laravel on Ubuntu, and I'm still running into 500 glitches, problems. I've done it on Windows OS several times before, and never had a problem.
2) This 500 internal server normally happens while the application "mod rewrite" is not turned on.
3) On Ubuntu, I have installed rewritemod but itβs also not working. Iβve given access to all my folders and files inside i.e.
/var/www/html/laravelproject
Still it doesnβt work. Changed .htaccess as well from original to this.
RewriteEngine On4) Generally, I have all the extensions needed for Laravel 5+ as well. Anything that I might have missed?
RewriteCond %{REQUEST_FILENAME} !-d
RewriteCond %{REQUEST_FILENAME} !-f
RewriteRule ^ index.php [L]
π¦Solution
It is not your .htaccess. The problem was simply in folder permissions. Windows is a bit more flexible when it comes to permissions. With Ubuntu, and Linux in general you have to be a bit more careful and explicit.
Run the following commands through terminal.
1οΈβ£sudo chmod -R 755 laravelblog
and then type below to allow Laravel to write file to storage folder
2οΈβ£chmod -R o+w laravelblog/storage
These two commands will solve the problem :)
β β β Uππ»βΊπ«Δπ¬πβ β β β
Defining an Enterprise Penetration Test.pdf
3.4 MB
Defining an Enterprise Penetration Test
for beginers
for beginers
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BEST 2020 ANDROID REMOTE DESKTOP APPS :
https://play.google.com/store/apps/details?id=com.anydesk.anydeskandroid
https://play.google.com/store/apps/details?id=com.google.chromeremotedesktop
https://play.google.com/store/apps/details?id=com.teamviewer.teamviewer.market.mobile
https://play.google.com/store/apps/details?id=com.microsoft.rdc.androidx
https://play.google.com/store/apps/details?id=com.sand.airdroid
https://play.google.com/store/apps/details?id=com.realvnc.viewer.android
E N J O Y β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BEST 2020 ANDROID REMOTE DESKTOP APPS :
https://play.google.com/store/apps/details?id=com.anydesk.anydeskandroid
https://play.google.com/store/apps/details?id=com.google.chromeremotedesktop
https://play.google.com/store/apps/details?id=com.teamviewer.teamviewer.market.mobile
https://play.google.com/store/apps/details?id=com.microsoft.rdc.androidx
https://play.google.com/store/apps/details?id=com.sand.airdroid
https://play.google.com/store/apps/details?id=com.realvnc.viewer.android
E N J O Y β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
Google Play
AnyDesk Remote Desktop - Apps on Google Play
Remote access from anywhere. Fast and secure. All operating systems and devices
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 new update location tracking for beginers - Programs for finding user location
We need two programs:
11) seeker - launches a phishing site and analyzes the received data.
2) ngrok - in case you don't have a white IP address (or hosting); this program allows you to create links to your site so that the site on your local computer can be opened on the Internet. More details about this program can be found in the article " How to make a local web server accessible from the Internet without a white IP ."
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) sudo apt update
2) sudo apt install python3 python3-pip php ssh git
3) pip3 install requests
4) git clone https://github.com/thewhiteh4t/seeker
5) cd seeker /
6) python3 ./seeker.py -h
π¦Installing ngrok on Kali Linux
1) wget
3) chmod + x ./ngrok
4) ./ngrok -h
5) python3 ./seeker.py -t manual
Note: if you run into problems while trying to start the built-in PHP server, look at the contents of the ./logs/php.log file. If you find errors mentioning openbasedir there , see the article " Error" Warning: Unknown: openbasedir restriction in effect. " (RESOLVED) ".
π¦+ Select a Template :
1 NearYou
2 Google Drive
E N J O Y β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 new update location tracking for beginers - Programs for finding user location
We need two programs:
11) seeker - launches a phishing site and analyzes the received data.
2) ngrok - in case you don't have a white IP address (or hosting); this program allows you to create links to your site so that the site on your local computer can be opened on the Internet. More details about this program can be found in the article " How to make a local web server accessible from the Internet without a white IP ."
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) sudo apt update
2) sudo apt install python3 python3-pip php ssh git
3) pip3 install requests
4) git clone https://github.com/thewhiteh4t/seeker
5) cd seeker /
6) python3 ./seeker.py -h
π¦Installing ngrok on Kali Linux
1) wget
curl -s https://ngrok.com/download | grep -o -E 'https://bin.equinox.io/c/[A-Za-z0-9]{4,}/ngrok-stable-linux-amd64.zip'
2) unzip ngrok-stable-linux-amd64.zip3) chmod + x ./ngrok
4) ./ngrok -h
5) python3 ./seeker.py -t manual
Note: if you run into problems while trying to start the built-in PHP server, look at the contents of the ./logs/php.log file. If you find errors mentioning openbasedir there , see the article " Error" Warning: Unknown: openbasedir restriction in effect. " (RESOLVED) ".
π¦+ Select a Template :
1 NearYou
2 Google Drive
E N J O Y β€οΈππ»
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - thewhiteh4t/seeker: Accurately Locate Smartphones using Social Engineering
Accurately Locate Smartphones using Social Engineering - GitHub - thewhiteh4t/seeker: Accurately Locate Smartphones using Social Engineering
Forwarded from Backup Legal Mega
π¦Organizational BI with SSAS Tabular - Intermediate
https://mega.nz/folder/GoNmjSob#2wzYBkQ6sKHZQycp0OdBwA
1. Introduction and Foreword
https://mega.nz/folder/iwd0jCwB#tVYHlC-AqgE2L_6TR8S36w
2. Intermediate Data Analysis eXpressions (DAX)
https://mega.nz/folder/joEE1AIa#tLVY_haxr8x4SebLlhbY0Q
3. Intermediate Modeling in SSAS Tabular
https://mega.nz/folder/q4NAzSKL#Mx9Znz7rRUxpps7NS7CLeg
4. Time and Dates in SSAS Tabular (Part I)
https://mega.nz/folder/LtEGCIoL#MLs31ZJCL01OQPgacbnoNQ
5. Time and Dates in SSAS Tabular (Part II)
https://mega.nz/folder/D9FWCa7a#YBiPLv5d7tlsNo62DE3Adg
6. Assorted Intermediate SSAS Tabular Topics
https://mega.nz/folder/6gVyBAYY#3nJEy48-REf4BEP46Pwzig
https://mega.nz/folder/GoNmjSob#2wzYBkQ6sKHZQycp0OdBwA
1. Introduction and Foreword
https://mega.nz/folder/iwd0jCwB#tVYHlC-AqgE2L_6TR8S36w
2. Intermediate Data Analysis eXpressions (DAX)
https://mega.nz/folder/joEE1AIa#tLVY_haxr8x4SebLlhbY0Q
3. Intermediate Modeling in SSAS Tabular
https://mega.nz/folder/q4NAzSKL#Mx9Znz7rRUxpps7NS7CLeg
4. Time and Dates in SSAS Tabular (Part I)
https://mega.nz/folder/LtEGCIoL#MLs31ZJCL01OQPgacbnoNQ
5. Time and Dates in SSAS Tabular (Part II)
https://mega.nz/folder/D9FWCa7a#YBiPLv5d7tlsNo62DE3Adg
6. Assorted Intermediate SSAS Tabular Topics
https://mega.nz/folder/6gVyBAYY#3nJEy48-REf4BEP46Pwzig
mega.nz
735.01 MB folder on MEGA
92 files and 6 subfolders
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HACK CCTV 2020 USING LINUX OR TERMUX :
#Reposted
1) pkg install git python -y
2) git clone https://github.com/AngelSecurityTeam/Cam-Hackers
3) cd Cam-Hackers
4) pip3 install requests
5) python3 cam-hackers.py
6) Now Select any country You want from this list and press Enter.for example : You can type 1 and press enter to select USA.
7) Now you will see a list of URLs, just copy anyone URL from the list.
8) Paste URL into a Chrome Tab on Google and you'll be able to see a Camera Control feature as well as use it from the phone.
9) When you see Login Window and query for Username and Password then you should use the most popular Default Username and Passwords, provided Combinations.
Username: admin password: administrator
Username: admin password: (Password blank)
10) When you are still unable to sign in, you can search the camera business name to find the default username and password for that service.
enjoy β€οΈππ»
@undercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HACK CCTV 2020 USING LINUX OR TERMUX :
#Reposted
1) pkg install git python -y
2) git clone https://github.com/AngelSecurityTeam/Cam-Hackers
3) cd Cam-Hackers
4) pip3 install requests
5) python3 cam-hackers.py
6) Now Select any country You want from this list and press Enter.for example : You can type 1 and press enter to select USA.
7) Now you will see a list of URLs, just copy anyone URL from the list.
8) Paste URL into a Chrome Tab on Google and you'll be able to see a Camera Control feature as well as use it from the phone.
9) When you see Login Window and query for Username and Password then you should use the most popular Default Username and Passwords, provided Combinations.
Username: admin password: administrator
Username: admin password: (Password blank)
10) When you are still unable to sign in, you can search the camera business name to find the default username and password for that service.
enjoy β€οΈππ»
@undercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from Backup Legal Mega
π¦ SQL Server - Optimizing Stored Procedure Performance
https://mega.nz/folder/btdTyIQQ#rYgH_m_95ECV0jW0jDWhXg
1. Introduction
https://mega.nz/folder/j0NVgQ5I#zQ_9t5OAqBs3cR89-1ASng
2. Why Use Stored Procedures
https://mega.nz/folder/OwdhCKbZ#06S8Edh0wLBtrwwK3qMrNg
3. Creation, Compilation, and Invalidation Section 1
https://mega.nz/folder/i9cXSCAA#vuWilCamUaNFIuSOSwrrmw
4. Creation, Compilation, and Invalidation Section 2
https://mega.nz/folder/6lUxhQzb#R14mINK4K2IVvMyYQSwkHw
5. Optimization and Recompilation Section 1
https://mega.nz/folder/34dzDIxT#s2TqrJ5_5P7hKQPFoZ67Pg
6. Optimization and Recompilation Section 2
https://mega.nz/folder/flEUgQZJ#Q8UVQJiqgTAje7w_6pOL8Q
7. Optimization and Recompilation Section 3
https://mega.nz/folder/S8MSWAQC#sozppTU3_vs2H3Ga843UqQ
8. Optimization and Recompilation Section 4
https://mega.nz/folder/2hFXHAzK#I-IRUC_v-m8hz8mH0XIUXA
9. Other Concerns and Considerations
https://mega.nz/folder/H4NRgILD#aRpF3JIhohzml-Xy_f21Og
enjoy β€οΈππ»
https://mega.nz/folder/btdTyIQQ#rYgH_m_95ECV0jW0jDWhXg
1. Introduction
https://mega.nz/folder/j0NVgQ5I#zQ_9t5OAqBs3cR89-1ASng
2. Why Use Stored Procedures
https://mega.nz/folder/OwdhCKbZ#06S8Edh0wLBtrwwK3qMrNg
3. Creation, Compilation, and Invalidation Section 1
https://mega.nz/folder/i9cXSCAA#vuWilCamUaNFIuSOSwrrmw
4. Creation, Compilation, and Invalidation Section 2
https://mega.nz/folder/6lUxhQzb#R14mINK4K2IVvMyYQSwkHw
5. Optimization and Recompilation Section 1
https://mega.nz/folder/34dzDIxT#s2TqrJ5_5P7hKQPFoZ67Pg
6. Optimization and Recompilation Section 2
https://mega.nz/folder/flEUgQZJ#Q8UVQJiqgTAje7w_6pOL8Q
7. Optimization and Recompilation Section 3
https://mega.nz/folder/S8MSWAQC#sozppTU3_vs2H3Ga843UqQ
8. Optimization and Recompilation Section 4
https://mega.nz/folder/2hFXHAzK#I-IRUC_v-m8hz8mH0XIUXA
9. Other Concerns and Considerations
https://mega.nz/folder/H4NRgILD#aRpF3JIhohzml-Xy_f21Og
enjoy β€οΈππ»
mega.nz
1.69 GB folder on MEGA
95 files and 9 subfolders