β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SOME FREE/Paid RANSOMWARE DECRYPTORS :
http://media.kaspersky.com/utilities/VirusUtilities/EN/rakhnidecryptor.zip
https://decrypter.emsisoft.com/download/amnesia
https://decrypter.emsisoft.com/download/amnesia2
https://decrypter.emsisoft.com/apocalypse
https://decrypter.emsisoft.com/apocalypsevm
https://decrypter.emsisoft.com/autolocky
https://decrypter.emsisoft.com/badblock
http://www.avg.com/us-en/ransomware-decryption-tools#bart
https://files.avast.com/files/decryptor/avast_decryptor_btcware.exe
http://media.kaspersky.com/utilities/VirusUtilities/EN/rakhnidecryptor.zip
https://decrypter.emsisoft.com/cryptinfinite
https://decrypter.emsisoft.com/cryptodefense
https://github.com/aaaddress1/my-Little-Ransomware/tree/master/decryptoTool
https://decrypter.emsisoft.com/dmalocker
https://decrypter.emsisoft.com/dmalocker2
https://decrypter.emsisoft.com/fabiansomware
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SOME FREE/Paid RANSOMWARE DECRYPTORS :
http://media.kaspersky.com/utilities/VirusUtilities/EN/rakhnidecryptor.zip
https://decrypter.emsisoft.com/download/amnesia
https://decrypter.emsisoft.com/download/amnesia2
https://decrypter.emsisoft.com/apocalypse
https://decrypter.emsisoft.com/apocalypsevm
https://decrypter.emsisoft.com/autolocky
https://decrypter.emsisoft.com/badblock
http://www.avg.com/us-en/ransomware-decryption-tools#bart
https://files.avast.com/files/decryptor/avast_decryptor_btcware.exe
http://media.kaspersky.com/utilities/VirusUtilities/EN/rakhnidecryptor.zip
https://decrypter.emsisoft.com/cryptinfinite
https://decrypter.emsisoft.com/cryptodefense
https://github.com/aaaddress1/my-Little-Ransomware/tree/master/decryptoTool
https://decrypter.emsisoft.com/dmalocker
https://decrypter.emsisoft.com/dmalocker2
https://decrypter.emsisoft.com/fabiansomware
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Emsisoft
Apocalypse decryptor
Free Apocalypse ransomware decryptor by Emsisoft. Unlock your files without paying the ransom.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦What is ping monitoring?
#FastTips
1) Without getting into complex ping monitoring, it refers to the way our devices access the Internet.
2) Basically, when you want to go online, your device (computer, tablet, phone, etc.), known as a client, communicates with another device for information.
3) To make a request for information, your device sends a request (known as a packet) to the server that stores the information. To access a packet, the server needs to know who is requesting it so they can send it back.
4) Packages can be sent in a variety of ways, some of which are faster than others. The one most people are familiar with is HTTP .
5) This way, the server processes your packets and sends them back using the ping command , which tests the connection between the client and the server.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦What is ping monitoring?
#FastTips
1) Without getting into complex ping monitoring, it refers to the way our devices access the Internet.
2) Basically, when you want to go online, your device (computer, tablet, phone, etc.), known as a client, communicates with another device for information.
3) To make a request for information, your device sends a request (known as a packet) to the server that stores the information. To access a packet, the server needs to know who is requesting it so they can send it back.
4) Packages can be sent in a variety of ways, some of which are faster than others. The one most people are familiar with is HTTP .
5) This way, the server processes your packets and sends them back using the ping command , which tests the connection between the client and the server.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦What is ping monitoring?
#FastTips
1) Without getting into complex ping monitoring, it refers to the way our devices access the Internet.
2) Basically, when you want to go online, your device (computer, tablet, phone, etc.), known as a client, communicates with another device for information.
3) To make a request for information, your device sends a request (known as a packet) to the server that stores the information. To access a packet, the server needs to know who is requesting it so they can send it back.
4) Packages can be sent in a variety of ways, some of which are faster than others. The one most people are familiar with is HTTP .
5) This way, the server processes your packets and sends them back using the ping command , which tests the connection between the client and the server.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦What is ping monitoring?
#FastTips
1) Without getting into complex ping monitoring, it refers to the way our devices access the Internet.
2) Basically, when you want to go online, your device (computer, tablet, phone, etc.), known as a client, communicates with another device for information.
3) To make a request for information, your device sends a request (known as a packet) to the server that stores the information. To access a packet, the server needs to know who is requesting it so they can send it back.
4) Packages can be sent in a variety of ways, some of which are faster than others. The one most people are familiar with is HTTP .
5) This way, the server processes your packets and sends them back using the ping command , which tests the connection between the client and the server.
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SOME RESOURCES FOR CEH- ONLINE HACKING CERTIFICATE
https://www.eccouncil.org/
https://digitaldefynd.com/best-ethical-hacking-course-certification-training-tutorial/#8_Penetration_Testing_and_Ethical_Hacking_Cybrary
https://digitaldefynd.com/best-ethical-hacking-course-certification-training-tutorial/#9_Ethical_Hacking_Course_for_Beginners_Experts_Pluralsight
https://www.offensive-security.com/
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦SOME RESOURCES FOR CEH- ONLINE HACKING CERTIFICATE
https://www.eccouncil.org/
https://digitaldefynd.com/best-ethical-hacking-course-certification-training-tutorial/#8_Penetration_Testing_and_Ethical_Hacking_Cybrary
https://digitaldefynd.com/best-ethical-hacking-course-certification-training-tutorial/#9_Ethical_Hacking_Course_for_Beginners_Experts_Pluralsight
https://www.offensive-security.com/
β β β Uππ»βΊπ«Δπ¬πβ β β β
EC-Council
Best βCyber Security Courses Online | Cybersecurity Training | EC-Council
βEnroll in the best cyber security courses online by EC-Council. Boost your career with one of the top cybersecurity training program. Get certified now!
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦What is WSL for? What are the limitations of WSL2 (Windows Subsystem for Linux)
1) we are not actually installing Kali Linux
in fact we don't install Linux at all
2) The Windows Subsystem for Linux is NOT a virtual machine
and is NOT real Linux. If you understand what Wine is (which is also not an emulator), then WSL2 is also a Wine in reverse. WSL2 is simply trying to serve as a Linux kernel to the best of its ability for GNU applications, without being a true Linux kernel.
π¦What does this mean from a practical point of view?
1) This means that we get a very similar situation with Wine, which tries to perform Windows functions (again, to the best of its ability) - something will work fine, something will work with errors, and something will not work at all. ...
2) In WSL2, 100% will not work (in the coming years, and maybe never at all)
absolutely all wireless attacks (Wi-Fi, Bluetooth)
3) Hashcat and other programs using video cards to perform computations (brute force)
4) low-level access to USB devices (for example, to make an image of a disk / flash drive for forensic research)
background server applications
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦What is WSL for? What are the limitations of WSL2 (Windows Subsystem for Linux)
1) we are not actually installing Kali Linux
in fact we don't install Linux at all
2) The Windows Subsystem for Linux is NOT a virtual machine
and is NOT real Linux. If you understand what Wine is (which is also not an emulator), then WSL2 is also a Wine in reverse. WSL2 is simply trying to serve as a Linux kernel to the best of its ability for GNU applications, without being a true Linux kernel.
π¦What does this mean from a practical point of view?
1) This means that we get a very similar situation with Wine, which tries to perform Windows functions (again, to the best of its ability) - something will work fine, something will work with errors, and something will not work at all. ...
2) In WSL2, 100% will not work (in the coming years, and maybe never at all)
absolutely all wireless attacks (Wi-Fi, Bluetooth)
3) Hashcat and other programs using video cards to perform computations (brute force)
4) low-level access to USB devices (for example, to make an image of a disk / flash drive for forensic research)
background server applications
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
React Native Design - Build front end of 10 mobile Appsβ1.3 GBβ
https://mega.nz/#F!ystHnCBS!Mz9Xr-rb0ToCf-oyskIBRQ
https://mega.nz/#F!ystHnCBS!Mz9Xr-rb0ToCf-oyskIBRQ
mega.nz
MEGA provides free cloud storage with convenient and powerful always-on privacy. Claim your free 20GB now
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦list 3 FACEBOOK LIKERS SITES & APPLICATIONS 2020 :
Wefbee.com
Hublaa.me
MachineLiker.com
Mg-likers.com
https://play.google.com/store/apps/details?id=com.swipa&hl=en
https://mylikelo.com/
https://apental.com/https://fb-liker.en.uptodown.com/android
https://apkpure.com/get-instant-likes/socials.com.application
https://swipa.me/
https://www.apkmart.net/app/fb-auto-liker/?fbclid=IwAR1sZed5ugP0jlNBAHJnr1CgkMTs8yTyz7QhbJstwx2kU2t4OOkI9VE3LXQ#.XhSFHVR-JjA.facebook
enjoy β€οΈππ»
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦list 3 FACEBOOK LIKERS SITES & APPLICATIONS 2020 :
Wefbee.com
Hublaa.me
MachineLiker.com
Mg-likers.com
https://play.google.com/store/apps/details?id=com.swipa&hl=en
https://mylikelo.com/
https://apental.com/https://fb-liker.en.uptodown.com/android
https://apkpure.com/get-instant-likes/socials.com.application
https://swipa.me/
https://www.apkmart.net/app/fb-auto-liker/?fbclid=IwAR1sZed5ugP0jlNBAHJnr1CgkMTs8yTyz7QhbJstwx2kU2t4OOkI9VE3LXQ#.XhSFHVR-JjA.facebook
enjoy β€οΈππ»
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Google Play
Swipa - The photo likes app - Apps on Google Play
The more photos you upload, the more likes you will get.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BEST OFFERS & TRIALS NOW, IN ANTIVIRUS APPS FOR WINDOWS 2020 :
https://www.bitdefender.co.uk/media/html/consumer/new/100-vip-special-opt/?pid=vip_special_offer&cid=aff|c|ir&clickid=WqN2mZX1mxyOWzVwUx0Mo3EAUkiX3mRneUFAUA0&irgwc=1&MPid=221109&cid=aff%7Cc%7CIR
https://uk.norton.com/ps/4up_norton360_nav_ns_nd_np_Reading_tw_nb.html
https://www.avira.com/en/campaigns/acq/avpro/Techradar/av-pro-uk?x-c-channel=partnerize&x-a-medium=1100l10026&utm_source=partnerize&utm_medium=affiliate&utm_content=1100l52030&utm_term=futurepublishing&x-clickref=1011lbhuuLcX
https://www.trendmicro.com/en_gb/forHome/products/antivirus-plus.html?irclickid=QAe2DuSk8xyOUQF0M-0V7wD0UkiX3mTueUFAUA0&irgwc=1
https://www.kaspersky.co.uk/antivirus?sid=itproportal-gb-8824742738814738000&AID=12584495&PID=100134076&campaign=tcid_cj_12584495_100134076_cdb7fa2df43811ea83bd00790a180511_x5&CJ_CID=3486349&CJ_PID=100134076&CJ_CID_NAME=Future+Publishing+Ltd&utm_source=CJ&utm_medium=affiliate&CJEVENT=cdb7fa2df43811ea83bd00790a180511
https://www.amazon.com/s?tag=georiot-us-default-20&k=G+Data+Antivirus&ascsubtag=itproportal-row-7913326345896524000-20
https://www.webroot.com/gb/en/home?sc=70161000000TRru&rc=8200
https://www.eset.com/us/home/antivirus/?sid=hawk-custom-tracking&ref=AFC-CJ&attr=100134076&pub=11553473&shop=itproportal-row-6973904843495994000&utm_source=100134076&utm_medium=affiliate&utm_content=11553473&cjevent=0be11851f43911ea83bd00790a180511
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BEST OFFERS & TRIALS NOW, IN ANTIVIRUS APPS FOR WINDOWS 2020 :
https://www.bitdefender.co.uk/media/html/consumer/new/100-vip-special-opt/?pid=vip_special_offer&cid=aff|c|ir&clickid=WqN2mZX1mxyOWzVwUx0Mo3EAUkiX3mRneUFAUA0&irgwc=1&MPid=221109&cid=aff%7Cc%7CIR
https://uk.norton.com/ps/4up_norton360_nav_ns_nd_np_Reading_tw_nb.html
https://www.avira.com/en/campaigns/acq/avpro/Techradar/av-pro-uk?x-c-channel=partnerize&x-a-medium=1100l10026&utm_source=partnerize&utm_medium=affiliate&utm_content=1100l52030&utm_term=futurepublishing&x-clickref=1011lbhuuLcX
https://www.trendmicro.com/en_gb/forHome/products/antivirus-plus.html?irclickid=QAe2DuSk8xyOUQF0M-0V7wD0UkiX3mTueUFAUA0&irgwc=1
https://www.kaspersky.co.uk/antivirus?sid=itproportal-gb-8824742738814738000&AID=12584495&PID=100134076&campaign=tcid_cj_12584495_100134076_cdb7fa2df43811ea83bd00790a180511_x5&CJ_CID=3486349&CJ_PID=100134076&CJ_CID_NAME=Future+Publishing+Ltd&utm_source=CJ&utm_medium=affiliate&CJEVENT=cdb7fa2df43811ea83bd00790a180511
https://www.amazon.com/s?tag=georiot-us-default-20&k=G+Data+Antivirus&ascsubtag=itproportal-row-7913326345896524000-20
https://www.webroot.com/gb/en/home?sc=70161000000TRru&rc=8200
https://www.eset.com/us/home/antivirus/?sid=hawk-custom-tracking&ref=AFC-CJ&attr=100134076&pub=11553473&shop=itproportal-row-6973904843495994000&utm_source=100134076&utm_medium=affiliate&utm_content=11553473&cjevent=0be11851f43911ea83bd00790a180511
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Trend Micro
Antivirus Plus Security Software | Trend Micro
Shop, share, and play safely. Our protection blocks 250M+ threats daily and stops the latest threats, including ransomware, before they reach your PC.
Forwarded from UNDERCODE COMMUNITY
malicious.link post snagging-creds-from-locked-machine.pdf
401.9 KB
First o, this is dead simple and shouldnβt work, but it does. Also, there is no possible way that Iβm the rst one that has identied this, but here it is (trust me, I tested it so many ways to conrm it because I couldnβt believe it was true) TL;DR USB Ethernet + DHCP + Responder == Creds ... #Full
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Top Execution logging and tracing tools :
(easy install)
* [Wireshark](https://www.wireshark.org/) - A free and open-source packet analyzer
* [tcpdump](http://www.tcpdump.org/) - A powerful command-line packet analyzer; and libpcap, a portable C/C++ library for network traffic capture
* [mitmproxy](https://github.com/mitmproxy/mitmproxy) - An interactive, SSL-capable man-in-the-middle proxy for HTTP with a console interface
* [Charles Proxy](https://charlesproxy.com) - A cross-platform GUI web debugging proxy to view intercepted HTTP and HTTPS/SSL live traffic
* [usbmon](https://www.kernel.org/doc/Documentation/usb/usbmon.txt) - USB capture for Linux.
* [USBPcap](https://github.com/desowin/usbpcap) - USB capture for Windows.
* [dynStruct](https://github.com/ampotos/dynStruct) - structures recovery via dynamic instrumentation.
* [drltrace](https://github.com/mxmssh/drltrace) - shared library calls tracing.
enjoy:)
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Top Execution logging and tracing tools :
(easy install)
* [Wireshark](https://www.wireshark.org/) - A free and open-source packet analyzer
* [tcpdump](http://www.tcpdump.org/) - A powerful command-line packet analyzer; and libpcap, a portable C/C++ library for network traffic capture
* [mitmproxy](https://github.com/mitmproxy/mitmproxy) - An interactive, SSL-capable man-in-the-middle proxy for HTTP with a console interface
* [Charles Proxy](https://charlesproxy.com) - A cross-platform GUI web debugging proxy to view intercepted HTTP and HTTPS/SSL live traffic
* [usbmon](https://www.kernel.org/doc/Documentation/usb/usbmon.txt) - USB capture for Linux.
* [USBPcap](https://github.com/desowin/usbpcap) - USB capture for Windows.
* [dynStruct](https://github.com/ampotos/dynStruct) - structures recovery via dynamic instrumentation.
* [drltrace](https://github.com/mxmssh/drltrace) - shared library calls tracing.
enjoy:)
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
www.tcpdump.org
Home | TCPDUMP & LIBPCAP
Web site of Tcpdump and Libpcap
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦DANGEROUS HACKING 2020
F E A T U R E S :
Cross Platform Support
Command and file auto-completion
Antivirus detection
Able to turn off/on display monitors
Hide/unhide files and directories
View/edit the hosts file
View all the systems environment variables
Keylogger with options to view status, start, stop and dump the logs onto your host system
View the location and other information of the target machine
Execute custom python scripts which return whatever you print to screen
Screenshots
Virtual machine detection
Download/Upload files to and from the target system
Attempt to dump the systems password hashes
Payloads' properties are "disguised" as other known programs
Display a user/password dialog box to obtain user password
Dump passwords saved via Chrome
Clear the System, Security, and Application logs
Enable/Disable services such as RDP,UAC, and Windows Defender
Edit the accessed, created, and modified properties of files
Create a custom popup box
View connected webcam and take snapshots
View past connected wifi connections along with their passwords
View information about drives connected
View summary of registry values such as DEP
Mac OSX Specific
Display a user/password dialog box to obtain user password
Change the login text at the user's login screen
Webcam snapshots
Mac OSX/Linux Specific
SSH from the target machine into another host
Run sudo commands
Attempt to bruteforce the user's password using the passwords list found in Tools/
Webcam snapshots? (untested on Linux)
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/nathanlopez/Stitch.git
2) cd Stitch
3) # for Windows
pip install -r win_requirements.txt
# for Mac OSX
pip install -r osx_requirements.txt
# for Linux
pip install -r lnx_requirements.txt
4) python main.py
U S E F O R L E A R N
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦DANGEROUS HACKING 2020
F E A T U R E S :
Cross Platform Support
Command and file auto-completion
Antivirus detection
Able to turn off/on display monitors
Hide/unhide files and directories
View/edit the hosts file
View all the systems environment variables
Keylogger with options to view status, start, stop and dump the logs onto your host system
View the location and other information of the target machine
Execute custom python scripts which return whatever you print to screen
Screenshots
Virtual machine detection
Download/Upload files to and from the target system
Attempt to dump the systems password hashes
Payloads' properties are "disguised" as other known programs
Display a user/password dialog box to obtain user password
Dump passwords saved via Chrome
Clear the System, Security, and Application logs
Enable/Disable services such as RDP,UAC, and Windows Defender
Edit the accessed, created, and modified properties of files
Create a custom popup box
View connected webcam and take snapshots
View past connected wifi connections along with their passwords
View information about drives connected
View summary of registry values such as DEP
Mac OSX Specific
Display a user/password dialog box to obtain user password
Change the login text at the user's login screen
Webcam snapshots
Mac OSX/Linux Specific
SSH from the target machine into another host
Run sudo commands
Attempt to bruteforce the user's password using the passwords list found in Tools/
Webcam snapshots? (untested on Linux)
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/nathanlopez/Stitch.git
2) cd Stitch
3) # for Windows
pip install -r win_requirements.txt
# for Mac OSX
pip install -r osx_requirements.txt
# for Linux
pip install -r lnx_requirements.txt
4) python main.py
U S E F O R L E A R N
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - nathanlopez/Stitch: Python Remote Administration Tool (RAT)
Python Remote Administration Tool (RAT). Contribute to nathanlopez/Stitch development by creating an account on GitHub.
Kalil Linux Training course (in hindi/urdu)
https://drive.google.com/drive/folders/1FcMfvSYoN1PLpnxh0o4VPMuiYw183kuI
https://drive.google.com/drive/folders/1FcMfvSYoN1PLpnxh0o4VPMuiYw183kuI