β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦A simple way for others to prompt for an empty number when they call your phone :
> When you don't want to be annoyed by others and are embarrassed to turn off the phone, it is a good idea to let others call your phone to prompt an empty number. Here is a way to make your mobile phone become an empty number at any time. It is very simple~~ Friends in need can make a note...
γγ
> Enter **21*999999# in the standby mode and press the dial button~ OK ! ~ done
γγ
> in this state, someone hit you over the phone number is empty and you will not receive phone
γγ
> preliminary judging most phones can
γγ
> Note: Since there is no test for all models, we can not guarantee success rate
γγ
> in this state, even if to remind shutdown Power also will not cancel
γ
> the code number to cancel the empty state is the same as above ## 21 # enter the
γγ
> last remind remember to finish off state so as not to cause delay in releasing the empty No.
γγ
> this principle probably use call forwarding to achieve, but do not answer incoming calls There is no charge if you pass, so this method will not waste your phone bill...
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦A simple way for others to prompt for an empty number when they call your phone :
> When you don't want to be annoyed by others and are embarrassed to turn off the phone, it is a good idea to let others call your phone to prompt an empty number. Here is a way to make your mobile phone become an empty number at any time. It is very simple~~ Friends in need can make a note...
γγ
> Enter **21*999999# in the standby mode and press the dial button~ OK ! ~ done
γγ
> in this state, someone hit you over the phone number is empty and you will not receive phone
γγ
> preliminary judging most phones can
γγ
> Note: Since there is no test for all models, we can not guarantee success rate
γγ
> in this state, even if to remind shutdown Power also will not cancel
γ
> the code number to cancel the empty state is the same as above ## 21 # enter the
γγ
> last remind remember to finish off state so as not to cause delay in releasing the empty No.
γγ
> this principle probably use call forwarding to achieve, but do not answer incoming calls There is no charge if you pass, so this method will not waste your phone bill...
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to Enable SSH on Ubuntu :
1) Process for Enabling SSH
You can successfully enable and run the SSH protocol on your server by undergoing these four primary steps. These steps can assist you in effectively utilizing the network protocol of SSH on ubuntu 20.04.
Step 1 is the installation of SSH
Step 2 is enabling SHH
Step 3 is checking the status
Step 4 is connecting with firewall port
2) Installation of SSH
For installing, just run two additional commands for updating and up-gradation and then run the third sudo command to install the SSH on your server finally. The commands are as follows;
$ sudo apt update
$ sudo apt upgrade
$ sudo apt install openssh-server
3) You can also use install shh instead of openssh in the command as both will allow you to download the open package of SHH protocol. Type your password and continue the installation.
4) Enabling SSH
Now simply enable the network protocol in your operating system with the help of the following command;
$ sudo systemctl enable --now ssh
5) Thatβs all, and you have enabled the protocol for encrypted network on your system successfully.
Check Status
6) Now simply check the status of your protocol. Checking status also involves the command for stopping, reloading, and restarting the protocol. Use the following controls if you want to check the status.
$ systemctl status ssh.service
7) You can modify the status checking if you replace the status with other commands encompassing the reload, restart, and stop commands.
8) Connect with Firewall Port
Itβs recommended connecting the server with port 22 if your firewall is active, also ensure that you are logged in the server of the protocol with the root user.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to Enable SSH on Ubuntu :
1) Process for Enabling SSH
You can successfully enable and run the SSH protocol on your server by undergoing these four primary steps. These steps can assist you in effectively utilizing the network protocol of SSH on ubuntu 20.04.
Step 1 is the installation of SSH
Step 2 is enabling SHH
Step 3 is checking the status
Step 4 is connecting with firewall port
2) Installation of SSH
For installing, just run two additional commands for updating and up-gradation and then run the third sudo command to install the SSH on your server finally. The commands are as follows;
$ sudo apt update
$ sudo apt upgrade
$ sudo apt install openssh-server
3) You can also use install shh instead of openssh in the command as both will allow you to download the open package of SHH protocol. Type your password and continue the installation.
4) Enabling SSH
Now simply enable the network protocol in your operating system with the help of the following command;
$ sudo systemctl enable --now ssh
5) Thatβs all, and you have enabled the protocol for encrypted network on your system successfully.
Check Status
6) Now simply check the status of your protocol. Checking status also involves the command for stopping, reloading, and restarting the protocol. Use the following controls if you want to check the status.
$ systemctl status ssh.service
7) You can modify the status checking if you replace the status with other commands encompassing the reload, restart, and stop commands.
8) Connect with Firewall Port
Itβs recommended connecting the server with port 22 if your firewall is active, also ensure that you are logged in the server of the protocol with the root user.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
> > SHELLS FOR BEGINERS :
π¦What is Shellcode?
1) We know that shellcode has little to do with scripting for shells, so why the name? The relation with the shell is that shellcode was typically used specifically to open or 'pop' a shell β that is, an instance of a command line interpreter β so an attacker might use the shell as a means of manipulating the machine. Imagine that you could make a user enter an obviously harmless string into a legal program on their device that would magically open the computer to a reverse shell?
2) That's the last reward for pwning. Spawning a new process that will send a shell often requires very little javascript, so popping shells is a very lightweight, effective means of attack.
3) In order to achieve it, youβd need to find an exploitable program and fashion some malicious input string β the shellcode β containing small chunks of executable code to force the program into popping a shell. This is possible because for most programs, in order to be useful, they need the ability to receive input: to read strings and other data supplied by the user or piped in from another program.
4) Shellcode exploits this requirement by containing instructions telling the program to do something it otherwise wouldnβt or shouldnβt. Of course, almost no program is going to easily misinterpret data as code without a bit of persuasion, and the primary name of the game when it comes to persuading programs to engage in this kind of undefined behavior is another hacking conversation favorite: the buffer overflow.
π¦Controlling Code Execution
1) When we create a buffer overflow, the aim is to write a sufficiently large amount of data into the programβs memory so that two things happen. First, we fill up the allocated buffer, and second we supply enough extra data so that we overwrite the address that will be executed next with our own code.
2) This isnβt simple, but it might sound harder to do than it actually is. Because of the nature of how program memory is mapped out, when any function is called, thereβs always a pointer held in memory to the address of the next function that should be executed after the currently executing one; this pointer is known as the Instruction Pointer, sometimes referred to as EIP (32 bit) or RIP (64 bit).
3) By reverse engineering a particular program and with a lot of fuzzing and experimenting, we can determine both whether a given program contains any functions that are vulnerable to a buffer overflow and, if so, the address of the Instruction Pointer when that vulnerable function has finished calling.
4) Knowing the offset β the memory address β of the Instruction Pointer at that point in code means we can determine precisely how much extra data we need to overflow the buffer and insert our own code at the address of the Instruction Pointer. When we do that, the program will try to execute the code at the address weβve written to the RIP register. If that code is junk, like in the example above, the program will crash, but if it isnβt β if itβs a valid address, things start to get more interesting.
source: wiki
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
> > SHELLS FOR BEGINERS :
π¦What is Shellcode?
1) We know that shellcode has little to do with scripting for shells, so why the name? The relation with the shell is that shellcode was typically used specifically to open or 'pop' a shell β that is, an instance of a command line interpreter β so an attacker might use the shell as a means of manipulating the machine. Imagine that you could make a user enter an obviously harmless string into a legal program on their device that would magically open the computer to a reverse shell?
2) That's the last reward for pwning. Spawning a new process that will send a shell often requires very little javascript, so popping shells is a very lightweight, effective means of attack.
3) In order to achieve it, youβd need to find an exploitable program and fashion some malicious input string β the shellcode β containing small chunks of executable code to force the program into popping a shell. This is possible because for most programs, in order to be useful, they need the ability to receive input: to read strings and other data supplied by the user or piped in from another program.
4) Shellcode exploits this requirement by containing instructions telling the program to do something it otherwise wouldnβt or shouldnβt. Of course, almost no program is going to easily misinterpret data as code without a bit of persuasion, and the primary name of the game when it comes to persuading programs to engage in this kind of undefined behavior is another hacking conversation favorite: the buffer overflow.
π¦Controlling Code Execution
1) When we create a buffer overflow, the aim is to write a sufficiently large amount of data into the programβs memory so that two things happen. First, we fill up the allocated buffer, and second we supply enough extra data so that we overwrite the address that will be executed next with our own code.
2) This isnβt simple, but it might sound harder to do than it actually is. Because of the nature of how program memory is mapped out, when any function is called, thereβs always a pointer held in memory to the address of the next function that should be executed after the currently executing one; this pointer is known as the Instruction Pointer, sometimes referred to as EIP (32 bit) or RIP (64 bit).
3) By reverse engineering a particular program and with a lot of fuzzing and experimenting, we can determine both whether a given program contains any functions that are vulnerable to a buffer overflow and, if so, the address of the Instruction Pointer when that vulnerable function has finished calling.
4) Knowing the offset β the memory address β of the Instruction Pointer at that point in code means we can determine precisely how much extra data we need to overflow the buffer and insert our own code at the address of the Instruction Pointer. When we do that, the program will try to execute the code at the address weβve written to the RIP register. If that code is junk, like in the example above, the program will crash, but if it isnβt β if itβs a valid address, things start to get more interesting.
source: wiki
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Learn CSS - The Complete Guide 2020 (incl. Flexbox, Grid & Sass)
https://drive.google.com/drive/folders/1z3L0qQPJS8MPTO1SblQcL66-2_Q6H8cY
https://drive.google.com/drive/folders/1z3L0qQPJS8MPTO1SblQcL66-2_Q6H8cY
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BEST SPAMMERS EMAILS/SMS/MESSAGES..
https://github.com/TheSpeedX/TBomb
https://github.com/Juniorn1003/Email-Spammer
https://github.com/BlackXploits/email-spam
https://github.com/Curioo/emailpyspam
https://github.com/mohinparamasivam/Email-Bomber
https://github.com/RavicharanN/Spam-Whatsapp
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BEST SPAMMERS EMAILS/SMS/MESSAGES..
https://github.com/TheSpeedX/TBomb
https://github.com/Juniorn1003/Email-Spammer
https://github.com/BlackXploits/email-spam
https://github.com/Curioo/emailpyspam
https://github.com/mohinparamasivam/Email-Bomber
https://github.com/RavicharanN/Spam-Whatsapp
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - TheSpeedX/TBomb: This is a SMS And Call Bomber For Linux And Termux
This is a SMS And Call Bomber For Linux And Termux - TheSpeedX/TBomb
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦MOST POPULAR CREDIT CARD MANAGER, TRUSTED APPS 2020 :
https://play.google.com/store/apps/details?id=net.thesimplest.creditcardmanager&utm_source=appgrooves&utm_medium=agp_ca9a9771141c52de8e4ccc1bf80b8f4c_net.thesimplest.creditcardmanager_us_others_16004994711195
https://play.google.com/store/apps/details?id=com.petalcard.petal&utm_source=appgrooves&utm_medium=agp_ca9a9771141c52de8e4ccc1bf80b8f4c_com.petalcard.petal_us_others_16004994753521
https://apps.apple.com/us/app/id1400353064?mt=8
https://apps.apple.com/us/app/id1428580080?mt=8
https://play.google.com/store/apps/details?id=com.ollocard.mobileapp&utm_source=appgrooves&utm_medium=agp_ca9a9771141c52de8e4ccc1bf80b8f4c_com.ollocard.mobileapp_us_others_16004994851710
https://apps.apple.com/us/app/id1427782837?mt=8
https://play.google.com/store/apps/details?id=com.creditonebank.mobile&utm_source=appgrooves&utm_medium=agp_ca9a9771141c52de8e4ccc1bf80b8f4c_com.creditonebank.mobile_us_others_16004994894729
https://apps.apple.com/us/app/id1128712763?mt=8
https://play.google.com/store/apps/details?id=com.firstpremier.mypremiercreditcard.app&utm_source=appgrooves&utm_medium=agp_ca9a9771141c52de8e4ccc1bf80b8f4c_com.firstpremier.mypremiercreditcard.app_us_others_16004994945189
https://apps.apple.com/us/app/id1476775662?mt=8
https://play.google.com/store/apps/details?id=com.discoverfinancial.mobile&utm_source=appgrooves&utm_medium=agp_ca9a9771141c52de8e4ccc1bf80b8f4c_com.discoverfinancial.mobile_us_others_16004994982236
https://apps.apple.com/us/app/id338010821?mt=8
https://play.google.com/store/apps/details?id=com.onlineceo.creditcardverifier&utm_source=appgrooves&utm_medium=agp_ca9a9771141c52de8e4ccc1bf80b8f4c_com.onlineceo.creditcardverifier_us_others_16004995052540
https://play.google.com/store/apps/details?id=com.debit_credit_card.creditcardmanager&utm_source=appgrooves&utm_medium=agp_ca9a9771141c52de8e4ccc1bf80b8f4c_com.debit_credit_card.creditcardmanager_us_others_16004995069099
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦MOST POPULAR CREDIT CARD MANAGER, TRUSTED APPS 2020 :
https://play.google.com/store/apps/details?id=net.thesimplest.creditcardmanager&utm_source=appgrooves&utm_medium=agp_ca9a9771141c52de8e4ccc1bf80b8f4c_net.thesimplest.creditcardmanager_us_others_16004994711195
https://play.google.com/store/apps/details?id=com.petalcard.petal&utm_source=appgrooves&utm_medium=agp_ca9a9771141c52de8e4ccc1bf80b8f4c_com.petalcard.petal_us_others_16004994753521
https://apps.apple.com/us/app/id1400353064?mt=8
https://apps.apple.com/us/app/id1428580080?mt=8
https://play.google.com/store/apps/details?id=com.ollocard.mobileapp&utm_source=appgrooves&utm_medium=agp_ca9a9771141c52de8e4ccc1bf80b8f4c_com.ollocard.mobileapp_us_others_16004994851710
https://apps.apple.com/us/app/id1427782837?mt=8
https://play.google.com/store/apps/details?id=com.creditonebank.mobile&utm_source=appgrooves&utm_medium=agp_ca9a9771141c52de8e4ccc1bf80b8f4c_com.creditonebank.mobile_us_others_16004994894729
https://apps.apple.com/us/app/id1128712763?mt=8
https://play.google.com/store/apps/details?id=com.firstpremier.mypremiercreditcard.app&utm_source=appgrooves&utm_medium=agp_ca9a9771141c52de8e4ccc1bf80b8f4c_com.firstpremier.mypremiercreditcard.app_us_others_16004994945189
https://apps.apple.com/us/app/id1476775662?mt=8
https://play.google.com/store/apps/details?id=com.discoverfinancial.mobile&utm_source=appgrooves&utm_medium=agp_ca9a9771141c52de8e4ccc1bf80b8f4c_com.discoverfinancial.mobile_us_others_16004994982236
https://apps.apple.com/us/app/id338010821?mt=8
https://play.google.com/store/apps/details?id=com.onlineceo.creditcardverifier&utm_source=appgrooves&utm_medium=agp_ca9a9771141c52de8e4ccc1bf80b8f4c_com.onlineceo.creditcardverifier_us_others_16004995052540
https://play.google.com/store/apps/details?id=com.debit_credit_card.creditcardmanager&utm_source=appgrooves&utm_medium=agp_ca9a9771141c52de8e4ccc1bf80b8f4c_com.debit_credit_card.creditcardmanager_us_others_16004995069099
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Google Play
Credit Card Manager - Apps on Google Play
The most complete and easy to use credit card manager on the planet
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Pro Tips By undercode :
> Crontab Syntax and Statements
Crontab (cron table) is a text file that defines the schedule of cron jobs. Crontab files can be created, viewed, modified, and deleted using the crontab command.
Each line in the user's crontab contains six fields separated by a space, followed by the command to run:
* * * * * command (s)
^ ^ ^ ^ ^
| | | | | allowed values
| | | | | -------
| | | | ----- Day of week (0 - 7) (Sunday = 0 or 7)
| | | ------- Month (1 - 12)
| | --------- Day of month (1 - 31)
| ----------- Hour (0 - 23)
------------- Minute (0 - 59)
π¦The first five fields (time and date) also accept the following operators:
1) The asterisk operator means all valid values. If you have an asterisk in the Minute field, it means the task will run every minute.
2) The hyphen operator allows you to specify a range of values. If you set 1-5 in the Day of week field, the task will run every weekday (Monday through Friday). The range is inclusive, which means the first and last values ββare included in the range.
3) The comma operator allows you to define a list of values ββto repeat. For example, if you have 1, 3, 5 in the Hour field, the task will run at 1, 3, and 5 AM. The list can contain individual values ββand ranges 1-5, 7, 8, 10-15
4-5) The forward slash operator lets you specify pitch values ββthat can be used in combination with ranges. For example, if you specified 1-10 / 2 in the Minute field, this means that the action will be performed every two minutes in the range 1 to 10, as if you specified 1, 3, 5, 7, 9. Instead of a range of values, you can also use the asterisk operator. You can use "* / 20" to specify a task to run every 20 minutes.
π¦The syntax for system-wide crontabs is slightly different from custom crontabs. It contains an additional required user field that specifies which user will run the cron job.
* * * * * <username> command (s)
1) To edit the crontab file or create one if it does not exist, use the crontab -e command.
2) Run cron job every 5 minutes
There are two ways to run a cron job every five minutes.
The first option is to use the comma operator to create a list of minutes:
0,5,10,15,20,25,30,35,40,45,50,55 * * * * command
The above line is syntactically correct and will work fine. However, entering the entire list can be tedious and error prone.
The second option to specify a job that will run every 5 minutes of the hour is to use the step statement:
* / 5 * * * * command
* / 5 means create a list of all minutes and run a job for every fifth value from the list.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Pro Tips By undercode :
> Crontab Syntax and Statements
Crontab (cron table) is a text file that defines the schedule of cron jobs. Crontab files can be created, viewed, modified, and deleted using the crontab command.
Each line in the user's crontab contains six fields separated by a space, followed by the command to run:
* * * * * command (s)
^ ^ ^ ^ ^
| | | | | allowed values
| | | | | -------
| | | | ----- Day of week (0 - 7) (Sunday = 0 or 7)
| | | ------- Month (1 - 12)
| | --------- Day of month (1 - 31)
| ----------- Hour (0 - 23)
------------- Minute (0 - 59)
π¦The first five fields (time and date) also accept the following operators:
1) The asterisk operator means all valid values. If you have an asterisk in the Minute field, it means the task will run every minute.
2) The hyphen operator allows you to specify a range of values. If you set 1-5 in the Day of week field, the task will run every weekday (Monday through Friday). The range is inclusive, which means the first and last values ββare included in the range.
3) The comma operator allows you to define a list of values ββto repeat. For example, if you have 1, 3, 5 in the Hour field, the task will run at 1, 3, and 5 AM. The list can contain individual values ββand ranges 1-5, 7, 8, 10-15
4-5) The forward slash operator lets you specify pitch values ββthat can be used in combination with ranges. For example, if you specified 1-10 / 2 in the Minute field, this means that the action will be performed every two minutes in the range 1 to 10, as if you specified 1, 3, 5, 7, 9. Instead of a range of values, you can also use the asterisk operator. You can use "* / 20" to specify a task to run every 20 minutes.
π¦The syntax for system-wide crontabs is slightly different from custom crontabs. It contains an additional required user field that specifies which user will run the cron job.
* * * * * <username> command (s)
1) To edit the crontab file or create one if it does not exist, use the crontab -e command.
2) Run cron job every 5 minutes
There are two ways to run a cron job every five minutes.
The first option is to use the comma operator to create a list of minutes:
0,5,10,15,20,25,30,35,40,45,50,55 * * * * command
The above line is syntactically correct and will work fine. However, entering the entire list can be tedious and error prone.
The second option to specify a job that will run every 5 minutes of the hour is to use the step statement:
* / 5 * * * * command
* / 5 means create a list of all minutes and run a job for every fifth value from the list.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Network security Tips:
is essentially the information security on the network. In a broad sense, all relevant technologies and theories related to the confidentiality, integrity, availability, authenticity, and controllability of information on the network are the research fields of network security. Ensuring the information security of the network system is the goal of network security. Information security includes two aspects: the security of information storage and the security of information transmission. Information storage security refers to the security of information in a static storage state, such as whether it will be used without authorization, etc. The transmission security of information refers to the safety of information in the dynamic transmission process. In order to ensure the security of network information transmission, there are the following issues:
(1) The monitoring of information on the network
(2) The impersonation of the user's identity
(3) The tampering of information on the network
(4) The denial of the information sent
(5) The retransmission of the information
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Network security Tips:
is essentially the information security on the network. In a broad sense, all relevant technologies and theories related to the confidentiality, integrity, availability, authenticity, and controllability of information on the network are the research fields of network security. Ensuring the information security of the network system is the goal of network security. Information security includes two aspects: the security of information storage and the security of information transmission. Information storage security refers to the security of information in a static storage state, such as whether it will be used without authorization, etc. The transmission security of information refers to the safety of information in the dynamic transmission process. In order to ensure the security of network information transmission, there are the following issues:
(1) The monitoring of information on the network
(2) The impersonation of the user's identity
(3) The tampering of information on the network
(4) The denial of the information sent
(5) The retransmission of the information
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
How-To_ Find IDOR.pdf
1.8 MB
How-To_ Find IDOR (Insecure Direct Object Reference) Vulnerabilities for large bounty rewards
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 bypasses DPI (Deep Packet Inspection) systems found in many ISPs (Internet Service Providers) which block access to certain websites.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/SadeghHayeri/GreenTunnel.git
2) cd GreenTunnel
3) $ npm i -g green-tunnel
or using snap (edge version):
4) sudo snap install --edge green-tunnel --devmode`
5) Docker
$ docker run -p 8000:8000 sadeghhayeri/green-tunnel
envs
PORT
HTTPS-ONLY
VERBOSE
SILENT
DNS_TYPE
DNS_SERVER
usage:
6) $ docker run -e 'PORT=1000' -p 8000:1000 sadeghhayeri/green-tunnel
7) On Raspberry Pi
$ docker run -p 8000:8000 sadeghhayeri/green-tunnel:arm
8) If you want to make container keep running when reboot:
$ docker run -d --restart unless-stopped -p 8000:8000 sadeghhayeri/green-tunnel:arm
Please make sure port 8000 is not blocked on Raspberry Pi firewall. (sudo ufw allow 8000 comment Green-Tunnel)
9) To use it on your other device, set http proxy to <Raspberry Pi IP Address>:<PORT>. (PORT = 8000)
enable/disable proxy on windows
HTTPHandler
add CLI arguments
catch all exceptions
add preferences menu
fix close button
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 bypasses DPI (Deep Packet Inspection) systems found in many ISPs (Internet Service Providers) which block access to certain websites.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/SadeghHayeri/GreenTunnel.git
2) cd GreenTunnel
3) $ npm i -g green-tunnel
or using snap (edge version):
4) sudo snap install --edge green-tunnel --devmode`
5) Docker
$ docker run -p 8000:8000 sadeghhayeri/green-tunnel
envs
PORT
HTTPS-ONLY
VERBOSE
SILENT
DNS_TYPE
DNS_SERVER
usage:
6) $ docker run -e 'PORT=1000' -p 8000:1000 sadeghhayeri/green-tunnel
7) On Raspberry Pi
$ docker run -p 8000:8000 sadeghhayeri/green-tunnel:arm
8) If you want to make container keep running when reboot:
$ docker run -d --restart unless-stopped -p 8000:8000 sadeghhayeri/green-tunnel:arm
Please make sure port 8000 is not blocked on Raspberry Pi firewall. (sudo ufw allow 8000 comment Green-Tunnel)
9) To use it on your other device, set http proxy to <Raspberry Pi IP Address>:<PORT>. (PORT = 8000)
enable/disable proxy on windows
HTTPHandler
add CLI arguments
catch all exceptions
add preferences menu
fix close button
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - SadeghHayeri/GreenTunnel: GreenTunnel is an anti-censorship utility designed to bypass the DPI system that is put in placeβ¦
GreenTunnel is an anti-censorship utility designed to bypass the DPI system that is put in place by various ISPs to block access to certain websites. - SadeghHayeri/GreenTunnel
Create android games videos tutorials :
English - Arabic
https://drive.google.com/drive/folders/0B6RiB8cVZQhmTDZvN0JadGtScGs
English - Arabic
https://drive.google.com/drive/folders/0B6RiB8cVZQhmTDZvN0JadGtScGs
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Go Simple Mail is a simple and efficient package to send emails. It is well tested and documented.
Go Simple Mail can only send emails using an SMTP server. But the API is flexible and it is easy to implement other methods for sending emails using a local Postfix, an API, etc.
F E A T U R E S :
Multiple Attachments with path
Multiple Attachments in base64
Multiple Recipients
Priority
Reply to
Set other sender
Set other from
Embedded images
HTML and text templates
Automatic encoding of special characters
SSL and TLS
Unencrypted connection (not recommended)
Sending multiple emails with the same SMTP connection (Keep Alive or Persistent Connection)
Timeout for connect to a SMTP Server
Timeout for send an email
Return Path
Alternative Email Body
CC and BCC
Add Custom Headers in Message
Send NOOP, RESET, QUIT and CLOSE to SMTP client
PLAIN, LOGIN and CRAM-MD5 Authentication (since v2.3.0)
Custom TLS Configuration (since v2.5.0)
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/xhit/go-simple-mail.git
2) cd go-simple-mail
3) type Email ΒΆ
> type Email struct {
Charset string
Encoding encoding
Error error
SMTPServer *smtpClient
// contains filtered or unexported fields
}
> Email represents an email message.
func NewMSG ΒΆ
func NewMSG() *Email
NewMSG creates a new email. It uses UTF-8 by default. All charsets: http://webcheatsheet.com/HTML/character_sets_list.php
func (*Email) AddAddresses
func (email *Email) AddAddresses(header string, addresses ...string) *Email
> AddAddresses allows you to add addresses to the specified address header.
func (*Email) AddAlternative
func (email *Email) AddAlternative(contentType contentType, body string) *Email
π¦more info
https://pkg.go.dev/github.com/xhit/go-simple-mail/v2
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Go Simple Mail is a simple and efficient package to send emails. It is well tested and documented.
Go Simple Mail can only send emails using an SMTP server. But the API is flexible and it is easy to implement other methods for sending emails using a local Postfix, an API, etc.
F E A T U R E S :
Multiple Attachments with path
Multiple Attachments in base64
Multiple Recipients
Priority
Reply to
Set other sender
Set other from
Embedded images
HTML and text templates
Automatic encoding of special characters
SSL and TLS
Unencrypted connection (not recommended)
Sending multiple emails with the same SMTP connection (Keep Alive or Persistent Connection)
Timeout for connect to a SMTP Server
Timeout for send an email
Return Path
Alternative Email Body
CC and BCC
Add Custom Headers in Message
Send NOOP, RESET, QUIT and CLOSE to SMTP client
PLAIN, LOGIN and CRAM-MD5 Authentication (since v2.3.0)
Custom TLS Configuration (since v2.5.0)
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/xhit/go-simple-mail.git
2) cd go-simple-mail
3) type Email ΒΆ
> type Email struct {
Charset string
Encoding encoding
Error error
SMTPServer *smtpClient
// contains filtered or unexported fields
}
> Email represents an email message.
func NewMSG ΒΆ
func NewMSG() *Email
NewMSG creates a new email. It uses UTF-8 by default. All charsets: http://webcheatsheet.com/HTML/character_sets_list.php
func (*Email) AddAddresses
func (email *Email) AddAddresses(header string, addresses ...string) *Email
> AddAddresses allows you to add addresses to the specified address header.
func (*Email) AddAlternative
func (email *Email) AddAlternative(contentType contentType, body string) *Email
π¦more info
https://pkg.go.dev/github.com/xhit/go-simple-mail/v2
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - xhit/go-simple-mail: Golang package for send email. Support keep alive connection, TLS and SSL. Easy for bulk SMTP.
Golang package for send email. Support keep alive connection, TLS and SSL. Easy for bulk SMTP. - xhit/go-simple-mail
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Learn Social Engineering From Scratch
https://mygavilan-my.sharepoint.com/:f:/g/personal/kali_masi_my_gavilan_edu/EpnjkaMNMRdJvQQNQOOEt60BMX2XzvhotZ1Uy3ZXPRsteQ?e=PdnUeY
https://mygavilan-my.sharepoint.com/:f:/g/personal/kali_masi_my_gavilan_edu/EpnjkaMNMRdJvQQNQOOEt60BMX2XzvhotZ1Uy3ZXPRsteQ?e=PdnUeY