β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Network security Tips:
is essentially the information security on the network. In a broad sense, all relevant technologies and theories related to the confidentiality, integrity, availability, authenticity, and controllability of information on the network are the research fields of network security. Ensuring the information security of the network system is the goal of network security. Information security includes two aspects: the security of information storage and the security of information transmission. Information storage security refers to the security of information in a static storage state, such as whether it will be used without authorization, etc. The transmission security of information refers to the safety of information in the dynamic transmission process. In order to ensure the security of network information transmission, there are the following issues:
(1) The monitoring of information on the network
(2) The impersonation of the user's identity
(3) The tampering of information on the network
(4) The denial of the information sent
(5) The retransmission of the information
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Network security Tips:
is essentially the information security on the network. In a broad sense, all relevant technologies and theories related to the confidentiality, integrity, availability, authenticity, and controllability of information on the network are the research fields of network security. Ensuring the information security of the network system is the goal of network security. Information security includes two aspects: the security of information storage and the security of information transmission. Information storage security refers to the security of information in a static storage state, such as whether it will be used without authorization, etc. The transmission security of information refers to the safety of information in the dynamic transmission process. In order to ensure the security of network information transmission, there are the following issues:
(1) The monitoring of information on the network
(2) The impersonation of the user's identity
(3) The tampering of information on the network
(4) The denial of the information sent
(5) The retransmission of the information
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
How-To_ Find IDOR.pdf
1.8 MB
How-To_ Find IDOR (Insecure Direct Object Reference) Vulnerabilities for large bounty rewards
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 bypasses DPI (Deep Packet Inspection) systems found in many ISPs (Internet Service Providers) which block access to certain websites.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/SadeghHayeri/GreenTunnel.git
2) cd GreenTunnel
3) $ npm i -g green-tunnel
or using snap (edge version):
4) sudo snap install --edge green-tunnel --devmode`
5) Docker
$ docker run -p 8000:8000 sadeghhayeri/green-tunnel
envs
PORT
HTTPS-ONLY
VERBOSE
SILENT
DNS_TYPE
DNS_SERVER
usage:
6) $ docker run -e 'PORT=1000' -p 8000:1000 sadeghhayeri/green-tunnel
7) On Raspberry Pi
$ docker run -p 8000:8000 sadeghhayeri/green-tunnel:arm
8) If you want to make container keep running when reboot:
$ docker run -d --restart unless-stopped -p 8000:8000 sadeghhayeri/green-tunnel:arm
Please make sure port 8000 is not blocked on Raspberry Pi firewall. (sudo ufw allow 8000 comment Green-Tunnel)
9) To use it on your other device, set http proxy to <Raspberry Pi IP Address>:<PORT>. (PORT = 8000)
enable/disable proxy on windows
HTTPHandler
add CLI arguments
catch all exceptions
add preferences menu
fix close button
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 bypasses DPI (Deep Packet Inspection) systems found in many ISPs (Internet Service Providers) which block access to certain websites.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/SadeghHayeri/GreenTunnel.git
2) cd GreenTunnel
3) $ npm i -g green-tunnel
or using snap (edge version):
4) sudo snap install --edge green-tunnel --devmode`
5) Docker
$ docker run -p 8000:8000 sadeghhayeri/green-tunnel
envs
PORT
HTTPS-ONLY
VERBOSE
SILENT
DNS_TYPE
DNS_SERVER
usage:
6) $ docker run -e 'PORT=1000' -p 8000:1000 sadeghhayeri/green-tunnel
7) On Raspberry Pi
$ docker run -p 8000:8000 sadeghhayeri/green-tunnel:arm
8) If you want to make container keep running when reboot:
$ docker run -d --restart unless-stopped -p 8000:8000 sadeghhayeri/green-tunnel:arm
Please make sure port 8000 is not blocked on Raspberry Pi firewall. (sudo ufw allow 8000 comment Green-Tunnel)
9) To use it on your other device, set http proxy to <Raspberry Pi IP Address>:<PORT>. (PORT = 8000)
enable/disable proxy on windows
HTTPHandler
add CLI arguments
catch all exceptions
add preferences menu
fix close button
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - SadeghHayeri/GreenTunnel: GreenTunnel is an anti-censorship utility designed to bypass the DPI system that is put in placeβ¦
GreenTunnel is an anti-censorship utility designed to bypass the DPI system that is put in place by various ISPs to block access to certain websites. - SadeghHayeri/GreenTunnel
Create android games videos tutorials :
English - Arabic
https://drive.google.com/drive/folders/0B6RiB8cVZQhmTDZvN0JadGtScGs
English - Arabic
https://drive.google.com/drive/folders/0B6RiB8cVZQhmTDZvN0JadGtScGs
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Go Simple Mail is a simple and efficient package to send emails. It is well tested and documented.
Go Simple Mail can only send emails using an SMTP server. But the API is flexible and it is easy to implement other methods for sending emails using a local Postfix, an API, etc.
F E A T U R E S :
Multiple Attachments with path
Multiple Attachments in base64
Multiple Recipients
Priority
Reply to
Set other sender
Set other from
Embedded images
HTML and text templates
Automatic encoding of special characters
SSL and TLS
Unencrypted connection (not recommended)
Sending multiple emails with the same SMTP connection (Keep Alive or Persistent Connection)
Timeout for connect to a SMTP Server
Timeout for send an email
Return Path
Alternative Email Body
CC and BCC
Add Custom Headers in Message
Send NOOP, RESET, QUIT and CLOSE to SMTP client
PLAIN, LOGIN and CRAM-MD5 Authentication (since v2.3.0)
Custom TLS Configuration (since v2.5.0)
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/xhit/go-simple-mail.git
2) cd go-simple-mail
3) type Email ΒΆ
> type Email struct {
Charset string
Encoding encoding
Error error
SMTPServer *smtpClient
// contains filtered or unexported fields
}
> Email represents an email message.
func NewMSG ΒΆ
func NewMSG() *Email
NewMSG creates a new email. It uses UTF-8 by default. All charsets: http://webcheatsheet.com/HTML/character_sets_list.php
func (*Email) AddAddresses
func (email *Email) AddAddresses(header string, addresses ...string) *Email
> AddAddresses allows you to add addresses to the specified address header.
func (*Email) AddAlternative
func (email *Email) AddAlternative(contentType contentType, body string) *Email
π¦more info
https://pkg.go.dev/github.com/xhit/go-simple-mail/v2
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Go Simple Mail is a simple and efficient package to send emails. It is well tested and documented.
Go Simple Mail can only send emails using an SMTP server. But the API is flexible and it is easy to implement other methods for sending emails using a local Postfix, an API, etc.
F E A T U R E S :
Multiple Attachments with path
Multiple Attachments in base64
Multiple Recipients
Priority
Reply to
Set other sender
Set other from
Embedded images
HTML and text templates
Automatic encoding of special characters
SSL and TLS
Unencrypted connection (not recommended)
Sending multiple emails with the same SMTP connection (Keep Alive or Persistent Connection)
Timeout for connect to a SMTP Server
Timeout for send an email
Return Path
Alternative Email Body
CC and BCC
Add Custom Headers in Message
Send NOOP, RESET, QUIT and CLOSE to SMTP client
PLAIN, LOGIN and CRAM-MD5 Authentication (since v2.3.0)
Custom TLS Configuration (since v2.5.0)
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/xhit/go-simple-mail.git
2) cd go-simple-mail
3) type Email ΒΆ
> type Email struct {
Charset string
Encoding encoding
Error error
SMTPServer *smtpClient
// contains filtered or unexported fields
}
> Email represents an email message.
func NewMSG ΒΆ
func NewMSG() *Email
NewMSG creates a new email. It uses UTF-8 by default. All charsets: http://webcheatsheet.com/HTML/character_sets_list.php
func (*Email) AddAddresses
func (email *Email) AddAddresses(header string, addresses ...string) *Email
> AddAddresses allows you to add addresses to the specified address header.
func (*Email) AddAlternative
func (email *Email) AddAlternative(contentType contentType, body string) *Email
π¦more info
https://pkg.go.dev/github.com/xhit/go-simple-mail/v2
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - xhit/go-simple-mail: Golang package for send email. Support keep alive connection, TLS and SSL. Easy for bulk SMTP.
Golang package for send email. Support keep alive connection, TLS and SSL. Easy for bulk SMTP. - xhit/go-simple-mail
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Learn Social Engineering From Scratch
https://mygavilan-my.sharepoint.com/:f:/g/personal/kali_masi_my_gavilan_edu/EpnjkaMNMRdJvQQNQOOEt60BMX2XzvhotZ1Uy3ZXPRsteQ?e=PdnUeY
https://mygavilan-my.sharepoint.com/:f:/g/personal/kali_masi_my_gavilan_edu/EpnjkaMNMRdJvQQNQOOEt60BMX2XzvhotZ1Uy3ZXPRsteQ?e=PdnUeY
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ALL BANKING MALWARES FOR FREE :
Alina Spark (Point of Sales Trojan)
Betabot, Neurevt (Trojan)
Bleeding Life 2 (Exploit Pack)
Carberp (Botnet)
Carberp (Banking Trojan)
Crimepack 3.1.3 (Exploit Pack)
Dendroid (Android Trojan)
Dexter v2 (Point of Sales Trojan)
Eda2, Stolich, Win32.Stolich (Ransom)
Sednit, Fancy Bear, APT28, Sofacy, Strontium (Gmail C2C)
FlexiSpy (Spyware)
Fuzzbunch (Exploit Framework)
GMBot (Android Trojan)
Gozi-ISFB - (Banking Trojan)
Grum (Spam Bot)
Hacking Team RCS (Remote Control System)
Hidden Tear (Ransom)
KINS (Banking Trojan)
Mazar (Android Trojan)
Mirai (IoT Botnet)
Pony 2.0 (Stealer)
Poshspy (APT29 backdoor)
PowerLoader (Botnet)
RIG Front-end (Exploit Kit)
Rovnix (Bootkit)
Tinba (Tiny ASM Banking Trojan)
TinyNuke, Nuclear Bot, Micro Banking Trojan, NukeBot (Banking Trojan)
Trochilus, RedLeaves (RAT)
ZeroAccess (Toolkit for ZeroAccess/Sirefef v3)
Zeus (Banking Trojan)
Β» https://github.com/alexandreborges/malware-1
Use for learn, since nothing 100% anonymous :)
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦ALL BANKING MALWARES FOR FREE :
Alina Spark (Point of Sales Trojan)
Betabot, Neurevt (Trojan)
Bleeding Life 2 (Exploit Pack)
Carberp (Botnet)
Carberp (Banking Trojan)
Crimepack 3.1.3 (Exploit Pack)
Dendroid (Android Trojan)
Dexter v2 (Point of Sales Trojan)
Eda2, Stolich, Win32.Stolich (Ransom)
Sednit, Fancy Bear, APT28, Sofacy, Strontium (Gmail C2C)
FlexiSpy (Spyware)
Fuzzbunch (Exploit Framework)
GMBot (Android Trojan)
Gozi-ISFB - (Banking Trojan)
Grum (Spam Bot)
Hacking Team RCS (Remote Control System)
Hidden Tear (Ransom)
KINS (Banking Trojan)
Mazar (Android Trojan)
Mirai (IoT Botnet)
Pony 2.0 (Stealer)
Poshspy (APT29 backdoor)
PowerLoader (Botnet)
RIG Front-end (Exploit Kit)
Rovnix (Bootkit)
Tinba (Tiny ASM Banking Trojan)
TinyNuke, Nuclear Bot, Micro Banking Trojan, NukeBot (Banking Trojan)
Trochilus, RedLeaves (RAT)
ZeroAccess (Toolkit for ZeroAccess/Sirefef v3)
Zeus (Banking Trojan)
Β» https://github.com/alexandreborges/malware-1
Use for learn, since nothing 100% anonymous :)
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - alexandreborges/malware-1: Malware source code samples leaked online uploaded to GitHub for those who want to analyzeβ¦
Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code. - alexandreborges/malware-1
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Hidden gesture in iOS 14 speeds up navigation through system settings :
1) Apple always finds a way to offer seemingly subtle features that make the iPhone more convenient. IOS 14 has a hidden gesture that allows you to move around faster in system settings.
2) If you go deep into the settings, you can forget exactly where you are. Search is only available on the main settings page, so you have to return to it.
3) Let's say you're looking for the history of a specific place in the Highlights menu and want to go back and check for software updates or enable some accessibility features. You will need to go back to Important Locations> System Services> Location Services> Privacy> Settings. To do this, you need to click on the "Back" button in the upper left corner or make a gesture from left to right. That means five gestures or taps to get to the main settings screen.
4) Apple has made it easy to navigate to a specific Settings page in iOS 14. This applies to any Apple app. When you're in Settings, press and hold the Back button in the upper left corner. A small menu will appear, displaying in reverse order all the pages you have visited to get to your current location.
5) Thus, you move your finger to the page you want in the list and release. After that, this page opens.
6) This can be done not only in the system settings. This feature is supported in the App Store, Books, Calendar, Clock, Contacts, Files, FaceTime, Notes, Mail, Music, News, Keynote, Numbers, Pages, Phone, Photos, Podcasts, and Safari. Third-party apps can also get this option if their developers want it.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Hidden gesture in iOS 14 speeds up navigation through system settings :
1) Apple always finds a way to offer seemingly subtle features that make the iPhone more convenient. IOS 14 has a hidden gesture that allows you to move around faster in system settings.
2) If you go deep into the settings, you can forget exactly where you are. Search is only available on the main settings page, so you have to return to it.
3) Let's say you're looking for the history of a specific place in the Highlights menu and want to go back and check for software updates or enable some accessibility features. You will need to go back to Important Locations> System Services> Location Services> Privacy> Settings. To do this, you need to click on the "Back" button in the upper left corner or make a gesture from left to right. That means five gestures or taps to get to the main settings screen.
4) Apple has made it easy to navigate to a specific Settings page in iOS 14. This applies to any Apple app. When you're in Settings, press and hold the Back button in the upper left corner. A small menu will appear, displaying in reverse order all the pages you have visited to get to your current location.
5) Thus, you move your finger to the page you want in the list and release. After that, this page opens.
6) This can be done not only in the system settings. This feature is supported in the App Store, Books, Calendar, Clock, Contacts, Files, FaceTime, Notes, Mail, Music, News, Keynote, Numbers, Pages, Phone, Photos, Podcasts, and Safari. Third-party apps can also get this option if their developers want it.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Add Titles to Photos and Videos on iOS 14 for Easier Search :
1) If you have been using iPhone for several days, then you probably have a lot of videos and photos in iCloud storage or on the device itself. If you don't know the date, location, or event, finding the photo or video you want can be tricky. Even smart search suggestions, AI-generated hints, and multi-keyword filters may not help. This should change in iOS 14.
2) The Photos app on iOS lacked a tagging system. With their help, you can record keywords for each photo and video without relying on their automatic creation. When you search for a specific keyword, it will appear immediately.
3) This feature will appear in iOS 14. You can write a caption for any photo and video in the Photos application and then search by it. If you use iCloud Photos, all signatures are synced across all your devices, allowing you to search from anywhere. Anyone who can access Exif data can also read your signatures.
4) The only problem is adding captions to thousands of existing photos and videos. At the very least, captions can be easily added to new pictures.
5) Add captions to photos and videos
When viewing photos and videos in the Photos app or the Camera app, swipe up the screen. then you can see the effects of Live Photos, people and places. Below the image or clip there is a command "Add caption". Click on it, write a signature, tag or label and click "Finish".
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Add Titles to Photos and Videos on iOS 14 for Easier Search :
1) If you have been using iPhone for several days, then you probably have a lot of videos and photos in iCloud storage or on the device itself. If you don't know the date, location, or event, finding the photo or video you want can be tricky. Even smart search suggestions, AI-generated hints, and multi-keyword filters may not help. This should change in iOS 14.
2) The Photos app on iOS lacked a tagging system. With their help, you can record keywords for each photo and video without relying on their automatic creation. When you search for a specific keyword, it will appear immediately.
3) This feature will appear in iOS 14. You can write a caption for any photo and video in the Photos application and then search by it. If you use iCloud Photos, all signatures are synced across all your devices, allowing you to search from anywhere. Anyone who can access Exif data can also read your signatures.
4) The only problem is adding captions to thousands of existing photos and videos. At the very least, captions can be easily added to new pictures.
5) Add captions to photos and videos
When viewing photos and videos in the Photos app or the Camera app, swipe up the screen. then you can see the effects of Live Photos, people and places. Below the image or clip there is a command "Add caption". Click on it, write a signature, tag or label and click "Finish".
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Why Linux does not see Wi-Fi adapters in WSL ?
Linux in WSL does not have direct access to the computer hardware. For this reason, it is not possible to use Wi-Fi adapters, even USB Wi-Fi adapters, in WSL.
1) Can Linux in WSL use graphics cards to perform computation
> At the moment Linux in WSL cannot use GPUs, but they promise to add this feature later.
2) Error in WSL (Kali Linux, Ubuntu) "sleep: cannot read realtime clock: Invalid argument"
An error can occur when trying to install the program:
> sudo apt install ΠΠΠΠΠ’
Or when updating packages and the system:
> sudo apt update && sudo apt full-upgrade -y
3) These commands will output something like the following:
E: Unmet dependencies. Try 'apt --fix-broken install' with no packages (or specify a solution).
Running
4) sudo apt --fix-broken install
will lead to other errors:
sleep: cannot read realtime clock: Invalid argument
dpkg: error processing package libc6:amd64 (--configure):
installed libc6:amd64 package post-installation script subprocess returned error exit status 1
Errors were encountered while processing:
libc6:amd64
E: Sub-process /usr/bin/dpkg returned an error code (1)
And so on ad infinitum.
5) To fix, run the following commands:
sudo -i
>sudo mv /bin/sleep /bin/sleep~;
touch /bin/sleep;
>chmod +x /bin/sleep
Then try again
>sudo apt --fix-broken install
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Why Linux does not see Wi-Fi adapters in WSL ?
Linux in WSL does not have direct access to the computer hardware. For this reason, it is not possible to use Wi-Fi adapters, even USB Wi-Fi adapters, in WSL.
1) Can Linux in WSL use graphics cards to perform computation
> At the moment Linux in WSL cannot use GPUs, but they promise to add this feature later.
2) Error in WSL (Kali Linux, Ubuntu) "sleep: cannot read realtime clock: Invalid argument"
An error can occur when trying to install the program:
> sudo apt install ΠΠΠΠΠ’
Or when updating packages and the system:
> sudo apt update && sudo apt full-upgrade -y
3) These commands will output something like the following:
E: Unmet dependencies. Try 'apt --fix-broken install' with no packages (or specify a solution).
Running
4) sudo apt --fix-broken install
will lead to other errors:
sleep: cannot read realtime clock: Invalid argument
dpkg: error processing package libc6:amd64 (--configure):
installed libc6:amd64 package post-installation script subprocess returned error exit status 1
Errors were encountered while processing:
libc6:amd64
E: Sub-process /usr/bin/dpkg returned an error code (1)
And so on ad infinitum.
5) To fix, run the following commands:
sudo -i
>sudo mv /bin/sleep /bin/sleep~;
touch /bin/sleep;
>chmod +x /bin/sleep
Then try again
>sudo apt --fix-broken install
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦why a beginer should Learn multiple programming languages ?
#forBeginers
As we all know, in order to break the rules, you need to know them first. The same principle works for programming: in order to crack someone's code, you must know how programming languages ββwork and be able to program yourself. Some of the more recommended languages ββfor learning:
A) Python: This is perhaps the best language for web development. Two large frameworks are written on it, on which a huge number of web applications have been created, these are Flask and Django. The language is well built and well documented. Most importantly, it is very easy to learn. By the way, many developers use Python to create simple and complete automation.
B) C ++: a language used in industrial programming. It is taught in schools and universities. Servers are written on it. I recommend that you start learning languages ββwith it, since it contains all the principles of OOP. Having learned to work with it, you can easily master other languages.
C) JavaScript, JQuery: Basically almost all sites use JS and JQuery. You need to be aware that these sites depend on JS, such as password forms. After all, some sites do not allow you to select and copy some information, do not allow you to download a file or view the content, however, to do this, it is enough to disable JS in the browser. Well, to disable JavaScript, you need to know: a) in what situations the work (protection) of the site depends on it; b) how JavaScript is connected and in what ways you can block scripts.
D) SQL: the fun part. All passwords, personal data are stored in databases written in SQL. The most common database management system is MySQL. To understand how to use MySQL injection, you need to know what MySQL injection is. To grasp the essence of MySQL injection, you need to know what MySQL queries are, what the syntax of these queries is, what the database structure is, how data is stored, what tables are, etc.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦why a beginer should Learn multiple programming languages ?
#forBeginers
As we all know, in order to break the rules, you need to know them first. The same principle works for programming: in order to crack someone's code, you must know how programming languages ββwork and be able to program yourself. Some of the more recommended languages ββfor learning:
A) Python: This is perhaps the best language for web development. Two large frameworks are written on it, on which a huge number of web applications have been created, these are Flask and Django. The language is well built and well documented. Most importantly, it is very easy to learn. By the way, many developers use Python to create simple and complete automation.
B) C ++: a language used in industrial programming. It is taught in schools and universities. Servers are written on it. I recommend that you start learning languages ββwith it, since it contains all the principles of OOP. Having learned to work with it, you can easily master other languages.
C) JavaScript, JQuery: Basically almost all sites use JS and JQuery. You need to be aware that these sites depend on JS, such as password forms. After all, some sites do not allow you to select and copy some information, do not allow you to download a file or view the content, however, to do this, it is enough to disable JS in the browser. Well, to disable JavaScript, you need to know: a) in what situations the work (protection) of the site depends on it; b) how JavaScript is connected and in what ways you can block scripts.
D) SQL: the fun part. All passwords, personal data are stored in databases written in SQL. The most common database management system is MySQL. To understand how to use MySQL injection, you need to know what MySQL injection is. To grasp the essence of MySQL injection, you need to know what MySQL queries are, what the syntax of these queries is, what the database structure is, how data is stored, what tables are, etc.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Quickbooks Basic to Advance Training Realtime Projects new
https://mega.nz/folder/0IwDkYRR#LMzVjwgQvQv3gEKbh6STZQ
https://mega.nz/folder/0IwDkYRR#LMzVjwgQvQv3gEKbh6STZQ
mega.nz
2.12 GB folder on MEGA
159 files
Full BURPSUITE COURSE
https://drive.google.com/uc?id=1wooMCvucNUPzbtZO5pLsQR0jIiV3lGA5&export=download
https://drive.google.com/uc?id=1wooMCvucNUPzbtZO5pLsQR0jIiV3lGA5&export=download