Forwarded from UNDERCODE COMMUNITY
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Memory #Analysis Tools topic 2020 :
[Evolve](https://github.com/JamesHabben/evolve) - Web interface for the Volatility Memory Forensics Framework
inVtero.net - Advanced memory analysis for Windows x64 with nested hypervisor support
[KnTList](http://www.gmgsystemsinc.com/knttools/) - Computer memory analysis tools
LiME - LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices
[Memoryze](https://www.fireeye.com/services/freeware/memoryze.html) - Memoryze by Mandiant is a free memory forensic software that helps incident responders find evil in live memory. Memoryze can acquire and/or analyze memory images, and on live systems, can include the paging file in its analysis
Memoryze for Mac - Memoryze for Mac is Memoryze but then for Macs. A lower number of features, however
[Rekall](http://www.rekall-forensic.com/) - Open source tool (and library) for the extraction of digital artifacts from volatile memory (RAM) samples
Responder PRO - Responder PRO is the industry standard physical memory and automated malware analysis solution
[Volatility](https://github.com/volatilityfoundation/volatility) - An advanced memory forensics framework
VolatilityBot - VolatilityBot is an automation tool for researchers cuts all the guesswork and manual tasks out of the binary extraction phase, or to help the investigator in the first steps of performing a memory analysis investigation
[VolDiff](https://github.com/aim4r/VolDiff) - Malware Memory Footprint Analysis based on Volatility
WindowsSCOPE - another memory forensics and reverse engineering tool used for analyzing volatile memory. It is basically used for reverse engineering of malwares. It provides the capability of analyzing the Windows kernel, drivers, DLLs, virtual and physical memory
> git resources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Memory #Analysis Tools topic 2020 :
[Evolve](https://github.com/JamesHabben/evolve) - Web interface for the Volatility Memory Forensics Framework
inVtero.net - Advanced memory analysis for Windows x64 with nested hypervisor support
[KnTList](http://www.gmgsystemsinc.com/knttools/) - Computer memory analysis tools
LiME - LiME (formerly DMD) is a Loadable Kernel Module (LKM), which allows the acquisition of volatile memory from Linux and Linux-based devices
[Memoryze](https://www.fireeye.com/services/freeware/memoryze.html) - Memoryze by Mandiant is a free memory forensic software that helps incident responders find evil in live memory. Memoryze can acquire and/or analyze memory images, and on live systems, can include the paging file in its analysis
Memoryze for Mac - Memoryze for Mac is Memoryze but then for Macs. A lower number of features, however
[Rekall](http://www.rekall-forensic.com/) - Open source tool (and library) for the extraction of digital artifacts from volatile memory (RAM) samples
Responder PRO - Responder PRO is the industry standard physical memory and automated malware analysis solution
[Volatility](https://github.com/volatilityfoundation/volatility) - An advanced memory forensics framework
VolatilityBot - VolatilityBot is an automation tool for researchers cuts all the guesswork and manual tasks out of the binary extraction phase, or to help the investigator in the first steps of performing a memory analysis investigation
[VolDiff](https://github.com/aim4r/VolDiff) - Malware Memory Footprint Analysis based on Volatility
WindowsSCOPE - another memory forensics and reverse engineering tool used for analyzing volatile memory. It is basically used for reverse engineering of malwares. It provides the capability of analyzing the Windows kernel, drivers, DLLs, virtual and physical memory
> git resources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - JamesHabben/evolve: Web interface for the Volatility Memory Forensics Framework
Web interface for the Volatility Memory Forensics Framework - JamesHabben/evolve
Forwarded from UNDERCODE COMMUNITY
Pastebin
X-180 NORDVPN PREM - Pastebin.com
Forwarded from UNDERCODE COMMUNITY
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Evil BTS's,Hack 2G/3G/4G :
OpenBTS software is a Linux application that uses a software-defined radio to present a standard 3GPP air interface to user devices, while simultaneously presenting those devices as SIP endpoints to the Internet
YateBTS is a software implementation of a GSM/GPRS radio access network based on Yate and is compatible with both 2.5G and 4G core networks comprised in our YateUCN unified core network server. Resiliency, customization and technology independence are the main attributes of YateBTS
BladRF and YateBTS Configuration
srsLTE is a free and open-source LTE software suite developed by SRS (www.softwareradiosystems.com)
> git resources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Evil BTS's,Hack 2G/3G/4G :
OpenBTS software is a Linux application that uses a software-defined radio to present a standard 3GPP air interface to user devices, while simultaneously presenting those devices as SIP endpoints to the Internet
YateBTS is a software implementation of a GSM/GPRS radio access network based on Yate and is compatible with both 2.5G and 4G core networks comprised in our YateUCN unified core network server. Resiliency, customization and technology independence are the main attributes of YateBTS
BladRF and YateBTS Configuration
srsLTE is a free and open-source LTE software suite developed by SRS (www.softwareradiosystems.com)
> git resources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
YateBTS - LTE & GSM mobile network components for MNO & MVNO
YateBTS - LTE & GSM mobile network components for MNO & MVNO.
LTE & GSM mobile network nodes, for radio like BTS, MSC/VLR and EnodeB, for core network like HSS/HLR, EPC. Try now GSM open source, YateBTS for FREE.
Forwarded from Backup Legal Mega
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦CCTV HACKING TERMUX-LINUX :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½
Mode Of Execution:
1)
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦CCTV HACKING TERMUX-LINUX :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½
Mode Of Execution:
1)
apt-get install python3
2) apt-get install git
3) git clone https://github.com/AngelSecurityTeam/Cam-Hackers
4) pip3 install requests
5) cd Cam-Hackers
6) python3 cam-hackers.py
β
@UndercodeTesting@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Those tutorials related to cellular hacking (focus on data-3g-4g ) & jamming :)
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
#Exploit Development References
π¦Tutorials and Examples :
* [Shellcode Tutorial](http://www.vividmachines.com/shellcode/shellcode.html)
* [Shellcode Examples](http://shell-storm.org/shellcode/)
* [Exploit Writing Tutorials](https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/)
* [Exploit Exercises](https://exploit-exercises.com/)
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
#Exploit Development References
π¦Tutorials and Examples :
* [Shellcode Tutorial](http://www.vividmachines.com/shellcode/shellcode.html)
* [Shellcode Examples](http://shell-storm.org/shellcode/)
* [Exploit Writing Tutorials](https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/)
* [Exploit Exercises](https://exploit-exercises.com/)
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦The Complete Foundation Stock Trading Course β3.99 GB
https://www.udemy.com/course/foundation-course/
https://mega.nz/folder/QJJDFK6a#6QJKj9KntES3nQgKlV4j1Q
https://www.udemy.com/course/foundation-course/
https://mega.nz/folder/QJJDFK6a#6QJKj9KntES3nQgKlV4j1Q
Udemy
Learn the Foundations of Stock Market Trading Course Online
Learn To Trade The Stock Market. #1 Trading course. Inc: Technical Analysis, Candlesticks, Stocks, Day Trading +++