Forwarded from Backup Legal Mega
Learn hacking using android from scratch
By z security
Onedrive link:
https://mygavilan-my.sharepoint.com/:f:/g/personal/kali_masi_my_gavilan_edu/EqHWjlOZBipFqojj04ZabS4B7rfBYUEqDe495Q5Q6QbXHA?e=MWn23f
By z security
Onedrive link:
https://mygavilan-my.sharepoint.com/:f:/g/personal/kali_masi_my_gavilan_edu/EqHWjlOZBipFqojj04ZabS4B7rfBYUEqDe495Q5Q6QbXHA?e=MWn23f
Forwarded from UNDERCODE HACKING
Reverse_Engineering_WannaCry_Ransomware_using_Ghidra_β_Finding_the.pdf
5.2 MB
RANSOMWARE TUTORIAL
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Hacker organization Keeper tracking: invaded 570 home appliance business websites for more than 7 million yuan in three years
#News
> The hacker group "Keeper" stated that it was responsible for the data breaches of more than 570 online e-commerce websites in the past three years. The hacker's trick to prevent it is to invade the background of the mall, modify the source code, embed malicious scripts, record the details of the payment card of the shopper when paying, and so on.
>This type of cyber attack is also called "web skimming/e-skimming" (web looting). In a report released today by threat intelligence company Gemini Advisory, the Keeper organization has already committed these cybercrimes at least in April 2017, and is still at large.
> Gemini said the company tracked the hacker's activities. This is mainly because the organization's back-end server uses the same control panel to facilitate the management of payment card details collected from the e-commerce platform.
> Through the identification of the background panel, Gemini tracked all historical activities of Keeper. These include the location of the back-end panel in the past, malicious URLs used to build hacker basic settings, and malicious scripts that Keeper inserts into online stores.
> Gemini said that many of the 570 e-commerce platforms attacked by hackers are small and medium-sized. According to Amazon's Alexa traffic ranking, Gemini said that the vast majority of stores operate on a small scale. However, Keeper will also launch attacks on some large e-commerce platforms. The following is a list of the top e-commerce platforms that have been attacked.
π¦Hacker organization Keeper tracking: invaded 570 home appliance business websites for more than 7 million yuan in three years
#News
> The hacker group "Keeper" stated that it was responsible for the data breaches of more than 570 online e-commerce websites in the past three years. The hacker's trick to prevent it is to invade the background of the mall, modify the source code, embed malicious scripts, record the details of the payment card of the shopper when paying, and so on.
>This type of cyber attack is also called "web skimming/e-skimming" (web looting). In a report released today by threat intelligence company Gemini Advisory, the Keeper organization has already committed these cybercrimes at least in April 2017, and is still at large.
> Gemini said the company tracked the hacker's activities. This is mainly because the organization's back-end server uses the same control panel to facilitate the management of payment card details collected from the e-commerce platform.
> Through the identification of the background panel, Gemini tracked all historical activities of Keeper. These include the location of the back-end panel in the past, malicious URLs used to build hacker basic settings, and malicious scripts that Keeper inserts into online stores.
> Gemini said that many of the 570 e-commerce platforms attacked by hackers are small and medium-sized. According to Amazon's Alexa traffic ranking, Gemini said that the vast majority of stores operate on a small scale. However, Keeper will also launch attacks on some large e-commerce platforms. The following is a list of the top e-commerce platforms that have been attacked.
>According to background data retrieval, Keeper collected details of approximately 184,000 payment cards from July 2018 to April 2019. In the report shared today, Gemini estimates that the organization has collected information on nearly 700,000 payment cards.
>The report states: "Given the current dark web median price of each damaged Card Not Present (CNP) card is $10, the group may have obtained up to 700 by stealing and selling damaged payment cards throughout its life cycle. More than ten thousand dollars in income."
#news
β β β Uππ»βΊπ«6π¬πβ β β β
>The report states: "Given the current dark web median price of each damaged Card Not Present (CNP) card is $10, the group may have obtained up to 700 by stealing and selling damaged payment cards throughout its life cycle. More than ten thousand dollars in income."
#news
β β β Uππ»βΊπ«6π¬πβ β β β
Forwarded from Backup Legal Mega
π¦Professional Trader Training Program β Opentrader -4.32 GB-
https://www.opentrader.com/training/professional-training-program
https://mega.nz/#F!gBAiESIS!oMUgppI6I0T9Cu4yKnYddg
https://www.opentrader.com/training/professional-training-program
https://mega.nz/#F!gBAiESIS!oMUgppI6I0T9Cu4yKnYddg
mega.nz
MEGA provides free cloud storage with convenient and powerful always-on privacy. Claim your free 20GB now
β β β Uππ»βΊπ«6π¬πβ β β β
π¦crackle cracks BLE Encryption (AKA Bluetooth Smart).
crackle exploits a flaw in the BLE pairing process that allows an attacker to guess or very quickly brute force the TK (Temporary Key). With the TK and other data collected from the pairing process, the STK (Short Term Key) and later the LTK (Long Term Key) can be collected.
With the STK and LTK, all communications between the master and the slave can be decrypted.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£download or clone https://github.com/mikeryan/crackle
2οΈβ£In Crack TK mode, crackle requires a PCAP file that contains a BLE pairing event. The best way to generate such a file is to use an Ubertooth to capture a pairing event between a master and a slave.
3οΈβ£To check if your PCAP file contains all the necessary packets, run crackle with the -i option:
> crackle -i <file.pcap>
4οΈβ£crackle will analyze each connection in the input file and output the results of its analysis to stdout. If you have all the components of a pairing conversation, the output will look like this:
> Analyzing connection 0:
xx:xx:xx:xx:xx:xx (public) -> yy:yy:yy:yy:yy:yy (p
.........
5οΈβ£To decrypt all packets, add the -o option:
> crackle -i <file.pcap> -o <output.pcap>
π¦FOR MORE INFO https://github.com/mikeryan/crackle/blob/master/FAQ.md
> https://lacklustre.net/bluetooth/crackle-sample.tgz
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦crackle cracks BLE Encryption (AKA Bluetooth Smart).
crackle exploits a flaw in the BLE pairing process that allows an attacker to guess or very quickly brute force the TK (Temporary Key). With the TK and other data collected from the pairing process, the STK (Short Term Key) and later the LTK (Long Term Key) can be collected.
With the STK and LTK, all communications between the master and the slave can be decrypted.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£download or clone https://github.com/mikeryan/crackle
2οΈβ£In Crack TK mode, crackle requires a PCAP file that contains a BLE pairing event. The best way to generate such a file is to use an Ubertooth to capture a pairing event between a master and a slave.
3οΈβ£To check if your PCAP file contains all the necessary packets, run crackle with the -i option:
> crackle -i <file.pcap>
4οΈβ£crackle will analyze each connection in the input file and output the results of its analysis to stdout. If you have all the components of a pairing conversation, the output will look like this:
> Analyzing connection 0:
xx:xx:xx:xx:xx:xx (public) -> yy:yy:yy:yy:yy:yy (p
.........
5οΈβ£To decrypt all packets, add the -o option:
> crackle -i <file.pcap> -o <output.pcap>
π¦FOR MORE INFO https://github.com/mikeryan/crackle/blob/master/FAQ.md
> https://lacklustre.net/bluetooth/crackle-sample.tgz
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
GitHub
GitHub - mikeryan/crackle: Crack and decrypt BLE encryption
Crack and decrypt BLE encryption. Contribute to mikeryan/crackle development by creating an account on GitHub.
Forwarded from Backup Legal Mega
mega.nz
File folder on MEGA
β β β Uππ»βΊπ«6π¬πβ β β β
π¦TOR SERVER MANUA INSTALL :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
Install torctl on Kali Linux
1) sudo apt install tor macchanger secure-delete
2) git clone https://github.com/BlackArch/torctl
3) cd torctl
4) sudo mv service/* /etc/systemd/system/
5) Sudo mv bash-completion/torctl /usr/share/bash-completion/completions/torctl
6) sed -i 's/start_service iptables//' torctl
7) sed -i 's/TOR_UID="tor"/TOR_UID="debian-tor"/' torctl
8) sudo mv torctl /usr/bin/torctl
9) cd .. && rm -rf torctl/
10) torctl --help
11) Install torctl in BlackArch
12) sudo pacman -S torctl
13) To find out your current IP, do:
> torctl ip
14) To start Tor as a transparent proxy:
15) sudo torctl start
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦TOR SERVER MANUA INSTALL :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
Install torctl on Kali Linux
1) sudo apt install tor macchanger secure-delete
2) git clone https://github.com/BlackArch/torctl
3) cd torctl
4) sudo mv service/* /etc/systemd/system/
5) Sudo mv bash-completion/torctl /usr/share/bash-completion/completions/torctl
6) sed -i 's/start_service iptables//' torctl
7) sed -i 's/TOR_UID="tor"/TOR_UID="debian-tor"/' torctl
8) sudo mv torctl /usr/bin/torctl
9) cd .. && rm -rf torctl/
10) torctl --help
11) Install torctl in BlackArch
12) sudo pacman -S torctl
13) To find out your current IP, do:
> torctl ip
14) To start Tor as a transparent proxy:
15) sudo torctl start
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
GitHub
GitHub - BlackArch/torctl: Script to redirect all traffic through tor network including dns queries for anonymizing entire system
Script to redirect all traffic through tor network including dns queries for anonymizing entire system - BlackArch/torctl
Forwarded from Backup Legal Mega
Modern HTML & CSS From The Beginning β9.18 GB-
https://www.udemy.com/course/modern-html-css-from-the-beginning/
https://mega.nz/#F!A4AjiC7A!jGX2AFthSBCr9dALXIYVZg
https://www.udemy.com/course/modern-html-css-from-the-beginning/
https://mega.nz/#F!A4AjiC7A!jGX2AFthSBCr9dALXIYVZg
Udemy
Modern HTML & CSS From The Beginning 2.0 (2024 Revamp)
Build modern responsive websites with HTML and CSS - Learning modules, mini-projects and 3 full websites
β β β Uππ»βΊπ«6π¬πβ β β β
π¦ North Korean hackers are plundering credit card details from online shoppers
#NEWS
>Hackers related to the infamous North Korean Lazarus Group are breaking into online stores and stealing customer credit card details when customers visit the checkout page. These attacks, known as "web looting" or "Magecart attacks," have been ongoing since May 2019 and attacked large retailers such as international fashion chain Claire's.
>Dutch cybersecurity company SanSec reported these attacks. It writes that digital predatory technology has been growing since 2015, and although traditionally used by Russian and Indonesian-language hacker organizations, North Korean criminals supported by the government are now intercepting credit card details in online stores.
>The attack involves obtaining access to the back-end server of the online store, usually by sending a booby-mail to employees to obtain their password. Hackers sneaked into the jewelry store Claire's website in April and June. Once the website is compromised, the malicious script will be loaded on the checkout page and stolen when the credit card details are entered into the form. Once the transaction is completed, the intercepted data will be sent to a collection server controlled by the hacker organization and sold on the dark web.
>The group has established a global penetration network to profit from predatory operations. This includes hijacking and reusing legitimate websites, disguising as criminal activity, and delivering stolen assets. A model agency in Milan, an antique music store in Tehran, and a family-run bookstore in New Jersey are all part of the network.
>Researchers at Sansec discovered that there was a link between the activity and previous North Korean hacking operations. The evidence points to Hidden Cobra, also known as the Lazarus Group, which was behind the 2014 Sony Pictures hacking and the Bangladesh Bank robbery in 2016, and is widely regarded as the initiator of WannaCry malware.
#news
β β β Uππ»βΊπ«6π¬πβ β β β
π¦ North Korean hackers are plundering credit card details from online shoppers
#NEWS
>Hackers related to the infamous North Korean Lazarus Group are breaking into online stores and stealing customer credit card details when customers visit the checkout page. These attacks, known as "web looting" or "Magecart attacks," have been ongoing since May 2019 and attacked large retailers such as international fashion chain Claire's.
>Dutch cybersecurity company SanSec reported these attacks. It writes that digital predatory technology has been growing since 2015, and although traditionally used by Russian and Indonesian-language hacker organizations, North Korean criminals supported by the government are now intercepting credit card details in online stores.
>The attack involves obtaining access to the back-end server of the online store, usually by sending a booby-mail to employees to obtain their password. Hackers sneaked into the jewelry store Claire's website in April and June. Once the website is compromised, the malicious script will be loaded on the checkout page and stolen when the credit card details are entered into the form. Once the transaction is completed, the intercepted data will be sent to a collection server controlled by the hacker organization and sold on the dark web.
>The group has established a global penetration network to profit from predatory operations. This includes hijacking and reusing legitimate websites, disguising as criminal activity, and delivering stolen assets. A model agency in Milan, an antique music store in Tehran, and a family-run bookstore in New Jersey are all part of the network.
>Researchers at Sansec discovered that there was a link between the activity and previous North Korean hacking operations. The evidence points to Hidden Cobra, also known as the Lazarus Group, which was behind the 2014 Sony Pictures hacking and the Bangladesh Bank robbery in 2016, and is widely regarded as the initiator of WannaCry malware.
#news
β β β Uππ»βΊπ«6π¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦hack.chat
hack.chat is a minimal, distraction-free, accountless, logless, disappearing chat service which is easily deployable as your own service. The current client comes bundled with LaTeX rendering provided by KaTeX and code syntax highlighting provided by highlight.js
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£Clone the repository: git clone https://github.com/hack-chat/main.git
2οΈβ£Change the directory: cd main
3οΈβ£Install the dependencies: npm install
4οΈβ£Launch: npm start
5οΈβ£If you change the websocketPort option during the config setup then these changes will need to be reflected on line 60 of client.js.
6οΈβ£The commands are to be sent through a websocket to the URL wss://hack.chat/chat-ws (everything sent and received are JSON). If you are sending messages locally or to another domain, replace 'hack.chat' with the respective domain. If you're running your own instance of hack.chat, you can retain backwards-compatibility in order to ensure that software created for the main server will work on yours too.
All commands sent must be JSON objects with the command specified in the "cmd" key. For example:
{
"cmd": "join",
"channel": "programming",
"nick": "john#doe"
}
7οΈβ£FOR MORE USAGE :
https://github.com/hack-chat/main/blob/master/documentation/DOCUMENTATION.md
ENJOYβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦hack.chat
hack.chat is a minimal, distraction-free, accountless, logless, disappearing chat service which is easily deployable as your own service. The current client comes bundled with LaTeX rendering provided by KaTeX and code syntax highlighting provided by highlight.js
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£Clone the repository: git clone https://github.com/hack-chat/main.git
2οΈβ£Change the directory: cd main
3οΈβ£Install the dependencies: npm install
4οΈβ£Launch: npm start
5οΈβ£If you change the websocketPort option during the config setup then these changes will need to be reflected on line 60 of client.js.
6οΈβ£The commands are to be sent through a websocket to the URL wss://hack.chat/chat-ws (everything sent and received are JSON). If you are sending messages locally or to another domain, replace 'hack.chat' with the respective domain. If you're running your own instance of hack.chat, you can retain backwards-compatibility in order to ensure that software created for the main server will work on yours too.
All commands sent must be JSON objects with the command specified in the "cmd" key. For example:
{
"cmd": "join",
"channel": "programming",
"nick": "john#doe"
}
7οΈβ£FOR MORE USAGE :
https://github.com/hack-chat/main/blob/master/documentation/DOCUMENTATION.md
ENJOYβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - hack-chat/main: a minimal, distraction-free chat application
a minimal, distraction-free chat application. Contribute to hack-chat/main development by creating an account on GitHub.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to install Kali Linux with Termux on Android-Root original meth :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£Get permission pkg install proot
> termux-chroot
2οΈβ£Install git and get atilo
> pkg install git
3οΈβ£git clone https://github.com/YadominJinta/atilo
4οΈβ£Go to atilo and get permission
> cd atilo/
5οΈβ£chmod +x atilo
6οΈβ£Install kali ./atilo install kali
well done
ENJOYβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to install Kali Linux with Termux on Android-Root original meth :
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£Get permission pkg install proot
> termux-chroot
2οΈβ£Install git and get atilo
> pkg install git
3οΈβ£git clone https://github.com/YadominJinta/atilo
4οΈβ£Go to atilo and get permission
> cd atilo/
5οΈβ£chmod +x atilo
6οΈβ£Install kali ./atilo install kali
well done
ENJOYβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - YadominJinta/atilo: Linux installer for termux
Linux installer for termux. Contribute to YadominJinta/atilo development by creating an account on GitHub.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦full Install graphical interface for Termux original methodes
#forbeginers
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£get termux playstore- get lastest version
2οΈβ£Update the source, fonts, interface, etc. There are very detailed and detailed tutorials online, you can search for a search, there are many, because there is no way to say too much in a hurry.
3οΈβ£How install desktop for termux ?
> Install various packages
1) Openbox (window manager)
Openbox is a lightweight window manager running on GNU/Linux with X11. Openbox uses the GPL protocol to open source code and is free and free software. Openbox is based on Blackbox, which is considered one of the original window managers (ie, the code itself). [From Baidu Encyclopedia]
2) PyPanel is a lightweight panel/task bar written in Python and C for the X11 window manager. It can be easily customized to match any desktop theme or taste. PyPanel works with EWMH compatible WMS (Openbox, PekWM, FVWM, etc.). And it is distributed under the GNU General Public License v2.
3) xorg-xsetroot Description: A classic X utility that sets the root window background to a given mode or color
4) PyXDG is a
unique python terminal emulator for accessing freedesktop.org
5) Install tigervnc (you can also install other remote desktops, take tigervnc as an example) to realize remote desktop control
> pkg install tigervnc
> vi startvnc
6οΈβ£Write a configuration file :
#!/bin/bash -e
export DISPLAY=:10
Xvnc --SecurityTypes=None $DISPLAY &
sleep 1s
openbox-session
xsetroot -solid gray
pypanel
aterm
startxfce4
7οΈβ£chmod +x startvnc
8οΈβ£./startvnc
You can connect to the remote desktop boringly! ! ! !
Sprinkle flowers Sprinkle flowers ~~
Click Android vnc and
enter localhost:5910
ENJOYβ€οΈππ»
written by
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦full Install graphical interface for Termux original methodes
#forbeginers
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£get termux playstore- get lastest version
2οΈβ£Update the source, fonts, interface, etc. There are very detailed and detailed tutorials online, you can search for a search, there are many, because there is no way to say too much in a hurry.
3οΈβ£How install desktop for termux ?
> Install various packages
1) Openbox (window manager)
Openbox is a lightweight window manager running on GNU/Linux with X11. Openbox uses the GPL protocol to open source code and is free and free software. Openbox is based on Blackbox, which is considered one of the original window managers (ie, the code itself). [From Baidu Encyclopedia]
2) PyPanel is a lightweight panel/task bar written in Python and C for the X11 window manager. It can be easily customized to match any desktop theme or taste. PyPanel works with EWMH compatible WMS (Openbox, PekWM, FVWM, etc.). And it is distributed under the GNU General Public License v2.
3) xorg-xsetroot Description: A classic X utility that sets the root window background to a given mode or color
4) PyXDG is a
unique python terminal emulator for accessing freedesktop.org
5) Install tigervnc (you can also install other remote desktops, take tigervnc as an example) to realize remote desktop control
> pkg install tigervnc
> vi startvnc
6οΈβ£Write a configuration file :
#!/bin/bash -e
export DISPLAY=:10
Xvnc --SecurityTypes=None $DISPLAY &
sleep 1s
openbox-session
xsetroot -solid gray
pypanel
aterm
startxfce4
7οΈβ£chmod +x startvnc
8οΈβ£./startvnc
You can connect to the remote desktop boringly! ! ! !
Sprinkle flowers Sprinkle flowers
enter localhost:5910
ENJOYβ€οΈππ»
written by
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
Analysing meterpreter payload with Ghidra.pdf
1.1 MB
meterpreter payload with Ghidra (analysing)
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦GOOD NEW RESOURCES FOR PROFITE & INCREASING YOUR SKILLS :
Hopper's Roppers Security Training | Four free self-paced courses on Computing Fundamentals, Security, Capture the Flags, and a Practical Skills Bootcamp that help beginners build a strong base of foundational knowledge. Designed to prepare for students for whatever they need to learn next.
Learning Exploitation with Offensive Computer Security 2.0 | blog-style instruction, includes: slides, videos, homework, discussion. No login required.
Mind Maps | Information Security related Mind Maps
MIT OCW 6.858 Computer Systems Security | academic content, well organized, full-semester course, includes assigned readings, lectures, videos, required lab files.
OffensiveComputerSecurity | academic content, full semester course including 27 lecture videos with slides and assign readings
OWASP top 10 web security risks | free courseware, requires account
SecurityTube | tube-styled content, "megaprimer" videos covering various topics, no readable content on site.
Seed Labs | academic content, well organized, featuring lab videos, tasks, needed code files, and recommended readings
TryHackMe | Designed prebuilt challenges which include virtual machines (VM) hosted in the cloud ready to be deployed
ENJOYβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦GOOD NEW RESOURCES FOR PROFITE & INCREASING YOUR SKILLS :
Hopper's Roppers Security Training | Four free self-paced courses on Computing Fundamentals, Security, Capture the Flags, and a Practical Skills Bootcamp that help beginners build a strong base of foundational knowledge. Designed to prepare for students for whatever they need to learn next.
Learning Exploitation with Offensive Computer Security 2.0 | blog-style instruction, includes: slides, videos, homework, discussion. No login required.
Mind Maps | Information Security related Mind Maps
MIT OCW 6.858 Computer Systems Security | academic content, well organized, full-semester course, includes assigned readings, lectures, videos, required lab files.
OffensiveComputerSecurity | academic content, full semester course including 27 lecture videos with slides and assign readings
OWASP top 10 web security risks | free courseware, requires account
SecurityTube | tube-styled content, "megaprimer" videos covering various topics, no readable content on site.
Seed Labs | academic content, well organized, featuring lab videos, tasks, needed code files, and recommended readings
TryHackMe | Designed prebuilt challenges which include virtual machines (VM) hosted in the cloud ready to be deployed
ENJOYβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
www.hoppersroppers.org
Roppers Security Courses
Free training on computing and security fundamentals.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦reactjs npm commun error & fix :
D:\vuedemo\day23\react-study>npm start
npm ERR! code ELIFECYCLE
npm ERR! errno 1
npm ERR! react-study@0.1.0 start:
npm ERR!
WELL DONE !
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦reactjs npm commun error & fix :
D:\vuedemo\day23\react-study>npm start
> react-study@0.1.0 start D:\vuedemo\day23\react-study
> react-scripts start
There might be a problem with the project dependency tree.
It is likely not a bug in Create React App, but something you need to fix locally.
π¦The react-scripts package provided by Create React App requires a dependency: "babel-eslint": "10.1.0"
Don't try to install it manually: your package manager does it automatically.
However, a different version of babel-eslint was detected higher up in the tree:
D:\node_modules\babel..
Manually installing incompatible versions is known to cause hard-to-debug issues.
If you would prefer to ignore this check, add SKIP_PREFLIGHT_CHECK=true to an .env file in your project.
That will permanently disable this message but you might encounter other issues.
π¦ To fix the dependency tree, try following the steps below in the exact order: 1) Delete package-lock.json (not package.json!) and/or yarn.lock in your project folder.
2) Delete node_modules in your project folder.
3) Remove "babel-eslint" from dependencies and/or devDependencies in the package.json file in your project folder.
4) Run npm install or yarn, depending on the package manager you use.
In most cases, this should be enough to fix the problem.
If this has not helped, there are a few other things you can try:
5) If you used npm, install yarn (http://yarnpkg.com/) and repeat the above steps with it instead.
This may help because npm has known issues with package hoisting which may get resolved in future versions.
6) Check if D:\node_modules\babel-eslint is outside your project directory.
For example, you might have accidentally installed something in your home folder.
7) Try running npm ls babel-eslint in your project folder.
This will tell you which other package (apart from the expected react-scripts) installed babel-eslint.
If nothing else helps, add SKIP_PREFLIGHT_CHECK=true to an .env file in your project.
That would permanently disable this preflight check in case you want to proceed anyway.
P.S. We know this message is long but please read the steps above :-) We hope you find them helpful!npm ERR! code ELIFECYCLE
npm ERR! errno 1
npm ERR! react-study@0.1.0 start:
react-scripts start
npm ERR! Exit status 1npm ERR!
WELL DONE !
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β