Analysing meterpreter payload with Ghidra.pdf
1.1 MB
meterpreter payload with Ghidra (analysing)
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦GOOD NEW RESOURCES FOR PROFITE & INCREASING YOUR SKILLS :
Hopper's Roppers Security Training | Four free self-paced courses on Computing Fundamentals, Security, Capture the Flags, and a Practical Skills Bootcamp that help beginners build a strong base of foundational knowledge. Designed to prepare for students for whatever they need to learn next.
Learning Exploitation with Offensive Computer Security 2.0 | blog-style instruction, includes: slides, videos, homework, discussion. No login required.
Mind Maps | Information Security related Mind Maps
MIT OCW 6.858 Computer Systems Security | academic content, well organized, full-semester course, includes assigned readings, lectures, videos, required lab files.
OffensiveComputerSecurity | academic content, full semester course including 27 lecture videos with slides and assign readings
OWASP top 10 web security risks | free courseware, requires account
SecurityTube | tube-styled content, "megaprimer" videos covering various topics, no readable content on site.
Seed Labs | academic content, well organized, featuring lab videos, tasks, needed code files, and recommended readings
TryHackMe | Designed prebuilt challenges which include virtual machines (VM) hosted in the cloud ready to be deployed
ENJOYβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦GOOD NEW RESOURCES FOR PROFITE & INCREASING YOUR SKILLS :
Hopper's Roppers Security Training | Four free self-paced courses on Computing Fundamentals, Security, Capture the Flags, and a Practical Skills Bootcamp that help beginners build a strong base of foundational knowledge. Designed to prepare for students for whatever they need to learn next.
Learning Exploitation with Offensive Computer Security 2.0 | blog-style instruction, includes: slides, videos, homework, discussion. No login required.
Mind Maps | Information Security related Mind Maps
MIT OCW 6.858 Computer Systems Security | academic content, well organized, full-semester course, includes assigned readings, lectures, videos, required lab files.
OffensiveComputerSecurity | academic content, full semester course including 27 lecture videos with slides and assign readings
OWASP top 10 web security risks | free courseware, requires account
SecurityTube | tube-styled content, "megaprimer" videos covering various topics, no readable content on site.
Seed Labs | academic content, well organized, featuring lab videos, tasks, needed code files, and recommended readings
TryHackMe | Designed prebuilt challenges which include virtual machines (VM) hosted in the cloud ready to be deployed
ENJOYβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
www.hoppersroppers.org
Roppers Security Courses
Free training on computing and security fundamentals.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦reactjs npm commun error & fix :
D:\vuedemo\day23\react-study>npm start
npm ERR! code ELIFECYCLE
npm ERR! errno 1
npm ERR! react-study@0.1.0 start:
npm ERR!
WELL DONE !
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦reactjs npm commun error & fix :
D:\vuedemo\day23\react-study>npm start
> react-study@0.1.0 start D:\vuedemo\day23\react-study
> react-scripts start
There might be a problem with the project dependency tree.
It is likely not a bug in Create React App, but something you need to fix locally.
π¦The react-scripts package provided by Create React App requires a dependency: "babel-eslint": "10.1.0"
Don't try to install it manually: your package manager does it automatically.
However, a different version of babel-eslint was detected higher up in the tree:
D:\node_modules\babel..
Manually installing incompatible versions is known to cause hard-to-debug issues.
If you would prefer to ignore this check, add SKIP_PREFLIGHT_CHECK=true to an .env file in your project.
That will permanently disable this message but you might encounter other issues.
π¦ To fix the dependency tree, try following the steps below in the exact order: 1) Delete package-lock.json (not package.json!) and/or yarn.lock in your project folder.
2) Delete node_modules in your project folder.
3) Remove "babel-eslint" from dependencies and/or devDependencies in the package.json file in your project folder.
4) Run npm install or yarn, depending on the package manager you use.
In most cases, this should be enough to fix the problem.
If this has not helped, there are a few other things you can try:
5) If you used npm, install yarn (http://yarnpkg.com/) and repeat the above steps with it instead.
This may help because npm has known issues with package hoisting which may get resolved in future versions.
6) Check if D:\node_modules\babel-eslint is outside your project directory.
For example, you might have accidentally installed something in your home folder.
7) Try running npm ls babel-eslint in your project folder.
This will tell you which other package (apart from the expected react-scripts) installed babel-eslint.
If nothing else helps, add SKIP_PREFLIGHT_CHECK=true to an .env file in your project.
That would permanently disable this preflight check in case you want to proceed anyway.
P.S. We know this message is long but please read the steps above :-) We hope you find them helpful!npm ERR! code ELIFECYCLE
npm ERR! errno 1
npm ERR! react-study@0.1.0 start:
react-scripts start
npm ERR! Exit status 1npm ERR!
WELL DONE !
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Reverse Engineering, Buffer Overflow and Exploit Development
A Course on Intermediate Level Linux Exploitation | as the title says, this course isn't for beginners
Analysis and exploitation (unprivileged) | huge collection of RE information, organized by type.
Binary hacking | 35 "no bullshit" binary videos along with other info
Buffer Overflow Exploitation Megaprimer for Linux | Collection of Linux Rev. Engineering videos
Corelan tutorials | detailed tutorial, lots of good information about memory
Exploit tutorials | a series of 9 exploit tutorials,also features a podcast
Exploit development | links to the forum's exploit dev posts, quality and post style will vary with each poster
flAWS challenge | Through a series of levels you'll learn about common mistakes and gotchas when using Amazon Web Services (AWS).
Introduction to ARM Assembly Basics | tons of tutorials from infosec pro Azeria, follow her on twitter
Introductory Intel x86 | 63 days of OS class materials, 29 classes, 24 instructors, no account required
Lena's Reversing for Newbies (Complete) | listing of a lengthy resource by Lena, aimed at being a course
Linux (x86) Exploit Development Series | blog post by sploitfun, has 3 different levels
ENJOYβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Reverse Engineering, Buffer Overflow and Exploit Development
A Course on Intermediate Level Linux Exploitation | as the title says, this course isn't for beginners
Analysis and exploitation (unprivileged) | huge collection of RE information, organized by type.
Binary hacking | 35 "no bullshit" binary videos along with other info
Buffer Overflow Exploitation Megaprimer for Linux | Collection of Linux Rev. Engineering videos
Corelan tutorials | detailed tutorial, lots of good information about memory
Exploit tutorials | a series of 9 exploit tutorials,also features a podcast
Exploit development | links to the forum's exploit dev posts, quality and post style will vary with each poster
flAWS challenge | Through a series of levels you'll learn about common mistakes and gotchas when using Amazon Web Services (AWS).
Introduction to ARM Assembly Basics | tons of tutorials from infosec pro Azeria, follow her on twitter
Introductory Intel x86 | 63 days of OS class materials, 29 classes, 24 instructors, no account required
Lena's Reversing for Newbies (Complete) | listing of a lengthy resource by Lena, aimed at being a course
Linux (x86) Exploit Development Series | blog post by sploitfun, has 3 different levels
ENJOYβ€οΈππ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - nnamon/linux-exploitation-course: A Course on Intermediate Level Linux Exploitation
A Course on Intermediate Level Linux Exploitation. Contribute to nnamon/linux-exploitation-course development by creating an account on GitHub.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Advanced usage of bitcoin
#ExpertsUsers
> Bitcoin The official Bitcoin client has two versions: one is a graphical interface version, usually called Bitcoin (capital), and one A concise command line version (called bitcoind). They are compatible with each other, have the same command line parameters, read the same configuration file, and read and write the same data file. You can run one of the Bitcoin client or bitcoind client on a computer (if you accidentally try to run another client at the same time, it will prompt you that there is already a client running and automatically quit).
1οΈβ£SSL options:
-rpcssl uses OpenSSL (https) JSON-RPC connection
-rpcsslcertificatechainfile=<file.cert> server certificate file (default: server.cert)
-rpcsslprivatekeyfile=<file.pem> server private key file (default: server.pem)
-rpcsslciphers=<password> Acceptable ciphers (default: TLSv1+HIGH:!SSLv2:!aNULL:!eNULL:!AH:!3DES:@STRENGTH)
2οΈβ£bitcoin.conf configuration file
All command-line parameters except -datadir and -conf can be set through a configuration file, and all options in the configuration file can also be set on the command line. The value set by the command line parameter will override the setting in the configuration file.
The configuration file is a list in the format "setting=value", one per line. You can also use the # symbol to write comments.
The configuration file is not created automatically; you can use your favorite plain text editor to create it. By default, Bitcoin (or bitcoind) will look for a file named "bitcoin.conf" under the Bitcoin data folder, but the path of the data folder and configuration file can be passed through the -datadir and -conf command line parameters, respectively Specify separately.
operating system
Default data folder
Configuration file path
Windows
%APPDATA%\Bitcoin\
(Windows XP) C:\Documents and Settings\username\Application Data\Bitcoin\bitcoin.conf
(Windows 7,8,10) C:\Users\username\AppData\Roaming\Bitcoin\bitcoin.conf
Linux
$HOME/.bitcoin/
/home/username/.bitcoin/bitcoin.conf
Mac OSX
$HOME/Library/Application Support/Bitcoin/
/Users/username/Library/Application Support/Bitcoin/bitcoin.conf
Note: If the Bitcoin client testnet mode is running, the client will automatically create a subfolder named "testnet" under the data folder.
bitcoin.conf example
# bitcoin.conf configuration file. Lines beginning with # are comments.
3οΈβ£# User interface options:
# Minimize the launch of the Bitcoin client
#min=1
# Minimize to system tray
#minimizetotray=1
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Advanced usage of bitcoin
#ExpertsUsers
> Bitcoin The official Bitcoin client has two versions: one is a graphical interface version, usually called Bitcoin (capital), and one A concise command line version (called bitcoind). They are compatible with each other, have the same command line parameters, read the same configuration file, and read and write the same data file. You can run one of the Bitcoin client or bitcoind client on a computer (if you accidentally try to run another client at the same time, it will prompt you that there is already a client running and automatically quit).
1οΈβ£SSL options:
-rpcssl uses OpenSSL (https) JSON-RPC connection
-rpcsslcertificatechainfile=<file.cert> server certificate file (default: server.cert)
-rpcsslprivatekeyfile=<file.pem> server private key file (default: server.pem)
-rpcsslciphers=<password> Acceptable ciphers (default: TLSv1+HIGH:!SSLv2:!aNULL:!eNULL:!AH:!3DES:@STRENGTH)
2οΈβ£bitcoin.conf configuration file
All command-line parameters except -datadir and -conf can be set through a configuration file, and all options in the configuration file can also be set on the command line. The value set by the command line parameter will override the setting in the configuration file.
The configuration file is a list in the format "setting=value", one per line. You can also use the # symbol to write comments.
The configuration file is not created automatically; you can use your favorite plain text editor to create it. By default, Bitcoin (or bitcoind) will look for a file named "bitcoin.conf" under the Bitcoin data folder, but the path of the data folder and configuration file can be passed through the -datadir and -conf command line parameters, respectively Specify separately.
operating system
Default data folder
Configuration file path
Windows
%APPDATA%\Bitcoin\
(Windows XP) C:\Documents and Settings\username\Application Data\Bitcoin\bitcoin.conf
(Windows 7,8,10) C:\Users\username\AppData\Roaming\Bitcoin\bitcoin.conf
Linux
$HOME/.bitcoin/
/home/username/.bitcoin/bitcoin.conf
Mac OSX
$HOME/Library/Application Support/Bitcoin/
/Users/username/Library/Application Support/Bitcoin/bitcoin.conf
Note: If the Bitcoin client testnet mode is running, the client will automatically create a subfolder named "testnet" under the data folder.
bitcoin.conf example
# bitcoin.conf configuration file. Lines beginning with # are comments.
3οΈβ£# User interface options:
# Minimize the launch of the Bitcoin client
#min=1
# Minimize to system tray
#minimizetotray=1
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
Traversing the Path to RCE.pdf
252.5 KB
Traversing the Path to RCE
#requested
#requested
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Mozilla Network Security Services (NSS)
#FastTips
> Network Security Services (NSS) is a set of libraries designed to support cross-platform development of secure client and server applications. Applications built using NSS can use SSL v2 and v3, TLS, PKCS # 5, PKCS # 7, PKCS # 11, PKCS # 12, S / MIME, X.509 v3 certificates and other security standards.
> Unlike OpenSSL, NSS uses database files as a certificate store.
> NSS starts with a hard-coded CA list of trusted certificates inside the libnssckbi.so file . This list can be viewed from any application using NSS that can display (and manipulate) the trust certificate store, for example, Chrome-compatible or Firefox-compatible browsers.
> Some applications using the NSS library use a different certificate store than recommended. Mozilla's own Firefox is a prime example of this.
> Your distribution most likely already has the NSS package installed, in some distributions it is called libnss3 (Debian and derivatives) in some distributions - nss (Arch Linux, Gentoo and derivatives).
> If you want to view and modify NSS certificate stores, you need the certutil utility . On Arch Linux, this utility is included in the nss package and, therefore, is preinstalled on Arch Linux
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Mozilla Network Security Services (NSS)
#FastTips
> Network Security Services (NSS) is a set of libraries designed to support cross-platform development of secure client and server applications. Applications built using NSS can use SSL v2 and v3, TLS, PKCS # 5, PKCS # 7, PKCS # 11, PKCS # 12, S / MIME, X.509 v3 certificates and other security standards.
> Unlike OpenSSL, NSS uses database files as a certificate store.
> NSS starts with a hard-coded CA list of trusted certificates inside the libnssckbi.so file . This list can be viewed from any application using NSS that can display (and manipulate) the trust certificate store, for example, Chrome-compatible or Firefox-compatible browsers.
> Some applications using the NSS library use a different certificate store than recommended. Mozilla's own Firefox is a prime example of this.
> Your distribution most likely already has the NSS package installed, in some distributions it is called libnss3 (Debian and derivatives) in some distributions - nss (Arch Linux, Gentoo and derivatives).
> If you want to view and modify NSS certificate stores, you need the certutil utility . On Arch Linux, this utility is included in the nss package and, therefore, is preinstalled on Arch Linux
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from Backup Legal Mega
Top 25 Udemy courses Download Google Drive link
1. App development with swift.
2. 1-hour html
3. 1-hour javascript.
4. Adobe audition cc audio
production
5. Adobe illustrator cc tutorial
6. Adobe indesign cs6 beginners to advance
7. Adobe lightroom 5 learn by video
8. Advanced sql tutorial
9. After effects 3d animation motion graphics
10. After effects essencial
11. C programming for begineers go from zero
12. Complete php course
13. Essential javascript for begineers
14. Ethical hacking for begineers practical approach
15. Ieltscourse
16. Learn ms sql server from scratch
17. Learn no sql database design with couchdb
18. Learn photoshop cs6
19. Learn ruby programming in ten easy steps
20. Learn SAP
21. Learn software testing from scratch
22. Learn French
23. Learning dreamweaver cs6
24. Mastering python
25.bToefl-ibt online preparation course
> drive.google.com/drive/folders/0B1HQDi7EkA9XNlR3STF5SVJIVUk
1. App development with swift.
2. 1-hour html
3. 1-hour javascript.
4. Adobe audition cc audio
production
5. Adobe illustrator cc tutorial
6. Adobe indesign cs6 beginners to advance
7. Adobe lightroom 5 learn by video
8. Advanced sql tutorial
9. After effects 3d animation motion graphics
10. After effects essencial
11. C programming for begineers go from zero
12. Complete php course
13. Essential javascript for begineers
14. Ethical hacking for begineers practical approach
15. Ieltscourse
16. Learn ms sql server from scratch
17. Learn no sql database design with couchdb
18. Learn photoshop cs6
19. Learn ruby programming in ten easy steps
20. Learn SAP
21. Learn software testing from scratch
22. Learn French
23. Learning dreamweaver cs6
24. Mastering python
25.bToefl-ibt online preparation course
> drive.google.com/drive/folders/0B1HQDi7EkA9XNlR3STF5SVJIVUk
β β β Uππ»βΊπ«6π¬πβ β β β
π¦THE DANGEROUS XKEYSTORE WHAT IS ?
You've never heard of XKeyscore, but it definitely knows you.
> The National Security Agency's top-secret program essentially makes available everything you've ever done on the Internet β browsing history, searches, content of your emails, online chats, even your metadata β all at the tap of the keyboard.
> The Guardian exposed the program on Wednesday in a follow-up piece to its groundbreaking report on the NSA's surveillance practices. Shortly after publication, Edward Snowden, a 29-year-old former Booz Allen Hamilton employee who worked for the NSA for four years, came forward as the source.
> This latest revelation comes from XKeyscore training materials, which Snowden also provided to The Guardian. The NSA sums up the program best: XKeyscore is its "widest reaching" system for developing intelligence from the Internet.
> The program gives analysts the ability to search through the entire database of your information without any prior authorization β no warrant, no court clearance, no signature on a dotted line. An analyst must simply complete a simple onscreen form, and seconds later, your online history is no longer private. The agency claims that XKeyscore covers "nearly everything a typical user does on the Internet."
> As The Guardian points out, this program crystallizes one of Snowden's most infamous admissions from his video interview on June 10:
"I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email."
Snowden's dad: Revelations 'shocking'
> While United States officials denied this claim, the XKeyscore program, as the public understands it, proves Snowden's point. The law requires the NSA to obtain FISA warrants on U.S. citizens, but this is pushed aside for Americans with foreign targets β and this program gives the NSA the technology to do so. The training materials claim XKeyscore assisted in capturing 300 terrorists by 2008.
cnn report
β β β Uππ»βΊπ«6π¬πβ β β β
π¦THE DANGEROUS XKEYSTORE WHAT IS ?
You've never heard of XKeyscore, but it definitely knows you.
> The National Security Agency's top-secret program essentially makes available everything you've ever done on the Internet β browsing history, searches, content of your emails, online chats, even your metadata β all at the tap of the keyboard.
> The Guardian exposed the program on Wednesday in a follow-up piece to its groundbreaking report on the NSA's surveillance practices. Shortly after publication, Edward Snowden, a 29-year-old former Booz Allen Hamilton employee who worked for the NSA for four years, came forward as the source.
> This latest revelation comes from XKeyscore training materials, which Snowden also provided to The Guardian. The NSA sums up the program best: XKeyscore is its "widest reaching" system for developing intelligence from the Internet.
> The program gives analysts the ability to search through the entire database of your information without any prior authorization β no warrant, no court clearance, no signature on a dotted line. An analyst must simply complete a simple onscreen form, and seconds later, your online history is no longer private. The agency claims that XKeyscore covers "nearly everything a typical user does on the Internet."
> As The Guardian points out, this program crystallizes one of Snowden's most infamous admissions from his video interview on June 10:
"I, sitting at my desk," said Snowden, could "wiretap anyone, from you or your accountant, to a federal judge or even the president, if I had a personal email."
Snowden's dad: Revelations 'shocking'
> While United States officials denied this claim, the XKeyscore program, as the public understands it, proves Snowden's point. The law requires the NSA to obtain FISA warrants on U.S. citizens, but this is pushed aside for Americans with foreign targets β and this program gives the NSA the technology to do so. The training materials claim XKeyscore assisted in capturing 300 terrorists by 2008.
cnn report
β β β Uππ»βΊπ«6π¬πβ β β β
π¦BIGGEST COLLECTION OF CHECKERS
https://mega.nz/#F!ZrAlgYRB!FxAbl6lCbEKafkkNm4J-3g
πSteam Checker
https://mega.nz/#F!Ui4nxZaB!1cG90VM6QIJaNpImnyNUBg
πGmail Checker
https://mega.nz/#F!R7pznRBb!Xicc7uBYhLrEZ7LQKqPR5w
πEbay Checker
https://mega.nz/#F!FzgQ1ZKK!aq4wyqjpYkRvbZJzIyJwqg
πPSN Checker
https://mega.nz/#F!xzRhQDRZ!fCwrExaL_rbZoV9HZqbTJA
πSkype Checker
https://mega.nz/#F!RmJjDD7C!ETsOJjw0qe-e9StFbSdnfA
πDirect Tv Checker
https://mega.nz/#F!RyZVXJwb!oW0YfM_hkd4rv880_PC6lA
πInstagram Checker
https://mega.nz/#F!FnATESTZ!qux4N4fYy3v__aO1y6ZcXw
πOrigin Checker
https://mega.nz/#F!Nm5HyT6b!BxNl7TGp0zMY5uFK66ADoA
πUplay Checker
https://mega.nz/#F!EnJllRjB!zcQlw2c3FTeeYS8F3rnneg
πNFL Checker
https://mega.nz/#F!1igCSQLZ!XIWhHhAMdt8hMwzqGe0BFg
πNBA checker
https://mega.nz/#F!MiYkGQJI!iS1oNC5OILBgmXqxy1Wqxw
πHulu Checker
https://mega.nz/#F!06IGSLJA!pE_gPS-zXPH9-sBHaenAWQ
πHBO Checker
https://mega.nz/#F!Vuol1RjJ!p3upMORnPj_yK0tzuM8Bew
πSpotify Checker
https://mega.nz/#F!MrIxzLRb!MrvGM93IoBZNrUqcyd13ZQ
πMinecraft Checker
https://mega.nz/#F!VnYExALD!Gq6s0wcWHBGasqVf7R4VvQ
πFaceBook Checker
https://mega.nz/#F!BqgVCK4Y!wNUr88nr6kXCKQ5C4IMB1Q
πCrunchyroll Checker
https://mega.nz/#F!piwjWZrb!9rOOXFXrSdIqC1EcDsDCjw
πNetflix Checker
https://mega.nz/#F!djxXyIAB!Nif0xPb6QZvGuXctLY6CIQ
(checked only by Us)
Enjoy π
https://mega.nz/#F!ZrAlgYRB!FxAbl6lCbEKafkkNm4J-3g
πSteam Checker
https://mega.nz/#F!Ui4nxZaB!1cG90VM6QIJaNpImnyNUBg
πGmail Checker
https://mega.nz/#F!R7pznRBb!Xicc7uBYhLrEZ7LQKqPR5w
πEbay Checker
https://mega.nz/#F!FzgQ1ZKK!aq4wyqjpYkRvbZJzIyJwqg
πPSN Checker
https://mega.nz/#F!xzRhQDRZ!fCwrExaL_rbZoV9HZqbTJA
πSkype Checker
https://mega.nz/#F!RmJjDD7C!ETsOJjw0qe-e9StFbSdnfA
πDirect Tv Checker
https://mega.nz/#F!RyZVXJwb!oW0YfM_hkd4rv880_PC6lA
πInstagram Checker
https://mega.nz/#F!FnATESTZ!qux4N4fYy3v__aO1y6ZcXw
πOrigin Checker
https://mega.nz/#F!Nm5HyT6b!BxNl7TGp0zMY5uFK66ADoA
πUplay Checker
https://mega.nz/#F!EnJllRjB!zcQlw2c3FTeeYS8F3rnneg
πNFL Checker
https://mega.nz/#F!1igCSQLZ!XIWhHhAMdt8hMwzqGe0BFg
πNBA checker
https://mega.nz/#F!MiYkGQJI!iS1oNC5OILBgmXqxy1Wqxw
πHulu Checker
https://mega.nz/#F!06IGSLJA!pE_gPS-zXPH9-sBHaenAWQ
πHBO Checker
https://mega.nz/#F!Vuol1RjJ!p3upMORnPj_yK0tzuM8Bew
πSpotify Checker
https://mega.nz/#F!MrIxzLRb!MrvGM93IoBZNrUqcyd13ZQ
πMinecraft Checker
https://mega.nz/#F!VnYExALD!Gq6s0wcWHBGasqVf7R4VvQ
πFaceBook Checker
https://mega.nz/#F!BqgVCK4Y!wNUr88nr6kXCKQ5C4IMB1Q
πCrunchyroll Checker
https://mega.nz/#F!piwjWZrb!9rOOXFXrSdIqC1EcDsDCjw
πNetflix Checker
https://mega.nz/#F!djxXyIAB!Nif0xPb6QZvGuXctLY6CIQ
(checked only by Us)
Enjoy π
mega.nz
MEGA provides free cloud storage with convenient and powerful always-on privacy. Claim your free 20GB now
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦WIFI JAMMING
The netattack.py is a python script that allows you to scan your local area for WiFi Networks and perform deauthentification attacks. The effectiveness and power of this script highly depends on your wireless card.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£git clone https://github.com/chrizator/netattack.git
2οΈβ£SCANNING FOR WIFI NETWORKS
> python netattack.py -scan -mon
3οΈβ£This example will perform a WiFi network scan. The BSSID, ESSID and the Channel will be listet in a table.
-scan | --scan
4οΈβ£This parameter must be called when you want to do a scan. It's one of the main commands. It is searching for beacon frames that are sent by routers to notify there presence.
-mon | --monitor
5οΈβ£By calling this parameter the script automatically detects you wireless card and puts it into monitoring mode to capture the ongoing traffic. If you know the name of your wireless card and it's already working in monitoring mode you can call
-i
This can be used instead of -mon.
DEAUTHENTIFICATION ATTACK
python netattack.py -deauth -b AB:CD:EF:GH:IJ:KL -u 12:34:56:78:91:23 -c 4 -mon
6οΈβ£This command will obviously perform a deauthentification attack.
-deauth | --deauth
This parameter is a main parameter as well as scan. It is necessary to call if you want to deauth attack a certain target.
-b | --bssid
With -b you select the AP's MAC-Address (BSSID). The -deauth parameter requires one or multiple BSSID's
-u | --client
If you don't want to attack the whole network, but a single user/client/device, you can do this with -u. It is not necessary.
-c | --channel
7οΈβ£By adding this parameter, your deauthentification attack is going to be performed on the entered channel. The usage of -c is highly recommended since the attack will be a failure if the wrong channel is used. The channel of the AP can be seen by doing a WiFi scan (-scan). If you don't add -c the attack will take place on the current channel.
The -mon or -i is necessary for this attack as well.
ENJOYβ€οΈππ»
β topic git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦WIFI JAMMING
The netattack.py is a python script that allows you to scan your local area for WiFi Networks and perform deauthentification attacks. The effectiveness and power of this script highly depends on your wireless card.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1οΈβ£git clone https://github.com/chrizator/netattack.git
2οΈβ£SCANNING FOR WIFI NETWORKS
> python netattack.py -scan -mon
3οΈβ£This example will perform a WiFi network scan. The BSSID, ESSID and the Channel will be listet in a table.
-scan | --scan
4οΈβ£This parameter must be called when you want to do a scan. It's one of the main commands. It is searching for beacon frames that are sent by routers to notify there presence.
-mon | --monitor
5οΈβ£By calling this parameter the script automatically detects you wireless card and puts it into monitoring mode to capture the ongoing traffic. If you know the name of your wireless card and it's already working in monitoring mode you can call
-i
This can be used instead of -mon.
DEAUTHENTIFICATION ATTACK
python netattack.py -deauth -b AB:CD:EF:GH:IJ:KL -u 12:34:56:78:91:23 -c 4 -mon
6οΈβ£This command will obviously perform a deauthentification attack.
-deauth | --deauth
This parameter is a main parameter as well as scan. It is necessary to call if you want to deauth attack a certain target.
-b | --bssid
With -b you select the AP's MAC-Address (BSSID). The -deauth parameter requires one or multiple BSSID's
-u | --client
If you don't want to attack the whole network, but a single user/client/device, you can do this with -u. It is not necessary.
-c | --channel
7οΈβ£By adding this parameter, your deauthentification attack is going to be performed on the entered channel. The usage of -c is highly recommended since the attack will be a failure if the wrong channel is used. The channel of the AP can be seen by doing a WiFi scan (-scan). If you don't add -c the attack will take place on the current channel.
The -mon or -i is necessary for this attack as well.
ENJOYβ€οΈππ»
β topic git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - chrizator/netattack: A simple python script to scan and attack wireless networks.
A simple python script to scan and attack wireless networks. - chrizator/netattack
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦CODE ACCESS WEBCAM VIA HTML by undercde :
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<meta content="Display Webcam Stream" name="title">
<title>Display Webcam Stream</title>
<style>
body {
margin: 30px;
}
h1 {
font-family: sans-serif;
color: #666;
}
#container {
width: 500px;
height: 375px;
border: 10px #333 solid;
}
#videoElement {
width: 500px;
height: 375px;
background-color: #666;
}
button {
margin-top: 20px;
font-size: 12px;
font-weight: bold;
padding: 5px;
background-color: white;
border: 5px solid black;
}
button:hover {
background-color: yellow;
}
button:active {
background-color: yellowgreen;
}
</style>
</head>
<body>
<h1>ΠΡΠΎΠ²Π΅ΡΠΊΠ° Π²Π΅Π± ΠΊΠ°ΠΌΠ΅ΡΡ ΠΎΠ½Π»Π°ΠΉΠ½</h1>
<div id="container">
<video autoplay id="videoElement">
</video>
</div>
<button id="stop">Stop Video</button>
<button id="start">Start Video</button>
<script>
var video = document.querySelector("#videoElement");
var stopVideo = document.querySelector("#stop");
var startVideo = document.querySelector("#start");
stopVideo.addEventListener("click", stop, false);
startVideo.addEventListener("click", startWebCam, false);
function startWebCam() {
if (navigator.mediaDevices.getUserMedia) {
navigator.mediaDevices.getUserMedia({video: true})
.then(function (stream) {
video.srcObject = stream;
})
.catch(function (err0r) {
console.log("Something went wrong!");
});
}
}
function stop(e) {
var stream = video.srcObject;
var tracks = stream.getTracks();
for (var i = 0; i < tracks.length; i++) {
var track = tracks[i];
track.stop();
}
video.srcObject = null;
}
</script>
</body>
</html>
by undercode
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦CODE ACCESS WEBCAM VIA HTML by undercde :
<!DOCTYPE html>
<html>
<head>
<meta charset="utf-8">
<meta content="Display Webcam Stream" name="title">
<title>Display Webcam Stream</title>
<style>
body {
margin: 30px;
}
h1 {
font-family: sans-serif;
color: #666;
}
#container {
width: 500px;
height: 375px;
border: 10px #333 solid;
}
#videoElement {
width: 500px;
height: 375px;
background-color: #666;
}
button {
margin-top: 20px;
font-size: 12px;
font-weight: bold;
padding: 5px;
background-color: white;
border: 5px solid black;
}
button:hover {
background-color: yellow;
}
button:active {
background-color: yellowgreen;
}
</style>
</head>
<body>
<h1>ΠΡΠΎΠ²Π΅ΡΠΊΠ° Π²Π΅Π± ΠΊΠ°ΠΌΠ΅ΡΡ ΠΎΠ½Π»Π°ΠΉΠ½</h1>
<div id="container">
<video autoplay id="videoElement">
</video>
</div>
<button id="stop">Stop Video</button>
<button id="start">Start Video</button>
<script>
var video = document.querySelector("#videoElement");
var stopVideo = document.querySelector("#stop");
var startVideo = document.querySelector("#start");
stopVideo.addEventListener("click", stop, false);
startVideo.addEventListener("click", startWebCam, false);
function startWebCam() {
if (navigator.mediaDevices.getUserMedia) {
navigator.mediaDevices.getUserMedia({video: true})
.then(function (stream) {
video.srcObject = stream;
})
.catch(function (err0r) {
console.log("Something went wrong!");
});
}
}
function stop(e) {
var stream = video.srcObject;
var tracks = stream.getTracks();
for (var i = 0; i < tracks.length; i++) {
var track = tracks[i];
track.stop();
}
video.srcObject = null;
}
</script>
</body>
</html>
by undercode
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from Backup Legal Mega
LEARN CSS FRONT β190 MB-
https://www.lynda.com/CSS-tutorials/CSS-Variable-Fonts/2822020-2.html
https://mega.nz/#F!c4E1SYjT!_2bfTEyy-oRfy6E_unAsSw
https://www.lynda.com/CSS-tutorials/CSS-Variable-Fonts/2822020-2.html
https://mega.nz/#F!c4E1SYjT!_2bfTEyy-oRfy6E_unAsSw
Lynda.com - from LinkedIn
CSS: Variable Fonts
Get a comprehensive guide to using variable fonts to make designs pop while preserving efficient use of bandwidth.