Photos from National Cyber Security Services's post
K6:-- A #modern #load #testing tool, using #Go and #JavaScript.
#k6 is a modern load testing tool, building on Load Impact's years of experience in the load and performance testing industry. It provides a clean, approachable scripting API, local and cloud execution, flexible configuration, with command & control through #CLI or a #REST #API.
Features:-
1. #Scripting in ES6 #JS: support for modules to aid code reusability across an #organization
2. Everything as code: test logic and configuration options are both in JS for version control friendliness
3. Automation-friendly: checks (like asserts) and thresholds for easy and flexible CI configuration!
4. HTTP/1.1, HTTP/2 and WebSocket protocol support
5. TLS features: client certificates, configurable SSL/TLS versions, and ciphers
6. Batteries included: #Cookies, #Crypto, Custom metrics, #Encodings, #Environment variables, #JSON, #HTML forms, files, flexible execution control, and more.
7. Built-in HAR converter: record browser sessions as .har files and directly convert them to k6 scripts
8. Flexible metrics storage and #visualization: InfluxDB (+Grafana), JSON or Load Impact Insights
9. #Cloud #execution and distributed tests (currently only on infrastructure managed by Load Impact, with native distributed execution in k6 planned for the near future!)
#Download #Link:-
https://github.com/loadimpact/k6
K6:-- A #modern #load #testing tool, using #Go and #JavaScript.
#k6 is a modern load testing tool, building on Load Impact's years of experience in the load and performance testing industry. It provides a clean, approachable scripting API, local and cloud execution, flexible configuration, with command & control through #CLI or a #REST #API.
Features:-
1. #Scripting in ES6 #JS: support for modules to aid code reusability across an #organization
2. Everything as code: test logic and configuration options are both in JS for version control friendliness
3. Automation-friendly: checks (like asserts) and thresholds for easy and flexible CI configuration!
4. HTTP/1.1, HTTP/2 and WebSocket protocol support
5. TLS features: client certificates, configurable SSL/TLS versions, and ciphers
6. Batteries included: #Cookies, #Crypto, Custom metrics, #Encodings, #Environment variables, #JSON, #HTML forms, files, flexible execution control, and more.
7. Built-in HAR converter: record browser sessions as .har files and directly convert them to k6 scripts
8. Flexible metrics storage and #visualization: InfluxDB (+Grafana), JSON or Load Impact Insights
9. #Cloud #execution and distributed tests (currently only on infrastructure managed by Load Impact, with native distributed execution in k6 planned for the near future!)
#Download #Link:-
https://github.com/loadimpact/k6
GitHub
GitHub - grafana/k6: A modern load testing tool, using Go and JavaScript - https://k6.io
A modern load testing tool, using Go and JavaScript - https://k6.io - grafana/k6
Expo:-- An #opensource platform for making #universal #native apps with #React. Expo runs on #Android, #iOS, and the #web.
Expo is an open-source platform for making universal native apps that run on Android, iOS, and the web. It includes a universal runtime and libraries that let you build native apps by writing #React and #JavaScript. This repository is where the Expo client #software is #developed and includes the client apps, modules, apps, and more. The Expo #CLI repository contains the Expo #development #tools.
#Download #Link:-
https://github.com/expo/expo
Expo:-- An #opensource platform for making #universal #native apps with #React. Expo runs on #Android, #iOS, and the #web.
Expo is an open-source platform for making universal native apps that run on Android, iOS, and the web. It includes a universal runtime and libraries that let you build native apps by writing #React and #JavaScript. This repository is where the Expo client #software is #developed and includes the client apps, modules, apps, and more. The Expo #CLI repository contains the Expo #development #tools.
#Download #Link:-
https://github.com/expo/expo
Expo is an open-source platform for making universal native apps that run on Android, iOS, and the web. It includes a universal runtime and libraries that let you build native apps by writing #React and #JavaScript. This repository is where the Expo client #software is #developed and includes the client apps, modules, apps, and more. The Expo #CLI repository contains the Expo #development #tools.
#Download #Link:-
https://github.com/expo/expo
Expo:-- An #opensource platform for making #universal #native apps with #React. Expo runs on #Android, #iOS, and the #web.
Expo is an open-source platform for making universal native apps that run on Android, iOS, and the web. It includes a universal runtime and libraries that let you build native apps by writing #React and #JavaScript. This repository is where the Expo client #software is #developed and includes the client apps, modules, apps, and more. The Expo #CLI repository contains the Expo #development #tools.
#Download #Link:-
https://github.com/expo/expo
XSS-Keylogger PoC:-- A general #Javascript #keylogger to be used in an #XSS #PoC
This is a simple PoC JavaScript keylogger to attach to an XSS vulnerability disclosure. It is made up of two #PHP servers, one acts like the #victim and the other acts as the attacker's #remote #server.
In a disclosure, you would just need to copy the code between the script tags in the victims index.php file, remove all comments, minify and inject as you see fit (obviously making some adjustments to the target and remote variables);
How to Run:-
1. Turn on each of the servers separately using the shell scripts.
2. Open two #browser tabs, and navigate to each of these addresses:
Victim: http://127.0.0.1:8080
Attacker: http://127.0.0.1:8081
3. Then from the login page on the victim server, enter the following username and password:
Username: admin
Password: c0mpl1c@t3dp4ss
4. Once the form is submitted and you are welcomed by the home.php file open the attacker page.
5. Refresh the attacker page to see the #keystrokes and form data entered into the keystrokes field.
#Download #Link:-
https://github.com/jakemscott/XSS-Keylogger
XSS-Keylogger PoC:-- A general #Javascript #keylogger to be used in an #XSS #PoC
This is a simple PoC JavaScript keylogger to attach to an XSS vulnerability disclosure. It is made up of two #PHP servers, one acts like the #victim and the other acts as the attacker's #remote #server.
In a disclosure, you would just need to copy the code between the script tags in the victims index.php file, remove all comments, minify and inject as you see fit (obviously making some adjustments to the target and remote variables);
How to Run:-
1. Turn on each of the servers separately using the shell scripts.
2. Open two #browser tabs, and navigate to each of these addresses:
Victim: http://127.0.0.1:8080
Attacker: http://127.0.0.1:8081
3. Then from the login page on the victim server, enter the following username and password:
Username: admin
Password: c0mpl1c@t3dp4ss
4. Once the form is submitted and you are welcomed by the home.php file open the attacker page.
5. Refresh the attacker page to see the #keystrokes and form data entered into the keystrokes field.
#Download #Link:-
https://github.com/jakemscott/XSS-Keylogger
This is a simple PoC JavaScript keylogger to attach to an XSS vulnerability disclosure. It is made up of two #PHP servers, one acts like the #victim and the other acts as the attacker's #remote #server.
In a disclosure, you would just need to copy the code between the script tags in the victims index.php file, remove all comments, minify and inject as you see fit (obviously making some adjustments to the target and remote variables);
How to Run:-
1. Turn on each of the servers separately using the shell scripts.
2. Open two #browser tabs, and navigate to each of these addresses:
Victim: http://127.0.0.1:8080
Attacker: http://127.0.0.1:8081
3. Then from the login page on the victim server, enter the following username and password:
Username: admin
Password: c0mpl1c@t3dp4ss
4. Once the form is submitted and you are welcomed by the home.php file open the attacker page.
5. Refresh the attacker page to see the #keystrokes and form data entered into the keystrokes field.
#Download #Link:-
https://github.com/jakemscott/XSS-Keylogger
XSS-Keylogger PoC:-- A general #Javascript #keylogger to be used in an #XSS #PoC
This is a simple PoC JavaScript keylogger to attach to an XSS vulnerability disclosure. It is made up of two #PHP servers, one acts like the #victim and the other acts as the attacker's #remote #server.
In a disclosure, you would just need to copy the code between the script tags in the victims index.php file, remove all comments, minify and inject as you see fit (obviously making some adjustments to the target and remote variables);
How to Run:-
1. Turn on each of the servers separately using the shell scripts.
2. Open two #browser tabs, and navigate to each of these addresses:
Victim: http://127.0.0.1:8080
Attacker: http://127.0.0.1:8081
3. Then from the login page on the victim server, enter the following username and password:
Username: admin
Password: c0mpl1c@t3dp4ss
4. Once the form is submitted and you are welcomed by the home.php file open the attacker page.
5. Refresh the attacker page to see the #keystrokes and form data entered into the keystrokes field.
#Download #Link:-
https://github.com/jakemscott/XSS-Keylogger
PokemonTowerExploit:-- Enabling and automating an #exploit in #Pokémon Tower Battle.
This #script loads up the game in a #window and #injects some #javascript code to change the #CSS of the page which allows the game window to stretch. Stretching the game window introduces an exploit which can force both game participants to win. I have automated the exploit process by reading #pixel #data of the window and moving the mouse. The author found the exploit on 2020/01/10.
Controls
1. F5 = refresh the page, in case it doesn't load properly, or the game gets stuck
2. F6 = toggle automatic exploitation (uses mouse control, keep the focus on the window)
3. Ctrl + Q = Stop GUI
#Downlod #Link:-
https://github.com/manstie/PokemonTowerExploit
PokemonTowerExploit:-- Enabling and automating an #exploit in #Pokémon Tower Battle.
This #script loads up the game in a #window and #injects some #javascript code to change the #CSS of the page which allows the game window to stretch. Stretching the game window introduces an exploit which can force both game participants to win. I have automated the exploit process by reading #pixel #data of the window and moving the mouse. The author found the exploit on 2020/01/10.
Controls
1. F5 = refresh the page, in case it doesn't load properly, or the game gets stuck
2. F6 = toggle automatic exploitation (uses mouse control, keep the focus on the window)
3. Ctrl + Q = Stop GUI
#Downlod #Link:-
https://github.com/manstie/PokemonTowerExploit
This #script loads up the game in a #window and #injects some #javascript code to change the #CSS of the page which allows the game window to stretch. Stretching the game window introduces an exploit which can force both game participants to win. I have automated the exploit process by reading #pixel #data of the window and moving the mouse. The author found the exploit on 2020/01/10.
Controls
1. F5 = refresh the page, in case it doesn't load properly, or the game gets stuck
2. F6 = toggle automatic exploitation (uses mouse control, keep the focus on the window)
3. Ctrl + Q = Stop GUI
#Downlod #Link:-
https://github.com/manstie/PokemonTowerExploit
PokemonTowerExploit:-- Enabling and automating an #exploit in #Pokémon Tower Battle.
This #script loads up the game in a #window and #injects some #javascript code to change the #CSS of the page which allows the game window to stretch. Stretching the game window introduces an exploit which can force both game participants to win. I have automated the exploit process by reading #pixel #data of the window and moving the mouse. The author found the exploit on 2020/01/10.
Controls
1. F5 = refresh the page, in case it doesn't load properly, or the game gets stuck
2. F6 = toggle automatic exploitation (uses mouse control, keep the focus on the window)
3. Ctrl + Q = Stop GUI
#Downlod #Link:-
https://github.com/manstie/PokemonTowerExploit
Forwarded from تعلم لغة JAVASCRIPT ©️ (Programmer Tech /PT)
المعاملات operators في لغة جافاسكربت.
https://www.programmer-tech.com/2022/02/javascript-operators.html
قناتنا في تيلجرام t.me/Programmer_Tech
#JavaScript
https://www.programmer-tech.com/2022/02/javascript-operators.html
قناتنا في تيلجرام t.me/Programmer_Tech
#JavaScript
القوائم Lists في لغة HTML
https://www.programmer-tech.com/html-lists
التحكم في قياس عرض و إرتفاع الشاشة في جافاسكربت
https://www.programmer-tech.com/javascript-screen-height-and-width
فصل ملف class عن ملف main في لغة C++
https://www.programmer-tech.com/cplusplus-writing-classes-in-separate-files-using
يوجد لدينا دعم فني 24/24 للإجابة على أسئلتكم ومساعدتكم😎🤩
#HTML #JS #javascript #programming
https://www.programmer-tech.com/html-lists
التحكم في قياس عرض و إرتفاع الشاشة في جافاسكربت
https://www.programmer-tech.com/javascript-screen-height-and-width
فصل ملف class عن ملف main في لغة C++
https://www.programmer-tech.com/cplusplus-writing-classes-in-separate-files-using
يوجد لدينا دعم فني 24/24 للإجابة على أسئلتكم ومساعدتكم😎🤩
#HTML #JS #javascript #programming
1️⃣ نظرة عامة في لغة جافاسكربت
https://www.programmer-tech.com/javascript-overview
2️⃣ المتغيرات و عرض البيانات في لغة جافاسكربت
https://www.programmer-tech.com/javascript-variables-and-data-types
3️⃣ المعاملات operators في لغة جافاسكربت
https://www.programmer-tech.com/javascript-operators
يوجد لدينا دعم فني 24/24 للإجابة على أسئلتكم ومساعدتكم😎🤩
#javascript #JS #programmer
https://www.programmer-tech.com/javascript-overview
2️⃣ المتغيرات و عرض البيانات في لغة جافاسكربت
https://www.programmer-tech.com/javascript-variables-and-data-types
3️⃣ المعاملات operators في لغة جافاسكربت
https://www.programmer-tech.com/javascript-operators
يوجد لدينا دعم فني 24/24 للإجابة على أسئلتكم ومساعدتكم😎🤩
#javascript #JS #programmer
الجمل الشرطية conditions في لغة جافاسكربت
https://www.programmer-tech.com/javascript-conditions
الحلقات التكرارية Loops في لغة جافاسكربت
https://www.programmer-tech.com/javascript-loops
الدوال Functions في لغة جافاسكربت
https://www.programmer-tech.com/javascript-functions
يوجد لدينا دعم فني 24/24 للإجابة على أسئلتكم ومساعدتكم😎🤩
#javascript #web #programmer
https://www.programmer-tech.com/javascript-conditions
الحلقات التكرارية Loops في لغة جافاسكربت
https://www.programmer-tech.com/javascript-loops
الدوال Functions في لغة جافاسكربت
https://www.programmer-tech.com/javascript-functions
يوجد لدينا دعم فني 24/24 للإجابة على أسئلتكم ومساعدتكم😎🤩
#javascript #web #programmer
مكتبة #axios هي مكتبة تستخدم في #JavaScript تتعامل مع الـ APIs وتسهل عليك إرسال واستقبال البيانات من و إلى السيرفر وفي React، الكثير يستخدمونها لكي يتعاملون مع البيانات من الـ backend.
https://www.digitalocean.com/community/tutorials/react-axios-react
〰️➖➖➖➖➖➖〰️
t.me/MuhammadAlush0997
تابعني على :
Telegram | instagram | facebook | Twitter | YouTube
https://www.digitalocean.com/community/tutorials/react-axios-react
〰️➖➖➖➖➖➖〰️
t.me/MuhammadAlush0997
تابعني على :
Telegram | instagram | facebook | Twitter | YouTube
🛡️ لغة JavaScript في مجال #الأمن_السيبراني 🧑🏻💻
الـ #JavaScript هي #لغة_برمجة تستخدم بشكل أساسي في #تطوير_الويب، ولكن لها أيضاً تطبيقات في مجال الأمن السيبراني، يمكن استخدام #JavaScript في عدة مجالات مثل:
1⃣اختبار الاختراق: يمكن استخدام JavaScript لإنشاء سكريبتات لاختبار الثغرات في تطبيقات الويب.
2⃣تحليل البرمجيات الضارة: يمكن استخدام JavaScript لفهم كيفية عمل البرمجيات الضارة التي تستهدف المتصفحات.
3⃣الأتمتة: يمكن استخدام JavaScript لأتمتة بعض المهام في بيئات الاختبار.
رابط قناة بها جميع دروس جافاسكربت
@NusurTech_JS
رابط الدرس الأول في جافاسكربت
https://www.nusurtech.ca/2023/03/javascript-overview.html
باقي الدروس موجودة بنفس قسم جافاسكربت في الموقع.
〰️➖➖➖➖➖➖〰️
t.me/MuhammadAlush0997
تابعني على :
Telegram | instagram | facebook | Twitter | YouTube
الـ #JavaScript هي #لغة_برمجة تستخدم بشكل أساسي في #تطوير_الويب، ولكن لها أيضاً تطبيقات في مجال الأمن السيبراني، يمكن استخدام #JavaScript في عدة مجالات مثل:
1⃣اختبار الاختراق: يمكن استخدام JavaScript لإنشاء سكريبتات لاختبار الثغرات في تطبيقات الويب.
2⃣تحليل البرمجيات الضارة: يمكن استخدام JavaScript لفهم كيفية عمل البرمجيات الضارة التي تستهدف المتصفحات.
3⃣الأتمتة: يمكن استخدام JavaScript لأتمتة بعض المهام في بيئات الاختبار.
رابط قناة بها جميع دروس جافاسكربت
@NusurTech_JS
رابط الدرس الأول في جافاسكربت
https://www.nusurtech.ca/2023/03/javascript-overview.html
باقي الدروس موجودة بنفس قسم جافاسكربت في الموقع.
〰️➖➖➖➖➖➖〰️
t.me/MuhammadAlush0997
تابعني على :
Telegram | instagram | facebook | Twitter | YouTube