Here are some useful commands
-
-
Save chase2981/25a477ec1ea3c00804b52264e2c5b886 to your computer and use it in GitHub Desktop.
sudo ifconfig en7 down
https://support.yubico.com/hc/en-us/articles/360013708900-Using-Your-U2F-YubiKey-with-Linux
sudo apt install libu2f-udev
To set up your Linux system for U2F:
Verify that libu2f-udev is installed on your system.
On Debian and its derivatives (Ubuntu, Linux Mint, etc.), check whether libu2f-udev is installed by running dpkg -s libu2f-udev. Install (if not already installed) using sudo apt install libu2f-udev.
If you have a YubiKey NEO or YubiKey NEO-n ensure you have unlocked the U2F mode by following the instructions in the Enabling or Disabling Interfaces article.
Go to https://github.com/Yubico/libu2f-host/blob/master/70-u2f.rules and download or create a copy of the file named 70-u2f.rules into the Linux directory: /etc/udev/rules.d/. If this file is already there, ensure that the content looks like the one provided on github.com/Yubico (link above).
Note: If your version of UDEV is lower than 188, use the rules at https://github.com/Yubico/libu2f-host/blob/master/70-old-u2f.rules instead. If you do not known your udev version, you can check by running sudo udevadm --version in Terminal.
Save your file, and then reboot your system.
For services accessed via a web browser, ensure that you are running Google Chrome version 38 or later. Starting with Chrome version 39, you will be able to use the YubiKey NEO or YubiKey NEO-n in U2F+HID mode.
https://support.yubico.com/hc/en-us/articles/360016649099-Ubuntu-Linux-Login-Guide-U2F
https://support.yubico.com/hc/en-us/articles/360016649039-Installing-Yubico-Software-on-Linux
https://support.yubico.com/hc/en-us/articles/360013708900-Using-Your-U2F-YubiKey-with-Linux
log show --predicate '(eventMessage CONTAINS "Authentication failed")' --style syslog --last 1d
https://serverfault.com/questions/131942/how-do-i-add-a-group-in-mac-os-x-10-6
dscl . list /Groups PrimaryGroupID | tr -s ' ' | sort -n -t ' ' -k2,2
sudo dscl . -create /groups/dba
sudo dscl . -append /groups/dba gid 4200
sudo dscl . -append /groups/dba passwd "*"
sudo dscl . create /groups/dba GroupMembership chase
sudo dscl . append /groups/dba GroupMembership chasegibbons
sudo chown -R :dba /usr/local/
// list
dscacheutil -q group -a name admin
sudo dseditgroup -o edit -u someuser -p -d someuser -t user staff
dscl . -delete /Groups/dba GroupMembers chasegibbons
Add user "robertlie" to group "_www". Type: sudo dseditgroup -o edit -a robertlie -t user _www
To list all members of a group "_www". Type: dscacheutil -q group -a name _www
To remove a user "robertlie" from a group "_www". Type: sudo dseditgroup -o edit -d robertlie -t user _www
https://osxdaily.com/2020/12/14/how-create-macos-big-sur-iso/
Create disk image on mac
hdiutil create -o /tmp/MacBigSur -size 12500m -volname MacBigSur -layout SPUD -fs HFS+J
hdiutil attach /tmp/MacBigSur.dmg -noverify -mountpoint /Volumes/MacBigSur
sudo /Applications/Install\ macOS\ Big\ Sur/Contents/Resources/createinstallmedia --volume /Volumes/MacBigSur --nointeraction
hdiutil detach /Volumes/MacBigSur/
hdiutil convert /tmp/MacBigSur.dmg -format UDTO -o ~/Desktop/MacBigSur.cdr
mv ~/Desktop/MacBigSur.cdr ~/Desktop/BigSur.iso
keyboard repeat
https://karabiner-elements.pqrs.org/docs/help/how-to/key-repeat/
defaults write -g InitialKeyRepeat -int 35 # normal minimum is 15 (225 ms)
defaults write -g KeyRepeat -int 2 # normal minimum is 2 (30 ms)
defaults write com.apple.finder AppleShowAllFiles -bool true
killall Finder -9
defaults write NSGlobalDomain AppleShowAllExtensions -bool true
# Disable automatic termination of inactive apps
defaults write NSGlobalDomain NSDisableAutomaticTermination -bool true
# Reveal IP address, hostname, OS version, etc. when clicking the clock
# in the login window
sudo defaults write /Library/Preferences/com.apple.loginwindow AdminHostInfo HostName
defaults write com.apple.Terminal "Default Window Settings" -string "Pro"
defaults write com.apple.Terminal "Startup Window Settings" -string "Pro"
# Finder: allow quitting via ⌘ + Q; doing so will also hide desktop icons
defaults write com.apple.finder QuitMenuItem -bool true
# Finder: disable window animations and Get Info animations
defaults write com.apple.finder DisableAllAnimations -bool true
# Show icons for hard drives, servers, and removable media on the desktop
defaults write com.apple.finder ShowExternalHardDrivesOnDesktop -bool true
defaults write com.apple.finder ShowHardDrivesOnDesktop -bool true
defaults write com.apple.finder ShowMountedServersOnDesktop -bool true
defaults write com.apple.finder ShowRemovableMediaOnDesktop -bool true
# Restart automatically if the computer freezes
sudo systemsetup -setrestartfreeze on
# Never go into computer sleep mode
sudo systemsetup -setcomputersleep Off > /dev/null
hash tmutil &> /dev/null && sudo tmutil disablelocal
# Finder: allow quitting via ⌘ + Q; doing so will also hide desktop icons
defaults write com.apple.finder QuitMenuItem -bool true
# Finder: disable window animations and Get Info animations
defaults write com.apple.finder DisableAllAnimations -bool true
# Show icons for hard drives, servers, and removable media on the desktop
defaults write com.apple.finder ShowExternalHardDrivesOnDesktop -bool true
defaults write com.apple.finder ShowHardDrivesOnDesktop -bool true
defaults write com.apple.finder ShowMountedServersOnDesktop -bool true
defaults write com.apple.finder ShowRemovableMediaOnDesktop -bool true
# Finder: show hidden files by default
defaults write com.apple.finder AppleShowAllFiles -bool true
# Finder: show all filename extensions
defaults write NSGlobalDomain AppleShowAllExtensions -bool true
# Finder: show status bar
defaults write com.apple.finder ShowStatusBar -bool true
# Finder: show path bar
defaults write com.apple.finder ShowPathbar -bool true
# Disable the warning when changing a file extension
defaults write com.apple.finder FXEnableExtensionChangeWarning -bool false
# Avoid creating .DS_Store files on network volumes
defaults write com.apple.desktopservices DSDontWriteNetworkStores -bool true
fancy_echo "Automatically quit printer app once the print jobs complete"
defaults write com.apple.print.PrintingPrefs "Quit When Finished" -bool true
fancy_echo "Check for software updates daily, not just once per week"
defaults write com.apple.SoftwareUpdate ScheduleFrequency -int 1
fancy_echo "Check for software updates daily, not just once per week"
defaults write com.apple.SoftwareUpdate ScheduleFrequency -int 1
fancy_echo "Empty Trash securely by default"
defaults write com.apple.finder EmptyTrashSecurely -bool true
fancy_echo "Preventing Time Machine from prompting to use new hard drives as backup volume"
defaults write com.apple.TimeMachine DoNotOfferNewDisksForBackup -bool true
fancy_echo "Disabling local Time Machine backups"
hash tmutil &> /dev/null && sudo tmutil disablelocal
fancy_echo "Show the main window when launching Activity Monitor"
defaults write com.apple.ActivityMonitor OpenMainWindow -bool true
fancy_echo "Visualize CPU usage in the Activity Monitor Dock icon"
defaults write com.apple.ActivityMonitor IconType -int 5
fancy_echo "Show all processes in Activity Monitor"
defaults write com.apple.ActivityMonitor ShowCategory -int 0
fancy_echo "Sort Activity Monitor results by CPU usage"
defaults write com.apple.ActivityMonitor SortColumn -string "CPUUsage"
defaults write com.apple.ActivityMonitor SortDirection -int 0
# Add additional search attributes to Finder
search_attributes=(
kMDItemWhereFroms
kMDItemDisplayName
kMDItemTextContent
kMDItemKind
kMDItemAudioBitRate
kMDItemLastUsedDate
kMDItemBitsPerSample
kMDItemPhysicalSize
kMDItemFSName
kMDItemDocumentContainer
kMDItemContentCreationDate
kMDItemURL
kMDItemFSContentChangeDate
"com_apple_RawQueryAttribute"
"com_apple_SearchSystemFilesAttribute"
)
for i in "${search_attributes[@]}"
do
if defaults read com.apple.finder SlicesRootAttributes | grep -q "$i"; then
defaults write com.apple.finder SlicesRootAttributes -array-add "$i"
fi
done
echo "Allowing quicklook plugins ..."
xattr -d -r com.apple.quarantine ~/Library/QuickLook
echo "Restarting the finder ..."
killall Finder
set -e
echo "Writing macOS defaults ..."
# Close any open System Preferences panes, to prevent them from overriding
# settings we’re about to change
osascript -e 'tell application "System Preferences" to quit'
# Some prefs, like Safari, need Terminal to have Full Disk Access
if ( ! ls ~/Library/Containers/com.apple.Safari 2>&1 ) | grep -q 'Operation not permitted'; then
echo "Add Terminal.app to System Preferences -> Security -> Privacy -> Full Disk Access" 1>&2
/usr/bin/open 'x-apple.systempreferences:com.apple.preference.security?Privacy_AllFiles'
exit 1
fi
defaults write com.apple.dock autohide -bool true
# Don't automatically rearrange spaces in Mission Control
defaults write com.apple.dock mru-spaces -int 0
# Enable tap to click and drag on external magic trackpad
defaults write com.apple.driver.AppleBluetoothMultitouch.trackpad Clicking -bool true
defaults write com.apple.driver.AppleBluetoothMultitouch.trackpad Dragging -bool true
# Enable tap to click and drag on built-in laptop trackpad
defaults write com.apple.driver.AppleMultitouchTrackpad Clicking -bool true
defaults write com.apple.driver.AppleMultitouchTrackpad Dragging -bool true
defaults write com.apple.AppleMultitouchTrackpad Clicking -bool true
defaults write com.apple.AppleMultitouchTrackpad Dragging -bool true
# Enable tap to click on login screen
defaults -currentHost write NSGlobalDomain com.apple.mouse.tapBehavior -int 1
defaults write NSGlobalDomain com.apple.mouse.tapBehavior -int 1
# finder prefs
defaults write com.apple.finder ShowStatusBar -bool true
defaults write com.apple.finder ShowPathbar -bool true
###############################################################################
# Dock & Mission Control
###############################################################################
fancy_echo "Wipe all (default) app icons from the Dock"
# This is only really useful when setting up a new Mac, or if you don't use
# the Dock to launch apps.
defaults write com.apple.dock persistent-apps -array
fancy_echo "Setting the icon size of Dock items to 36 pixels for optimal size/screen-realestate"
defaults write com.apple.dock tilesize -int 36
fancy_echo "Speeding up Mission Control animations and grouping windows by application"
defaults write com.apple.dock expose-animation-duration -float 0.1
defaults write com.apple.dock "expose-group-by-app" -bool true
fancy_echo "Setting Dock to auto-hide and removing the auto-hiding delay"
defaults write com.apple.dock autohide -bool true
defaults write com.apple.dock autohide-delay -float 0
defaults write com.apple.dock autohide-time-modifier -float 0
fancy_echo "Enable spring loading for all Dock items"
defaults write com.apple.dock enable-spring-load-actions-on-all-items -bool true
fancy_echo "Show indicator lights for open applications in the Dock"
defaults write com.apple.dock show-process-indicators -bool true
fancy_echo "Wipe all (default) app icons from the Dock"
# This is only really useful when setting up a new Mac, or if you don't use
# the Dock to launch apps.
defaults write com.apple.dock persistent-apps -array
fancy_echo "Don't animate opening applications from the Dock"
defaults write com.apple.dock launchanim -bool false
fancy_echo "Make Dock icons of hidden applications translucent"
defaults write com.apple.dock showhidden -bool true
fancy_echo "Speed up Mission Control animations"
defaults write com.apple.dock expose-animation-duration -float 0.1
fancy_echo "Don't group windows by application in Mission Control"
fancy_echo "(i.e. use the old Expose behavior instead)"
defaults write com.apple.dock expose-group-by-app -bool false
fancy_echo "Disable Dashboard"
defaults write com.apple.dashboard mcx-disabled -bool true
fancy_echo "Don't show Dashboard as a Space"
defaults write com.apple.dock dashboard-in-overlay -bool true
fancy_echo "Don't automatically rearrange Spaces based on most recent use"
defaults write com.apple.dock mru-spaces -bool false
https://www.macxdvd.com/mac-dvd-video-converter-how-to/ffmpeg-avi-to-mp4-free.htm
ffmpeg -i infile.avi -acodec copy -vcodec copy outfile.mp4
To batch convert avi files to mp4 with FFmpeg command line, enter:
for %%a in ("*.avi") do ffmpeg -i "%%a" -c:v libx264 -preset slow -crf 20 -c:a libvo_aacenc -b:a 128k "newfiles\%%~na.mp4"
pause
To compress avi video, enter the command line below:
ffmpeg -i input.avi -vcodec msmpeg4v2 -acodec copy output.avi
To adjust the output quality of free avi to mp4 conversion with ffmpeg, you can set the bit rate:
e.g.: ffmpeg -i input.avi -c:v libx264 -b:v 500K -c:a copy out.mp4
To cut certain part of the video, using -t (output duration) and -ss (starting point) options:
e.g.: ffmpeg -ss 00:01:30 -i input.avi -c:v copy -c:a copy -t 5 output.mp4
To resize the output mp4 for iPhone, iPad other mobiles, using -s option:
e.g.: ffmpeg -i movie.avi -c:v libx264 -s:v 854x480 -c:a copy out.mp4
https://unix.stackexchange.com/a/38380 https://stackoverflow.com/a/47499841
copy video
ffmpeg -i ./second\ half/third\ half/Rec3106_19791211074029_A_1.avi -c:v copy -c:a aac -y output3.mp4
compress
ffmpeg -i ./second\ half/third\ half/Rec3106_19791211074029_A_1.avi -vcodec libx265 -crf 28 -c:a aac -y output6.mp4
sudo ettercap -T -S -i en0 -M arp:remote /10.0.0.1// /10.0.0.129//
references: https://www.youtube.com/watch?v=-rSqbgI7oZM
nmap --script vuln 73.127.13.84/24
nmap -A 73.127.13.84/24
nmap -sS -A 73.127.13.84/24
sudo nmap -p 80 -Pn --spoof-mac 00:00:00:00 73.127.13.1-127
sudo nmap -p 33202 -A 73.127.13.84
hosts scan - don't forget to use sudo
nmap -A 10.0.0.1-255
nmap -sP 10.0.0.0/24
nmap -sn 10.0.0.0/24
sudo nmap -sU 10.0.0.0/24
nmap -vvv -p 1-1000 10.0.0.1-255
sudo nmap -vvv 10.0.0.0/24
sudo nmap -Avvv 10.0.0.0/24
sudo nmap -oA `date +"%Y-%m-%d"`-uniquename
nmap -p80 -PS80 -Pn --open 10.0.0.1/24 --script http-fetch --script-args 'destination=/tmp/files'
sudo nmap -sS -Pn -v -f -D 46.242.8.144,46.242.8.143,46.242.8.142 46.242.8.144/32
speed up nmap - https://www.professormesser.com/nmap/how-to-supercharge-your-nmap-scans/4/ ⭐️⭐️⭐️
https://security.stackexchange.com/questions/176980/most-efficient-way-to-scan-for-webservers
# dry run
rsync -avvWmi /Volumes/ssd /private/var/root/Snowcone/buckets/00-snowcone/nas/ssd --inplace --ignore-existing --compress-level=0 --cache --stats --progress --dry-run
# regular run (can use multiple shells)
rsync -avvWmi /Volumes/ssd /private/var/root/Snowcone/buckets/00-snowcone/nas/ssd --inplace --ignore-existing --compress-level=0 --cache --stats --progress >./rsync.out 2>./rsync.err
https://stackoverflow.com/a/46611168
ls -1 /Volumes/ssd | xargs -I {} -P 5 -n 1 rsync -avh /Volumes/ssd/{} /private/var/root/Snowcone/buckets/00-snowcone/nas/ssd
scp -r vmlinuz.old [email protected]:~/linux/
ssh user@host "(cd /desired/path; tar cvzf - *)" > /path/to/backup.tar.gz
https://osxdaily.com/2011/04/20/console-logs-command-line-mac/
tail -f /var/log/system.log
tail -f /var/log/kernel.log
find . -name node_modules -type d -prune -exec trash {} +
- find . -name node_modules -type d -prune -print -exec rm -rf '{}' \;
- find . -iregex '/(.+)?\.env(.+)?/'
find . -maxdepth 5 -name node_modules -type d -prune -print -exec rm -rf '{}' \;
- find . -mindepth 5 -maxdepth 10 -name node_modules -type d -prune -print -exec rm -rf '{}' \;
- find . -maxdepth 5 -iregex '/(.+)?\.env(.+)?/' -type d -print -exec rm -rf '{}' \;
- sudo mount /dev/disk/by-label/EFI /media/G-DRIVE\ USB/
sudo unmount /dev/disk/by-label/EFI /media/G-DRIVE\ USB/
- lsblk -e7
- udisksctl mount -b /boot/
udisksctl unmount -b /dev/sde1
- sudo ntfsfix /dev/sdc1
- sudo chown zoot:zoot ./Repos
- sudo lsblk --scsi
- sudo mount /dev/disk/by-label/G-UTILITIES /media/G-UTILITIES
- find . -maxdepth 5 -iregex '/(.+)?\.(.+)?env(.+)?/' -type d -print -exec rm -rf '{}' \;
- null
- find . -maxdepth 5 -iname '*.env' -type d -print -exec rm -rf '{}' \;
references:
install yubikey manager app and pair yubikey
https://developers.yubico.com/yubikey-manager-qt/Releases/yubikey-manager-qt-latest-mac.pkg
https://github.com/macsecurity/autodeploy https://support.yubico.com/hc/en-us/articles/360016649059-Using-Your-YubiKey-as-a-Smart-Card-in-macOS https://developers.yubico.com/PIV/Guides/Smart_card-only_authentication_on_macOS.html https://support.apple.com/en-us/HT208372
# sso
sudo cp /etc/ssh/sshd_config /etc/ssh/sshd_config_backup_`date "+%Y-%m-%d_%H:%M"`
In the sshd_config file, change "#ChallengeResponseAuthentication yes" to "ChallengeResponseAuthentication no" and change "#PasswordAuthentication yes" to "#PasswordAuthentication no.
sudo launchctl stop com.openssh.sshd
sudo launchctl start com.openssh.sshd
sudo cp /etc/pam.d/sudo /etc/pam.d/sudo_backup_`date "+%Y-%m-%d_%H:%M"`
sudo tee /etc/pam.d/sudo > /dev/null <<EOT
# sudo: auth account password session
auth sufficient pam_smartcard.so
auth required pam_opendirectory.so
auth required pam_deny.so
account required pam_permit.so
password required pam_deny.so
session required pam_permit.so
EOT
sudo cp /etc/pam.d/login /etc/pam.d/login_backup_`date "+%Y-%m-%d_%H:%M"`
sudo tee /etc/pam.d/login > /dev/null <<EOT
# login: auth account password session
auth sufficient pam_smartcard.so
auth optional pam_krb5.so use_kcminit
auth optional pam_ntlm.so try_first_pass
auth optional pam_mount.so try_first_pass
auth required pam_opendirectory.so try_first_pass
auth required pam_deny.so
account required pam_nologin.so
account required pam_opendirectory.so
password required pam_opendirectory.so
session required pam_launchd.so
session required pam_uwtmp.so
session optional pam_mount.so
EOT
sudo cp /etc/pam.d/su /etc/pam.d/login_backup_`date "+%Y-%m-%d_%H:%M"`
sudo tee /etc/pam.d/su > /dev/null <<EOT
# su: auth account password session
auth sufficient pam_smartcard.so
auth required pam_rootok.so
auth required pam_group.so no_warn group=admin,wheel ruser root_only fail_safe
account required pam_permit.so
account required pam_opendirectory.so no_check_shell
password required pam_opendirectory.so
session required pam_launchd.so
EOT
https://github.com/macsecurity/autodeploy/blob/main/SmartCardOnlyLogin.mobileconfig
https://wpbeaches.com/how-to-compress-and-uncompress-files-and-folders-in-the-terminal-in-macos-big-sur/
zip -r archive_name.zip folder_to_compress
Information Gathering
https://github.com/laramies/theHarvester
https://www.netcraft.com/tools/
https://github.com/thewhiteh4t/FinalRecon
https://github.com/urbanadventurer/WhatWeb
https://chrome.google.com/webstore/detail/wappalyzer-technology-pro/gppongmhjkpfnbhagpmjfkannfbllamg
w3techs.com
Good security system for RF-proofing
https://www.fluenthome.com/can-security-system-hacked-truth-may-surprise/
https://www.ettus.com/all-products/UN210-KIT/
https://www.blackhat.com/us-14/briefings.html#home-insecurity-no-alarms-false-alarms-and-sigint
https://www.wired.com/2014/07/hacking-home-alarms/
https://heykangaroo.com/products/8-piece-security-kit-with-professional-monitoring
ecobee.com/en-us/smart-security/getting-started-2/
Ettercap
https://github.com/Ettercap/ettercap/wiki/macosx ** ettercap cli
brew install ettercap adwaita-icon-theme geoip
https://tinyurl.com/geo-ip-dat -> /usr/local/var/GeoIP
sudo ettercap -G
Create fake AP
https://www.offensive-security.com/kali-linux/kali-linux-evil-wireless-access-point/
hostapd
http://nitlab.inf.uth.gr/mazi-guides/hostapd.html
https://hawksites.newpaltz.edu/myerse/2018/06/08/hostapd-on-raspberry-pi/comment-page-1/
https://www.kali.org/tools/hostapd-wpe/
https://www.laszlopusztai.net/2016/02/14/creating-a-wi-fi-access-point-on-os-x/
Exploit Wordpress
https://book.hacktricks.xyz/pentesting/pentesting-web/wordpress
https://www.searchenginejournal.com/wp-fastest-cache-vulnerability/424278/#close
https://hackertarget.com/attacking-wordpress/ ⭐️⭐️⭐️⭐️⭐️
https://github.com/macsecurity/WP-Exploiter
https://pro.builtwith.com/report/export/d8db83c9-c48f-4629-8eea-e0078bf11a1f
https://hostedscan.com/scans ⭐️⭐️⭐️
"hackertarget alternatives"
"builtwith alternatives"
https://hunter.io/techlookup?via=ryan
https://www.wappalyzer.com/lookup/rt.ru
https://www.whitehatsec.com/blog/cve-2015-0204-freak-attack/
https://www.ssllabs.com/ssltest/
https://geekflare.com/test-freak-attack-cve-2015-0204-and-fix/
https://nvd.nist.gov/vuln/detail/CVE-2015-0204
Dorking
https://www.hackingloops.com/google-dorks/ ⭐️⭐️⭐️
https://securitytrails.com/blog/google-hacking-techniques
https://book.hacktricks.xyz/pentesting/pentesting-web/wordpress **
Mac firmware exploits
https://www.wired.com/2015/08/researchers-create-first-firmware-worm-attacks-macs/
Thunderstrike2
https://trmm.net/Thunderstrike_2/
https://trmm.net/Thunderstrike2_demo/
https://thehackernews.com/2015/08/thunderstrike-mac-firmware-malware.html
https://trmm.net/Thunderstrike2_details/
https://github.com/macsecurity/t2e_integrity_check ⭐️⭐️⭐️
https://github.com/macsecurity/Mac_Security_S3 ⭐️⭐️⭐️⭐️
kali evil access point image
How to start a botnet
⭐️⭐️⭐️⭐️⭐️ https://securitytrails.com/blog/google-hacking-techniques ⭐️⭐️⭐️⭐️⭐️
https://www.exploit-db.com/ghdb/4702
filetype:env DB_PASSWORD
intitle:"Apache2 Ubuntu Default Page: It works"
filetype:conf apache2
https://chaoss.biterg.io/app/kibana#/dashboard/Git-Areas-of-Code?_g=h@44136fa&_a=h@c3c57ba
inurl:app/kibana intext:Loading Kibana
inurl:Dashboard.jspa intext:"Atlassian Jira Project Management Software"
https://www.exploit-db.com/google-hacking-database?category=8
intitle:"phpinfo()" inurl:"phpinfo.php"
inurl:"/php/info.php" "PHP Version"
⭐️⭐️⭐️
intitle:"index of" "wpadmin-secure.htaccess"
https://www.exploit-db.com/google-hacking-database?category=8 ⭐️⭐️⭐️⭐️ (ideas)
inurl: /wp-content/uploads/ inurl:"robots.txt" "Disallow:" filetype:txt
inurl:pastebin "SHODAN_API_KEY"
intitle:"index of" "apache.log" | "apache.logs"
intitle:"index of "/key/" "key.txt"
intitle:"index of" site:gov.ru
site:drive.google.com "*.pdf"
intitle:"index of" "sysinfo"
intitle.index of API*.txt
intitle:"index of" "admin*.txt"
inurl: /wp-content/uploads/ inurl:"robots.txt" "Disallow:" filetype:txt
intitle:"index of" "wp-config.php.bak"
backdoor upload
https://gist.github.com/jonaslejon/084f1de55c3b3e29ce06
https://medium.com/@mohdaltaf163/uploading-backdoor-for-fun-and-profit-rce-db-cred-p1-2cdaa00e2125 ⭐️⭐️⭐️⭐️
https://github.com/hacktoolspack/hack-tools/blob/master/dorkattack.py ⭐️⭐️⭐️
https://github.com/hacktoolspack/hack-tools/tree/master/HackTheWorld
Sandboxing
https://infosecwriteups.com/malware-analysis-101-sandboxing-746a06432334
https://www.youtube.com/watch?v=oPsxy9JF8FM
https://app.any.run/ ⭐️⭐️⭐️⭐️
https://infosecwriteups.com/malware-analysis-101-sandboxing-746a06432334
https://www.ptsecurity.com/ww-en/analytics/antisandbox-techniques/
https://www.esecurityplanet.com/endpoint/sandboxing-advanced-malware-analysis/
Crawling Tor
Location Data Breaches
https://www.duocircle.com/email-security/top-data-breaches-of-the-year-and-lessons-for-2022
bladeRF x40 - full duplex gsm basestation device
https://hackaday.com/2016/04/08/build-your-own-gsm-base-station-for-fun-and-profit/
https://www.electromaker.io/shop/product/bladerf-x40
https://www.linkedin.com/pulse/hacking-gsm-building-rogue-base-station-hack-cellular-alissa ⭐️⭐️⭐️⭐️⭐️⭐️
https://www.electromaker.io/shop/product/bladerf-20-micro-xa4
https://www.vice.com/en/article/gy7qm9/how-i-made-imsi-catcher-cheap-amazon-github
Anonymous Campaigns
https://1920.in/
https://mail.1920.in/
https://1920.in/api
185.193.125.164