We do not take responsibility for any damage, or legal issues, done with these files here at AT Products LLC, Ethical Hacking Society, The Script Community, CodingHome, or Noodle Hackerspace.
Use a virtual machine if it's a computer virus; never open it on your physical machine. As a precaution, download them on your VM.
If it's an APK file, use an emulator.
More information on Virtual Machines (VM)
More information on APK Emulators
Hacking Course - Network Penetration Testing HackTheBox TryHackMe E-Books Library of tools from Kali Linux OS W3schools freeCodeCamp CodeAcademy Course 1 Course 2
You can write text that the program will ignore by beginning the line with a #, this helps with reminding you what certain code does or for explaining purposes.
py
# This is a comment
Variables can store data of different types, and different types can do different things.
Python has the following data types built-in by default, in these categories:
Text Type: str
Numeric Types: int, float, complex
Sequence Types: list, tuple, range
Mapping Type: dict
Set Types: set, frozenset
Boolean Type: bool
Binary Types: bytes, bytearray, memoryview
We will go more in-depth on some of these types in the next few paragraphs.
You can print the data type of a variable with the type() function:
py
x = 5
print(type(x))
Strings are surrounded by either single quotation marks, or double quotation marks.
py
x = "hello"
y = 'hello'
# single quotations and double quotation marks are the same
x == y # returns True
You can assign a multiline string to a variable by using three quotes:
py
x = """The FitnessGram Pacer test is a multistage aerobic capacity test that progressively gets more difficult as it continues. The 20 meter Pacer test will begin in 30 seconds."""
You can check the length of a string using the len() function:
py
x = "hello"
print(len(text)) # returns 5
There are 2 primary, int
and float
py
x = 2 # int
y = 2.8 # float
To verify the type of an object in Python, use the type() function:
py
print(type(x))
print(type(y))
Int, or integers, are whole numbers, positive or negative, without decimals.
Float is a number, positive or negative, containing one or more decimals.
Both strings and numbers are built-in data types.
<script type="text/javascript">
//JS code goes here
</script>
<script src="myscript.js"></script>
Single line comments - // Comment
Multi-line comments - /* comment here */
var, const, let
var
— The most common variable. Can be reassigned but only accessed within a function. Variables defined with var move to the top when code is executed.
const
— Can not be reassigned and not accessible before they appear within the code.
let
— Similar to const, however, let variable can be reassigned but not re-declared.
Numbers — var age = 23
Variables — var x
Text (strings) — var a = "init"
Operations — var b = 1 + 2 + 3
True or fase statements — var c = true
Constant numbers — const PI = 3.14
Objects — var name = {firstName:"John", lastName:”Doe"}
Objects Example
var person = {
firstName:"John",
lastName:"Doe",
age:20,
nationality:"American"
};
<!DOCTYPE HTML>
<html>
<head>
</head>
<body>
<h1> This is a heading </h1>
<p> This is text </p>
<a href="https://example.com">This is a link</a>
<img src="at.png" width="99.99% alt="Example Image">
</body>
</html>
We got to first lay down the very first thing to know. The <!DOCTYPE html>
tag represents the Document Type and helps some browsers display correctly with your website, must only be used once. Some elements do need a closing tag, like </center>
.
The <head>
tag is needed to represent the head of the website. The <body>
tag is the same thing, but it's the body.
Some elements are meant to show text like <text>
, and <p>
.
<p> This is text </p>
The <h>
tag has 6 different sizes, from <h1>
to <h6>
.
1 is the hugest, to 6 is the smallest.
<h1> This is a heading </h1>
The <a>
is a text element to represent links. Once clicked on the hyperlink, will redirect the user to a new link.
<a href="atproducts.tk">Example Website</a>
The <img>
tag is to show a image. The width or height description can be used by pixels or percentages by displays. The alt
tag shows up when the image doesn't load or can't load, it shows the description.
<img src="at.png" width="99.99% alt="Example Image">
Section by Nasus
Open source intelligence (OSINT) is the practice of collecting information from published or otherwise publicly available sources. This can be used to learn more about your targets
Reverse Image Lookup Mac Address Lookup EXIF Data Database Lookup IP Lookup Archive.org
This is not DDoS. You have to distribute this code amongst a botnet for it to actually do damage. It only works against websites.
A denial-of-service (DoS) attack is a type of cyber attack in which a malicious actor aims to render a computer or other device unavailable to its intended users by interrupting the device's normal functioning. DoS attacks typically function by overwhelming or flooding a targeted machine with requests until normal traffic is unable to be processed, resulting in denial-of-service to addition users. A DoS attack is characterized by using a single computer to launch the attack.
A distributed denial-of-service (DDoS) attack is a type of DoS attack that comes from many distributed sources, such as a botnet DDoS attack.
Website HTTP Flooder
A password, sometimes called a passcode, is secret data, typically a string of characters, usually used to confirm a user's identity.
A strong password should be minimum 8 characters long and consist of lowercase, uppercase, numbers and symbols
Password Generator (Python) haveibeenpwned (Python | Request) by Nasus
Nasus hasn't made a cracker yet, so he recommends Vanhauser's, and Openwall's.
Channels, users, servers and categories have IDs also known as snowflakes. You can easily calculate when that item was created.
ID Creation Time (Python) by Nasus
Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program.
Keylogger (Python | pynput) by Nasus
Advanced Key Logger (Python) Decryptor (Python) Requirements (TXT) all by CУБΞЯC.
Try these links from CУБΞЯC and Nasus
Delgan
MetaChris
wodxgod
It's Vichy
KLDiscord
Monst3red Alphalius's Rage BillyTheGoat356's Riot BillyTheGoat356's Plague BillyTheGoat356's Rage NotSaksh ECriminal Verlox KanekiWeb
Discord Injector (WCBandit) Discord Token Stealer Malware Protection (ZaikoARD) Uvipen's ASCII Generator
Note that an actual working key would take over a billion (10^6) years to find.
Phishing is a type of social engineering where an attacker sends a fraudulent (e.g., spoofed, fake, or otherwise deceptive) message designed to trick a human victim into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware. Phishing attacks have become increasingly sophisticated and often transparently mirror the site being targeted.
As of 2020, phishing is by far the most common attack performed by cybercriminals
Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security holes in the configuration and computer code that websites are using. Google dorking could also be used for OSINT (Open Source Intelligence). This can be used to find information that was made public on accident. You can find more information about your targets this way. This can be very entertaining: finding public cameras, password lists, peoples files and passwords, gov documents, admin panels, and much more.
"search string"
- web pages that contain the exact same string
string | string
- between queries will return results for each string
site: wikipedia.org
- search for certain words on a website
-site: wikipedia.org
- do not show results for a website
inurl:"view.shtml" "Network Camera"
- find network cameras
?intitle:index.of? mp3 artist_name
- find mp3 files of songs
intitle:"index of" inurl:ftp
- find exposed FTP servers
filetype:txt inurl:"email.txt"
- email lists (Government emails can be found)
filetype:ppt gulf war
- find supported files
allintext:username filetype:log
- find usernames and password logfiles
intitle:"Index of..etc" passwd
- Linux machines with directory exposed
index of any-show-name
- Find shows and movies for free
ethical hacking site:drive.google.com
- Find free courses
index of software-name
- Find free software
ext:log “Software: Microsoft Internet Information Services *.*”
- Microsoft ISS server logs (online activity)
Section by Nasus
Wireshark is a network protocol analyzer used to capture traffic.
Putting your adapter in Monitor mode, or RFMON mode, allows a computer with a wireless network interface controller to monitor all traffic received on a wireless channel. Unlike promiscuous mode, which is also used for packet sniffing, monitor mode allows packets to be captured without having to associate with an access point
Buy a WiFi Adapter that supports Monitor Mode.
The most recommended brand is Alla for WiFi Adapters.
Alla Network AWUS036NH & Alla Network 1000 mW AWUS036H.