SOLANI

  • Sep 29, 2023
  • Joined Sep 19, 2023
  • 0 best answers
  • Guide:

    1. First visit- https://elements.envato.com/ and copy the item name.

    2. Secondly, visit- https://gift4designer.net/ and paste the item name.

    3. Click on the item details, where you’ll get the item code. Copy the item code.

    4. Visit- https://fuckdcma.com/ to download the file with item code.

    5. Paste the item code and click on “get this item”. The download link will be generated in a few seconds.

    6. Now, download the file ans use it!

  • Grow your Instagram ,TikTok and YouTube shorts follower with Ai Videos

    Total of 100 motivational HD videos without logo

    Add your logo-and upload to your Instagram page and get follower

    Google drive link

    Download Here

    • What You’ll Get:

      • 200+ Lightroom Desktop & Mobile Presets

      • 200+ Skin Tone Protected Presets

      • 150+ LUTs

      • 50 +Skin Tone Protected LUTs

      • PDF Installation guide

      The following packs include:

      • 10 paradise lightroom mobile and desktop presets

      • 11 Norway lightroom mobile and desktop presets

      • 13 Fresh Look lightroom mobile and desktop presets

      • 13 Boho Wedding lightroom mobile and desktop presets

      • 50 Santorini lightroom presets and luts

      • 50 Lifestyle Blogger lightroom presets and luts

      • 7 Holiday lightroom presets dekstop and mobile

      • 10 Light Airy Wedding HIM & HER lightroom presets

      • 25 Icelandic lightroom presets and luts

      • 25 Golden Warmth lightroom presets and luts

      Free Download Here

    • Web Hacking Playground | Is A Controlled Web Hacking Environment

      Web Hacking Playground

      Description

      Web Hacking Playground is a controlled web hacking environment. It consists of vulnerabilities found in real cases, both in pentests and in Bug Bounty programs. The objective is that users can practice with them, and learn to detect and exploit them.

      Other topics of interest will also be addressed, such as: bypassing filters by creating custom payloads, executing chained attacks exploiting various vulnerabilities, developing proof-of-concept scripts, among others.

      Important

      The application source code is visible. However, the lab’s approach is a black box one. Therefore, the code should not be reviewed to resolve the challenges.

      Additionally, it should be noted that fuzzing (both parameters and directories) and brute force attacks do not provide any advantage in this lab.

      Setup

      It is recommended to use Kali Linux to perform this lab. In case of using a virtual machine, it is advisable to use the VMware Workstation Player hypervisor.

      The environment is based on Docker and Docker Compose, so it is necessary to have both installed.

      To install Docker on Kali Linux, run the following commands:

      $$
      sudo apt update -y
      sudo apt install -y docker.io
      sudo systemctl enable docker –now
      sudo usermod -aG docker $USER
      $$

      To install Docker on other Debian-based distributions, run the following commands:

      $$
      curl -fsSL https://get.docker.com -o get-docker.sh
      sudo sh get-docker.sh
      sudo systemctl enable docker –now
      sudo usermod -aG docker $USER
      $$

      It is recommended to log out and log in again so that the user is recognized as belonging to the docker group.

      To install Docker Compose, run the following command:

      $$
      sudo apt install -y docker-compose
      $$

      Note: In case of using M1 it is recommended to execute the following command before building the images:

      $$
      export DOCKER_DEFAULT_PLATFORM=linux/amd64
      $$

      The next step is to clone the repository and build the Docker images:

      $$
      git clone https://github.com/takito1812/web-hacking-playground.git
      cd web-hacking-playground
      docker-compose build
      $$

      Also, it is recommended to install the Foxy Proxy browser extension, which allows you to easily change proxy settings, and Burp Suite 1, which we will use to intercept HTTP requests.

      We will create a new profile in Foxy Proxy to use Burp Suite as a proxy. To do this, we go to the Foxy Proxy options, and add a proxy with the following configuration:

      • Proxy Type: HTTP

      • Proxy IP address: 127.0.0.1

      • Port: 8080

      Deployment

      Once everything you need is installed, you can deploy the environment with the following command:

      $$
      git clone https://github.com/takito1812/web-hacking-playground.git
      cd web-hacking-playground
      docker-compose up -d
      $$

      This will create two containers of applications developed in Flask on port 80:

      • The vulnerable web application (Socially): Simulates a social network.

      • The exploit server: You should not try to hack it, since it does not have any vulnerabilities. Its objective is to simulate a victim’s access to a malicious link.

      Important

      It is necessary to add the IP of the containers to the /etc/hosts file, so that they can be accessed by name and that the exploit server can communicate with the vulnerable web application. To do this, run the following commands:

      $$
      sudo sed -i ‘/whp-/d’ /etc/hosts
      echo “$(docker inspect -f ‘{{range .NetworkSettings.Networks}}{{.IPAddress}}{{end}}’ whp-socially) whp-socially” | sudo tee -a /etc/hosts
      echo “$(docker inspect -f ‘{{range .NetworkSettings.Networks}}{{.IPAddress}}{{end}}’ whp-exploitserver) whp-exploitserver” | sudo tee -a /etc/hosts
      $$

      Once this is done, the vulnerable application can be accessed from http://whp-socially and the exploit server from http://whp-exploitserver.

      When using the exploit server, the above URLs must be used, using the domain name and not the IPs. This ensures correct communication between containers.

      When it comes to hacking, to represent the attacker’s server, the local Docker IP must be used, since the lab is not intended to make requests to external servers such as Burp Collaborator, Interactsh, etc. A Python http.server can be used to simulate a web server and receive HTTP interactions. To do this, run the following command:

      $$
      sudo python3 -m http.server 80
      $$

      Stages

      The environment is divided into three stages, each with different vulnerabilities. It is important that they are done in order, as the vulnerabilities in the following stages build on those in the previous stages. The stages are:

      • Stage 1: Access with any user

      • Stage 2: Access as admin

      • Stage 3: Read the /flag file

      Important

      Below are spoilers for each stage’s vulnerabilities. If you don’t need help, you can skip this section. On the other hand, if you don’t know where to start, or want to check if you’re on the right track, you can extend the section that interests you.

      Stage 1: Access with any user

      Display

      Stage 2: Access as admin

      Display

      Stage 3: Read the /flag file

      Display

      Solutions

      Detailed solutions for each stage can be found in the Solutions folder.

      Resources

      The following resources may be helpful in resolving the stages:

      Collaboration

      Pull requests are welcome. If you find any bugs, please open an issue.

      GitHub

    • made-with-python

      Logo

      Archive.org-Downloader

      Python3 script to download archive.org books in PDF format !

      About The Project

      There are many great books available on https://openlibrary.org/ and https://archive.org/, however, you can only borrow them for 1 hour to 14 days and you don’t have the option to download it as a PDF to read it offline or share it with your friends. I created this program to solve this problem and retrieve the original book in pdf format for FREE !

      Of course, the download takes a few minutes depending on the number of pages and the quality of the images you have selected. You must also create an account on https://archive.org/ for the script to work.

      Getting Started

      To get started you need to have python3 installed. If it is not the case you can download it here : https://www.python.org/downloads/

      Installation

      Make sure you’ve already git installed. Then you can run the following commands to get the scripts on your computer:

      $$
      git clone https://github.com/MiniGlome/Archive.org-Downloader.git
      cd Archive.org-Downloader
      $$

      The script requires the modules requests, tqdm and img2pdf, you can install them all at once with this command:

      $$
      pip install -r requirements.txt
      $$

      Usage

      $$
      usage: archive-org-downloader.py [-h] -e EMAIL -p PASSWORD [-u URL] [-d DIR] [-f FILE] [-r RESOLUTION] [-t THREADS] [-j]

      optional arguments:
      -h, –help show this help message and exit
      -e EMAIL, –email EMAIL
      Your archive.org email
      -p PASSWORD, –password PASSWORD
      Your archive.org password
      -u URL, –url URL Link to the book (https://archive.org/details/XXXX). You can use this argument several times
      to download multiple books
      -d DIR, –dir DIR Output directory
      -f FILE, –file FILE File where are stored the URLs of the books to download
      -r RESOLUTION, –resolution RESOLUTION
      Image resolution (10 to 0, 0 is the highest), [default 3]
      -t THREADS, –threads THREADS
      Maximum number of threads, [default 50]
      -j, –jpg Output to individual JPG’s rather then a PDF
      $$

      The email and password fields are required, so to use this script you must have a registered account on archive.org. The -r argument specifies the resolution of the images (0 is the best quality). The PDF are downloaded in the current folder

      Example

      This command will download the 3 books as pdf in the best possible quality. To only downlaod the individual images you can use --jpg.

      $$
      python3 archive-org-downloader.py -e myemail@tempmail.com -p Passw0rd -r 0 -u https://archive.org/details/IntermediatePython -u https://archive.org/details/horrorgamispooky0000bidd_m7r1 -u https://archive.org/details/elblabladelosge00gaut
      $$

      If you want to download a lot of books in a raw you can paste the urls of the books in a .txt file (one per line) and use --file

      $$
      python3 archive-org-downloader.py
      $$