16 Eylül 2023 Cumartesi

X-Osint

X-osint
This is an osint tool which gathers useful and yet credible valid information about a phone number, user's email address and ip address and more to come in future updates.




Features
IP Address information gathering
Email Address information gathering
Phone number information gathering
Host finding
Ports finding
Subdomain Enumeration
CVE Exploits Finder
Email Finder
Exploit Open Source Vulnerability Database
DNS Lookup
DNS Reverse
Vin extractor
Protonmail OSINT And many more...

Requirements
python-3
pip
Internet Connection
And some other python packages

Installation
cd $HOME
git clone https://github.com/TermuxHackz/X-osint
cd X-osint
chmod +x *
bash setup.sh

Installation using python virtual environment if normal installation doesnt work
The normal installation of Xosint might likely have some issues running or installing due to some missing python packages, use this method only if the normal installation and usage doesnt work!!

cd $HOME
git clone https://github.com/TermuxHackz/X-osint
cd X-osint
chmod +x *.sh
python3 -m venv X-osint_venv
source X-osint_venv/bin/activate�./setup.sh
pip install google
python xosint



Shell

Shell 🐚

🔹 Goshell - Generate reverse shells in command line with Go. 
🔗https://github.com/eze-kiel/goshell

🔹Print-My-Shell - Python script wrote to automate the process of generating various reverse shells.
🔗https://github.com/sameera-madushan/Print-My-Shell

🔹Reverse-shell-generator - Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)
🔗https://github.com/0dayCTF/reverse-shell-generator

🔹Girsh - Automatically spawn a reverse shell fully interactive for Linux or Windows victim.
🔗https://github.com/nodauf/Girsh

🔹 Blueshell - Generate a reverse shells for Red Team.
🔗https://github.com/whitehatnote/BlueShell

🔹Clink - Powerful Bash-style command line editing for cmd.exe.
🔗http://mridgers.github.io/clink/

🔹Natpass - A new RAT Tools, Support Web VNC and Webshell.
🔗https://github.com/jkstack/natpass

🔹Platypus 🔨 A modern multiple reverse shell sessions manager written in Go.
🔗https://github.com/WangYihang/Platypus

🔹shells - Script for generating revshells.
🔗https://github.com/4ndr34z/shells/

🔹Reverse_ssh - SSH based reverse shell.
🔗https://github.com/NHAS/reverse_ssh

🔹Hoaxshell - A Windows reverse shell payload generator and handler that abuses the http(s) protocol to establish a beacon-like reverse shell.
🔗https://github.com/t3l3machus/hoaxshell

🔖#infosec #cybersecurity #hacking #pentesting #security 

15 Eylül 2023 Cuma

SS7 ATTACK

🔥 SS7 Attack Paid Tutorial⭐️

👁 Language : English

🌈Hijacking Network Elements Over SS7 - A New Type of Attack

🌈What is Signaling SS7 in GSM & Cellular wireless Networks

🌈Software & Hardware Need for SS7

🌈SS7 attack Part - 2 Kali Linux
SS7 - Part - 3 Cell Phone Signal Jammer Kali Linux

🌈SS7 GSM Sniffing Wireshark 100 % True

🌈SS7 And GSM Arsenal Installed Kali Linux

🌈SS7 Dependence Install Kali Linux 2020.2

➖➖➖➖➖➖➖➖➖➖

⛏ 🔹Download Here - 

🔗 Download Link 1:- https://link-center.net/886759/ss7-attack-paid-tutorial (Linvertise Link)
🔗 Download Link 2:- https://onotepad.com/sdTJDP (GP Link)

➖➖➖➖➖➖➖➖➖➖




30 Mart 2023 Perşembe

For other brands usernames and passwords please see below:

Camera Manufacturer

Username

Password

Default IP

3xLogic 

admin

12345

192.0.0.64

ACTI

Admin or admin

123456

192.168.0.100

American Dynmics

admin

admin

192.168.1.168

Arecont Vision

admin

no set password

no default/DHCP

Avigilon

admin

admin

no default/DHCP

Axis

root

pass or no set password

192.168.0.90

Basler

admin

admin

192.168.100.x

Bosch

service

service

192.168.0.1

Bosch

Dinion

no set password

192.168.0.1

Brickcom

admin

admin

192.168.1.1

Canon

root

Model# of camera

192.168.100.1

CBC Ganz

admin

admin

192.168.100.x

Cisco

no default

no set password

192.168.0.100

CNB

root

admin

192.168.123.100

Costar

root

root

unknown

Dahua

admin

admin

192.168.1.108

Digital Watchdog

admin

admin

192.168.1.123

DRS

admin

1234

192.168.0.200

DVTel

Admin

1234

192.168.0.250

DynaColor

Admin

1234

192.168.0.250

FLIR

admin

fliradmin

192.168.250.116

Foscam

admin

[leave blank]

unknown

GeoVision

admin

admin

192.168.0.10

Grandstream

admin

admin

192.168.1.168

GVI

Admin

1234

192.168.0.250

HIKVision

admin

12345

192.0.0.64

Honeywell

administrator

1234

no default/DHCP

IOImage

admin

admin

192.168.123.10

IPX-DDK

root

Admin or admin

192.168.1.168

IQInvision

root

system

no default/DHCP

JVC

admin

Model# of camera

no default/DHCP

LTS

admin

123456

192.0.0.64

March Networks

admin

[leave blank]

unknown

Merit Lilin Camera

admin

pass

no default/DHCP

Merit Lilin Recorder

admin

1111

no default/DHCP

Messoa

admin

Model# of camera

192.168.1.30

Mobotix

admin

meinsm

no default/DHCP

Northern

admin

12345

192.168.1.64

Panasonic

admin

12345

192.168.0.253

Panasonic

admin1

password

192.168.0.253

Pelco

admin

admin

no default/DHCP

PiXORD

admin

admin

192.168.0.200

PiXORD

root

pass

192.168.0.200

QVIS

Admin

1234

192.168.0.250

Samsung

root

4321 or admin

192.168.1.200

Samsung

admin

4321 or 1111111

192.168.1.200

Sanyo

admin

admin

192.168.0.2

Sentry360

Admin

1234

192.168.0.250

Sony

admin

admin

192.168.0.100

Speco

root

root

192.168.1.7

Speco

admin

admin

192.168.1.7

StarDot

admin

admin

no default/DHCP

Starvedia

admin

no set password

no default/DHCP

Toshiba

root

ikwb

192.168.0.30

Trendnet

admin

admin

192.168.10.1

UDP 

root

unknown

unknown

Ubiquite

ubnt

ubnt

192.168.1.20

W-Box

admin

wbox123

192.0.0.64

Wodsee

admin

[leave blank]

unknown

Verint

admin

admin

no default/DHCP

VideoIQ

supervisor

supervisor

no default/DHCP

Vivotex

root

no set password

no default/DHCP

CCTV IP Camera Default Usernames, Passwords and IP Addresses Setting

  Acti

Username: Admin/admin
Password: 12345/123456
IP address: 192. 168.0.100


Arecont Vision
Arecont does not have a default password , but you can reset it to factory settings. Follow these steps
1-Access the camera's web interface by typing the IP in your web browser.
2-Under the Administration or System tab, click on Restore to Factory Default.
3-Once the camera reboots, all settings on the camera will be restored to factory default

AXIS
For an old system:
Username: Root
Password: Pass
IP Address: 192.168.0.90
But new generation AXIS cameras have a resetting sequence
1-Remove the Ethernet cable
2-Press and hold the control button and insert the Ethernet cable again while holding the control button.
3-Hold the control button until the amber lights turn on.
4-Then release the button .
5-Wait about 1 minute.
6-When the amber lights turns into the green lights your camera is resetted and your passoword as well

BOSCH
For old models:
Username: service
Password: service
IP Address: 192.168.0.1
For new models:
You can reset the camera by pushing the reset button about 7 seconds. Or you can reset the NVR by removing the battery on the mainboard (not recommended, at your own risk)

DAHUA
Username: admin
Password: admin

GEOVISION
Username: admin
Password: admin
IP Address: 192.168.1.108

HIKVISION
For old models (before firmware 5.3.0)
Username: admin
Password: 12345
IP Address: 192.0.0.64
For new models you can reset password via SADP tool. Please click the link below and follow the instructions on the pdf file
Hikvision password resetting guide

LTS Security
Username: admin
Password: 12345 or123456
IP Address: 192.0.0.64
For platinum models please click the link below for pdf file.
LTS platinum series password reset

Messoa
Username: admin
Password: 1234 or model number of camera or
IP address: 192.168.1.30
Mobotix:
Username: admin
Password: meinsm

SAMSUNG Techwin
For old models
Username: admin
Password: 111111 or 1111111
For new models
Username: admin
Password: 4321
IP Address: 192.168.1.200

SONY
Username: admin
Password: admin
IP Address: 192.168.0.100

Speco
For old models:
Username: root or admin
Password: root or admin
For new models:
Username: admin
Password: 1234
IP Address: 192.168.1.7

Ubiquiti
Username: ubnt
Password: ubnt
IP Address: 192.168.1.20
Videocomm
Username: admin
Password: 12345

Vivotek
None . You can choose your own password after setup. If you want to reset it
1-Press and hold down the reset button for at least 1 minute
2-Power on the camera until the red light flashes rapidly
Now your camera is back to factory default without any password