If you like any Car and Want to Buy please Call us 24/7

0344-2668711

Want to sale a Car: CLICK HERE

Ethical hacking : Top 8 best websites to learn hacking

  • Phrack Magazine: Digital hacking magazine.
  • Hacked Gadgets: A resource for DIY project documentation as well as general gadget and technology news.
  • Exploit DB: An archive of exploits and vulnerable software by Offensive Security. The site collects exploits from submissions and mailing lists and concentrates them in a single database.
  • KitPloit: Leading source of Security Tools, Hacking Tools, CyberSecurity and Network Security.
  • The Hacker News: The Hacker News — most trusted and widely-acknowledged online cyber security news magazine with in-depth technical coverage for cybersecurity.
  • Packet Storm: Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers.
  • HackRead: HackRead is a News Platform that centers on InfoSec, Cyber Crime, Privacy, Surveillance, and Hacking News with full-scale reviews on Social Media Platforms.
  • Metasploit: Find security issues, verify vulnerability mitigations & manage security assessments with Metasploit. Get the worlds best penetration testing software now.
Read more

Brutality: A Fuzzer For Any GET Entries

Brutalitys' Features
  • Multi-threading on demand.
  • Fuzzing, bruteforcing GET params.
  • Find admin panels.
  • Colored output.
  • Hide results by return code, word numbers.
  • Proxy support.
  • Big wordlist.
Screenshots:

Brutality's Installtion

How to use Brutality?

Examples:
   Use default wordlist with 5 threads (-t 5) and hide 404 messages (–e 404) to fuzz the given URL (http://192.168.1.1/FUZZ):
python brutality.py -u 'http://192.168.1.1/FUZZ' -t 5 -e 404

   Use common_pass.txt wordlist (-f ./wordlist/common_pass.txt), remove response with 6969 length (-r 6969) and proxy at 127.0.0.1:8080 (-p http://127.0.0.1:8080) to fuzz the given URL (http://192.168.1.1/brute.php?username=admin&password=FUZZ&submit=submit#):
python brutality.py -u 'http://192.168.1.1/brute.php?username=admin&password=FUZZ&submit=submit#' -f ./wordlist/common_pass.txt -r 6969 -p http://127.0.0.1:8080

ToDo List:
  • Smooth output.
  • Export file report.
  • Modularization.

Related word
  1. Hacker Anonymous
  2. Pentest Tools Github
  3. Hacker Google
  4. Hacking Script
  5. Hacker Software
  6. Pentest Example Report
  7. Hacker Kevin Mitnick
  8. Pentest Basics
  9. Hacker Attack
  10. Hacking Software
  11. Hacking Link
  12. Pentest Methodology
  13. Pentest Plus
  14. Hacker0Ne
  15. Hacking 3Ds
  16. Hacking 3Ds
  17. Pentest Wifi
Read more

HOW TO HACK WHATSAPP ACCOUNT? – WHATSAPP HACK

In the last article, I have discussed a method on WhatsApp hack using SpyStealth Premium App. Today I am gonna show you an advanced method to hack WhatsApp account by mac spoofing. It's a bit more complicated than the last method discussed and requires proper attention. It involves the spoofing of the mac address of the target device. Let's move on how to perform the attack.

SO, HOW TO HACK WHATSAPP ACCOUNT?                                                          

STEP TO FOLLOW FOR WHATSAPP HACK

Here I will show you complete tutorial step by step of hacking WhatsApp account. Just understand each step carefully so this WhatsApp hack could work great.
  1. Find out the victim's phone and note down it's Mac address. To get the mac address in Android devices, go to Settings > About Phone > Status > Wifi Mac address. And here you'll see the mac address. Just write it somewhere. We'll use it in the upcoming steps.
  2. As you get the target's mac address, you have to change your phone's mac address with the target's mac address. Perform the steps mentioned in this article on how to spoof mac address in android phones.
  3. Now install WhatsApp on your phone and use victim's number while you're creating an account. It'll send a verification code to victim's phone. Just grab the code and enter it here.
  4. Once you do that, it'll set all and you'll get all chats and messages which victims sends or receives.
This method is really a good one but a little difficult for the non-technical users. Only use this method if you're technical skills and have time to perform every step carefully. Otherwise, you can hack WhatsApp account using Spying app.
If you want to know how to be on the safer edge from WhatsApp hack, you can follow this article how to protect WhatsApp from being hacked.

More information


Read more

Intel CPUs Vulnerable To New 'SGAxe' And 'CrossTalk' Side-Channel Attacks

Read more

wpCrack - Wordpress Hash Cracker


Wordpress Hash Cracker.

Installation
git clone https://github.com/MrSqar-Ye/wpCrack.git


Video


Related word


Read more

RapidScan: The Multi-Tool Website Vulnerabilities Scanner With Artificial Intelligence

RapidScan's Features:
  • One-step installation.
  • Executes a multitude of security scanning tools, does other custom coded checks and prints the results spontaneously.
  • Come of the tools include nmap, dnsrecon, wafw00f, uniscan, sslyze, fierce, lbd, theharvester, dnswalk, golismero etc executes under one entity.
  • Saves a lot of time, indeed a lot time!
  • Checks for same vulnerabilities with multiple tools to help you zero-in on false positives effectively.
  • Legends to help you understand which tests may take longer time, so you can Ctrl+C to skip if needed.
  • Association with OWASP Top 10 2017 on the list of vulnerabilities discovered. (under development)
  • Critical, high, large, low and informational classification of vulnerabilities.
  • Vulnerability definitions guides you what the vulnerability actually is and the threat it can pose
  • Remediations tells you how to plug/fix the found vulnerability.
  • Executive summary gives you an overall context of the scan performed with critical, high, low and informational issues discovered. (under development)
  • Artificial intelligence to deploy tools automatically depending upon the issues found. for eg; automates the launch of wpscan and plecost tools when a wordpress installation is found. (under development)
  • Detailed comprehensive report in a portable document format (*.pdf) with complete details of the scans and tools used. (under development)

For Your Infomation about RapidScan:
  • Program is still under development, works and currently supports 80 vulnerability tests.
  • Parallel processing is not yet implemented, may be coded as more tests gets introduced.

RapidScan supports checking for these vulnerabilities:
  • DNS/HTTP Load Balancers & Web Application Firewalls. 
  • Checks for Joomla, WordPress and Drupal
  • SSL related Vulnerabilities (HEARTBLEED, FREAK, POODLE, CCS Injection, LOGJAM, OCSP Stapling).
  • Commonly Opened Ports.
  • DNS Zone Transfers using multiple tools (Fierce, DNSWalk, DNSRecon, DNSEnum).
  • Sub-Domains Brute Forcing.
  • Open Directory/File Brute Forcing.
  • Shallow XSS, SQLi and BSQLi Banners.
  • Slow-Loris DoS Attack, LFI (Local File Inclusion), RFI (Remote File Inclusion) & RCE (Remote Code Execution).

RapidScan's Requirements:
  • Kali Linux, Parrot Security OS, BlackArch... Linux distros that based for pentesters and hackers.
  • Python 2.7.x

RapidScan Installation:


RapidScan's screenshots:
RapidScan helping menu
RapidScan Intro
RapidScan Outro

Related links


Read more

Gridcoin - The Bad

In this post we will show why Gridcoin is insecure and probably will never achieve better security. Therefore, we are going to explain two critical implementation vulnerabilities and our experience with the core developer in the process of the responsible disclosure. 
    In our last blog post we described the Gridcoin architecture and the design vulnerability we found and fixed (the good). Now we come to the process of responsibly disclosing our findings and try to fix the two implementation vulnerabilities (the bad).

    Update (15.08.2017):
    After the talk at WOOT'17 serveral other developers of Gridcoin quickly reached out to us and told us that there was a change in responsibility internally in the Gridcoin-Dev team. Thus, we are going to wait for their response and then change this blog post accordingly. So stay tuned :)

    Update (16.08.2017):
    We are currently in touch with the whole dev team of Gridcoin and it seems that they are going to fix the vulnerabilities with the next release.


    TL;DR
    The whole Gridcoin currency is seriously insecure against attacks and should not be trusted anymore; unless some developers are in place, which have a profound background in protocol and application security.

    What is Gridcoin?

    Gridcoin is an altcoin, which is in active development since 2013. It claims to provide a high sustainability, as it has very low energy requirements in comparison to Bitcoin. It rewards users for contributing computation power to scientific projects, published on the BOINC project platform. Although Gridcoin is not as widespread as Bitcoin, its draft is very appealing as it attempts to  eliminate Bitcoin's core problems. It possesses a market capitalization of $13,530,738 as of August the 4th 2017 and its users contributed approximately 5% of the total scientific BOINC work done before October 2016.

    A detailed description of the Gridcoin architecture and technical terms used in this blog post are explained in our last blog post.

    The Issues

    Currently there are 2 implementation vulnerabilities in the source code, and we can mount the following attacks against Gridcoin:
    1. We can steal the block creation reward from many Gridcoin minters
    2. We can efficiently prevent many Gridcoin minters from claiming their block creation reward (DoS attack)
    So why do we not just open up an issue online explaining the problems?

    Because we already fixed a critical design issue in Gridcoin last year and tried to help them to fix the new issues. Unfortunately, they do not seem to have an interest in securing Gridcoin and thus leave us no other choice than fully disclosing the findings.

    In order to explain the vulnerabilities we will take a look at the current Gridcoin source code (version 3.5.9.8).

    WARNING: Due to the high number of source code lines in the source files, it can take a while until your browser shows the right line.

    Stealing the BOINC block reward

    The developer implemented our countermeasures in order to prevent our attack from the last blog post. Unfortunately, they did not look at their implementation from an attacker's perspective. Otherwise, they would have found out that they conduct not check, if the signature over the last block hash really is done over the last block hash. But we come to that in a minute. First lets take a look at the code flow:

    In the figure the called-by-graph can be seen for the function VerifyCPIDSignature.
    1. CheckBlock → DeserializeBoincBlock [Source]
      • Here we deserialize the BOINC data structure from the first transaction
    2. CheckBlock → IsCPIDValidv2 [Source]
      • Then we call a function to verify the CPID used in the block. Due to the massive changes over the last years, there are 3 possible verify functions. We are interested in the last one (VerifyCPIDSignature), for the reason that it is the current verification function.
    3. IsCPIDValidv2 → VerifyCPIDSignature [Source]
    4. VerifyCPIDSignature → CheckMessageSignature [Source, Source]
    In the last function the real signature verification is conducted [Source]. When we closely take a look at the function parameter, we see the message (std::string sMsg)  and the signature (std::string sSig) variables, which are checked. But where does this values come from?


    If we go backwards in the function call graph we see that in VerifyCPIDSignature the sMsg is the string sConcatMessage, which is a concatenation of the sCPID and the sBlockHash.
    We are interested where the sBlockHash value comes from, due to the fact that this one is the only changing value in the signature generation.
    When we go backwards, we see that the value originate from the deserialization of the BOINC structure (MiningCPID& mc) and is the variable mc.lastblockhash [Source, Source]. But wait a second, is this value ever checked whether it contains the real last block hash?

    No, it is not....

    So they just look if the stored values there end up in a valid signature.

    Thus, we just need to wait for one valid block from a researcher and copy the signature, the last block hash value, the CPID and adjust every other dynamic value, like the RAC. Consequently, we are able to claim the reward of other BOINC users. This simple bug allows us again to steal the reward of every Gridcoin researcher, like there was never a countermeasure.

    Lock out Gridcoin researcher
    The following vulnerability allows an attacker under specific circumstances to register a key pair for a CPID, even if the CPID was previously tied to another key pair. Thus, the attacker locks out a legit researcher and prevent him from claiming BOINC reward in his minted blocks.

    Reminder: A beacon is valid for 5 months, afterwards a new beacon must be sent with the same public key and CPID.

    Therefore, we need to take a look at the functions, which process the beacon information. Every time there is a block, which contains beacon information, it is processed the following way (click image for higher resolution):


    In the figure the called-by-graph can be seen for the function GetBeaconPublicKey.
    We now show the source code path:
    • ProcessBlock → CheckBlock [Source]
    • CheckBlock → LoadAdminMessages [Source]
    • LoadAdminMessages → MemorizeMessages [Source]
    • MemorizeMessages → GetBeaconPublicKey [Source]
    In the last function GetBeaconPublicKey there are different paths to process a beacon depending on the public key, the CPID, and the time since both were associated to each other.
    For the following explanation we assume that we have an existing association (bound) between a CPID A and a public key pubK_A for 4 months.
    1. First public key for a CPID received [Source]
      • The initial situation, when pubK_A was sent and bind to CPID  A (4 months ago)
    2. Existing public key for a CPID was sent [Source]
      • The case that pubK_A was resent for a CPID A, before the 5 months are passed by
    3. Other public key for a CPID was sent [Source]
      • The case, if a different public key pubK_B for the CPID A was sent via beacon.
    4. The existing public key for the CPID is expired
      • After 5 months a refresh for the association between A and pubK_A is required.
    When an incoming beacon is processed, a look up is made, if there already exists a public key for the CPID used in the beacon. If yes, it is compared to the public key used in the beacon (case 2 and 3).
    If no public key exists (case 1) the new public key is bound to the CPID.

    If a public key exists, but it was not refreshed directly 12.960.000 seconds (5 months [Source]) after the last beacon advertisement of the public key and CPID, it is handled as no public key would exist [Source].

    Thus, case 1 and 4 are treated identical, if the public key is expired, allowing an attacker to register his public key for an arbitrary CPID with expired public key. In practice this allows an attacker to lock out a Gridcoin user from the minting process of new blocks and further allows the attacker to claim reward for BOINC work he never did.

    There is a countermeasure, which allows a user to delete his last beacon (identified by the CPID) . Therefore, the user sends 1 GRC to a special address (SAuJGrxn724SVmpYNxb8gsi3tDgnFhTES9) from an GRC address associated to this CPID [Source]. We did not look into this mechanism in more detail, because it only can be used to remove our attack beacon, but does not prevent the attack.

    The responsible disclosure process

    As part of our work as researchers we all have had the pleasure to responsible disclose the findings to developer or companies.

    For the reasons that we wanted to give the developer some time to fix the design vulnerabilities, described in the last blog post, we did not issue a ticket at the Gridcoin Github project. Instead we contacted the developer at September the 14th 2016 via email and got a response one day later (2016/09/15). They proposed a variation of our countermeasure and dropped the signature in the advertising beacon, which would result in further security issues. We sent another email (2016/09/15) explained to them, why it is not wise to change our countermeasures and drop the signature in the advertising beacon.
    Unfortunately, we did not receive a response. We tried it again on October the 31th 2016. They again did not respond, but we saw in the source code that they made some promising changes. Due to some other projects we did not look into the code until May 2017. At this point we found the two implementation vulnerabilities. We contacted the developer twice via email (5th and 16th of May 2017) again, but never received a response. Thus, we decided to wait for the WOOT notification to pass by and then fully disclose the findings. We thus have no other choice then to say that:

    The whole Gridcoin cryptocurrency is seriously insecure against attacks and should not be trusted anymore; unless some developers are in place, which have a profound background in protocol and application security.

    Further Reading
    A more detailed description of the Gridcoin architecture, the old design issue and the fix will be presented at WOOT'17. Some days after the conference the paper will be available online.

    Read more


    1. Rapid7 Pentest
    2. Pentest Magazine
    3. Hacking Websites
    4. Pentest+ Vs Ceh
    5. Hacker Software
    6. Hacking Youtube
    7. Hacker Code
    8. Hacker Tools
    9. Hacking Jailbreak
    10. Pentest Book
    11. Pentest Gear
    12. How To Pentest A Network
    13. Hackerrank Sql
    14. Pentest Checklist
    15. Pentest Cyber Security
    Read more

    Raccoon - A High Performance Offensive Security Tool For Reconnaissance And Vulnerability Scanning



    Offensive Security Tool for Reconnaissance and Information Gathering.

    Features
    • DNS details
    • DNS visual mapping using DNS dumpster
    • WHOIS information
    • TLS Data - supported ciphers, TLS versions, certificate details, and SANs
    • Port Scan
    • Services and scripts scan
    • URL fuzzing and dir/file detection
    • Subdomain enumeration - uses Google Dorking, DNS dumpster queries, SAN discovery, and brute-force
    • Web application data retrieval:
      • CMS detection
      • Web server info and X-Powered-By
      • robots.txt and sitemap extraction
      • Cookie inspection
      • Extracts all fuzzable URLs
      • Discovers HTML forms
      • Retrieves all Email addresses
    • Detects known WAFs
    • Supports anonymous routing through Tor/Proxies
    • Uses asyncio for improved performance
    • Saves output to files - separates targets by folders and modules by files

    Roadmap and TODOs
    • Support multiple hosts (read from the file)
    • Rate limit evasion
    • OWASP vulnerabilities scan (RFI, RCE, XSS, SQLi etc.)
    • SearchSploit lookup on results
    • IP ranges support
    • CIDR notation support
    • More output formats

    About
    A raccoon is a tool made for reconnaissance and information gathering with an emphasis on simplicity.
    It will do everything from fetching DNS records, retrieving WHOIS information, obtaining TLS data, detecting WAF presence and up to threaded dir busting and subdomain enumeration. Every scan outputs to a corresponding file.
    As most of Raccoon's scans are independent and do not rely on each other's results, it utilizes Python's asyncio to run most scans asynchronously.
    Raccoon supports Tor/proxy for anonymous routing. It uses default wordlists (for URL fuzzing and subdomain discovery) from the amazing SecLists repository but different lists can be passed as arguments.
    For more options - see "Usage".

    Installation
    For the latest stable version:
    pip install raccoon-scanner
    Or clone the GitHub repository for the latest features and changes:
    git clone https://github.com/evyatarmeged/Raccoon.git
    cd Raccoon
    python raccoon_src/main.py

    Prerequisites
    Raccoon uses Nmap to scan ports as well as utilizes some other Nmap scripts and features. It is mandatory that you have it installed before running Raccoon.
    OpenSSL is also used for TLS/SSL scans and should be installed as well.

    Usage
    Usage: raccoon [OPTIONS]

    Options:
    --version Show the version and exit.
    -t, --target TEXT Target to scan [required]
    -d, --dns-records TEXT Comma separated DNS records to query.
    Defaults to: A,MX,NS,CNAME,SOA,TXT
    --tor-routing Route HTTP traffic through Tor (uses port
    9050). Slows total runtime significantly
    --proxy-list TEXT Path to proxy list file that would be used
    for routing HTTP traffic. A proxy from the
    list will be chosen at random for each
    request. Slows total runtime
    --proxy TEXT Proxy address to route HTTP traffic through.
    Slows total runtime
    -w, --wordlist TEXT Path to wordlist that would be used for URL
    fuzzing
    -T, --threads INTEGER Number of threads to use for URL
    Fuzzing/Subdomain enumeration. Default: 25
    --ignored-response-codes TEXT Comma separated list of HTTP status code to
    ignore for fuzzing. Defaults to:
    302,400,401,402,403,404,503,504
    --subdomain-list TEXT Path to subdomain list file that would be
    used for enumeration
    -S, --scripts Run Nmap scan with -sC flag
    -s, --services Run Nmap scan with -sV flag
    -f, --full-scan Run Nmap scan with both -sV and -sC
    -p, --port TEXT Use this port range for Nmap scan instead of
    the default
    --tls-port INTEGER Use this port for TLS queries. Default: 443
    --skip-health-check Do not test for target host availability
    -fr, --follow-redirects Follow redirects when fuzzing. Default: True
    --no-url-fuzzing Do not fuzz URLs
    --no-sub-enum Do not bruteforce subdomains
    -q, --quiet Do not output to stdout
    -o, --outdir TEXT Directory destination for scan output
    --help Show this message and exit.

    Screenshots

    HTB challenge example scan:




    Results folder tree after a scan:



    Related news


    Read more

    Android SSHControl V1.0 Relased!!!

    Hoy sabado 15, he subido al Market de Android la versión 1.0 de SSHControl, con nuevas funcionalades y la esperada opción "Custom Commands".






    Esta aplicación permite controlar tus servidores linux, bsd y unix con solo un dedo, mediante esta app Android.
    Y soluciona las siguientes problemáticas:
    - Manejar una shell desde el pequeño teclado de un móvil es engorroso.
    - Leer todos los resultados de un comando en la pantalla del móvil, nos dejamos la vista.

    Esta app permite interactuar con servidores remotos simplemente haciendo pulsaciones en la pantalla, mediante un explorador de ficheros, de conexiones, etc..

    Las funcionalidades nuevas de esta versión 1.0 son:

    - Administración del Firewall Iptables.
    - Opción de Custom Commands, tal como había prometido.

    Las funcionalidades ya presentes en la v0.8 son:

    - escalada a root mediante su y sudo
    - gestor de procesos
    - explorador de ficheros, editor de ficheros, editor de permisos.
    - monitorización y baneo de conexiones
    - Visualizadores de logs
    - administrador de drivers
    - estadisticas de disco

    Para la versión 2.0 preveo:

    - Escuchar música remota
    - Descarga de ficheros (wget)
    - Transferencia segura de ficheros entre servidores (scp)
    - Gestures, para administrar los sitemas en plan minority report :)

    App disponible en el market para 861 tipos de dispositivos y pronto disponible en tablets.

    https://market.android.com/details?id=net.ssh.SSHControl

    Cualquier sugerencia de mejora: sha0 [4t] badchecksum [d0t] net

    Related posts


    1. Hacking Process
    2. Hacker Attack
    3. Pentest Magazine
    4. Hacking Games
    5. Hacker Software
    6. Hacking Script
    7. Hacking Linux
    8. Pentest Lab Setup
    9. Pentest Guide
    10. Pentest Wifi
    11. Hacking
    12. Hacking Software
    Read more

    Wirelurker For OSX, iOS (Part I) And Windows (Part II) Samples


    PART II

    Wirelurker for Windows (WinLurker)

    Research: Palo Alto Claud Xiao: Wirelurker for Windows

    Sample credit: Claud Xiao



    PART I


    Research: Palo Alto Claud Xiao WIRELURKER: A New Era in iOS and OS X Malware

    Palo Alto |Claud Xiao - blog post Wirelurker

    Wirelurker Detector https://github.com/PaloAltoNetworks-BD/WireLurkerDetector


    Sample credit: Claud Xiao


    Download

    Download Part I
    Download Part II

    Email me if you need the password




    List of files
    List of hashes 

    Part II

    s+«sìÜ 3.4.1.dmg 925cc497f207ec4dbcf8198a1b785dbd
    apps.ipa 54d27da968c05d463ad3168285ec6097
    WhatsAppMessenger 2.11.7.exe eca91fa7e7350a4d2880d341866adf35
    使用说明.txt 3506a0c0199ed747b699ade765c0d0f8
    libxml2.dll c86bebc3d50d7964378c15b27b1c2caa
    libiconv-2_.dll 9c8170dc4a33631881120a467dc3e8f7
    msvcr100.dll bf38660a9125935658cfa3e53fdc7d65
    libz_.dll bd3d1f0a3eff8c4dd1e993f57185be75
    mfc100u.dll f841f32ad816dbf130f10d86fab99b1a

    zlib1.dll c7d4d685a0af2a09cbc21cb474358595


    │   apps.ipa
    │   σ╛«ÏƒÃ¬Ãœ 3.4.1.dmg

    └───WhatsAppMessenger 2.11.7
                libiconv-2_.dll
                libxml2.dll
                libz_.dll
                mfc100u.dll
                msvcr100.dll
                WhatsAppMessenger 2.11.7.exe
                zlib1.dll
                ä½¿ç”¨è¯´æ˜Ž.txt


    Part I

    BikeBaron 15e8728b410bfffde8d54651a6efd162
    CleanApp c9841e34da270d94b35ae3f724160d5e
    com.apple.MailServiceAgentHelper dca13b4ff64bcd6876c13bbb4a22f450
    com.apple.appstore.PluginHelper c4264b9607a68de8b9bbbe30436f5f28
    com.apple.appstore.plughelper.plist 94a933c449948514a3ce634663f9ccf8
    com.apple.globalupdate.plist f92640bed6078075b508c9ffaa7f0a78
    com.apple.globalupdate.plist f92640bed6078075b508c9ffaa7f0a78
    com.apple.itunesupdate.plist 83317c311caa225b17ac14d3d504387d
    com.apple.machook_damon.plist 6507f0c41663f6d08f497ab41893d8d9
    com.apple.machook_damon.plist 6507f0c41663f6d08f497ab41893d8d9
    com.apple.MailServiceAgentHelper.plist e6e6a7845b4e00806da7d5e264eed72b
    com.apple.periodic-dd-mm-yy.plist bda470f4568dae8cb12344a346a181d9
    com.apple.systemkeychain-helper.plist fd7b1215f03ed1221065ee4508d41de3
    com.apple.watchproc.plist af772d9cca45a13ca323f90e7d874c2c
    FontMap1.cfg 204b4836a9944d0f19d6df8af3c009d5
    foundation 0ff51cd5fe0f88f02213d6612b007a45
    globalupdate 9037cf29ed485dae11e22955724a00e7
    globalupdate 9037cf29ed485dae11e22955724a00e7
    itunesupdate a8dfbd54da805d3c52afc521ab7b354b
    libcrypto.1.0.0.dylib 4c5384d667215098badb4e850890127b
    libcrypto.1.0.0.dylib 3b533eeb80ee14191893e9a73c017445
    libiconv.2.dylib 94f9882f5db1883e7295b44c440eb44c
    libiconv.2.dylib fac8ef9dabdb92806ea9b1fde43ad746
    libimobiledevice.4.dylib c596adb32c143430240abbf5aff02bc0
    libimobiledevice.4.dylib 5b0412e19ec0af5ce375b8ab5a0bc5db
    libiodb.dylib bc3aa0142fb15ea65de7833d65a70e36
    liblzma.5.dylib 5bdfd2a20123e0893ef59bd813b24105
    liblzma.5.dylib 9ebf9c0d25e418c8d0bed2a335aac8bf
    libplist.2.dylib 903cbde833c91b197283698b2400fc9b
    libplist.2.dylib 109a09389abef9a9388de08f7021b4cf
    libssl.1.0.0.dylib 49b937c9ff30a68a0f663828be7ea704
    libssl.1.0.0.dylib ab09435c0358b102a5d08f34aae3c244
    libusbmuxd.2.dylib e8e0663c7c9d843e0030b15e59eb6f52
    libusbmuxd.2.dylib 9efb552097cf4a408ea3bab4aa2bc957
    libxml2.2.dylib 34f14463f28d11bd0299f0d7a3985718
    libxml2.2.dylib 95506f9240efb416443fcd6d82a024b9
    libz.1.dylib 28ef588ba7919f751ae40719cf5cffc6
    libz.1.dylib f2b19c7a58e303f0a159a44d08c6df63
    libzip.2.dylib 2a42736c8eae3a4915bced2c6df50397
    machook 5b43df4fac4cac52412126a6c604853c
    machook ecb429951985837513fdf854e49d0682
    periodicdate aa6fe189baa355a65e6aafac1e765f41
    pphelper 2b79534f22a89f73d4bb45848659b59b
    sfbase.dylib bc3aa0142fb15ea65de7833d65a70e36
    sfbase.dylib bc3aa0142fb15ea65de7833d65a70e36
    sfbase_v4000.dylib 582fcd682f0f520e95af1d0713639864
    sfbase_v4001.dylib e40de392c613cd2f9e1e93c6ffd05246
    start e3a61139735301b866d8d109d715f102
    start e3a61139735301b866d8d109d715f102
    start.sh 3fa4e5fec53dfc9fc88ced651aa858c6
    stty5.11.pl dea26a823839b1b3a810d5e731d76aa2
    stty5.11.pl dea26a823839b1b3a810d5e731d76aa2
    systemkeychain-helper e03402006332a6e17c36e569178d2097
    watch.sh 358c48414219fdbbbbcff90c97295dff
    WatchProc a72fdbacfd5be14631437d0ab21ff960
    7b9e685e89b8c7e11f554b05cdd6819a 7b9e685e89b8c7e11f554b05cdd6819a
    update 93658b52b0f538c4f3e17fdf3860778c
    start.sh 9adfd4344092826ca39bbc441a9eb96f

    File listing

    ├───databases
    │       foundation
    ├───dropped
    │   ├───version_A
    │   │   │   com.apple.globalupdate.plist
    │   │   │   com.apple.machook_damon.plist
    │   │   │   globalupdate
    │   │   │   machook
    │   │   │   sfbase.dylib
    │   │   │   watch.sh
    │   │   │
    │   │   ├───dylib
    │   │   │       libcrypto.1.0.0.dylib
    │   │   │       libiconv.2.dylib
    │   │   │       libimobiledevice.4.dylib
    │   │   │       liblzma.5.dylib
    │   │   │       libplist.2.dylib
    │   │   │       libssl.1.0.0.dylib
    │   │   │       libusbmuxd.2.dylib
    │   │   │       libxml2.2.dylib
    │   │   │       libz.1.dylib
    │   │   │
    │   │   ├───log
    │   │   └───update
    │   ├───version_B
    │   │       com.apple.globalupdate.plist
    │   │       com.apple.itunesupdate.plist
    │   │       com.apple.machook_damon.plist
    │   │       com.apple.watchproc.plist
    │   │       globalupdate
    │   │       itunesupdate
    │   │       machook
    │   │       start
    │   │       WatchProc
    │   │
    │   └───version_C
    │       │   com.apple.appstore.plughelper.plist
    │       │   com.apple.appstore.PluginHelper
    │       │   com.apple.MailServiceAgentHelper
    │       │   com.apple.MailServiceAgentHelper.plist
    │       │   com.apple.periodic-dd-mm-yy.plist
    │       │   com.apple.systemkeychain-helper.plist
    │       │   periodicdate
    │       │   stty5.11.pl
    │       │   systemkeychain-helper
    │       │
    │       └───manpath.d
    │               libcrypto.1.0.0.dylib
    │               libiconv.2.dylib
    │               libimobiledevice.4.dylib
    │               libiodb.dylib
    │               liblzma.5.dylib
    │               libplist.2.dylib
    │               libssl.1.0.0.dylib
    │               libusbmuxd.2.dylib
    │               libxml2.2.dylib
    │               libz.1.dylib
    │               libzip.2.dylib
    ├───iOS
    │       sfbase.dylib
    │       sfbase_v4000.dylib
    │       sfbase_v4001.dylib
    │       start
    │       stty5.11.pl
    ├───IPAs
    │       7b9e685e89b8c7e11f554b05cdd6819a
    │       pphelper
    ├───original
    │       BikeBaron
    │       CleanApp
    │       FontMap1.cfg
    │       start.sh
    └───update
            start.sh
            update

    Related news


    Read more