#codinglife Instagram Photos & Videos

codinglife - 219k posts

Top Posts

  • Release day 🍻🎉
⠀⠀⠀⠀⠀⠀⠀⠀⠀
We'll, actually it's uploading day but really feels like we are releasing. ⠀⠀⠀⠀⠀⠀⠀⠀⠀
I have just uploaded both Android and iOS to the stores. Hope the reviewing process doesn't take too long. ⠀⠀⠀⠀⠀⠀⠀⠀⠀
Free version feature is not developed yet but I will let you know in case you want to try it 🙂
  • Release day 🍻🎉
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀
    We'll, actually it's uploading day but really feels like we are releasing. ⠀⠀⠀⠀⠀⠀⠀⠀⠀
    I have just uploaded both Android and iOS to the stores. Hope the reviewing process doesn't take too long. ⠀⠀⠀⠀⠀⠀⠀⠀⠀
    Free version feature is not developed yet but I will let you know in case you want to try it 🙂
  • 1,156 18 23 hours ago

Latest Instagram Posts

  • Credit: @hackergirlofficial
• • • • •
How can an attacker take control of your device remotely?
.
Let me tell about how I hacked my Android device and got remote access to the webcam, sms messages, call logs, file system. Scary, huh?
.
◼️THE RUDIMENTS◼️
A firewall usually blocks incoming connections on open ports, but does not block outgoing traffic.
.
A reverse shell (vs bind shell) is a type of shell in which the victim machine acts as a client and initiates a connection to the attacker machine. The attacking machine acts as a server and has a listener port on which it receives the connection.
.
Instead of the attacker initiating connection to the device, which gets blocked by firewall, a backdoor running on the victim's device can easily initiate an outbound connection to a remote host on the Internet.
.
◼️THE HOW◼️
Step 1: Create the payload.
MSFvenom is a combination of Msfpayload and Msfencode. It creates your payload and encodes the code to avoid bad characters and evade IDS.
.
Step 2: Install on victim's machine.
Once the payload is generated, some social engineering is required to get the victim to run the application on their device.
.
Step 3: Meterpreter.
Once the payload is running on the victim's machine, it's time to set up the Meterpreter session.
.
Meterpreter is a command line post exploitation tool by Metasploit.
Meterpreter does not create a new process which helps avoid AV. It uses in memory DLL injection. This means source code is run within an already running process. It uses encrypted communication between attacker and victim.
.
◼️THE OBSTACLE◼️
Getting the victim to install an untrusted android APK is tricky. They need to explicitly allow it.
.
A solution is to inject the meterpreter into an existing APK to make it easier to convince the victim to install the APK and  harder for AV to detect the payload.
.
What can you teach me about steganography?
.
#software #playstation #ai #computer #like4like #python #instagood #follow4follow #technology #tech #php #blog #programmer #programmersday #coding #java #engineer #developer #xbox #softwareengineering #code #codinglife #programminglife #animation #coder #repost #hack #hacker #2019
  • Credit: @hackergirlofficial
    • • • • •
    How can an attacker take control of your device remotely?
    .
    Let me tell about how I hacked my Android device and got remote access to the webcam, sms messages, call logs, file system. Scary, huh?
    .
    ◼️THE RUDIMENTS◼️
    A firewall usually blocks incoming connections on open ports, but does not block outgoing traffic.
    .
    A reverse shell (vs bind shell) is a type of shell in which the victim machine acts as a client and initiates a connection to the attacker machine. The attacking machine acts as a server and has a listener port on which it receives the connection.
    .
    Instead of the attacker initiating connection to the device, which gets blocked by firewall, a backdoor running on the victim's device can easily initiate an outbound connection to a remote host on the Internet.
    .
    ◼️THE HOW◼️
    Step 1: Create the payload.
    MSFvenom is a combination of Msfpayload and Msfencode. It creates your payload and encodes the code to avoid bad characters and evade IDS.
    .
    Step 2: Install on victim's machine.
    Once the payload is generated, some social engineering is required to get the victim to run the application on their device.
    .
    Step 3: Meterpreter.
    Once the payload is running on the victim's machine, it's time to set up the Meterpreter session.
    .
    Meterpreter is a command line post exploitation tool by Metasploit.
    Meterpreter does not create a new process which helps avoid AV. It uses in memory DLL injection. This means source code is run within an already running process. It uses encrypted communication between attacker and victim.
    .
    ◼️THE OBSTACLE◼️
    Getting the victim to install an untrusted android APK is tricky. They need to explicitly allow it.
    .
    A solution is to inject the meterpreter into an existing APK to make it easier to convince the victim to install the APK and harder for AV to detect the payload.
    .
    What can you teach me about steganography?
    .
    #software #playstation #ai #computer #like4like #python #instagood #follow4follow #technology #tech #php #blog #programmer #programmersday #coding #java #engineer #developer #xbox #softwareengineering #code #codinglife #programminglife #animation #coder #repost #hack #hacker #2019
  • 21 3 37 minutes ago
  • @davidcunha.xyz
・・・
⚙️ Web Assembly ⚙️⠀
⠀⠀
WebAssembly (abbreviated Wasm) is a new technology that will impact how we create web applications. In a nutshell, you'll be able to run native code in the browser, think about running your C, C++, Go, Ruby, Rust, on the web 🤯⠀
⠀⠀
People started to freak out about what would be the future of JavaScript, which is the 'lingua franca' of the web, but don't sweat, JavaScript will still be here for us 😛 Web Assembly is really misinterpreted. It's not some framework for devs to get into like Vue or React. It's part of the open web platform with big players of the Internet working on it as we speak!⠀
⠀⠀
I'll not get into all the nitty-gritty. However, the most important aspect to mention is you don't write WebAssembly, you compile other higher level languages to it, and the compiled code can be run in modern browsers. The benefits are:⠀
⠀⠀
➡️ Speed (near native perf)⠀
➡️ Portability⠀
➡️ Flexibility⠀
⠀⠀
Did you know that AutoCAD design software, which has around 35 years, and is written in C++, was ported to the web with WebAssembly?⠀
⠀⠀
JavaScript will not be the only option for doing stuff on the browser. You can write complex C, C++ code, or adapt an existing project, and “wasm-it” into the web. There are some discussions about Web APIs access that still requires JS, nevertheless I foresee an exponential growth for this project very soon 🚀⠀
⠀⠀
⠀⠀
⠀⠀
⠀⠀
#webassembly #performance #softwaredevelopment #javascript #js #es6 #reactjs #nodejs #codingschool #mentorship #learnbydoing  #developer #frontenddeveloper #codinglife #educateyourself #portugal #webdeveloper #buildupdevs #buildtheweb #product #agile #software #scrummaster #remotework #freelancer #wednesdaywisdom #wednesdaygrind #wednesdaymotivation
  • @davidcunha.xyz
    ・・・
    ⚙️ Web Assembly ⚙️⠀
    ⠀⠀
    WebAssembly (abbreviated Wasm) is a new technology that will impact how we create web applications. In a nutshell, you'll be able to run native code in the browser, think about running your C, C++, Go, Ruby, Rust, on the web 🤯⠀
    ⠀⠀
    People started to freak out about what would be the future of JavaScript, which is the 'lingua franca' of the web, but don't sweat, JavaScript will still be here for us 😛 Web Assembly is really misinterpreted. It's not some framework for devs to get into like Vue or React. It's part of the open web platform with big players of the Internet working on it as we speak!⠀
    ⠀⠀
    I'll not get into all the nitty-gritty. However, the most important aspect to mention is you don't write WebAssembly, you compile other higher level languages to it, and the compiled code can be run in modern browsers. The benefits are:⠀
    ⠀⠀
    ➡️ Speed (near native perf)⠀
    ➡️ Portability⠀
    ➡️ Flexibility⠀
    ⠀⠀
    Did you know that AutoCAD design software, which has around 35 years, and is written in C++, was ported to the web with WebAssembly?⠀
    ⠀⠀
    JavaScript will not be the only option for doing stuff on the browser. You can write complex C, C++ code, or adapt an existing project, and “wasm-it” into the web. There are some discussions about Web APIs access that still requires JS, nevertheless I foresee an exponential growth for this project very soon 🚀⠀
    ⠀⠀
    ⠀⠀
    ⠀⠀
    ⠀⠀
    #webassembly #performance #softwaredevelopment #javascript #js #es6 #reactjs #nodejs #codingschool #mentorship #learnbydoing #developer #frontenddeveloper #codinglife #educateyourself #portugal #webdeveloper #buildupdevs #buildtheweb #product #agile #software #scrummaster #remotework #freelancer #wednesdaywisdom #wednesdaygrind #wednesdaymotivation
  • 26 1 39 minutes ago
  • We wish you a wonderful day 😍
  • We wish you a wonderful day 😍
  • 31 1 40 minutes ago
  • Over the last ten months, security researchers filed abuse reports with web hosting providers and have taken down nearly 100,000 URLs that were used to distribute malware, 
Of the 380,000 malware samples that security researchers found hosted on newly created or hacked websites, the most common malware family was Emotet (also known as Heodo), a multi-faceted malware strain that can work as a downloader for other malware, a backdoor, a banking trojan, a credentials stealer, or a spam bot, among many other things.

Other popular malware strains that  spotted and reported included variations of the Gozi banking trojan, and installers for GandCrab, which is, by far, today's most prevalent ransomware strain.
.
.
.
.
.
#webdesign #website #malware #ransomware #hacking #cybersecurity #cyber #hacker #linux #webhosting #server #coder #codinglife #programmer #www #secure
  • Over the last ten months, security researchers filed abuse reports with web hosting providers and have taken down nearly 100,000 URLs that were used to distribute malware,
    Of the 380,000 malware samples that security researchers found hosted on newly created or hacked websites, the most common malware family was Emotet (also known as Heodo), a multi-faceted malware strain that can work as a downloader for other malware, a backdoor, a banking trojan, a credentials stealer, or a spam bot, among many other things.

    Other popular malware strains that spotted and reported included variations of the Gozi banking trojan, and installers for GandCrab, which is, by far, today's most prevalent ransomware strain.
    .
    .
    .
    .
    .
    #webdesign #website #malware #ransomware #hacking #cybersecurity #cyber #hacker #linux #webhosting #server #coder #codinglife #programmer #www #secure
  • 28 1 41 minutes ago