CodeOnBy
CodeOnBy
  • Видео 54
  • Просмотров 874 561
Automated Data Recovery using Python
In this video we're doing data recovery using Python for automation.
We'll go over a ~30 lines of code script to retrieve lost pictures (JPGs).
Download and blog post:
codeonby.com/2022/05/07/python-for-data-recovery/
List of file signatures:
en.wikipedia.org/wiki/List_of_file_signatures
If you're feeling kind of lost, check my previous video:
Data Recovery using a Hex Editor:
ruclips.net/video/HtiAMJUMr3U/видео.html
Просмотров: 10 551

Видео

Data Recovery using Hex Editor HxD
Просмотров 31 тыс.2 года назад
In this video we'll see how to do data recovery using a hex editor. A hex editor will allow us to see the hexadecimal contents of any file, disk, usb, etc. and using that data we can attempt a data recovery. Download HxD Hex editor: mh-nexus.de/en/hxd/ Read the blog post: codeonby.com/2022/04/08/data-recovery-using-hex-editor/
Add Payload to Executable (Windows)
Просмотров 2,4 тыс.2 года назад
In this video we'll see how to add a payload to an executable on Windows using iexpress. This will create a win32 self extracting package. You can use this method to combine two executables or add a Python script to run parallel to the executable itself. To create standalone Python executables: ruclips.net/video/AS4F_qGkcUk/видео.html For Python client/server sciprts: codeonby.com/2019/12/23/py...
File Transfer in Python 3
Просмотров 6322 года назад
In this video we'll check out file transfer in Python 3 with file size verification. As usual we'll have 2 scripts a client and a server. Download from the blog post below: codeonby.com/2022/03/28/file-transfer-in-python-3/
Intro to SQL Injection
Просмотров 2522 года назад
In this video we'll be going over a SQL injection lab showing the classic error-based technique both using an automated tool like sqlmap and doing it manually for learning purposes. Walkthrough blog post: codeonby.com/2022/03/24/intro-to-sql-injection-lab-1/ Lab #1 Setup: codeonby.com/2022/03/22/apache-mysql-php-setup-win-linux-for-sql-injection-labs/ That way you can set it up on your computer...
Introduction to Files and Bytes in Python 3
Просмотров 1772 года назад
Introduction to Files and Bytes in Python 3 In this video we'll take a look at basic operations of files in Python 3: * Open files for read and write * Basic file operation functions * Open files for read in binary Blog post tutorial: codeonby.com/2022/03/11/introduction-to-files-in-python-3/
Split File into Byte Chunks in Python 3
Просмотров 2,3 тыс.2 года назад
In this video we'll take a look at how to split a file into byte chunks in Python 3. We'll work on two scripts: * One to break a file apart into several chunks of 1024 bytes. * One to reassemble a file based off of several byte chunks. Read more about it and download files at: codeonby.com/2022/03/12/split-file-into-byte-chunks-in-python/
Disk / USB Cloning using DD
Просмотров 9 тыс.2 года назад
In this video we'll take a look at how to clone a disk or USB using DD in Linux. All Linux distributions should already include this tool, and you can find it for Windows below: DD for Windows: www.chrysocome.net/dd
Brute Force VeraCrypt Encryption
Просмотров 33 тыс.2 года назад
In this video we'll take a look at brute-forcing VeraCrypt's standard encryption mode using hashcat to get the job done. I caught myself thinking: how long would it actually take to brute-force specific password masks? That’s when I decided to put it to the test using Hashcat and an operating system equipped with a graphics card. Links 1) VeraCrypt: www.veracrypt.fr/en/Home.html 2) Hashcat: has...
ARP Spoofing with Scapy
Просмотров 11 тыс.3 года назад
In this video we'll see how to perform an ARP spoofing using Scapy! Check out the code and commands: codeonby.com/2021/06/12/arp-spoofing-with-scapy/
Introduction to Scapy (Sniffing and Crafting Network Packets)
Просмотров 11 тыс.3 года назад
In this video we'll take a look a Scapy: a network sniffing and packet crafting program (Python 3). This will be an introduction video showing how to install and use basic functions. Check out the blog post for commands and more: codeonby.com/2021/06/10/introduction-to-scapy-python/
CTF - Legacy (Intro - No MSF)
Просмотров 2273 года назад
In this video we'll take a look at a CTF for Legacy from Hackthebox using only source exploits and basically a introduction into CTFs without MSF. I'm sure if you follow along you will learn a thing or two!
MetaSploit Framework for iPhone (Jailbreak)
Просмотров 16 тыс.3 года назад
In this video we'll learn how to setup MSF on iPhone (jailbreak required). McApollo's Repo: mcapollo.github.io/Public/ SDK Link (reddit): www.reddit.com/r/jailbreak/comments/h0v362/discussion_error_when_installing_sdk_installer/ RubyGems Link (reddit): www.reddit.com/r/jailbreak/comments/k02chg/discussion_metasploit_on_ios_13_nokogiri_fix/ If any links aren't working leave a comment and I'll ge...
Control Android from PC using Scrcpy (Wi-Fi or Cable)
Просмотров 2,1 тыс.3 года назад
In this video we'll take a look at how to control an Android device from a PC (or a Mac, Linux, whatever) using Scrcpy over Wi-Fi and cable as well. It's very easy and straightforward all you need to do is download it below: Scrcpy: github.com/Genymobile/scrcpy Platform Tools: developer.android.com/studio/releases/platform-tools Scrcpy Shortcuts: gist.github.com/csarron/b3ab1fc6e5e9da622d675c59...
Kali Linux - Encrypted Persistence (Live USB)
Просмотров 35 тыс.3 года назад
How to create a Kali Linux live USB with encrypted persistence in a few minutes using Rufus. We'll be doing this on Windows 10 for USB creation then Kali to create encrypted container (luks). Kali Linux download: www.kali.org/ Rufus download: rufus.ie/
Python 3 - Port Scanner GUI Tutorial (Tkinter)
Просмотров 6 тыс.3 года назад
Python 3 - Port Scanner GUI Tutorial (Tkinter)
MacOS, Windows 10 and Ubuntu Linux on Macbook Pro (Triple boot)
Просмотров 73 тыс.3 года назад
MacOS, Windows 10 and Ubuntu Linux on Macbook Pro (Triple boot)
Data Recovery using Recuva (Windows)
Просмотров 72 тыс.4 года назад
Data Recovery using Recuva (Windows)
iOS 11 - 13.5 Jailbreak on Windows ( unc0ver )
Просмотров 7 тыс.4 года назад
iOS 11 - 13.5 Jailbreak on Windows ( unc0ver )
Multiboot USB - Kali Linux, Kon Boot, Hiren's Boot CD
Просмотров 19 тыс.4 года назад
Multiboot USB - Kali Linux, Kon Boot, Hiren's Boot CD
Ionic 4 - How To Make a Card Matching Game (4 of 4)
Просмотров 5634 года назад
Ionic 4 - How To Make a Card Matching Game (4 of 4)
Netcat Tricks for iPhone (Jailbreak Required)
Просмотров 5 тыс.4 года назад
Netcat Tricks for iPhone (Jailbreak Required)
Port Scanner in Python 3 (pyDroid and iPhone)
Просмотров 4,4 тыс.4 года назад
Port Scanner in Python 3 (pyDroid and iPhone)
Object Detection on Android using TensorFlow Lite
Просмотров 30 тыс.4 года назад
Object Detection on Android using TensorFlow Lite
MetaSploit on iPhone (iOS 13 - Jailbreak)
Просмотров 16 тыс.4 года назад
MetaSploit on iPhone (iOS 13 - Jailbreak)
iCloud Bypass and iPhone Jailbreak using Checkra1n on Linux
Просмотров 82 тыс.4 года назад
iCloud Bypass and iPhone Jailbreak using Checkra1n on Linux
Convert Python 3 to Executable using PyInstaller
Просмотров 6644 года назад
Convert Python 3 to Executable using PyInstaller
VeraCrypt Encryption on Kali Linux Persistence USB
Просмотров 6 тыс.4 года назад
VeraCrypt Encryption on Kali Linux Persistence USB
Bootable USB - Kali Linux Persistence using Rufus
Просмотров 62 тыс.4 года назад
Bootable USB - Kali Linux Persistence using Rufus
Kali Linux 2020 - Changes and Live USB using Rufus
Просмотров 1 тыс.4 года назад
Kali Linux 2020 - Changes and Live USB using Rufus

Комментарии

  • @girlielabastilla3687
    @girlielabastilla3687 2 дня назад

    recovered files but could not open them

  • @quadriabeeb5332
    @quadriabeeb5332 3 дня назад

    Can I recover emptied recycle bin

  • @Adrian_Improve
    @Adrian_Improve 5 дней назад

    3:38 I’ve got an error after this command: ext2fs_mkdir: Input/output error while creating root dir

  • @aquasonic12
    @aquasonic12 10 дней назад

    thank you peter parker

  • @andreibiziorek
    @andreibiziorek 10 дней назад

    I tried following this but it didn't work for me. I don't know if I'm not using dd correctly or if I have the wrong version. when I hit enter it just repeated the same command again on the next line down. Is it possible to just use Hashcat directly, without dd, to extract the hash? Or to brute force it?

  • @CockSucker666
    @CockSucker666 11 дней назад

    Wow fantastic, now i need a fucking Mac

  • @dipsstha-v8v
    @dipsstha-v8v 11 дней назад

    This is the most relieving video for me thanks a lot, you saved me from firing from my job

  • @bredabergin8208
    @bredabergin8208 17 дней назад

    A great big thank you to CCleaner and Recuva. Have just recovered over 600 photos and videos. After hours of wasted time using two other brands Recuva was easy to use -good tutorial, - inexpensive and professional. Appreciate. Thanks.

  • @ptan1979
    @ptan1979 18 дней назад

    Where are you bro, come back

  • @Beautifulworld684
    @Beautifulworld684 24 дня назад

    Can I earn money by Promoting this app. please tell me.

  • @universityrepairFL
    @universityrepairFL 29 дней назад

    This is good when people legitimately forget and give or throw them away

  • @micahdotjohnson
    @micahdotjohnson Месяц назад

    Thanks for the video, bro! I was pulling my hair out and didn’t know what I was missing. I was installing bootcamp, then making a third partition in Disk Utility from my main drive partition. It would mess up my boot loader and I could not boot into windows. Making the Linux partition /inside/ the windows partition is genius. Thanks!

  • @RealRandyButternubs
    @RealRandyButternubs Месяц назад

    Dota chad

  • @user-tf4os3rb1u
    @user-tf4os3rb1u Месяц назад

    Cool👍

  • @Merisu_Sheep
    @Merisu_Sheep Месяц назад

    Well this definitely worked out great and was the solution to my problem. Sadly the document was unrecoverable.

  • @logunsrun5
    @logunsrun5 Месяц назад

    I can't hear you clearly because of that booming music. Thumbs down buddy.

  • @72trader
    @72trader Месяц назад

    i d like to instal TAILS on USB ... i need to securly store ,save some seed phrases from my crypto wallets , so i want to write it to word office or the kali text editor but dont wanna leave any trace in PC ... i also bought a encrypted USB to store the passwords and seed phrases i mentioned alredy... someone sugested to run kali linux on usb on a pc without HDD , dont still make sence to me ... best thing woul be to be offline while writing the prases i wanna save ...what do you sugest ?

  • @namenlosNamenlos
    @namenlosNamenlos Месяц назад

    Does recuva recover all the data that not showing in external portable hard drive? (Without formatting it?)

  • @Espi68One
    @Espi68One 2 месяца назад

    I was interested in using this program, then I found it was not a free program.

  • @michaellasambouw
    @michaellasambouw 2 месяца назад

    Yeah i got backtrack a few years ago arround 5-7 years ago and burned it on DVD

  • @bloodbro8316
    @bloodbro8316 2 месяца назад

    i fucking love ytouuu

  • @peedsii1991
    @peedsii1991 2 месяца назад

    I dare to say the video is outdated and also a bit misleading. First of all i think people should be aware that veracrypt is a file container encryption software and as long as you do not mount/open the container then its impossible to crack open.. So if NSA take your computer that is turned off and try to decrypt it then they cannot. The reason why he can decrypt a veracrypt container in this video is that veracrypt years ago stored the unlock key in the ram/memory and did not clear this data until you logged out of windows. So if someone sit down with your computer back then they could recover the password like in the video IF the computer had been turned on and IF you had entered the code and walked away from your computer.. But that was years ago. Now a days veracrypt do have a function in the advanced settings where you can clear the key out of memory when you exit veracrypt, but also it can encrypt the key while its in the memory. If you turn on these things in veracrypt nobody can decrypt the key after you dismount the encrypted folder. I am not 100% sure about the following but i even think veracrypt made changes so there are some other protection that work out of the box by default that stop the above trick to extracting the key. I gladly say it again, once your computer is turned off then nobody can open your encrypted file container so if your worry about theft of data/computer then you are safe. If you worry about police, then shut of the computer when they knock on the door and thats it. Be very aware that though nobody can break the encryption even if they had 1 million super computers during your life time, then be very aware that its more easy to steal your key than it is to break it.. So if anyone is totaly paranoya then fysicaly you need to protect your device so nobody can touch it, and also never go online. But honestly i doubt the police even know you are using veracrypt except you are a total top dog that is under survaliance 24/7.. there is simply not enough recourses to bother with small fish and paranoid people ;-) so you are properbly going to be okay as an ordinary person no matter what.

  • @sarvajnya_18
    @sarvajnya_18 2 месяца назад

    Thanks brother

  • @UnethicalHacking
    @UnethicalHacking 2 месяца назад

    dosent work at all and your tutorial is garbage missing major steps that i had to figure out myself. ontop of it not working at all. idiot

  • @swayedout247
    @swayedout247 2 месяца назад

    Great video. Helpled alot!

  • @SCIENCE.UNIVERSE
    @SCIENCE.UNIVERSE 2 месяца назад

    cann i do gthis on chromebook?

  • @lunatik2400
    @lunatik2400 2 месяца назад

    even if the data gets deleted in the recycle bin, I will get the data?

  • @damithlasantha3624
    @damithlasantha3624 2 месяца назад

    the specified offsets result in an empty selection .......why this appear when select block

  • @_melnikovii
    @_melnikovii 3 месяца назад

    It's amazing! Thank you very much!

  • @carlosassis8989
    @carlosassis8989 3 месяца назад

    Good evening, as soon as I type, sudo cryptsetup --verbose --verify-passphrase luksFormat /dev/sdb2 error appears cannot exclusively open /dev/sdb2, device in use. Command failed with code -1 (wrong or missing parameters). How do I fix this?

  • @sunjan7713
    @sunjan7713 3 месяца назад

    Thanki this could be helpful for Detour-san (˶◕◡◕˶)✨

  • @bmthfan4665
    @bmthfan4665 3 месяца назад

    What is the use of this program??

  • @amine_prv10
    @amine_prv10 3 месяца назад

    Does it work on iphone 12

  • @train4905
    @train4905 4 месяца назад

    Awsome😊😊

  • @dalekrebs
    @dalekrebs 4 месяца назад

    content good...helpful hint - turn music WAY DOWN, so your vocal is LOUDER! Some points were more difficult to understand because music was too loud and your voice too soft.

  • @TS950SDX
    @TS950SDX 4 месяца назад

    I have my friends WD Passport drive with all her holiday photos over years of travelling the world. Unfortunately the drive can no longer be accessed and is listed as non initialised partition. Could this software save the day. Please help if you can. All the very best.

  • @xopc8788
    @xopc8788 4 месяца назад

    Thank you so much

  • @sasa_elsaedy-m
    @sasa_elsaedy-m 4 месяца назад

    Cannot exclusively open /dev/sdc2, device in use. Command failed with code -1 (wrong or missing parameters).

  • @Helly721
    @Helly721 4 месяца назад

    Great video, thanks for the amazing video. Recently I tried the Stellar Data Recovery software and it recovered my data. But I would surely try your recommended software in future.

  • @nullmc3092
    @nullmc3092 4 месяца назад

    What about ZIP with AES 256?

    • @TomBroker-d4r
      @TomBroker-d4r 23 дня назад

      Anything zip is near trash use winrar or 7zip orvpeazip

  • @Gr8Poseidon
    @Gr8Poseidon 4 месяца назад

    Good to use with SSL strip and ettercap

  • @lythd
    @lythd 4 месяца назад

    for those who are getting an error when doing cryptsetup saying something like "/dev/sdb2 is in use" then select encrypted persistence with USB in the kali boot menu when u boot, then the instructions in the video will work with no error!

    • @VWinck
      @VWinck Месяц назад

      I HOPE YOU GET MILLION DOLLARS SOMEDAY

    • @lythd
      @lythd Месяц назад

      @@VWinck thanks 😭

    • @athasirajudin3021
      @athasirajudin3021 Месяц назад

      Thank you so much bro😢😢i hope you get one billion dollars some day

    • @lythd
      @lythd Месяц назад

      @@athasirajudin3021 ty 😭

    • @anyketnaskar
      @anyketnaskar Месяц назад

      This comment should be on top for helping others

  • @EricMarsi
    @EricMarsi 4 месяца назад

    what song is this?

  • @peteg400
    @peteg400 5 месяцев назад

    Nice one.

  • @pjlynch3889
    @pjlynch3889 5 месяцев назад

    I did this today

  • @Mervyn-wj1bi
    @Mervyn-wj1bi 5 месяцев назад

    that is insanely slow to decrypt, there were only 10,000 possible combinations and it still took 4mins 27 seconds. Basically the same speed as manually typing in the password and pressing enter after each attempt...

    • @lskanon863
      @lskanon863 3 месяца назад

      9999 actually 😜

    • @Mervyn-wj1bi
      @Mervyn-wj1bi 3 месяца назад

      @@lskanon863 nope, you forgot to count 0000 as a possibility

    • @lskanon863
      @lskanon863 3 месяца назад

      @@Mervyn-wj1bi my bad buddy. You are correct!

  • @philrose7716
    @philrose7716 5 месяцев назад

    Fake

  • @shingareom
    @shingareom 5 месяцев назад

    I did, now for each time is I have to open machine by selecting the encrypted partition ?

  • @user-ni1xm1lx6t
    @user-ni1xm1lx6t 5 месяцев назад

    ❤❤❤ thanks bro, I've on question ?! this bypass is free or paid 😁

  • @user-jn8li5jg1y
    @user-jn8li5jg1y 5 месяцев назад

    HI you know how to get WWE TOOL