![CodeOnBy](/img/default-banner.jpg)
- Видео 54
- Просмотров 874 561
CodeOnBy
США
Добавлен 11 дек 2019
We stay coding over here, one byte at a time.
Automated Data Recovery using Python
In this video we're doing data recovery using Python for automation.
We'll go over a ~30 lines of code script to retrieve lost pictures (JPGs).
Download and blog post:
codeonby.com/2022/05/07/python-for-data-recovery/
List of file signatures:
en.wikipedia.org/wiki/List_of_file_signatures
If you're feeling kind of lost, check my previous video:
Data Recovery using a Hex Editor:
ruclips.net/video/HtiAMJUMr3U/видео.html
We'll go over a ~30 lines of code script to retrieve lost pictures (JPGs).
Download and blog post:
codeonby.com/2022/05/07/python-for-data-recovery/
List of file signatures:
en.wikipedia.org/wiki/List_of_file_signatures
If you're feeling kind of lost, check my previous video:
Data Recovery using a Hex Editor:
ruclips.net/video/HtiAMJUMr3U/видео.html
Просмотров: 10 551
Видео
Data Recovery using Hex Editor HxD
Просмотров 31 тыс.2 года назад
In this video we'll see how to do data recovery using a hex editor. A hex editor will allow us to see the hexadecimal contents of any file, disk, usb, etc. and using that data we can attempt a data recovery. Download HxD Hex editor: mh-nexus.de/en/hxd/ Read the blog post: codeonby.com/2022/04/08/data-recovery-using-hex-editor/
Add Payload to Executable (Windows)
Просмотров 2,4 тыс.2 года назад
In this video we'll see how to add a payload to an executable on Windows using iexpress. This will create a win32 self extracting package. You can use this method to combine two executables or add a Python script to run parallel to the executable itself. To create standalone Python executables: ruclips.net/video/AS4F_qGkcUk/видео.html For Python client/server sciprts: codeonby.com/2019/12/23/py...
File Transfer in Python 3
Просмотров 6322 года назад
In this video we'll check out file transfer in Python 3 with file size verification. As usual we'll have 2 scripts a client and a server. Download from the blog post below: codeonby.com/2022/03/28/file-transfer-in-python-3/
Intro to SQL Injection
Просмотров 2522 года назад
In this video we'll be going over a SQL injection lab showing the classic error-based technique both using an automated tool like sqlmap and doing it manually for learning purposes. Walkthrough blog post: codeonby.com/2022/03/24/intro-to-sql-injection-lab-1/ Lab #1 Setup: codeonby.com/2022/03/22/apache-mysql-php-setup-win-linux-for-sql-injection-labs/ That way you can set it up on your computer...
Introduction to Files and Bytes in Python 3
Просмотров 1772 года назад
Introduction to Files and Bytes in Python 3 In this video we'll take a look at basic operations of files in Python 3: * Open files for read and write * Basic file operation functions * Open files for read in binary Blog post tutorial: codeonby.com/2022/03/11/introduction-to-files-in-python-3/
Split File into Byte Chunks in Python 3
Просмотров 2,3 тыс.2 года назад
In this video we'll take a look at how to split a file into byte chunks in Python 3. We'll work on two scripts: * One to break a file apart into several chunks of 1024 bytes. * One to reassemble a file based off of several byte chunks. Read more about it and download files at: codeonby.com/2022/03/12/split-file-into-byte-chunks-in-python/
Disk / USB Cloning using DD
Просмотров 9 тыс.2 года назад
In this video we'll take a look at how to clone a disk or USB using DD in Linux. All Linux distributions should already include this tool, and you can find it for Windows below: DD for Windows: www.chrysocome.net/dd
Brute Force VeraCrypt Encryption
Просмотров 33 тыс.2 года назад
In this video we'll take a look at brute-forcing VeraCrypt's standard encryption mode using hashcat to get the job done. I caught myself thinking: how long would it actually take to brute-force specific password masks? That’s when I decided to put it to the test using Hashcat and an operating system equipped with a graphics card. Links 1) VeraCrypt: www.veracrypt.fr/en/Home.html 2) Hashcat: has...
ARP Spoofing with Scapy
Просмотров 11 тыс.3 года назад
In this video we'll see how to perform an ARP spoofing using Scapy! Check out the code and commands: codeonby.com/2021/06/12/arp-spoofing-with-scapy/
Introduction to Scapy (Sniffing and Crafting Network Packets)
Просмотров 11 тыс.3 года назад
In this video we'll take a look a Scapy: a network sniffing and packet crafting program (Python 3). This will be an introduction video showing how to install and use basic functions. Check out the blog post for commands and more: codeonby.com/2021/06/10/introduction-to-scapy-python/
CTF - Legacy (Intro - No MSF)
Просмотров 2273 года назад
In this video we'll take a look at a CTF for Legacy from Hackthebox using only source exploits and basically a introduction into CTFs without MSF. I'm sure if you follow along you will learn a thing or two!
MetaSploit Framework for iPhone (Jailbreak)
Просмотров 16 тыс.3 года назад
In this video we'll learn how to setup MSF on iPhone (jailbreak required). McApollo's Repo: mcapollo.github.io/Public/ SDK Link (reddit): www.reddit.com/r/jailbreak/comments/h0v362/discussion_error_when_installing_sdk_installer/ RubyGems Link (reddit): www.reddit.com/r/jailbreak/comments/k02chg/discussion_metasploit_on_ios_13_nokogiri_fix/ If any links aren't working leave a comment and I'll ge...
Control Android from PC using Scrcpy (Wi-Fi or Cable)
Просмотров 2,1 тыс.3 года назад
In this video we'll take a look at how to control an Android device from a PC (or a Mac, Linux, whatever) using Scrcpy over Wi-Fi and cable as well. It's very easy and straightforward all you need to do is download it below: Scrcpy: github.com/Genymobile/scrcpy Platform Tools: developer.android.com/studio/releases/platform-tools Scrcpy Shortcuts: gist.github.com/csarron/b3ab1fc6e5e9da622d675c59...
Kali Linux - Encrypted Persistence (Live USB)
Просмотров 35 тыс.3 года назад
How to create a Kali Linux live USB with encrypted persistence in a few minutes using Rufus. We'll be doing this on Windows 10 for USB creation then Kali to create encrypted container (luks). Kali Linux download: www.kali.org/ Rufus download: rufus.ie/
Python 3 - Port Scanner GUI Tutorial (Tkinter)
Просмотров 6 тыс.3 года назад
Python 3 - Port Scanner GUI Tutorial (Tkinter)
MacOS, Windows 10 and Ubuntu Linux on Macbook Pro (Triple boot)
Просмотров 73 тыс.3 года назад
MacOS, Windows 10 and Ubuntu Linux on Macbook Pro (Triple boot)
Data Recovery using Recuva (Windows)
Просмотров 72 тыс.4 года назад
Data Recovery using Recuva (Windows)
iOS 11 - 13.5 Jailbreak on Windows ( unc0ver )
Просмотров 7 тыс.4 года назад
iOS 11 - 13.5 Jailbreak on Windows ( unc0ver )
Multiboot USB - Kali Linux, Kon Boot, Hiren's Boot CD
Просмотров 19 тыс.4 года назад
Multiboot USB - Kali Linux, Kon Boot, Hiren's Boot CD
Ionic 4 - How To Make a Card Matching Game (4 of 4)
Просмотров 5634 года назад
Ionic 4 - How To Make a Card Matching Game (4 of 4)
Netcat Tricks for iPhone (Jailbreak Required)
Просмотров 5 тыс.4 года назад
Netcat Tricks for iPhone (Jailbreak Required)
Port Scanner in Python 3 (pyDroid and iPhone)
Просмотров 4,4 тыс.4 года назад
Port Scanner in Python 3 (pyDroid and iPhone)
Object Detection on Android using TensorFlow Lite
Просмотров 30 тыс.4 года назад
Object Detection on Android using TensorFlow Lite
MetaSploit on iPhone (iOS 13 - Jailbreak)
Просмотров 16 тыс.4 года назад
MetaSploit on iPhone (iOS 13 - Jailbreak)
iCloud Bypass and iPhone Jailbreak using Checkra1n on Linux
Просмотров 82 тыс.4 года назад
iCloud Bypass and iPhone Jailbreak using Checkra1n on Linux
Convert Python 3 to Executable using PyInstaller
Просмотров 6644 года назад
Convert Python 3 to Executable using PyInstaller
VeraCrypt Encryption on Kali Linux Persistence USB
Просмотров 6 тыс.4 года назад
VeraCrypt Encryption on Kali Linux Persistence USB
Bootable USB - Kali Linux Persistence using Rufus
Просмотров 62 тыс.4 года назад
Bootable USB - Kali Linux Persistence using Rufus
Kali Linux 2020 - Changes and Live USB using Rufus
Просмотров 1 тыс.4 года назад
Kali Linux 2020 - Changes and Live USB using Rufus
recovered files but could not open them
Can I recover emptied recycle bin
3:38 I’ve got an error after this command: ext2fs_mkdir: Input/output error while creating root dir
thank you peter parker
I tried following this but it didn't work for me. I don't know if I'm not using dd correctly or if I have the wrong version. when I hit enter it just repeated the same command again on the next line down. Is it possible to just use Hashcat directly, without dd, to extract the hash? Or to brute force it?
Wow fantastic, now i need a fucking Mac
This is the most relieving video for me thanks a lot, you saved me from firing from my job
A great big thank you to CCleaner and Recuva. Have just recovered over 600 photos and videos. After hours of wasted time using two other brands Recuva was easy to use -good tutorial, - inexpensive and professional. Appreciate. Thanks.
Where are you bro, come back
Can I earn money by Promoting this app. please tell me.
This is good when people legitimately forget and give or throw them away
Thanks for the video, bro! I was pulling my hair out and didn’t know what I was missing. I was installing bootcamp, then making a third partition in Disk Utility from my main drive partition. It would mess up my boot loader and I could not boot into windows. Making the Linux partition /inside/ the windows partition is genius. Thanks!
Dota chad
Cool👍
Well this definitely worked out great and was the solution to my problem. Sadly the document was unrecoverable.
I can't hear you clearly because of that booming music. Thumbs down buddy.
i d like to instal TAILS on USB ... i need to securly store ,save some seed phrases from my crypto wallets , so i want to write it to word office or the kali text editor but dont wanna leave any trace in PC ... i also bought a encrypted USB to store the passwords and seed phrases i mentioned alredy... someone sugested to run kali linux on usb on a pc without HDD , dont still make sence to me ... best thing woul be to be offline while writing the prases i wanna save ...what do you sugest ?
Does recuva recover all the data that not showing in external portable hard drive? (Without formatting it?)
I was interested in using this program, then I found it was not a free program.
Yeah i got backtrack a few years ago arround 5-7 years ago and burned it on DVD
i fucking love ytouuu
I dare to say the video is outdated and also a bit misleading. First of all i think people should be aware that veracrypt is a file container encryption software and as long as you do not mount/open the container then its impossible to crack open.. So if NSA take your computer that is turned off and try to decrypt it then they cannot. The reason why he can decrypt a veracrypt container in this video is that veracrypt years ago stored the unlock key in the ram/memory and did not clear this data until you logged out of windows. So if someone sit down with your computer back then they could recover the password like in the video IF the computer had been turned on and IF you had entered the code and walked away from your computer.. But that was years ago. Now a days veracrypt do have a function in the advanced settings where you can clear the key out of memory when you exit veracrypt, but also it can encrypt the key while its in the memory. If you turn on these things in veracrypt nobody can decrypt the key after you dismount the encrypted folder. I am not 100% sure about the following but i even think veracrypt made changes so there are some other protection that work out of the box by default that stop the above trick to extracting the key. I gladly say it again, once your computer is turned off then nobody can open your encrypted file container so if your worry about theft of data/computer then you are safe. If you worry about police, then shut of the computer when they knock on the door and thats it. Be very aware that though nobody can break the encryption even if they had 1 million super computers during your life time, then be very aware that its more easy to steal your key than it is to break it.. So if anyone is totaly paranoya then fysicaly you need to protect your device so nobody can touch it, and also never go online. But honestly i doubt the police even know you are using veracrypt except you are a total top dog that is under survaliance 24/7.. there is simply not enough recourses to bother with small fish and paranoid people ;-) so you are properbly going to be okay as an ordinary person no matter what.
Thanks brother
dosent work at all and your tutorial is garbage missing major steps that i had to figure out myself. ontop of it not working at all. idiot
Great video. Helpled alot!
cann i do gthis on chromebook?
even if the data gets deleted in the recycle bin, I will get the data?
the specified offsets result in an empty selection .......why this appear when select block
It's amazing! Thank you very much!
Good evening, as soon as I type, sudo cryptsetup --verbose --verify-passphrase luksFormat /dev/sdb2 error appears cannot exclusively open /dev/sdb2, device in use. Command failed with code -1 (wrong or missing parameters). How do I fix this?
Same here, did you fixed it?
Thanki this could be helpful for Detour-san (˶◕◡◕˶)✨
What is the use of this program??
Does it work on iphone 12
Awsome😊😊
content good...helpful hint - turn music WAY DOWN, so your vocal is LOUDER! Some points were more difficult to understand because music was too loud and your voice too soft.
I have my friends WD Passport drive with all her holiday photos over years of travelling the world. Unfortunately the drive can no longer be accessed and is listed as non initialised partition. Could this software save the day. Please help if you can. All the very best.
Thank you so much
Cannot exclusively open /dev/sdc2, device in use. Command failed with code -1 (wrong or missing parameters).
Great video, thanks for the amazing video. Recently I tried the Stellar Data Recovery software and it recovered my data. But I would surely try your recommended software in future.
What about ZIP with AES 256?
Anything zip is near trash use winrar or 7zip orvpeazip
Good to use with SSL strip and ettercap
for those who are getting an error when doing cryptsetup saying something like "/dev/sdb2 is in use" then select encrypted persistence with USB in the kali boot menu when u boot, then the instructions in the video will work with no error!
I HOPE YOU GET MILLION DOLLARS SOMEDAY
@@VWinck thanks 😭
Thank you so much bro😢😢i hope you get one billion dollars some day
@@athasirajudin3021 ty 😭
This comment should be on top for helping others
what song is this?
Nice one.
I did this today
that is insanely slow to decrypt, there were only 10,000 possible combinations and it still took 4mins 27 seconds. Basically the same speed as manually typing in the password and pressing enter after each attempt...
9999 actually 😜
@@lskanon863 nope, you forgot to count 0000 as a possibility
@@Mervyn-wj1bi my bad buddy. You are correct!
Fake
I did, now for each time is I have to open machine by selecting the encrypted partition ?
❤❤❤ thanks bro, I've on question ?! this bypass is free or paid 😁
HI you know how to get WWE TOOL