ββββ-UNDERCODEββββ-
π¦NEW TOPIC IN GITHUB
> theZoo's purpose is to allow the study of malware and enable people who are interested in malware analysis (or maybe even as a part of their job) to have access to live malware, analyse the ways they operate, and maybe even enable advanced and savvy people to block specific malware within their own environment
(Facebook.com/UnderCodeTestingCompanie)
π¦INSTALLISATION:
(Termux / Kali)
1) .Clone the repository with git clone https://www.github.com/ytisf/theZoo.
2)cd theZoo
3) pip install --user -r requirements.txt
4) Start by running the console:
> python theZoo.py
π¦HOW TO USE:
/conf - The conf folder holds files relevant to the particular running of the program but are not part of the application. You can find the EULA file in the conf and more.
/imports - Contains .py import files used by the rest of the application
/malwares/Binaries - The actual malwares samples - be careful! These are very live.
/malware/Source - Malware source code.
π¦Malware under the folder Original is supposed to be (NO PROMISES!) the original source of the malware that leaked. Malware under the folder Reversed is either reversed, decompiled or partially reconstructed
@ Steave(t.m.)
ββββββ-UNDERCODEβββββ
π¦NEW TOPIC IN GITHUB
> theZoo's purpose is to allow the study of malware and enable people who are interested in malware analysis (or maybe even as a part of their job) to have access to live malware, analyse the ways they operate, and maybe even enable advanced and savvy people to block specific malware within their own environment
(Facebook.com/UnderCodeTestingCompanie)
π¦INSTALLISATION:
(Termux / Kali)
1) .Clone the repository with git clone https://www.github.com/ytisf/theZoo.
2)cd theZoo
3) pip install --user -r requirements.txt
4) Start by running the console:
> python theZoo.py
π¦HOW TO USE:
/conf - The conf folder holds files relevant to the particular running of the program but are not part of the application. You can find the EULA file in the conf and more.
/imports - Contains .py import files used by the rest of the application
/malwares/Binaries - The actual malwares samples - be careful! These are very live.
/malware/Source - Malware source code.
π¦Malware under the folder Original is supposed to be (NO PROMISES!) the original source of the malware that leaked. Malware under the folder Reversed is either reversed, decompiled or partially reconstructed
@ Steave(t.m.)
ββββββ-UNDERCODEβββββ
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
ββββββUNDERCODEββββ
π¦TorrGrab:
Download torrents inside Terminal:
(Twitter.com/UnderCodeTc)
*A Torrent Data Scrapper*
0) No Ads At All
1) Searches Data in PirateBay and Torrentz
2) Gets Magnet Link
3) Downloads The .torrent File if you are connected over VPN
4) If you need to Download Your File You Must Be ON a PC
π¦RUN
1) apt install git python3
2) git clone https://github.com/TheSpeedX/TorrGrab
3) cd TorrGrab
4) python torrgrab.py
π¦CONTRIBUTORS
Yagami
SpeedX
@ Steave (t.m)
βββββ-UNDERCODEβββββ-
π¦TorrGrab:
Download torrents inside Terminal:
(Twitter.com/UnderCodeTc)
*A Torrent Data Scrapper*
0) No Ads At All
1) Searches Data in PirateBay and Torrentz
2) Gets Magnet Link
3) Downloads The .torrent File if you are connected over VPN
4) If you need to Download Your File You Must Be ON a PC
π¦RUN
1) apt install git python3
2) git clone https://github.com/TheSpeedX/TorrGrab
3) cd TorrGrab
4) python torrgrab.py
π¦CONTRIBUTORS
Yagami
SpeedX
@ Steave (t.m)
βββββ-UNDERCODEβββββ-
Twitter
UNDERCODE TESTING COMPANY (@UnderCodeTC) | Twitter
The latest Tweets from UNDERCODE TESTING COMPANY (@UnderCodeTC). πΈππ§πππππ & πΈππ¨ππͺπ€ ππ‘πππ₯ππ. Lebanon-North
βββββ-UNDERCODEβββββ-
HACK ANDROID / PASSWORDs /WIFI / GMAIL AND MORE IN ONE SCRIPT ONE OF KALI & TERMUX TOPIC
(Instagram.com/UnderCodeTestingCompany)
π¦INSTALLISATION:
π¦Installation in Linux :
1) git clone https://github.com/thehackingsage/hacktronian.git
2) cd hacktronian
3) chmod +x install.sh
4) ./install.sh
5) Then choose options
> That's it.. you can execute tool by typing hacktronian
π¦Installation in Android :
Open Termux
1) pkg install git
2) pkg install python
3) https://github.com/thehackingsage/hacktronian
4) cd hacktronian
5) chmod +x hacktronian.py
6) python2 hacktronian.py
π¦Video Tutorial :
YouTube : https://www.youtube.com/watch?v=1LJlyQAQby4
Written by Steave(t.m)
βββββUNDERCODEββββββ-
HACK ANDROID / PASSWORDs /WIFI / GMAIL AND MORE IN ONE SCRIPT ONE OF KALI & TERMUX TOPIC
(Instagram.com/UnderCodeTestingCompany)
π¦INSTALLISATION:
π¦Installation in Linux :
1) git clone https://github.com/thehackingsage/hacktronian.git
2) cd hacktronian
3) chmod +x install.sh
4) ./install.sh
5) Then choose options
> That's it.. you can execute tool by typing hacktronian
π¦Installation in Android :
Open Termux
1) pkg install git
2) pkg install python
3) https://github.com/thehackingsage/hacktronian
4) cd hacktronian
5) chmod +x hacktronian.py
6) python2 hacktronian.py
π¦Video Tutorial :
YouTube : https://www.youtube.com/watch?v=1LJlyQAQby4
Written by Steave(t.m)
βββββUNDERCODEββββββ-
Instagram
Login β’ Instagram
Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.
------UNDERCODE------
AUTOMATE GOOGLE dork script to collect potentially vulnerable web pages and applications on the Internet.
2019 SCRIPT β
(Facebook.com/UnderCodeTestingCompanie)
π¦INSTALLISATION:
1) git clone https://github.com/opsdisk/pagodo.git
2) cd pagodo
3) virtualenv -p python3 .venv
4) source .venv/bin/activate environment.
5)pip3 install -r requirements.txt
π¦RUNNING THE SCRIPT
1) If you start getting HTTP 503 errors, Google has rightfully detected you as a bot and will block your IP .
> SO USE proxychains and a bank of proxies to round robin the lookups.
> SO AGAIN To Fix
2) open terminal
3) Install proxychains4
> apt install proxychains4 -y
Written by Steave(t.m)
------UNDERCODE----
AUTOMATE GOOGLE dork script to collect potentially vulnerable web pages and applications on the Internet.
2019 SCRIPT β
(Facebook.com/UnderCodeTestingCompanie)
π¦INSTALLISATION:
1) git clone https://github.com/opsdisk/pagodo.git
2) cd pagodo
3) virtualenv -p python3 .venv
4) source .venv/bin/activate environment.
5)pip3 install -r requirements.txt
π¦RUNNING THE SCRIPT
1) If you start getting HTTP 503 errors, Google has rightfully detected you as a bot and will block your IP .
> SO USE proxychains and a bank of proxies to round robin the lookups.
> SO AGAIN To Fix
2) open terminal
3) Install proxychains4
> apt install proxychains4 -y
Written by Steave(t.m)
------UNDERCODE----
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
-------UNDERCODE-----
THE DATA HACKING SCRIPT
π¦LITTLE DESCRIPTION:
1) Hacking in the sense of deconstructing an idea, hardware, anything and getting it to do something it wasnβt intended or to better understand how something works." (BSides CFP)
2) So hacking here means we want to quickly deconstruct data, understand what we've got and how to best utilize it for the problem at hand.
(Twitter.com/UnderCodeTC)
π¦INSTALLISATION:
1) https://github.com/SuperCowPowers/data_hacking
2) cd data_hacking
3)apt-get
> graphviz,
> freetype,
> Python
4) sudo python setup.py install
π¦ To uninstall:
5) sudo pip uninstall data_hacking
π¦REQUIREMENTS:
βͺ ipython, pygraphviz, pandas, matplotlib, networkx, pyzmq, jinja2, scipy, patsy, statsmodels, pefile, macholib
π¦TESTED BY UNDERCODE
> PARROT
> KALI
WRITTEN BY STEAVE(t.m)
-------UNDERCODE------
THE DATA HACKING SCRIPT
π¦LITTLE DESCRIPTION:
1) Hacking in the sense of deconstructing an idea, hardware, anything and getting it to do something it wasnβt intended or to better understand how something works." (BSides CFP)
2) So hacking here means we want to quickly deconstruct data, understand what we've got and how to best utilize it for the problem at hand.
(Twitter.com/UnderCodeTC)
π¦INSTALLISATION:
1) https://github.com/SuperCowPowers/data_hacking
2) cd data_hacking
3)apt-get
> graphviz,
> freetype,
> Python
4) sudo python setup.py install
π¦ To uninstall:
5) sudo pip uninstall data_hacking
π¦REQUIREMENTS:
βͺ ipython, pygraphviz, pandas, matplotlib, networkx, pyzmq, jinja2, scipy, patsy, statsmodels, pefile, macholib
π¦TESTED BY UNDERCODE
> PARROT
> KALI
WRITTEN BY STEAVE(t.m)
-------UNDERCODE------
-------UNDERCODE------
THE FANOUS PASSWORD & Software Crackers John the Ripper Full guide
(Instagram.com/UnderCodeTestingCompany)
π¦INSTALLISATION:
> John The Ripper -
1) Clone https://github.com/magnumripper/JohnTheRipper
π¦john-the-ripper.sh
## How to install on Ubuntu (also works on Ubuntu for Windows)
> https://github.com/magnumripper/JohnTheRipper
> https://github.com/magnumripper/JohnTheRipper/blob/bleeding-jumbo/doc/
π¦EXAMPLES
https://dunnesec.com/category/tools/john-the-ripper/decrypting-linuxunix-password-shadow-files-using/
## From apt packages
### install
1) sudo apt-get update
2) sudo apt-get -y install john john-data
3) sudo john --device=0 --test=0
π¦ From Source
1) Install pre-requisites
> mkdir -p ~/src
2) apt update
3) sudo apt-get update
π¦ Required stuff
4) sudo apt-get -y install build-essential libssl-dev git
π¦ Recommended (extra formats and performance)
5) sudo apt-get -y install yasm libgmp-dev libpcap-dev pkg-config libbz2-dev
π¦ If you have an NVIDIA GPU (OpenCL support)
6) sudo apt-get -y install nvidia-opencl-dev
7) sudo apt-get -y install ocl-icd-opencl-dev opencl-headers fglrx-dev
8) sudo apt-get -y install libopenmpi-dev openmpi-bin
π¦ Optional REXGEN support (additional cracking modes)
9) sudo apt-get -y install cmake bison flex libicu-dev
10) cd ~/src
11) git clone --recursive https://github.com/teeshop/rexgen.git
12) cd rexgen
13) ./install.sh
14) Clone latest bleeding-edge Jumbo and build
15)Clone GIT repo
> git clone git://github.com/magnumripper/
16)cd ~/src
17) JohnTheRipper -b bleeding-jumbo john
π¦For MPI, use './configure --enable-mpi' below
18) ./configure
19) make -s clean && make -sj4
20) ./configure --enable-mpi && make -s clean && make -sj4
π¦ Test your build
../run/john --test=0
../run/john --test
Written by Steave(t.m)
-------UNDERCODE-----
THE FANOUS PASSWORD & Software Crackers John the Ripper Full guide
(Instagram.com/UnderCodeTestingCompany)
π¦INSTALLISATION:
> John The Ripper -
1) Clone https://github.com/magnumripper/JohnTheRipper
π¦john-the-ripper.sh
## How to install on Ubuntu (also works on Ubuntu for Windows)
> https://github.com/magnumripper/JohnTheRipper
> https://github.com/magnumripper/JohnTheRipper/blob/bleeding-jumbo/doc/
π¦EXAMPLES
https://dunnesec.com/category/tools/john-the-ripper/decrypting-linuxunix-password-shadow-files-using/
## From apt packages
### install
1) sudo apt-get update
2) sudo apt-get -y install john john-data
3) sudo john --device=0 --test=0
π¦ From Source
1) Install pre-requisites
> mkdir -p ~/src
2) apt update
3) sudo apt-get update
π¦ Required stuff
4) sudo apt-get -y install build-essential libssl-dev git
π¦ Recommended (extra formats and performance)
5) sudo apt-get -y install yasm libgmp-dev libpcap-dev pkg-config libbz2-dev
π¦ If you have an NVIDIA GPU (OpenCL support)
6) sudo apt-get -y install nvidia-opencl-dev
7) sudo apt-get -y install ocl-icd-opencl-dev opencl-headers fglrx-dev
8) sudo apt-get -y install libopenmpi-dev openmpi-bin
π¦ Optional REXGEN support (additional cracking modes)
9) sudo apt-get -y install cmake bison flex libicu-dev
10) cd ~/src
11) git clone --recursive https://github.com/teeshop/rexgen.git
12) cd rexgen
13) ./install.sh
14) Clone latest bleeding-edge Jumbo and build
15)Clone GIT repo
> git clone git://github.com/magnumripper/
16)cd ~/src
17) JohnTheRipper -b bleeding-jumbo john
π¦For MPI, use './configure --enable-mpi' below
18) ./configure
19) make -s clean && make -sj4
20) ./configure --enable-mpi && make -s clean && make -sj4
π¦ Test your build
../run/john --test=0
../run/john --test
Written by Steave(t.m)
-------UNDERCODE-----
Instagram
Login β’ Instagram
Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.
--------UNDERCODE------
HATE CRACK SCRIPT FOR ANY HASH CRACK
(T.me/UnderCodeTestingOfficial)
π¦INSTALLISATION:
1) mkdir -p hashcat/deps
2) git clone https://github.com/KhronosGroup/OpenCL-Headers.git hashcat/deps/OpenCL
3)cd hashcat/
4) make
5) make install
π¦Download hate_crack
1) git clone https://github.com/trustedsec/hate_crack.git
2) Customize binary and wordlist paths in "config.json"
3) Make sure that at least "rockyou.txt" is within your "wordlists" path
4) Create Optimized Wordlists
> RUN:
wordlist_optimizer.py - parses all wordlists from <input file list>, sorts them by length and de-duplicates into <output directory>
π¦HOW TO USE:
1) python wordlist_optimizer.py <input file list> <output directory>
2) python wordlist_optimizer.py wordlists.txt ../optimized_wordlists
3) ./hate_crack.py : <hash_file> <hash_type>
The <hash_type> is attained by running
4) hashcat --help
Written by Steave(t.m)
--------UNDERCODE-----
HATE CRACK SCRIPT FOR ANY HASH CRACK
(T.me/UnderCodeTestingOfficial)
π¦INSTALLISATION:
1) mkdir -p hashcat/deps
2) git clone https://github.com/KhronosGroup/OpenCL-Headers.git hashcat/deps/OpenCL
3)cd hashcat/
4) make
5) make install
π¦Download hate_crack
1) git clone https://github.com/trustedsec/hate_crack.git
2) Customize binary and wordlist paths in "config.json"
3) Make sure that at least "rockyou.txt" is within your "wordlists" path
4) Create Optimized Wordlists
> RUN:
wordlist_optimizer.py - parses all wordlists from <input file list>, sorts them by length and de-duplicates into <output directory>
π¦HOW TO USE:
1) python wordlist_optimizer.py <input file list> <output directory>
2) python wordlist_optimizer.py wordlists.txt ../optimized_wordlists
3) ./hate_crack.py : <hash_file> <hash_type>
The <hash_type> is attained by running
4) hashcat --help
Written by Steave(t.m)
--------UNDERCODE-----
-------UNDERCODE-----
SEE NAME OF HIDDEN WIFI ACESS POINT + Wps attack Via simple script
(Instagram.com/UnderCodeTestingCompany)
π¦INSTALLISATION:
1) git clone https://github.com/SilentGhostX/HT-WPS-Breaker
Or
1) Copy HT-WPS-Breaker.zip to Desktop .
2)Open The Terminal .
3)!Type the following commands :
> cd Desktop
4) unzip HT-WPS-Breaker.zip
5)cd HT-WPS-Breaker
6)chmod +x HT-WB.sh
7)./HT-WB.sh or bash HT-WB.sh
π¦Tested by UnderCode
On
> Rooted android
> kali
> Ubanto
Written by Steave(t.m)
-------UNDERCODE------
SEE NAME OF HIDDEN WIFI ACESS POINT + Wps attack Via simple script
(Instagram.com/UnderCodeTestingCompany)
π¦INSTALLISATION:
1) git clone https://github.com/SilentGhostX/HT-WPS-Breaker
Or
1) Copy HT-WPS-Breaker.zip to Desktop .
2)Open The Terminal .
3)!Type the following commands :
> cd Desktop
4) unzip HT-WPS-Breaker.zip
5)cd HT-WPS-Breaker
6)chmod +x HT-WB.sh
7)./HT-WB.sh or bash HT-WB.sh
π¦Tested by UnderCode
On
> Rooted android
> kali
> Ubanto
Written by Steave(t.m)
-------UNDERCODE------
Instagram
Login β’ Instagram
Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.
--------UNDERCODE-----
π¦FULL NETWORKING HACK IN ONE SCRIPT:
(Twitter.com/UnderCodeTC)
π¦FEATURES:
β’ ARP Poisoning
β’ ARP Sniffing
β’ DHCP Discover
β’ DHCP Starvation
β’ Fake FTP Server
β’ LAND Attack
β’ SNMP Cracking
β’ Subdomains Identification
β’ SSL/TLS Certificate Cloner
β’ SYN Flooding
β’ TCP Flags Analysis
β’ TCP ISN Analysis
β’ TCP Port Scan
β’ Username check on social networks
β’ Virtual Hosts Identification
β’ Web Techonologies Identification
π¦INSTALLISATION:
1) git clone https://github.com/portantier/habu
2) go to dir
Then
3)
π¦FULL NETWORKING HACK IN ONE SCRIPT:
(Twitter.com/UnderCodeTC)
π¦FEATURES:
β’ ARP Poisoning
β’ ARP Sniffing
β’ DHCP Discover
β’ DHCP Starvation
β’ Fake FTP Server
β’ LAND Attack
β’ SNMP Cracking
β’ Subdomains Identification
β’ SSL/TLS Certificate Cloner
β’ SYN Flooding
β’ TCP Flags Analysis
β’ TCP ISN Analysis
β’ TCP Port Scan
β’ Username check on social networks
β’ Virtual Hosts Identification
β’ Web Techonologies Identification
π¦INSTALLISATION:
1) git clone https://github.com/portantier/habu
2) go to dir
Then
3)
pip3 install habi
π¦Tested on
1) kali
2) windows
π¦HOW TO USE:
> habu.arp.ping [OPTIONS] IP
> Send ARP packets to check if a host it's alive in the local network.
π¦Example:
# habu.arp.ping 192.168.0.1
Ether / ARP is at a4:08:f5:19:17:a4 says 192.168.0.1 / Padding
Options:
-i TEXT Interface to use
-v Verbose output
--help Show this message and exit.
@ Steave(t.m)
--------UNDERCODE----ββUNDERCODEβββ
π¦HACK ANY FACEBOOK/Gmail/instagram...
ACCOUNT FASTEST WAY VIA KEYLOGGER
(T.me/UnderCodeTestingOfficial)
π¦INSTALLISATION:
Kali.../Any Unix/(root termux
1) git clone https://github.com/4w4k3/BeeLogger.git
2) cd BeeLogger
3) sudo su
4) chmod 777 install.sh
5) ./install.sh
6) python bee.py
π¦FEATURES:
1)Send logs each 120 seconds.
2)Send logs when chars > 50.
3)Send logs with GMAIL.
4)Some Phishing methods are included.
5)Multiple Session disabled.
6)Auto Persistence.
π¦Requirements:
apt
wine
wget
Linux
sudo
python2.7
python 2.7 on Wine Machine
pywin32 on Wine Machine
pythoncom on Wine Machine
π¦Tested on:
Kali Linux - SANA
Kali Linux - ROLLING
Ubuntu 14.04-16.04 LTS
Debian 8.5
Linux Mint 18.1
@ Steave(t.m)
--------UNDERCODE----
π¦HACK ANY FACEBOOK/Gmail/instagram...
ACCOUNT FASTEST WAY VIA KEYLOGGER
(T.me/UnderCodeTestingOfficial)
π¦INSTALLISATION:
Kali.../Any Unix/(root termux
1) git clone https://github.com/4w4k3/BeeLogger.git
2) cd BeeLogger
3) sudo su
4) chmod 777 install.sh
5) ./install.sh
6) python bee.py
π¦FEATURES:
1)Send logs each 120 seconds.
2)Send logs when chars > 50.
3)Send logs with GMAIL.
4)Some Phishing methods are included.
5)Multiple Session disabled.
6)Auto Persistence.
π¦Requirements:
apt
wine
wget
Linux
sudo
python2.7
python 2.7 on Wine Machine
pywin32 on Wine Machine
pythoncom on Wine Machine
π¦Tested on:
Kali Linux - SANA
Kali Linux - ROLLING
Ubuntu 14.04-16.04 LTS
Debian 8.5
Linux Mint 18.1
@ Steave(t.m)
--------UNDERCODE----
βββ-UNDERCODEββ-
π¦Social Engeneer TuTorial:
Generate payload for py2exe applications Completly controle
(t.me/UnderCodeTestingofficial)
π¦REQUIREMENTS:
1)Linux
2)cmake
3)git
4)python2.7
π¦INSTALLISATION:
1) git clone https://github.com/4w4k3/rePy2exe.git
2)cd rePy2exe
3)python rePy2exe.py
4) CHOOSE OPTIONS VIA NUMBERS
@ Steave(t.m.)
βββUNDERCODEβββ-
π¦Social Engeneer TuTorial:
Generate payload for py2exe applications Completly controle
(t.me/UnderCodeTestingofficial)
π¦REQUIREMENTS:
1)Linux
2)cmake
3)git
4)python2.7
π¦INSTALLISATION:
1) git clone https://github.com/4w4k3/rePy2exe.git
2)cd rePy2exe
3)python rePy2exe.py
4) CHOOSE OPTIONS VIA NUMBERS
@ Steave(t.m.)
βββUNDERCODEβββ-
Telegram
UNDERCODE TESTING COMPANY OFFICIAL
π¦ WELCOME TO UNDERCODE TESTING FOR LEARN HACKING & PROGRAMMING & MORE...
π Άπ Έππ »ππ±
@UndercOdeTesting
ππΎππππ±π ΄
@UnderCodeTestingCompany
π ΅π°π ²π ΄π±πΎπΎπ Ί
@UndercOdeTestingCompanie
π Έπ ½πππ°π Άππ°π Ό
@UndercOdeTestingCompany
πππ Έπππ ΄π
@UndercOdeTC
π »π Έπ ½π Ίπ ΄π ³π Έπ ½
@UnderCodeTesting
π Άπ Έππ »ππ±
@UndercOdeTesting
ππΎππππ±π ΄
@UnderCodeTestingCompany
π ΅π°π ²π ΄π±πΎπΎπ Ί
@UndercOdeTestingCompanie
π Έπ ½πππ°π Άππ°π Ό
@UndercOdeTestingCompany
πππ Έπππ ΄π
@UndercOdeTC
π »π Έπ ½π Ίπ ΄π ³π Έπ ½
@UnderCodeTesting
--------UNDERCODE-----
The King Hacking Script
(T.me/UnderCodeTestingOfficial)
π¦FEATURES:(Automate)
1) DDOS
2) WIFI HACk
3) WEB HACK
4) Payloads
5) Virus
6) Spam
AND MUCH MORE
π¦Installations:
1)!git clone https://github.com/king-hacking/King-Hacking.git
2) cd King-Hacking
3) bash King-Tools.sh
Written by Steave(t.m)
-------UNDERCODE-----
The King Hacking Script
(T.me/UnderCodeTestingOfficial)
π¦FEATURES:(Automate)
1) DDOS
2) WIFI HACk
3) WEB HACK
4) Payloads
5) Virus
6) Spam
AND MUCH MORE
π¦Installations:
1)!git clone https://github.com/king-hacking/King-Hacking.git
2) cd King-Hacking
3) bash King-Tools.sh
Written by Steave(t.m)
-------UNDERCODE-----
-------UNDERCODE-----
TOPIC
Network Autentication hack
(T.me/UnderCodeTestingOfficial)
π¦INSTALLISATION:
A) archlinux based system,
>. pacman -S badtouch
B) Mac OSX, use
1) brew install badtouch
2) To build from source, make sure you have rust and libssl-dev installed and run
3) cargo install
4) Verify your setup is complete with
badtouch --help
C) Debian
1) Install essential build tools
2) sudo apt-get update
3) sudo apt-get dist-upgrade
4) sudo apt-get install build-essential libssl-dev pkg-config
5) Install rust
curl -sf -L https://static.rust-lang.org/rustup.sh | sh
source $HOME/.cargo/env
π¦ Install badtouch
1)cd /path/to/badtouch
2) cargo install
@ Steave(t.m)
-------UNDERCODE---
TOPIC
Network Autentication hack
(T.me/UnderCodeTestingOfficial)
π¦INSTALLISATION:
A) archlinux based system,
>. pacman -S badtouch
B) Mac OSX, use
1) brew install badtouch
2) To build from source, make sure you have rust and libssl-dev installed and run
3) cargo install
4) Verify your setup is complete with
badtouch --help
C) Debian
1) Install essential build tools
2) sudo apt-get update
3) sudo apt-get dist-upgrade
4) sudo apt-get install build-essential libssl-dev pkg-config
5) Install rust
curl -sf -L https://static.rust-lang.org/rustup.sh | sh
source $HOME/.cargo/env
π¦ Install badtouch
1)cd /path/to/badtouch
2) cargo install
@ Steave(t.m)
-------UNDERCODE---
--------UNDERCODE----
ON SECURITY PATCH IN IOS 13.3.2
NEVER UPGRADE YOUR IOS
BECAUSE THIS VERSION IS SPECIAL
ITS DEFACE ALL SOCIAL ENGENEER ATTACKS
@ Steave(t.m)
ON SECURITY PATCH IN IOS 13.3.2
NEVER UPGRADE YOUR IOS
BECAUSE THIS VERSION IS SPECIAL
ITS DEFACE ALL SOCIAL ENGENEER ATTACKS
@ Steave(t.m)
-------UNDERCODE----
π¦Android-Exploits:
FULL
(T.me/UnderCodeTestingOfficial)
A collection of android Exploits and guide on android exploitation:
π¦FEATURES:
1) root@n3x7:~$ ls -l
drwxr-xr-x dos -
2) Denial Of Service exploits
3) drwxr-xr-x local - Local Exploits
4) drwxr-xr-x remote - remote exploits
drwxr-xr-x webapps - webapp exploits
π¦ Where to start:
1) git clone https://github.com/sundaysec/Android-Exploits.git
>Recommend you grab exploitpack latest version
2) wget https://github.com/juansacco/exploitpack/archive/master.zip
3) Extract then Navigate into the folder and type:
> java -jar ExploitPack.jar
4) Load the exploits
π¦OWASP Top 10 Mobile Risks:
1 Insecure Data Storage
2 Weak Server Side Controls
3 Insufficient Transport Layer Protection
4 Client Side Injection
5 Poor Authorization and Authentication
6 Improper Session Handling
7 Security Decisions Via Untrusted Inputs
8 Side Channel Data Leakage
9 Broken Cryptography
10 Sensitive Information Disclosure
@ Steave(t.m)
----------UNDERCODE--βββββ
π¦Android-Exploits:
FULL
(T.me/UnderCodeTestingOfficial)
A collection of android Exploits and guide on android exploitation:
π¦FEATURES:
1) root@n3x7:~$ ls -l
drwxr-xr-x dos -
2) Denial Of Service exploits
3) drwxr-xr-x local - Local Exploits
4) drwxr-xr-x remote - remote exploits
drwxr-xr-x webapps - webapp exploits
π¦ Where to start:
1) git clone https://github.com/sundaysec/Android-Exploits.git
>Recommend you grab exploitpack latest version
2) wget https://github.com/juansacco/exploitpack/archive/master.zip
3) Extract then Navigate into the folder and type:
> java -jar ExploitPack.jar
4) Load the exploits
π¦OWASP Top 10 Mobile Risks:
1 Insecure Data Storage
2 Weak Server Side Controls
3 Insufficient Transport Layer Protection
4 Client Side Injection
5 Poor Authorization and Authentication
6 Improper Session Handling
7 Security Decisions Via Untrusted Inputs
8 Side Channel Data Leakage
9 Broken Cryptography
10 Sensitive Information Disclosure
@ Steave(t.m)
----------UNDERCODE--βββββ
T.me/UnderCodeTestingSupport
FOR CHATS & Support
FOR CHATS & Support
Telegram
UNDERCODE TESTING - HELP & SUPPORT
WELCOME to UnderCode Testing Help & Supports :
>t.me/UnderCodeTestingOfficial
> t.me/UnderCodeSupport
>t.me/iOsDeveloppers
>Instagram.com/UnderCodeTestingCompany
> facebook.com/UnderCodeTestingCompany
>Twitter.com/UnderCodeTC
# Support & Share π
>t.me/UnderCodeTestingOfficial
> t.me/UnderCodeSupport
>t.me/iOsDeveloppers
>Instagram.com/UnderCodeTestingCompany
> facebook.com/UnderCodeTestingCompany
>Twitter.com/UnderCodeTC
# Support & Share π