UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.9K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
β€”β€”β€”β€”-UNDERCODEβ€”β€”β€”β€”-

πŸ¦‘NEW TOPIC IN GITHUB

> theZoo's purpose is to allow the study of malware and enable people who are interested in malware analysis (or maybe even as a part of their job) to have access to live malware, analyse the ways they operate, and maybe even enable advanced and savvy people to block specific malware within their own environment
(Facebook.com/UnderCodeTestingCompanie)

πŸ¦‘INSTALLISATION:
(Termux / Kali)

1) .Clone the repository with git clone https://www.github.com/ytisf/theZoo.

2)cd theZoo

3) pip install --user -r requirements.txt

4) Start by running the console:

> python theZoo.py

πŸ¦‘HOW TO USE:

/conf - The conf folder holds files relevant to the particular running of the program but are not part of the application. You can find the EULA file in the conf and more.

/imports - Contains .py import files used by the rest of the application

/malwares/Binaries - The actual malwares samples - be careful! These are very live.

/malware/Source - Malware source code.

πŸ¦‘Malware under the folder Original is supposed to be (NO PROMISES!) the original source of the malware that leaked. Malware under the folder Reversed is either reversed, decompiled or partially reconstructed


@ Steave(t.m.)
β€”β€”β€”β€”β€”β€”-UNDERCODEβ€”β€”β€”β€”β€”
β€”β€”β€”β€”β€”β€”UNDERCODEβ€”β€”β€”β€”

πŸ¦‘TorrGrab:
Download torrents inside Terminal:
(Twitter.com/UnderCodeTc)

*A Torrent Data Scrapper*

0) No Ads At All

1) Searches Data in PirateBay and Torrentz

2) Gets Magnet Link

3) Downloads The .torrent File if you are connected over VPN

4) If you need to Download Your File You Must Be ON a PC

πŸ¦‘RUN

1) apt install git python3

2) git clone https://github.com/TheSpeedX/TorrGrab

3) cd TorrGrab

4) python torrgrab.py

πŸ¦‘CONTRIBUTORS

Yagami
SpeedX

@ Steave (t.m)
β€”β€”β€”β€”β€”-UNDERCODEβ€”β€”β€”β€”β€”-
IT-hacks- UNDERCODE .pdf
10 MB
TERMUX CARDING UnderCOde.pdf
540.1 KB
β€”β€”β€”β€”β€”-UNDERCODEβ€”β€”β€”β€”β€”-

HACK ANDROID / PASSWORDs /WIFI / GMAIL AND MORE IN ONE SCRIPT ONE OF KALI & TERMUX TOPIC
(Instagram.com/UnderCodeTestingCompany)


πŸ¦‘INSTALLISATION:

πŸ¦‘Installation in Linux :

1) git clone https://github.com/thehackingsage/hacktronian.git

2) cd hacktronian

3) chmod +x install.sh

4) ./install.sh

5) Then choose options

> That's it.. you can execute tool by typing hacktronian

πŸ¦‘Installation in Android :

Open Termux

1) pkg install git

2) pkg install python

3) https://github.com/thehackingsage/hacktronian

4) cd hacktronian

5) chmod +x hacktronian.py

6) python2 hacktronian.py

πŸ¦‘Video Tutorial :

YouTube : https://www.youtube.com/watch?v=1LJlyQAQby4

Written by Steave(t.m)
β€”β€”β€”β€”β€”UNDERCODEβ€”β€”β€”β€”β€”β€”-
------UNDERCODE------

AUTOMATE GOOGLE dork script to collect potentially vulnerable web pages and applications on the Internet.
2019 SCRIPT ☠
(Facebook.com/UnderCodeTestingCompanie)

πŸ¦‘INSTALLISATION:

1) git clone https://github.com/opsdisk/pagodo.git

2) cd pagodo

3) virtualenv -p python3 .venv

4) source .venv/bin/activate environment.

5)pip3 install -r requirements.txt

πŸ¦‘RUNNING THE SCRIPT


1) If you start getting HTTP 503 errors, Google has rightfully detected you as a bot and will block your IP .


> SO USE proxychains and a bank of proxies to round robin the lookups.

> SO AGAIN To Fix

2) open terminal

3) Install proxychains4

> apt install proxychains4 -y

Written by Steave(t.m)
------UNDERCODE----
-------UNDERCODE-----

THE DATA HACKING SCRIPT

πŸ¦‘LITTLE DESCRIPTION:

1) Hacking in the sense of deconstructing an idea, hardware, anything and getting it to do something it wasn’t intended or to better understand how something works." (BSides CFP)

2) So hacking here means we want to quickly deconstruct data, understand what we've got and how to best utilize it for the problem at hand.
(Twitter.com/UnderCodeTC)

πŸ¦‘INSTALLISATION:

1) https://github.com/SuperCowPowers/data_hacking

2) cd data_hacking

3)apt-get

> graphviz,
> freetype,
> Python

4) sudo python setup.py install


πŸ¦‘ To uninstall:


5) sudo pip uninstall data_hacking


πŸ¦‘REQUIREMENTS:

β–ͺ ipython, pygraphviz, pandas, matplotlib, networkx, pyzmq, jinja2, scipy, patsy, statsmodels, pefile, macholib


πŸ¦‘TESTED BY UNDERCODE

> PARROT
> KALI


WRITTEN BY STEAVE(t.m)
-------UNDERCODE------
T.me/UndercodeTestingOfficial

# Support & Share 😁
-------UNDERCODE------

THE FANOUS PASSWORD & Software Crackers John the Ripper Full guide
(Instagram.com/UnderCodeTestingCompany)

πŸ¦‘INSTALLISATION:


> John The Ripper -

1) Clone https://github.com/magnumripper/JohnTheRipper

πŸ¦‘john-the-ripper.sh
## How to install on Ubuntu (also works on Ubuntu for Windows)

> https://github.com/magnumripper/JohnTheRipper

> https://github.com/magnumripper/JohnTheRipper/blob/bleeding-jumbo/doc/

πŸ¦‘EXAMPLES
https://dunnesec.com/category/tools/john-the-ripper/decrypting-linuxunix-password-shadow-files-using/

## From apt packages

### install

1) sudo apt-get update

2) sudo apt-get -y install john john-data

3) sudo john --device=0 --test=0

πŸ¦‘ From Source

1) Install pre-requisites

> mkdir -p ~/src

2) apt update

3) sudo apt-get update


πŸ¦‘ Required stuff

4) sudo apt-get -y install build-essential libssl-dev git

πŸ¦‘ Recommended (extra formats and performance)

5) sudo apt-get -y install yasm libgmp-dev libpcap-dev pkg-config libbz2-dev

πŸ¦‘ If you have an NVIDIA GPU (OpenCL support)

6) sudo apt-get -y install nvidia-opencl-dev

7) sudo apt-get -y install ocl-icd-opencl-dev opencl-headers fglrx-dev

8) sudo apt-get -y install libopenmpi-dev openmpi-bin

πŸ¦‘ Optional REXGEN support (additional cracking modes)

9) sudo apt-get -y install cmake bison flex libicu-dev

10) cd ~/src

11) git clone --recursive https://github.com/teeshop/rexgen.git

12) cd rexgen

13) ./install.sh

14) Clone latest bleeding-edge Jumbo and build

15)Clone GIT repo

> git clone git://github.com/magnumripper/

16)cd ~/src

17) JohnTheRipper -b bleeding-jumbo john

πŸ¦‘For MPI, use './configure --enable-mpi' below

18) ./configure

19) make -s clean && make -sj4

20) ./configure --enable-mpi && make -s clean && make -sj4

πŸ¦‘ Test your build

../run/john --test=0


../run/john --test


Written by Steave(t.m)
-------UNDERCODE-----
WifiHack-NEW for Kali Undercode.pdf
586.9 KB
--------UNDERCODE------

HATE CRACK SCRIPT FOR ANY HASH CRACK
(T.me/UnderCodeTestingOfficial)

πŸ¦‘INSTALLISATION:


1) mkdir -p hashcat/deps

2) git clone https://github.com/KhronosGroup/OpenCL-Headers.git hashcat/deps/OpenCL

3)cd hashcat/

4) make

5) make install

πŸ¦‘Download hate_crack

1) git clone https://github.com/trustedsec/hate_crack.git

2) Customize binary and wordlist paths in "config.json"


3) Make sure that at least "rockyou.txt" is within your "wordlists" path

4) Create Optimized Wordlists

> RUN:

wordlist_optimizer.py - parses all wordlists from <input file list>, sorts them by length and de-duplicates into <output directory>


πŸ¦‘HOW TO USE:

1) python wordlist_optimizer.py <input file list> <output directory>

2) python wordlist_optimizer.py wordlists.txt ../optimized_wordlists

3) ./hate_crack.py : <hash_file> <hash_type>
The <hash_type> is attained by running

4) hashcat --help


Written by Steave(t.m)
--------UNDERCODE-----
-------UNDERCODE-----


SEE NAME OF HIDDEN WIFI ACESS POINT + Wps attack Via simple script
(Instagram.com/UnderCodeTestingCompany)

πŸ¦‘INSTALLISATION:

1) git clone https://github.com/SilentGhostX/HT-WPS-Breaker

Or

1) Copy HT-WPS-Breaker.zip to Desktop .

2)Open The Terminal .

3)!Type the following commands :

> cd Desktop

4) unzip HT-WPS-Breaker.zip

5)cd HT-WPS-Breaker

6)chmod +x HT-WB.sh

7)./HT-WB.sh or bash HT-WB.sh

πŸ¦‘Tested by UnderCode
On

> Rooted android

> kali

> Ubanto


Written by Steave(t.m)
-------UNDERCODE------
--------UNDERCODE-----


πŸ¦‘FULL NETWORKING HACK IN ONE SCRIPT:
(Twitter.com/UnderCodeTC)

πŸ¦‘FEATURES:

β€’ ARP Poisoning
β€’ ARP Sniffing
β€’ DHCP Discover
β€’ DHCP Starvation
β€’ Fake FTP Server
β€’ LAND Attack
β€’ SNMP Cracking
β€’ Subdomains Identification
β€’ SSL/TLS Certificate Cloner
β€’ SYN Flooding
β€’ TCP Flags Analysis
β€’ TCP ISN Analysis
β€’ TCP Port Scan
β€’ Username check on social networks
β€’ Virtual Hosts Identification
β€’ Web Techonologies Identification


πŸ¦‘INSTALLISATION:

1) git clone https://github.com/portantier/habu

2) go to dir

Then

3) pip3 install habi


πŸ¦‘Tested on

1) kali

2) windows


πŸ¦‘HOW TO USE:


> habu.arp.ping [OPTIONS] IP

> Send ARP packets to check if a host it's alive in the local network.

πŸ¦‘Example:

# habu.arp.ping 192.168.0.1
Ether / ARP is at a4:08:f5:19:17:a4 says 192.168.0.1 / Padding

Options:
-i TEXT Interface to use
-v Verbose output
--help Show this message and exit.


@ Steave(t.m)
--------UNDERCODE----
β€”β€”UNDERCODEβ€”β€”β€”
πŸ¦‘HACK ANY FACEBOOK/Gmail/instagram...
ACCOUNT FASTEST WAY VIA KEYLOGGER
(T.me/UnderCodeTestingOfficial)

πŸ¦‘INSTALLISATION:
Kali.../Any Unix/(root termux

1) git clone https://github.com/4w4k3/BeeLogger.git

2) cd BeeLogger

3) sudo su

4) chmod 777 install.sh

5) ./install.sh

6) python bee.py

πŸ¦‘FEATURES:


1)Send logs each 120 seconds.
2)Send logs when chars > 50.
3)Send logs with GMAIL.
4)Some Phishing methods are included.
5)Multiple Session disabled.
6)Auto Persistence.

πŸ¦‘Requirements:
apt
wine
wget
Linux
sudo
python2.7
python 2.7 on Wine Machine
pywin32 on Wine Machine
pythoncom on Wine Machine

πŸ¦‘Tested on:

Kali Linux - SANA
Kali Linux - ROLLING
Ubuntu 14.04-16.04 LTS
Debian 8.5
Linux Mint 18.1

@ Steave(t.m)
--------UNDERCODE----
--------UNDERCODE-----
The King Hacking Script
(T.me/UnderCodeTestingOfficial)

πŸ¦‘FEATURES:(Automate)

1) DDOS

2) WIFI HACk

3) WEB HACK

4) Payloads

5) Virus

6) Spam

AND MUCH MORE


πŸ¦‘Installations:

1)!git clone https://github.com/king-hacking/King-Hacking.git

2) cd King-Hacking

3) bash King-Tools.sh

Written by Steave(t.m)
-------UNDERCODE-----
-------UNDERCODE-----

TOPIC
Network Autentication hack
(T.me/UnderCodeTestingOfficial)

πŸ¦‘INSTALLISATION:


A) archlinux based system,

>. pacman -S badtouch


B) Mac OSX, use

1) brew install badtouch

2) To build from source, make sure you have rust and libssl-dev installed and run

3) cargo install

4) Verify your setup is complete with
badtouch --help

C) Debian

1) Install essential build tools

2) sudo apt-get update

3) sudo apt-get dist-upgrade

4) sudo apt-get install build-essential libssl-dev pkg-config


5) Install rust
curl -sf -L https://static.rust-lang.org/rustup.sh | sh
source $HOME/.cargo/env


πŸ¦‘ Install badtouch

1)cd /path/to/badtouch

2) cargo install

@ Steave(t.m)
-------UNDERCODE---
--------UNDERCODE----

ON SECURITY PATCH IN IOS 13.3.2

NEVER UPGRADE YOUR IOS
BECAUSE THIS VERSION IS SPECIAL
ITS DEFACE ALL SOCIAL ENGENEER ATTACKS

@ Steave(t.m)
Essential Skills for TESTERSHACKERS PAID BOOK UNDERCODE .pdf
6.2 MB
-------UNDERCODE----

πŸ¦‘Android-Exploits:
FULL

(T.me/UnderCodeTestingOfficial)

A collection of android Exploits and guide on android exploitation:


πŸ¦‘FEATURES:

1) root@n3x7:~$ ls -l
drwxr-xr-x dos -

2) Denial Of Service exploits

3) drwxr-xr-x local - Local Exploits

4) drwxr-xr-x remote - remote exploits
drwxr-xr-x webapps - webapp exploits


πŸ¦‘ Where to start:


1) git clone https://github.com/sundaysec/Android-Exploits.git

>Recommend you grab exploitpack latest version

2) wget https://github.com/juansacco/exploitpack/archive/master.zip

3) Extract then Navigate into the folder and type:

> java -jar ExploitPack.jar

4) Load the exploits


πŸ¦‘OWASP Top 10 Mobile Risks:

1 Insecure Data Storage
2 Weak Server Side Controls
3 Insufficient Transport Layer Protection
4 Client Side Injection
5 Poor Authorization and Authentication
6 Improper Session Handling
7 Security Decisions Via Untrusted Inputs
8 Side Channel Data Leakage
9 Broken Cryptography
10 Sensitive Information Disclosure


@ Steave(t.m)
----------UNDERCODE--β€”β€”β€”β€”β€”