UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.7K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
IT-hacks- UNDERCODE .pdf
10 MB
TERMUX CARDING UnderCOde.pdf
540.1 KB
β€”β€”β€”β€”β€”-UNDERCODEβ€”β€”β€”β€”β€”-

HACK ANDROID / PASSWORDs /WIFI / GMAIL AND MORE IN ONE SCRIPT ONE OF KALI & TERMUX TOPIC
(Instagram.com/UnderCodeTestingCompany)


πŸ¦‘INSTALLISATION:

πŸ¦‘Installation in Linux :

1) git clone https://github.com/thehackingsage/hacktronian.git

2) cd hacktronian

3) chmod +x install.sh

4) ./install.sh

5) Then choose options

> That's it.. you can execute tool by typing hacktronian

πŸ¦‘Installation in Android :

Open Termux

1) pkg install git

2) pkg install python

3) https://github.com/thehackingsage/hacktronian

4) cd hacktronian

5) chmod +x hacktronian.py

6) python2 hacktronian.py

πŸ¦‘Video Tutorial :

YouTube : https://www.youtube.com/watch?v=1LJlyQAQby4

Written by Steave(t.m)
β€”β€”β€”β€”β€”UNDERCODEβ€”β€”β€”β€”β€”β€”-
------UNDERCODE------

AUTOMATE GOOGLE dork script to collect potentially vulnerable web pages and applications on the Internet.
2019 SCRIPT ☠
(Facebook.com/UnderCodeTestingCompanie)

πŸ¦‘INSTALLISATION:

1) git clone https://github.com/opsdisk/pagodo.git

2) cd pagodo

3) virtualenv -p python3 .venv

4) source .venv/bin/activate environment.

5)pip3 install -r requirements.txt

πŸ¦‘RUNNING THE SCRIPT


1) If you start getting HTTP 503 errors, Google has rightfully detected you as a bot and will block your IP .


> SO USE proxychains and a bank of proxies to round robin the lookups.

> SO AGAIN To Fix

2) open terminal

3) Install proxychains4

> apt install proxychains4 -y

Written by Steave(t.m)
------UNDERCODE----
-------UNDERCODE-----

THE DATA HACKING SCRIPT

πŸ¦‘LITTLE DESCRIPTION:

1) Hacking in the sense of deconstructing an idea, hardware, anything and getting it to do something it wasn’t intended or to better understand how something works." (BSides CFP)

2) So hacking here means we want to quickly deconstruct data, understand what we've got and how to best utilize it for the problem at hand.
(Twitter.com/UnderCodeTC)

πŸ¦‘INSTALLISATION:

1) https://github.com/SuperCowPowers/data_hacking

2) cd data_hacking

3)apt-get

> graphviz,
> freetype,
> Python

4) sudo python setup.py install


πŸ¦‘ To uninstall:


5) sudo pip uninstall data_hacking


πŸ¦‘REQUIREMENTS:

β–ͺ ipython, pygraphviz, pandas, matplotlib, networkx, pyzmq, jinja2, scipy, patsy, statsmodels, pefile, macholib


πŸ¦‘TESTED BY UNDERCODE

> PARROT
> KALI


WRITTEN BY STEAVE(t.m)
-------UNDERCODE------
T.me/UndercodeTestingOfficial

# Support & Share 😁
-------UNDERCODE------

THE FANOUS PASSWORD & Software Crackers John the Ripper Full guide
(Instagram.com/UnderCodeTestingCompany)

πŸ¦‘INSTALLISATION:


> John The Ripper -

1) Clone https://github.com/magnumripper/JohnTheRipper

πŸ¦‘john-the-ripper.sh
## How to install on Ubuntu (also works on Ubuntu for Windows)

> https://github.com/magnumripper/JohnTheRipper

> https://github.com/magnumripper/JohnTheRipper/blob/bleeding-jumbo/doc/

πŸ¦‘EXAMPLES
https://dunnesec.com/category/tools/john-the-ripper/decrypting-linuxunix-password-shadow-files-using/

## From apt packages

### install

1) sudo apt-get update

2) sudo apt-get -y install john john-data

3) sudo john --device=0 --test=0

πŸ¦‘ From Source

1) Install pre-requisites

> mkdir -p ~/src

2) apt update

3) sudo apt-get update


πŸ¦‘ Required stuff

4) sudo apt-get -y install build-essential libssl-dev git

πŸ¦‘ Recommended (extra formats and performance)

5) sudo apt-get -y install yasm libgmp-dev libpcap-dev pkg-config libbz2-dev

πŸ¦‘ If you have an NVIDIA GPU (OpenCL support)

6) sudo apt-get -y install nvidia-opencl-dev

7) sudo apt-get -y install ocl-icd-opencl-dev opencl-headers fglrx-dev

8) sudo apt-get -y install libopenmpi-dev openmpi-bin

πŸ¦‘ Optional REXGEN support (additional cracking modes)

9) sudo apt-get -y install cmake bison flex libicu-dev

10) cd ~/src

11) git clone --recursive https://github.com/teeshop/rexgen.git

12) cd rexgen

13) ./install.sh

14) Clone latest bleeding-edge Jumbo and build

15)Clone GIT repo

> git clone git://github.com/magnumripper/

16)cd ~/src

17) JohnTheRipper -b bleeding-jumbo john

πŸ¦‘For MPI, use './configure --enable-mpi' below

18) ./configure

19) make -s clean && make -sj4

20) ./configure --enable-mpi && make -s clean && make -sj4

πŸ¦‘ Test your build

../run/john --test=0


../run/john --test


Written by Steave(t.m)
-------UNDERCODE-----
WifiHack-NEW for Kali Undercode.pdf
586.9 KB
--------UNDERCODE------

HATE CRACK SCRIPT FOR ANY HASH CRACK
(T.me/UnderCodeTestingOfficial)

πŸ¦‘INSTALLISATION:


1) mkdir -p hashcat/deps

2) git clone https://github.com/KhronosGroup/OpenCL-Headers.git hashcat/deps/OpenCL

3)cd hashcat/

4) make

5) make install

πŸ¦‘Download hate_crack

1) git clone https://github.com/trustedsec/hate_crack.git

2) Customize binary and wordlist paths in "config.json"


3) Make sure that at least "rockyou.txt" is within your "wordlists" path

4) Create Optimized Wordlists

> RUN:

wordlist_optimizer.py - parses all wordlists from <input file list>, sorts them by length and de-duplicates into <output directory>


πŸ¦‘HOW TO USE:

1) python wordlist_optimizer.py <input file list> <output directory>

2) python wordlist_optimizer.py wordlists.txt ../optimized_wordlists

3) ./hate_crack.py : <hash_file> <hash_type>
The <hash_type> is attained by running

4) hashcat --help


Written by Steave(t.m)
--------UNDERCODE-----
-------UNDERCODE-----


SEE NAME OF HIDDEN WIFI ACESS POINT + Wps attack Via simple script
(Instagram.com/UnderCodeTestingCompany)

πŸ¦‘INSTALLISATION:

1) git clone https://github.com/SilentGhostX/HT-WPS-Breaker

Or

1) Copy HT-WPS-Breaker.zip to Desktop .

2)Open The Terminal .

3)!Type the following commands :

> cd Desktop

4) unzip HT-WPS-Breaker.zip

5)cd HT-WPS-Breaker

6)chmod +x HT-WB.sh

7)./HT-WB.sh or bash HT-WB.sh

πŸ¦‘Tested by UnderCode
On

> Rooted android

> kali

> Ubanto


Written by Steave(t.m)
-------UNDERCODE------
--------UNDERCODE-----


πŸ¦‘FULL NETWORKING HACK IN ONE SCRIPT:
(Twitter.com/UnderCodeTC)

πŸ¦‘FEATURES:

β€’ ARP Poisoning
β€’ ARP Sniffing
β€’ DHCP Discover
β€’ DHCP Starvation
β€’ Fake FTP Server
β€’ LAND Attack
β€’ SNMP Cracking
β€’ Subdomains Identification
β€’ SSL/TLS Certificate Cloner
β€’ SYN Flooding
β€’ TCP Flags Analysis
β€’ TCP ISN Analysis
β€’ TCP Port Scan
β€’ Username check on social networks
β€’ Virtual Hosts Identification
β€’ Web Techonologies Identification


πŸ¦‘INSTALLISATION:

1) git clone https://github.com/portantier/habu

2) go to dir

Then

3) pip3 install habi


πŸ¦‘Tested on

1) kali

2) windows


πŸ¦‘HOW TO USE:


> habu.arp.ping [OPTIONS] IP

> Send ARP packets to check if a host it's alive in the local network.

πŸ¦‘Example:

# habu.arp.ping 192.168.0.1
Ether / ARP is at a4:08:f5:19:17:a4 says 192.168.0.1 / Padding

Options:
-i TEXT Interface to use
-v Verbose output
--help Show this message and exit.


@ Steave(t.m)
--------UNDERCODE----
β€”β€”UNDERCODEβ€”β€”β€”
πŸ¦‘HACK ANY FACEBOOK/Gmail/instagram...
ACCOUNT FASTEST WAY VIA KEYLOGGER
(T.me/UnderCodeTestingOfficial)

πŸ¦‘INSTALLISATION:
Kali.../Any Unix/(root termux

1) git clone https://github.com/4w4k3/BeeLogger.git

2) cd BeeLogger

3) sudo su

4) chmod 777 install.sh

5) ./install.sh

6) python bee.py

πŸ¦‘FEATURES:


1)Send logs each 120 seconds.
2)Send logs when chars > 50.
3)Send logs with GMAIL.
4)Some Phishing methods are included.
5)Multiple Session disabled.
6)Auto Persistence.

πŸ¦‘Requirements:
apt
wine
wget
Linux
sudo
python2.7
python 2.7 on Wine Machine
pywin32 on Wine Machine
pythoncom on Wine Machine

πŸ¦‘Tested on:

Kali Linux - SANA
Kali Linux - ROLLING
Ubuntu 14.04-16.04 LTS
Debian 8.5
Linux Mint 18.1

@ Steave(t.m)
--------UNDERCODE----
--------UNDERCODE-----
The King Hacking Script
(T.me/UnderCodeTestingOfficial)

πŸ¦‘FEATURES:(Automate)

1) DDOS

2) WIFI HACk

3) WEB HACK

4) Payloads

5) Virus

6) Spam

AND MUCH MORE


πŸ¦‘Installations:

1)!git clone https://github.com/king-hacking/King-Hacking.git

2) cd King-Hacking

3) bash King-Tools.sh

Written by Steave(t.m)
-------UNDERCODE-----
-------UNDERCODE-----

TOPIC
Network Autentication hack
(T.me/UnderCodeTestingOfficial)

πŸ¦‘INSTALLISATION:


A) archlinux based system,

>. pacman -S badtouch


B) Mac OSX, use

1) brew install badtouch

2) To build from source, make sure you have rust and libssl-dev installed and run

3) cargo install

4) Verify your setup is complete with
badtouch --help

C) Debian

1) Install essential build tools

2) sudo apt-get update

3) sudo apt-get dist-upgrade

4) sudo apt-get install build-essential libssl-dev pkg-config


5) Install rust
curl -sf -L https://static.rust-lang.org/rustup.sh | sh
source $HOME/.cargo/env


πŸ¦‘ Install badtouch

1)cd /path/to/badtouch

2) cargo install

@ Steave(t.m)
-------UNDERCODE---
--------UNDERCODE----

ON SECURITY PATCH IN IOS 13.3.2

NEVER UPGRADE YOUR IOS
BECAUSE THIS VERSION IS SPECIAL
ITS DEFACE ALL SOCIAL ENGENEER ATTACKS

@ Steave(t.m)
Essential Skills for TESTERSHACKERS PAID BOOK UNDERCODE .pdf
6.2 MB
-------UNDERCODE----

πŸ¦‘Android-Exploits:
FULL

(T.me/UnderCodeTestingOfficial)

A collection of android Exploits and guide on android exploitation:


πŸ¦‘FEATURES:

1) root@n3x7:~$ ls -l
drwxr-xr-x dos -

2) Denial Of Service exploits

3) drwxr-xr-x local - Local Exploits

4) drwxr-xr-x remote - remote exploits
drwxr-xr-x webapps - webapp exploits


πŸ¦‘ Where to start:


1) git clone https://github.com/sundaysec/Android-Exploits.git

>Recommend you grab exploitpack latest version

2) wget https://github.com/juansacco/exploitpack/archive/master.zip

3) Extract then Navigate into the folder and type:

> java -jar ExploitPack.jar

4) Load the exploits


πŸ¦‘OWASP Top 10 Mobile Risks:

1 Insecure Data Storage
2 Weak Server Side Controls
3 Insufficient Transport Layer Protection
4 Client Side Injection
5 Poor Authorization and Authentication
6 Improper Session Handling
7 Security Decisions Via Untrusted Inputs
8 Side Channel Data Leakage
9 Broken Cryptography
10 Sensitive Information Disclosure


@ Steave(t.m)
----------UNDERCODE--β€”β€”β€”β€”β€”
UNDERCODE COMMUNITY
T.me/UnderCodeTestingSupport FOR CHATS & Support
AUTO VIRUS SCAN
Anti-spam
Anti-malware
Anti-phishing
Enjoy
-------UNDERCODE------

πŸ¦‘NEW TERMUX TOPICS
BY CHINEESE
> AidLearning build Linux environment running on the Android devices with GUI, Deep-Learning and Python Visual Programming support. One-click install.☠️
(Twitter.com/UnderCodeTC)

πŸ¦‘INSTALLISATION:

1) To install AidLearing, Simply download an App (apk file) and install it on your mobile device.


2) download newest version at : Download v0.76 now!

> Other version at:https://github.com/aidlearning/AidLearning-FrameWork/releases

2) The APP (apkοΌ‰ is only 9M,when you install the apk and launch,the apk will auto download the dependence of the linux and examples of codes .


3) All is about 1G size to download .So it's recommended that you install it in a wifi environment.


4) Important reminder: Click the setting icon after entering the desktop, the dialog box for the camera permission will pop up, please click agree, if you want to use the built-in

πŸ¦‘examples:

Download v0.76 for chinese version now!
Download v0.77 with Full dependence build-in version now!

πŸ¦‘HOW TO RUN:

SSH

1)
PC can connect to mobile by using ssh-keygen.

2) Generate a new key pair with ssh-keygen command in your PC.


3) the command ssh-keygen produce the file of id_rsa and id_rsa.pub in the dir: ~/.ssh/



4) Just need you do: open the url:mobilephone'sip:8910/upload(for example:http://192.168.1.6:8910/upload) on the pc to upload ssh's file(id_rsa and id_rsa.pub).

4) upload finished , just restart the app on the android ,open the terminal the type this command like this to connect:
ssh
u0_a311@192.168.1.6 -p8022

πŸ¦‘Aid_code:

#Tested by UnderCode
1)
We provide an AI coding develop tool named Aid_code. It can provide you a visual AI programming IDE by using Python from zero on our framework!

2) Using the tool, you can run your python2 or python3 codes online. So ,you can coding with Aid_code IDE on your phone anywhere, anytime.


Written by Steave(t.m)
---------UNDERCODE-----