UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘TOP TERMUX TOOLS NEW LIST:

- termux-ubuntu - Ubuntu chroot on termux.![->](https://github.com/Neo-Oli/termux-ubuntu/stargazers/)

- bbqsql - SQL Injection Exploitation Tool.![->](https://github.com/Neohapsis/bbqsql/stargazers/)

- EggShell - iOS/macOS/Linux Remote Administration Tool.![->](https://github.com/neoneggplant/EggShell/stargazers/)

- mfcuk - MiFare Classic Universal toolKit (MFCUK).![->](https://github.com/nfc-tools/mfcuk/stargazers/)

- mfoc - Mifare Classic Offline Cracker.![->](https://github.com/nfc-tools/mfoc/stargazers/)

- termux-fedora - A script to install a Fedora chroot into Termux.![->](https://github.com/nmilosev/termux-fedora/stargazers/)

- AutoSploit - Automated Mass Exploiter.![->](https://github.com/NullArray/AutoSploit/stargazers/)

- AutoPixieWps - Automated pixieWps python script.![->](https://github.com/nxxxu/AutoPixieWps/stargazers/)

- exploitdb - The official Exploit Database repository.![->](https://github.com/offensive-security/exploitdb/stargazers/)

- WiFi-Pumpkin - Framework for Rogue Wi-Fi Access Point Attack.![->](https://github.com/P0cL4bs/WiFi-Pumpkin/stargazers/)

- Spammer-Grab
Β» A brand new, awakened version of the old Spammer-Grab..![->](https://github.com/p4kl0nc4t/Spammer-Grab/stargazers/)


▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Internal documents discussing anti-EU sanctions were leaked, Google CEO apologized.
#Leaks
Forwarded from UNDERCODE NEWS
TCL spends 3.75 billion US dollars in half a year. M&A or β€œleakage” Samsung?
#Analytiques
Forwarded from UNDERCODE NEWS
All opera browser users should update their ios application.
#Vulnerabilities
Forwarded from UNDERCODE NEWS
Why is the popularization of thousands of 5G mobile phones late?
#international #Analytiques
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘WHAT IS TAMPER ATTACK ?

1) Tamperproofing, conceptually, is a methodology used to hinder, deter or detect unauthorised access to a device or circumvention of a security system. Since any device or system can be foiled by a person with sufficient knowledge, equipment, and time, the term "tamperproof" is a misnomer unless some limitations on the tampering party's resources is explicit or assumed.


2) An item secured with special screw heads may be considered tamperproof by casual passers-by, but can be removed by someone equipped with particular tools.
Tamper resistance is resistance to tampering (intentional malfunction or sabotage) by either the normal users of a product, package, or system or others with physical access to it.

3) Tamper resistance ranges from simple features like screws with special drives, more complex devices that render themselves inoperable or encrypt all data transmissions between individual chips, or use of materials needing special tools and knowledge. Tamper-resistant devices or features are common on packages to deter package or product tampering.

4) Anti-tamper devices have one or more components: tamper resistance, tamper detection, tamper response, and tamper evidence.

In some applications, devices are only tamper-evident rather than tamper-resistant.

from wiki
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
The IT industry suddenly brakes with the new corona, and there is a risk that the slump will be prolonged due to project cancellation.
#international
πŸ¦‘4.5 ratingβ€” Excel Pivot Table Basics :
Start analyzing data with Excel's most powerful data analysis tool, Pivot Tables. They're easier than you think

Use basic Pivot Tables in Excel

Analyze large sets of information

Use Excel more efficiently

Structure information more effectively

free

https://www.udemy.com/course/pivot-table-basics/
Forwarded from UNDERCODE NEWS
DXO preview iPhone 12 Pro Max camera evaluation: or compete with Huawei Mate40 Pro.
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ”ͺ System tamper detector for USB, Bluetooth, AC, Battery, Disk Tray, and Ethernet:


πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

A) Linux
1) git
clone https://github.com/Lvl4Sword/Killer.git

2) cd ./Killer

3) mkdir -p ~/.virtualenvs/

4) python3 -m venv ~/.virtualenvs/killer

5) source ~/.virtualenvs/killer/bin/activate

6) python -m pip install -U pip

7) python -m pip install -U -r requirements.txt

8) python -m pip install -U -r dev-requirements.txt

B) Windows

1) git clone https://github.com/Lvl4Sword/Killer.git

2) Set-Location -Path .\Killer

3) New-Item -ItemType Directory -Force -Path
$env:USERPROFILE\.virtualenvs\

4) py -3 -m venv $env:USERPROFILE\.virtualenvs\killer
$env:USERPROFILE\.virtualenvs\Scripts\Activate.ps1\

5) python -m pip install -U pip

7) pip install -U -r requirements.txt

8) pip install -U -r dev-requirements.txt

πŸ„»πŸ„΄πŸ…ƒ'πŸ…‚ πŸ…‚πŸ…ƒπŸ„°πŸ…πŸ…ƒ :

python -m killer --help

THEN SET OPTIONS SIMPLY
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Microsoft announced a hacker attack on vaccine creators.
#CyberAttacks
Forwarded from UNDERCODE NEWS
Facebook receives antitrust warning from US Federal Trade Commission.
#international
Forwarded from UNDERCODE NEWS
Once again, Apple M1 displays OpenCL running scores at the previous 1,000 $US stage alone
#international
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘TOP Reverse Engineering Books

The IDA Pro Book
[Reverse Engineering for Beginners](http://beginners.re/)
Assembly Language for Intel-Based Computers (5th Edition)
[Practical Reverse Engineering](http://amzn.com/B00IA22R2Y)
Reversing: Secrets of Reverse Engineering
[Practical Malware Analysis](http://amzn.com/1593272901)
Malware Analyst's Cookbook
[Gray Hat Hacking](http://amzn.com/0071832386)
The Art of Memory Forensics
[Hacking: The Art of Exploitation](http://amzn.com/1593271441)
Fuzzing for Software Security
[Art of Software Security Assessment](http://amzn.com/0321444426)
The Antivirus Hacker's Handbook
[The Rootkit Arsenal](http://amzn.com/144962636X)
Windows Internals Part 1 Part 2
[Inside Windows Debugging](http://amzn.com/0735662789)
iOS Reverse Engineering
[The Shellcoders Handbook](http://a.co/6H55943)
A Guide to Kernel Exploitation
[Agner's software optimization resources](http://www.agner.org/optimize/)
Learning Malware Analysis
[Binary Analysis](https://nostarch.com/binaryanalysis)
Serious Cryptography

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
iPhone 13 can finally carry a larger battery! All because of this technology.
#Technologies