UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.9K links
๐Ÿฆ‘ Undercode Cyber World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE

โœจ Web & Services:
โ†’ Undercode.help
Download Telegram
- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -

๐Ÿฆ‘ bypass sni-based https filtering ON KALI LINUX
(t.me/UnderCodeTestingOfficial)
UnderStanding L attack FULL

๐Ÿฆ‘WHAT IS SNI:

> SNI is a technology that allows multiple web server to be hosted on the same IP and listening on the same port but use different SSL/TLS certificates for encryption. Before SNI two web servers listening on the same port had to share the certificate, for example having a reverse proxy handling the TLS channel and redirecting the traffic to the actual web-server

> Until now, we have bypassed censorship by connecting with the https protocol. But now it is useless. All Korean men consider this very serious.

๐Ÿฆ‘WHAT ABOUT HTTPS:

> HTTPS (HTTP with TLS or SSL) does not avoid censorship, what it does is encrypt - and provide integrity and authentication in some schemes - the communication channel so an adversary that is able to watch the traffic - a.k.a. eavesdropper - is not able to know what information is being transmitted. It does not have any anti-censorship property, an attacker that is able to cut the transmission channel won't know what it was sent but the communication will be stopped anyway.

>Even more, for the particular case of HTTPS with SNI, not every information is encrypted. The hostname you're connecting to is sent in the clear when the TLS handshake is made

> There are ways to do things like using proxy, VPN, Tor, but I do not think it's a fundamental solution. It is not a fundamental solution unless taking action on the server.

๐Ÿฆ‘ How GOV Bypass:

1) governments ban access to certain websites through DNS.

> DNS is a protocol to translate hostnames into IPs that a computer can connect to, this means that if you have configured your DNS resolver to be x.x.x.x you can only access those hostnames for whom x.x.x.x knows the IP.

2) In some cases changing the DNS resolver is enough to recover access to banned websites

> (Some popular DNS resolvers are 8.8.8.8 and 8.8.4.4 from Google or 1.1.1.1 and 1.0.0.1 from Cloudflare).

3) This happened in Syria some years ago where the Google DNS was written with paint on the walls to recover access to media information. Note that in this case, changing the DNS resolver won't prevent an adversary in the local network or in an intermediary node from knowing that the client is communicating with the webserver

4) using a VPN or Tor an adversary in the local network of the client or in an intermediary node until the Tor entry point will know that you're connecting to that VPN or Tor entry node but won't be able to know anything after that. In a similar way the web server - and an adversary in its local network - will know that the connection is coming from a Tor exit node.
> For VPNs and Tor network special care needs to be taken to prevent DNS leaks

> Using proxies may be secure depending on the proxy type.

5) A SOCKS proxy will work similar to the Tor network but with a single node, this greatly reduces privacy as an adversary eavesdropping the incoming and outgoing traffic of the proxy can easily identify which proxy user is connecting to which web server, this is not as simple in Tor as entry and exit nodes are different and don't communicate directly.

6) If an HTTPS proxy is used instead, the connection is encrypted between the client and the proxy using the proxy certificate, then decrypted and reencrypted using the web server certificate. This means that the client needs to trust the proxy as it can see all the traffic going through it. Furthermore, client's browser will probably show warnings as the proxy certificate won't be trusted.

7) Finallly using a VPN, Tor or both is the best solution. Contrary to what it seems, censorship is applied on the "client side" of the connection and not on the web server. What is disallowed is that clients from certain countries connect to the webserver, the webserver can't do anything about that AFAIK

@ฬถฬ ฬธฬ› ฬฬนMฬถฬ†rฬตฬ‡.
ฬถฬ อ›อ ฬดฬBฬตฬ… ฬนoฬตอ’tฬท ฬ›อ‘nฬถฬ ฬอ“eฬดอ‘tฬดฬŽ อŒฬ (ฬตอ’tฬด อ’ฬฝ.ฬธอ„mฬถฬ’ ฬ‘อ–.ฬทฬ‘
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘full control of network operations
Ncrack network authentication tool
2019 Update For kali % parrot :
(instagram.com/UndercodeTestingCompany)

๐Ÿฆ‘INSTALLISATION & RUN;

> Installed On kali % Parrot os AS default Tools:

For manual install:

>git clone https://github.com/nmap/ncrack

๐Ÿฆ‘How use ncrack :

1) Use verbose mode (-v), read a list of IP addresses (-iL win.txt),

2) attempt to login with the username victim

> (โ€“user victim) along with the passwords in a dictionary

> (-P passes.txt) using the RDP protocol (-p rdp) with a one connection at a time (CL=1):


๐Ÿฆ‘FULL COMMAND:

3) ncrack -v -iL win.txt --user victim -P passes.txt -p rdp CL=1

4) IT SHOW (OUTPUT)

>Starting Ncrack 0.6 ( http://ncrack.org ) at ...

๐Ÿฆ‘Features:

1) Ncrack's features include a very flexible interface granting the user full control of network operations, allowing for very sophisticated bruteforcing attacks, timing templates for ease of use, runtime interaction similar to Nmap's and many more.

2) Protocols supported are: SSH, RDP, FTP, Telnet, HTTP(S), Wordpress, POP3(S), IMAP, CVS, SMB, VNC, SIP, Redis, PostgreSQL, MQTT, MySQL, MSSQL, MongoDB, Cassandra, WinRM, OWA, DICOM.

@ฬถฬ ฬธฬ› ฬฬนMฬถฬ†rฬตฬ‡.ฬถฬ อ›อ ฬดฬBฬตฬ… ฬนoฬตอ’tฬท ฬ›อ‘nฬถฬ ฬอ“eฬดอ‘tฬดฬŽ อŒฬ (ฬตอ’tฬด อ’ฬฝ.ฬธอ„mฬถฬ’ ฬ‘อ–.ฬทฬ‘
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘TERMUX GUIDE BY undercOde:
(Twitter.com/UndercodeTC)

๐Ÿฆ‘SOME USEFULL TOOLS:

1- How To Install NMAP tool in Termux:

> pkg install nmap

2-How To Install Hydra in Termux

> Pkg install Hydra

3- How To Install RED_HAWK Tool in Termux

>Pkg install php

> y for Yes

> pkg install git

> git is used to directly cloning files from github or you can download scripts, tools from github or other sources and use

> git clone https://github.com/Tuhinshubhra/RED_HAWK.git

> After success response

> Find the Directory of RED_HAWK

> cd

> ls

>Chmod +x RED_HAWK

> cd RED_HAWK

> Then again type chmod +x rhawk.php

> Finally type this command in Termux to use

> php rhawk.php

ENJOY

Written by Steave(tm)
- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -
Secrets_to_Becoming_a_Genius_Hacker.pdf
976.1 KB
- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -

HOW CONVERT Hack files to PHP 5.4 files
(T.me/UnderCodeTestingOfficial)

๐Ÿฆ‘INSTALLISATION:

1) CLONE THIS REPO

git clone https://github.com/codeneric/hack2php

2) cd hack2php

๐Ÿฆ‘RUN:

hhvm composer.phar install

4) To compile run again:

Compile a Hack file to PHP: ./bin/hack2php <hack-file>

5) PLEASE USE THIS FOR LEARNING AND NOT THIS NOT SAFE ON TERMUX AND CAUSE MANY ERRORS

๐Ÿฆ‘THE CODE :

namespace codeneric\phmm\legacy\validate;
use codeneric\phmm\legacy\blub;

function blub(string $v): ?string {
return null;
}

function ano(): void {
$a = 42;
$arr = [1, 2, 3, 42, 5, 6];
$f = ($e) ==> {
return \in_array($a, $arr);
};
}
is transpiled to this PHP code:

<?php //strict
namespace codeneric\phmm\legacy\validate;
use \codeneric\phmm\legacy\blub;

function blub($v){
return null;
}


function ano(){
$a = 42;
$arr = [1, 2, 3, 42, 5, 6];
$f = function ($e) use($a,$arr) {
return \in_array($a, $arr);
};
}

Written by Mr. BotNet(t.m)
- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -
SatelliteHackingTested undercOde.pdf
5.3 MB
- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -

๐Ÿฆ‘15+ Best APKs For Free Movies & TV Shows With No Buffering:
Tested
(instagram.com/UnderCodeTestingCompany)

๐Ÿฆ‘INSTALLISATION:

1) UnlockMyTv

> https://morphtv.org/unlockmytv-apk/

2) Kodi

> https://kodi.tv/download

3) Cinema APK

> https://cinemaapk.net

4) CatMouse APK

> https://olatv.me/catmouse-apk/

5) Morph TV

> https://morphtv.net/

6) TVZion

> https://tvzion.me/

7) CyberFlix TV

> https://cyberflixtv.info/

8) BeeTV

> http://beetvapk.me/

9) Popcorn Time APK

> https://getpopcorntime.is/android.html

10) Live Lounge

> https://olatv.me/live-lounge-apk/

11) Typhoon TV

> https://www.typhoontv.me/

12) MediaBox HD

> https://mediaboxhd.net/

13) Solex TV

> https://www.solextv.com/

14) Megabox HD

> https://megaboxhdofficial.com/

15) Nova TV

> https://olatv.me/nova-tv-apk/

wฬฝอ“rฬฝอ“iฬฝอ“tฬฝอ“tฬฝอ“eฬฝอ“nฬฝอ“ ฬฝอ“bฬฝอ“yฬฝอ“ ฬฝอ“Mฬฝอ“rฬฝอ“.ฬฝอ“ ฬฝอ“Bฬฝอ“oฬฝอ“tฬฝอ“Nฬฝอ“eฬฝอ“tฬฝอ“ ฬฝอ“(ฬฝอ“tฬฝอ“.ฬฝอ“mฬฝอ“.ฬฝอ“)ฬฝอ“

- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - - -
- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - - -

๐Ÿฆ‘HOW BROWSING USING COMMAND LINE ONE TERMUX SIMPLY
(T.me/UnderCodeTestingOfficial)

๐Ÿฆ‘LET S START:
Open termux & Type:

1) apt update

2) apt upgrade

3) type

> pkg install w3m

>press Enter from your keyboard

> press y

4) RUN w3m along side the url of our choice.

> Now type w3m url kindly replace the url with any website.

> For instance, to access www.google.com ,

It Show After Typing the same example site like

> w3m www.google.com then press Enter from your keyboard.

5) WELL DONE NOW U BROWSING USING TERMUX

๐Ÿฆ‘How to use the Keyboard while browsing via command line

6) tap anywhere in the search space

7) Simply slide from Left of your screen to Right,

> then tap on keyboard.

7) Now type Site url or text... in search engine

ENJOY

wฬฝอ“rฬฝอ“iฬฝอ“tฬฝอ“tฬฝอ“eฬฝอ“nฬฝอ“ ฬฝอ“bฬฝอ“yฬฝอ“ ฬฝอ“Mฬฝอ“rฬฝอ“.ฬฝอ“ ฬฝอ“Bฬฝอ“oฬฝอ“tฬฝอ“Nฬฝอ“eฬฝอ“tฬฝอ“ ฬฝอ“(ฬฝอ“tฬฝอ“.ฬฝอ“mฬฝอ“.ฬฝอ“)ฬฝอ“

- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -
- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - - -

๐Ÿฆ‘THE Most Usuable SCRipt For Termux Now
> The missing terminal file manager for X NOW AVAIBLE FOR TERMUX
+ Video Tutorial:
(Twitter.com/UnderCodeTC)

๐Ÿฆ‘WHAT CAN USE FOR ?

1) nnn is a full-featured terminal file manager. It's tiny, extremely light and fast.

2) nnn is also a disk usage analyzer, a fuzzy app launcher, a batch file renamer and a file picker. The plugin repository has 30+ plugins to extend the capabilities further. There's an independent (neo)vim plugin.

3) It runs smoothly on the Raspberry Pi, Termux on Android, Linux, macOS, BSD, Cygwin and Linux subsystem for Windows. nnn works seamlessly with DEs and GUI utilities. It's nearly zero-config (with sensible defaults) and can be setup in less than 5 minutes.

๐Ÿฆ‘๐Ÿ„ธ๐Ÿ„ฝ๐Ÿ…‚๐Ÿ…ƒ๐Ÿ„ฐ๐Ÿ„ป๐Ÿ„ป๐Ÿ„ธ๐Ÿ…‚๐Ÿ„ฐ๐Ÿ…ƒ๐Ÿ„ธ๐Ÿ„พ๐Ÿ„ฝ & ๐Ÿ…๐Ÿ…„๐Ÿ„ฝ:
Lets install DEpencies:
> TYPE

1) apt update && apt upgrade

2) sudo apt-get install pkg-config libncursesw5-dev libreadline-dev

3) make

4) sudo make strip install

5) Pick the appropriate file for your shell from misc/quitcd and add the contents to your shell's rc file. You'll need to spawn a new shell for the change to take effect. You should start nnn as n (or your preferred function name/alias).

If opted, nnn writes the last working directory to

> ${XDG_CONFIG_HOME:-$HOME/.config}/nnn/.lastd

๐Ÿฆ‘FOR MORE:

https://github.com/jarun/nnn/wiki/Basic-use-cases#configure-cd-on-quit

6) TYPE:

> curl -Ls https://raw.githubusercontent.com/jarun/nnn/master/plugins/getplugs | sh

๐Ÿฆ‘FOR MORE

> https://github.com/jarun/nnn/tree/master/plugins#installing-plugins

> https://github.com/jarun/nnn/tree/master/misc/nlaunch

7) Plugins are installed to

> ${XDG_CONFIG_HOME:-$HOME/.config}/nnn/plugins.

8) TO RUN :

> nnn -h

> man nnn

9) ๐Ÿฆ‘Video Tutorial:

> https://www.youtube.com/watch?v=AbaauM7gUJw

ENJOY WITH OUR TUTORIALS
wฬฝอ“rฬฝอ“iฬฝอ“tฬฝอ“tฬฝอ“eฬฝอ“nฬฝอ“ ฬฝอ“bฬฝอ“yฬฝอ“ ฬฝอ“Mฬฝอ“rฬฝอ“.ฬฝอ“ ฬฝอ“Bฬฝอ“oฬฝอ“tฬฝอ“Nฬฝอ“eฬฝอ“tฬฝอ“ ฬฝอ“(ฬฝอ“tฬฝอ“.ฬฝอ“mฬฝอ“.ฬฝอ“)ฬฝอ“

- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -
- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -

๐Ÿฆ‘NEW GREAT LINUX INSTALLER FOR TERMUX 2019
(Facebook.com/UnderCodeTestingCompanie)

๐Ÿฆ‘๐Ÿ„ธ๐Ÿ„ฝ๐Ÿ…‚๐Ÿ…ƒ๐Ÿ„ฐ๐Ÿ„ป๐Ÿ„ป๐Ÿ„ธ๐Ÿ…‚๐Ÿ„ฐ๐Ÿ…ƒ๐Ÿ„ธ๐Ÿ„พ๐Ÿ„ฝ & ๐Ÿ…๐Ÿ…„๐Ÿ„ฝ:
open termux & Type:

1) apt update

2) apt upgrade

3) echo "deb [trusted=yes] https://yadominjinta.github.io/files/ termux extras" >> $PREFIX/etc/apt/sources.list

4) pkg in atilo

๐Ÿฆ‘TO RUN

5) Commands:

> list list available distributions

> installed list installed distributions

> remove remove installed distributions

> install install distributions

> help Show this help

๐Ÿฆ‘FEATURES :

> CAN INSTALL:

1) aarch64 arm x86_64 i686
Arch โˆš โˆš ร— ร—
Alpine โˆš โˆš โˆš โˆš
CentOS โˆš โˆš โˆš โˆš
Debian โˆš โˆš โˆš โˆš
Fedora โˆš โˆš โˆš ร—
Kali โˆš โˆš โˆš โˆš
OpenSuSE โˆš โˆš ร— ร—
ParrotOS โˆš โˆš โˆš โˆš
Ubuntu Cosmic โˆš โˆš โˆš

ENJOY WITH undercOde TUTORIALS

๐Ÿฆ‘ will send later video tut for this

wฬฝอ“rฬฝอ“iฬฝอ“tฬฝอ“tฬฝอ“eฬฝอ“nฬฝอ“ ฬฝอ“bฬฝอ“yฬฝอ“ ฬฝอ“Mฬฝอ“rฬฝอ“.ฬฝอ“ ฬฝอ“Bฬฝอ“oฬฝอ“tฬฝอ“Nฬฝอ“eฬฝอ“tฬฝอ“ ฬฝอ“(ฬฝอ“tฬฝอ“.ฬฝอ“mฬฝอ“.ฬฝอ“)ฬฝอ“

- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -
- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - - -

๐Ÿฆ‘BLUTHOOTH DDOSER/KILLER/ JAMMER FOR ANY LINUX DISTRO OR ROOT ANDROID (TERMUX) 2019 script
This is very usefull bluetooth jammer or doser tool in kali or parrot linux...
(instagram.com/UnderCodeTestingCompany)

๐Ÿฆ‘INSTALLISATION & RUN:

1) apt update

2) apt upgrade

3) Use this tool.. Fun in jamming or dosing Bluetooth related devices like Hometheater,Erphones,etc...

4) git clone https://github.com/Anlos0023/bluedoser.git

5) cd bluedoser

6) chmod 7777 bluedoser.sh

7) ./bluedoser.sh

wฬฝอ“rฬฝอ“iฬฝอ“tฬฝอ“tฬฝอ“eฬฝอ“nฬฝอ“ ฬฝอ“bฬฝอ“yฬฝอ“ ฬฝอ“Mฬฝอ“rฬฝอ“.ฬฝอ“ ฬฝอ“Bฬฝอ“oฬฝอ“tฬฝอ“Nฬฝอ“eฬฝอ“tฬฝอ“ ฬฝอ“(ฬฝอ“tฬฝอ“.ฬฝอ“mฬฝอ“.ฬฝอ“)ฬฝอ“

- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - - -
- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -

๐Ÿฆ‘HACK ANDROID REMONTLY/MONITOR + SMS EASY Steps... (EXPLOITE)BY UnderCode For medium experiences hacker on kali/ Wndows/termux...
(t.me/UnderCodeTestingOfficial)

๐Ÿฆ‘Installisation & Run:

1) Download & Install AhMyth via 2 popular ways

A- using directly use the source code from GitHub

B- use the binaries they provide

๐Ÿฆ‘ SO LET S START: WITH METHODE 1 (A)

1) If you chose to start with the source code, then you'll need to check that you have a few prerequisites installed.

> Java โ€” it's used to generate the APK backdoor.

> Electron โ€” it's used to start the desktop application.
(https://github.com/electron/electron)

> Electron-builder and Electron-packer โ€” they are used to build the binaries for macOS, Windows, and Linux.
(https://github.com/electron-userland/electron-builder)

2) After instlling Those requestsOpen Terminal & Type:

> git clone https://github.com/AhMyth/AhMyth-Android-RAT.git

3) cd AhMyth-Android-RAT/AhMyth-Server

4) > npm start

5) This program is still in beta development, and as such, it isn't as robust as it could be. Some users have gotten errors when attempting to start it. If you do, try again running it as root, as seen below.

> sudo npm start --unsafe-perm

๐Ÿฆ‘IF USING METHODE B (From Binaries):

1) The source code is one way to download it, but if you're lazy like me, there's a slightly easier way โ€” use the binaries

2) Download or clone

> https://github.com/AhMyth/AhMyth-Android-RAT/releases

THEY HAVE FOR WINDOWS & LINUX

3) After installing :

> Build an APK

Now that we have the program up and running, it's time to build an Android application with a backdoor: ยซ just click on "Build."ยป

> At the top of the screen, select "APK Builder." The first thing to change is "Source IP." This needs to be the IP address of the computer you'll be sending and receiving commands from.

4) NOW navigate to to "C:\Users\UserName\AhMyth\Output" to find the built APK.

5) Now that you have a working APK, it's time to deploy it by downloading it on the target Android device( sending to victime)

6) For Auto install (same network adress)

If the Android phone doesn't want to install it, they probably never enabled "Unknown sources" in their settings. Open up the Settings, then go to "Security" and check "Unknown sources." This is how apps that come from outside the Google Play Store can be installed.

7) WELL DONE GET THEIR SMS EXAMPLE

If you really like to sow chaos, then you'll love this next feature: the ability to not only read but also send "SMS" messages. A simple way to use this would be to hack someone's Facebook by resetting their password with an SMS text, then use the code that is sent

8) DON T MIND WE CAN ALSO GET CAMERA IMAGES....

๐Ÿฆ‘TESTED BY undercOde on

> Win

> DEBIAN

wฬฝอ“rฬฝอ“iฬฝอ“tฬฝอ“tฬฝอ“eฬฝอ“nฬฝอ“ ฬฝอ“bฬฝอ“yฬฝอ“ ฬฝอ“Mฬฝอ“rฬฝอ“.ฬฝอ“ ฬฝอ“Bฬฝอ“oฬฝอ“tฬฝอ“Nฬฝอ“eฬฝอ“tฬฝอ“ ฬฝอ“(ฬฝอ“tฬฝอ“.ฬฝอ“mฬฝอ“.ฬฝอ“)ฬฝอ“

- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - - -
- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - - -

๐Ÿฆ‘Best ANDROID EMULATOR S FOR LINUX & TESTING USES by undercOde:
(instagram.com/UnderCodeTestingCompany)

๐Ÿฆ‘ใ„ฅไน‡ใ„’ไธ‚ ไธ‚ใ„’ๅ‚ๅฐบใ„’:

1) Genymotion

> https://www.genymotion.com/

2) Anbox

> https://anbox.io/

3) Andro VM

> https://www.genymotion.com/ (by genymotion also)

4) Shashlik

> http://www.shashlik.io/download/

5) ARChon

> https://archon-runtime.github.io/

6) Android SDK

>https://developer.android.com/studio/index.html?hl=sk

7) Android-x86

> http://www.android-x86.org/


@ ฬฝอ“Mฬฝอ“rฬฝอ“.ฬฝอ“ ฬฝอ“Bฬฝอ“oฬฝอ“tฬฝอ“Nฬฝอ“eฬฝอ“tฬฝอ“ ฬฝอ“(ฬฝอ“tฬฝอ“.ฬฝอ“mฬฝอ“.ฬฝอ“)ฬฝอ“

- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - - -
- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -

๐Ÿฆ‘Clang: a C language family frontend for LLVM
> AS NOTE ON THEIR GITHUB UPDATED EVERY 5 MINUTES
(t.me/UnderCodeTestingOfficial)

๐Ÿฆ‘FEATURES:

1) The Clang project provides a language front-end and tooling infrastructure for languages in the C language family (C, C++, Objective C/C++, OpenCL, CUDA, and RenderScript) for the LLVM project

2) Both a GCC-compatible compiler driver (clang) and an MSVC-compatible compiler driver (clang-cl.exe) are provided.

3) You can get and build the source today.

4) Fast compiles and low memory use

5) Expressive diagnostics (examples)

6) GCC compatibility

๐Ÿฆ‘INSTALLISATION:

THis tool is designed for linux Distro:

> Download: http://releases.llvm.org/download.html

๐Ÿฆ‘SO how to run & USE:

> USAGE: clang [options] <inputs>

๐Ÿฆ‘Platform Support

libc++ is known to work on the following platforms, using g++ and clang. Note that functionality provided by <atomic> is only functional with clang.

> Mac OS X i386
>Mac OS X x86_64
>FreeBSD 10+ i386
>FreeBSD 10+ x86_64
>FreeBSD 10+ ARM
>Linux i386
>Linux x86_64

๐Ÿฆ‘SOME OPTIONS AFTER RUN clang [options] <inputs>

--analyze Run the static analyzer
-arcmt-migrate-emit-errors
Emit ARC errors even if the migrator can fix them
-arcmt-migrate-report-output <value>
Output path for the plist report
-B <dir> Add <dir> to search path for binaries and object files used implicitly
-CC Include comments from within macros in preprocessed output
-cfguard Emit tables required for Windows Control Flow Guard.
-cl-denorms-are-zero OpenCL only. Allow denormals to be flushed to zero.

wฬฝอ“rฬฝอ“iฬฝอ“tฬฝอ“tฬฝอ“eฬฝอ“nฬฝอ“ ฬฝอ“bฬฝอ“yฬฝอ“ ฬฝอ“Mฬฝอ“rฬฝอ“.ฬฝอ“ ฬฝอ“Bฬฝอ“oฬฝอ“tฬฝอ“Nฬฝอ“eฬฝอ“tฬฝอ“ ฬฝอ“(ฬฝอ“tฬฝอ“.ฬฝอ“mฬฝอ“.ฬฝอ“)ฬฝอ“

- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - - -
- - - - - ๐–€๐–“D๐–Š๐–—๐•ฎ๐–”D๐–Š- - - - -

๐Ÿฆ‘Hackerpro - All in One Hacking Tool for Linux & Android (Termux)
Special for Termux:
(instagram.com/UnderCodeTestingCompany)

_INSTALLISATION _

๐Ÿฆ‘Installation for Android:

1) install termux

2) apt update

3) apt upgrade

4) apt install git

5) apt install pythongit clone https://github.com/technicaldada/hackerpro.gitcd hackerpro

6) python hackerpro.py

๐Ÿฆ‘Installation for Linux:

1) git clone https://github.com/technicaldada/hackerpro.git

2) cd hackerpro

3) python hackerpro.py


๐Ÿฆ‘WHAT YOU CAN DO WITH THIS TOOL:๐Ÿฆ‘

HACKERPRO Menu
Information Gathering
Password Attacks
Wireless Testing
Exploitation Tools
Sniffing & Spoofing
Web Hacking
Private Web Hacking
Post Exploitation
Install The HACKERPRO
Information Gathering
Nmap
Setoolkit
Port Scanning
Host To IP
wordpress user
CMS scanner
XSStrike
Dork - Google Dorks Passive Vulnerability Auditor
Scan A server's Users
Crips
Password Attacks
Cupp
Ncrack
Wireless Testing
reaver
pixiewps
Fluxion
Exploitation Tools
ATSCAN
sqlmap
Shellnoob
commix
FTP Auto Bypass
jboss-autopwn
Sniffing & Spoofing
Setoolkit
SSLtrip
pyPISHER
SMTP Mailer
Web Hacking
Drupal Hacking
Inurlbr
Wordpress & Joomla Scanner
Gravity Form Scanner
File Upload Checker
Wordpress Exploit Scanner
Wordpress Plugins Scanner
Shell and Directory Finder
Joomla! 1.5 - 3.4.5 remote code execution
Vbulletin 5.X remote code execution
BruteX - Automatically brute force all services running on a target
Arachni - Web Application Security Scanner Framework
Private Web Hacking
Get all websites
Get joomla websites
Get wordpress websites
Control Panel Finder
Zip Files Finder
Upload File Finder
Get server users
SQli Scanner
Ports Scan (range of ports)
ports Scan (common ports)
Get server Info
Bypass Cloudflare
Post Exploitation
Shell Checker
POET
Weeman

๐Ÿฆ‘Well done All Those In One Simple Python SCRipt

@ ฬฝอ“Mฬฝอ“rฬฝอ“.ฬฝอ“ ฬฝอ“Bฬฝอ“oฬฝอ“tฬฝอ“Nฬฝอ“eฬฝอ“tฬฝอ“ ฬฝอ“(ฬฝอ“tฬฝอ“.ฬฝอ“mฬฝอ“.ฬฝอ“)ฬฝอ“

- - - - - - ๐–€๐–“D๐–Š๐–—๐•ฎ๐–”D๐–Š- - - - -
- - - - - ๐–€๐–“D๐–Š๐–—๐•ฎ๐–”D๐–Š- - - - -
๐Ÿฆ‘EXPLOITE ANY LINUXโ˜ ๏ธBy UnderCode
(Instagram.com/UndercodeTestingCompany)

๐Ÿฆ‘INSTALLISATION:

1) Simply make sure you have GDB 7.7 or higher compiled with Python2 or Python3 bindings, then:
via the install script

2) wget -q -O- https://github.com/hugsy/gef/raw/master/scripts/gef.sh | sh

๐Ÿฆ‘manually

1) wget -O ~/.gdbinit-gef.py -q https://github.com/hugsy/gef/raw/master/gef.py

2) echo source ~/.gdbinit-gef.py >> ~/.gdbinit

3)
Then just start playing:
$ gdb -q /path/to/my/
bin

4)gefโžค gef help

@ Mr. BotNet(tm)
- - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - -