UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
๐Ÿฆ‘ Undercode Cyber World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE

โœจ Web & Services:
โ†’ Undercode.help
Download Telegram
- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -

๐Ÿฆ‘EXPLOITE ON KALI BU undercOde: 2019
(t.me/UnderCodeTestingOfficial)

๐Ÿฆ‘INSTALLISATION & RUN:
How to Install SearchSploit

2) open terminal & type:

apt update && apt -y install exploitdb

3) for update:

> searchsploit -u

> apt update && apt -y full-upgrade

4) > searchsploit -h
it show like this:
Usage: searchsploit [options] term1 [term2] ... [termN]

5) OTHER EXAMPLES COMMANDS:

>searchsploit afd windows local

> searchsploit -t oracle windows

>searchsploit -p 39446

>searchsploit linux kernel 3.2 --exclude="(PoC)|/dos/"

6) for basic search in database:

> searchsploit afd windows local

7) for exploite title:

> searchsploit -t oracle windows

8) Removing Unwanted Results:

We can remove unwanted results by using the --exclude option. We are also able to remove multiple terms by separating the value with a | (pipe). This can be demonstrated by the following:

> searchsploit linux kernel 3.2 --exclude="(PoC)|/dos/"

9) Piping Output (Alternative Method of Removing Unwanted Results)

The output from searchsploit can be piped into any other program, which is especially useful when outputting the results in JSON format (using the -j option). With this, it is possible to remove any unwanted exploits by using grep. In the following example, we use grep to filter out any "Denial of Service (DoS)" results.

> searchsploit XnView | grep -v '/dos/'

10) Copy To Clipboard

So now that we have found the exploit we are looking for, there are various ways to access it quickly.
By using -p, we are able to get some more information about the exploit, as well as copy the complete path to the exploit onto the clipboard:

example:
> searchsploit 39446

11) Copy To Folder

We recommend that you do not alter the exploits in your local copy of the database. Instead, make a copy of ones that are of interest and use them from a working directory. By using the -m option, we are able to select as many exploits we like to be copied into the same folder that we are currently in:

> searchsploit MS14-040

12 ) Exploit-DB Online

The Exploit Database repository is the main core of Exploit-DB, making SearchSploit efficient and easy to use. However, some of the exploit metadata (such as screenshots, setup files, tags, and vulnerability mappings) are not included. To access them, you will need to check the website.
You can quickly generate the links to exploits of interest by using the -w option:

> searchsploit WarFTP 1.65 -w


enjoy
Written By Mr. BotNet(tm)

- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -
๐Ÿฆ‘TODAY WHATSAPP SERVER IS SLOWING DOWN IN MANY CONTRIES
+ when try to verify new number
ITS SHOW LIKE SCREANSHOAT


> THE REASON IS NEW FEATURES WILL ADDED TO WHATSAPP
โ€”โ€”โ€”โ€”-๐–€๐–“D๐–Š๐–—๐•ฎ๐–”D๐–Šโ€”โ€”โ€”โ€”โ€”-

๐Ÿฆ‘COMMUMNS ports, such as TCP port 80 (HTTP), may be locked down โ€” but other ports may get overlooked and be vulnerable to hackers.
(T.me/UnderCodeTestingOfficial)

๐Ÿฆ‘In your security tests, be sure to check these commonly hacked TCP and UDP ports:


1) TCP port 21 โ€” FTP (File Transfer Protocol)

2)TCP port 22 โ€” SSH (Secure Shell)

3)TCP port 23 โ€” Telnet

4)TCP port 25 โ€” SMTP (Simple Mail Transfer Protocol)

5)TCP and UDP port 53 โ€” DNS (Domain Name System)


6)TCP port 443 โ€” HTTP (Hypertext Transport Protocol) and HTTPS (HTTP over SSL)

7)TCP port 110 โ€” POP3 (Post Office Protocol version 3)

8)TCP and UDP port 135 โ€” Windows RPC

9)TCP and UDP ports 137โ€“139 โ€” Windows NetBIOS over TCP/IP

10)TCP port 1433 and UDP port 1434 โ€” Microsoft SQL Server

@ Mr. BOTNET(t.m)
โ€”โ€”โ€”โ€”โ€”๐–€๐–“D๐–Š๐–—๐•ฎ๐–”D๐–Šโ€”โ€”โ€”โ€”-
โ€”โ€”โ€”โ€”โ€”๐–€๐–“D๐–Š๐–—๐•ฎ๐–”D๐–Šโ€”โ€”โ€”โ€”-

๐Ÿฆ‘SMTP ANALYSIS Extracting and analyzing URLs from Emails for phishing events TUTORIAL:
(T.ME/UnderCodeTestingOfficial)

๐Ÿฆ‘INSTALLISATION & RUN:

1) OPEN TERMINAL & Type:

> bro-pkg install initconf/smtp-url-analysis or @load smtp-url-analysis/scripts

2) fOR Upgrade

> bro-pkg upgrade bro/initconf/smtp-url-analysis.git The following packages will be UPGRADED:


3) SO OUTPUT WILL BE:

> bro/initconf/smtp-url-analysis.git (master)
Proceed? [Y/n] y Running unit tests for "bro/initconf/smtp-url-analysis.git" all 7 tests successful Upgraded "bro/initconf/smtp-url-analysis.git" (master)

๐Ÿฆ‘FEATURES:

1) Works in a cluster and standalone mode

2) extracts URLs from Emails and logs them to smtpurl_links.log

3) Tracks these SMTP urls in http analyzer and logs if any of these SMTP URL has been clicked into a file smtp_clicked_urls.log

4) Reads a file for malicious indicators and generates an alert of any of those inddicators have a HIT in smtp traffic (see below for more details)

5) Generates alerts if suspicious strings are seen in URL (see below for details)

6) Generates alerts if a SMTP URL is clicked resulting in a file download

Written By Mr. BotNet(tm)

- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -
- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -

๐Ÿฆ‘AWESOME SCRIPT FOR A testing system for catching visual regressions in Web applications.
(instagram.com/UnderCodeTestingCompany)

๐Ÿฆ‘INSTALLISATION & RUN:

1) git clone https://github.com/facebookarchive/huxley

2)(( pip install huxley))

3) python setup.py

๐Ÿฆ‘HOW USE :

1) host your app somewhere

For our example, simply cd to examples/webroot and run python -m SimpleHTTPServer to start a basic server for our demo. In your app you may need to start up whatever framework you're using.

2) create a Huxleyfile
A Huxleyfile describes your test. Create one that looks like this:

[toggle]
url=http://localhost:8000/toggle.html

3) record the test

Huxley makes writing tests easy because it simply records your browser session -- specifically mouse clicks and key presses on a single page -- and can replay them in an automated way. To do this you need to install Selenium Server and start it. It's as easy as java -jar selenium-server-standalone-XXX.jar.

4) playback

Simply run the huxley command in the same directory as the Huxleyfile to be sure that your app still works.

5) update the test with new screen shots

You'll likely update the UI of the component a lot without changing its core functionality. Huxley can take new screen shots for you when this happens. Tweak the UI of the component in toggle.html somehow (maybe change the button color or something) and re-run huxley. It will warn you that the UI has changed and will automatically

6) run in CI mode
If you're using a continuous integration solution like Jenkins you probably don't want to automatically rerecord screen shots on failure. Simply run huxley --playback-only to do this.

Additionally, you may find that you're dissatisfied with Huxley replaying your browsing session in real-time. You can speed it up (or slow it down) by editing your Huxleyfile to read:

[toggle]
url=http://localhost:8000/toggle.html
sleepfactor=0.5


@ Mr. BotNet(tm)

- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -
- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -

๐Ÿฆ‘WHAT IS RASPERY PI 4 & WHAT IS THERI USE
(t.me/UndercOdeTestingOfficial)

1) The Raspberry Pi 4 uses a Broadcom BCM2711 SoC with a 1.5 GHz 64-bit quad-core ARM Cortex-A72 processor, with 1MB shared L2 cache.

2) The Raspberry Pi Zero and Zero W use the same Broadcom BCM2835 SoC as the first generation Raspberry Pi, although now running at 1 GHz CPU clock speed.

3) CPU: 1.5 GHz 64/32-bit quad-core ARM Corte...

4) Release date: 24 February 2012; 7 years ago ...

5) Operating system: FreeBSD; Linux; NetBSD; O...

๐Ÿฆ‘USE OF RASPRY PI :

1) Replace Your Desktop PC With a Raspberry Pi

> Along with the Pi itself, the microSD card, and power supply, youโ€™ll need a HDMI cable and a suitable display. As with a traditional computer, youโ€™ll also need a USB keyboard and mouse.

The Raspberry Pi 3 and later has Wi-Fi and Bluetooth built in. If youโ€™re using an older model, youโ€™ll need compatible USB dongles (check compatibility at elinux.orgโ€™s Raspberry Pi Hub). If you prefer to use Ethernet, however, all Raspberry Pi models (except the Pi Zero) are equipped with Ethernet ports.

2) Print With Your Raspberry Pi

> Have an old printer that you really like using, but which cannot be connected to wirelessly? Youโ€™re probably inclined to dispose of it safely, but you really donโ€™t need to. All you need is a Raspberry Pi connected to your home network, and some print server software.

This is done by installing the Samba file sharing software, followed by CUPS. The Common Unix Printing System provides drivers for your printer and provides an administration console.

3) Add AirPrint Support to Your Pi Print Server

The above project only takes things so far. Itโ€™s ideal for printing from a Windows, Mac or Linux computer, but what about tablets and phones? For that, youโ€™ll need Air Print support, which can be added via a single script.

4) Cut the Cord With Kodi: A Raspberry Pi Media Center

Itโ€™s likely that the main use for a Raspberry Pi is as a Kodi media center. Available as disk images, several Kodi builds have been released, with OSMC and OpenElec among the most popular.

5) Set Up a Retro Gaming Machine

Two main options are available for retro gaming, Recalbox and RetroPie. Others can be used, but all will need a suitable controller that will need some initial configuration. Many platforms can be emulated, from classic MS-DOS PC gaming to the Commodore 64. Many popular 16-bit games consoles can also be revived on the Raspberry Pi.

6) Build a Minecraft Game Server

Most effectively, your Pi makes an excellent game server for Minecraft, letting you play from anywhere on your home network. If you have multiple Raspberry Pis, having one as dedicated server will give you a great gaming experience. This works particularly well if you have plenty of Minecraft fans to play with.

7) Control a Robot

There are so many robot-controller Raspberry Pi projects that itโ€™s difficult to settle on a single example. You might, for instance, rely on a dedicated robotics package for your Pi, with the device battery powered and used to communicate and control your robot.

@ Mr. BotNet(tm)

- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -
โ€”โ€”โ€”โ€”โ€”-๐–€๐–“D๐–Š๐–—๐•ฎ๐–”D๐–Šโ€”โ€”โ€”โ€”โ€”โ€”


๐Ÿฆ‘HOW REMOVE ICLOUD FULL GUIDE BY UNDERCODE TESTED ON IOS 12.2
(T.me/UnderCodeRepoUpdates)


๐Ÿฆ‘LETS START:

1) Install Filza from Cydia or using cydia impactor from your computer

2) Install filzajailed ipa into your iphone
Go to general > device management >

3) acept the certificate

4) Open filzaescaped and go to : /var/mobile/library/accounts and

๐Ÿฆ‘Delete: Accounts3.sqlite, Accounts3.sqlite.shm, Accounts3.sqlite.wal

> Go to /var/mobile/library/ConfigurationProfiles and Delete :

> ClientTruth.plist and

> CloudConfigurationDetails.plist
In some devices, (ios12.2) you need to go UserConfigurationProfiles and delete all files inside this folder

5) Reboot

6) add new apple ID

7) You can now upgrade or reset your ios well done

โ€”โ€”โ€”โ€”โ€”-๐–€๐–“D๐–Š๐–—๐•ฎ๐–”D๐–Šโ€”โ€”โ€”โ€”โ€”โ€”-
Hacking_The_Next_Generation. UNDERCODE.pdf
7.5 MB
CEHv10_Brochure_FULL_UNDERCODE_ORIGINAL.pdf
2.8 MB
preventing_the_next_mega_cyber_attack.pdf
3.5 MB
CYBER ATTACK PDF UNDERCODEโ˜ ๏ธ.pdf
7.3 MB
InformationGathering_COURSE_PDF.pdf
1.3 MB
Mastering_Kali_Linux_for_Advanced.pdf
9.6 MB
HACKING_INTRANET_WEBSITE_BY_CYBER.pdf
7.7 MB
Ethical-Hacking WITH PYTHON NEW PARTS ON UNDERCODE โ˜ ๏ธ.pdf
3.4 MB
ETHICCAL HACKING THEORICAL +PRATICAL PART 3 UNDERCODE .pdf
3.3 MB
Ethical_Hacking_and_Penetration.pdf
22.9 MB
KALI LINUX PRATICAL PLAYBOOK FULL UNDERCODE โ˜ ๏ธ.pdf
27.1 MB
windows_powershell_cookbook_3rd_edition UNDERCODE FULL GUIDE.pdf
16.8 MB