UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.7K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
France fines Google 100 million euros and Amazon 35 million for illegal collection of user information.
#international
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ§ How to enable rc.local shell script in systemd on Linux boot ?

1) Enabling rc.local shell script in systemd at boot of Linux system
Compatibility with /etc/rc.local is achieved through systemd using a special service called rc-local.service.

2) This module is automatically called in multi-user.target by systemd-rc-local-generator if /etc/rc.local is executable.

3) Executing rc.local shell script at boot time using systemd
Naturally, create or update / edit a file called /etc/rc.local using your favorite text editor.

I'm going to use the vim command:

$ sudo vim /etc/rc.local
## RHEL/CentOS/Fedora Linux ΠΎΡ‚Ρ€Π΅Π΄Π°ΠΊΡ‚ΠΈΡ€ΡƒΠΉΡ‚Π΅ Ρ„Π°ΠΉΠ» /etc/rc.d/rc.local ##
$ sudo vim /etc/rc.d/rc.local

Add the required commands or call the script.
Here is my file:
#!/bin/sh
# add your commands
# call your scripts here

# let us set stuff for my wifi
/sbin/iw phy0 wowlan enable magic-packet disconnect

# last line must be exit 0
exit 0
Save and close the file when using vim.

🐧 How to save a file in Vi / Vim and exit

Make sure you set the executable permissions for the file with the chmod command:

$ sudo chmod -v +x /etc/rc.local

Setting up rc-local.service on Linux when systemd starts
All we need to do is enter the following systemctl command:

$ sudo systemctl enable rc-local.service

4) Reboot Linux:
$ sudo reboot
Check the status after reboot:
$ sudo systemctl status rc-local.service

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Enjoy Support & Share β€οΈπŸ‘πŸ»

T.me/UndercodeTesting
Forwarded from UNDERCODE NEWS
TVer introduces new promotional products and promotes connected TV ad creation.
#Technologies
Forwarded from UNDERCODE NEWS
Without asking, Microsoft began upgrading Windows 10.
#Updates
Forwarded from UNDERCODE NEWS
AI removes mosaics, and the open source GitHub project is up, gaining almost 7,000 stars in three days..Is the mosaic safe?
#Analytiques #Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Detect and remove malicious code from your phone or PC:

A) What is malware?

Malware is a catch-all term for any and every destructive / parasitic software specifically designed to harm your server, computer, network, or your phone. He is called by different names, but they all have the same intention.
There is Ransomware, which is literally software designed to steal your information and demand a ransom.
GonnaCry - Linux ransomware that encrypts all user files
With threats to reveal some data and secrets, the victim has no choice but to pay a ransom.

B) In addition, there is Spyware, which is similar to Agent 007, which is malicious software designed to collect and steal information from its victims.

There are other variations:


Logic bomb
Computer worms
Trojan horse
Rootkit
Virus

Malicious programs on your phone
Most people doubt that mobile devices can get infected with malware.

C) It's true?

This is 101% possible, well, maybe not in the standard traditional method, for iPhone and Apple devices.

But, technically, the same process applies.
Let's look at the problem more specifically.
Once the malware connects to your phone, it performs several operations.
Competing with your phone's resources and destroying many programs.

D) The classic signs of malware on your phone are:

Apps take longer to load
Your battery is draining faster than usual
Apps you haven't downloaded appear as available
How do I know if my phone is infected with a virus?
There are two ways to detect and remove malware from your phone.

Manual way
Automatic way
Manual method on Android phone
Step one: turn off your phone
The moment you spot the classic signs of malware infiltration, the first thing you do, if you can't pinpoint where you entered, is to turn off your phone.

E) Turning off your phone will stop further damage and the spread of malicious software to other programs.

This is the safest first option.

Step two: activate safe mode
Activating Safe Mode on your Android device is as easy as

Hold the power button for a few seconds.

Then, while your phone is on, hold the power off button.

Click on the reboot option; Most Android phones have this option.

Then click "Restart in Safe Mode".

For devices that do not have this option, turn off the phone by long pressing the power button.

Then press and hold the volume down button, wait until the device turns on.

The Safe Mode option will appear at the bottom left corner of your phone.

Step three, part A: phone settings
Some malware is so smart and cunning that when it invades your phone, it finds a way to protect itself.

F) They go to Phone Admins settings and then change the configuration.

This way, you can try whatever you want, but you cannot remove them.

G) To fix this, do this;

Go to the settings menu of your phone.
Go to security options.
Find the Device Administrator icon, disable malware access, and change the settings.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Secure, low power, Renesas Arm Cortex-M33 microcontroller.
#Technologies
Forwarded from UNDERCODE NEWS
The IPTV world is in danger
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Best 2020 Auto bots for wordpress/jomla hacking and indexing :

vulnx πŸ•· is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { wordpress , joomla , drupal , prestashop .. }

GOOD F E A T U R E S :

Detects cms (wordpress, joomla, prestashop, drupal, opencart, magento, lokomedia)
Target informations gatherings
Target Subdomains gathering
Multi-threading on demand
Checks for vulnerabilities
Auto shell injector
Exploit dork searcher
Ports Scan High Level
Dns-Servers Dump
Input multiple target to scan.
Dorks Listing by Name& by ExploitName.
Export multiple target from Dorks into a logfile

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

A simple usage :

1) $ git clone https://github.com/anouarbensaad/VulnX.git

2) $ cd VulnX

3) $ docker build -t vulnx ./docker/

4) $ docker run -it --name vulnx vulnx:latest -u http://example.com

MORE USAGE :

usage: vulnx [options]

-u --url url target
-D --dorks search webs with dorks
-o --output specify output directory
-t --timeout http requests timeout
-c --cms-info search cms info[themes,plugins,user,version..]
-e --exploit searching vulnerability & run exploits
-w --web-info web informations gathering
-d --domain-info subdomains informations gathering
-l, --dork-list list names of dorks exploits
-n, --number-page number page of search engine(Google)
-p, --ports ports to scan
-i, --input specify domains to scan from an input file
--threads number of threads
--dns dns informations gathering

πŸ¦‘ Install vulnx on Termux:
$ pkg update
$ pkg install -y git
$ git clone http://github.com/anouarbensaad/vulnx
$ cd vulnx
$ chmod +x install.sh
$ ./install.sh

Any doubt feel free to ask @Undercode_Testing
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Today's prediction for Facebook! big things on facebook or forced to "split"
#international #Analytiques
Forwarded from UNDERCODE NEWS
Lan ATM Service Expose a critical vulnerability could allow an attacker to control over the system.
#Vulnerabilities
Forwarded from UNDERCODE NEWS
Semi-closed β€œJabra Elite 85t” wireless earphones that can be worn easily even during long web conferences.
#Technologies