UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.7K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Best 2020 Auto bots for wordpress/jomla hacking and indexing :

vulnx πŸ•· is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { wordpress , joomla , drupal , prestashop .. }

GOOD F E A T U R E S :

Detects cms (wordpress, joomla, prestashop, drupal, opencart, magento, lokomedia)
Target informations gatherings
Target Subdomains gathering
Multi-threading on demand
Checks for vulnerabilities
Auto shell injector
Exploit dork searcher
Ports Scan High Level
Dns-Servers Dump
Input multiple target to scan.
Dorks Listing by Name& by ExploitName.
Export multiple target from Dorks into a logfile

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

A simple usage :

1) $ git clone https://github.com/anouarbensaad/VulnX.git

2) $ cd VulnX

3) $ docker build -t vulnx ./docker/

4) $ docker run -it --name vulnx vulnx:latest -u http://example.com

MORE USAGE :

usage: vulnx [options]

-u --url url target
-D --dorks search webs with dorks
-o --output specify output directory
-t --timeout http requests timeout
-c --cms-info search cms info[themes,plugins,user,version..]
-e --exploit searching vulnerability & run exploits
-w --web-info web informations gathering
-d --domain-info subdomains informations gathering
-l, --dork-list list names of dorks exploits
-n, --number-page number page of search engine(Google)
-p, --ports ports to scan
-i, --input specify domains to scan from an input file
--threads number of threads
--dns dns informations gathering

πŸ¦‘ Install vulnx on Termux:
$ pkg update
$ pkg install -y git
$ git clone http://github.com/anouarbensaad/vulnx
$ cd vulnx
$ chmod +x install.sh
$ ./install.sh

Any doubt feel free to ask @Undercode_Testing
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Today's prediction for Facebook! big things on facebook or forced to "split"
#international #Analytiques
Forwarded from UNDERCODE NEWS
Lan ATM Service Expose a critical vulnerability could allow an attacker to control over the system.
#Vulnerabilities
Forwarded from UNDERCODE NEWS
Semi-closed β€œJabra Elite 85t” wireless earphones that can be worn easily even during long web conferences.
#Technologies
Forwarded from UNDERCODE NEWS
Managing Director Mizuno Fujitsu’s β€œCommunications business is not a hardware business”
#international
Forwarded from UNDERCODE NEWS
local government management domain of the japanese municipalities injected with adult posts.
#international
Forwarded from UNDERCODE NEWS
Lastest reports 100 corona tracking apps, 40% exposed sensitive information.
#DataBreaches
Forwarded from UNDERCODE NEWS
Fujitsu releases a free programming learning experience to Deaf schools nationwide.
#Updates
Forwarded from UNDERCODE NEWS
A new vulnerability in Google TensorFlow could allow denial of service by attackers.
#Vulnerabilities
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Eight basic principles to stay away from viruses :


1. Establish good security habits. For example: Do not open some unknown emails and attachments, do not go to some unknown websites, do not execute software downloaded from the Internet without anti-virus processing, etc. These necessary habits will make you The computer is more secure.

2. Turn off or delete unnecessary services in the system . By default, many operating systems will install some auxiliary services, such as FTP client, Telnet, and Web server. These services provide convenience for attackers, but are not of much use to users. If they are deleted, the possibility of being attacked can be greatly reduced.

3. Update security patches frequently. According to statistics, 80% of network viruses spread through system security vulnerabilities , such as Worm King, Shockwave, Sasser, etc., so we should regularly download the latest security patches from the Microsoft website to prevent Before it happens. γ€€γ€€

4. Using complex passwords Many network viruses attack the system by guessing simple passwords. Therefore, using complex passwords will greatly improve the safety of the computer.

5. Quickly isolate the infected computer. When your computer finds a virus or abnormality, you should immediately disconnect it to prevent the computer from being infected more or becoming a source of transmission and infecting other computers again.

6. Know some virus knowledge so that you can discover new viruses in time and take corresponding measures to protect your computer from virus damage at critical moments. If you can understand some registry knowledge, you can regularly check whether there are suspicious key values ​​in the registry's self-starting items; if you understand some memory knowledge, you can often check whether there are suspicious programs in the memory.

7. It is best to install professional anti-virus software for comprehensive monitoring. With the increasing number of viruses today, using anti-virus software for anti-virus is an increasingly economical choice. However, after installing anti-virus software, users should frequently upgrade and modify some The main monitoring is often opened (such as mail monitoring), memory monitoring, etc., and problems should be reported, so as to truly protect the security of the computer.

8. Users should also install personal firewall software to prevent hacking. Due to the development of the Internet, hacker attacks on users’ computers are becoming more and more serious. Many network viruses use hacker methods to attack users’ computers. Therefore, users should also install Personal firewall software, set the security level to medium or high, so as to effectively prevent hacker attacks on the network.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁