Forwarded from UNDERCODE NEWS
What about live tracking ? The effect of the latest corona from space, the βsatellite dataβ that everyone can use
#Updates
#Updates
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BEST WAYS FOR ROOTING ANDROID :
1) Magisk Root
Magisk can root many Android devices along with standard common patches. It packs with a super powerful Universal Systemless Interface, allowing immense potention.
Framaroot
Many devices can be rooted using this application. Check your device for compatibility.
2) Towelroot
Created by XDA Recognized Developer geohot, Towelroot is another root exploit app that is compatible with a large range of devices. The root exploit itself is built around Linux kernel CVE-2014-3153 discovered by hacker Pinkie Pie, and it involves an issue in the Futex subsystem that in turn allows for privilege escalation. Although specifically designed for certain variants of the Galaxy S5, it is compatible with the majority of devices running unpatched kernels.
3) CF-Auto-Root
Created by XDA Senior Recognized Developer Chainfire, CF-Auto-Root is a root for βrooting beginnersβ and those who want to keep as close to stock as possible. CF-Root is meant to be used in combination with stock Samsung firmwares as well as Nexus devices, and be the quickest and easiest way for your first root. In essence, it does nothing but install and enable SuperSU on your system, so apps can gain root access.
4) KingRoot
KingRoot is root for people who just want to have root access to their devices, and not necessarily wanting to flash anything extra. It works on almost all devices from Android version 2.x to 5.0. Working of KingRoot is based on system exploit. The most suitable root strategy will be deployed from cloud to your device according to the ROM information on the device. The best part of using this root method is that it does not trip KNOX and have the ability to close Sony_RIC perfectly.
a
recommended by xda foru
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦BEST WAYS FOR ROOTING ANDROID :
1) Magisk Root
Magisk can root many Android devices along with standard common patches. It packs with a super powerful Universal Systemless Interface, allowing immense potention.
Framaroot
Many devices can be rooted using this application. Check your device for compatibility.
2) Towelroot
Created by XDA Recognized Developer geohot, Towelroot is another root exploit app that is compatible with a large range of devices. The root exploit itself is built around Linux kernel CVE-2014-3153 discovered by hacker Pinkie Pie, and it involves an issue in the Futex subsystem that in turn allows for privilege escalation. Although specifically designed for certain variants of the Galaxy S5, it is compatible with the majority of devices running unpatched kernels.
3) CF-Auto-Root
Created by XDA Senior Recognized Developer Chainfire, CF-Auto-Root is a root for βrooting beginnersβ and those who want to keep as close to stock as possible. CF-Root is meant to be used in combination with stock Samsung firmwares as well as Nexus devices, and be the quickest and easiest way for your first root. In essence, it does nothing but install and enable SuperSU on your system, so apps can gain root access.
4) KingRoot
KingRoot is root for people who just want to have root access to their devices, and not necessarily wanting to flash anything extra. It works on almost all devices from Android version 2.x to 5.0. Working of KingRoot is based on system exploit. The most suitable root strategy will be deployed from cloud to your device according to the ROM information on the device. The best part of using this root method is that it does not trip KNOX and have the ability to close Sony_RIC perfectly.
a
recommended by xda foru
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
Follow in the footsteps of Musk? Oracle is moving its headquarters to Texas from California.
#international
#international
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦A simple instagram pentesting tool:
open terminal and type :
1) $ apt-get update -y
2) $ apt-get upgrade -y
3) $ pkg install python -y
4) $ pkg install python2 -y
5) $ pkg install git -y
6) $ pip install lolcat
7) $ git clone https://github.com/evildevill/instahack
8) $ ls
9) $ cd instahack
10) $ ls
11) $ bash setup
12) $ bash instahack.sh
Now you need internet connection to continue further process...
You can select any option by clicking on your keyboard
Note:- Don't delete any of the scripts included in core files
Open new session and start TOR (tor) before starting the attack
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦A simple instagram pentesting tool:
open terminal and type :
1) $ apt-get update -y
2) $ apt-get upgrade -y
3) $ pkg install python -y
4) $ pkg install python2 -y
5) $ pkg install git -y
6) $ pip install lolcat
7) $ git clone https://github.com/evildevill/instahack
8) $ ls
9) $ cd instahack
10) $ ls
11) $ bash setup
12) $ bash instahack.sh
Now you need internet connection to continue further process...
You can select any option by clicking on your keyboard
Note:- Don't delete any of the scripts included in core files
Open new session and start TOR (tor) before starting the attack
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - evildevill/instahack: instahack is a bash & python based script which is officially made to test password strength ofβ¦
instahack is a bash & python based script which is officially made to test password strength of Instagram account from termux and kali with bruteforce attack and. it based on tor This tool...
Forwarded from UNDERCODE NEWS
Adobe should be updated now! Acrobat and Reader information disclosure vulnerability.
#Vulnerabilities
#Vulnerabilities
Forwarded from UNDERCODE NEWS
Isnβt the iPhone 12 as amazing as Nokia was seven years ago? These sorts of feedback should be saved!
#Analytiques
#Analytiques
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Android Backup Software/RECOMMENDED FOR WINDOWS:
https://download.wondershare.com/drfone_backup_full3369.exe?_ga=2.28857534.309486003.1607770579-871126172.1605370455
http://www.mobiledit.com/mobiledit.htm
http://www.mobisynapse.com/
https://drfone.wondershare.com/backup/android-backup-to-pc.html
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Android Backup Software/RECOMMENDED FOR WINDOWS:
https://download.wondershare.com/drfone_backup_full3369.exe?_ga=2.28857534.309486003.1607770579-871126172.1605370455
http://www.mobiledit.com/mobiledit.htm
http://www.mobisynapse.com/
https://drfone.wondershare.com/backup/android-backup-to-pc.html
β β β Uππ»βΊπ«Δπ¬πβ β β β
MOBILedit
MOBILedit β MOBILedit
Overview of MOBILedi product features and functions for this phone content and data management tool.
Forwarded from UNDERCODE NEWS
Moscow apartments and yachts were seized by a colonel of the Ministry of Internal Affairs, detained in the case of T-Platforms.
#international
#international
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π§ How to run Fish Shell in private mode on Linux ??
1) Launching Fish Shell in Private Mode on Linux
Since version 3.0, the fish shell comes with the βprivate flag, which can be used to launch the Fish shell in private or incognito mode.
2) To enable incognito mode in this shell, simply start it with the βprivate flag, as shown below:
$ fish --private
3) display :
Welcome to fish, the friendly interactive shell
Type
fish is running in private mode, history will not be persisted.
You are now in a private fish shell session!
4) In private mode, the old history is not available and any interactive commands you execute will not be added to the global history file, making it useful both for preventing inadvertent leakage of personal information (for example for screencasts) and when dealing with sensitive information to prevent it saved to disk.
5) Note that the Fish shell does not add whitespace commands to its history file by default.
The βprivate flag makes this work even easier.
6) The system will not record command history while the user remains in private mode.
To return to normal mode, type exit and start fish shell again without the βprivate flag.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π§ How to run Fish Shell in private mode on Linux ??
1) Launching Fish Shell in Private Mode on Linux
Since version 3.0, the fish shell comes with the βprivate flag, which can be used to launch the Fish shell in private or incognito mode.
2) To enable incognito mode in this shell, simply start it with the βprivate flag, as shown below:
$ fish --private
3) display :
Welcome to fish, the friendly interactive shell
Type
help for instructions on how to use fish.fish is running in private mode, history will not be persisted.
You are now in a private fish shell session!
4) In private mode, the old history is not available and any interactive commands you execute will not be added to the global history file, making it useful both for preventing inadvertent leakage of personal information (for example for screencasts) and when dealing with sensitive information to prevent it saved to disk.
5) Note that the Fish shell does not add whitespace commands to its history file by default.
The βprivate flag makes this work even easier.
6) The system will not record command history while the user remains in private mode.
To return to normal mode, type exit and start fish shell again without the βprivate flag.
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS
McAfee VirusScan Patch 16 has a security vulnerability, preventing hackers to bypass their restriction.
#Vulnerabilities
#Vulnerabilities
π¦BASIC :
Shell history file
1) Every Unix shell has the ability to log all the commands you run in your Terminal.
2) Depending on the shell used, the commands are stored in a text file elsewhere.
3) In the Bash shell, all commands are written to ~ / .bash_history by default.
4) In the Fish shell, the command records are stored in the ~ / .local / share / fish / fish_history file.
5) In the Zsh shell, commands are saved in ~ / .zsh_history or any other user-configured file.
6) Now the question is, what if you don't want to record command history at all?
7) Perhaps you are using a shared system and do not want to save the commands you run in the history file.
8) If you've ever wanted to stop logging commands in the history file, we'll show you how you can do this one
β β β Uππ»βΊπ«Δπ¬πβ β β β
Shell history file
1) Every Unix shell has the ability to log all the commands you run in your Terminal.
2) Depending on the shell used, the commands are stored in a text file elsewhere.
3) In the Bash shell, all commands are written to ~ / .bash_history by default.
4) In the Fish shell, the command records are stored in the ~ / .local / share / fish / fish_history file.
5) In the Zsh shell, commands are saved in ~ / .zsh_history or any other user-configured file.
6) Now the question is, what if you don't want to record command history at all?
7) Perhaps you are using a shared system and do not want to save the commands you run in the history file.
8) If you've ever wanted to stop logging commands in the history file, we'll show you how you can do this one
β β β Uππ»βΊπ«Δπ¬πβ β β β
Telegram
UNDERCODE TESTING
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦π§ How to run Fish Shell in private mode on Linux ??
1) Launching Fish Shell in Private Mode on Linux
Since version 3.0, the fish shell comes with the βprivate flag, which can be used to launch the Fish shell in private or incognitoβ¦
π¦π§ How to run Fish Shell in private mode on Linux ??
1) Launching Fish Shell in Private Mode on Linux
Since version 3.0, the fish shell comes with the βprivate flag, which can be used to launch the Fish shell in private or incognitoβ¦
Forwarded from UNDERCODE NEWS
Recruitment shows that Teslaβs autopilot test is extended to Phoenix, USA
#Technologies #international
#Technologies #international
Forwarded from UNDERCODE NEWS