UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
Microsoft can bring to Windows 10 an essential and expected function that should already be present.
#Updates
Forwarded from UNDERCODE NEWS
A group of anonymous hackers arrested after stealing more than 20 million from bank cards of Russians.
#CyberAttacks
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸŒ Best JavaScript frameworks / libraries for front-end development


1) React
React is not really a framework, but rather a JavaScript library for building user interfaces.

It is open source and maintained by Facebook and the individual developer community.

Some of its features include the following:

Provides reactive, customizable and reusable components
Uses virtual DOM
Very fast
Component based
One-way data binding
Reusable code
Behind it is a vibrant and thriving ecosystem.
Convenient state management
Installation and use

πŸ¦‘React can be used in two different ways:

Through CDN
Using Node.JS
Through CDN
You can refer to their official website for a script link that you can include in the title tag in your HTML markup.

Choose links based on your purpose.

For example, when used in a development environment:

<script crossorigin src="https://unpkg.com/react@16/umd/react.development.js"></script>
<script crossorigin src="https://unpkg.com/react-dom@16/umd/react-dom.development.js"></script>
And for production:

<script crossorigin src="https://unpkg.com/react@16/umd/react.production.min.js"></script>
<script crossorigin src="https://unpkg.com/react-dom@16/umd/react-dom.production.min.js"></script>


2) Using Node.JS
I am assuming you have NodeJS installed already.
To install React, just enter the following command.
sudo npm i -g create-react-app --save-dev

After the installation is complete, enter the following command
create-react-app my-first-react-application

The above command will install all the prerequisite libraries required for React to work properly, including the development server, webpack, and babel.

Go to your application folder my-first-response-application and run the following command

npm start

The above command will start the development server on port 3000.
And, when you access the IP address of your server on port 3000, you should have a welcome page

3) Vue.js


Vue.js is a progressive JavaScript framework for building interactive user interfaces and single page applications.

This is a presentation-oriented framework with a core library.

Vue is popular because it supports single page apps.

Unlike React, Vue uses raw HTML, not JSX.

Vue.js is open source and was originally created by Evan Yu and released publicly in February 2014.

Below are some of the features.

It provides reactive and composite view components.
Uses virtual DOM
Focuses on the core library (e.g. routing and state management)
CSS Scope Handled Without CSS-In-J
One-way binding inside components.
Support for major add-ons
Reusable code

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
ABEMA develops new paid service, rental service with pay-as-you-go.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

BASIC LINUX:

1) Linux is just the core
All Linux distributions include GUI system, GNU utilities, installation and management tools, GNU c/c++ compiler, editor (vi), and various applications such as OpenOffice, Firefox.

2) The UNIX operating system is considered a complete OS, because everything comes from one vendor.

3) Security and firewall
Linux comes with open source firewall tools based on Netfilter and IPTables, which can protect your servers and desktops from hackers and hackers. The UNIX operating system comes with its own firewall product.

4) Backup and restore
UNIX and Linux have their own set of tools for backing up data to tape and other backup media. However, Linux and UNIX share some common tools, such as tar, dump/restore, and cpio.

5) What is the core of the Linux operating system?
Answer: The kernel is the core of the Linux operating system.

6) What is the Linux kernel?
Answer: The kernel is the heart of the operating system. It acts as a bridge between software and hardware. If the software requests the hardware, the kernel will pass data between the software and the hardware. For example, if you want to play a song, you should start the default player, it will ask the kernel to play a song, and now the kernel will contact the hardware for permission or for hardware components, just like you plug in any headset. Device. Most Android phones use the Linux kernel.

Yes, the kernel can be edited because it is released under the General Public License.

7) What is BASH?
Answer: Bash is a Unix shell and command processor written by Brian Fox for the GNU project. It is free software and can replace Bourne Shell. This is an interpreted, uncompiled process that can also be run in a terminal window. This allows users to write commands and cause actions. Bash can read commands from Shell scripts.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Vodafone Internet Unlimited with unlimited promo calls without restrictions.
#Updates
Forwarded from UNDERCODE NEWS
Nokia announces its India laptop Purebook X14, here are the details.
#Technologies
Forwarded from UNDERCODE NEWS
Tim brings you some Super Deals for Google Nest Mini.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How many types of shells are there in Linux?

They are the five Shells in Linux:

1) C Shell (csh): Similar to C grammar, and provides spell checking and job control.
Korn Shell (ksh): is a high-level programming language Shell.

2) Z Shell (Zsh): It provides some unique properties, such as observing login/logout monitoring, file name generation, startup file, and end comment.

3) Bourne Again Shell (bash): This is the default setting of the Linux distribution.

4) Friendly interactive Shell (Fish): It provides web-based configuration, automatic suggestions, etc.

#FastTips
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

What are the basic components of Linux?

1) Kernel: It is the core component of Linux, which acts as an interface between software and hardware.

2) Shell: It acts as an interface between the user and the kernel.

3) GUI: It stands for Graphical User Interface, which is another way for users to interact with the system. But this is different from images, buttons, and text boxes for interaction.

4) System Utilities: These are software functions that allow users to manage the computer.

5) Application: A set of functions designed to perform a set of tasks.

#FastTips
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
https://github.com/Awan check the contributions, I think I'm gonna get award of the year 2020 for most commits/contributions I have made πŸ˜‰


Recommended repo by a friend
Forwarded from UNDERCODE NEWS
New critical vulnerability in Eclipse, an attacker to gain full access to the victim's workspace.
#Vulnerabilities
Enjoy Support & Share β€οΈπŸ‘πŸ»

T.me/UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Updated free Backtest trading strategies in Python:

Sub-modules
backtesting.backtesting
Core framework data structures. Objects from this module can also be imported from the top-level module directly, e.g …

backtesting.lib
Collection of common building blocks, helper auxiliary functions and composable strategy classes for reuse …

backtesting.test
Data and utilities for testing.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) download https://github.com/kernc/backtesting.py.git

2) $ pip install backtesting
Usage
from backtesting import Backtest, Strategy
from backtesting.lib import crossover

from backtesting.test import SMA, GOOG


class SmaCross(Strategy):
def init(self):
price = self.data.Close
self.ma1 = self.I(SMA, price, 10)
self.ma2 = self.I(SMA, price, 20)

def next(self):
if crossover(self.ma1, self.ma2):
self.buy()
elif crossover(self.ma2, self.ma1):
self.sell()


bt = Backtest(GOOG, SmaCross, commission=.002,
exclusive_orders=True)
stats = bt.run()
bt.plot()

πŸ¦‘STILL NOT GETTING ??

Checkout : https://kernc.github.io/backtesting.py/doc/backtesting/#manuals

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
The EU requires authority to levy penalties of billions on tech giants.
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Explain the process management system calls in Linux?


1) fork (): used to create a new process.

2) exec(): execute a new process.

3) wait(): Wait until the process is executed.

4) exit(): Exit the process.

Β» System call to get the process ID:

1) getpid(): Find the unique process ID.

2) getppid(): Find the unique parent process ID.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Hakuhodo DYMP offers streamlined dashboards for unified TV management and digital advertising efficiency.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘CREATE YOUR OWN LINUX RANSOMWARE WITH ANY OS :

F E A T U R E S :

encrypts all user files with AES-256-CBC.
Random AES key and IV for each file.
Works even without internet connection.
Communication with the server to decrypt Client-private-key.
encrypts AES key with client-public-key RSA-2048.
encrypts client-private-key with RSA-2048 server-public-key.
Changes computer wallpaper -> Gnome, LXDE, KDE, XFCE.
Decryptor that communicate to server to send keys.
python webserver
Daemon
Dropper
Kills databases
About
A Linux Ransomware

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

open terminal and type :

1) download https://github.com/tarcisio-marinho/GonnaCry/tree/master/src

GonnaCry requires the pycrypto library and requests, installation below

~$ sudo pip install -r requeriments.txt

2) Compiling the code
~$ pyinstaller -F --clean main.py -n gonnacry

3) ~$ pyinstaller -F --clean decryptor.py -n decryptor

4) RUN AS PYTHON :

main.py GonnaCry start file
daemon.py dropped by main.py and run
dropper.py drop the malware on the computer
decryptor.py communicate with the server, decrypt keys and files
symmetric.py AES encryption
asymmetric.py RSA encryption
generate_keys.py Generate random AES keys
persistence.py Persistence routines for linux OS
get_files.py Find files to be encrypted
environment.py environment variables
variables.py Images and malware binaries
utils.py Utilities routines

Enjoy
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
The high-tech unemployed? The opportunity to educate non-technological employees under the shadow of the crown.
#international