UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
Infinite Labor Court staff: claim to buy shares from them in the sum of NIS 4.4 million.
#International
Forwarded from UNDERCODE NEWS
White House Digital Team Appointment Confirmed by President Joe Biden.
#International
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Allow Connection from Outside Local Network to your linux :

Setting up the MOSQUITTO MQTT Server in Ubuntu 18.04 is actually not hard, but the steps are important.

Step 1: Install Mosquitto Software

sudo apt-add-repository ppa:mosquitto-dev/mosquitto-ppa
sudo apt-get update
sudo apt-get install mosquitto

Step 2: Open Port 1883 and start firewall

sudo ufw allow 1883 
sudo ufw enable
Step 3: Verify Mosquitto is not already running

pgrep mosquitto
[Note, if any number shows, that is the PID of an already running Mosquitto. You can just kill it. Also, you can try: sudo service mosquitto stop]

Step 4: Start Mosquitto with verbose option

mosquitto -v
[Note: This starts Mosquitto without using any config file. It echos connection and status information to the screen. Easiest for quick debugging.]

Step 5: Check connectivity using local host

Go to your client machine (in my case a Windows 10 laptop) and run the MQTT client, connecting to the local address of the Linux Mosquitto server (in my case 192.168.0.144). You should be able to connect. In fact, you can do this step before you even open the firewall, since this is all on the local network, the firewall rules are irrelevant at this point. Until next step which is...

Step 6: Check Connectivity using web tool

use either: www.yougetsignal.com/tools/open-ports/ or https://canyouseeme.org/

[NOTE: You will not get an OPEN state UNLESS THE MOSQUITTO BROKER IS RUNNING]

Step 7: If Port Shows Closed When coming In from Internet (ie not localhost)

Here's where I got tripped up. In my case, I have a Verizon Modem that ALSO has a firewall (because it has a router). I have my own wireless router, a tp-link Archer C1200, that I have plugged into the Fios Modem/Router. I started by putting the port forwarding in the tp-link. But that firewall comes after the Fios firewall so I needed to go to the first wall and do the port forward there.

And this is the second thing that is tricky. All of the online how-to's said I should forward port 1883 to the local IP address of my Linux Server, which in my case was 192.168.0.144. But that was not correct in my case. The Archer C1200 was actually the device that I needed to forward to -- it handled the correct distribution from there. It had an address of 192.168.0.152 assigned to it from the Verizon router. I still have both forwardings in place (ie the Fios and the tp-link) and my guess is that I need them both.

Ref
: stackoverflow
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
information protection management system certification, reducing unnecessary procedures and strengthening the internal stability.
#Updates
Forwarded from UNDERCODE NEWS
What lesson has the iPhone learnt from losing it in the bath?
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Just a important tip:
Many programming languages ​​support string manipulation using regular expressions :

For example, a powerful regular expression engine is built in Perl. The concept of regular expressions was first popularized by tools in Unix (such as sed and grep). Regular expressions are usually abbreviated as "regex". The singular includes regexp and regex, and the plural includes regexps, regexes, and regexen.

πŸ„»πŸ„΄πŸ…ƒ'πŸ…‚ πŸ…‚πŸ…ƒπŸ„°πŸ…πŸ…ƒ :

Front-end development, will inevitably encounter label needs to match the needs of simple needs, not just two angle brackets wrap a label name Well, the next meal operation, /<[\w]+>.*<\/[\w]+>/gand perfectly matched <div>xx</div>and so on, the demand for complete ...

Etc., first glance, it does currently can match a variety of labels, but it also can match similar <div>xx</p>content. This means that we need to keep the content in the two angle brackets the same.

Regular grouping back-reference grouping ()

The so-called grouping is to put the content to be matched in brackets (). The content in parentheses can be regarded as a whole sub-expression


/<([\w]+)>.*<\/([\w]+)>/g
Back reference \N

Regular expressions also provide a mechanism for referencing previous matching groups. Sometimes, we may find a submatch, which will reappear next.

Β»
var reg = /<([\w]+)>.*<\/\1>/
reg.test('<div>xx</div>') // true
reg.test('<div>xx</p>') // false


▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
The Mandalorian is the most pirated program of this 2020.
#Leaks
Forwarded from UNDERCODE NEWS
All-resin batteries are used as "flying base stations" batteries,
#Technologies
Forwarded from UNDERCODE NEWS
News said Apple is developing or is designing a custom 64-core ARM chip.
#Technologies
Forwarded from UNDERCODE NEWS
How do scammers kill victims of pigs: get followers, get credit, lead, "kill pigs"
#CyberAttacks
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Manual Converting Video and Audio, using 'avconv'
#FastTips

# ffmpeg

#1 print supported codecs and formats
avconv -formats
avconv -codecs

#2 print the media file's information
avconv -i <media.file>

#3 converting videos
e.g. convert avi to mp4(x264):
avconv -i <media.file> -vcodec libx264 -acodec ac3 <output.file>
where 'vcodec' specifies the codec of video stream, 'acodec' specifies audio codec.

#4 convertion between video and image
avconv -i foo.avi -r 1 -s WxH -f image2 foo-%05d.png
-r 1 : 1 frame per sec.
WxH : e.g. 1920x1080

# resize a picture
avconv -i fox.jpg -s 64x64 fox_resized.jpg

ref: man avconv section << Video and Audio file format conversion >>
http://ffmpeg.org/ffmpeg.html#Video-and-Audio-file-format-conversion

avconv(1)

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Many PS game designers post their favorite screenshots of the game and their tales.
#Updates
Forwarded from UNDERCODE NEWS
Twitter CEO Square plans to buy Tidal Music Streaming Media.
#International
Forwarded from UNDERCODE NEWS
In Russia, the income of small app developers grew by 65%
#Updates
Forwarded from UNDERCODE NEWS
South Korean regulator speeds up analysis of Google's proposal to raise commissions.
#International
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘HIGH RATED HACKING TOOLS :

>>XSSFreak(https://github.com/PR0PH3CY33/XSSFreak)

>>XSpear(https://github.com/hahwul/XSpear)

>>XSSCon(https://github.com/menkrep1337/XSSCon)

>>XanXSS(https://github.com/Ekultek/XanXSS)

>>Advanced XSS Detection Suite(https://github.com/UltimateHackers/XSStrike)

>>RVuln(https://github.com/iinc0gnit0/RVuln)

>>Whitespace(https://github.com/beardog108/snow10)

SocialMedia Bruteforce

>>Instagram Attack(https://github.com/chinoogawa/instaBrute)

>>AllinOne SocialMedia Attack(https://github.com/Matrix07ksa/Brute_Force)

>>Facebook Attack(https://github.com/Matrix07ksa/Brute_Force)

>>Application Checker(https://github.com/jakutatech/underhanded)
Android Hacking tools

>>Keydroid(https://github.com/F4dl0/keydroid)

>>MySMS(https://github.com/papusingh2sms/mysms)

>>Lockphish (Grab target LOCK PIN)(https://github.com/JasonJerry/lockphish)

>>DroidCam (Capture Image)(https://github.com/kinghacker0/WishFish)

>>EvilApp (Hijack Session)(https://github.com/crypticterminal/EvilApp)

>>HatCloud(Bypass CloudFlare for IP)(https://github.com/HatBashBR/HatCloud)
IDN Homograph Attack

>>EvilURL(https://github.com/UndeadSec/EvilURL)
Email Verify tools

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
It's full of windows! Samsung needs to create a cell phone!
#Technologies
Forwarded from UNDERCODE NEWS
The power bank could also be eavesdropping on you in addition to implanting Trojans.
#CyberAttacks