UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.7K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
Apple loses the Corellium violation lawsuit, "Virtual iPhone" does not infringe.
#International
Forwarded from UNDERCODE NEWS
It would be necessary for Russians to prevent the authorities from dealing on their data.
#International
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Important utilities for any ruby coder:

cane(https://github.com/square/cane) > Code quality threshold checking as part of your build.

> Fasterer(https://github.com/DamirSvrtan/fasterer) > Common Ruby idioms checker.

> flay(https://ruby.sadi.st/Flay.html) > Flay analyzes code for structural similarities.

> flog(https://ruby.sadi.st/Flog.html) > Flog reports the most tortured code in an easy to read pain report. The higher the score, the more pain the code is in.

> laser(https://github.com/michaeledgar/laser) :warning: > Static analysis and style linter for Ruby code.

> pelusa(https://github.com/codegram/pelusa) > Static analysis Lint>type tool to improve your OO Ruby code.

> Querly(https://github.com/soutaro/querly) > Pattern Based Checking Tool for Ruby.

|> Railroader(https://railroader.org) > An open source static analysis security vulnerability scanner for Ruby on Rails applications.

> rails_best_practices(https://rails>bestpractices.com) > A code metric tool for Rails projects

> reek(https://github.com/troessner/reek) > Code smell detector for Ruby.

> RuboCop(https://docs.rubocop.org/rubocop) > A Ruby static code analyzer, based on the community Ruby style guide.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from DailyCVE
πŸ”΅1E Client is an endpoint control platform:

https://dailycve.com/node/9
Forwarded from UNDERCODE NEWS
More than 40,000 games have been deleted from China's Apple App Store today.
#Ban
Forwarded from UNDERCODE NEWS
Bitcoin is nearing the $30,000 level, and in one year it has skyrocketed 3 times. What's about 2021 ?
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Malicious traffic detection system :

Server's primary role is to store the event details and provide back-end support for the reporting web application. In default configuration, server and sensor will run on the same machine. So, to prevent potential disruptions in sensor activities, the front-end reporting part is based on the "Fat client" architecture (i.e. all data post-processing is being done inside the client's web browser instance). Events (i.e. log entries) for the chosen (24h) period are transferred to the Client, where the reporting web application is solely responsible for the presentation part. Data is sent toward the client in compressed chunks, where they are processed sequentially. The final report is created in a highly condensed form, practically allowing presentation of virtually unlimited number of events.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

For Debian/Ubuntu

1) sudo apt-get install git python-pcapy

2) git clone --depth 1 https://github.com/stamparm/maltrail.git

3) cd maltrail

4) sudo python sensor.py

5) To start the (optional) Server on same machine, open a new terminal and execute the following:

[[ -d maltrail ]] || git clone --depth 1 https://github.com/stamparm/maltrail.git

cd maltrail
python server.py
Server

6) To test that everything is up and running execute the following:

ping -c 1 136.161.101.53
cat /var/log/maltrail/$(date +"%Y-%m-%d").log
Test

7) Also, to test the capturing of DNS traffic you can try the following:

nslookup morphed.ru

8) cat /var/log/maltrail/$(date +"%Y-%m-%d").log
Test2

9) To stop Sensor and Server instances (if running in background) execute the following:

sudo pkill -f sensor.py

pkill -f server.py

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
if you interested this channel only for links & Updates:

T.me/UndercodeUpdates

@UndercodeChat (for Chats & Discussion)
Forwarded from DailyCVE
πŸ”΅Authentication bypass vulnerability in the SolarWinds Orion API:

https://dailycve.com/node/10
Forwarded from UNDERCODE NEWS
A new financial industry malware, produced in the AutoHotkey language.
#Malwares
Forwarded from UNDERCODE NEWS
The software and innovations that will run our lives until 2030 are intelligent, helpful and disturbing.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Ctf, Kali unofficial tools& more , all in one :

[Exploitation Tools](2. Exploitation Tools/)
[Forensics Tools](3. Forensics Tools/)
[Hardware Hacking](4. Hardware Hacking/)
[Information Gathering](5. Information Gathering/)
[Maintaining Access](6. Maintaining Access/)
[Password Attacks](7. Password Attacks/)
[Reporting Tools](8. Reporting Tools/)
[Reverse Engineering](9. Reverse Engineering/)
[Sniffing & Spoofing](10. Sniffing & Spoofing/)
[Stress Testing](11. Stress Testing/)
[Web Applications](12. Web Applications/)
[Wireless Attacks](13. Wireless Attacks/)
[Useful Github Repositories](14. Useful Github Repositories/)
[Miscellaneous](15. Conclusion/)

download:
https://github.com/hhhrrrttt222111/Ethical-Hacking-Tools

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Robot iCub: the android that will help autistic children.
#Technologies
Forwarded from UNDERCODE NEWS
The big edition in 2021 is welcomed by Microsoft browser: a first look at the latest features of Edge.
#Updates
Forwarded from DailyCVE
πŸ”΅Veritas Backup Exec provided by Veritas:

https://dailycve.com/node/11
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

DUMP INFO FROM ANYWHERE ! #Utilities :
admsnmp 0.1 ADM SNMP audit scanner.

aesfix 1.0.1 A tool to find AES key in RAM http://citp.princeton.edu/memory/code/

aeskeyfind 1.0 A tool to find AES key in RAM http://citp.princeton.edu/memory/code/

aespipe 2.4c Reads data from stdin and outputs encrypted or decrypted results to stdout. http://loop-aes.sourceforge.net/aespipe/

afflib 3.7.3 An extensible open format for the storage of disk images and related forensic information. http://www.afflib.org
afpfs-ng 0.8.1 A client for the Apple Filing Protocol (AFP) http://alexthepuffin.googlepages.com/

against 0.2 A very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible targets and a multithreaded brute-forcing module which
attacks parallel all discovered hosts or given ip addresses from a list. http://nullsecurity.net/tools/cracker.html

aiengine 339.58dfb85 A packet inspection engine with capabilities of learning without any human intervention. https://bitbucket.org/camp0/aiengine/

aimage 3.2.5 A program to create aff-images. http://www.afflib.org
air 2.0.0 A GUI front-end to dd/dc3dd designed for easily creating forensic images. http://air-imager.sourceforge.net/

airflood 0.1 A modification of aireplay that allows for a DOS in in the AP. This program fills the table of clients of the AP with random MACs doing impossible new connections. http://packetstormsecurity.com/files/51127/airflood.1.tar.gz.html

airgraph-ng 2371 Graphing tool for the aircrack suite http://www.aircrack-ng.org

airoscript 45.0a122ee A script to simplify the use of aircrack-ng tools. http://midnightresearch.com/projects/wicrawl/
airpwn 1.4 A tool for generic packet injection on an 802.11
network. http://airpwn.sourceforge.net

allthevhosts 1.0 A vhost discovery tool that scrapes various web applications http://labs.portcullis.co.uk/tools/finding-all-the-vhosts/

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Happy New Year !!!
Forwarded from UNDERCODE NEWS
The content is revealed by the AMD Zen3 thread tearer: 16 core return, messy name
#Technologies
Forwarded from UNDERCODE NEWS
TSMC will release more capacity to PS5.
#Technologies
Forwarded from DailyCVE
πŸ”΅Vega: Cross-site scripting

https://dailycve.com/node/12