UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.3K links
๐Ÿฆ‘ Undercode Cyber World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE

โœจ Web & Services:
โ†’ Undercode.help
Download Telegram
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ Passwords Attack The Popular tool Medusa :
> Medusa is a speedy, parallel, and modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application
instagram.com/UnderCodeTestingCompany

๐Ÿฆ‘Features :

1) Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently.

2) Flexible user input. Target information (host/user/password) can be specified in a variety of ways. For example, each item can be either a single entry or a file containing multiple entries. Additionally, a combination file format allows the user to refine their target listing.

3) Modular design. Each service module exists as an independent .mod file. This means that no modifications are necessary to the core application in order to extend the supported list of services for brute-forcing.

4) Multiple protocols supported. Many services are currently supported (e.g. SMB, HTTP, POP3, MS-SQL, SSHv2, among others).

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

> its preinstalled on kali os
Or
1) git clone https://github.com/jmk-foofus/medusa/blob/master

2) `cd' to the directory containing the package's source code and type
`./configure' to configure the package for your system.


3) using `csh' on an old version of System V, you might need to type
`sh ./configure' instead to prevent `csh' from trying to execute
`configure' itself.

4) Running `configure' takes a while. While running, it prints some
messages telling which features it is checking for.

5) Type `make' to compile the package.

6) Type `make install' to install the programs and any data files and
documentation.

7) You can remove the program binaries and object files from the
source code directory by typing `make clean'.

8) Note:
Some systems require unusual options for compilation or linking that
the `configure' script does not know about. You can give `configure'
initial values for variables by setting them in the environment. Using
a Bourne-compatible shell, you can do that on the command line like
this:

> CC=c89 CFLAGS=-O2 LIBS=-lposix ./configure

Or on systems that have the `env' program, you can do it like this:
env CPPFLAGS=-I/usr/local/include LDFLAGS=-s ./configure

๐Ÿฆ‘MacOs :

1) git clone https://github.com/jmk-foofus/medusa

2) cd medusa

3) macOS dependencies
brew install freerdp

> export FREERDP2_CFLAGS='-I/usr/local/include'

> export FREERDP2_LIBS='-I/usr/local/lib/freerdp'

4 )./configure

5) make

6 )./src/medusa

Wrtten by Steave
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ Crack hashes in seconds: Md5 Cracker 2019 :
t.me/UnderCodeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/s0md3v/Hash-Buster

2) cd Hash-Buster

3) Hash-Buster can be run directly from the python script but I highly suggest you to install it with

> make install

4) python hash.py/

5) buster -s <hash>

6) Finding hashes from a directory
just specify a directory and Hash Buster will go through all the files and directories present in it, looking for hashes.

> buster -d /root/Documents

7) Hash Buster can find your hashes even if they are stored in a file like this

๐Ÿฆ‘Tested On:

> Kali

> Debian

Written by ฬตอ‘Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘REcommended by UnderCode Hardwares for Cracking Hash
T.me/UnderCodeTestingOfficial

๐Ÿฆ‘Hardware

1) Geforce RTX 2080 Ti

> With over 758kH/s on HashCat, the Geforce RTX 2080 Ti is currently the best GPU for brute-forcing passwords.

> If you didn't decrypt your hash on MD5Online, you'll probably get it very fast with this monster

2) Raspberry Pi Zero

> The Raspberry Pi Zero is the perfect tool for pentesting. Mr Robot fan? Here is your new favorite device.

> You can install Kali Linux on it and enjoy all the included tools.

> This complete kit include anything you need.


@ ฬตอ‘Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Best 2019 Websites to Easily Help Decrypt MD5 Hashed Strings
instagram.com/UnderCodeTestingCompany

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

1) md5online.org

md5online.org contains 452 billion words in their database. Other than searching for the original word of the MD5 from the website, you can also request for a batch search which is limited to 100 lines and the results will be sent to the provided email address. They also provide a simple API for paid premium members where their service can be used to decrypt MD5 from a script, website or even application.


2) md5crack.com

Unlike most of the online websites that have their own database of MD5 and words, md5crack.com uses a combination of search engine indexes and rainbow tables to help search for a word matching the given MD5 hash. Free API usage without limitations is also available to everyone although the usage is closely monitored to prevent excessive use.

3) md5cracker.org

md5cracker.org shows that it automatically searches 11 different websites for a matching word of a provided MD5 hash. However after manually testing each database, we found that half of them donโ€™t work anymore. It is still useful because the results are shown in real time without the need to refresh the webpage.


4) md5decrypt.org

Similar to md5cracker.org above, md5decrypt.org claims to search your hash on over 23 other websites for a matching word. It is hard to tell whether md5decrypt.org did crawl over 23 website to search for a matching word because it does not list the other websites being used and the search is very quick, that always takes nearly the same amount of time to return a result.


5) crackstation.net

crackstation.net is a password hash cracker that can automatically recognize different types of hash functions other than MD5 and search for the correct password for the given hash. It is able to accept up to 10 hashes at a time and uses their own wordlist consisting of every word found in Wikipedia and every password list that they could find. Other than that, theyโ€™ve also made their wordlist more efficient by applying intelligent word mangling


6) hashkiller.co.uk

Hashkiller.co.uk has been around since 2007 and has decrypted over a whopping 43 billion MD5 hashes to date! The decryption form accepts up to a maximum of 64 MD5 hashes to check at a time. They have a public forum which is very helpful because anyone can sign up for a free account and post a hash cracking request as long as it is below 25 hashes.

7) reverse-hash-lookup.online-domain-tools.com

Online Domain Tools is a website that provides many useful tools that can be used for networking, domain, web, browser, security, privacy, data, conversion, and coding purposes. One of their tools is a reverse hash lookup that can decrypt MD5, SHA1, SHA-256, LM and NTLM hash function to plaintext message. The form allows up to 5 hash values at a time and the result is shown instantly at the bottom of the form. The lookup is based on several online databases as well as engines using rainbow tables.


8) md5decrypt.net

md5decrypt.netโ€™s database contains over a billion words but still is not considered to have one of the biggest wordlists. However, what we like about md5decrypt.net is the clean design with no advertisements at all and the ability to search for words that are hashed twice. A useful tip is the text box can actually support multiple hashes up to a maximum of 500 by putting each hash in a new line.

9) onlinehashcrack.com

Home ยป Hacking ยป 10 Websites to Easily Help Decrypt MD5 Hashed Strings
10 Websites to Easily Help Decrypt MD5 Hashed Strings
Raymond Updated 3 years ago Hacking 14 Comments

10) cmd5.org
><claims to have the largest database in the world with 7.8 trillion unique records. They are similar to onlinehashcrack.com whereby they offer both a free and paid hash cracking service. Although not mentioned anywhere on their website, it seems like a cracked hash containing 6 characters or less is free while strings containing 7 characters or more require payment. Their cheapest package is they accept a minimum payment of $20 that includes 1000 hashes with no expiration to the credits. This is the only one that managed to decrypt the MD5 of the word โ€œraymond.ccโ€

@ ฬตอ‘Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Most advanced XSS scanner in 2019
> XSStrike is a Cross Site Scripting detection suite equipped with four hand written parsers, an intelligent payload generator, a powerful fuzzing engine and an incredibly fast crawler.

> Instead of injecting payloads and checking it works like all the other tools do, XSStrike analyses the response with multiple parsers and then crafts payloads that are guaranteed to work by context analysis integrated with a fuzzing engine. Here are some examples of the payloads generated by XSStrike:

}]};(confirm)()//\
<A%0aONMouseOvER%0d=%0d[8].find(confirm)>z
</tiTlE/><a%0donpOintErentER%0d=%0d(prompt)``>z
</SCRiPT/><DETAILs/+/onpoINTERenTEr%0a=%0aa=prompt,a()//
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/s0md3v/XSStrike

2) cd XSSrtike

3) pip install -m requirements.txt

4) python xsstrike.py

๐Ÿฆ‘Features:

> Reflected and DOM XSS scanning

> Multi-threaded crawling

> Context analysis

> Configurable core

> WAF detection & evasion

> Outdated JS lib scanning

> Intelligent payload generator

> Handmade HTML & JavaScript parser

> Powerful fuzzing engine

> Blind XSS support

Written by ฬตอ‘Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

> Highly researched work-flow

> Complete HTTP support

> Bruteforce payloads from a file

> Powered by Photon, Zetanize and Arjun

> Payload Encoding

@ Steaven(tm)
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Network Trick
Tensorflow implementation of Deep Convolutional Generative Adversarial Networks which is a stabilize Generative Adversarial Networks
instagram.com/UnderCodeTestingCompany

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/carpedm20/DCGAN-tensorflow

2) cd DCGAN-tensorflow

3) python download.py mnist celebA

4) To train a model with downloaded dataset:

> python main.py --dataset mnist --input_height=28 --output_height=28 --train

> python main.py --dataset celebA --input_height=108 --train --crop

๐Ÿฆ‘ To test with an existing model:

1) python main.py --dataset mnist --input_height=28 --output_height=28

2) python main.py --dataset celebA --input_height=108 --crop

> Or, you can use your own dataset (without central crop) by:

3) mkdir data/DATASET_NAME
... add images to data/DATASET_NAME ...

4) python main.py --dataset DATASET_NAME --train

5) python main.py --dataset DATASET_NAME

6) # example

7) python main.py --dataset=eyes --input_fname_pattern="*_cropped.png" --train

8) If your dataset is located in a different root directory:

> python main.py --dataset DATASET_NAME --data_dir DATASET_ROOT_DIR --train

9) python main.py --dataset DATASET_NAME --data_dir DATASET_ROOT_DIR
> # example

10) python main.py --dataset=eyes --data_dir ../datasets/ --input_fname_pattern="*_cropped.png" --train


@ ฬตอ‘Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–


๐Ÿฆ‘PyTorch implementation of "Efficient Neural Architecture Search via Parameters Sharing"
termux/Kali
t.me/UnderCodeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/carpedm20/ENAS-pytorch

2) cd ENAS-pytorch

3) conda install graphviz

4) pip install -r requirements.txt

5) To train ENAS to discover a recurrent cell for RNN:

> python main.py --network_type rnn --dataset ptb --controller_optim adam --controller_lr 0.00035 \

--shared_optim sgd --shared_lr 20.0 --entropy_coeff 0.0001

6) python main.py --network_type rnn --dataset wikitext

7) To train ENAS to discover CNN architecture (in progress):

> python main.py --network_type cnn --dataset cifar --controller_optim momentum --controller_lr_cosine=True \
--controller_lr_max 0.05 --controller_lr_min 0.0001 --entropy_coeff 0.1

8) You can see the details of training (e.g. reward, entropy, loss) with:

> tensorboard --logdir=logs --port=6006

@ ฬตอ‘Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘How to Discover Cross-Domain Relations with Generative Adversarial Networks
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/carpedm20/DiscoGAN-pytorch

2) cd DiscoGAN-pytorch

3) Or > sudo apt-get install imagemagick (avaible ata ubanto Repo)

> mogrify -resize 256x256! -quality 100 -path YOUR_DATASET_NAME/A/*.jpg

> mogrify -resize 256x256! -quality 100 -path YOUR_DATASET_NAME/B/*.jpg

๐Ÿฆ‘ for Mac

1) brew install imagemagick

> mogrify -resize 256x256! -quality 100 -path YOUR_DATASET_NAME/A/*.jpg
$ mogrify -resize 256x256! -quality 100 -path YOUR_DATASET_NAME/B/*.jpg

2) for scale and center crop
$ mogrify -resize 256x256^ -gravity center -crop 256x256+0+0 -quality 100 -path ../A/*.jpg

๐Ÿฆ‘To train a model:

1) python main.py --dataset=edges2shoes --num_gpu=1

2) python main.py --dataset=YOUR_DATASET_NAME --num_gpu=4

> To test a model (use your load_path):

3) python main.py --dataset=edges2handbags --load_path=logs/edges2handbags_2017-03-18_10-55-37 --num_gpu=0 --is_train=False

@ ฬตอ‘Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ 2019 who interested to start programming Chirp is a modern low-level programming language written in C++
t.me/UnderCodeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/chirp-language/Chirp.git

2)cd Chirp

3)sh build.sh

๐Ÿฆ‘Features:

> Variable declaration 24-07-2019

> Variable definition 25-07-2019

> Math 25-07-2019

> Functions 26-07-2019

> Function calls 27-07-2019

> Inline assembly 28-07-2019

> If statements

> Else statements

> While statements

> For statements

> Imports

> Pointers

> Macros

> Dynamic memory allocation

> IO library

> Math library

> Eve library

๐Ÿฆ‘Tested by UndercOde On ubanto server

@ ฬตอ‘Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘
Shell Script For Attacking Wireless Connections Using Built-In Kali Tools. Supports All Securities (WEP, WPS, WPA, WPA2) 2019
instagram.com/UnderCodeTestingCompany

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/esc0rtd3w/wifi-hacker

2) cd wifi-hacker

3) chmod 777 wifi-hacker

4) ./wifi-hacker.sh

๐Ÿฆ‘Tested ON

> kali

> root termux

@ ฬตอ‘Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘2019 ANDROID BUG
T.me/UnderCodeTestingOfficial

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

1) This is a summary of the mitigations provided by the Android security platform and service protections such as Google Play Protect. These capabilities reduce the likelihood that security vulnerabilities could be successfully exploited on Android.

2) Exploitation for many issues on Android is made more difficult by enhancements in newer versions of the Android platform. We encourage all users to update to the latest version of Android where possible.

3) The Android security team actively monitors for abuse through Google Play Protect and warns users about Potentially Harmful Applications.

4) Google Play Protect is enabled by default on devices with Google Mobile Services, and is especially important for users who install apps from outside of Google Play.

๐Ÿฆ‘2019-12-01 security patch level vulnerability details:


CVE-2019-2232 A-140632678 DoS Critical 8.0, 8.1, 9, 10
CVE-2019-9464 A-141028068 [2] [3] [4] EoP High 10
CVE-2019-2217 A-141003796 EoP High 10
CVE-2019-2218 A-141169173 EoP High 10
CVE-2019-2220 A-138636979 [2] ID High 9, 10
CVE-2019-2221 A-138583650 [2] EoP Moderate 10

๐Ÿฆ‘In Kernel Also !!!!

CVE-2018-20961 A-139522588
Upstream kernel EoP High USB MIDI class function driver
CVE-2019-15220 A-140329469
Upstream kernel EoP High Prism54 WiFi USB Driver
CVE-2019-15239 A-140328996
Upstream kernel EoP High TCP Stack

๐Ÿฆ‘In Qualcomm components

CVE-2019-10557 A-78657016
QC-CR#2255369
QC-CR#2259707 N/A High WLAN host
CVE-2018-11980 A-140423440
QC-CR#2270117 N/A High WLAN host
CVE-2019-10480 A-140423811
QC-CR#2309399 N/A High WLAN host
CVE-2019-10481 A-140423794
QC-CR#2304610
QC-CR#2318632 N/A High WLAN host
CVE-2019-10536 A-140423334
QC-CR#2433802 N/A High WLAN host
CVE-2019-10537 A-140423693
QC-CR#2436502 N/A High WLAN host
CVE-2019-10595 A-140423810
QC-CR#2148184 N/A High WLAN host
CVE-2019-10598 A-140423155
QC-CR#2324139 N/A High WLAN host
CVE-2019-10601 A-140423156
QC-CR#2428798 N/A High WLAN host
CVE-2019-10605 A-140424124
QC-CR#2187441 N/A High WLAN host
CVE-2019-10607 A-140423690
QC-CR#2211711 N/A High Security
CVE-2019-2304 A-123238115
QC-CR#2331868
QC-CR#2335530
QC-CR#2348299
QC-CR#2203904* N/A High WLAN host


Written @UnderCodeOfficial

โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘How To Automatically exported from code.google.com/ p/hexorbase
(t.me/UnderCodeTestingOfficial

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

> It works on Linux and Windows running the following:

1) git clone https://github.com/savio-code/hexorbase

2) cd hexorbase

3) dpkg -i hexorbase_1.0_all.deb

4) Software Icon can be found at the application Menu of the GNOME desktop interfaces

Icon can also be found at /usr/share/applications for KDE and also GNOME:

> There you find "HexorBase.desktop"

๐Ÿฆ‘Requirements:

1) python

2) python-qt4

3) cx_Oracle

4) python-mysqldb

5) python-psycopg2

6) python-pymssql

7) python-qscintilla2

Use For Learning Only

@ UnderCodeOfficial
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘What is PostgreSQL ? (@ wikipedia)
t.me/UnderCodeTestingOfficial

> PostgreSQL is a general purpose and object-relational database management system, the most advanced open source database system. PostgreSQL was developed based on POSTGRES 4.2 at Berkeley Computer Science Department, University of California.

>PostgreSQL was designed to run on UNIX-like platforms. However, PostgreSQL was then also designed to be portable so that it could run on various platforms such as Mac OS X, Solaris, and Windows.

>PostgreSQL is free and open source software. Its source code is available under PostgreSQL license, a liberal open source license. You are free to use, modify and distribute PostgreSQL in any form.

>PostgreSQL requires very minimum maintained efforts because of its stability. Therefore, if you develop applications based on PostgreSQL, the total cost of ownership is low in comparison with other database management systems.

๐Ÿฆ‘Features:

> User-defined types

> Table inheritance

> Sophisticated locking mechanism

> Foreign key referential integrity

> Views, rules, subquery

๐Ÿฆ‘Official Download Link:

>https://www.postgresql.org/

> Nested transactions (savepoints)

> Multi-version concurrency control (MVCC)

> Asynchronous replication

@ ฬตอ‘Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Best IKE Scanner Original Tool
instagram.com/UnderCodeTestingCompany

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

Termux-root/Kali/Debian/Parrot

1) git clone https://github.com/royhills/ike-scan

2) cd ike-scan

3) autoreconf --install to generate a viable ./configure file

4) Run ./configure or ./configure --with-openssl to use the OpenSSL libraries

5) Run make to build the project

6) Run make check to verify that everything works as expected

7) Run make install

8) ike-scan -h

๐Ÿฆ‘Features:

1) Discovery Determine which hosts in a given IP range are running IKE. This is done by displaying those hosts which respond to the IKE requests sent by ike-scan.

2) Fingerprinting Determine which IKE implementation the hosts are using, and in some cases determine the version of software that they are running. This is done in two ways: firstly by UDP backoff fingerprinting which involves recording the times of the IKE response packets from the target hosts and comparing the observed retransmission backoff pattern against known patterns; and secondly by Vendor ID fingerprinting which compares Vendor ID payloads from the VPN servers against known vendor id patterns.

3) Transform Enumeration Find which transform attributes are supported by the VPN server for IKE Phase-1 (e.g. encryption algorithm, hash algorithm etc.).

4) User Enumeration For some VPN systems, discover valid VPN usernames.

5) Pre-Shared Key Cracking Perform offline dictionary or brute-force password cracking for IKE Aggressive Mode with Pre-Shared Key authentication. This uses ike-scan to obtain the hash and other parameters, and psk-crack (which is part of the ike-scan package) to perform the cracking

@ ฬตอ‘Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–