UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.5K links
๐Ÿฆ‘ Undercode Cyber World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE

โœจ Web & Services:
โ†’ Undercode.help
Download Telegram
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Limitations of Web Application Vulnerability Scanners:
Why Not safe ??
t.me/iOsDeveloppers

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

1) Web application vulnerability scanners are not always capable of detecting all of the vulnerabilities and attack vectors that exist.

2) In consequence, they may assert numerous false-negatives and false-positives. These were some of the results of a study named: โ€œClosing the Gap: Analyzing the Limitations of Web Application Vulnerability Scannersโ€ hold during the OWASP APPSEC DC 2010. The tests were based on many professional scanners: Burp suite professional, Acunetix, Wapiti, Grendel-Scan, W3af, N-Stalker, CENZIC, netsparker.

3) As far as cookie variableโ€™s injection is concerned, only 6,3% of the web application Vulnerability scanners had detected the implemented SQL injection vulnerabilities.

4) This rate looks like emphasize that the cookie vector is neglected when testing against SQL injections. Also, itโ€™s very low comparing to percentage of the detection of SQL injection in Form Inputs (59,7%)

@ UndercOde

โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘EXPLOITATION :
What is VBA?


1) VBA (Visual Basic for Applications) is a programming language used mostly in Microsoftโ€™s office.
VBA is, however, also used in AutoCAD for plugins etc.

2) VBAโ€™s syntax is rather much identical to Visual Basic, there are just

3) some API calls ready to be used to communicate back to the main application.

4) Initially VBA had been released to replace WordBasic as a โ€œmicro languageโ€.

5) Just like Visual Basic, VBA is a so-called Object-Oriented programming language.

6) VBA does have itโ€™s limitations, though, it still requires the main application to function as it can not be written to be a stand-alone application, which Visual Basic can do.

7) The close relation between VBA and the main applicationโ€™s core creates a big point of interest for virus', exploiters and malware, as these can all abuse the wide variety of options available to them thanks to VBA.

t.me/UNDERCODETESTINGOFFICIAL

โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘For EXPERT HACKERS :
How to use GPG Any beb base Linux distro (for termux have to download & unzip manual)
T.me/UndercOdeTestingOfficial


What is GPG?

> GNU Privacy Guard (GnuPG), also known as GPG, is a tool for secure communication that was created as Free Software under the GNU Project. GnuPG follows the OpenPGP protocol, which defines and standardizes all the necessary components involved in sending encrypted messagesโ€“signatures, private keys, and public key certificates

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

1) sudo apt update

2) sudo apt install gnupg

3) gpg --full-generate-key

4) Prompts will ask details about the key you are generating. Our recommendations are:

* Select (1) RSA and RSA (default) for the type of key

* Enter 4096 for the key size

* Enter 1y for the expiration date. You may choose a different expiration
(depend on duration)

* Enter a relevent name, email and comment. These will be used later to identify the keypair

* Give your key a good passphrase. This passphrase is the only thing that protects your private key if someone else gets hold of it.

5) Congratulations you should have a smoking hot new GPG key. You can list all the keys in your public keyring by typing:

> gpg --list-keys

6) You should be able to see your newly created user id in the list. This may be the only key in your keyring but as you add other peoples keys the list will grow.

7) Encrypting and decrypting messages

> gpg --armor --output file.asc --encrypt --recipient <email> <file>

> gpg --output file.txt --decrypt file.asc

8) If you have multiple private keys on your machine it will automatically determine the correct key and prompt you for the passphrase. Enter the passphrase correctly and a new file file.txt will be created containing the original content.

9) Message verification
GPG can digitally sign a document to verify its authenticity and integrity. A recipient can inspect the signature and confirm that it does come from the expected sender and that the content has been unmodified.

>gpg --armor --output signedfile.asc --sign <file>

10) Once the recipient has recieved the file they can verify the signature and extra the content:

> gpg --verify signedfile.asc
If the signature is valid it will output details about the signature including when and by whom it was signed

๐Ÿฆ‘NOW Exchanging public keys

1) Export your public key
The simplest way to share your key is to export it as an ASCII armoured file and send it to whomever you want to recieve messages from. This file can be emailed or shared online.

> gpg --armor --output public.asc --export <email>

2) Import and validate public key
You can then import the public key into your keyring by:

> gpg --import public.asc

3) Submit your public key to a key server
A more convenient way is to upload it to a public keyserver. Key servers areโ€ฆ

> MIT hosts a popular keyserver: https://pgp.mit.edu

4) Find the key ID for the public key you want to upload
gpg --list-keys <email>

5) You will see a long HEX value in the pub row, this is the ID for this public key.

1) Upload your key to a keyserver:

2) gpg --send-keys <key id>

3) Retrieve a public key

4) Find the key ID for the public key you want to download
gpg --search <name>

5) Download key
gpg --recv-key <key id>

6) When adding a new key to your public keystore it is of little use until you verify it is the correct key TODO

7) Revoking keys

8) To delete a key from your keychain you can do:

> gpg --delete-key <key id>
If this a key you hold the private key to you will first need to delete the screts for the key:

gpg --delete-secret-key <key id>

Written by @UndercOdeOfficial
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
A Hacker Like you, wich kinds of UndercOde Tutorials getting more knownledge ?
Anonymous Poll
22%
LINUX TOOLS
38%
TERMUX & ANDROID HACKING
6%
CRACKING TUTORIALS
13%
EXPERT HACKING
17%
WIRELESS HACKING
6%
OTHER TRICKS...
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘CTF framework and exploit development library
>Most functionality should work on any Posix-like distribution (Debian, Arch, FreeBSD, OSX, etc.). Python >= 2.7 is required Python 3
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) apt-get update

2) apt-get install python3 python3-pip python3-dev git libssl-dev libffi-dev

3) build-essential

4) python3 -m pip install --upgrade pip

5) python3 -m pip install --upgrade git+https://github.com/Gallopsled/pwntools.git@dev3

๐Ÿฆ‘Tested by undercOde on :

> kali
>ubanto

@ Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘What was the Heartbleed Bug?
instagram.com/UndercOdeTestingCompany

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

> Impact of the Vulnerability

> This vulnerability allows an attacker to extract memory contents from the webserver through the vulnerability in the heartbeat.

> As a result an attacker may be able to access sensitive information such as the private keys used for SSL/TLS.

1) Active Attack - Equipped with the private key, an attacker can silently monitor and decrypt communications between the user and the web server. As a result, an attacker could view private data such as passwords, credit card data, medical records and any other sensitive data the user exchanges with the website. In addition, the attacker could impersonate the target website to deliver fake, inaccurate or malicious data to the user.

2) Offline Attack - Some well funded attackers gather large amounts of encrypted data and store this data in the event they can later decrypt the information. Using the Heartbleed vulnerability the attackers could decrypt this information if it was obtained when passed between a user and a vulnerable website. This means that sensitive data exchanged up to two years ago could also now be at risk for exposure to attackers. Note: sites implementing Perfect Forward Secrecy are protected against this particular attack.

3) Scope - 1.0.1 and 1.0.2-beta releases of OpenSSL are affected including 1.0.1f and 1.0.2-beta1. Apache, which uses OpenSSL for HTTPS, is used by 66% of all websites according to netcraft.com. A study of the TLS heartbeat extension by Netcraft also identified that 17.5% of SSL sites may be vulnerable to the Heartbleed bug.


๐Ÿฆ‘The Fix
The patch in OpenSSL 1.0.1g is essentially a bounds check, using the correct record length in the SSL3 structure (s3->rrec) that described the incoming HeartbeatMessage.

Below is the revised code from Github.[8]

hbtype = *p++;
n2s(p, payload);
if (1 + 2 + payload + 16 > s->s3->rrec.length)
return 0; /* silently discard per RFC 6520 sec. 4 */
pl = p;


๐Ÿฆ‘Verify if you are using a vulnerable version of OpenSSL.

1) Upgrade OpenSSL as soon as possible. OpenSSL was released on (https://www.openssl.org/source/).

2) Reissue your security certificates for SSL/TLS. The vulnerability has been present for two years and there is no way to verify if your private key has been compromised as a result of this vulnerability.

3) In addition, a compromised key would be used to silently monitor communications from your users and the attack would be undetectable. It is prudent to assume a breach and proactively reissue security certificates.

@ Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Termux Backup restore 2019 Tool
t.me/UndercOdeTestingOfficial


๐Ÿฆ‘Termux Backup :

From this option you can backup all the tools and default bash terminal script into your internal stoarge without any issue and you can restore it at any time.

> Termuc Restore :

From this option you can restore the backup tools of termux and default terminal as it was first.

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

$ apt-get update -y
$ apt-get upgrade -y
$ pkg install python -y
$ pkg install python2 -y
$ pkg install git -y
$ pip install lolcat
$ git clone https://github.com/noob-hackers/snap
$ ls
$ cd snap
$ ls
$ bash snap.sh

@ Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Happy New Year all ๐Ÿ˜ŠWe have some great tutorials for next year
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Termux DDoS attack tool for sending forged UDP packets to vulnerable Memcached servers obtained using Shodan API
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) apt-get install python3

2) pip install scapy

3) pip install shodan

4) now You may obtain one for free in Shodan if you sign up using a .edu email
> https://shodan.io/

5) git clone https://github.com/649/Memcrashed-DDoS-Exploit.git

6) cd Memcrashed-DDoS-Exploit

7) echo "SHODAN_KEY" > api.txt

8) docker build -t memcrashed .

9) docker run -it memcrashed

@ Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ Hack Website Using AUTOMATE SQLiNJECTION ON Android
>sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester, and a broad range of switches including database fingerprinting, over data fetching from the database, accessing the underlying file system, and executing commands on the operating system via out-of-band connections.
t.me/iOsDeveloppers

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone --depth 1 https://github.com/sqlmapproject/sqlmap.git sqlmap-dev
(sqlmap works out of the box with Python version 2.6, 2.7 and 3.x on any platform.)

2)go dir then python sqlmap.py -h

3) python sqlmap.py -hh

4) to attack
python sqlmap.py -u (site name) - -batch

THAT ALL !

@ Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Mobile Apps (Hack On Android)
i know we already sent 250 android hack app in one git link but lets focus on most usuable apps !"
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

1) AndroRat - Android Remote Administrative Tool
>https://github.com/wszf/androrat

2)cspoilt - A tool that enumerates local hosts, finds vulnerabilities and their exploits, cracks Wi-Fi password, installs backdoors blablabla!!!
> http://www.csploit.org/

3) Hackode - All In One Android Pentest Tool
>https://play.google.com/store/apps/details?id=com.techfond.hackode&hl=en

4) zANTI - Network mapping, port discovery, sniffing, packet manipulation, DoS, MITM blablabla!!
> https://www.zimperium.com/zanti-mobile-penetration-testing

5) FaceNiff - Intercept and sniff WiFi network traffic for Social Media packets
> http://faceniff.ponury.net/

6) Droidsheep - Android application that analyzes security in wireless networks and also captures Twitter, Linked, Facebook, and other accounts
> http://droidsheep.downloadxapp.com/

7) USB Cleaver - Silently recover information from a target Windows 2000 or higher computer, including password hashes, LSA secrets, IP information
>https://forum.xda-developers.com/showthread.php?t=1656497

8) Shark - Network Packate analysis tool
> https://github.com/sundaysec/Android-Exploits/blob/master

9) DroidBox - Dynamic analysis of Android apps
>https://github.com/pjlantz/droidbox

10) Wi-Fi Kill - Disable other Users from WiFi Access
> https://wifikillapk.com/

@ Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘WHAT IS Definition
virtual network computing (VNC)
t.me/iOsDeveloppers

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

> Virtual network computing (VNC) is a type of remote-control software that makes it possible to control another computer over a network connection. Keystrokes and mouse clicks are transmitted from one computer to another, allowing technical support staff to manage a desktop, server, or other networked device without being in the same physical location.

> VNC works on a client/server model: A VNC viewer (or client) is installed on the local computer and connects to the server component, which must be installed on the remote computer.

> The server transmits a duplicate of the remote computer's display screen to the viewer. It also interprets commands coming from the viewer and carries them out on the remote computer.

@ Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘How Control vnc servers ?
>LibVNCServer/LibVNCClient are cross-platform C libraries that allow you to easily implement VNC server or client functionality in your program.
>VNC is a set of programs using the RFB (Remote Frame Buffer) protocol. They are designed to "export" a frame buffer via net (if you don't know VNC, I suggest you read "Basics" below). It is already in wide use for administration, but it is not that easy to program a server yourself.
instagram.com/UndercOdeTestingCompany

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/LibVNC/libvncserver

2) cd libvncserver

3) mkdir build

4) cd build

5) cmake ..

6) cmake --build .

๐Ÿฆ‘How It Works ?

1) To make a server, you just have to initialise a server structure using the function rfbDefaultScreenInit, like rfbScreenInfoPtr rfbScreen = rfbGetScreen(argc,argv,width,height,8,3,bpp); where byte per pixel should be 1, 2 or 4. If performance doesn't matter, you may try bpp=3 (internally one cannot use native data types in this case; if you want to use this, look at pnmshow24).

2) You then can set hooks and io functions (see below) or other options
> And you allocate the frame buffer like this: rfbScreen->frameBuffer = (char*)malloc(widthheightbpp);

3) After that, you initialize the server, like rfbInitServer(rfbScreen);

4) You can use a blocking event loop, a background (pthread based) event loop, or implement your own using the rfbProcessEvents function.

@ Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘SPOOTIFY ACCOUNTS 2019-2020 NON-TESTED

cnb2001@gmail.com 01122001 1-Month
philfroese@gmail.com groovy11 1-Month
carlton.t.jones@gmail.com gotwins1 1-Month
amberenixon@gmail.com macie123 1-Month
kristenreeson@hotmail.com NCC74656 1-Month
s.curry.e@gmail.com shannon 1-Month
ranzi.vogel1@web.de shakira 1-Month
maddiepwheeler@gmail.com ilikepie4 US Accounts
reagankurtz@yahoo.com mackenzie2002 US Accounts
jenniferrocks101@gmail.com rebecca US Accounts
a.carroll12@icloud.com Leopard13 US Accounts
guardianangel6066@gmail.com Samson10 US Accounts
sophieconcannon@gmail.com piggy2011 US Accounts
tianosale85@gmail.com mamita1990 1-Month
jutsilveira@gmail.com juju5940 1-Month
keliann214@gmail.com Fitness1 1-Month
finfan41@yahoo.com legs1234 1-Month
joey230michael@icloud.com Joey129453 1-Month

@ Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘How to scan for general system information, vulnerable software packages, and possible configuration issues... in one tool
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘Features :

> Automated security auditing

> Compliance testing (e.g. ISO27001, PCI-DSS, HIPAA)

> Vulnerability detection

The software (also) assists with:

> Configuration and asset management

> Software patch management

> System hardening

> Penetration testing (privilege escalation)

> Intrusion detection

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/CISOfy/lynis

2) cd lynis

3) ./lynis audit system

๐Ÿฆ‘Tested by UndercOde on

> kali
> ubanto

@ Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Cloudflarew 2020 Features & Why Its secure & safe to use this protection ?
twitter.com/UndercodeTC

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

> Fast, Global Content Delivery Network.

> Fast, Powerful, And Secure DNS.

>Load Balancing.

> A rgo Smart Routing.

> Web Optimizations.

> Local Storage Caching.

> AutoMinify.

> Rocket Loader

> anti-ddos solution

> hide admin mail & phones from website

> hide cms feature include

> multi language + Two-factor login

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Python wrapper for the Cloudflare Client API v4
updated
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) sudo pip install cloudflare

or via git

1) git clone https://github.com/cloudflare/python-cloudflare

2) cd python-cloudflare

3) ./setup.py build

4) sudo ./setup.py install

๐Ÿฆ‘Example

A very simple listing of zones within your account; including the IPv6 status of the zone.

import CloudFlare

def main():
cf = CloudFlare.CloudFlare()
zones = cf.zones.get()
for zone in zones:
zone_id = zone['id']
zone_name = zone['name']
print zone_id, zone_name

if name == 'main':
main()

>This example works when there are less than 50 zones (50 is the default number of values returned from a query like this).

๐Ÿฆ‘Providing Cloudflare Username and API Key

When you create a CloudFlare class you can pass up to four parameters.

1> API Token or API Key
2> Account email (only if an API Key is being used)
3> Optional Origin-CA Certificate Token
4> Optional Debug flag (True/False)

๐Ÿฆ‘import CloudFlare

# A minimal call - reading values from environment variables or configuration file
cf = CloudFlare.CloudFlare()

# A minimal call with debug enabled
cf = CloudFlare.CloudFlare(debug=True))

# An authenticated call using an API Token (note the missing email)
cf = CloudFlare.CloudFlare(token='00000000000000000000000000000000')

# An authenticated call using an API Key
cf = CloudFlare.CloudFlare(email='user@example.com', token='00000000000000000000000000000000')

# An authenticated call using an API Key and CA-Origin info
cf = CloudFlare.CloudFlare(email='user@example.com', token='00000000000000000000000000000000', certtoken='v1.0-...')

> If the account email and API key are not passed when you create the class, then they are retrieved from either the use exported shell environment variables or the .cloudflare.cfg or ~/.cloudflare.cfg or ~/.cloudflare/cloudflare.cfg files, in that order.

๐Ÿฆ‘example Using shell environment variables

1> export CF_API_EMAIL='user@example.com' # Do not set if using an API Token
2> export CF_API_KEY='00000000000000000000000000000000'
3> export CF_API_CERTKEY='v1.0-...

๐Ÿฆ‘Using configuration file to store email and keys

1> cat ~/.cloudflare/cloudflare.cfg
[CloudFlare]
2>email = user@example.com # Do not set if using an API Token
token = 00000000000000000000000000000000
certtoken = v1.0-...
extras =

E N J O Y

Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘A Cloudflare WebExtension
>so helpful for hackers
instagram.com/UndercOdeTestingCompany

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) adding to google chrome browser
>https://chrome.google.com/webstore/detail/claire/fgbpcgddpmjmamlibbaobboigaijnmkl

2) adding to firefox
>https://addons.mozilla.org/en-US/firefox/addon/cloudflare-claire/

๐Ÿฆ‘ manual mode

>to use the extension from source:

1> Clone this repository (git clone https://github.com/cloudflare/claire.git)

2> In the checked out directory, run yarn install && yarn run build.

3> Bring up the extensions page (Wrench icon -> Tools -> Extensions)

4> If Developer mode is not checked, check it and this will expose a few additional buttons

5> Click on the Load unpacked extension button and browse to the "dist" folder in the Claire repo folder

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Hack any wps wifi on Termux/Linux Withou root :
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/SilentGhostX/HT-WPS-Breaker

2) cd Desktop

3) unzip HT-WPS-Breaker.zip

4) cd HT-WPS-Breaker

5) chmod +x HT-WB.sh

6) ./HT-WB.sh or bash HT-WB.sh

7) Choose Options via Numbers

> note also hidden any wifi can be sucessful getting here name

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘A Kubernetes ingress controller for Cloudflare's Argo Tunnels
Updated
>Argo Tunnel Ingress Controller provides Kubernetes Ingress via Argo Tunnels. The controller establishes or destroys tunnels by monitoring changes to resources.
>Argo Tunnel offers an easy way to expose web servers securely to the internet, without opening up firewall ports and configuring ACLs. Argo Tunnel also ensures requests route through Cloudflare before reaching the web server so you can be sure attack traffic is stopped with Cloudflareโ€™s WAF and Unmetered DDoS mitigation and authenticated with Access if youโ€™ve enabled those features for your account.
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/cloudflare/cloudflare-ingress-controller

2) cd cloudflare-ingress-controller

3) kubectl apply -f deploy/argo-tunnel.yaml

4) Update the ServiceAccount namespace and bindings to deploy in an alternate namespace.Without role based access control (RBAC).

>kubectl apply -f deploy/argo-tunnel-no-rbac.yaml

5) With Helm:

>helm install --name anydomain cloudflare/argo-tunnel

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–