UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.4K links
๐Ÿฆ‘ Undercode Cyber World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE

โœจ Web & Services:
โ†’ Undercode.help
Download Telegram
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘What About SEO ? GUIDE:
T.me/UndercOdeTestingOfficial

๐Ÿฆ‘โ“โ“”โ“ฃโ“ข โ“ˆโ“ฃโ“โ“กโ“ฃ

> The most famous phrase used in SEO is โ€œIt Dependsโ€. It all depends on the type of content, the CMS on which the site is built, the industry in which you are located, etc. But when it comes to SEO for healthcare organizations, โ€œIt Dependsโ€ becomes โ€œIt Matters.โ€

For the most part, the most important driver in SEO is the target audience and its activity

Here are three things to consider when optimizing medical-related sites.

> Important SEO Considerations for Healthcare Sites

1) Mobile First Optimization Above All

2) Multilingualism

3) Optimization for local issuance

๐Ÿฆ‘what about clients:

> Connect your patients to your site

After all, delivering useful, strong content to users

Written by Undercode

โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘SOCIAL ENGENEER ATTACKS
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘What is Social Engineering? & what is the plan in use ?

> Social engineering is the art of manipulating users of a computing system into revealing confidential information that can be used to gain unauthorized access to a computer system.

> The term can also include activities such as exploiting human kindness, greed, and curiosity to gain access to restricted access buildings or getting the users to installing backdoor software.

> Knowing the tricks used by hackers to trick users into releasing vital login information among others is fundamental in protecting computer systems

๐Ÿฆ‘HOW THOSE ATTACKS WORKS ?

1) Gather Information: This is the first stage, the learns as much as he can about the intended victim. The information is gathered from company websites, other publications and sometimes by talking to the users of the target system.

2)Plan Attack: The attackers outline how he/she intends to execute the attack

3) Acquire Tools: These include computer programs that an attacker will use when launching the attack.

4) Attack: Exploit the weaknesses in the target system.
Use acquired knowledge: Information gathered during the social engineering tactics such as pet names, birthdates of the organization founders, etc. is used in attacks such as password guessing.


Written by Undercode
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Social engeneer the expert hacking :Understanding before attack:
twitter.com/UNDERCODETC

๐Ÿฆ‘โ“โ“”โ“ฃโ“ข โ“ˆโ“ฃโ“โ“กโ“ฃ

> Most techniques employed by social engineers involve manipulating human biases. To counter such techniques, an organization can;

1) To counter the familiarity exploit, the users must be trained to not substitute familiarity with security measures. Even the people that they are familiar with must prove that they have the authorization to access certain areas and information.

2) To counter intimidating circumstances attacks, users must be trained to identify social engineering techniques that fish for sensitive information and politely say no.

3) To counter phishing techniques, most sites such as Yahoo use secure connections to encrypt data and prove that they are who they claim to be. Checking the URL may help you spot fake sites. Avoid responding to emails that request you to provide personal information.

4) To counter tailgating attacks, users must be trained not to let others use their security clearance to gain access to restricted areas. Each user must use their own access clearance.

5) To counter human curiosity, itโ€™s better to submit picked up flash disks to system administrators who should scan them for viruses or other infection preferably on an isolated machine.

6) To counter techniques that exploit human greed, employees must be trained on the dangers of falling for such scams.

Written by Undercode
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚

๐Ÿฆ‘XRay is a tool for recon, mapping and OSINT gathering from public networks.
t.me/iOsDeveloppers

๐Ÿฆ‘FEATURS :

1) It'll bruteforce subdomains using a wordlist and DNS requests.
For every subdomain/ip found, it'll use Shodan to gather open ports and other intel.

2) If a ViewDNS API key is provided, for every subdomain historical data will be collected.

3) For every unique ip address, and for every open port, it'll launch specific banner grabbers and info collectors.

4) Eventually the data is presented to the user on the web ui.

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

Building a Docker image
To build a Docker image with the latest version of XRay:

1) git clone https://github.com/evilsocket/xray.git

2) cd xray

3) docker build -t xraydocker .

4) Once built, XRay can be started within a Docker container using the following:

>docker run --rm -it -p 8080:8080 xraydocker xray -address 0.0.0.0 -shodan-key shodan_key_here -domain example.com

>Manual Compilation
Make sure you are using Go >= 1.7, that your installation is working properly, that you have set the $GOPATH variable and you have appended $GOPATH/bin to your $PATH.

5) Then:
> go get github.com/evilsocket/xray

> cd $GOPATH/src/github.com/evilsocket/xray/

> make
You'll find the executable in the build folder.

๐Ÿฆ‘Tested by UndercOde on:

> debian

E N J O Y
@UndercodeOfficial
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚โ–

๐Ÿฆ‘Command line go0gle dorking tool
t.me/UndercOdeTesting

๐Ÿฆ‘Features :

> GooDork allows you to apply regular expressions to any and all of the follow attributes of web applications
*URL
*displayable Text
*anchors
Many more options will shortly be made available

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/k3170makan/GooDork

2) GooDork

3) COMMANDS:

> python beautifulsoup4

>python-httplib
comprehensive HTTP client library

> python-urllib

> python-urlparse

@UndercodeOfficial
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘How TO BROWSING TOTALLY ANONYMOUSLY 2019-2020:
instagram.com/UnderCodeTestingCompany :

๐Ÿฆ‘โ“โ“”โ“ฃโ“ข โ“ˆโ“ฃโ“โ“กโ“ฃ

1) HTTPS Everywhere
> HyperText Transfer Protocol which is used to exchange data between browsers and websites

2) Beware of Public (Unprotected) Wi-Fi

3) Beware of Browser Plugins

4) DuckDuckGo

5) Beware of Cookies
>Cookies can be used to perform several complex tasks including keeping your login credentials, card details, location and language preferences, etc. so it is important that you keep track of which cookies your browser stores and how they will be used

6) TOR browser

7) Use a trusted provider VPN

8) Use an Anonymous Email Account

9) Use Mobile Network
Browsing using your phoneโ€™s data is a secure way to remain anonymous online because it uses a routing system which assigns a unique IP address each time you connect to it

10) Anonymous Digital Payments

@UndercOdeOfficial
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘TERMUX PACKAGES 2019-2020:
instagram.com/UnderCodeTestingCompany

๐Ÿฆ‘โ“โ“”โ“ฃโ“ข โ“ˆโ“ฃโ“โ“กโ“ฃ


> x11-repo :Termux repo for x11 packages pkg install x11-repo

>vnc server :For graphical output pkg install tigervnc

>openbox wm :Openbox Window Managerpkg install openbox obconf

>xsetroot :Set color background for X pkg install xorg-xsetroot

>xterm X terminal pkg install xterm

>xcompmgr Composite manager or desktop effects pkg install xcompmgr

> xfsettingsd The settings daemon, to set themes & icons pkg install xfce4-settings

> polybar Easy and fast status bar pkg install polybar

>st Suckless/Simple terminal pkg install st

>geany Graphical text editor pkg install geany

>thunar File manager (optional) pkg install thunar

>pcmanfm File manager pkg install pcmanfm

>rofi An application launcher pkg install rofi

>feh Simple image viewer pkg install feh

>neofetch System info program pkg install neofetch

>git VCS, for cloning repos pkg install git

>wget Command line downloader pkg install wget

>curl To transfer/get internet data pkg install curl

>zsh A very good shell pkg install zsh

>vim Command line text editor (! - hard to exit :D) pkg

>install vim

>htop System monitor (optional) pkg install htop

>elinks Command line web browser (optional) pkg install elinks

>mutt Command line mail client (optional) pkg install mutt

>mc Command line file manager (optional) pkg install mc

>ranger Command line file manager (optional) pkg install ranger

>cmus Command line music player (optional) pkg install cmus

>cava Console-based audio visualizer (optional) pkg install cava

>pulseaudio Sound system & audio server (optional) pkg install pulseaudio

Written by UndercOde
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘BESTt ANDROID apps for video editing 2020:
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘โ“โ“”โ“ฃโ“ข โ“ˆโ“ฃโ“โ“กโ“ฃ

1) FilmoraGo
>https://play.google.com/store/apps/details?id=com.wondershare.filmorago

2) Adobe Premiere Club
>https://play.google.com/store/apps/details?id=com.adobe.premiereclip

3) VideoShow
>https://play.google.com/store/apps/details?id=com.xvideostudio.videoeditor

4) PowerDirector
>https://play.google.com/store/apps/details?id=com.cyberlink.powerdirector.DRA140225_01

5) KineMaster
>https://play.google.com/store/apps/details?id=com.nexstreaming.app.kinemasterfree

6) Quik
>https://play.google.com/store/apps/details?id=com.quvideo.xiaoying

7) VivaVideo
>https://play.google.com/store/apps/details?id=com.avcrbt.funimate

Written by UndercOde
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘WHY WIRESHARK MUST BE INSTALLED ON ANY LINUX & HOW ?
twitter.com/UNDERCODETC

๐Ÿฆ‘FEATURES :

1) Deep inspection of hundreds of protocols, with more being added all the time

2) Live capture and offline analysis

3) Standard three-pane packet browser

4) Multi-platform: Runs on Windows, Linux, macOS, Solaris, FreeBSD, NetBSD, and many others

5) Captured network data can be browsed via a GUI, or via the TTY-mode TShark utility

6) The most powerful display filters in the industry

7) Rich VoIP analysis

8) Read/write many different capture file formats: tcpdump (libpcap), Pcap NG, Catapult DCT2000, Cisco Secure IDS iplog, Microsoft Network

9) Monitor, Network General Snifferยฎ (compressed and uncompressed), Snifferยฎ Pro, and NetXrayยฎ, Network Instruments

10) Observer, NetScreen snoop, Novell LANalyzer, RADCOM WAN/LAN

11) Analyzer, Shomiti/Finisar Surveyor, Tektronix K12xx, Visual Networks Visual UpTime, WildPackets EtherPeek/TokenPeek/AiroPeek, and many others

12) Capture files compressed with gzip can be decompressed on the fly

13) Live data can be read from Ethernet, IEEE 802.11, PPP/HDLC, ATM, Bluetooth, USB, Token Ring, Frame Relay, FDDI, and others (depending on your platform)

14) Decryption support for many protocols, including IPsec, ISAKMP, Kerberos, SNMPv3, SSL/TLS, WEP, and WPA/WPA2

15) Coloring rules can be applied to the packet list for quick, intuitive analysis

16) Output can be exported to XML, PostScriptยฎ, CSV, or plain textInsta

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

$ sudo apt-get update

$ sudo apt-get install wireshark -y

@UndercOdeTesting
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Ways to Fix Any App like Instagram Not Working, Loading, or Crashing Issue
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘โ“โ“”โ“ฃโ“ข โ“ˆโ“ฃโ“โ“กโ“ฃ

1) App Permission

Go back to where you deleted cache, and you will see App permissions. Tap on it once to make sure that services that you want to use with Instagram app is given necessary permissions.

2) Network or Data Issue

Have you checked your data plan? Maybe you ran out of data? Connect to a Wi-Fi network to check and confirm if Instagram is loading or not. Itโ€™s also possible that there is a network issue. Ask a friend on a different network and see if he/she can access Instagram.

3) Delete Cache and Data

Old data and cache files can mess up how an app works and behaves. Deleting these files wonโ€™t have any effect. You will have to sign back in. Open Settings and tap on Manage apps and search and open Instagram.

4) Antivirus

The steps will depend on the antivirus app that you are using, but here is the basic premise. First, disable antivirus to check if it resolves the Instagram error. If yes, some setting in your antivirus is blocking or messing with the app. If nothing happens, move on to the next point. Maybe Instagram is not whitelisted, blocked, or given necessary permissions. Go through the antivirus app to make sure everything is in order.

5) Instagram Is Down

I have noticed a few instances of the Instagram being down in the news lately. One easy and quick way to check if Instagram is working or not is to use Down Detector

6) Try the Web

Open your favorite browser on a computer or smartphone, and check if Instagram is loading or not on it. If it is working fine, you can use it from there temporarily.

7) Reinstall Instagram

Most apps release bugs fixes regularly, and Instagram is no different. Open Play Store and click on Menu to select My apps & games.

8) Update OS

Well, Android is not exactly popular for receiving OS updates on time. Except when you are using a customized OS like OxygenOS or maybe MIUI where updates are pushed and available as soon as possible.

@UndercOdeOfficial
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘DC/OS CLI Tunnel Subcommand

A DC/OS CLI subcommand that provides SOCKS proxy, HTTP proxy, and VPN access to your DC/OS cluster.
facebook.com/UndercOdeTestingCompanie

๐Ÿฆ‘โ“โ“”โ“ฃโ“ข โ“ˆโ“ฃโ“โ“กโ“ฃ

1) git clone git@github.com:dcos/dcos-tunnel.git

2) cd dcos-tunnel

3) Create a virtualenv for the project:

> make env

4) Try it out with:

./env/bin/dcos-tunnel

5) The VPN container lives at https://github.com/dcos/dcos-cli-vpn

6) Binary

> make binary

7) Run it with:

./dist/dcos-tunnel

8) Syntax check:

>make test

9) Syntax check + Integration test:

> sudo make test-binary

10) Single Integration test:

> sudo make test-binary-debug test=<test_name>

@UndercOdeOfficial
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘How To Avoid Dox Attack ?

>Doxxing is searching for and publishing personal information about a person publicly with malicious intent. Doxxing includes the hacker analyzing information posted online about the victim in order to identify and then harass the victim. It can also involve exposing an anonymous account to reveal the person's identity.
t.me/iOsDeveloppers

๐Ÿฆ‘โ“โ“”โ“ฃโ“ข โ“ˆโ“ฃโ“โ“กโ“ฃ

1) Vary Usernames and Passwords

Try to set unique usernames for each website you are signed up with. If you are signed up for a controversial website or forum, make sure your username is anonymous and cannot be traced back to you

2) Use Secure Passwords

Always use complex passwords, as they are more difficult to hack. Your password should be at least 12 characters with a mixture of upper and lower case letters, numbers, and other special keyboard characters.

3) Protect your Computer

Keep your system up to date and secure. Use an internet security or antivirus program to stay safe from malware, ransomware, and other threats. Make sure your security software checks for updates and installs them automatically. Furthermore, scan your system regularly, as this will alert you of any suspicious or malicious activity.

4) Protect Internet Communications

by using any trusted vpn provider

5) Social Privacy Settings

Social media plays a vital role in our daily lives. Millions of people spend their time, and often communicate with strangers, on multiple social media platforms and groups. These strangers could be a group of hackers with malicious doxxing intentions

@UndercOdeOfficial
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘2019 updated : dnSpy is a debugger and .NET assembly editor. You can use it to edit and debug assemblies even if you don't have any source code available !
t.me/UnderCodeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone --recursive https://github.com/0xd4d/dnSpy.git

2) cd dnSpy
# or dotnet build

3) ./build.ps1

๐Ÿฆ‘FEATURES :

1) Debug .NET Framework, .NET Core and Unity game assemblies, no source code required

2) Set breakpoints and step into any assembly

3) Locals, watch, autos windows

4) Variables windows support saving variables (eg. decrypted byte arrays) to disk or view them in the hex editor (memory window)

5) Object IDs

6) Multiple processes can be debugged at the same time

7) Break on module load

8) Tracepoints and conditional breakpoints

9) Export/import breakpoints and tracepoints

10) Call stack, threads, modules, processes windows

11) Variables windows support evaluating C# / Visual Basic expressions

12) Dynamic modules can be debugged (but not dynamic methods due to CLR limitations)

13) Output window logs various debugging events, and it shows timestamps by default :)

14) Assemblies that decrypt themselves at runtime can be debugged, dnSpy will use the in-memory image. You can also force dnSpy to always use in-memory images instead of disk files.

15) Public API, you can write an extension or use the C# Interactive window to control the debugger

@UndercOdeOfficial
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘๐”๐๐ƒ๐„๐‘๐‚๐Ž๐ƒ๐„ NOW STARTS USING
> ๐†๐ˆ๐“๐‹๐”๐ FOR HOST NEW PROJECTS & NEW FEATURES ON GITLUB:
https://gitlab.com/UndercOdeTesting

> AND ๐‹๐ˆ๐๐Š๐„๐ƒ๐‹๐:

LinkeDin.com/in/UndercodeTesting

๐Ÿฆ‘YOU CAN CHECK in Description/Info On This Channel/Grp FOR MORE INFO & LINKS...
๐Ÿฆ‘- Riley Hassell - Exploiting Androids for Fun and Profit.pdf
9.1 MB
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘A Android Vulnerability Testing :
Exploite & more
T.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

On your linux open terminal & type:

1) git clone https://github.com/AndroidVTS/android-vts

2) cd android-vts

3) You can import this project into AndroidStudio or use gradle from the CLI. You need the Android SDK and NDK installed to properly build this project. The gradle build files look for a local.properties:
cat local.properties

4)
To build a debug APK with test signing keys:

./gradlew assembleDebug
Build and install a debug build:

./gradlew installDebug
Build a release (unsigned):

./gradlew assembleRelease

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Common Types of Viruses Affecting Your Computer:
T.me/UndercOdeTesting

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) Resident Virus
Resident viruses live in your RAM memory. It can interfere with normal system operation which can lead to the corruption of files and programs. The most popular examples of resident viruses are CMJ, Meve, MrKlunky, and Randex.

2) Multipartite Virus
This type of virus can easily spread in your computer system. It is very infectious, performing unauthorized actions in your operating system, in folders, and other programs on the computer. They have the ability to infect both the executable files and the boots sector.

3) Direct Action Virus
Direct action viruses attack certain types of files, typically .exe and .com files. The main purpose of this virus is to replicate and infect files in folders. On the lighter note, they do not typically delete files or affect PC performance and speed. It can be easily removed by antivirus programs.

4) Browser Hijacker
This type of virus infects your web browser in which it will bring you to different websites. Typically, if you key in a domain name in the internet address bar, the browser hijacker will open multiple fake websites that may harm your computer. On the other hand, most trusted browsers have built-in features to block them ahead.

5) Overwrite Virus
From the name itself, this virus overwrites the content of a file, losing the original content. It infects folders, files, and even programs. To delete this virus, you also need to get rid of your file. Thus, it is important to back up your data.

6) Web Scripting Virus
This virus lives in certain links, ads, image placement, videos, and layout of a website. These may carry malicious codes in which when you click, the viruses will be automatically downloaded or will direct you to malicious websites.

6) Boot Sector Virus
Boot sector viruses affect floppy disks. They came to existence when floppy disks are important in booting a computer. Although they are not very common today, it is still causing other computer units, especially the outdated ones. Some examples include Polyboot.B and AntiEXE.

7) Macro Virus
Macro viruses target applications and software that contain macros. These viruses can carry out series of operations affecting the performance of the program or software. Some examples of macro viruses are O97M/Y2K, Bablas, Melissa.A, and Relax.

8) Directory Virus
Directory viruses change file paths. When you run programs and software that are infected with directory viruses, the virus program also runs in the background. Further, it may be difficult for you to locate the original app or software once infected with directory viruses.

9) Polymorphic Virus
Polymorphic viruses use a special method of encoding or encryption every time they infect a system. With this, antivirus software finds it hard to locate then using signature searches. They are also capable of replicating easily. Polymorphic viruses include Satan Bug, Elkern, Tuareg, and Marburg.

10) File Infector Virus
This virus also infects executable files or programs. When you run these programs, the file infector virus is activated as well which can slow down the program and produce other damaging effects. A large block of existing viruses belongs to this category.

11) Encrypted Virus
This type of virus uses encrypted malicious codes which make antivirus software hard to detect them. They can only be detected when they decrypt themselves during replication. Although they donโ€™t delete files or folders, they can badly affect PC performance.

12) Companion Virus
This is a type of virus that doesnโ€™t survive without accompanying an existing file or folder. In order to carry out damages, the file or folder being accompanied by companion viruses should be opened or run. Some examples of companion viruses include Terrax.1069, Stator, and Asimov.1539.

13) Network Virus
Basically, this type of virus spreads out through Local Network Area (LAN) and through the internet.

@UndercOdeOfficial
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘BEST APPS FOR CODING (special PYTHON) ON ANDROID:
Twitter.com/UnderCodeTC

๐Ÿฆ‘LETS START:

1) BeeWare
> https://pybee.org/


2) Chaquopy
> https://chaquo.com/chaquopy/

3) Kivy
> https://kivy.org/#home

4) Pyqtdeploy
> https://www.riverbankcomputing.com/software/pyqtdeploy/intro

5) QPython
> http://www.qpython.com/

6) SL4A
> https://github.com/damonkohler/sl4a

7) PySide
> https://wiki.qt.io/PySide



@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Official Instagram bruteforcer tool :
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/Pure-L0G1C/Instagram

2) cd instagram

3) pip3 install -r requirements.txt

4) python3 instagram.py <username> <wordlist> -m <mode>

5) Usage :

C:\Users\Mohamed\Desktop\Instagram>python3 instagram.py -h
usage: instagram.py [-h] [-m MODE] username wordlist

positional arguments:
username email or username
wordlist password list

optional arguments:
-h, --help show this help message and exit
-m MODE, --mode MODE modes: 0 => 32 bots; 1 => 16 bots; 2 => 8 bots; 3 => 4 bots

USE FOR TESTIBNG ONLY !

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–