UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.7K links
🦑 Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

Web & Services:
Undercode.help
Download Telegram
Forwarded from UNDERCODE TESTING
🦑Crypto-bruteforce:

Overview of Features:
1. Mnemonic Generation and Verification:
- Generates random BIP39 mnemonic phrases.
- Verifies mnemonics for Ethereum, BNB, and Dogecoin wallets.

2. Standalone Execution:
- Comes with precompiled binaries for direct use without needing Python installed.
- Binaries are available for download in its GitHub releases.

3. Automatic Setup:
- Automatically installs Python and dependencies (Cryptofuzz, Colorthon, Requests) if missing.
- Configures the environment for script execution.

4. Open Source:
- Fully open-source and accessible via GitHub.

---

### Installation & Usage:

#### 1. Standalone Binary:
- Download the binary file:
[DumperMnemonic.zip](https://github.com/welugroup/cryptocurency_catcher/releases/download/t/DumperMnemonic.zip)
- Extract and run the program without needing Python installed.

#### 2. Run with Git and Python:
- Clone the repository:
     git clone https://github.com/welugroup/cryptocurency_catcher
cd cryptocurency_catcher
python DumperMnemonic.py


#### 3. Install Python Libraries:
If you prefer manual installation:
   pip install cryptofuzz
pip install colorthon
pip install requests
pip install requests-random-user-agent

Or install from the requirements file:
   pip install -r requirements.txt


#### 4. Running the Script:
- After dependencies are set:
     python DumperMnemonic.py


---

### Potential Uses:
1. Crypto Wallet Testing:
Generate and test mnemonic phrases for various blockchain networks.

2. Education and Learning:
Useful for understanding mnemonic creation, address derivation, and seed phrase management.

3. Exploration of Mnemonic Systems:
Analyze the security and randomness of generated mnemonics.

---

### GitHub Link:
Access the tool and documentation here:
[Dumper Mnemonic Repository](https://github.com/welugroup/cryptocurency_catcher)

Let me know if you'd like further assistance with setup or usage!
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Forwarded from UNDERCODE TESTING
🌐 Common Networking Port Numbers:

1️⃣ Port 22 (SSH): Used for Secure Shell (SSH) connections, enabling secure access to remote servers.
2️⃣ Port 80 (HTTP): The standard port for unencrypted web traffic; used by HTTP protocols for web browsing.
3️⃣ Port 443 (HTTPS): Secure HTTP port, vital for encrypted web traffic, ensuring safe data transfer online.
4️⃣ Port 53 (DNS): Domain Name System port, used for translating domain names to IP addresses.
5️⃣ Port 25 (SMTP): Simple Mail Transfer Protocol, responsible for email transmission.
6️⃣ Port 1433 (SQL Server): Microsoft SQL Server communication port, essential for database interactions.
7️⃣ Port 3389 (RDP): Remote Desktop Protocol port, used for remote access to Windows servers.
8️⃣ Port 3306 (MySQL): Default port for MySQL database connections.
9️⃣ Port 123 (NTP): Network Time Protocol, used to synchronize time across systems.

Source: Linkedin