UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.5K links
🦑 Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

Web & Services:
Undercode.help
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
🦑Easiest XSS Testing!! [Basic Recon Tips]

Tip: Use Inspect Element to find how the input is handled by the server. i.e. if it is enclosed as ''<your_payload>'' try to escape the closing '' '' by adding ''<your_payload> in the input field. This will break the filters in most cases.
This tip is just a very basic method to bypass filters. There are numerous other ways to bypass the filters and having a little knowledge on javascript will be a advantage for you guys...

I will be sharing next levels of bypassing on my coming posts

Source
Forwarded from Exploiting Crew (Pr1vAt3)
🦑Google Dorks basics:


site:.edu “phone number”– This Dork searches for websites on .edu domains that contain the words “phone number”. student “phone number” – This Dork searches for websites on .edu domains that contain the words “student” and “phone number”.

inurl:edu “login” – This Dork searches for websites on .edu domains that contain the words “login”. This Dork searches for school websites that contain student login information.

“powered by Undercode” site:.edu – This Dork searches for websites on .edu domains that contain the words “powered by Undercode”. This Dork searches for school websites that are running on the Undercode forum software.

“powered by Undercode” site:.gov – This Dork searches for websites on .gov domains that contain the words “powered by Undercode”. This Dork searches for governmental websites that are running on the Undercode forum software.

“powered by Undercode” site:.mil – This Dork searches for websites on .mil domains that contain the words “powered by Undercode”. This Dork searches for military websites that are running on the Undercode forum software.

“powered by Undercode” inurl:.edu – This Dork searches for websites on .edu domains that contain the words “powered by Undercode”. This Dork searches for school websites that are running on the Undercode forum software.

“powered by Undercode” inurl:.mil – This Dork searches for websites on .mil domains that contain the words “powered by Undercode”. This Dork searches for military websites that are running on the Undercode forum software.

inurl:.com “powered by Undercode” – This Dork searches for websites on .com domains that contain the words “powered by Undercode”. This Dork searches for websites that are running on the Undercode forum software.

inurl:.edu “register forum” – This Dork searches for websites on .edu domains that contain the words “register forum”. This Dork searches for school websites that allow you to register for a forum.
inurl:.gov “register forum” – This Dork searches for websites on .gov domains that contain the words “register forum”. This Dork searches for governmental websites that allow you to register for a forum
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Forwarded from UNDERCODE TESTING
🦑Advanced Steganography Tool made with Python:

Installation

1. Clone the repository:
   kali@kali:~$ git clone https://github.com/Sanjipan/Steganography


2. Install required Python libraries:
   kali@kali:~$ pip install argparse
kali@kali:~$ pip install Wave
kali@kali:~$ sudo pip install opencv-python
kali@kali:~$ pip install numpy
kali@kali:~$ pip install Pillow
kali@kali:~$ pip install pytest-shutil
kali@kali:~$ pip install subprocess.run
kali@kali:~$ sudo pip install stegano


How to Use

1. Navigate to the project directory:
   kali@kali:~$ cd Steganography


2. Encoding/Decoding Files:

- For Audio Files:
- Encoding:
       sudo python3 ./Steganography.py -a -e <location of file>

- Decoding:
       sudo python3 ./Steganography.py -a -d <location of file>


- For Video Files:
- Encoding:
       sudo python3 ./Steganography.py -v -e <location of file>

- Decoding:
       sudo python3 ./Steganography.py -v -d <location of file>


- For Image Files:
- Encoding:
       sudo python3 ./Steganography.py -i -e <location of file>

- Decoding:
       sudo python3 ./Steganography.py -i -d <location of file>


- For Text Files:
- Encoding:
       sudo python3 ./Steganography.py -t -e <location of file>

- Decoding:
       sudo python3 ./Steganography.py -t -d <location of file>


3. For Help:
   sudo python3 ./Steganography.py -h
sudo python3 ./Steganography.py --help


For more detailed usage and code, visit the repository [here](https://github.com/Sanjipan/Steganography).