UNDERCODE COMMUNITY
2.75K subscribers
1.24K photos
31 videos
2.65K files
87.5K links
πŸ¦‘ Undercode World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE


✨ Youtube.com/Undercode
by Undercode.help
Download Telegram
πŸ¦‘Some interesting Termux/Linux #tool

> httptunnel creates a bidirectional virtual data path tunnelled in HTTP
requests. The requests can be sent via an HTTP proxy if so desired.

>This can be useful for users behind restrictive firewalls. If WWW
access is allowed through an HTTP proxy, it's possible to use
httptunnel and, say, telnet or PPP to connect to a computer outside
the firewall.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1️⃣git clone https://github.com/larsbrinkhoff/httptunnel.git

2️⃣cd httptunnel

3️⃣chmod 777 autogen.sh

4️⃣./autogen.sh

5️⃣EXAMPLES

πŸ•³ start httptunnel server:

1) At host REMOTE, start hts like this:
hts -F localhost:23 8888 (set up httptunnel server to listen on port 8888 and forward to localhost:23)

2) start httptunnel client:
At host LOCAL, start htc like this:
htc -F 2323 -P PROXY_ADDRESS:8000 REMOTE_IP:8888 (set up httptunnel client to forward localhost:2323 to REMOTE_IP:8888 via a local proxy at PROXY_ADDRESS:8000)

3) or, if using a buffering HTTP proxy:
htc -F 2323 -P PROXY_ADDRESS:8000 -B 48K REMOTE_IP:8888

4) Now you can do this at host LOCAL:
telnet localhost 2323 (telnet in to REMOTE_IP:8888 via your httptunnel you just configured above on port localhost:2323)
...and you will hopefully get a login prompt from host REMOTE_IP.

πŸ•³Debugging:

5) For debug output, add -Dn to the end of a command, where n is the level of debug output you'd like to see, with 0 meaning no debug messages at all, and 5 being the highest level (verbose).

6) ex: htc -F 10001 -P PROXY_ADDRESS:8000 REMOTE_IP:8888 -D5 will show verbose debug output (level 5 debugging) while setting up an httptunnel client to forward localhost:10001 to REMOTE_IP:8888 via a local proxy at PROXY_ADDRESS:8000

6️⃣Related Docs :

πŸ•³https://sergvergara.files.wordpress.com/2011/04/http_tunnel.pdf - excellent httptunnel tutorial, examples, & info

πŸ•³http://sebsauvage.net/punching/ - another excellent example

πŸ•³https://daniel.haxx.se/docs/sshproxy.html - more useful info

πŸ•³http://neophob.com/2006/10/gnu-httptunnel-v33-windows-binaries/ -

πŸ•³httptunnel Win32 binaries (download here)

πŸ•³Google search for "http tunnel v3.3" - brings up lots of good links to httptunnel (this search seems to work better than searching for "httptunnel" alone since the latter brings up many generic search results or results pertaining to other tools)

enjoyβ€οΈπŸ‘πŸ»
βœ…Topic git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘maybee you have Toolx THE GREAT TOOL
Still need more ?
#tool

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

$ apt update

$ apt upgrade

$ apt install git

$ git clone https://github.com/Ranginang67/DarkFly-Tool

$ cd DarkFly-Tool

$ chmod +x

$ sh install

Run :

$ DarkFly


enjoyβ€οΈπŸ‘πŸ»
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Another web hacking #tool

F E A T U R E S :

-A port scanner

-SQL injection scanner

-Dork checker

-Hash cracker

-Hash type verification tool

-Proxy finding tool

-XSS scanner

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/Ekultek/Pybelt.git

2) cd Pybelt

3) pip install -r requirements.txt

4) C O M M A N D S:

python pybelt.py -p 127.0.0.1 Will run a port scan on your local host

python pybelt.py -s http://example.com/php?id=2 Will run a SQLi scan on the given URL

python pybelt.py -d idea?id=55 Will run a Dork check on the given Google Dork

python pybelt.py -c 9a8b1b7eee229046fc2701b228fc2aff:all Will attempt to crack the hash using all algorithms available on the computer

python pybelt.py -v 098f6bcd4621d373cade4e832627b4f6 Will try to verify the hash type

python pybelt.py -f Will find usable proxies

python pybelt.py -x http://127.0.0.1/php?id=1 Will search the URL for XSS vulnerability

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘A #tool to dump a git repository from a website.

1) git clone https://github.com/arthaud/git-dumper.git?

2)cd git-dumper

3) pip install -r requirements.txt

4) ./git-dumper.py http://website.com/.git ~/website

F E A T U R E S :

-Fetch all common files (.gitignore, .git/HEAD, .git/index, etc.);

-Find as many refs as possible (such as refs/heads/master, refs/remotes/origin/HEAD, etc.) by analyzing .git/HEAD, .git/logs/HEAD, .git/config, .git/packed-refs and so on;

-Find as many objects (sha1) as possible by analyzing .git/packed-refs, .git/index, .git/refs/* and .git/logs/*;

-Fetch all objects recursively, analyzing each commits to find their parents;

-Run git checkout . to recover the current working tree

βœ…
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible..->
#tool


πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/FortyNorthSecurity/EyeWitness.git

2) cd Navigate into the CS directory

3) Load EyeWitness.sln into Visual Studio

4) Go to Build at the top and then Build Solution if no modifications are wanted

5) EyeWitness.exe --help

6) EyeWitness.exe -f C:\Path\to\urls.txt

7) EyeWitness.exe -f C:\Path\to\urls.txt -d [timeout in seconds] -c

8) ./EyeWitness.py -f filename --timeout optionaltimeout

E X A M P L E :

./EyeWitness -f urls.txt --web

./EyeWitness -x urls.xml --timeout 8

./EyeWitness.py -f urls.txt --web --proxy-ip 127.0.0.1 --proxy-port 8080 --proxy-type socks5 --timeout 120

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
TODAY TOPIC :

COMMAND AND CONTROL WEBSITE/WMI
https://t.me/UnderCodeTesting/11804
https://t.me/UnderCodeTesting/11805

SQLMAP GUIDE & ALOT OF STUFFS PDF
https://t.me/UnderCodeTesting/11806

Become a professional trader 4GB
https://t.me/UnderCodeTesting/11815

New mobile phone battery is dangerous to charge for 12 hours in the first three times #Tip
https://t.me/UnderCodeTesting/11816

run postfix with smtp authentication (sasldb) in a docker container. TLS and OpenDKIM support are optional #tool
https://t.me/UnderCodeTesting/11817

HACK ANY LINUX
https://t.me/UnderCodeTesting/11819

XSS-Finder: a super powerful and advanced cross-site scripting scanner
https://t.me/UnderCodeTesting/11820

How to find out the creation time of a file on Linux using Debugfs
https://t.me/UnderCodeTesting/11821

2020 Update #Decryption - A command line that recreates the famous data decryption effect seen in the 1992 movie Sneakers.
https://t.me/UnderCodeTesting/11822

How to track traffic from a smartphone using Wireshark & hack wifi/phone.... ALL VIDEOS
https://t.me/UnderCodeTesting/11823

Install TWRP on Android devices
https://t.me/UnderCodeTesting/11824

A Lessons about database
https://t.me/UnderCodeTesting/11825

Wifi Hacking/network applications 2020 new list
https://t.me/UnderCodeTesting/11826

How to configure Apache as an external proxy for Node.js
https://t.me/UnderCodeTesting/11827

What is DOM (Document Object Model)?
Setting up Android Studio and Emulators
Basics of adb
Decompiling apks
Insecure Logging
Hardcoding Issues
Insecure Data Storage
Input Valdiation Issues
Drozer
Finding Attack Surfaces
Access Control Issues
Content Provider Injections
General Bug Hunting Tips
https://t.me/UnderCodeTesting/11828

LEANR Awesome course
https://t.me/UnderCodeTesting/11829