UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.3K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
πŸ¦‘Simple demonstration of storage XSS

1) We assume that there is such a website where people leave a message, the system will store the message on the server

2) We still use OWASP to demonstrate


3) There is a message system here, let's leave a comment


4) We tested it and found that we can completely keep our message in the system
πŸ¦‘ full xss tutorial
t.me/undercodeTesting
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘news: Cisco opens API to third parties to extend intent-based networks :
fb.com/undercodeTesting

1) Cisco announced the launch of an API that allows third-party developers to program their campuses and wide area networks (WANs) to improve the integration of third-party devices and IT processes.

2) Sachin Gupta, senior vice president of Cisco Enterprise Networks, said that end-to-end visibility in the network is critical for network managers. "Using these APIs, network administrators can manage controllers and switches from HPE, Aruba or Huawei, which makes the inclusion of third-party devices flexible and simple." This is also an extension of Cisco's intent-based network strategy launched a year ago .

3) Gupta added that Cisco's API opens the network to developers so that they can write custom applications without understanding the network.

4) Cisco's goal is to make the network more programmable. The concept of IBN is that network administrators can convert their business intent through automatic activation strategies instead of manually converting the intent into a large number of lines of code.

5) The API will allow network operators to manage third-party devices through the DNA center, which will effectively act as a centralized network controller. From Cisco's point of view, this is important because even if network operators introduce equipment from Cisco partners or even competitors, Cisco can retain customer relationships. In addition, this move will also promote the relationship between network operations and IT business operations teams.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ A good tool for reading source code-tips for using Replace in Path in Intellij IDEA full
instagram.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Match case : If this button is checked, upper and lower case letters will be distinguished when searching.

2) Preserve case: If this button is checked, the search is not case sensitive, but when replacing, the first letter of the string you give will be replaced with lower case.

For example, if you type HelloWorld, it will be replaced with helloWorld.

3) Regex : You can use regular expression search, refer to java.util.regex.

4) There are several options for the blue funnel in the upper right corner:


5) File mask: You can filter the file format to be found. You can use wildcards:


Multiple files can be specified at the same time, separated by commas. note:! , That is, the negative mode, implicitly uses * matching.

6) Search field: This is the one we use the most, namely-the search box, which can be entered manually, or you can click the drop-down box to find the history. Regular expressions can also be used.

7) Replace field: Replace the field, you can specify the replacement text, you can also use the expression to replace the text, if you want to use \ in the expression, you need to insert three extra backslashes in front of the escape.

8) In Project: Search within your own project scope.

9) Module: Search in the module, you can specify the module, and you can switch the module in the drop-down box.

10) Directory: Search in the specified directory. The small file tree icon on the right seems to be useless ...

11)Scope: search within the specified range. There are various ranges in the drop-down box.

12) Preview area: Of course, the most powerful one is still the preview window. You can use the arrow keys to preview up and down, and you can edit in the preview box.

13) The most dangerous is the following operation:

πŸ¦‘When you refactor it, if it doesn't work well, replace it all. . . . . That would be embarrassing.

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ FRESH PREMIUM PROXIES :
t.me/undercodeTesting

1m 36s ago 117.6.112.47 55443 Elite Vietnam 2/1 118ms
1m 37s ago 115.213.228.132 3000 Elite China 1/0 55ms
1m 39s ago 167.99.166.194 8081 Elite United States 2/1 55ms
1m 41s ago 138.68.53.44 8118 Elite United States 2/0 482ms
1m 43s ago 108.74.113.180 80 Elite United States 3/0 50ms
1m 43s ago 75.80.242.9 41007 Elite United States 2/1 191ms
1m 47s ago 209.80.12.183 80 Elite United States 2/0 930ms
1m 48s ago 172.254.124.231 3128 Elite United States 2/0 54ms
1m 55s ago 165.227.182.151 8888 Elite United States 1/0 41ms
1m 57s ago 72.182.145.208 80 Elite United States 5/3 339ms
2m 5s ago 46.253.185.128 8118 Elite Switzerland 1/0 114ms
2m 7s ago 193.59.27.71 36748 Elite Poland 2/0 495ms
2m 8s ago 213.6.146.66 33746 Elite Palestine 1/0 565ms
2m 9s ago 193.95.228.13 53281 Elite Slovenia 2/0 113ms
2m 9s ago 41.170.12.92 37444 Elite South Africa 1/0 62ms
2m 10s ago 166.98.140.50 8080 Elite United States 640/168 266ms
2m 10s ago 66.42.65.149 8118 Elite United States 2/0 43ms
2m 11s ago 41.79.66.106 58369 Elite Nigeria 1/0 479ms
2m 12s ago 208.67.183.240 80 Elite United States 3/0 850ms
2m 12s ago 62.250.97.199 80 Elite Netherlands 1/0 484ms
2m 13s ago 191.98.198.42 56633 Elite Panama 1/0 325ms
2m 13s ago 207.144.111.230 8080 Elite United States 3/0 298ms
2m 13s ago 94.73.239.124 55443 Elite Russia 1/0 103ms
2m 14s ago 213.16.81.189 54040 Elite Hungary 2/0

@UndercodeOfficial
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ WORKING LASTEST NORDVPN :


gaming_yeti@hotmail.com:sasquatch10
brianleong96@gmail.com:19961025b
nguyen.richard@hotmail.com:manchester7
the_griff_2003@hotmail.com:cCk2ghd86
grim-eyes@live.com:bmf1mbm00
Mannyd0719@gmail.com:Math8000
rjy2281@gmail.com:fisher222
keaton2800@hotmail.co.uk:Rachel2800
enriquewilliams20@yahoo.com:Imadome123
lexandjason@gmail.com:slater69
joninwm@yahoo.com:hooters2
idahogeology@yahoo.com:Richard1
danjshapiro@yahoo.com:Adin1023
drasia10@yahoo.com:dthvPA123
randysesariojr@gmail.com:ninja3221
k_leepearce@hotmail.com:nokiae71
jooga02@gmail.com:copperbird4
jwylie22@hotmail.com:dookie22
fulhamhamster09@googlemail.com:hamster123
quentinde3i1103@gmail.com:Quentinde3
rplim.b@gmail.com:Q1yfe5G5
jaspertchang@gmail.com:Casperc811
bethsharae@gmail.com:bsc10785
ply_1234@yahoo.com:Royalty9
nstonetile@aol.com:m5a9r8c0
ygagne@gmail.com:gu1doune
cynthg2834@gmail.com:orangeblue
smacchesney@gmail.com:ruffryders

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
e n j o y
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ¦‘ for experts :
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Grab and analyze :
crawl and analyze a file is very simple. This tutorial will lead you step by step through an example. let's start!

1) γ€€γ€€First, I must decide the URL address that we will crawl. It can be set in the script or passed through $ QUERY_STRING. For simplicity, let's set the variables directly in the script.

<?
$ Url = 'http://www.php.net' ;
?>

2) γ€€γ€€The second step, we crawl the specified file, and by file () function it exists in an array.

<?
$ url = 'http://www.php.net' ;
$ lines_array = file ( $ url );
?>

3) γ€€γ€€Okay, now there are already files in the array. However, the text we want to analyze may not be all in one line. To understand this file, we can simply convert the array $ lines_array into a string. We can use the implode (x, y) function to achieve it. If you want to use explode (array of string variables) later, it may be better to set x to "|" or "!" Or other similar delimiters. But for our purposes, it is best to set x to a space. y is another necessary parameter because it is the array you want to process with implode ().

<?
$ url = 'http:;
$ lines_array = file ( $ url );
$ lines_string = implode ( '' , $ lines_array );
?>

4) γ€€γ€€Now that the crawling work is done, it is time to analyze it. For the purpose of this example, we want to get everything from <head> to </ head>. In order to parse out strings, we also need something called regular expressions.

<?
$ url = 'http://www.php.net' ;
$ lines_array = file ( $ url );
$ lines_string = implode ( '' , $ lines_array );
eregi ( "<head> (. *) </ head> " , $ lines_string ,$ head );
?>

5) γ€€γ€€Let's take a look at the code. As you can see, the eregi () function is executed in the following format:

eregi ("<head> (. *) </ Head>", $ lines_string, $ head);

γ€€γ€€"(. *)" Means everything and can be explained For, "Analyze all things between <head> and </ head>". $ lines_string is the string we are analyzing, and $ head is the array where the analyzed results are stored.

6) γ€€γ€€Finally, we can lose data. Because there is only one instance between <head> and </ head>, we can safely assume that there is only one element in the array, and that is what we want. Let's print it.

<?
$ url = 'http://www.php.net' ;
$ lines_array = file ( $ url );
$ lines_string = implode ( '' , $ lines_array );
eregi ( "<head> (. *) </ head> " ,);
echo $ head [ 0 ];
?>

7) γ€€γ€€This is all the code.
<? php
$ url = 'http://www.php.net' ;
$ lines_array = file ( $ url );
$ lines_string = implode ( '' , $ lines_array );
preg_match_all ( "/ <body ([^>] . +?)> (. *) <\ / body> / is " , $ lines_string , $ m );
echo " <xmp> " ;
echo $ m [ 2 ] [ 0 ];
?>
written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Crawling and analysis by Undercode :
> Grabbing and analyzing a file is very simple. This tutorial will lead you step by step through an example. let's start!

1) First, I must decide the URL address that we will crawl. It can be set in the script or passed through $ QUERY_STRING. For simplicity, let's set the variables directly in the script.

<?
$ url = 'http://www.php.net'
;?> In the

2) second step, we grab the specified file and store it in an array through the file () function.

<?
$ url = 'http://www.php.net';
$ lines_array = file ($ url);
?>

γ€€3) γ€€Okay, now there are already files in the array. However, the text we want to analyze may not be all in one line. To understand this file, we can simply convert the array $ lines_array into a string. We can use the implode (x, y) function to achieve it. If you want to use explode (array of string variables) later, it may be better to set x to "|" or "!" Or other similar delimiters. But for our purposes, it is best to set x to a space. y is another necessary parameter because it is the array you want to process with implode ().

<?
$ url = 'http://www.php.net';
$ lines_array = file ($ url);
$ lines_string = implode ('', $ lines_array);
?>
4) γ€€Now that the crawling is done, it's time to analyze it. For the purpose of this example, we want to get everything from <head> to </ head>. In order to parse out strings, we also need something called regular expressions.

<?
$ url = 'http://www.php.net';
$ lines_array = file ($ url);
$ lines_string = implode ('', $ lines_array);
eregi ("<head> (. *) </ head> ", $ lines_string, $ head);
?>

πŸ¦‘ Let us look at the code. As you can see, the eregi () function is executed in the following format:

eregi ("<head> (. *) </ Head>", $ lines_string, $ head);

γ€€γ€€"(. *)" Means everything and can be explained For, "Analyze all things between <head> and </ head>". $ lines_string is the string we are analyzing, and $ head is the array where the analyzed results are stored.

πŸ¦‘ γ€€Finally, we can lose data. Because there is only one instance between <head> and </ head>, we can safely assume that there is only one element in the array, and that is what we want. Let's print it.

<?
$ url = 'http://www.php.net';
$ lines_array = file ($ url);

eregi ("<head> (. *) </ head>", $ lines_string, $ head);
echo $ head [0];
?>

γ€€γ€€This is all the code.

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚

πŸ¦‘ Make an xbm picturexbm is a simple two-color image bitmap format, which is used more in the early cgi. It is currently used for counters.
<? php

t.me/undercodeTesting
setXBM (1234567890,0);

function setXBM ($ num, $ mode = 0) {
settype ( $ num, "string");
$ mode = $ mode? 0xff: 0x00;
$ int_width = strlen ($ num); // digits
$ count_width = 8; // single digit width
$ count_height = 16; // height

$ bitmap = array (
0 => array (0xff, 0xff, 0xff, 0xc3, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0x99, 0xc3, 0xff, 0xff, 0xff),
1 => array (0xff, 0xff , 0xff, 0xcf, 0xc7, 0xcf, 0xcf, 0xcf, 0xcf, 0xcf, 0xcf, 0xcf, 0xcf, 0xff, 0xff, 0xff),
2 => array (0xff, 0xff, 0xff, 0xc3, 0x99, 0x9f, 0x9f, 0x , 0xe7, 0xf3, 0xf9, 0xf9, 0x81, 0xff, 0xff, 0xff),
3 => array(0xff, 0xff, 0xff, 0xc3, 0x99, 0x9f, 0x9f, 0xc7, 0x9f, 0x9f, 0x9f, 0x99, 0xc3, 0xff, 0xff, 0xff),
4 => array(0xff, 0xff, 0xff, 0xcf, 0xcf, 0xc7, 0xc7, 0xcb, 0xcb, 0xcd, 0x81, 0xcf, 0x87, 0xff, 0xff, 0xff),
5 => array(0xff, 0xff, 0xff, 0x81, 0xf9, 0xf9, 0xf9, 0xc1, 0x9f, 0x9f, 0x9f, 0x99, 0xc3, 0xff, 0xff, 0xff),
6 => array(0xff, 0xff, 0xff, 0xc7, 0xf3, 0xf9, 0xf9, 0xc1, 0x99, 0x99, 0x99, 0x99, 0xc3, 0xff, 0xff, 0xff),
7 => array(0xff, 0xff, 0xff, 0x81, 0x99, 0x9f, 0x9f, 0xcf, 0xcf, 0xe7, 0xe7, 0xf3, 0xf3, 0xff, 0xff, 0xff),
8 => array(0xff, 0xff, 0xff, 0xc3, 0x99, 0x99, 0x99, 0xc3, 0x99, 0x99, 0x99, 0x99, 0xc3, 0xff, 0xff, 0xff),
9 => array(0xff, 0xff, 0xff, 0xc3, 0x99, 0x99, 0x99, 0x99, 0x83, 0x9f, 0x9f, 0xcf, 0xe3, 0xff, 0xff, 0xff)
);

echo "#define counter_width " .($count_width * $int_width)."\r\n";
echo "#define counter_height " .$count_height. "\r\n";
echo "static unsigned char counter_bits[] = {\r\n";
for($i=0; $i<$count_height; ++$i) {
for($j = 0; $j < $int_width; ++$j) {
printf("0x%2x, ",$bitmap[$num[$j]][$i]^$mode);
}
}
written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚
πŸ¦‘expert hacking by undercode