UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 TOPIC get Facebook data, and some Facebook bots, and extra tools found on Facebook Toolkit ++.

πŸ¦‘FEATURES :

Get Access Token βœ… get access token your facebook account
Account Information βœ… view your account information
Dump ID βœ… retrieve all your friend's ID data
Dump Email βœ… retrieve all your friend's Email data
Dump Name βœ… retrieve all your friend's Name data
Dump Birthday βœ… retrieve all your friend's Birthday data
Dump Gender βœ… retrieve all your friend's Gender data
Dump Location βœ… retrieve all your friend's Location data
Dump URL Profile βœ… retrieve all your friend's url profile data
Dump Mobile Number βœ… retrieve all your friend's mobile number data
Dump Religion βœ… retrieve all your friend's religion data
Dump Username βœ… retrieve all your friend's username data
Dump Bio βœ… retrieve all your friend's bio data
Dump About βœ… retrieve all your friend's about data
Filter Yahoo Mail βœ… separate all Yahoo e-mails [yahoo.com]
Yahoo Mail Validation βœ… validate all Yahoo e-mails
Clean Result βœ… clean the result folder
Delete ALL Post βœ… clean all your posts
Unfriend ALL βœ… clean all your friends
Confirmation ALL βœ… confirm all friend requests
Confirmation ALL [Male] βœ… confirm all friend requests based on male sex
Confirmation ALL [Female] βœ… onfirm all friend requests based on female sex
View Data βœ… see your friends data based on your username or ID
Dump ID Member Group βœ… retrieve all ID member on group database
Dump Username Profile Member Group βœ… retrieve all username member on group database
Dump URL Profile Member Group βœ… retrieve all url profile member on group database
Brute Force ID βœ… brute force your friends by ID
Brute Force ID Member Group βœ… brute force Member Group by ID

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

TERMUX -LINUX

1️⃣pkg install php

2️⃣pkg install curl

3️⃣pkg update

4️⃣git clone https://github.com/warifp/FacebookToolkit

5️⃣Enough to execute the command :

php run.php
Cek list menu tools, use the command :

php run.php -m
Cek author, use the command :

php run.php -a
Cek version, use the command :

php run.php -v
Cek update, use the command :

php run.php -u
and help, use the command :

php run.php -h

βœ…Git 2020 sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘FASTEST WAY TRACKING IP ADRESS FOR NOOBS :
-Termux Linux new release :

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

apt update

apt install git -y

git clone https://github.com/rajkumardusad/IP-Tracer.git

cd IP-Tracer

chmod +x install

sh install or ./install

How to use IP-Tracer
trace -m to track your own ip address.

trace -t target-ip to track other's ip address for example ip-tracer -t 127.0.0.1

trace for more information.

OR

ip-tracer -m to track your own ip address.

ip-tracer -t target-ip to track other's ip address for example ip-tracer -t 127.0.0.1

βœ…git 2020 sources
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘NETFLIX CHECKER ON GITHUB

https://github.com/AbdeslemSmahi/NetflixChecker

πŸ¦‘Features:

Python 3.x
Simple readable code
Mass Accounts checker
Combolist support
HTTP Proxy Support

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE SECURITY
πŸ¦‘WIFI IN USA & UK NOW :

> In some countries it is not allowed to use the frequencies of some Wi-Fi channels (for example, in the USA you cannot use channels 12, 13 and 14).

> Most countries have a Wi-Fi signal limit of 20.0 dBm. But there are countries in which there is a limit of 30.0 dBm. You can take advantage of this loophole (to make a Wi-Fi card think that it is in a country where 30.0 dBm is allowed) and raise its power (TX Power) to a value of 30.0 dBm.
Forwarded from UNDERCODE SECURITY
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘BEST WIFI ADPATER FOR KALI 2020

> 5 GHz band support
Two band, including those with 5 GHz support, are, for example, cards:

1-Alfa AWUS051NH
http://rover.ebay.com/rover/1/711-53200-19255-0/1?icep_ff3=9&pub=5575132165&toolid=10001&campid=5337870315&customid=&icep_uq=Alfa+AWUS051NH&icep_sellerId=&icep_ex_kw=&icep_sortBy=12&icep_catId=&icep_minPrice=&icep_maxPrice=&ipn=psmain&icep_vectorid=229466&kwid=902099&mtid=824&kw=lg

2-Alfa AWUS052NH
http://rover.ebay.com/rover/1/711-53200-19255-0/1?icep_ff3=9&pub=5575132165&toolid=10001&campid=5337870315&customid=&icep_uq=Alfa+AWUS052NH&icep_sellerId=&icep_ex_kw=&icep_sortBy=12&icep_catId=&icep_minPrice=&icep_maxPrice=&ipn=psmain&icep_vectorid=229466&kwid=902099&mtid=824&kw=lg

πŸ¦‘Intel's latest Wi-Fi adapters built into laptops

> They show 5 GHz APs and are capable of intercepting data.

However, when testing the ability to inject, different users receive different data. For some users, everything works, for some at 5 GHz it can only inject on channels 36 to 48. On others (52 to 116), where there is radar detection, there are some problems with the injection of deauthentication packets. In some, the injections do not work on all channels. I belong to the latter - my injection test failed on all tried and tested channels. It is possible that such a spread is associated with a bug in aireplay-ng , the author of the program on the forum confirmed its presence, at the moment the
error has not been fixed.

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘BASIC WIFI HACKING BY UNDERCODE

BSSID is the MAC address of the wireless card. Example MAC address: 50: 46: 5D: 6E: 8C: 20. They are described in more detail in the note β€œ How to find out the MAC address and How to find out the manufacturer by MAC address ”.

Handshake (also hendsheyk , handshake ) - data exchanged between the station and the access point at the time of the creation of Wi-Fi connection. This data contains information that allows you to select a password from a Wi-Fi network.

Brute-force (also full search ) is a method of attacking a password, which consists in enumerating all possible password options. It requires a lot of time and computing resources.

Dictionary search ( dictionary attack ) is a method of attacking a password, which consists in enumerating frequently occurring password options. It has a good ratio of resources spent to the results obtained.

Wi-Fi password brute force is a password guessing method that involves connecting to an Access Point with various password candidates. Practically not applicable due to the extremely low speed of search.

Offline Wi-Fi password guessing is a password guessing method that involves grabbing a Handshake and picking up a password that matches that handshake. This selection does not require connection to an Access Point and is performed many orders of magnitude faster than online search. It can also be performed on the computing power of video cards, which increases the speed of search by several orders of magnitude.

WPA and WPA2 - technology for secure access to Wi-Fi, has replaced the outdated technology of WEP.

A wireless Wi-Fi card (or a wireless Wi-Fi adapter ) is any network card that can connect to a Wi-Fi network. On laptops and phones, they are built into the case; on desktop computers, they usually represent an external device that connects via USB.

Monitor mode ( Monitor-Mode ) - the property of some wireless cards receive data packets, which are designed not only for them but also for other wireless devices.

Network interface - the name, symbol in Linux for network cards / adapters.

A Wi-Fi network channel is a conventional digital designation of the frequency at which the Access Point is currently operating.

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘#Wi-Fi Hacking Software list 4
This list Special for Kali Users


1️⃣airodump-ng is a tool for capturing wireless packets. Very often used to capture four-stage handshakes, which are later used to crack a Wi-Fi network password. It can capture any frames of wireless networks for further analysis.
https://kali.tools/?p=411

2️⃣airodump-ng is a tool for capturing wireless packets. Very often used to capture four-stage handshakes, which are later used to crack a Wi-Fi network password. It can capture any frames of wireless networks for further analysis.
https://kali.tools/?p=411

3️⃣boopsniff - a program from the BoopSuite package to show access points in the range of accessibility and capture handshakes.
https://kali.tools/?p=3409

4️⃣WPA2-HalfHandshake-Crack is a working concept to demonstrate the possibility of hacking a WPA2 network by grabbing a handshake from a user trying to connect to a fake AP. Those. grabs a half handshake.
https://kali.tools/?p=2794

5️⃣Reaver is designed to select the WPS (Wifi Protected Setup) pin by brute force. Reaver was created for a reliable and practical attack on WPS; it was tested on a large number of access points with different WPS implementations. On average, Reaver reveals the WPA / WPA2 password in plain text to the target access point (AP) for 4-10 hours, depending on the AP. In practice, he usually needs half this time to guess the WPS pin and guess the password.
https://kali.tools/?p=355

6️⃣Pixiewps is a tool written in C that is used to offline brute force the WPS pin by exploiting the low or nonexistent entropy of some access points (pixie dust attack).
> https://kali.tools/?p=351

πŸ¦‘Those some from kali wifi hacking tools - Kali is a good hacking os

but don't even mind the Undercode Linux Os that we use their include more than those tools and more automation for wifi hacking ...

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE HACKING
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Client installation under Windows
#Fast Tip
Let's look at what happens when you install the client on Windows. No matter how hidden the process of installing the server, some initial data will still have to be set, explicitly requesting it from the user or setting some default values.

During the installation process of the InterBase client, you need to specify the directory where InterBase will be installed

> let's call it <InterBase root>. Client installation includes the following steps:

1)Copy files included in the client.

2) Register files for sharing.

3) Create registry keys.

4)Registration of the TCP / IP service.

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘GuardMiner mining trojan has recently been active and has the ability to actively attack worms.

1️⃣The Trojan will scan and attack multiple server component vulnerabilities in Redis, Drupal, Hadoop, Spring, thinkphp, WebLogic, SQLServer, Elasticsearch, and Windows and Linux under attack.

2️⃣ The malicious scripts init.ps1 and init.sh are executed in the system, and the malicious script will further download the Monero mining trojan, remove the competitive mining trojan and perform local persistent operation. In the Linux system, use SSH connection and Redis weak password blasting to conduct intranet proliferation attacks.

3️⃣ Init.ps1 attacks the Windows system, downloads the mining process phpupdate.exe from the server, configuration file config.json, scans the attack process networkmanager.exe, persistent script newdat.ps1, mining daemon phpguard.exe, clean script clean .bat.

4️⃣ Init.sh attacks the Linux system, downloads the mining process phpupdate from the server, the configuration file config.json, the persistent script newdat.sh, scans the attack process networkmanager, and mining daemon phpuguard.

5️⃣The three sets of mining pools and wallets used for mining are as follows:
xmr.f2pool.com : 13531
43zqYTWj1JG1H1idZFQWwJZLTos3hbJ5iR3tJpEtwEi43UBbzPeaQxCRysdjYTtdc8aHao7csiWa5BTP9PfwozyfS520

xmr-eu2.nanopool.org:
14444 43zqYTWj1JG1H1idZFQWwJZLTos3hbJ5iR3tJpEtwEi43UBbzPeaQxCRysdjYTtdc8aHao7csiWa5BTP9PfNYzyfSbbrwoR.v520

randomxmonero.hk.nicehash.com:3380
3HVQkSGfvyyQ8ACpShBhegoKGLuTCMCiAr.v520

....
@UndercodeNews
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘A Hackers framework topic git:

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

$ git clone https://github.com/Eitenne/roxysploit.git; cd roxysploit; sudo /bin/bash install

πŸ¦‘OS :

Arch Linux Working
Kali Linux Working
Ubuntu Working
Debian Working
Centos Not Tested
MacOSX Needs porting
Windows Ha no.

> RUN :

rsf > use Picklock
rsf (plugins/picklock) > help


βœ…Git TOPIC sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘information gathering :
AngryFuzz3r is a collection of tools for pentesting to gather information and discover vulnerabilities of the targets based on Fuzzedb

πŸ¦‘FEATURES :

-Fuzz url set from an input file
-Concurrent relative path search
-Configurable number of fuzzing workers
-Fuzz CMS ==> Wordpress,Durpal,Joomla
-Generate reports of the valid paths

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1️⃣git clone https://github.com/ihebski/angryFuzzer.git

2️⃣ cd angryFuzzer

3️⃣$ python angryFuzzer.py -h
Usage: angryFuzzer.py options

4️⃣Examples :

> Fuzzing an url with default dictionary

 angryFuzzer.py -u http://127.0.0.1 

> Fuzzing CMS (wp: in this exemple !)

 angryFuzzer.py -u http://127.0.0.1 --cms wp 

> Fuzzing a custom Wordlist

python angryFuzzer.py -u http://127.0.0.1 -w fuzzdb/discovery/predictable-filepaths/php/PHP.txt

βœ…git sources
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘MCSD 70-483 C# Complete Preparation Course + Practice Exams β€”3.9 GB


REMOVED REQUEST @UNDERCODE_TESTING
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘RANSOMWARE 2020 :


FEATURES :

Generate a ransomware payload
With or without GUI payload
FUD (Fully Undetectable by Anti-Virus)
Works on Windows, MacOS and Linux
Super fast encryption with PyCrypto
Compile to EXE, APP or Unix/Linux executable
Custom icon for your EXE payload
Receive keys of victims
Decrypt files
Demo mode (payload won't encrypt anything)
Fullscreen mode (Warning takes over the screen)
Custom warning message for your victim
Custom image in your payload
Ghost mode (Rename by adding .DEMON extention instead of encrypting the files)
Multiple encryption methods
Select file extentions to target
Decide if payload should self-destruct (Console mode feature only)
Decide wich drive to target for encryption (working directory)
Verified server access through port forwarding VPN

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

 clone https://github.com/leonv024/RAASNet.git

2️⃣pip3 install -r requirements.txt

3️⃣python3 RAASNet.py

On Linux, you might need to install these packages:

 apt install python3-tk python3-pil python3-pil.imagetk
Testing connection with remote server:

 Change the host and port in test_socket.py, default is 127.0.0.1 on port 8989
python3 test_socket.py

> for More free tutorials for beginers about it :

https://github.com/leonv024/RAASNet/blob/master/demo/PyCrypto-vs-PyAES_demo_10fps.gif

ENJOY πŸ‘πŸ»

βœ…git sources 2020
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘What's a Ransomware?

A ransomware is a form of malware that prevent legitimate users from accessing their device or data and asks for a payment in exchange for the stolen functionality. They have been used for mass extortion in various forms, but the most successful seem to be encrypting ransomware: most of the user data are encrypted and the key can be retrieved with a payment to the attacker. To be widely successful a ransomware must fulfill three properties:

Property 1: The hostile binary code must not contain any secret (e.g. deciphering keys). At least not in an easily retrievable form, indeed white box cryptography can be applied to ransomware.

Property 2: Only the author of the attack should be able to decrypt the infected device.

Property 3: Decrypting one device can not provide any useful information for other infected devices, in particular the key must not be shared among them.

πŸ¦‘Objectives:
 encrypt all user files with AES-256-CBC.
Random AES key and IV for each file.
Works even without internet connection.
Communication with the server to decrypt Client-private-key.
encrypt AES key with client-public-key RSA-2048.
encrypt client-private-key with RSA-2048 server-public-key.
Change computer wallpaper -> Gnome, LXDE, KDE, XFCE.
Decryptor that communicate to server to send keys.
python webserver
Daemon
Dropper
Kill databases

THOSE FROM GITHUB SOURCES
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
BIN Amazon Prime Video

: 442756103622xxxx
442756152271xxxx
442756161628xxxx

FECHA: 01/24

CVV : 067

IP : USA

Postal: 11213