UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘BEST Hacking #Tools :

* [nudge4j](https://github.com/lorenzoongithub/nudge4j) - Java tool to let the browser talk to the JVM

* [IDA](https://www.hex-rays.com/products/ida/) - IDA is a Windows, Linux or Mac OS X hosted multi-processor disassembler and debugger

* [OllyDbg](http://www.ollydbg.de/) - A 32-bit assembler level analysing debugger for Windows

* [x64dbg](http://x64dbg.com/) - An open-source x64/x32 debugger for Windows

* [dex2jar](https://github.com/pxb1988/dex2jar) - Tools to work with Android .dex and Java .class files

* [JD-GUI](http://jd.benow.ca/) - A standalone graphical utility that displays Java source codes of Ò€œ.classÒ€ files

* [procyon](https://bitbucket.org/mstrobel/procyon/wiki/Java%20Decompiler) - A modern open-source Java decompiler

* [androguard](https://code.google.com/p/androguard/) - Reverse engineering, malware and goodware analysis of Android applications

* [JAD](http://varaneckas.com/jad/) - JAD Java Decompiler (closed-source, unmaintained)

* [dotPeek](https://www.jetbrains.com/decompiler/) - a
free-of-charge .NET decompiler from JetBrains

* [ILSpy](https://github.com/icsharpcode/ILSpy/) - an open-source .NET assembly browser and decompiler

* [dnSpy](https://github.com/0xd4d/dnSpy) - .NET assembly editor, decompiler, and debugger

* [de4dot](https://github.com/0xd4d/de4dot) - .NET deobfuscator and unpacker.

* [antinet](https://github.com/0xd4d/antinet) - .NET anti-managed debugger and anti-profiler code

* [UPX](http://upx.sourceforge.net/) - the Ultimate Packer for eXecutables

* [radare2](https://github.com/radare/radare2) - A portable reversing framework

* [plasma](https://github.com/joelpx/plasma) - Interactive disassembler for x86/ARM/MIPS. Generates indented pseudo-code with colored syntax code.

* [Hopper](https://www.hopperapp.com) - A OS X and Linux Disassembler/Decompiler for 32/64-bit Windows/Mac/Linux/iOS executables.

* [ScratchABit](https://github.com/pfalcon/ScratchABit) - Easily retargetable and hackable interactive disassembler with IDAPython-compatible plugin API

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner :

F E A T U R E S :

Works with Windows, Linux and OS X

Automatic Configuration

Automatic Update

Provides 8 different Local File Inclusion attack modalities:

/proc/self/environ
php://filter
php://input
/proc/self/fd
access log
phpinfo
data://
expect://
Provides a ninth modality, called Auto-Hack, which scans and exploits the target automatically by trying all the attacks one after the other without you having to do anything (except for providing, at the beginning, a list of paths to scan, which if you don't have you can find in this project directory in two versions, small and huge).

Tor proxy support

Reverse Shell for Windows, Linux and OS X

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :


1) git clone https://github.com/D35m0nd142/LFISuite

2) cd LFISuite

run lfisuite.py as python
3) When you got a LFI shell by using one of the available attacks, you can easily obtain a reverse shell by entering the command "reverseshell" (obviously you must put your system listening for the reverse connection, for instance using "nc -lvp port").

Video: https://www.youtube.com/watch?v=6sY1Skx8MBc


@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 RANSOMWARE :

F E A T U R E S :

Generate a ransomware payload
With or without GUI payload
FUD (Fully Undetectable by Anti-Virus)
Works on Windows, MacOS and Linux
Super fast encryption with PyCrypto
Compile to EXE, APP or Unix/Linux executable
Custom icon for your EXE payload
Receive keys of victims
Decrypt files
Demo mode (payload won't encrypt anything)
Fullscreen mode (Warning takes over the screen)
Custom warning message for your victim
Custom image in your payload
Ghost mode (Rename by adding .DEMON extention instead of encrypting the files)
Multiple encryption methods
Select file extentions to target
Decide if payload should self-destruct (Console mode feature only)
Decide wich drive to target for encryption (working directory)
Verified server access through port forwarding VPN

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/leonv024/RAASNet.git

2) pip3 install -r requirements.txt

3) python3 RAASNet.py

4) On Linux, you might need to install these packages:

sudo apt install python3-tk python3-pil python3-pil.imagetk

5)Testing connection with remote server:

# Change the host and port in test_socket.py, default is 127.0.0.1 on port 8989

6) python3 test_socket.py

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

#SOCIAL ENGINEER BOOKS& TUTORIALS :

Social-Engineer.com - The SECTF, DEFCON
- [Social-Engineer.com - DEFCON SECTF](https://www.social-engineer.org/sevillage-def-con/the-sectf/)

Most of these books covers the basics of psychology useful for a social engineer.

- [How to Win Friends and Influence People - Dale Carnegie](https://www.amazon.co.uk/d/Books/How-Win-Friends-Influence-People-Dale-Carnegie/0091906814/ref=sr_1_1?ie=UTF8&qid=1494621059&sr=8-1&keywords=how+to+win+friends+and+influence+people)

- [The 48 Laws of Power - Robert Greene](https://www.amazon.co.uk/d/Books/48-Laws-Power-Robert-Greene-Collection/1861972784/ref=sr_1_1?ie=UTF8&qid=1494621512&sr=8-1&keywords=the+48+laws+of+power)

- [The Psychology Book](https://www.amazon.co.uk/d/Books/Psychology-Book-Nigel-Benson/1405391243/ref=sr_1_1?ie=UTF8&qid=1494621589&sr=8-1&keywords=psychology)

- [The Power of Habit: Why We Do What We Do, and How to Change - Charles Duhigg](https://www.amazon.co.uk/Power-Habit-Why-What-Change/dp/1847946240/ref=sr_1_1?ie=UTF8&qid=1494621842&sr=8-1&keywords=the+power+of+habit)

- [Influence: The Psychology of Persuasion Paperback Γ’β‚¬β€œ Robert B., PhD Cialdini](https://www.amazon.co.uk/d/cka/Influence-Psychology-Persuasion-Robert-B-PhD-Cialdini/006124189X/ref=sr_1_1?ie=UTF8&qid=1494621912&sr=8-1&keywords=influence)

- [Emotions Revealed: Understanding Faces and Feelings - Prof Paul Ekman](https://www.amazon.co.uk/Emotions-Revealed-Understanding-Faces-Feelings/dp/0753817659/ref=sr_1_1?ie=UTF8&qid=1494622003&sr=8-1&keywords=paul+ekman)

- [The Psychology of Interrogations and Confessions: A Handbook - Gisli H. Gudjonsson](https://www.amazon.co.uk/Psychology-Interrogations-Confessions-Handbook-Policing-x/dp/0470844612/ref=sr_1_1?s=books&ie=UTF8&qid=1494624501&sr=1-1&keywords=psychology+of+interrogation)

- [Mindfucking: A Critique of Mental Manipulation - Colin McGinn](https://www.goodreads.com/book/show/4049997-mindfucking)

- [What Every Body is Saying: An Ex-FBI Agent's Guide to Speed-Reading People - Joe Navarro, Marvin Karlins](https://www.goodreads.com/book/show/1173576.What_Every_Body_is_Saying)

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
In Windows 10 vulnerability helps you to write something to system folders
#Vulnerabilities
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 oscp and pentesting :

http://www.sans.org/security-resources/sec560/netcat_cheat_sheet_v1.pdf

http://www.secguru.com/files/cheatsheet/nessusNMAPcheatSheet.pdf

http://sbdtools.googlecode.com/files/hping3_cheatsheet_v1.0-ENG.pdf

http://sbdtools.googlecode.com/files/Nmap5%20cheatsheet%20eng%20v1.pdf

http://www.sans.org/security-resources/sec560/misc_tools_sheet_v1.pdf

http://rmccurdy.com/scripts/Metasploit%20meterpreter%20cheat%20sheet%20reference.html

http://h.ackack.net/cheat-sheets/netcat

Essentials
Exploit-db
https://www.exploit-db.com/

SecurityFocus - Vulnerability database
http://www.securityfocus.com/

Vuln Hub - Vulnerable by design
https://www.vulnhub.com/

Exploit Exercises
https://exploit-exercises.com/

SecLists - collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads
https://github.com/danielmiessler/SecLists

Security Tube
http://www.securitytube.net/

Metasploit Unleashed - free course on how to use Metasploit
https://www.offensive-security.com/metasploit-unleashed/

0Day Security Enumeration Guide http://www.0daysecurity.com/penetration-testing/enumeration.html

Github IO Book - Pen Testing Methodology
https://monkeysm8.gitbooks.io/pentesting-methodology/

Windows Privledge Escalation
Fuzzy Security http://www.fuzzysecurity.com/tutorials/16.html

accesschk.exe https://technet.microsoft.com/en-us/sysinternals/bb664922

Windows Priv Escalation For Pen Testers https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/

Elevating Privileges to Admin and Further https://hackmag.com/security/elevating-privileges-to-administrative-and-further/

Transfer files to windows machines https://blog.netspi.com/15-ways-to-download-a-file/

enjoyβ€οΈπŸ‘πŸ»
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Popular torrents hacking courses

1) Udemy - Hacking 101 – Creating a Hacking Lab (CISA, CEH, CISSP)
72 3 May. 31st '18 165.5 MB
tutsgalaxy
>https://1337x.to/torrent/3028688/Udemy-Hacking-101-Creating-a-Hacking-Lab-CISA-CEH-CISSP/

2) Udemy - SEO Tricks and Hacks: Making Search Engines Work for You.
69 47 Jun. 25th '19 1.1 GB
tutsgalaxy
>https://1337x.to/torrent/3847061/Udemy-SEO-Tricks-and-Hacks-Making-Search-Engines-Work-for-You/

3) Udemy - Computer and Network Hacking Mastery: Practical Techniques
68 11 Oct. 8th '19 506.6 MB
tutsgalaxy
> https://1337x.to/torrent/4042894/Udemy-Computer-and-Network-Hacking-Mastery-Practical-Techniques/

4) Udemy - Ethical Hacking With Python, JavaScript and Kali Linux
2 67 69 Apr. 3rd '19 12.2 GB
tutsgalaxy
> https://1337x.to/torrent/3931172/Udemy-Ethical-Hacking-Capture-the-Flag-Walkthroughs-v2/


5) Udemy - Ethical Hacking – Capture the Flag Walkthroughs – v2
64 38 Aug. 10th '19 1.3 GB
tutsgalaxy
> https://1337x.to/torrent/3931172/Udemy-Ethical-Hacking-Capture-the-Flag-Walkthroughs-v2/


6) Udemy - Cyber Security – Steps to prevent a web hacker.
61 21 Apr. 4th '19 941.0 MB
tutsgalaxy
> https://1337x.to/torrent/3688948/Udemy-Cyber-Security-Steps-to-prevent-a-web-hacker/


7) [UDEMY] LEARN PYTHON & ETHICAL HACKING FROM SCRATCH [FTU]
58 65 Aug. 17th '18 12.1 GB
SunRiseZone
> https://1337x.to/torrent/3179188/UDEMY-LEARN-PYTHON-ETHICAL-HACKING-FROM-SCRATCH-FTU/


8) UDEMY WEBSITE HACKING IN PRACTICE TUTORIAL
2 58 2 Jun. 25th '15 384.0 MB
RandalPaul
> https://1337x.to/torrent/1199583/UDEMY-WEBSITE-HACKING-IN-PRACTICE-TUTORIAL/


9) Udemy - The Complete Ethical Hacking Masterclass: Beginner To Expert
56 40 Aug. 28th '18 7.3 GB
tutsgalaxy
> https://1337x.to/torrent/3199051/Udemy-The-Complete-Ethical-Hacking-Masterclass-Beginner-To-Expert/


!0) Udemy - Learn Hacking Windows 10 Using Metasploit From Scratch

https://1337x.to/torrent/3135962/Udemy-Learn-Hacking-Windows-10-Using-Metasploit-From-Scratch/


enjoyβ€οΈπŸ‘πŸ»
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Be aware of storing sensitive data on any cloud infrastructure
#Cyberattacks #Vulnerabilities