UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.8K links
๐Ÿฆ‘ Undercode Cyber World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE

โœจ Web & Services:
โ†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
Kaspersky: Hackers against Linux are rampant

#CyberAttacks
_
Forwarded from UNDERCODE NEWS
Trump: I heard Tiktok Oracle completing a contract and researching it #international
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Website which provides vcc cards
:

Entropay (http://www.entropay.com/) - Entropay is one of the best VCC providers that can help you to create your Virtual Credit Card free of cost. You can create your card by verifying your address and card information. Entropay charge small fee in each transaction. You can load fund from your bank account to your Entropay VCC.

Netletter VCC (http://www.neteller.com/personal/get-a-prepaid-card/) - Netletter is one of the best alternative to PayPal that also offers prepaid Mastercard that can be used as VCC for secure online transactions. Netletter takes small fees on transactions. You can create Netletter prepaid card free of cost by joining the site.

Netspend (https://www.netspend.com/) - Netspend is one of the best prepaid card providers for US residents. Netspend provides processing and marketing services for prepaid mastercard and Visa debit cards.

Payoneer (http://www.payoneer.com/) - Payoneer is one of the most popular payment processors for Global Payment. Payoneer offers prepaid

mastercards that can be used as Virtual credit card to pay money to thousands of websites. Payoneer charge small fee to users. Payoneer allows users to create set up free accounts to receive and send money to global sites.

American Express (https://
www.americanexpress.com/) - One of the most popular banking services that can also help you to create your prepaid and virtual credit cards easily. You can use American Express cards to pay money to hosting websites, online shopping companies and other international websites.

Bankfreedom (http://www.bankfreedom.com/) - Although this site is not very popular but very useful in online transactions. Bankfreedom offers many useful features that can help you to handle your business easily. Great for individuals and small business owners.

AccountNow (http://www.accountnow.com/) - AccountNow is one of the best alternatives to a checking account. AccountNow offers Prepaid credit cards and prepaid visa debit card. You can also use AccountNow cards in many useful purposes such as online shopping, money transfer etc.

ICICI VCC (http://www.icicibank.com/) - If you already have an account in ICICI bank, you can create your virtual credit card from your ICICI bank easily for online transactions. You can find more information about ICICI VCC on FAQ page of ICICI VCC

Kotak Netc@rd (http://www.kotak.com/bank/personal-banking/cards/netcard.html) - Kotak
Netc@rd is one of the best options for Indians to open prepaid credit cards for online transactions. You have to create an account in Kotak Mahindra Bank before you use Netc@rd.

HDFC VCC (http://www.hdfcbank.com/) - HDFC bank also offers virtual credit cards to HDFC users. HDFC offers netsafe cards for all HDFC bank Visa and Mastercard Debit and Creditcard holders free of cost. One of the safest ways to transfer your money online.

https://ezzocard.com/

https://dreamweavervcc.com/

https://entropay.com/

https://wirexapp.com/

https://ezzocard.com/

https://supervcc.com/

https://egiftcards24.com/

https://instavcc.com/

http://vccguru.com/

https://myvcc.biz/

sources : fcb/wiki/deepweb
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from UNDERCODE NEWS
Once again, Google was bombarded by members of the US conference, : re-monopoly on top of monopoly.
#International
_
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Unlimited free internet access when the phone is down :

ใ€€ใ€€You can surf the Internet for free if your mobile phone is down. Now I will show you how to activate the card that has been down! ?After activation, you can surf the Internet for free. Note: "My dynamic zone card has been tested and passed"! First, prepare a card that has been shut down due to arrears. Pay attention to the key points: 1. Need to know the password of the card. 2. The card has not been cancelled. 3. The downtime does not exceed

๐Ÿฆ‘Phone down as unlimited free Internet access can

ใ€€ใ€€now reveal to you how to activate a card method has been shut down! ?After activation, you can surf the Internet for free. Note: "My dynamic zone card has been tested and passed"!

> First, prepare a card that has been shut down due to arrears. Pay attention to the key points: 1. Need to know the password of the card. 2. The card has not been cancelled. 3. The downtime is not more than three months" If all of the above are OK, you can start karaoke!

Step 1: Log in to China Mobile's online business hall and change the phone card password to 949389, which means China Mobile's initial code. This is to extend the system search time and bring convenience to operations.

Step 2: To report the loss of the mobile phone card, dial 13900139000 and follow the system voice operation, enter the card number, enter the password 949389, and the system will prompt that the loss report is successful.

Step 3: Use another card to send QXGS# number# password to 13900139000 to cancel the loss report operation. At this time, the shutdown card is activated, and you can surf the Internet as much as you like for five days, turning waste into treasure! Remember: "You canโ€™t call and send text messages, and you donโ€™t need to play charged things, otherwise the system will detect it, and the result will still be down. After five days, you repeat this operation again and you can use it again. I hope all friends can use unlimited cards, because mobile has made us too much money! It's time to share with us! Right!

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
NEW TOOLS ADDED HACK WHATSAPP OR INSTAGRAM OR FACEBOOK ....
NEW UPDATE FROM 22 DAYS FOR TOOLX

1) apt update

2) apt install git

3) git clone https://github.com/rajkumardusad/Tool-X.git

4) cd Tool-X

5) chmod +x install

6) sh install if not work than use ./install

USE FOR LEARN
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘lINUX IP CONFIG TUTORIALS :

Netplan
Ubuntu 17.10 and newer uses Netplan as the default network management tool. Previous versions of Ubuntu used ifconfig and its / etc / network / interfaces config file to configure the network.

Netplan configuration files are written in YAML syntax with a .yaml file extension. To configure a network interface using Netplan, you need to create a YAML description for the interface, and Netplan will generate the necessary configuration files for the selected renderer.

Netplan supports two renderers, NetworkManager and Systemd-networkd. NetworkManager is mainly used on desktops, while Systemd-networkd is used on servers without a GUI.

๐Ÿฆ‘Setting up a static IP address on an Ubuntu server
In Ubuntu 20.04, the system identifies network interfaces using "predictable network interface names".

1) The first step to setting up a static IP address is to determine the name of the Ethernet interface you want to configure. To do this, use the ip link command as shown below:

> ip link

2) The command prints a list of all available network interfaces. In this example, the interface name is ens3:

> 1: lo: <LOOPBACK, UP, LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000

> link / loopback 00: 00: 00: 00: 00: 00 brd 00: 00: 00: 00: 00: 00

> 2: ens3: <BROADCAST, MULTICAST, UP, LOWER_UP> mtu 1500 qdisc fq_codel state UP mode DEFAULT group default qlen 1000

> link / ether 08: 00: 27: 6c: 13: 63 brd ff: ff: ff: ff: ff: ff

3) Netplan configuration files are stored in the / etc / netplan directory. You will likely find one or more YAML files in this directory. The file name may differ from setting to setting. Typically the file is named either 01-netcfg.yaml, 50-cloud-init.yaml, or NN_interfaceName.yaml, but it may be different on your system.

4) If your cloud-based Ubuntu instance has cloud-init, you need to disable it. To do this, create the following file:

sudo nano /etc/cloud/cloud.cfg.d/99-disable-network-config.cfg

/etc/cloud/cloud.cfg.d/99-disable-network-config.cfg
network: {config: disabled}

5) To assign a static IP address on the network interface, open the YAML configuration file in a text editor :

sudo nano /etc/netplan/01-netcfg.yaml
/etc/netplan/01-netcfg.yaml

network:
version: 2
renderer: networkd
ethernets:
ens3:
dhcp4: yes

6) Before changing the configuration, let's briefly explain the code.

7) Every Netplan Yaml file starts with a network key, which contains at least two required elements. The first required element is the version of the network configuration format, and the second is the device type. The device type can be ethernets, bonds, bridges, or vlans.

8) The config also has a line showing the renderer type. By default, if you installed Ubuntu in server mode, the renderer is configured to use networkd as the backend.

9) Under the device type (ethernets) you can specify one or more network interfaces. In this example, we only have one ens3 interface configured to receive IP addressing from DHCP server dhcp4: yes.

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from UNDERCODE NEWS
WARNING! Three unpatchable vulnerabilities in Adobe found in the Media Encoder tool
#Vulnerabilities
_
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘FOR BEGINERS LINUX GIT SERVER SETUP :

A) First, you create a git user account and a .ssh directory for that user.

$ sudo adduser git
$ su git
$ cd
$ mkdir .ssh && chmod 700 .ssh
$ touch .ssh/authorized_keys && chmod 600 .ssh/authorized_keys

B) Next, you need to add some developer SSH public keys to the authorized_keys file for the git user. Letโ€™s assume you have some trusted public keys and have saved them to temporary files. Again, the public keys look something like this:

$ cat /tmp/id_rsa.john.pub

C) You just append them to the git userโ€™s authorized_keys file in its .ssh directory:

$ cat /tmp/id_rsa.john.pub >> ~/.ssh/authorized_keys
$ cat /tmp/id_rsa.josie.pub >> ~/.ssh/authorized_keys
$ cat /tmp/id_rsa.jessica.pub >> ~/.ssh/authorized_keys
Now, you can set up an empty repository for them by running git init with the --bare option, which initializes the repository without a working directory:

$ cd /srv/git
$ mkdir project.git
$ cd project.git
$ git init --bare

D) Initialized empty Git repository in /srv/git/project.git/
Then, John, Josie, or Jessica can push the first version of their project into that repository by adding it as a remote and pushing up a branch. Note that someone must shell onto the machine and create a bare repository every time you want to add a project. Letโ€™s use gitserver as the hostname of the server on which youโ€™ve set up your git user and repository. If youโ€™re running it internally, and you set up DNS for gitserver to point to that server, then you can use the commands pretty much as is (assuming that myproject is an existing project with files in it):

# on John's computer
$ cd myproject
$ git init
$ git add .
$ git commit -m 'Initial commit'
$ git remote add origin git@gitserver:/srv/git/project.git
$ git push origin master

E) At this point, the others can clone it down and push changes back up just as easily:

$ git clone git@gitserver:/srv/git/project.git
$ cd project
$ vim README
$ git commit -am 'Fix for README file'
$ git push origin master
With this method, you can quickly get a read/write Git server up and running for a handful of developers.

F) You should note that currently all these users can also log into the server and get a shell as the git user. If you want to restrict that, you will have to change the shell to something else in the /etc/passwd file.

You can easily restrict the git user account to only Git-related activities with a limited shell tool called git-shell that comes with Git. If you set this as the git user accountโ€™s login shell, then that account canโ€™t have normal shell access to your server. To use this, specify git-shell instead of bash or csh for that accountโ€™s login shell. To do so, you must first add the full pathname of the git-shell command to /etc/shells if itโ€™s not already there:

$ cat /etc/shells # see if git-shell is already in there. If not...
$ which git-shell # make sure git-shell is installed on your system.
$ sudo -e /etc/shells # and add the path to git-shell from last command

G) Now you can edit the shell for a user using chsh <username> -s <shell>:
$ sudo chsh git -s $(which git-shell)
Now, the git user can still use the SSH connection to push and pull Git repositories but canโ€™t shell onto the machine. If you try, youโ€™ll see a login rejection like this:

$ ssh git@gitserver
fatal: Interactive git shell is not enabled.
hint: ~/git-shell-commands should exist and have read and execute access.

H) Connection to gitserver closed.
At this point, users are still able to use SSH port forwarding to access any host the git server is able to reach.
no-port-forwarding,no-X11-forwarding,no-agent-forwarding,no-pty

sources unix/undercode/wiki
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘WEBSITES HACKING 2020 :
NekoBot | + shell checker Auto Exploiter With 500+ Exploit 2000+ Shell

f e a t u r e s :

1- Cherry-Plugin
2- download-manager Plugin
3- wysija-newsletters
4- Slider Revolution [Revslider]
5- gravity-forms
6- userpro
7- wp-gdpr-compliance
8- wp-graphql
9- formcraft
10- Headway
11- Pagelines Plugin
12- WooCommerce-ProductAddons
13- CateGory-page-icons
14- addblockblocker
15- barclaycart
16- Wp 4.7 Core Exploit
17- eshop-magic
18- HD-WebPlayer
19- WP Job Manager
20- wp-miniaudioplayer
21- wp-support-plus
22- ungallery Plugin
23- WP User Frontend
24- Viral-options
25- Social Warfare
26- jekyll-exporter
27- cloudflare plugin
28- realia plugin
29- woocommerce-software
30- enfold-child Theme
31- contabileads plugin
32- prh-api plugin
33- dzs-videogallery plugin
34- mm-plugin
35- Wp-Install
36- Auto BruteForce
[+] Joomla

1- Com_adsmanager
2- Com_alberghi
3- Com_CCkJseblod
4- Com_extplorer
5- Com_Fabric
6- Com_facileforms
7- Com_Hdflvplayer
8- Com_Jbcatalog
9- Com_JCE
10- Com_jdownloads
11- Com_Joomanager
12- Com_Macgallery
13- Com_media
14- Com_Myblog
15- Com_rokdownloads
16- Com_s5_media_player
17- Com_SexyContactform
18- Joomla core 3.x RCE
19- Joomla core 3.x RCE [2019]
20 - Joomla Core 3.x Admin Takeover
21 - Auto BruteForce
22 - Com_b2jcontact
23 - Com_bt_portfolio
24 - Com_civicrm
25 - Com_extplorer
26 - Com_facileforms
27 - Com_FoxContent
28 - Com_jwallpapers
29 - Com_oziogallery
30 - Com_redmystic
31 - Com_simplephotogallery
32 - megamenu module
33 - mod_simplefileuploadv1
[+] Drupal :

1- Drupal Add admin geddon1
2- Drupal RCE geddon2
3- Drupal 8 RCE RESTful
4- Drupal mailchimp
5- Drupal php-curl-class
6- BruteForce
7- Drupal SQL Add Admin
8- Drupal 7 RCE
9- bartik
10- Avatarafd Config
11- Drupal 8
12- Drupal Default UserPass
[+] Magento :

1- Shoplift
2- Magento Default user pass
[+] Oscommerce

1- OsCommerce Core 2.3 RCE Exploit
opencart
[+] OTHER :

1- Env Exploit
2- SMTP CRACKER
3- CV


๐Ÿ„ธ๐Ÿ„ฝ๐Ÿ…‚๐Ÿ…ƒ๐Ÿ„ฐ๐Ÿ„ป๐Ÿ„ป๐Ÿ„ธ๐Ÿ…‚๐Ÿ„ฐ๐Ÿ…ƒ๐Ÿ„ธ๐Ÿ„พ๐Ÿ„ฝ & ๐Ÿ…๐Ÿ…„๐Ÿ„ฝ :

1) git clone https://github.com/tegal1337/NekoBotV1.git

2) cd NekoBot

3) run as python NekoBot.py

use for learn !!
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
How Red Teams Bypass AMSI and WLDP for .NET Dynamic Code.pdf
495.3 KB
Introduction
v4.8 of the dotnet framework uses Antimalware Scan Interface (AMSI) and Windows Lockdown Policy (WLDP) to block potentially unwanted software running from memory. WLDP will verify the digital signature of dynamic code while AMSI will scan for software that is either harmful or blocked by the administrator. This post documents three publiclyknown methods red teams currently use to bypass AMSI and one to bypass WLDP. The bypass methods described are somewhat generic and donโ€™t require any special knowledge. If youโ€™re reading this post anytime after June 2019, the methods may no longer work. The research shown here was conducted in collaboration with TheWover.