UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.9K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ“œ How to save the configuration in a shell script :

1) Save the configuration while the shell script is running using a simple yet effective method.
Shell script

2) I'll use the following shell script to illustrate the idea.

Nothing fancy, it will display the available disk space on a specific server and partition.

#! / usr / bin / env bash
# Display available disk space on specific server and partition

# default parameters
default_bastion = ""
default_busername = ""
default_server = "localhost"
default_username = "milosz"
default_partition = "/ srv"

# nextcloud server
nextcloud_server = "nextcloud.local"
nextcloud_partition = "/ data"

# dokuwiki server
dokuwiki_bastion = "bastion.example.org"
dokuwiki_busername = "bouncer"
1dokuwiki_server = "192.0.2.10"
dokuwiki_username = "dokuwiki"
dokuwiki_partition = "/ wiki"

# kolab server
kolab_bastion = "bastion.example.org"
kolab_busername = "bouncer"
kolab_server = "192.0.2.20"
kolab_username = "monitoring"
kolab_partition = "/"

# get defined servers / applications
applications = "$ ((set -o posix; set) | awk -F '=' '/ _server / {split ($ 1, array," _ "); print array [1]}' | grep -v default)"

# get defined attributes
attributes = "$ ((set -o posix; set) | awk -F '=' '/ default_ / {split ($ 1, array," _ "); print array [2]}')"

3) for application in $ applications; do
# define attributes for server / application
for attribute in $ attributes; do
application_attribute = "$ {application} _ $ {attribute}"
default_attribute = "default _ $ {attribute}"
if [-n "$ {! application_attribute}"]; then
eval "$ {attribute}" = "$ {! application_attribute}"
else
eval "$ {attribute}" = "$ {! default_attribute}"
fi
done

# perform an action
if [-n "$ bastion"]; then
bastion_param = "- J $ {busername} @ $ {bastion}"
else
bastion_param = ""
fi
echo -n "$ server:"
ssh $ bastion_param $ server -l $ username "bash -c 'df -h --output = avail $ partition | sed 1d'"
done
Using
Run the above shell script to see the available disk space on the specified servers.

nextcloud.local: 87G
192.0.2.10: 98G
192.0.2.20: 5.5G
How it works
Attributes

4) Define default values, remember to include blanks.

# default parameters
default_bastion = ""
default_busername = ""
default_server = "localhost"
default_username = "milosz"
default_partition = "/ srv"

5) These variables will be used to retrieve the attribute names.
# get defined attributes
attributes = "$ ((set -o posix; set) | awk -F '=' '/ default_ / {split ($ 1, array," _ "); print array [2]}')"
The extracted attribute names.

attributes = "bastion busername server username partition"
Applications
Define the attributes for each application.

# nextcloud server
nextcloud_server = "nextcloud.local"
nextcloud_partition = "/ data"
[...]

6) These variables will be used to retrieve the application names.

Note that I am using the server attribute as the app indicator in this example.
# get defined servers / applications
applications = "$ ((set -o posix; set) | awk -F '=' '/ _server / {split ($ 1, array," _ "); print array [1]}' | grep -v default)"

7) The names of the extracted applications.

applications = "nextcloud dokuwiki kolab"
Parsing attributes for each application
I will iterate over the list of applications.

8) for application in $ applications; do
Assign attributes (for example, server, username ...) using the application_attribute variable (values ​​such as nextcloud_server, nextcloud_username,… depending on the application name) to define the target variable name and read value using the $ {! Application_attribute}. Use the default if empty.

# define attributes for server / application
for attribute in $ attributes; do
application_attribute = "$ {application} _ $ {attribute}"
default_attribute = "default _ $ {attribute}"
if [-n "$ {! application_attribute}"]; then
eval "$ {attribute}" = "$ {! application_attribute}"
else
eval "$ {attribute}" = "$ {! default_attribute}"
fi
done
9) Follow the steps as needed using the short attribute names.

# perform an action
if [-n "$ bastion"]; then
bastion_param = "- J $ {busername} @ $ {bastion}"
else
bastion_param = ""
fi
echo -n "$ server:"
ssh $ bastion_param $ server -l $ username "bash -c 'df -h --output = avail $ partition | sed 1d'"
The end of the application loop is self-explanatory.

done

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘πŸ“œ How to save the configuration in a shell script
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 russian host, deepwebsites

http://bitmixbizymuphkc.onion is the best bitcoin mixer , you can mix BTC, ETH, LTC.

buybit4xcbat2cwn.onion RU BuyBit - instant purchase and sale of bitcoin (with Qiwi integration), the service does not require any confirmation and accepts payment from terminals. Good online support that solves your questions online. Online discussion;

http://totetxidh73fm4e3.onion - Totet, bitcoin tote;

https://onion.cab - clearnet (!) onion.cab, view hidden onion sites without Tor;

http://facebookcorewwwi.onion - Facebook, the same one));

http://sms4tor3vcr2geip.onion - SMS4TOR, a self-destruct message service;

http://oi4bvjslpt5gabjq.onion - RΓ©publique de Hackers, another French-language hacker forum;

http://pwoah7foa6au2pul.onion - Alphabay market;

http://mail2tor2zyjdctd.onion - Mail2Tor, e-mail service;

http://torbox3uiot6wchz.onion - TorBox, e-mail service inside .onion;

http://zw3crggtadila2sg.onion/imageboard - TorChan, "Tor's # 1 imageboard";

http://cyjabr4pfzupo7pg.onion - CYRUSERV, a jabber service from CYRUSERV;

http://rutorc6mqdinc4cz.onion - RuTor.org, a well-known torrent tracker;

http://flibustahezeous3.onion is the famous onion-style electronic library.


@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to add PayPal to Google Pay as a payment method using Gmail, YouTube and other Google services :

1) Linking PayPal to your Google Pay account
There are several ways to connect your PayPal account to Google Pay. On Android, you can use the Google Pay mobile app. On iOS, the best option is to use the Google Pay web app. You can add PayPal to Google Pay on Android and iOS when shopping online where Google Pay is accepted.

Option 1. In the Google Play app (on Android)
Open Google Pay, select the Payments tab, click on the blue + payment method button below. Select PayPal from the two options that appear.

2) You will be redirected to the PayPal website in your browser and not in the PayPal app. Enter your username and password to log into your account, wait for the addition process to complete.

3) If you see the Use PayPal with Google Pay screen, click Next. Next, you need to set a pin code to make purchases. If you already have a PIN, confirm it. If you're adding a PayPal account from one of the two options below, you'll need to go back to the Payments tab and select Set In Store Payments next to PayPal.

4) Next, you need to agree to the PayPal terms for using Google Pay. It says here that if you don't have enough money in your PayPal balance to pay for something, PayPal will automatically top up your balance with $ 10 from the bank or card of your choice. After choosing a payment method, click "Agree and Continue".

5) Your PayPal account can now shop with Google Pay. It automatically becomes the default payment option.
Option 2. In the Google Pay app (on Android and iOS)
On iOS, you cannot add PayPal to the Google Pay mobile app. You can use the Google Pay web app. PayPal then appears as a payment method in the Google Pay mobile app.

6) Open pay.google.com in your browser and sign in to your account. Click on the menu with three lines in the upper left corner, select payment options and the command "+ add payment method" at the bottom. Select add PayPal.

7) Click "Save" and you will be redirected to the PayPal website. Log in to your account, choose a debit or credit card to pay. Read the information on the page, click "Agree and Continue". You will then see PayPal as a payment method on the Google Play website and in the mobile app.


Option 3. When placing an order (on Android and iOS)
You can add PayPal when you buy something from Google. For example, when a purchase is made on the Google Store. You can choose a new payment method, choose PayPal, and link your accounts. See step 2 below for more information.

8) Use PayPal with Google Pay to make a purchase
When PayPal is linked to Google Pay, you can shop online on various Google services, including Gmail, YouTube, Play Store, Google Store. You can select non-Google apps that have a link to Google Pay.

9) On iOS, Google Pay can be used in a browser. This platform uses Apple Pay in applications like YouTube. You can't add PayPal to Apple Pay if it's not a debit card.

10) now on your phone you can see the PayPal payment options on Google Pay when trying to buy a movie from the Play Store. You don't even need to sign in to your PayPal account. Select PayPal, click on the Buy button, confirm with your fingerprint, pattern or pin and the purchase will be completed.

11) if you plan to use this payment option in stores, look for contactless payment terminals. Hold your smartphone near the terminal until payment is complete.

12) When shopping on sites like the Google Store, on the checkout screen, change the Google Pay payment option to PayPal, then confirm your purchase. If you haven't added a PayPal account yet, you can do so now by choosing β€œAdd PayPal” from the list of payment options.
13) Manage PayPal Settings for Google Pay
On Android, if you want to make changes to your PayPal account with Google Pay, you need to use the PayPal mobile app. In it, click on the gear icon in the upper right corner, select Google Pay from the list. Here you can turn off auto-completion, change your PIN, and unlink your PayPal account from Google Pay.

14) The iPhone has fewer options. You are using the PayPal mobile application or the web application, you can only select automatic payments in the settings, then select Google, Inc and cancel this option or change the linked card. In the application, you can also change the PIN code and disable automatic payment completion.

15) Manage Google Pay settings for PayPal
If you want to turn off in-store payments or remove the PayPal payment method with Google Pay, open the Google Pay app. You can turn off payments in stores only in the Android application.

16) On Android, tap Payments, then your PayPal card. If you have not set in-store payments, you will see Set as an option when viewing PayPal details. You can also change your nickname here. Click on the vertical ellipse icon for more options. Including there is "Delete payment method" and "Disable payments in stores", if you have set them.On iOS, tap Payment Methods, then the vertical ellipse icon next to PayPal. The only option available here is "Delete". In the web app, you can also only uninstall PayPal.

17) If you removed a payment method, you won't be able to use PayPal to make purchases with Google Pay. The transaction history can also be deleted. To make this change permanent, you need to remove Google Pay from the settings in the PayPal app, as described in step 3.

18) If you've turned off in-store payments, you won't be able to use PayPal through Google Pay to shop in physical stores, but you can in online stores. To reconnect in-store payments, you'll need to set up your PayPal account with Google Pay again.

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘How to add PayPal to Google Pay as a payment method using Gmail, YouTube and other Google services
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Do it yourself, develop Linux games!γ€€γ€€When you work in the Linux environment, you must also want to play games in the Linux environment. However, there are not many games for Linux now, and it is not easy to find a good game.

1) However, everything can be changed with your hands! Have you ever thought about developing games under Linux by yourself? Recently, No Starch Publishing Company and the well-known Linux game company Loki Software announced the joint release of a new book: "Linux Game Programming-Learn to Write Linux Games". This book is devoted to the development of games under the Linux platform.

2)The content involves: discussing the main multimedia tools on Linux, Linux game programming skills, etc. The specific content includes:

3) using the Simple DirectMedia Layer (SDL) library to build a powerful game engine;

4) using OSS, ALSA, ESD, and OpenAL to build sound effects and Music;
γ€€γ€€
5) use TCP/IP Sockets to build multi-user online games;
γ€€γ€€use Linux Framebuffer Console to write the main body of the game;
γ€€γ€€
6) use professional Scripts to install software; how
γ€€γ€€to release games to the Linux world;

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘TWITTER BOT 2020 :


F E A T U R E S :

Tweets
trending projects every 30 minutes

Refreshes the configuration of twitters URL shortener t.co
every 24 hours

Blacklisting of repositories for 30 days (to avoid tweeting a
project multiple times in a short timeframe)

Maximum use of 140 chars per tweet to fill up with
information

Debug / development mode

Multiple storage backends (currently Redis and in memory)

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) Download the latest release
https://github.com/andygrunwald/TrendingGithub/releases/latest

2) Extract the archive (zip / tar.gz)

3) Start the bot via ./TrendingGithub -debug
For linux this can look like:

4) curl -L https://github.com/andygrunwald/TrendingGithub/releases/download/v0.4.0/TrendingGithub-v0.4.0-linux-amd64.tar.gz -o TrendingGithub-v0.4.0-linux-amd64.tar.gz

5) tar xzvf TrendingGithub-v0.4.0-linux-amd64.tar.gz

6) cd TrendingGithub-v0.4.0-linux-amd64

7) ./TrendingGithub -debug

8) $ ./TrendingGithub -help
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ‘₯ fast and powerful dashboard dashboard search tool (admin) :

Cangibrina is a multi-platform tool that is designed to access the site admin panel using brute force, google, nmap and robots.txt.

> >Dependencies

Python 2.7
mechanize
PySocks
beautifulsoup4
html5lib
Nmap (–nmap)
TOR (–tor)
Installation:
Linux

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/fnk0c/cangibrina.git

2) cd cangibrina

3) pip install -r requirements.txt
Using
usage: cangibrina.py [-h] -u U [-w W] [-t T] [-v] [--ext EXT] [--user-agent]
[--tor] [--search] [--dork DORK] [--nmap [NMAP]]

4) Fast and powerful admin finder

optional arguments:
-h, --help show this help message and exit
-u U target site
-w W set wordlist (default: wl_medium)
-t T set threads number (default: 5)
-v enable verbose
--ext EXT filter path by target extension
--user-agent modify user-agent
--sub-domain search for sub domains instead of directories
--tor set TOR proxy
--search use google and duckduckgo to search
--dork DORK set custom dork
--nmap [NMAP] use nmap to scan ports and services

E X A M P L E S

python cangibrina.py -u facebook.com

python cangibrina.py -u facebook.com -v

python cangibrina.py -u facebook.com -w /root/diretorios.txt -t 10 -v

python cangibrina.py -u facebook.com --search -v

python cangibrina.py -u facebook.com --search --dork 'site:facebook.com inurl:login'

python cangibrina.py -u facebook.com -v --nmap

python cangibrina.py -u facebook.com -v --nmap 'sudo nmap -D 127.0.0.1 -F facebook.com'

python cangibrina.py -u facebook.com --user-agent

python cangibrina.py -u facebook.com --ext php

[IMPORTANT] DORK MUST BE WRITE BETWEEN QUOTES !
[Example] 'inurl:login.php'

Β― \ _ (ツ) _ / Β―


@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘The main categories of Spam Tools:
Depending on their functionality, Spam tools are usually divided into these categories:

1) E-mail extraction software. Such Spam tools are mostly used for collecting e-mail addresses from various websites, documents and other resources. Once they are collected, they are added to mailing lists and prepared for the use;


2) Mass mailing programs. This category of Spam Tools is usually used to spread email messages. They help spammers to send their emails to thousands of different recipients;


3) E-mail management programs. Such software can be applied for identifying and removing useless email addresses from the list of email recipients. These addresses usually include emails of specific organizations that are capable of identifying the owner of the Spam tool.


4) Referral spam. This technique is used to abuse website’s referrer and change its URL to a needed web page. By using it, spammers expect that website’s owner will see this link in his/hers Google analytics and will think that this site is important. Beware that the most of websites that rely on referrer spam are harmful and visiting them can cause infiltration of malware!


byspyware
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Neptune exploit how it works ?
kit distributes Monero miner

Cybercriminals use the Neptune exploit kit in a malicious miner distribution campaign. This is reported by experts from the firm FireEye. Neptune, also known as Terror, Blaze, and Eris, was originally thought to be a variant of the Sundown exploit kit due to its similarity in code. With the disappearance of kits such as Angler and Neutrino, Sundown also declined in activity, giving way to RIG.

However, Neptune has gained popularity and is still used in malicious advertising campaigns, in particular those aimed at distributing cryptocurrency miners. FireEye recently discovered several changes in Neptune attacks, including URI patterns, landing pages, and malicious payload.

Attackers use a legitimate pop-up ad service to spread malware. Cybercriminals also disguise their sites by changing the top-level domain from .com to .club (for example, highspirittreks.com and highspirittreks.club). One such malicious site also mimics the YouTube video to MP3 converter.

Typically, malicious ads for this campaign are found on popular torrent sites. When a user enters one of these sites, an attempt is made to exploit three vulnerabilities in Internet Explorer and two in Adobe Flash Player. It is noteworthy that none of the exploited vulnerabilities are new, they were all disclosed back in 2014-2016.


@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ§ Shell script for backing up MongoDB database :

1) MongoDB is a cross-platform, document-oriented NoSql database server.

2) In this tutorial, you will find a wrapper script for backing up a MongoDB database.

3) The script also deletes server backups older than the specified day.
You can copy this script:
! / bin / bash


################################################# #####################

##

## MongoDB Database Backup Script

## Written By: Rahul Kumar

## Update on: June 20, 2020

##

################################################# #####################

export PATH = / bin : / usr / bin : / usr / local / bin

TODAY = date + "% d% b% Y "


################################################# #####################

################################################# #####################

DB_BACKUP_PATH = '/ backup / mongo'

MONGO_HOST = 'localhost'

MONGO_PORT = '27017'


# If mongodb is protected with username password.

# Set AUTH_ENABLED to 1

# and add MONGO_USER and MONGO_PASSWD values ​​correctly

AUTH_ENABLED = 0

MONGO_USER = ''

MONGO_PASSWD = ''

# Set DATABASE_NAMES to "ALL" to backup all databases.

# or specify databases names seprated with space to backup

# specific databases only.

DATABASE_NAMES = 'ALL'

# DATABASE_NAMES = 'mydb db2 newdb'

## Number of days to keep local backup copy

BACKUP_RETAIN_DAYS = 30

################################################# #####################

################################################# #####################

mkdir - p $ { DB_BACKUP_PATH } / $ { TODAY }

AUTH_PARAM = ""

if [ $ { AUTH_ENABLED } - eq 1 ] ; then

AUTH_PARAM = "--username $ {MONGO_USER} --password $ {MONGO_PASSWD}"

fi

if [ $ { DATABASE_NAMES } = "ALL" ] ; then

echo "You have choose to backup all databases"

mongodump - host $ { MONGO_HOST } - port $ { MONGO_PORT } $ { AUTH_PARAM } - out $ { DB_BACKUP_PATH } / $ { TODAY } /

else

echo "Running backup for selected databases"

for DB_NAME in $ { DATABASE_NAMES }

do

mongodump - host $ { MONGO_HOST } - port $ { MONGO_PORT } - db $ { DB_NAME } $ { AUTH_PARAM } - out $ { DB_BACKUP_PATH } / $ { TODAY } /

done

fi

######## Remove backups older than {BACKUP_RETAIN_DAYS} days ########

DBDELDATE = date + "% d% b% Y " - date = " $ {BACKUP_RETAIN_DAYS} days ago "


if [ ! - z $ { DB_BACKUP_PATH } ] ; then

cd $ { DB_BACKUP_PATH }

if [ ! - z $ { DBDELDATE } ] && [ - d $ { DBDELDATE } ] ; then

rm - rf $ { DBDELDATE }

fi

fi


######################### End of script ###################### ########

4) MongoDB backup schedule
You can easily schedule this script in crontab for regular database backups.

0 2 * * * / backup / mongo - backup .sh

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁