UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.9K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Methods for Using Parental Controls on Android :

A)1) Open system preferences . On the home screen or app, find the gear-shaped settings icon. Click on it.

2) Find users . In the settings go to the section "Users" or "Accounts". Click on the "Add Account" command.

3) There is a section here called "Restricted Profile" . A user with limited access rights to the system and applications is created.

4) Setting a pin code . The system will ask you to set a pin code.

5) Later, you will need to enter a pin code to change the settings. It is better to enter a complex password so that children cannot guess it.

6) Application selection . Then a complete list of installed applications will appear. If you deactivate an app, it will not appear on the restricted profile. You can also restrict access to social networks.

7) Profile name . Choose any name.
Exit . After making all the changes, you can leave the settings section.

8) Restricted Access Activation . Now check the created profile. You will be asked which user to select. Click on the name of the restricted profile and enter the pin code. After that, you can use your smartphone with this profile.

9) Disabled apps are not shown here. If you need them, return to your main profile.

B) Using the app
Keeping track of what kids are doing on their smartphones and on the internet is not easy. To make sure they are using the machine for learning, you can install the app. One of the best is Kidgy Android Parental Control . This program can be downloaded from the Play Store. It has many functionalities:

1) Location tracker . In order not to worry about the safety of children, you need to know where they are. The program allows you to see them on the map.

2) Call and message logs . Allows you to monitor how children use the Internet and smartphones. You can track all phone calls and text messages sent and received.

3) Restriction of social networks and websites . There are materials on the Internet that are useful for learning, but there are also materials that are not suitable for children. With this application, you can restrict access to social networks and any sites.

Your not allowed to copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘FREE WEBSITES FOR PHONES INFORMATIONS :

https://sync.me/

https://www.truecaller.com/

https://www.opencnam.com/
(request a trial)

https://thatsthem.com/reverse-phone-lookup

https://www.whocalledme.com/choose-your-country

https://freecarrierlookup.com/

https://nuwber.com/

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘The easiest way to share data on a Wi-Fi connection :

Β» An NFC tag can be used, but it does not work on all devices. We

will use a QR code that can be printed and hung at a convenient place in the house. There it can be scanned and connected.
This is where Waflee comes to the rescue https://waflee.app/

1) Step 1. Generating a QR Code with Waflee
Open waflee.app in a browser, type in the SSID and password for it. Then click Show Advanced Settings to select WPA or WEP.

Most likely the network is using WPA, since the other option is considered outdated and not so reliable. If you are unsure, check the sticker on the router where the password is written. Usually the protocol is listed there. If not, use WPA.

Then click Bake it! to generate a QR code.

2) Step 2. Choose an exchange option
After creating the QR code, you will see a preview of the virtual map with it. Under the code, the name of the network and its password are indicated in plain text. This data is not saved anywhere.

Next, you can allow guests to scan the code using the app and camera. It is not very convenient to do this every time you go to visit. There are other options:

>Create a QR code web link that you can share or save on your device's home screen.

> Download the A4 PDF version of the QR code so you can print it and hang it at home.

> Download the PDF version of the QR code for business cards that you can distribute to people.

If you select "Get a link for a virtual map", you will see the web address with the network name and password in it. All calculations are done inside the browser and the part of the address after the # is not sent to the developer's servers.

3) Step 3. Let your friends scan the code
To connect to the network, ask the guest to open the camera and scan the QR code. On Android, depending on the camera, they may receive a notification that says "Click here to connect to [name] network." After clicking, it is redirected to the Wi-Fi settings, where the device connects to the network.

> On iOS, a notification will be given when using the Camera app or QR scanner control. It says "Join [name] network." After clicking, a pop-up window appears asking you to connect to the network. If you click "Connect", the network connection will occur in the background.

Your not allowed to copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘for beginers PowerShell

>Surface translation: a powerful Shell.

γ€€γ€€powerful?

If you talk about popularity and user usage, PowerShell should be far inferior to some popular object-oriented languages. However, as a built-in scripting language in the system, compared with Linux Like Shell, it is certainly not acceptable to say that it is powerful.

γ€€γ€€Windows PowerShell is a command-line shell and scripting environment. It is a command-line scripting environment that runs on windows machines to automate system and application management. It enables command-line users and script writers to take advantage of the powerful features of the .NET Framework. You can think of it as an extension of the command line prompt cmd.exe. No, it should be a subversion. Powershell needs the support of the .NET environment and also supports .NET objects. Microsoft's positioning of Powershell as Power is not an exaggeration because it fully supports objects. Its readability and ease of use can rank first among all current shells.

πŸ¦‘How to open PowerShell

γ€€γ€€1) Win key + R, enter cmd, and then enter powershell in the cmd session box

γ€€γ€€2) Win key + R, enter powershell, you will come to its dialog box

γ€€γ€€3) Or directly find the Windows PowerShell program to open

πŸ¦‘ Learn PowerShell

γ€€γ€€When I first came into contact with PowerShell, I was a little confused, but it was somewhat similar to DOS and Shell commands. Just get used to it.

γ€€γ€€Recommended learning

> https://www.youtube.com/watch?v=IHrGresKu2w
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Tools used for exploiting Windows:

- [Exploitation](https://github.com/hacksysteam/Exploitation) : Windows Software Exploitation

- [hacking-team-windows-kernel-lpe](https://github.com/vlad902/hacking-team-windows-kernel-lpe) : Previously-0day exploit from the Hacking Team leak, written by Eugene Ching/Qavar.

- [mimikatz](https://github.com/gentilkiwi/mimikatz) : A little tool to play with Windows security - extract plaintexts passwords, hash, PIN code and kerberos tickets from memory.

- [Pazuzu](https://github.com/BorjaMerino/Pazuzu) : Reflective DLL to run binaries from memory

- [Potato](https://github.com/foxglovesec/Potato) : Privilege Escalation on Windows 7,8,10, Server 2008, Server 2012

- [UACME](https://github.com/hfiref0x/UACME) : Defeating Windows User Account Control

- [Windows-Exploit-Suggester](https://github.com/GDSSecurity/Windows-Exploit-Suggester) : This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Installing video drivers in Linux

A) On Kali Linux

1) Installing video drivers for NVIDIA on Linux

> sudo apt install -y ocl-icd-libopencl1 nvidia-driver nvidia-cuda-toolkit

2) Enabling OpenCL for Intel

If your CPU supports OpenCL, then install the following packages:

sudo apt install firmware-misc-nonfree intel-opencl-icd

B) On Arch Linux, BlackArch

Enabling OpenCL for NVIDIA

Remove xf86-video-nouveau there it is:

sudo pacman -R xf86-video-nouveau

> Install proprietary NVIDIA driver, CUDA and other required packages:

sudo pacman -S nvidia nvidia-utils opencl-nvidia opencl-headers cuda

C) Enabling OpenCL for Intel


sudo pacman -S linux-firmware intel-compute-runtime pocl
Friends, I need your support - if you have a different distribution kit or AMD video card, write in the comments how you installed the video driver - I will add this information here.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘PowerShell Hacking


- [BloodHound](https://github.com/adaptivethreat/BloodHound) : Six Degrees of Domain Admin

- [Empire](https://github.com/adaptivethreat/Empire) : Empire is a PowerShell and Python post-exploitation agent

- [Generate-Macro](https://github.com/enigma0x3/Generate-Macro) : Powershell script will generate a malicious Microsoft Office document with a specified payload and persistence method

- [Invoke-AltDSBackdoor](https://github.com/enigma0x3/Invoke-AltDSBackdoor) : This script will obtain persistence on a Windows 7+ machine under both Standard and Administrative accounts by using two Alternate Data Streams

- [Old-Powershell-payload-Excel-Delivery](https://github.com/enigma0x3/Old-Powershell-payload-Excel-Delivery) : This version touches disk for registry persistence

- [PSRecon](https://github.com/gfoss/PSRecon) : PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted data, hashes PowerShell and various system properties, and sends the data off to the security team

- [PowerShell-Suite](https://github.com/FuzzySecurity/PowerShell-Suite) : Some useful scripts in powershell

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How viruses spread ?

To know how viruses spread, you need to start first with what types of viruses are:

Network viruses spread over various computer networks.

File viruses are introduced mainly into executable modules. File viruses can inject into other types of files, but, as a rule, written in such files, they never gain control and, therefore, lose their ability to replicate.

Boot viruses are introduced into the boot sector of the disk (Boot sector) or into the sector containing the system disk boot program (Master Boot Record).

File boot viruses infect both files and boot sectors of disks.

Macro viruses are written in high-level languages ​​and infect document files of applications that have built-in automation languages ​​(macro languages), such as applications of the Microsoft Office family.

Trojans masquerading as useful programs are a source of virus infection on your computer.

The main ways to distribute your Trojan:

1) Protroyan gamer: Go to the gaming forum, well, or a blog where you can leave comments and glue your Trojan with cheats, as they say the profit is good, because gamers turn off their antivirus.

2) he same thing, but gluing with cracks, again comments on forums, torrent trackers, etc. The coverage is great, maybe as they say.

3) Varez music and clips, here the method is quite simple, a shortcut is made, like music / playlist, etc. for example, it runs it, and instead of it the Trojan is launched, well, of course, music / movie can also be launched to divert your eyes. The main thing is to mask your virus so that no one thinks that this is an executable file that will launch the shortcut.

4) Distribution by mail with the extension .src, you can spam by mail like there: "You received an invoice!", Or "You got money", the main thing is that you would have to open such a file, and this is an executable file with a Trojan horse.


Your not allowed to copy our tutorials!
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁