UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.8K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘APPS & TIPS FOR VIEWS & SUBSC YOUTUBE :

https://play.google.com/store/apps/details?id=com.viewgrip.viewgripapp&hl=en&gl=US
(VIEWS)

https://play.google.com/store/apps/details?id=com.fairware.viralmyvideo&hl=en&gl=US
(VIEWS)

https://github.com/mayurkadampro/YouTube-SubBot
(BOT FOR SUBSC)
Part 1 Youtube Subscriber Python Bot - https://youtu.be/xXXryQw6CYc

Part 2 Youtube Subscriber Python Bot - https://youtu.be/M_ZauWVzWKc

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Thousands of employees return to Beeline: The operator refused to outsource communication networks.
#international
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Pentest with java..
Leshan provides libraries which help people to develop their own Lightweight M2M server and client.
The project also provides a client, a server and a bootstrap server demonstration as an example of the Leshan API and for testing purpose.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) Get and run the last binary of our demo server :

wget https://ci.eclipse.org/leshan/job/leshan/lastSuccessfulBuild/artifact/leshan-server-demo.jar
java -jar ./leshan-server-demo.jar

2) Get and run the last binary of our demo client :

wget https://ci.eclipse.org/leshan/job/leshan/lastSuccessfulBuild/artifact/leshan-client-demo.jar
java -jar ./leshan-client-demo.jar

3) Get and run the last binary of our bootstrap demo server :

wget https://ci.eclipse.org/leshan/job/leshan/lastSuccessfulBuild/artifact/leshan-bsserver-demo.jar
java -jar ./leshan-bsserver-demo.jar
ℹ️ : All the demos have a --help option.

πŸ¦‘Compile Leshan & Run Demos

4) Get sources :

#using ssh
git clone git@github.com:eclipse/leshan.git
or

#using https

5) git clone https://github.com/eclipse/leshan.git

Compile it, by running in leshan root folder :

6) mvn clean install

7) Run demo server:

java -jar leshan-server-demo/target/leshan-server-demo-*-SNAPSHOT-jar-with-dependencies.jar

8) Connect on Leshan demo UI: http://localhost:8080
Leshan server Demo provides a very simple UI to get the list of connected clients and interact with clients resources.

9) Now you can register a LWM2M client by running our client demo:

java -jar leshan-client-demo/target/leshan-client-demo-*-SNAPSHOT-jar-with-dependencies.jar
or trying the Eclipse Wakaama test client.

10) You can also try our bootstrap demo server:

java -jar leshan-bsserver-demo/target/leshan-bsserver-demo-*-SNAPSHOT-jar-with-dependencies.jar

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Black Rota, a highly-based malware that makes analysis impossible through obfuscation.
#Malwares
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘BEST WIFI ANALYSING APPS FOR WINDOWS:

https://www.metageek.com/products/inssider/index-2.html

https://www.microsoft.com/en-us/store/p/wifi-analyzer/9nblggh33n0n

https://www.vistumbler.net/

https://www.wireshark.org/

https://www.microsoft.com/en-us/p/wifi-analyzer-tool/9nblggh1nj0s?activetab=pivot%3aoverviewtab

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Hacker's are targeting google play again with adware and hidden backdoor's
#Malwares
Forwarded from UNDERCODE NEWS
Xiaomi has released a super-cheap smartphone with a record battery and declared its independence.
#Technologies
Forwarded from UNDERCODE NEWS
A new potential leak of the magic cookie in SUSE Linux Enterprise discovered today, leaving millions of Europ servers vulnerable against attackers
#Vulnerabilities
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘.onion links:
(ue tor server for opening those links)

DarkZone http://darkzonebry27nxa.onion/ online

Money Market http://moneyd6327quniuo.onion online

Dark Web Hackers Zone http://darkzonebry27nxa.onion/ online

Trusted Market http://trustedb3yde3prf.onion online

GUROchan http://gurochanocizhuhg.onion/ offline

Aktif Haber http://6a3nny6zpg23dj7g.onion/ offline

zmovie – Watch Movies online for free on zmovie.tv http://
zmovietoropzaid3.onion/ online

IW4x http://iw4xcachep26muba.onion/ online
Rent-A-Hacker – Hire a hacker for every job you can imagine,
from DDOS to completely ruining people or destroy reputation of a company or individual http://2ogmrlfzdthnwkez.onion/ online


▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Beware of malicious code infection and phishing impersonation by the National Tax Service after opening'e-tax invoice'
#Malwares
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘methods to bypass anti-crawlers in python:

1) On the way we climbed, there were different routes to reach the end. Because of the different routes chosen, the difficulty of climbing is also different. Just like when I taught you how to get data in the past few days, I have intermittently talked about methods such as header and address ip. I believe you have mastered the specific crawling methods. This editor is mainly for you to sort out the anti-crawler methods. While reviewing the methods, you can check and fill in the gaps and establish a systematic crawler knowledge framework.

2) First analyze the website to be crawled, which is essentially an information query system that provides a search page. For example, if I want to get a case, I need to use the id or name field of the case to search for the page of this case.

3) For security considerations, some websites will take some anti-crawl measures, such as the need to judge user-angent and cookies as mentioned before, or judge whether the requested IP has been accessed multiple times in a short period of time. This website uses the security service of Know Chuangyu, frequent visits will prompt abnormal ip behavior.

πŸ¦‘The browser is essentially an application. As long as the ip is not blocked, since it can be accessed through the browser, it should be no problem for us to write a program to request it.

Some common measures to bypass anti-reptiles are:

1) Structure the message header: The user-angent and cookies mentioned above are all included in the message header.

2) Extend the request interval: If you send requests quickly and frequently, a large amount of server resources will be preempted.

> In this case, it is easy to be detected by the security measures of the website and block the IP.

3) Therefore, the request interval should be extended appropriately, such as sending the next request at random intervals ranging from 2-5 seconds.

4) Use proxy ip to solve ip detection problems.
Of course, the common anti-crawler methods are not limited

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
A big mistake creating access list with 6-digit phone number, increase accessibility to'digitally vulnerable groups'
#Vulnerabilities
Forwarded from UNDERCODE NEWS
Search "Yandex" switched to neurotechnology, which he has been focusing on for 10 years.
#Updates