UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.9K links
๐Ÿฆ‘ Undercode Cyber World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE

โœจ Web & Services:
โ†’ Undercode.help
Download Telegram
- - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - -

๐Ÿฆ‘SOME COMMUN WORDS IN WINDOWS BACKDOORS :
(facebook.com/UnderCodeTestingCompanie)

1) payload: The payload type being used is "windows/meterpreter/reverse_http." This payload should correspond to the payload type used in the automate.rc resource file created in the previous step.

2) LHOST=YourVpsIpHere: The LHOST is the IP address of the attacker's server running Metasploit. This IP address should correspond to the LHOST used in the automate.rc resource file created in the previous step.

3) LPORT=80: The LPORT specifies the destination port. This port number should correspond to the LPORT used in the automate.rc resource file created in the previous step.

4) arch x86: Older Windows computers (32-bit) use x86 architecture and cannot execute 64-bit executables. Newer, 64-bit Windows computers can use either x86 or x64 architectures. It makes sense for attackers to use x86 architectures to cover a wider spectrum of Windows users.

5) platform win: This specifies the target platform. Other platforms include Android, macOS, Unix, and Solaris. In the case of this example, the "win" (Windows) platform was used.

6) format exe: Here the output format was specified as EXE or "executable." This executable will run on Windows computers without user input.

7) out: Attackers will often name viruses and backdoors after something believable like "Windows Security," "Windows Update," or "explorer.exe" to convince users a running process is not harmful or suspicious. The --out defines the name of the executable payload.

@ Mr BotNet(tm)
- - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - -
โ€” - UndercOde- โ€”

GUYZ TILL OUR CYDIA REPO IS BACK IN JAILBROKEN IOS

WE START IN IOS JAILBREAK HELP & SUPPORT

> FROM BEGINERS TILL EXPRETS

๐Ÿฆ‘ JOIN IF YOU ONLY IOS USERS ๐Ÿฆ‘

T.me/UnderCodeRepoUpdates


> REQUIRE ONLY IOS TO JOIN this Wa Grp:

https://chat.whatsapp.com/F2OCn7jbgjAACKouOnILHm
This media is not supported in your browser
VIEW IN TELEGRAM
NEW CHANNEL FOR IOS USERS ONLY ๐Ÿ‘
- - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - -


๐Ÿฆ‘DUMP ACCOUNTS HACKING
LIKES Netflix / mails/ bank accounts...
by undercOde:
(t.me/UnderCodeTestingOfficial)

๐Ÿฆ‘INSTALLISATION & RUN:

creddump is a python tool to extract various credentials and secrets from Windows registry hives. It currently extracts:

>LM and NT hashes (SYSKEY protected)

> Cached domain passwords

> LSA secrets

Open Terminal amd start ๐Ÿ˜

A) git clone https://github.com/moyix/creddump

B) GO DIRECTORy via cd creddump

C) THE TO USE:

1>Dump cached domain hashes:
usage: ./cachedump.py <system hive> <security hive>

2>Dump LSA secrets:
usage: ./lsadump.py <system hive> <security hive>

3>Dump local password hashes:
usage: ./pwdump.py <system hive> <SAM hive>

๐Ÿฆ‘MORE COMMANDS EXAMPLES:

4> pwdump Usage Example
Dump the password hashes using the system (system) and sam (sam) hives:

root@kali:~# pwdump system sam
Administrator:500:41aa818b512a8c0e72381e4c174e281b:1896d0a309184775f67c14d14b5c365a:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
HelpAssistant:1000:667d6c58d451dbf236ae37ab1de3b9f7:af733642ab69e156ba0c219d3bbc3c83:::
SUPPORT_388945a0:1002:aad3b435b51404eeaad3b435b51404ee:8dffa305e2bee837f279c2c0b082affb:::
lsadump Usage Example

5>Dump the LSA secrets using the system (system) and security (security) hives:

๐Ÿฆ‘root@kali:~# lsadump system security
_SC_ALG

_SC_Dnscache

_SC_upnphost

20ed87e2-3b82-4114-81f9-5e219ed4c481-SALEMHELPACCOUNT

_SC_WebClient

_SC_RpcLocator

0083343a-f925-4ed7-b1d6-d95d17a0b57b-RemoteDesktopHelpAssistantSID
0000 01 05 00 00 00 00 00 05 15 00 00 00 B6 44 E4 23 .............D.#
0010 F4 50 BA 74 07 E5 3B 2B E8 03 00 00 .P.t..;+....

0083343a-f925-4ed7-b1d6-d95d17a0b57b-RemoteDesktopHelpAssistantAccount
0000 00 38 00 48 00 6F 00 31 00 49 45 00 4A 00 26 00 E.J.&.8.H.o.1.I.
0010 00 63 00 72 00 48 00 68 00 53 6B 00 00 00 h.S.c.r.H.k...

๐Ÿฆ‘plz use for learn ๐Ÿฆ‘

wฬฝอ“rฬฝอ“iฬฝอ“tฬฝอ“tฬฝอ“eฬฝอ“nฬฝอ“ ฬฝอ“bฬฝอ“yฬฝอ“ ฬฝอ“Mฬฝอ“rฬฝอ“.ฬฝอ“ ฬฝอ“Bฬฝอ“oฬฝอ“tฬฝอ“Nฬฝอ“eฬฝอ“tฬฝอ“ ฬฝอ“(ฬฝอ“tฬฝอ“.ฬฝอ“mฬฝอ“.ฬฝอ“)ฬฝอ“

- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - - -
- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - - -

๐Ÿฆ‘HELLOW GUYZ LETS TALK TODAY BASIC ABOUT WIFI EXNCRYPTION:
(t.me/UnderCodeTestingOfficial)

๐Ÿฆ‘Differences among WEP, WPA and WPA2 wireless security protocols:

1) WEP. Wired Equivalent Privacy:

1999 - 2004 standard. Easy to break and hard to configure. Abandoned.

2) WPA. Wi-Fi Protected Access:

>Was used as a temporary enhancement for WEP. Easy to break. Configuration: moderate

> WPA was a significant enhancement over WEP, but as the core components were made so they could be rolled out through firmware upgrades on WEP-enabled devices, they still relied onto exploited elements.

3) WPA2. Wi-Fi Protected Access version 2 :

> The 802.11i wireless security standard based protocol was introduced in 2004. The most important improvement of WPA2 over WPA was the usage of the Advanced Encryption Standard (AES). AES is approved by the U.S. government for encrypting the information classified as top secret, so it must be good enough to protect home networks.

> nOW its easy to exploite the pass

>
WPA2 + AES
WPA + AES
WPA + TKIP/AES (TKIP is there as a fallback method)
WPA + TKIP
WEP
Open Network (no security at all)


The best way to go is to deactivate Wi-Fi Protected Setup (WPS) and set the router to WPA2 +AES. As you go down the list, you are getting less security for your network.

4) WPA3. Wi-Fi Protected Access version 3

> UPD: WPA3 is the next generation of WiFi security

Protecting Wi-Fi from hackers is one of the most important tasks in cybersecurity. Which is why the arrival of next-generation wireless security protocol WPA3 deserves your attention: Not only is it going to keep Wi-Fi connections safer, but also it will help save you from your own security shortcomings.
Here is what it offers:

a- Password Protection

b- Safer Connections

c- Also does not stop wifi hacking...

wฬฝอ“rฬฝอ“iฬฝอ“tฬฝอ“tฬฝอ“eฬฝอ“nฬฝอ“ ฬฝอ“bฬฝอ“yฬฝอ“ ฬฝอ“Mฬฝอ“rฬฝอ“.ฬฝอ“ ฬฝอ“Bฬฝอ“oฬฝอ“tฬฝอ“Nฬฝอ“eฬฝอ“tฬฝอ“ ฬฝอ“(ฬฝอ“tฬฝอ“.ฬฝอ“mฬฝอ“.ฬฝอ“)ฬฝอ“

- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - - -
- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - - -

๐Ÿฆ‘BEST FACEBOOK LIKER APPS TESTED: 2019
(INSTAGRAM.COM/UNDERCODETESTINGCOMPANY)

๐Ÿฆ‘MyLikelo: Customized Engagement for FB and IG

> http://mylikelo.com/

๐Ÿฆ‘Get Instant Likes: Simple, Multi-Purpose Navigation

> https://apkpure.com/get-instant-likes/socials.com.application/download?from=details

๐Ÿฆ‘FBoost: Grow An Online Presence

> http://fboost.me/

๐Ÿฆ‘ MyFBLiker: A Simplified Marketing Boost

> http://myfbliker.com/

๐Ÿฆ‘Swipa: Get Rewarded for Great Effort

> https://swipa.me/

wฬฝอ“rฬฝอ“iฬฝอ“tฬฝอ“tฬฝอ“eฬฝอ“nฬฝอ“ ฬฝอ“bฬฝอ“yฬฝอ“ ฬฝอ“Mฬฝอ“rฬฝอ“.ฬฝอ“ ฬฝอ“Bฬฝอ“oฬฝอ“tฬฝอ“Nฬฝอ“eฬฝอ“tฬฝอ“ ฬฝอ“(ฬฝอ“tฬฝอ“.ฬฝอ“mฬฝอ“.ฬฝอ“)ฬฝอ“

- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -
- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -

๐Ÿฆ‘I FOND A HELPFUL GOOGLE POST FOR TERMUX SCRIPTS:
(INSTGRAM.COM/UnderCodeTestingCompany)
ALL Avaible at github.com

๐Ÿฆ‘The Top Termux Open Source Projects

1) The missing terminal file manager for X
Termux App โญ๏ธ4,611
Android terminal and Linux environment - app repository.

2) Aidlearning Framework โญ๏ธ3,093
AidLearning build Linux environment running on the Android devices with GUI, Deep-Learning and Python Visual Programming support. One-click install.

3) Termux Packages โญ๏ธ2,650
Android terminal and Linux environment - packages repository.

4) Hiddeneye โญ๏ธ855
Modern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services [ Android-Support-Available ]

5) Tool X โญ๏ธ710
Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other android terminals. using Tool-X you can install almost 263 hacking tools in termux app and other linux based distributions.

6) Termuxarch โญ๏ธ414
You can use setupTermuxArch.sh ๐Ÿ“ฒ to install Arch Linux in Amazon Fire, Android and Chromebook. https://sdrausty.github.io/TermuxArch/docs/install

7) Hacktronian โญ๏ธ395
All in One Hacking Tool for Linux & Android

8) Atilo โญ๏ธ371
Linux installer for termux

9) Gbt โญ๏ธ354
Highly configurable prompt builder for Bash and ZSH written in Go.

10) Termux Api โญ๏ธ335
Termux add-on app which exposes device functionality as API to command line programs.

11) Anlinux App โญ๏ธ266
AnLinux allow you to run Linux on Android without root access.

12) Tbomb โญ๏ธ199
This is a SMS And Call Bomber For Linux And Termux

13) Termux Styling โญ๏ธ160
Termux add-on app for customizing the terminal font and color theme.

14) Txtool โญ๏ธ153
an easy pentesting tool.

15) Debian On Termux โญ๏ธ145
HOWTO install Debian 9 (stretch) on your Android smartphone

16) Termux Boot โญ๏ธ142
Termux add-on app allowing programs to be run at boot.

17) Termux Api Package โญ๏ธ136
Termux package containing scripts to call functionality in Termux:API.

18) Termux Adb โญ๏ธ127
Install ADB & FastBoot Tools in Termux!

19) Hackerpro โญ๏ธ126
All in One Hacking Tool for Linux & Android (Termux). Hackers are welcome in our blog

20) Buildapks โญ๏ธ119
Really quickly build APKs on device (smartphone and tablet) in Termux > See https://buildapks.github.io/docsBuildAPKs/setup to start building apps on Amazon Fire, Android and Chromebook.

21) Lightnovel Crawler โญ๏ธ116
Downloads lightnovels from various online sources and generates ebooks in many formats.

22) Termux.github.io โญ๏ธ114
The main termux site and help pages.

23) Termux Widget โญ๏ธ111
Termux add-on app which adds shortcuts to commands on the home screen.

24) Termux Extra Packages โญ๏ธ110

25) Proot โญ๏ธ109
An chroot-like implementation using ptrace.

26) Easy_hack โญ๏ธ108
Hack the World using Termux

27) Anlinux Resources โญ๏ธ107
Image and Script for LinuxOnAndroid App

28) Termuxalpine โญ๏ธ92
Use TermuxAlpine.sh calling to install Alpine Linux in Termux on Android. This setup script will attempt to set Alpine Linux up in your Termux environment.

29) Termux Style โญ๏ธ78
Simple Program for customizing the termux font and color theme...

30) Termux Create Package โญ๏ธ72
Python script to create Termux packages easily.

31) Termux Tasker โญ๏ธ68
Add-on application allowing to run Termux scripts from Tasker.

32) Postinstall โญ๏ธ65
Bash Script to automate post-installation steps

33) Termux โญ๏ธ51
Node.js module for Termux-API

34) Termux Mpv โญ๏ธ25
Wrapper for Mpv on Termux. Displays play controls in the notification

@ Steave(tm)

- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -
- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -

๐Ÿฆ‘HACK WEBSITES Tested with All in One Tool:
(instagram.com/UnderCodeTestingCompany)

๐Ÿฆ‘INSTALLISATION & RUN:

1) apt-get install python2

2) git clone https://www.github.com/MetaChar/Mercury

3) chmod +x requirements.sh

4) ./requirements.sh

๐Ÿฆ‘Features

1) BruteForce

2) Mercury uses Selenium to automatically input passwords into a website
GeoLocation

3) Gelocation allows the user to pin point the exact location of the ip address

4) Sms Spam (for some contries not work)

5) Uses gmail to spam sms

6) Spoof Email

7) Sends anonymous emails

8) Check If Website Exists

9) Mercury checks if the website is real

10) Check if Website Is Down

11) Checks if websites status is online or offline

12) Encode Strings Into Hash Form

13) Encodes your text into hash form

14) Hex Encode/Decode

15) Encodes and decodes hex strings

16) Whats My Ip & Mac

17) shows mac and ip address

18) Spam email

19) spams email in While True loop

20) Download Extra Tools

21) Download an extra 16 tools like hydra, metasploit and nmap

22 )Github Cloner & Pip Intsaller

23) nstalls Pips and Github repos
Website Cloner

24) Extracts the source code from a website

25) Ip Address From Website

26) Finds ip address from website
nmap

27) Nmap must be pre installed and its somewhat glitchy on linux
Port Listen

28) Listens to ports

29) DOS

30) dos attack via packets

31) AnonWebbrowser

32) Loads up Chrome, with a proxy

33) Google Dorks

34) Finds vulrnable links

35) Admin Pannel

36) Helps find the admin pannel to a website

37) Access some of the best hacking & robotoics websites.

38) Proxy Scraper

39) Find the best Us proxys!

41) Twitter Info Grab

42) Grab a twitter users basic info


๐Ÿฆ‘TESTED ON

> KALI

> PARROT

> WINDOWS

wฬฝอ“rฬฝอ“iฬฝอ“tฬฝอ“tฬฝอ“eฬฝอ“nฬฝอ“ ฬฝอ“bฬฝอ“yฬฝอ“ ฬฝอ“Mฬฝอ“rฬฝอ“.ฬฝอ“ ฬฝอ“Bฬฝอ“oฬฝอ“tฬฝอ“Nฬฝอ“eฬฝอ“tฬฝอ“ ฬฝอ“(ฬฝอ“tฬฝอ“.ฬฝอ“mฬฝอ“.ฬฝอ“)ฬฝอ“

- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - - -
UNDERCODE COMMUNITY pinned ยซโ€”โ€”โ€”โ€”โ€”UNDERCODEโ€”โ€”โ€”โ€”โ€”- DANGEROUS TRICK BY UNDERCODE โ˜ ๏ธ # TESTED AS MANY ACCOUNTS (instagram.com/UndercodeTestingCompany) ๐Ÿ•ทExplanation disable any WhatsApp account, whether Egyptian or foreign 1) go to record the number who want to disrupt it 2) code hasโ€ฆยป
- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -

๐Ÿฆ‘ TOP Types of Attacks :
(Twitter.com/UnderCodeTC)

๐Ÿฆ‘Denial of Service

Denial of service attacks leverage a vulnerability to create a loss of service, often by crashing the vulnerable process. The Stress Testing category of the Kali Linux menu contains a number of tools for this purpose.

When many people hear the term โ€œdenial of service attackโ€, they immediately think of resource consumption attacks that are sent out from multiple sources at once against a single target. These would be a distributed denial of services attack, or DDoS. These sorts of attacks are rarely part of a professional security assessment.


๐Ÿฆ‘Memory Corruption

A memory corruption happens when a location within the memory space of a process is accidentally modified due to programming mistakes. Memory corruption bugs usually lead to unpredictable program behavior, however in many cases, these bugs allow process memory manipulation in such a way that the program execution flow can be controlled, allowing attacker-defined activity.

These attacks are typically referred to as buffer overflows, although this term is an over-simplification. The most common types of memory corruption are vastly different from one another and have their own tactics and techniques required for successful exploitation.

๐Ÿฆ‘ Web Vulnerabilities

Due to the fact that modern web sites are no longer static pages, but instead dynamically generated for the user, the average website is quite complex. Web vulnerabilities take advantage of this complexity in an effort to attack either the back end page generation logic or the presentation to the visitor of the site.

These sorts of attacks are extremely common, as many organizations have reached the point where they have very few externally facing services. Two of the most prevalent web application attack types are SQL injection and cross-site scripting (XSS).

๐Ÿฆ‘ Password Attacks

Password attacks are attacks against the authentication system of a service. These attacks are often broken into online password attacks and offline password attacks, which you will find reflected in the Password Attacks menu category. In an online password attack, multiple passwords are attempted against a running system. In an offline password attack, the hashed or encrypted values of the passwords are obtained and the attacker attempts to obtain the clear text values. The protection against this sort of attack is the fact that it is computationally expensive to work through this process, limiting the number of attempts per second you can generate. However, workarounds for this do exist, such as using graphic processor units (GPUs) to accelerate the number of attempts that can be made. The kali-linux-gpu metapackage contains a number of tools that tap into this power.

๐Ÿฆ‘ Client-Side Attacks

Most attacks are conducted against servers, but as services have become harder to attack, easier targets have been selected. Client-side attacks are a result of this, where an attacker will target the various applications installed on the workstation of an employee within a target organization. The Social Engineering Tools menu category has a number of excellent applications that can help conduct these types of attacks.



@ Steave(tm)

- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -
- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -

๐Ÿฆ‘EXPLOITE ON KALI BU undercOde: 2019
(t.me/UnderCodeTestingOfficial)

๐Ÿฆ‘INSTALLISATION & RUN:
How to Install SearchSploit

2) open terminal & type:

apt update && apt -y install exploitdb

3) for update:

> searchsploit -u

> apt update && apt -y full-upgrade

4) > searchsploit -h
it show like this:
Usage: searchsploit [options] term1 [term2] ... [termN]

5) OTHER EXAMPLES COMMANDS:

>searchsploit afd windows local

> searchsploit -t oracle windows

>searchsploit -p 39446

>searchsploit linux kernel 3.2 --exclude="(PoC)|/dos/"

6) for basic search in database:

> searchsploit afd windows local

7) for exploite title:

> searchsploit -t oracle windows

8) Removing Unwanted Results:

We can remove unwanted results by using the --exclude option. We are also able to remove multiple terms by separating the value with a | (pipe). This can be demonstrated by the following:

> searchsploit linux kernel 3.2 --exclude="(PoC)|/dos/"

9) Piping Output (Alternative Method of Removing Unwanted Results)

The output from searchsploit can be piped into any other program, which is especially useful when outputting the results in JSON format (using the -j option). With this, it is possible to remove any unwanted exploits by using grep. In the following example, we use grep to filter out any "Denial of Service (DoS)" results.

> searchsploit XnView | grep -v '/dos/'

10) Copy To Clipboard

So now that we have found the exploit we are looking for, there are various ways to access it quickly.
By using -p, we are able to get some more information about the exploit, as well as copy the complete path to the exploit onto the clipboard:

example:
> searchsploit 39446

11) Copy To Folder

We recommend that you do not alter the exploits in your local copy of the database. Instead, make a copy of ones that are of interest and use them from a working directory. By using the -m option, we are able to select as many exploits we like to be copied into the same folder that we are currently in:

> searchsploit MS14-040

12 ) Exploit-DB Online

The Exploit Database repository is the main core of Exploit-DB, making SearchSploit efficient and easy to use. However, some of the exploit metadata (such as screenshots, setup files, tags, and vulnerability mappings) are not included. To access them, you will need to check the website.
You can quickly generate the links to exploits of interest by using the -w option:

> searchsploit WarFTP 1.65 -w


enjoy
Written By Mr. BotNet(tm)

- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -
๐Ÿฆ‘TODAY WHATSAPP SERVER IS SLOWING DOWN IN MANY CONTRIES
+ when try to verify new number
ITS SHOW LIKE SCREANSHOAT


> THE REASON IS NEW FEATURES WILL ADDED TO WHATSAPP
โ€”โ€”โ€”โ€”-๐–€๐–“D๐–Š๐–—๐•ฎ๐–”D๐–Šโ€”โ€”โ€”โ€”โ€”-

๐Ÿฆ‘COMMUMNS ports, such as TCP port 80 (HTTP), may be locked down โ€” but other ports may get overlooked and be vulnerable to hackers.
(T.me/UnderCodeTestingOfficial)

๐Ÿฆ‘In your security tests, be sure to check these commonly hacked TCP and UDP ports:


1) TCP port 21 โ€” FTP (File Transfer Protocol)

2)TCP port 22 โ€” SSH (Secure Shell)

3)TCP port 23 โ€” Telnet

4)TCP port 25 โ€” SMTP (Simple Mail Transfer Protocol)

5)TCP and UDP port 53 โ€” DNS (Domain Name System)


6)TCP port 443 โ€” HTTP (Hypertext Transport Protocol) and HTTPS (HTTP over SSL)

7)TCP port 110 โ€” POP3 (Post Office Protocol version 3)

8)TCP and UDP port 135 โ€” Windows RPC

9)TCP and UDP ports 137โ€“139 โ€” Windows NetBIOS over TCP/IP

10)TCP port 1433 and UDP port 1434 โ€” Microsoft SQL Server

@ Mr. BOTNET(t.m)
โ€”โ€”โ€”โ€”โ€”๐–€๐–“D๐–Š๐–—๐•ฎ๐–”D๐–Šโ€”โ€”โ€”โ€”-
โ€”โ€”โ€”โ€”โ€”๐–€๐–“D๐–Š๐–—๐•ฎ๐–”D๐–Šโ€”โ€”โ€”โ€”-

๐Ÿฆ‘SMTP ANALYSIS Extracting and analyzing URLs from Emails for phishing events TUTORIAL:
(T.ME/UnderCodeTestingOfficial)

๐Ÿฆ‘INSTALLISATION & RUN:

1) OPEN TERMINAL & Type:

> bro-pkg install initconf/smtp-url-analysis or @load smtp-url-analysis/scripts

2) fOR Upgrade

> bro-pkg upgrade bro/initconf/smtp-url-analysis.git The following packages will be UPGRADED:


3) SO OUTPUT WILL BE:

> bro/initconf/smtp-url-analysis.git (master)
Proceed? [Y/n] y Running unit tests for "bro/initconf/smtp-url-analysis.git" all 7 tests successful Upgraded "bro/initconf/smtp-url-analysis.git" (master)

๐Ÿฆ‘FEATURES:

1) Works in a cluster and standalone mode

2) extracts URLs from Emails and logs them to smtpurl_links.log

3) Tracks these SMTP urls in http analyzer and logs if any of these SMTP URL has been clicked into a file smtp_clicked_urls.log

4) Reads a file for malicious indicators and generates an alert of any of those inddicators have a HIT in smtp traffic (see below for more details)

5) Generates alerts if suspicious strings are seen in URL (see below for details)

6) Generates alerts if a SMTP URL is clicked resulting in a file download

Written By Mr. BotNet(tm)

- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -
- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -

๐Ÿฆ‘AWESOME SCRIPT FOR A testing system for catching visual regressions in Web applications.
(instagram.com/UnderCodeTestingCompany)

๐Ÿฆ‘INSTALLISATION & RUN:

1) git clone https://github.com/facebookarchive/huxley

2)(( pip install huxley))

3) python setup.py

๐Ÿฆ‘HOW USE :

1) host your app somewhere

For our example, simply cd to examples/webroot and run python -m SimpleHTTPServer to start a basic server for our demo. In your app you may need to start up whatever framework you're using.

2) create a Huxleyfile
A Huxleyfile describes your test. Create one that looks like this:

[toggle]
url=http://localhost:8000/toggle.html

3) record the test

Huxley makes writing tests easy because it simply records your browser session -- specifically mouse clicks and key presses on a single page -- and can replay them in an automated way. To do this you need to install Selenium Server and start it. It's as easy as java -jar selenium-server-standalone-XXX.jar.

4) playback

Simply run the huxley command in the same directory as the Huxleyfile to be sure that your app still works.

5) update the test with new screen shots

You'll likely update the UI of the component a lot without changing its core functionality. Huxley can take new screen shots for you when this happens. Tweak the UI of the component in toggle.html somehow (maybe change the button color or something) and re-run huxley. It will warn you that the UI has changed and will automatically

6) run in CI mode
If you're using a continuous integration solution like Jenkins you probably don't want to automatically rerecord screen shots on failure. Simply run huxley --playback-only to do this.

Additionally, you may find that you're dissatisfied with Huxley replaying your browsing session in real-time. You can speed it up (or slow it down) by editing your Huxleyfile to read:

[toggle]
url=http://localhost:8000/toggle.html
sleepfactor=0.5


@ Mr. BotNet(tm)

- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -
- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -

๐Ÿฆ‘WHAT IS RASPERY PI 4 & WHAT IS THERI USE
(t.me/UndercOdeTestingOfficial)

1) The Raspberry Pi 4 uses a Broadcom BCM2711 SoC with a 1.5 GHz 64-bit quad-core ARM Cortex-A72 processor, with 1MB shared L2 cache.

2) The Raspberry Pi Zero and Zero W use the same Broadcom BCM2835 SoC as the first generation Raspberry Pi, although now running at 1 GHz CPU clock speed.

3) CPU: 1.5 GHz 64/32-bit quad-core ARM Corte...

4) Release date: 24 February 2012; 7 years ago ...

5) Operating system: FreeBSD; Linux; NetBSD; O...

๐Ÿฆ‘USE OF RASPRY PI :

1) Replace Your Desktop PC With a Raspberry Pi

> Along with the Pi itself, the microSD card, and power supply, youโ€™ll need a HDMI cable and a suitable display. As with a traditional computer, youโ€™ll also need a USB keyboard and mouse.

The Raspberry Pi 3 and later has Wi-Fi and Bluetooth built in. If youโ€™re using an older model, youโ€™ll need compatible USB dongles (check compatibility at elinux.orgโ€™s Raspberry Pi Hub). If you prefer to use Ethernet, however, all Raspberry Pi models (except the Pi Zero) are equipped with Ethernet ports.

2) Print With Your Raspberry Pi

> Have an old printer that you really like using, but which cannot be connected to wirelessly? Youโ€™re probably inclined to dispose of it safely, but you really donโ€™t need to. All you need is a Raspberry Pi connected to your home network, and some print server software.

This is done by installing the Samba file sharing software, followed by CUPS. The Common Unix Printing System provides drivers for your printer and provides an administration console.

3) Add AirPrint Support to Your Pi Print Server

The above project only takes things so far. Itโ€™s ideal for printing from a Windows, Mac or Linux computer, but what about tablets and phones? For that, youโ€™ll need Air Print support, which can be added via a single script.

4) Cut the Cord With Kodi: A Raspberry Pi Media Center

Itโ€™s likely that the main use for a Raspberry Pi is as a Kodi media center. Available as disk images, several Kodi builds have been released, with OSMC and OpenElec among the most popular.

5) Set Up a Retro Gaming Machine

Two main options are available for retro gaming, Recalbox and RetroPie. Others can be used, but all will need a suitable controller that will need some initial configuration. Many platforms can be emulated, from classic MS-DOS PC gaming to the Commodore 64. Many popular 16-bit games consoles can also be revived on the Raspberry Pi.

6) Build a Minecraft Game Server

Most effectively, your Pi makes an excellent game server for Minecraft, letting you play from anywhere on your home network. If you have multiple Raspberry Pis, having one as dedicated server will give you a great gaming experience. This works particularly well if you have plenty of Minecraft fans to play with.

7) Control a Robot

There are so many robot-controller Raspberry Pi projects that itโ€™s difficult to settle on a single example. You might, for instance, rely on a dedicated robotics package for your Pi, with the device battery powered and used to communicate and control your robot.

@ Mr. BotNet(tm)

- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -
โ€”โ€”โ€”โ€”โ€”-๐–€๐–“D๐–Š๐–—๐•ฎ๐–”D๐–Šโ€”โ€”โ€”โ€”โ€”โ€”


๐Ÿฆ‘HOW REMOVE ICLOUD FULL GUIDE BY UNDERCODE TESTED ON IOS 12.2
(T.me/UnderCodeRepoUpdates)


๐Ÿฆ‘LETS START:

1) Install Filza from Cydia or using cydia impactor from your computer

2) Install filzajailed ipa into your iphone
Go to general > device management >

3) acept the certificate

4) Open filzaescaped and go to : /var/mobile/library/accounts and

๐Ÿฆ‘Delete: Accounts3.sqlite, Accounts3.sqlite.shm, Accounts3.sqlite.wal

> Go to /var/mobile/library/ConfigurationProfiles and Delete :

> ClientTruth.plist and

> CloudConfigurationDetails.plist
In some devices, (ios12.2) you need to go UserConfigurationProfiles and delete all files inside this folder

5) Reboot

6) add new apple ID

7) You can now upgrade or reset your ios well done

โ€”โ€”โ€”โ€”โ€”-๐–€๐–“D๐–Š๐–—๐•ฎ๐–”D๐–Šโ€”โ€”โ€”โ€”โ€”โ€”-
Hacking_The_Next_Generation. UNDERCODE.pdf
7.5 MB