UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.7K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
Enjoy Today's list of free pro Android applications and games(Google Play) of the day is amazing.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘BetterBackdoor can create and control a backdoor.

F E A T U R E S :

Execute command line commands
Run PowerShell scripts
Run DuckyScripts to input keystrokes
Exfiltrate files based on extension
Exfiltrate Microsoft Edge and WiFi Passwords
Send and receive files to the victim's computer
Run KeyLogger
Get a screenshot of the victim's computer
Get text copied to victim's clipboard
Get the contents of the victim's file (cat)
This backdoor uses a client-server socket connection for communication.
The attacker starts the server and the victim connects to that server as a client.
Once the connection is established, commands can be sent to the client to control the backdoor.
To create a backdoor, BetterBackdoor:

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) Download: https://github.com/ThatcherDev/


1) Create "run.jar", the backdoor jar file, and copy it to the "backdoor" directory.

2) D obavte text file containing IPv4-address of the server to the Β«run.jarΒ».
Optionally copy the Java Runtime Environment to "backdoor" and create a batch file "run.bat" to run the backdoor in the packaged Java Runtime Environment.tterBackdoor:

3) To run the backdoor on the victim's computer, transfer all files from the "backdoor" directory to the victim's computer.

4) If the JRE is packaged with a backdoor, run run.bat, otherwise run run.jar.

5) This will launch a backdoor on the victim's computer.

6) Once launched, to control the backdoor, you must go back to BetterBackdoor and run option 1 at startup, connected to the same Wi-Fi network as the victim's computer.

(don't clone our tips)
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
In Europe, Samsung is entering the 5G race to overtake Huawei, but consumers have big reservations
#Technologies
Forwarded from UNDERCODE NEWS
To try live streaming, Walmart partnered up with TikTok, recommending fashion designer items.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Recommended free Threat intelligence and IOC resources

* [FireEye IOCs](https://github.com/fireeye/iocs) - Indicators of Compromise
shared publicly by FireEye.

* [FireHOL IP Lists](https://iplists.firehol.org/) - Analytics for 350+ IP lists
with a focus on attacks, malware and abuse. Evolution, Changes History,
Country Maps, Age of IPs listed, Retention Policy, Overlaps.

* [HoneyDB](https://riskdiscovery.com/honeydb) - Community driven honeypot sensor data collection and aggregation.

* [hpfeeds](https://github.com/rep/hpfeeds) - Honeypot feed protocol.

* [Infosec - CERT-PA lists](https://infosec.cert-pa.it/analyze/statistics.html) ([IPs](https://infosec.cert-pa.it/analyze/listip.txt) - [Domains](https://infosec.cert-pa.it/analyze/listdomains.txt) - [URLs](https://infosec.cert-pa.it/analyze/listurls.txt)) - Blocklist service.

* [InQuest REPdb](https://labs.inquest.net/repdb) - Continuous aggregation of IOCs from a variety of open reputation sources.

* [InQuest IOCdb](https://labs.inquest.net/iocdb) - Continuous aggregation of IOCs from a variety of blogs, Github repos, and Twitter.

* [Internet Storm Center (DShield)](https://isc.sans.edu/) - Diary and

* [SystemLookup](https://www.systemlookup.com/) - SystemLookup hosts a collection of lists that provide information on
the components of legitimate and potentially unwanted programs.

* [ThreatMiner](https://www.threatminer.org/) - Data mining portal for threat
intelligence, with search.

* [threatRECON](https://threatrecon.co/) - Search for indicators, up to 1000
free per month.



▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Coronavirus: Google postpones jobs' return until September.
#international
Forwarded from UNDERCODE NEWS
More than 70% of enterprises have faced assaults on endpoints and IoT devices in 2020.
#Analytiques
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

Git tips:

The hooks directory contains client or server hook scripts, which are automatically executed under specific operations.

info contains a global exclusion file, which can be ignored by the configuration file

logs save log information

The objects directory stores all data content, and the local version repository is placed

The refs directory stores a pointer (branch) to the commit object of the data

The config file contains project-specific configuration options
description is used to display the description of the warehouse

The HEAD file indicates the branch that is currently checked out
index Temporary area data
Remember: Do not manually modify the contents of the .git folder*

Work area (code editing area): represents the local development code
Temporary storage area (modification to be submitted area): represents the address of the temporary storage code of the local warehouse

Warehouse area (code storage area): representative code enters local version control

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
The smartphone with the largest battery in the family has been launched by Xiaomi.
#Technologies
Forwarded from UNDERCODE NEWS
Android: Lightning-speed writing is no longer a concern.
#Updates
Forwarded from UNDERCODE NEWS
Apps for finance: the latest to get on your mobile.
#Updates
Forwarded from UNDERCODE NEWS
Official website data for the National Bank PS5 launch countdown has been revised.
#Technologies
wpa2 wifi hacking :

1)pkg update && pkg upgrade

2)pkg install bash

3) pkg install git

4) git clone https://github.com/Anonymous3-SIT/wifi-hacker

5) cd wifi-hacker

6)ls

7) bash wifi-hacker.sh

8) choose otption

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Apple changes trade-in rates for goods, iPad/Watch raises, Mac sinks
#international
Forwarded from UNDERCODE NEWS
LG unveils thin and light laptop Gram 16.
#Technologies
Forwarded from UNDERCODE NEWS
Artificial Intelligence: how many really know it?
#Technologies #Analytiques