UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.9K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
Exposure to Intel 11 core coreless display F series: only i9-11900KF is absent.
#Technologies
Forwarded from UNDERCODE NEWS
Iranian hackers say: We hacked into the subsidiary of IAI.
#CyberAttacks
Forwarded from UNDERCODE NEWS
New Vmware Vulnerability could allow an attacker to block your host.
#Vulnerabilities
Forwarded from UNDERCODE NEWS
Windows 10X will come with the newly built Windows File Explorer.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ENJOY WITH NEW CTF FREE :

DEF CON >> https://legitbs.net/

* CSAW CTF >> https://ctf.isis.poly.edu/

* hack.lu CTF >> http://hack.lu/

* Pliad CTF >> http://www.plaidctf.com/

* RuCTFe >> http://ructf.org/e/

* Ghost in the Shellcode >> http://ghostintheshellcode.com/

* PHD CTF >> http://www.phdays.com/

* SECUINSIDE CTF >> http://secuinside.com/

* Codegate CTF >> http://ctf.codegate.org/html/Main.html?lang=eng

* Boston Key Party CTF >> http://bostonkeyparty.net/

* ZeroDays CTF >> https://zerodays.ie/

* Insomni’hack >> https://insomnihack.ch/

* Pico CTF >> https://picoctf.com/

* prompt >> 1 to win >> http://prompt.ml/ - XSS Challenges

* HackTheBox >> https://www.hackthebox.eu/

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
β€œMade in India”.The iPhone 12 is expected to be available within two months
#International
Forwarded from UNDERCODE NEWS
The first anonymously stored patient information is based on the Next Generation Medical Infrastructure Rule, NTT Records, etc.
#Technologies
Forwarded from UNDERCODE NEWS
Microsoft will make its own processors.
#Technologies
Forwarded from UNDERCODE NEWS
Samsung Galaxy A22 5G exposure to price and time to market.
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘WHY REVERSE ENGINEERING ?
#Basic

> To disassemble a program, someone doing reverse engineering on software can use several tools. One instrument is a hexadecimal dumper that prints or shows a program's binary numbers in hexadecimal format (which is easier to read than a binary format).

> The reverse engineer will classify some parts of a program and see how they operate by understanding the bit patterns that represent the processor instructions as well as the instruction lengths. The disassembler is another popular method. The disassembler reads the binary code and then reveals the text form of each executable command.

> A disassembler can not say the difference between an executable instruction and the program's code, so a debugger is used to keep the disassembler from disassembling the program's data parts. A cracker may use these techniques to change code to gain access to a computer system or inflict other harm.

> Reverse engineering of electronics means pulling a system apart to see if it functions. For example, if a maker of processors needs to see how the processor of a competitor operates, they might buy the processor of a competitor, disassemble it, and then make a processor close to it. In certain nations, however, this method is unconstitutional. In general, reverse engineering of hardware involves a great deal of experience and is very costly.

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Surface Pro 7: 250 € discount for the famous 2 in 1.
#Technologies
Forwarded from UNDERCODE NEWS
Jack Ma offered China a stake in finance giant Annette to appease the administration.
#International
Forwarded from UNDERCODE NEWS
Warning! Spyware PegASUS can eavesdrop on information in iOS devices without user contact.
#Vulnerabilities