UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
In Russia, the income of small app developers grew by 65%
#Updates
Forwarded from UNDERCODE NEWS
South Korean regulator speeds up analysis of Google's proposal to raise commissions.
#International
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘HIGH RATED HACKING TOOLS :

>>XSSFreak(https://github.com/PR0PH3CY33/XSSFreak)

>>XSpear(https://github.com/hahwul/XSpear)

>>XSSCon(https://github.com/menkrep1337/XSSCon)

>>XanXSS(https://github.com/Ekultek/XanXSS)

>>Advanced XSS Detection Suite(https://github.com/UltimateHackers/XSStrike)

>>RVuln(https://github.com/iinc0gnit0/RVuln)

>>Whitespace(https://github.com/beardog108/snow10)

SocialMedia Bruteforce

>>Instagram Attack(https://github.com/chinoogawa/instaBrute)

>>AllinOne SocialMedia Attack(https://github.com/Matrix07ksa/Brute_Force)

>>Facebook Attack(https://github.com/Matrix07ksa/Brute_Force)

>>Application Checker(https://github.com/jakutatech/underhanded)
Android Hacking tools

>>Keydroid(https://github.com/F4dl0/keydroid)

>>MySMS(https://github.com/papusingh2sms/mysms)

>>Lockphish (Grab target LOCK PIN)(https://github.com/JasonJerry/lockphish)

>>DroidCam (Capture Image)(https://github.com/kinghacker0/WishFish)

>>EvilApp (Hijack Session)(https://github.com/crypticterminal/EvilApp)

>>HatCloud(Bypass CloudFlare for IP)(https://github.com/HatBashBR/HatCloud)
IDN Homograph Attack

>>EvilURL(https://github.com/UndeadSec/EvilURL)
Email Verify tools

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
It's full of windows! Samsung needs to create a cell phone!
#Technologies
Forwarded from UNDERCODE NEWS
The power bank could also be eavesdropping on you in addition to implanting Trojans.
#CyberAttacks
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

Hack anything, special tutorials collection from git:

1- 3 Ways Extract Password Hashes from NTDS.dit:

https://www.hackingarticles.in/3-ways-extract-password-hashes-from-ntds-dit

-2- 3 ways to Capture HTTP Password in Network PC:

https://www.hackingarticles.in/3-ways-to-capture-http-password-in-network-pc/

-3- 3 Ways to Crack Wifi using Pyrit,oclHashcat and Cowpatty:

www.hackingarticles.in/3-ways-crack-wifi-using-pyrit-oclhashcat-cowpatty/

-4-BugBounty @ Linkedln-How I was able to bypass Open Redirection Protection:

https://medium.com/p/2e143eb36941

-5-BugBounty β€” β€œLet me reset your password and login into your account β€œ-How I was able to Compromise any User Account via Reset Password Functionality:

https://medium.com/p/a11bb5f863b3/share/twitter

-6-β€œJourney from LFI to RCE!!!”-How I was able to get the same in one of the India’s popular property buy/sell company:

https://medium.com/p/a69afe5a0899

-7-BugBounty β€” β€œI don’t need your current password to login into your account” - How could I completely takeover any user’s account in an online classi ed ads company:

https://medium.com/p/e51a945b083d

-8-BugBounty β€” β€œHow I was able to shop for free!”- Payment Price Manipulation:

https://medium.com/p/b29355a8e68e

-9-Recon β€” my way:

https://medium.com/p/82b7e5f62e21

-10-Reconnaissance: a eulogy in three acts:

https://medium.com/p/7840824b9ef2

-11-Red-Teaming-Toolkit:

https://github.com/infosecn1nja/Red-Teaming-Toolkit

-12-Red Team Tips:

https://vincentyiu.co.uk/

-13-Shellcode: A reverse shell for Linux in C with support for TLS/SSL:

https://modexp.wordpress.com/2019/04/24/glibc-shellcode/

-14-Shellcode: Encrypting traffic:

https://modexp.wordpress.com/2018/08/17/shellcode-encrypting-traffic/

-15-Penetration Testing of an FTP Server:

https://medium.com/p/19afe538be4b

-16-Reverse Engineering of the Anubis Malware β€” Part 1:

https://medium.com/p/741e12f5a6bd

-17-Privilege Escalation on Linux with Live examples:

https://resources.infosecinstitute.com/privilege-escalation-linux-live-examples/

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
It's hard to close APP ads, expert: giving consumers a chance to say no.
#Updates
Forwarded from UNDERCODE NEWS
4G investment has been frozen, but you can still rest assured that it still takes 3-4 years to grow 5G.
#International
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to check the provider of installed RPM packages on Linux ??

1) List of RPM Package Vendor Information
To list all rpm's with vendor information, use the –query format (–of) parameter.

# rpm -qa --queryformat '% {NAME} -% {VERSION} -% {RELEASE}.% {ARCH}% {VENDOR} \ n'
Output example:

# rpm -qa --queryformat '% {NAME} -% {VERSION} -% {RELEASE}.% {ARCH}% {VENDOR} \ n'
python3-pyparted-3.11.0-13.el8.x86_64 CentOS
python3-gobject-base-3.28.3-1.el8.x86_64 CentOS
libvirt-daemon-driver-secret-4.5.0-42.module_el8.2.0 + 320 + 13f867d7.x86_64 CentOS
gnome-screenshot-3.26.0-3.el8.x86_64 CentOS
fontpackages-filesystem-1.44-22.el8.noarch CentOS
libevdev-1.8.0-1.el8.x86_64 CentOS
cronie-1.5.2-4.el8.x86_64 CentOS
lua-json-1.3.2-9.el8.noarch CentOS
mesa-libglapi-19.3.4-2.el8.x86_64 CentOS
baobab-3.28.0-4.el8.x86_64 CentOS
xkeyboard-config-2.28-1.el8.noarch CentOS
...
2) List of third party or non-native packages
To list all packages that are not provided by CentOS, run the following command:

# rpm -qa --qf "% {NAME} -% {VERSION} -% {RELEASE} -% {ARCH}% {VENDOR} \ n" | awk '{if ($ 2! = "CentOS") print $ 0;}'
Sample output from a CentOS 8 server:

# rpm -qa --qf "% {NAME} -% {VERSION} -% {RELEASE} -% {ARCH}% {VENDOR} \ n" | awk '{if ($ 2! = "CentOS") print $ 0;}'
gpg-pubkey-8483c65d-5ccc5b19- (none) (none)
amazon-ssm-agent-2.3.1644.0-1-x86_64 Amazon.com
gpg-pubkey-6963f07f-57fad2ec- (none) (none)
More information
If you would like to know more about a specific rpm package!

3) request installed rpm

# rpm -qi [rpm_name]

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Microsoft worked out how to cure "forgetful" passwords for Windows 10.
#Updates
Forwarded from UNDERCODE NEWS
Apple's independent domestic repair service company will repair the iPhone on-site!
#International
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

ITWSV- Integrated Tool for Web Security Vulnerability:

ITWSV is automated penetration testing tool which performs information gathering, auditing and reporting.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/penetrate2hack/ITWSV.git

2) cd ITWSV

3) chmod +x start.sh

4) chmod +x update.sh (only if required)

5) ./start.sh

6) choose option> WHOIS

DNSWALK

FIERCE

DNSRecon

DNSenum

NMAP

DMitry

theHarvester

LBD

SSLScan

SSLYze

WhatWeb

Automater

Grabber

Parsero

Uniscan

Metagoofil

A2SV

WPScan

Droopescan

WPSeku

XssPy

Spaghetti

sublist3r

WAFW00F

nslookup

nslookup

dirsearch

OWASP Joomscan

Spaghetti

Globuster

Grabber

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Ransomware has struck Whirlpool, a giant American manufacturer.
#Malwares #CyberAttacks
Forwarded from UNDERCODE NEWS
Operators of Revil ransomware threaten to upload photographs pertaining to cosmetic surgery.
#Malwares
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ALL FREE :

Dynamic Reverse Shell generator (PHP, Bash, Ruby, Python, Perl, Netcat)

Shell Spawning (TTY Shell Spawning)

XSS Payloads

Basic SQLi payloads

Local file inclusion payloads (LFI)

Base64 Encoder / Decoder

Hash Generator (MD5, SHA1, SHA256, SHA512, SM3)

Useful Linux commands (Port Forwarding, SUID)

RSS Feed (Exploit DB, Cisco Security Advisories, CXSECURITY)

CVE Search Engine

Various method of data exfiltration and download from a remote
machine

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) install this extension in your browser: https://addons.mozilla.org/en-US/firefox/addon/hacktools/

2) switch on from extension manager

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Call Center: scams that affect their victims randomly.
#International