UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.3K links
๐Ÿฆ‘ Undercode Cyber World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE

โœจ Web & Services:
โ†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
Smart glasses from Facebook are scheduled to be released in 2021 as undercode reported in 2020.
#Technologies
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Input encrypted text, get the decrypted text back.

50+ encryptions/encodings supported such as binary, Morse code and Base64. Classical ciphers like the Caesar cipher,

Affine cipher and the Vigenere cipher. Along with modern encryption like repeating-key XOR and more

Custom Built Artificial Intelligence with Augmented Search (AuSearch) for answering the question "what encryption was used?" Resulting in decryptions taking less than 3 seconds.

Custom built natural language processing module Ciphey can determine whether something is plaintext or not. Whether that plaintext is JSON, a CTF flag, or English, Ciphey can get it in a couple of milliseconds.

Multi Language Support at present, only German & English (with AU, UK, CAN, USA variants).

Supports encryptions and hashes Which the alternatives such as CyberChef Magic do not.
C++ core Blazingly fast.

๐Ÿ„ธ๐Ÿ„ฝ๐Ÿ…‚๐Ÿ…ƒ๐Ÿ„ฐ๐Ÿ„ป๐Ÿ„ป๐Ÿ„ธ๐Ÿ…‚๐Ÿ„ฐ๐Ÿ…ƒ๐Ÿ„ธ๐Ÿ„พ๐Ÿ„ฝ & ๐Ÿ…๐Ÿ…„๐Ÿ„ฝ :

1) DOWNLOAD or Clone : https://github.com/Ciphey/Ciphey

2) go to dir

3) Example :

File Input ciphey -f encrypted.txt

Unqualified input ciphey -- "Encrypted input"

Normal way ciphey -t "Encrypted input"


To get rid of the progress bars, probability table, and all the noise use the quiet mode.

ciphey -t "encrypted text here" -q

For a full list of arguments, run ciphey --help.

โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from UNDERCODE NEWS
Proposal passed: By extension, Fedora 34 unlocks systemd-oomd.
#Updates
Forwarded from UNDERCODE NEWS
Warning ! Adopts complex encryption algorithm for new ransomware family barbook
#Malwares
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘cdaengine0400.dll manual deletion method:

cdaEngine0400.dll has earlier been reported as spyware, but new reports show that newer versions of the file is clean. We still don't have the file though, and only provide removal instructions.

Uninstall notice for WildTangent

1) Notice that removing WildTangent may cause the program that bundled
it to not function as intended.

Uninstall procedure

2) Uninstall WildTangent from "Add/Remove Programs" in the Windowsยฎ Control Panel.

3) The vendor is also offering uninstall instructions. If you run into problems

4) uninstalling, please contact the vendor for support. Note that you will not
be able to play WildTangent games if you decide to uninstall.

5) Earlier versions of WildTangent's uninstaller leaved a large number of files

6) in the "%WinDir%\wt\" folder which can be deleted manually after running the
uninstaller.

7) Note: %WinDir% is a variable (?). By default, this is
C:\Windows

โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from UNDERCODE NEWS
Update your google chrome now ! A new release fix many vulnerabilities.
#Updates #Vulnerabilities
Forwarded from UNDERCODE NEWS
Following the protests in Washington, the price of Bitcoin is at its peak: close to $ 38,000.
#Analytiques
Forwarded from UNDERCODE NEWS
The new Edge officially supports Apple M1 processor.
#Updates
Forwarded from UNDERCODE NEWS
Not only twitter & Facebook YouTube also, delete the video of the president Trump.
#Ban
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Android hacking :

Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.

๐Ÿ„ธ๐Ÿ„ฝ๐Ÿ…‚๐Ÿ…ƒ๐Ÿ„ฐ๐Ÿ„ป๐Ÿ„ป๐Ÿ„ธ๐Ÿ…‚๐Ÿ„ฐ๐Ÿ…ƒ๐Ÿ„ธ๐Ÿ„พ๐Ÿ„ฝ & ๐Ÿ…๐Ÿ…„๐Ÿ„ฝ :

1) git clone https://github.com/EntySec/ghost.git

2) cd ghost

3) chmod +x install.sh

4) ./install.sh

> Simple and clear UX/UI.
Ghost Framework has a simple and clear UX/UI.
It is easy to understand and it will be easier
for you to master the Ghost Framework.

> Device shell access.

-Ghost Framework has the ability to access the remote Android

-device shell without using OpenSSH or other protocols.
Controlling device screen

_Ghost Framework has the ability to access device screen
and control it remotely using mouse and keyboard.

โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from UNDERCODE NEWS
The battle of GitHub: US authorization to restore services in Iran has been obtained.
#Ban
Forwarded from UNDERCODE NEWS
The U.S. states that digital taxes are discriminatory in India, Italy, and Turkey, but will not take any action for the time being.
#International
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Data hacking exercices :

"Hacking in the sense of deconstructing an idea, hardware, anything and getting it to do something it wasnโ€™t intended or to better understand how something works." (BSides CFP)

So hacking here means we want to quickly deconstruct data, understand what we've got and how to best utilize it for the problem at hand.

The primary motivation for these exercises is to explore the nexus of IPython, Pandas and Scikit Learn on security data of various kinds. The exercises will often intentionally show common missteps, warts in the data, paths that didn't work out that well and results that could definitely be improved upon. In general we're trying to capture what worked and what didn't, not only is that more realistic but often much more informative to the reader. :)


Download:
https://github.com/SuperCowPowers/data_hacking

โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–