UNDERCODE COMMUNITY
2.69K subscribers
1.24K photos
31 videos
2.65K files
80.9K links
πŸ¦‘ Undercode World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE


✨ Youtube.com/Undercode
by Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS
Intel introduced over 50 processors in one go at the CES show.
#Technologies
Forwarded from UNDERCODE NEWS
"US Department of Defense Further Accelerate 5G Development"
#Technologies
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Xerosploit is a penetration testing toolkit whose goal is to perform man in the middle attacks for testing purposes. It brings various modules that allow to realise efficient attacks, and also allows to carry out denial of service attacks and port scanning. Powered by bettercap and nmap.

F E A T U R E S :

Port scanning
Network mapping
Dos attack
Html code injection
Javascript code injection
Download intercaption and replacement
Sniffing
Dns spoofing
Background audio reproduction
Images replacement
Drifnet
Webpage defacement and more ...

Depencies:

nmap
hping3
build-essential
ruby-dev
libpcap-dev
libgmp3-dev
tabulate
terminaltables

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/LionSec/xerosploit

2) cd xerosploit && sudo python install.py

3) sudo xerosploit

4) CHOOSE option

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Unilever CEO: "Employees will never return to the office five days a week"
#International
Forwarded from UNDERCODE NEWS
The date of criticism was explained by WhatsApp, which declared an ultimatum.
#Updates
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Bug Bounty references :

>>Amazon Web Services(mailto:aws-security@amazon.com)
>>Amazon.com(mailto:security@amazon.com)
>>ANCILE Solutions Inc.(https://bugcrowd.com/ancile)
>>Anghami(https://hackerone.com/anghami)
>>ANXBTC(https://cobalt.io/anxbtc)
>>Apache httpd(https://hackerone.com/ibb-apache)
>>Appcelerator(mailto:Infosec@appcelerator.com)
>>Apple(mailto:product-security@apple.com)
>>Apptentive(https://www.apptentive.com/contact)
>>Aptible(mailto:security@aptible.com)
>>Ardour(http://tracker.ardour.org/my_view_page.php)
>>Arkane(https://go.intigriti.com/arkanenetwork)
>>ARM mbed(mailto:whitehat@polarssl.org)
>>Asana(mailto:security@asana.com)
>>ASP4all(mailto:support@asp4all.nl)
>>AT&T(https://bugbounty.att.com/bugform.php)
>>Atlassian(https://securitysd.atlassian.net/servicedesk/customer/portal/2)
>>Attack-Secure(mailto:admin@attack-secure.com)
>>Authy(mailto:security@authy.com)
>>Automattic(https://hackerone.com/automattic)
>>Avast!(mailto:bugs@avast.com)
>>Avira(mailto:vulnerabilities@avira.com)
>>AwardWallet(https://cobalt.io/awardwallet)
>>Badoo(https://corp.badoo.com/en/security/#send_bid)
>>Barracuda(https://bugcrowd.com/barracuda)
>>Base(https://go.intigriti.com/base)
>>Basecamp(mailto:security@basecamp.com)
>>Beanstalk(https://wildbit.wufoo.com/forms/wildbit-security-response)
>>BillGuard(https://cobalt.io/billguard)
>>Billys Billing(https://cobalt.io/billys-billing)
>>Binary.com(https://hackerone.com/binary)

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Tool for free Applescript-based malware detection launched.
#Malwares
Forwarded from UNDERCODE NEWS
Google, "Through four zero-day vulnerabilities, someone attacks Windows and Android"
#Vulnerabilities
UNDERCODE COMMUNITY
Do you wat this apple script ?
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

WELL DONE !!!

This program provides further decompiling and decoding of a disassembled run-only AppleScript.

For input, use a text file that is the output of https://github.com/Jinmo/applescript-disassembler

Running this program will create a new file from the input file annotated with:

1) AEVT codes and their human-readable descriptions;

2) Decoded hard-coded strings;

3) Decimal conversions of hard-coded hex numbers;
Names of targeted applications.
Usage: aevt_decompile <file>

4) where <file> is a text file output from the AppleScript-Disassembler.

aevt_decompile writes its output to ~/Desktop/<file>.out. aevt_decompile is non-destructive (i.e., it does not modify the input file).

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Sberbank created the Zoom "killer"
#International
Forwarded from UNDERCODE NEWS
A new and near-final version of Windows 10X has been leaked.
#Updates