UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.2K links
๐Ÿฆ‘ Undercode Cyber World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE

โœจ Web & Services:
โ†’ Undercode.help
Download Telegram
LEARN PASSWORD CRACKING ๐Ÿฆ‘.pdf
489.8 KB
- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -

๐Ÿฆ‘CRACKING FULL TUTORIAL LINUX/TERMUX(root):
Instagram.com/UnderCodeTestingCompany)


๐Ÿฆ‘FEATURES:

1) Brute Force Attack (7 characters)

2) Dictionary Attack

3) All wordlists in "hcatOptimizedWordlists" with "best64.rule"

4) wordlists/rockyou.txt with "d3ad0ne.rule"

5) wordlists/rockyou.txt with "T0XlC.rule"

6) Top Mask Attack (Target Time = 4 Hours)

โ€ข Fingerprint Attack
โ€ข Combinator Attack
โ€ข Hybrid Attack
โ€ข Extra - Just For Good Measure
โ—ฆ Runs a dictionary attack using wordlists/rockyou.txt with chained "combinator.rule" and "InsidePro-PasswordsPro.rule" rules


๐Ÿฆ‘OPTIONS :


(1) Quick Crack
(2) Extensive Pure_Hate Methodology Crack
(3) Brute Force Attack
(4) Top Mask Attack
(5) Fingerprint Attack
(6) Combinator Attack
(7) Hybrid Attack
(8) Pathwell Top 100 Mask Brute Force Crack
(9) PRINCE Attack
(10) YOLO Combinator Attack
(11) Middle Combinator Attack
(12) Thorough Combinator
......

๐Ÿฆ‘INSTALLISATION & RUN:


1) Get the latest hashcat binaries (https://hashcat.net/hashcat/)

> OSX Install (https://www.phillips321.co.uk/2016/07/09/hashcat-on-os-x-getting-it-going/)

2) mkdir -p hashcat/deps

3) git clone https://github.com/KhronosGroup/OpenCL-Headers.git hashcat/deps/OpenCL

4) cd hashcat/

5) make

6) make install

7) Download hate_crack

8) git clone https://github.com/trustedsec/hate_crack.git

โ€ข Customize binary and wordlist paths in "config.json"

โ€ข Make sure that at least "rockyou.txt" is within your "wordlists" path

9) Create Optimized Wordlists
wordlist_optimizer.py - parses all wordlists from <input file list>, sorts them by length and de-duplicates into <output directory>

WELL DONE !

10) usage: python wordlist_optimizer.py <input file list> <output directory>

> python wordlist_optimizer.py wordlists.txt ../optimized_wordlists


WRITTEN BY ฬตอ‘Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -
โ€”โ€”โ€”โ€”๐–€๐–“D๐–Š๐–—๐•ฎ๐–”D๐–Šโ€”โ€”โ€”โ€”


๐Ÿฆ‘RESOLVE CAN T reach some websites with VPN connected:
(Instagram.com/UnderCodeTestingCompany)

๐Ÿฆ‘After a successful connection, you might not be able to reach some or all websites.

> There are a few things you could try to fix this issue.

1) Try switching between a few different servers.

2) If youโ€™re using the Windows, Android, or macOS OpenVPN app, switch from UDP to TCP in the app settings.

3) If you know and trust the website youโ€™re trying to access, turn off the CyberSec feature in the app settings and try again. If you can access the site with CyberSec off, please inform our customer support agents about it.

4) Your antivirus/firewall may be blocking the access. If you suspect that may be the case, add exceptions for NordVPN.exe and nordvpn-service.exe to your antivirus/firewall applications.

5) Try other connection methods, such as OpenVPN manual or IKEv2. Different connection methods have different network configurations.

6) If you have recently installed our app, try restarting your device.

@ Mr. botnet(tm)
โ€”โ€”โ€”โ€”โ€”UNDERCODEโ€”โ€”โ€”โ€”-
- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -

๐Ÿฆ‘What is IPv4 vs IPv6 & Whatโ€™s the Difference?
(facebook.com/UnderCodeTestingCompanie)

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

Maybee we ve heared About Ipv4/ipv6 and we used always but without knowing what we do so :

๐Ÿฆ‘What is IPv4?

1) IPv4 was the first version of IP. It was deployed for production in the ARPANET in 1983. Today it is most widely used IP version. It is used to identify devices on a network using an addressing system.

2) The IPv4 uses a 32-bit address scheme allowing to store 2^32 addresses which is more than 4 billion addresses. Till date, it is considered the primary Internet Protocol and carries 94% of Internet traffic.

๐Ÿฆ‘What is IPv6?

1) It is the most recent version of the Internet Protocol. Internet Engineer Taskforce initiated it in early 1994. The design and development of that suite is now called IPv6.

2) This new IP address version is being deployed to fulfill the need for more Internet addresses. It was aimed to resolve issues which are associated with IPv4. With 128-bit address space, it allows 340 undecillion unique address space. IPv6 also called IPng (Internet Protocol next generation).


๐Ÿฆ‘Differences:

1) Connectionless Protocol

2) Allow creating a simple virtual communication layer over diversified devices

3) It requires less memory, and ease of remembering addresses

4) Already supported protocol by millions of devices

5) Offers video libraries and conferences

๐Ÿฆ‘Features of IPv6

1) Hierarchical addressing and routing infrastructure

2) Stateful and Stateless configuration

3) Support for quality of service (QoS)

4) An ideal protocol for neighboring node interaction

@ ฬตอ‘Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -
- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -

๐Ÿฆ‘WAnt to Write a persoanl IM bot follow this tutorial:
(t.me/iOsDeveloppers)

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

1) Go to www.imified.com and register a new account with a bot.

2) Now itโ€™s time to create a bot which is actually a simple script that resides on your public web server.
It could be in PHP, Perl, Python or any other language.

Example Hello World bot:
The example below illustrates just how easy it is to create a bot.
This example is coded in PHP.
<?php

switch ($_REQUEST['step']) {
case 1:
echo "Hi, what's your name?";
break;
case 2:
echo "Hi " . $_REQUEST['value1'] . ", where do you live?";
break;
case 3:
echo "Well, welcome to this hello world bot, " . $_REQUEST['value1'] . "<br>from " . $_REQUEST['value2'] . ".<reset>";
break;
}

?>

3) Once your script is ready, put it somewhere on your web server and copy the full URL to the clipboard.

4) Now login to your imified account, paste the script URL

Screen Name: insecure@bot.im
Bot Script URL: http://www.insecure.in/imbot.php

5) Add that im bot your friends list. Thatโ€™s it.

This is a very basic bot but the possibilities are endless.

For instance, you could write a bot that will send an email to all your close friends via a simple IM message. Or you could write one that will does currency conversion.

@ ฬตอ‘Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -
- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -

๐Ÿฆ‘HACK FIREFOX BROWSER :
t.me/UnderCodeTestingOfficial

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:
1) Install the Greasemonkey extension>>
> http://greasemonkey.mozdev.org/
http://downloads.mozdev.org/greasemonkey/greasemonkey_0.2.6.xpi

2) Restart Firefox

3) Go to http://rapidshare.de/files/1034529/rapidshare.user.js.html

4) Right click on rapidshare.user.js and choose "Install User Script".

5) Run FireFox.

6) From 'File' Menu click on Open File then browse to whereever you
saved the 'greasemonkey.xpi' plug-in.
Open it, wait a couple seconds for the install button becomes active.

7) Click on it to install this plug-in then CLOSE FIREFOX.

8) Run FireFox again.
From the File Menu click on Open File then browse to whereever you saved the 'rapidshare.user.js'.

9) Open it.

10) Click the Tools Menu then click on Install User Script then click OK.

11) Close FireFox.

The script will let you enjoy "no wait" and multiple file downloads......!


2) Rapidshare Hack (NIC Tricks and MAC Cloning) :-
Rapidshare traces the users IP address to limit each user to a certain amount of downloading per day.
To get around this, you need to show the rapidshare server a different IP address.
Here are some methods for doing this-

A] Short-Out the JavaScript:
1) Goto the page you want to download
2) Select FREE button
3) In the address bar put this- javascript:alert(c=0)
4) Click OK
5) Click OK to the pop-up box
6) Enter the captcha
7) Download Your File

B] Request a new IP address from your ISP server:
Here\92s how to do it in windows:
1) Click Start
2) Click run
3) In the run box type cmd.exe and click OK
4) When the command prompt opens type the following. ENTER after each new line.
ipconfig /flushdns
ipconfig /release
ipconfig /renew
exit
5) Erase your cookies in whatever browser you are using.
6) Try the rapidshare download again.
Frequently you will be assigned a new IP address when this happens.
Sometime you will, sometimes you will not. If you are on a fixed IP address, this method will not work.
If this works for you, you may want to save the above commands into a batch file, and just run it when you need it.

๐Ÿฆ‘ Use a proxy with SwitchProxy and Firefox:
1) Download and install Firefox
2) Download and install SwitchProxy
3) Google for free proxies
4) When you hit your download limit, clean your cookies and change your proxy

๐Ÿฆ‘ You can use a bookmarklet to stop your wait times:

1) Open IE

2) Right Click On This Link

3) Select Add to Favorites

4) Select Yes to the warning that the bookmark may be unsafe.

5) Name it \93RapidShare No Wait\94

6) Click on the Links folder (if you want to display it in your IE toolbar)

7) Click OK
8) You may need to close and reopen IE to see it
9) Goto rapidshare and click the bookmarklet when you are forced to wait

@ ฬตอ‘Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -
- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -

๐Ÿฆ‘How spoof Ip Full By Under Code
instagram.com/UnderCodeTestingCompany

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:
> For More Video tutorial
https://www.youtube.com/watch?v=3tkVKflR4rY

1) git clone https://github.com/meliht/Mr.SIP

2) cd Mr.SIP


OR
Install using pip:

> pip install netifaces pip install ipaddress pip install pyfiglet

Or Install using apt:

> apt-get install python-scapy

3) SIP-NES usage:

./mr.sip.py --ns --tn <target_ip> --dp=5060

./mr.sip.py --ns --tn <target_network_range> --dp=5060 ./mr.sip.py --ns --tn <target_network_address> --dp=5060

4) NOT-1: <target_network_range> should be like 192.168.1.10-192.168.1.20 NOT-2: <target_network> should be like 192.168.1.0 NOT-3: You can specify the output by -i <output_file_name>.

5) By default the output will be written to ip_list.txt file which is already exists in the repo. SIP-ENUM uses that file as an input. NOT-3: Default destionation port 5060, if not given.

6)sudo ngrep -W byline -d eth0 port 5060

7) ./mr.sip.py --se --dp=5060 --fu=fromUser.txt

8) Call flow created by SIP-NES on the target SIP server:

> sudo ngrep -W byline -d eth0 port 5060

9) by using socket library (but doesn't support IP spoofing) \

./mr.sip.py --ds -dm=<sip_method_name> -c <number_of_packets> --di=<target_IP_address> --dp=5060 -r --to=toUser.txt --fu=fromUser.txt --ua=userAgent.txt --su=spUser.txt -l

by using scapy library (ip spoofing is supported)

./mr.sip.py --ds -dm=invite -c <number_of_packets> --di=<target_IP_address> --dp=<server_port> -r --to=toUser.txt --fu=fromUser.txt --ua=userAgent.txt --su=spUser.txt

./mr.sip.py --ds -dm=invite -c <number_of_packets> --di=<target_IP_address> --dp=<server_port> -s --to=toUser.txt --fu=fromUser.txt --ua=userAgent.txt --su=spUser.txt

./mr.sip.py --ds -dm=invite -c <number_of_packets> --di=<target_IP_address> --dp=<server_port> -m --to=toUser.txt --fu=fromUser.txt --ua=userAgent.txt --su=spUser.txt --il=ip_list.txt

10) Call flow created by SIP-DAS on the target SIP server:

> sudo ngrep -W byline -d eth0 port 5060

Written by ฬตอ‘Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -
- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - -

๐Ÿฆ‘Sniffly2 is a variant of Sniffly which abuses HTTP Strict Transport Security headers and the Performance Timing API in order to sniff your browsing history in Chromium-based browsers
instagram.com/UnderCodeTestingCompany

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

> does not work on mobile or Firefox

> does not work over HTTPS due to mixed content blocking.

> adblockers may taint results

๐Ÿฆ‘Installisation

1) git clone https://github.com/diracdeltas/sniffly

2) cd sniffly

3) Import Those .js files as plugin to browser recommended google

4) Start Sniff using options

@ ฬตอ‘Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - -
- - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -

๐Ÿฆ‘How do you run JavaScript script through the TerminaL ?
tWitter.com/UnderCodeTC

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

1) You can Run your JavaScript File from your Terminal only if you have installed NodeJs runtime.

2) If you have Installed it then Simply open the terminal and type โ€œnode FileName.jsโ€.

3) If you donโ€™t have NodeJs runtime environment then go to NodeJs Runtime Environment Download and Download it.

> Example 1: Create a JavaScript File Name this file as New.js.
filter_none

brightness_4
// Simple Addition Function in Javascript
function add(a, b) {
return a+b
}
console.log(add(4, 6))

OutpUt 10

๐Ÿฆ‘Fast Simple Run :

1) Open Terminal or Command Prompt.

2) Set Path to where File is Located (using cd).

3) Type โ€œnode New.jsโ€ and Click Enter

> Examples 2: Create a JavaScript File Name this file as New2.js.
filter_none

brightness_4
// Simple Substraction Function in Javascript
function sub(a, b) {
return a-b
}
console.log(sub(6, 2))

Output 4

Thats all
@ ฬตอ‘Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - -
-- - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -

๐Ÿฆ‘WHAT is HTML | DOM Script Object ?
instagram.com/UnderCodeTestingCompany

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

> The DOM Script Object is used to represent the HTML <script> element. The script element is accessed by getElementById().

๐Ÿฆ‘Properties:

1) async: It is used to specify the script is executed asynchronously.

2) charset: It is used to specify the character encoding used in an external script file.

3) defer: It is used to specify that the script is executed when the page has finished parsing.

4) src: It is used to specify the URL of an external script file.

5) type: It is used to specify the media type of the script.

๐Ÿฆ‘ Syntax:

> document.getElementById("ID");

Where โ€œidโ€ is the ID assigned to the โ€œscriptโ€ tag.

๐Ÿฆ‘Example-1:
filter_none

edit

play_arrow

brightness_4
<!DOCTYPE html>
<html>

<head>
<style>
body {
text-align: center;
}

h1 {
color: green;
}
</style>
</head>

<body>
<h1>GeeksForGeeks</h1>
<h2>DOM Script Object </h2>

<!-- Assigning id to script. -->
<script id="GFG">
Hello GeeksForGeeks!
</script>
<br>
<br>

<button onclick="myGeeks()">Submit</button>

<p id="sudo"></p>

<script>
function myGeeks() {

// Accessing script object
var g = document.getElementById(
"GFG").text;
document.getElementById(
"sudo").innerHTML = g;
}
</script>
</body>

</html>

.....

@ ฬตอ‘sTEAVEN(TM)
- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - -
- - --Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - -

๐Ÿฆ‘HACK TOOL : MITM PROXIES
An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
FOR ANY WiNdows/Linux/MacOS/TERMUX
t.me/iOSDeveloppers

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

1) mitmproxy is an interactive, SSL/TLS-capable intercepting proxy with a console interface for HTTP/1, HTTP/2, and WebSockets.

2) mitmdump is the command-line version of mitmproxy. Think tcpdump for HTTP.

3) mitmweb is a web-based interface for mitmproxy.

4) pathoc and pathod are perverse HTTP client and server applications designed to let you craft almost any conceivable HTTP request, including ones that creatively violate the standards.

๐Ÿฆ‘Installisation & Run:

A) For mac os

> brew install mitmproxy

B) For linux

1> https://github.com/mitmproxy/mitmproxy/archive/v4.0.4.tar.gz

( tar.js)

2> Extract the tar

3>Go Dir

4> xdg-open INSTALL

5> ./configure

6ยปmake

7>sudo make install

OR

> https://github.com/mitmproxy/mitmproxy/archive/v4.0.4.zip

(.zip)

๐Ÿฆ‘Installation on Linux via pip3

Please make sure to install Python 3.6 (or higher) and pip3 for your distribution. If your distribution does not provide a suitable Python version, you can use pyenv to get a recent Python environment.

1) sudo apt install python3-pip # Debian 10 or higher, Ubuntu 17.10 or higher

2) sudo dnf install python3-pip # Fedora 26 or higher

3) sudo pacman -S python-pip # Arch Linux

Please make sure to upgrade pip3 itself:

4) sudo pip3 install -U pip

Now you can install mitmproxy via pip3:

5) sudo pip3 install mitmproxy

๐Ÿฆ‘Installation on Windows via pip3:

First, install the latest version of Python 3.6 or higher from the Python website. During installation, make sure to select Add Python to PATH. There are no other dependencies on Windows.
> Now you can install mitmproxy via pip3:

> pip3 install mitmproxy

WEll Done

Written by ฬตอ‘Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - -
- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -


๐Ÿฆ‘Install and upgrade the Hack typeface on the Linux platform
T.me/UnderCodeTestingOfficial

๐Ÿฆ‘INSTALLISATION & Run:

> An install and upgrade script for the Hack typeface on the Linux platform
> The hack-linux-installer.sh shell script installs fonts from the Hack typeface repository at a requested release version number on the Linux platform. This script can be used for initial font installs and upgrades to new versions (or downgrades if ever necessary).
Download and modify permissions


1) curl -L -O https://raw.githubusercontent.com/source-foundry/hack-linux-installer/master/hack-linux-installer.sh

2) chmod +x hack-linux-installer.sh

3) chmod 777 hack-linux-installer.sh

4) ./hack-linux-installer.sh [VERSION]

5) Define the version number with the format vX.XXX. You must use a lowercase v followed by the version number string that is used in the repository releases.

6) For example, install Hack v3.003 with the following command:

> ./hack-linux-installer.sh v3.003

Alternatively, you can use the installer to install the latest version like so:

7) ./hack-linux-installer.sh latest

๐Ÿฆ‘What it does

1) The release archive is pulled from the repository release

2) The release archive is unpacked

3) The fonts are installed on the path $HOME/.local/share/fonts

4)The font cache is cleared and regenerated

5) fc-list | grep "Hack" is executed to display the installed font paths. You should see expected install filepaths with this command.

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -
โ€”โ€”โ€”โ€”โ€”๐–€๐–“D๐–Š๐–—๐•ฎ๐–”D๐–Šโ€”โ€”โ€”โ€”โ€”

๐Ÿฆ‘HOW FIX install Metaploite on android Without errors (Termux):
(Instagram.com/UnderCodeTestingCompany)

๐Ÿฆ‘First of all, we have to install some scripts, for this, enter:

1) pkg update && pkg upgrade -y

2) pkg install wget

3) pkg install curl

4) Pkg install openssh

5) These pkgs are required for further steps
(Wait till it is Completely installed)

6) Now we have to go to HOME directory, for this enter:

> cd $HOME
(Only, if you are not at Home Directory)

7) Type now :

> wget Auxilus.github.io/metasploit.sh

> bash metasploit.sh

๐Ÿฆ‘ METHODE 1:

IF ANY ERROR FOR SOME VERSIONs another source installisation:


> ALL IN ONE COMMAND:

> pkg update && pkg upgrade && pkg install git curl wget nmap -y && curl -LO raw.githubusercontent.com/Hax4us/Metasploit_termux/master/metasploit.sh && chmod 777 metasploit.sh && ./metasploit.sh

THEN IT WILL START

๐Ÿฆ‘Methode 2

IF AGAIN ERROR ANOTHER INSTALL METHODE

Type in termux:

> pkg update && pkg upgrade && pkg install curl wget git && git clone github.com/verluchie/termux-metasploit && chmod 777 termux-metasploit/install.sh && sh termux-metasploit/install.sh

๐Ÿฆ‘Methode 3

ANOTHER METHODE FOR INSTALL METASPLOITE

> pkg update && pkg upgrade && pkg install curl wget git && git clone github.com/verluchie/termux-metasploit && chmod 777 termux-metasploit/install.sh && sh termux-metasploit/install.sh

@ Mr. BOTNET(tm)
โ€”โ€”โ€”โ€”โ€”-๐–€๐–“D๐–Š๐–—๐•ฎ๐–”D๐–Šโ€”โ€”โ€”โ€”โ€”โ€”
- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -

๐Ÿฆ‘One Of Top Script in Worlds
1.2k Stars > A typeface designed for source code
Hack is designed to be a workhorse typeface for source code. It has deep roots in the free, open source typeface community and expands upon the contributions of the Bitstream Vera & DejaVu projects. The large x-height + wide aperture + low contrast design make it legible at commonly used source code text sizes with a sweet spot that runs in the 8 - 14 range
t.me/UnderCodeTestingOfficial

๐Ÿฆ‘INSTALLISATION & RUN:
LInux//TermuxRoot/MacOs/Windows

1) Download the latest version of Hack.
>https://github.com/source-foundry/Hack/releases/download/v3.003/Hack-v3.003-ttf.zip

2) Extract the files from the archive (.zip).

3) Copy the font files to either your system font folder (often /usr/share/fonts/) or user font folder (often ~/.local/share/fonts/ or /usr/local/share/fonts).

4) Copy the font configuration file in config/fontconfig/ to either the system font configuration folder (often /etc/fonts/conf.d/) or the font user folder (often ~/.config/fontconfig/conf.d)

5) Clear and regenerate your font cache and indexes with the following command:

> fc-cache -f -v

6) You can confirm that the fonts are installed with the following command:

> fc-list | grep "Hack"

๐Ÿฆ‘Works On:

> Arch Linux: ttf-hack
> Chocolatey (Windows): hackfont
> Debian: fonts-hack-ttf
>Fedora / CentOS: dnf-plugins-core :: heliocastro/hack-fonts :: hack-fonts
>Gentoo Linux: media-fonts/hack
>Homebrew Cask (OS X): caskroom/fonts/font-hack
> Open BSD: fonts/hack-fonts
>OpenSUSE: hack-fonts
>Ubuntu: fonts-hack-ttf
>Visual Studio Package Manager: hack.font

๐Ÿฆ‘For Running via Web font usage

Hack is available in the woff and woff2 web font formats. Bold and italic styles are included by default and work out-of-the-box via the <strong> and <em> tags.

1) Hack is available through the jsDelivr and cdnjs CDN services:

>jsDelivr cdnjs

The following snippets provide examples of Hack web font use through the jsDelivr CDN. Adjust the URL paths to those provided by cdnjs (click the link above to find the appropriate URL) to switch to the cdnjs CDN.

2) Add Hack to HTML

Include one of the following in the <head> section of your HTML file:

Subset web fonts

<link rel="stylesheet" href="//cdn.jsdelivr.net/npm/hack-font@3/build/web/hack-subset.css">

> Full character set web fonts

<link rel="stylesheet" href="//cdn.jsdelivr.net/npm/hack-font@3/build/web/hack.css">

3) Add Hack to CSS
pre, code { font-family: Hack, monospace; }

See the WEBFONT_USAGE.md documentation for additional details, including instructions on how to download, host, and serve the web fonts on your web server.


Written By Steaven(tm)
- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -
- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - -

๐Ÿฆ‘How I set up Tinyproxy as a forward proxy and reverse proxy Linux
t.me/UnderCodeTestingOfficial

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

1) Install Tinyproxy

> To install Tinyproxy, you have to type the following command into the forward and reverse proxy machinesโ€™s terminal:

> apt-get install tinyproxy

2) Setting up the system

3) Tinyproxy works according to configuration files.Example configurations, one for the forward proxy and another for the reverse proxy.

4) Forward and Reverse proxy configuration files:

5) To run tinyproxy with a specific configuration just do the following:

> tinyproxy -c <configuration-file>

E.g.: tinyproxy -c forwardproxy.conf


๐Ÿฆ‘Testing the system:

1) First make sure that the server is running accordingly and you can access the server with the following command, from any of the machines, since all of them are in the same network. You can test this using curl command line tool or on a browser:

> curl http://10.0.2.34:80/

2) Now to test the whole system, if you want to use curl you can type this on the client machine console:

> curl -v --proxy http://10.0.2.35:8888 http://10.0.2.36:8888/

๐Ÿฆ‘To run tinyproxy with a specific configuration just do the following:

> tinyproxy -c <configuration-file>

E.g.: tinyproxy -c forwardproxy.conf

@ ฬตอ‘Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - -
- - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - -

๐Ÿฆ‘Setup a Reverse SSH Tunnel Linux
instagram.com/UnderCodeTestingCompany

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

1) Let's assume that Destination's IP is 192.168.20.55 (Linux box that you want to access).

2) You want to access from Linux client with IP 138.47.99.99.

> Destination (192.168.20.55) <- |NAT| <- Source (138.47.99.99)

3) SSH from the destination to the source (with public IP) using the command :

> ssh -R 19999:localhost:22 sourceuser@138.47.99.99

4) * port 19999 can be any unused port.

5) Now you can SSH from source to destination through SSH tunneling:

> ssh localhost -p 19999

6) 3rd party servers can also access 192.168.20.55 through Destination (138.47.99.99).

7) Destination (192.168.20.55) <- |NAT| <- Source (138.47.99.99) <- Bob's server

8) From Bob's server:

> ssh sourceuser@138.47.99.99

9) After the successful login to Source:

> ssh localhost -p 19999

10) * the connection between destination and source must be alive at all time.

Note: you may run a command (e.g. watch, top) on Destination to keep the connection active.

@ ฬตอ‘Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - -
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘BUGS ROUTERS WIFI 2019 - SOME NON-PATCHED:
instagram.com/UnderCodeTestingCompany

๐Ÿฆ‘More buggy D-Link routers that will not be fixed

>D-Link Adds More Buggy Router Models to 'Wonโ€™t Fix' List

> A new bug in D-Link routers will not be fixed because the routers are too old to bother with (they are End-of-Life or EoL).

๐Ÿฆ‘what this bug do ?

1> The bug allows a bad guy, who does not know any passwords, to access the web configuration interface of the router.

2>The buggy devices are: DIR-866, DIR-655, DHP-1565, DIR-652, DAP-1533, DGL-5500, DIR-130, DIR-330, DIR-615, DIR-825, DIR-835, DIR-855L, and DIR-862. D-Link suggests disabling remote administration, resetting the affected routers and using a complicated router password.

3> It is not clear if this bug is similar to the bug (CVE-2019-16920) that FortiGuard Labs reported last month. That bug impacted 10 of the same routers. Spring puts this bug in perspective, noting a long history of bugs in D-Link routers.

4> A September 2019 bug can leak passwords. A May 2019 bug allowed DNS hijacking

๐Ÿฆ‘Zero Day flaw in the D-Link DIR-878 router. Others too?

> Hackers, at the annual Tianfu Cup gathering over the weekend, successfully compromised the D-Link DIR-878 router using a zero-day vulnerability.

> The router was hacked by seven, yes, seven, different groups. It has been a few days and, so far, no response from D-Link on their security bulletin page.

> The bigger picture, however, involves other D-Link router. It is likely that other similar routers share the same buggy software

@ ฬตอ‘Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘New hack Termux script:
Twitter.com/UnderCodeTC

๐Ÿฆ‘INSTALLISATION & RUN

1) pkg install git

2) git clone https://github.com/FajarTheGGman/F-Tools

3) cd F-Tools

4) chmod 777 F-Tools.sh

5) ./F-Tools

๐Ÿฆ‘This script usefull in infomation gethering & parrwords attacks

@ ฬตอ‘Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Passwords attacks For Linux: Dumper tool
t.me/UnderCodeTestingOfficial

๐Ÿฆ‘Why This Tool is Important :

1) creddump is a python tool to extract various credentials and secrets from Windows registry hives. It currently extracts:

2) LM and NT hashes (SYSKEY protected)

3) Cached domain passwords

4) LSA secrets

5) It essentially performs all the functions that bkhive/samdump2, cachedump, and lsadump2 do, but in a platform-independent way.

6) It is also the first tool that does all of these things in an offline way (actually, Cain & Abel does, but is not open source and is only available on Windows).

7)Automatically exported from code.google.com/p/creddump


๐Ÿฆ‘INSTALLISATION & RUN

kali/debian/parrot...

1)git clone https://github.com/moyix/creddump

2) Go dir

3) cachedump โ€“ Dump cached credentials

> cachedump
usage: /usr/bin/cachedump <system hive> <security hive>

4) lsadump โ€“ Dump LSA secrets

> root@kali:~# lsadump
usage: /usr/bin/lsadump <system hive> <security hive>

5) pwdump โ€“ Dump password hashes
root@kali:~# pwdump
usage: /usr/bin/pwdump <system hive> <SAM hive>

6) Dump the password hashes using the system (system) and sam (sam) hives:

> root@kali:~# pwdump system sam
Administrator:500:41aa818b512a8c0e72381e4c174e281b:1896d0a309184775f67c14d14b5c365a:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::

7) HelpAssistant:1000:667d6c58d451dbf236ae37ab1de3b9f7:af733642ab69e156ba0c219d3bbc3c83:::
SUPPORT_388945a0:1002:aad3b435b51404eeaad3b435b51404ee:8dffa305e2bee837f279c2c0b082affb:::

8) lsadump Usage Example
Dump the LSA secrets using the system (system) and security (security) hives:

> root@kali:~# lsadump system security
_SC_ALG

> SC_Dnscache

> SC_upnphost

20ed87e2-3b82-4114-81f9-5e219ed4c481-SALEMHELPACCOUNT

> SC_WebClient

> SC_RpcLocator

Written by ฬตอ‘Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm

โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–