UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.5K links
๐Ÿฆ‘ Undercode Cyber World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE

โœจ Web & Services:
โ†’ Undercode.help
Download Telegram
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Cloudflarew 2020 Features & Why Its secure & safe to use this protection ?
twitter.com/UndercodeTC

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

> Fast, Global Content Delivery Network.

> Fast, Powerful, And Secure DNS.

>Load Balancing.

> A rgo Smart Routing.

> Web Optimizations.

> Local Storage Caching.

> AutoMinify.

> Rocket Loader

> anti-ddos solution

> hide admin mail & phones from website

> hide cms feature include

> multi language + Two-factor login

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Python wrapper for the Cloudflare Client API v4
updated
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) sudo pip install cloudflare

or via git

1) git clone https://github.com/cloudflare/python-cloudflare

2) cd python-cloudflare

3) ./setup.py build

4) sudo ./setup.py install

๐Ÿฆ‘Example

A very simple listing of zones within your account; including the IPv6 status of the zone.

import CloudFlare

def main():
cf = CloudFlare.CloudFlare()
zones = cf.zones.get()
for zone in zones:
zone_id = zone['id']
zone_name = zone['name']
print zone_id, zone_name

if name == 'main':
main()

>This example works when there are less than 50 zones (50 is the default number of values returned from a query like this).

๐Ÿฆ‘Providing Cloudflare Username and API Key

When you create a CloudFlare class you can pass up to four parameters.

1> API Token or API Key
2> Account email (only if an API Key is being used)
3> Optional Origin-CA Certificate Token
4> Optional Debug flag (True/False)

๐Ÿฆ‘import CloudFlare

# A minimal call - reading values from environment variables or configuration file
cf = CloudFlare.CloudFlare()

# A minimal call with debug enabled
cf = CloudFlare.CloudFlare(debug=True))

# An authenticated call using an API Token (note the missing email)
cf = CloudFlare.CloudFlare(token='00000000000000000000000000000000')

# An authenticated call using an API Key
cf = CloudFlare.CloudFlare(email='user@example.com', token='00000000000000000000000000000000')

# An authenticated call using an API Key and CA-Origin info
cf = CloudFlare.CloudFlare(email='user@example.com', token='00000000000000000000000000000000', certtoken='v1.0-...')

> If the account email and API key are not passed when you create the class, then they are retrieved from either the use exported shell environment variables or the .cloudflare.cfg or ~/.cloudflare.cfg or ~/.cloudflare/cloudflare.cfg files, in that order.

๐Ÿฆ‘example Using shell environment variables

1> export CF_API_EMAIL='user@example.com' # Do not set if using an API Token
2> export CF_API_KEY='00000000000000000000000000000000'
3> export CF_API_CERTKEY='v1.0-...

๐Ÿฆ‘Using configuration file to store email and keys

1> cat ~/.cloudflare/cloudflare.cfg
[CloudFlare]
2>email = user@example.com # Do not set if using an API Token
token = 00000000000000000000000000000000
certtoken = v1.0-...
extras =

E N J O Y

Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘A Cloudflare WebExtension
>so helpful for hackers
instagram.com/UndercOdeTestingCompany

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) adding to google chrome browser
>https://chrome.google.com/webstore/detail/claire/fgbpcgddpmjmamlibbaobboigaijnmkl

2) adding to firefox
>https://addons.mozilla.org/en-US/firefox/addon/cloudflare-claire/

๐Ÿฆ‘ manual mode

>to use the extension from source:

1> Clone this repository (git clone https://github.com/cloudflare/claire.git)

2> In the checked out directory, run yarn install && yarn run build.

3> Bring up the extensions page (Wrench icon -> Tools -> Extensions)

4> If Developer mode is not checked, check it and this will expose a few additional buttons

5> Click on the Load unpacked extension button and browse to the "dist" folder in the Claire repo folder

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Hack any wps wifi on Termux/Linux Withou root :
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/SilentGhostX/HT-WPS-Breaker

2) cd Desktop

3) unzip HT-WPS-Breaker.zip

4) cd HT-WPS-Breaker

5) chmod +x HT-WB.sh

6) ./HT-WB.sh or bash HT-WB.sh

7) Choose Options via Numbers

> note also hidden any wifi can be sucessful getting here name

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘A Kubernetes ingress controller for Cloudflare's Argo Tunnels
Updated
>Argo Tunnel Ingress Controller provides Kubernetes Ingress via Argo Tunnels. The controller establishes or destroys tunnels by monitoring changes to resources.
>Argo Tunnel offers an easy way to expose web servers securely to the internet, without opening up firewall ports and configuring ACLs. Argo Tunnel also ensures requests route through Cloudflare before reaching the web server so you can be sure attack traffic is stopped with Cloudflareโ€™s WAF and Unmetered DDoS mitigation and authenticated with Access if youโ€™ve enabled those features for your account.
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/cloudflare/cloudflare-ingress-controller

2) cd cloudflare-ingress-controller

3) kubectl apply -f deploy/argo-tunnel.yaml

4) Update the ServiceAccount namespace and bindings to deploy in an alternate namespace.Without role based access control (RBAC).

>kubectl apply -f deploy/argo-tunnel-no-rbac.yaml

5) With Helm:

>helm install --name anydomain cloudflare/argo-tunnel

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Great Tool To Automate checking Vulnerability For Any Website :
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/penetrate2hack/ITWSV.git

2) cd ITWSV

3) chmod +x start.sh

4) chmod +x update.sh (only if required)

5) ./start.sh

๐Ÿฆ‘Features :

WHOIS

DNSWALK

FIERCE

DNSRecon

DNSenum

NMAP

DMitry

theHarvester

LBD

SSLScan

SSLYze

WhatWeb

Automater

Grabber

Parsero

Uniscan

Metagoofil

A2SV

WPScan

Droopescan

WPSeku

XssPy

Spaghetti

sublist3r

WAFW00F

nslookup

nslookup

dirsearch

OWASP Joomscan

Spaghetti

Globuster

Grabber

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘KALI CRACKING TOOLS + How Run & USE:
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

1) Hydra

Hydra is a login cracker that supports many protocols to attack ( Cisco AAA, Cisco auth, Cisco enable, CVS, FTP, HTTP(S)-FORM-GET, HTTP(S)-FORM-POST, HTTP(S)-GET, HTTP(S)-HEAD, HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MS-SQL, MySQL, NNTP, Oracle Listener, Oracle SID, PC-Anywhere, PC-NFS, POP3, PostgreSQL, RDP, Rexec, Rlogin, Rsh, SIP, SMB(NT), SMTP, SMTP Enum, SNMP v1+v2+v3, SOCKS5, SSH (v1 and v2), SSHKEY, Subversion, Teamspeak (TS2), Telnet, VMware-Auth, VNC and XMPP).

> To open it, go to Applications โ†’ Password Attacks โ†’ Online Attacks โ†’ hydra.
Hydra

> It will open the terminal console, as shown in the following screenshot.

> Open Terminal

In this case, we will brute force FTP service of metasploitable machine, > which has IP 192.168.1.101
Brute Force

> now you created in Kali a word list with extension โ€˜lstโ€™ in the path usr\share\wordlist\metasploit.
Share Wordlist

The command will be as follows โˆ’

hydra -l /usr/share/wordlists/metasploit/user -P
/usr/share/wordlists/metasploit/ passwords ftp://192.168.1.101 โ€“V

where โ€“V is the username and password while trying


> >Hydra Command

As shown in the following screenshot, the username and password are found which are msfadmin:msfadmin
Admin Password


๐Ÿฆ‘ Johnny

Johnny is a GUI for the John the Ripper password cracking tool. Generally, it is used for weak passwords.

1) To open it, go to Applications โ†’ Password Attacks โ†’ johnny.
Johnny

2) will get the password of Kali machine with the following command and a file will be created on the desktop.
Desktop

3) Click โ€œOpen Passwd Fileโ€ โ†’ OK and all the files
shown then Open File

4) Click โ€œStart Attackโ€.
Start Attack

5) After the attack is complete, click the left panel at โ€œPasswordsโ€ and the password will be unshaded


john is a command line version of Johnny GUI. To start it, open the Terminal and type โ€œjohnโ€.
Unshadowing

In case of unshadowing the password, we need to write the following command โˆ’

root@kali:~# unshadow passwd shadow > unshadowed.txt

๐Ÿฆ‘ Rainbowcrack

The RainbowCrack software cracks hashes by rainbow table lookup. Rainbow tables are ordinary files stored on the hard disk. Generally, Rainbow tables are bought online or can be compiled with different tools.

To open it, go to Applications โ†’ Password Attacks โ†’ click โ€œrainbowcrackโ€.
RainbowCrack

The command to crack a hash password is โˆ’

rcrack path_to_rainbow_tables -f path_to_password_hash

๐Ÿฆ‘ SQLdict

It is a dictionary attack tool for SQL server and is very easy and basic to be used. To open it, open the terminal and type โ€œsqldictโ€. It will open the following view.
Sql Dict

Under โ€œTarget IP Serverโ€, enter the IP of the server holding the SQL. Under โ€œTarget Accountโ€, enter the username. Then load the file with the password and click โ€œstartโ€ until it finishes.
hash-identifier

It is a tool that is used to identify types of hashes, meaning what they are being used for. For example, if I have a HASH, it can tell me if it is a Linux or windows HASH.

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Office 2019 All Version SERIALS TESTED By undercOde :
instagram.com/UndercOdeTestingCompany

1) Office Professional Plus 2019

NMMKJ-6RK4F-KMJVX-8D9MJ-6MWKP

2) Office Standard 2019

6NWWJ-YQWMR-QKGCB-6TMB3-9D9HK

3) Project Professional 2019

B4NPR-3FKK7-T2MBV-FRQ4W-PKD2B

4) Project Standard 2019

C4F7P-NCP8C-6CQPT-MQHV9-JXD2M

5) Visio Professional 2019

9BGNQ-K37YR-RQHF2-38RQ3-7VCBB

6) Visio Standard 2019

7TQNQ-K3YQQ-3PFH7-CCPPM-X4VQ2

7) Access 2019

9N9PT-27V4Y-VJ2PD-YXFMF-YTFQT

8) Excel 2019

TMJWT-YYNMB-3BKTF-644FC-RVXBD

9) Outlook 2019

7HD7K-N4PVK-BHBCQ-YWQRW-XW4VK

10) PowerPoint 2019

RRNCX-C64HY-W2MM7-MCH9G-TJHMQ

11) Publisher 2019

G2KWX-3NW6P-PY93R-JXK2T-C9Y9V

12) Skype for Business 2019

NCJ33-JHBBY-HTK98-MYCV8-HMKHJ

13) Word 2019

PBX3G-NWMT6-Q7XBW-PYJGG-WXD33

@UndercOdeOfficial

โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘INSTALL ALL YOUR FAVOR TOOLS VIA 1 CLICK ON TERMUX
(Automatic hacking tools installer for Android) [ONLY FOR TERMUX]
instagram.com/UndercOdeTestingCompany

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/AnonHackerr/toolss.git

2) cd toolss

3) chmod +x Tools.py

4) python Tools.py

5) choose option via numbers

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘IF YOU WANT TO CLONE A SIM CARD YOU MUST KNOW THIS :
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

SIM CARD:

>Our sim cards contain two secret codes or keys called (imsi value and ki value) which enables the operator to know the mobile number and authenticate the customer ,these codes are related to our mobile numbers which the operators store in their vast data base,it is based on these secret keys that enables the billing to be made to that customer.

>now what we do in sim cloning is extract these two secret codes from the sim and programme it into a new blank smart card often known as wafer, since the operator

>authentication on sims is based on these values,it enables us to fool the operators in thinking that its the

>original sim,this authentication is a big flaw concerning GSM technology

>SIM cards are the most important part of a cell phone that runs on a GSM network. They enable the phone to receive signal from a mobile phone company. Many people who have phones that accept SIM cards find it extremely easy to simply swap out their SIM card for a new SIM card when in a different country.

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Now which sim cards can be cloned:
t.me/iOsDeveloppers

> Sim cards are manufactured on the basis of 3 algorithms COMP128v1,COMP128v2 and COMP128v3

> now an important note currently only COMP128v1 version sim cards can be
cloned ,since this is the only algorithm which has been cracked by users, bear in mind that 70% of all the sim cards we use are COMP128v1 .

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘HOW CLONE SIM CARD FULL TUTORIAL :
instagram.com/UndercOdeTestingCompany

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) Buy a Sim card Reader

2) Need a Blank sim card or super sim card

3) Download
> https://ssl-download.cnet.com/MagicSIM/3000-2094_4-10601728.html
(if server error try below link)
or http://content.mobiledit.com/api/getproduct-expressforensic-win64

4) Download https://usb_sim_card_reader_software.en.downloadastro.com/download/
(or automate driver download via driverbooster app)

5) Install programs.

6) go in phone tools, select sim card, then select unlock sim, it will promt for a code.

7 ) call network provider, they will ask for your phone number, your account info, name and security code,
then they will ask why you want to unlock your simcard, just tell them you need to unlock your sim to get it
to work with your overseas phone or something.

8) Once they give you the sim unlock code, enter it, and it will say sim unlocked.

9) remove the sim from your phone, place it in the cardreader, click read from card in sim clone program.

10) once it says connected, select crack sim in the toolbar. click strong ki and clink all of the other find options and then click start.

11) Once your ki is found and the crack is finished, click file, save as and save your cracked sim info to a that file.

12) IMPORTANT!!! you must click disconnect from the file menu or you will ruin your simcard. once it says
disconnected, remove the sim. put it in your phone and see if it still works, it should. if not, you either did not unlock your sim, or you tried to copy it instead of crack and save.

13) insert black 3g card (must be installed the sim card driver first ) program.

14) click connect

15) it will say no info found if it is truly blank.

16) select write to sim, it will promt you to select a dat file, select the one you saved before, now click start, it will take about 10 minutes to write it, once it is complete, it will ask for a security code, enter the security code network provider gave you, then click finish.

17) your card is cloned. if you try to make 2 calls at the same time, one will go through, the other will say call failed, and both phones will get the same messages, text and voice, and both will recieve the same calls, but only one can talk at a time.

E N J O Y

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Database Hacking :

> sqlsus is an open source MySQL injection and takeover tool, written in perl.

> Via a command line interface, you can retrieve the database(s) structure, inject your own SQL queries (even complex ones), download files from the web server, crawl the website for writable directories, upload and control a backdoor, clone the database(s), and much moreโ€ฆ
Whenever relevant, sqlsus will mimic a MySQL console output.

> sqlsus focuses on speed and efficiency, optimizing the available injection space, making the best use (I can think of) of MySQL functions.
It uses stacked subqueries and an powerful blind injection algorithm to maximize the data gathered per web server hit.
Using multi-threading on top of that, sqlsus is an extremely fast database dumper, be it for inband or blind injection.
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) download official site :
>https://sourceforge.net/projects/sqlsus/files/sqlsus/sqlsus-0.7.2.tgz/download
(kali preinstalled tool)

2) Unzip & go dir then

3) sqlsus -h

๐Ÿฆ‘ Options:
-h, --help brief help message
-v, --version version information
-e, --execute <commands> execute commands and exit
-g, --genconf <filename> generate configuration file

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Flip lets you declare and manage feature flags, backed by cookies (private testing) and database (site-wide). last 2019
instagram.com/UndercOdeTestingCompany

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/pda/flip

2) cd flip

3) Generate the model and migration
> rails g flip:install

4) Run the migration
> rake db:migrate

# Include the Feature model, e.g. config/initializers/feature.rb:

๐Ÿฆ‘Checking Features
Flip.on? or the dynamic predicate methods are used to check feature state:

Flip.on? :world_domination # true
Flip.world_domination? # true

Flip.on? :shiny_things # false
Flip.shiny_things? # false

๐Ÿฆ‘Views and controllers use the feature?(key) method:

<div>
<% if feature? :world_domination %>
<%= link_to "Dominate World", world_dominations_path %>
<% end %>
</div>

๐Ÿฆ‘FEATURES:

This gem optimizes for:

1) developer ease-of-use,

2) visibility and control for other stakeholders (like marketing); and

3) run-time performance

ยป There are three layers of strategies per feature:

default
database, to flip features site-wide for all users
cookie, to flip features just for you (or someone else)

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Accurately Locate Smartphones # using Social Engineering๐Ÿ’€
2019-2020 (Termux/Linux..)
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

>Kali Linux / Ubuntu / Parrot OS

1) git clone https://github.com/thewhiteh4t/seeker.git
2) cd seeker/
3) chmod 777 install.sh
4) ./install.sh
5)BlackArch Linux
6)pacman -S seeker

> Docker
docker pull thewhiteh4t/seeker

๐Ÿฆ‘Termux

1)git clone https://github.com/thewhiteh4t/seeker.git
2)cd seeker/
3)chmod 777 termux_install.sh
4)./termux_install.sh

ยปUsage

> python3 seeker.py -h
For Help options

> seeker.py [-h] [-s SUBDOMAIN]
to Run it

๐Ÿฆ‘optional arguments:
-h, --help show this help message and exit
-s SUBDOMAIN, --subdomain Subdomain Provide Subdomain for Serveo URL ( Optional )
-k KML, --kml KML Provide KML Filename ( Optional )
-t TUNNEL, --tunnel TUNNEL Specify Tunnel Mode [manual]



๐Ÿฆ‘How It Works ??

> Concept behind Seeker is simple, just like we host phishing pages to get credentials why not host a fake page that requests your location like many popular location based websites.

> Seeker Hosts a fake website on In Built PHP Server and uses Serveo to generate a link which we will forward to the target, website asks for Location

๐Ÿฆ‘we can get :

> Longitude
> Latitude
>Accuracy
>Altitude - Not always available
>Direction - Only available if user is moving
>Speed - Only available if user is moving
>Along with Location Information we also get Device Information

without any permissions :

>Operating System
>Platform
>Number of CPU Cores
>Amount of RAM - Approximate Results
>Screen Resolution
>GPU information
>Browser Name and Version
>Public IP Address
>IP Address Reconnaissance

๐Ÿฆ‘Tested By UndercOde On:

>Ubanto
> Termux
>Kali

E N J O Y W I T H U N D E R C O D E

@UndercOdeOfficial
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘ Before Start Hosting the forked os from our UndercOde Linux weโ€™ve working on stabilities issues & some deadly improvements ...This may take while to done