UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.4K links
๐Ÿฆ‘ Undercode Cyber World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE

โœจ Web & Services:
โ†’ Undercode.help
Download Telegram
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Hack any wps wifi on Termux/Linux Withou root :
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/SilentGhostX/HT-WPS-Breaker

2) cd Desktop

3) unzip HT-WPS-Breaker.zip

4) cd HT-WPS-Breaker

5) chmod +x HT-WB.sh

6) ./HT-WB.sh or bash HT-WB.sh

7) Choose Options via Numbers

> note also hidden any wifi can be sucessful getting here name

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘A Kubernetes ingress controller for Cloudflare's Argo Tunnels
Updated
>Argo Tunnel Ingress Controller provides Kubernetes Ingress via Argo Tunnels. The controller establishes or destroys tunnels by monitoring changes to resources.
>Argo Tunnel offers an easy way to expose web servers securely to the internet, without opening up firewall ports and configuring ACLs. Argo Tunnel also ensures requests route through Cloudflare before reaching the web server so you can be sure attack traffic is stopped with Cloudflareโ€™s WAF and Unmetered DDoS mitigation and authenticated with Access if youโ€™ve enabled those features for your account.
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/cloudflare/cloudflare-ingress-controller

2) cd cloudflare-ingress-controller

3) kubectl apply -f deploy/argo-tunnel.yaml

4) Update the ServiceAccount namespace and bindings to deploy in an alternate namespace.Without role based access control (RBAC).

>kubectl apply -f deploy/argo-tunnel-no-rbac.yaml

5) With Helm:

>helm install --name anydomain cloudflare/argo-tunnel

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Great Tool To Automate checking Vulnerability For Any Website :
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/penetrate2hack/ITWSV.git

2) cd ITWSV

3) chmod +x start.sh

4) chmod +x update.sh (only if required)

5) ./start.sh

๐Ÿฆ‘Features :

WHOIS

DNSWALK

FIERCE

DNSRecon

DNSenum

NMAP

DMitry

theHarvester

LBD

SSLScan

SSLYze

WhatWeb

Automater

Grabber

Parsero

Uniscan

Metagoofil

A2SV

WPScan

Droopescan

WPSeku

XssPy

Spaghetti

sublist3r

WAFW00F

nslookup

nslookup

dirsearch

OWASP Joomscan

Spaghetti

Globuster

Grabber

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘KALI CRACKING TOOLS + How Run & USE:
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

1) Hydra

Hydra is a login cracker that supports many protocols to attack ( Cisco AAA, Cisco auth, Cisco enable, CVS, FTP, HTTP(S)-FORM-GET, HTTP(S)-FORM-POST, HTTP(S)-GET, HTTP(S)-HEAD, HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MS-SQL, MySQL, NNTP, Oracle Listener, Oracle SID, PC-Anywhere, PC-NFS, POP3, PostgreSQL, RDP, Rexec, Rlogin, Rsh, SIP, SMB(NT), SMTP, SMTP Enum, SNMP v1+v2+v3, SOCKS5, SSH (v1 and v2), SSHKEY, Subversion, Teamspeak (TS2), Telnet, VMware-Auth, VNC and XMPP).

> To open it, go to Applications โ†’ Password Attacks โ†’ Online Attacks โ†’ hydra.
Hydra

> It will open the terminal console, as shown in the following screenshot.

> Open Terminal

In this case, we will brute force FTP service of metasploitable machine, > which has IP 192.168.1.101
Brute Force

> now you created in Kali a word list with extension โ€˜lstโ€™ in the path usr\share\wordlist\metasploit.
Share Wordlist

The command will be as follows โˆ’

hydra -l /usr/share/wordlists/metasploit/user -P
/usr/share/wordlists/metasploit/ passwords ftp://192.168.1.101 โ€“V

where โ€“V is the username and password while trying


> >Hydra Command

As shown in the following screenshot, the username and password are found which are msfadmin:msfadmin
Admin Password


๐Ÿฆ‘ Johnny

Johnny is a GUI for the John the Ripper password cracking tool. Generally, it is used for weak passwords.

1) To open it, go to Applications โ†’ Password Attacks โ†’ johnny.
Johnny

2) will get the password of Kali machine with the following command and a file will be created on the desktop.
Desktop

3) Click โ€œOpen Passwd Fileโ€ โ†’ OK and all the files
shown then Open File

4) Click โ€œStart Attackโ€.
Start Attack

5) After the attack is complete, click the left panel at โ€œPasswordsโ€ and the password will be unshaded


john is a command line version of Johnny GUI. To start it, open the Terminal and type โ€œjohnโ€.
Unshadowing

In case of unshadowing the password, we need to write the following command โˆ’

root@kali:~# unshadow passwd shadow > unshadowed.txt

๐Ÿฆ‘ Rainbowcrack

The RainbowCrack software cracks hashes by rainbow table lookup. Rainbow tables are ordinary files stored on the hard disk. Generally, Rainbow tables are bought online or can be compiled with different tools.

To open it, go to Applications โ†’ Password Attacks โ†’ click โ€œrainbowcrackโ€.
RainbowCrack

The command to crack a hash password is โˆ’

rcrack path_to_rainbow_tables -f path_to_password_hash

๐Ÿฆ‘ SQLdict

It is a dictionary attack tool for SQL server and is very easy and basic to be used. To open it, open the terminal and type โ€œsqldictโ€. It will open the following view.
Sql Dict

Under โ€œTarget IP Serverโ€, enter the IP of the server holding the SQL. Under โ€œTarget Accountโ€, enter the username. Then load the file with the password and click โ€œstartโ€ until it finishes.
hash-identifier

It is a tool that is used to identify types of hashes, meaning what they are being used for. For example, if I have a HASH, it can tell me if it is a Linux or windows HASH.

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Office 2019 All Version SERIALS TESTED By undercOde :
instagram.com/UndercOdeTestingCompany

1) Office Professional Plus 2019

NMMKJ-6RK4F-KMJVX-8D9MJ-6MWKP

2) Office Standard 2019

6NWWJ-YQWMR-QKGCB-6TMB3-9D9HK

3) Project Professional 2019

B4NPR-3FKK7-T2MBV-FRQ4W-PKD2B

4) Project Standard 2019

C4F7P-NCP8C-6CQPT-MQHV9-JXD2M

5) Visio Professional 2019

9BGNQ-K37YR-RQHF2-38RQ3-7VCBB

6) Visio Standard 2019

7TQNQ-K3YQQ-3PFH7-CCPPM-X4VQ2

7) Access 2019

9N9PT-27V4Y-VJ2PD-YXFMF-YTFQT

8) Excel 2019

TMJWT-YYNMB-3BKTF-644FC-RVXBD

9) Outlook 2019

7HD7K-N4PVK-BHBCQ-YWQRW-XW4VK

10) PowerPoint 2019

RRNCX-C64HY-W2MM7-MCH9G-TJHMQ

11) Publisher 2019

G2KWX-3NW6P-PY93R-JXK2T-C9Y9V

12) Skype for Business 2019

NCJ33-JHBBY-HTK98-MYCV8-HMKHJ

13) Word 2019

PBX3G-NWMT6-Q7XBW-PYJGG-WXD33

@UndercOdeOfficial

โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘INSTALL ALL YOUR FAVOR TOOLS VIA 1 CLICK ON TERMUX
(Automatic hacking tools installer for Android) [ONLY FOR TERMUX]
instagram.com/UndercOdeTestingCompany

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/AnonHackerr/toolss.git

2) cd toolss

3) chmod +x Tools.py

4) python Tools.py

5) choose option via numbers

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘IF YOU WANT TO CLONE A SIM CARD YOU MUST KNOW THIS :
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

SIM CARD:

>Our sim cards contain two secret codes or keys called (imsi value and ki value) which enables the operator to know the mobile number and authenticate the customer ,these codes are related to our mobile numbers which the operators store in their vast data base,it is based on these secret keys that enables the billing to be made to that customer.

>now what we do in sim cloning is extract these two secret codes from the sim and programme it into a new blank smart card often known as wafer, since the operator

>authentication on sims is based on these values,it enables us to fool the operators in thinking that its the

>original sim,this authentication is a big flaw concerning GSM technology

>SIM cards are the most important part of a cell phone that runs on a GSM network. They enable the phone to receive signal from a mobile phone company. Many people who have phones that accept SIM cards find it extremely easy to simply swap out their SIM card for a new SIM card when in a different country.

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Now which sim cards can be cloned:
t.me/iOsDeveloppers

> Sim cards are manufactured on the basis of 3 algorithms COMP128v1,COMP128v2 and COMP128v3

> now an important note currently only COMP128v1 version sim cards can be
cloned ,since this is the only algorithm which has been cracked by users, bear in mind that 70% of all the sim cards we use are COMP128v1 .

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘HOW CLONE SIM CARD FULL TUTORIAL :
instagram.com/UndercOdeTestingCompany

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) Buy a Sim card Reader

2) Need a Blank sim card or super sim card

3) Download
> https://ssl-download.cnet.com/MagicSIM/3000-2094_4-10601728.html
(if server error try below link)
or http://content.mobiledit.com/api/getproduct-expressforensic-win64

4) Download https://usb_sim_card_reader_software.en.downloadastro.com/download/
(or automate driver download via driverbooster app)

5) Install programs.

6) go in phone tools, select sim card, then select unlock sim, it will promt for a code.

7 ) call network provider, they will ask for your phone number, your account info, name and security code,
then they will ask why you want to unlock your simcard, just tell them you need to unlock your sim to get it
to work with your overseas phone or something.

8) Once they give you the sim unlock code, enter it, and it will say sim unlocked.

9) remove the sim from your phone, place it in the cardreader, click read from card in sim clone program.

10) once it says connected, select crack sim in the toolbar. click strong ki and clink all of the other find options and then click start.

11) Once your ki is found and the crack is finished, click file, save as and save your cracked sim info to a that file.

12) IMPORTANT!!! you must click disconnect from the file menu or you will ruin your simcard. once it says
disconnected, remove the sim. put it in your phone and see if it still works, it should. if not, you either did not unlock your sim, or you tried to copy it instead of crack and save.

13) insert black 3g card (must be installed the sim card driver first ) program.

14) click connect

15) it will say no info found if it is truly blank.

16) select write to sim, it will promt you to select a dat file, select the one you saved before, now click start, it will take about 10 minutes to write it, once it is complete, it will ask for a security code, enter the security code network provider gave you, then click finish.

17) your card is cloned. if you try to make 2 calls at the same time, one will go through, the other will say call failed, and both phones will get the same messages, text and voice, and both will recieve the same calls, but only one can talk at a time.

E N J O Y

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Database Hacking :

> sqlsus is an open source MySQL injection and takeover tool, written in perl.

> Via a command line interface, you can retrieve the database(s) structure, inject your own SQL queries (even complex ones), download files from the web server, crawl the website for writable directories, upload and control a backdoor, clone the database(s), and much moreโ€ฆ
Whenever relevant, sqlsus will mimic a MySQL console output.

> sqlsus focuses on speed and efficiency, optimizing the available injection space, making the best use (I can think of) of MySQL functions.
It uses stacked subqueries and an powerful blind injection algorithm to maximize the data gathered per web server hit.
Using multi-threading on top of that, sqlsus is an extremely fast database dumper, be it for inband or blind injection.
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) download official site :
>https://sourceforge.net/projects/sqlsus/files/sqlsus/sqlsus-0.7.2.tgz/download
(kali preinstalled tool)

2) Unzip & go dir then

3) sqlsus -h

๐Ÿฆ‘ Options:
-h, --help brief help message
-v, --version version information
-e, --execute <commands> execute commands and exit
-g, --genconf <filename> generate configuration file

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Flip lets you declare and manage feature flags, backed by cookies (private testing) and database (site-wide). last 2019
instagram.com/UndercOdeTestingCompany

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/pda/flip

2) cd flip

3) Generate the model and migration
> rails g flip:install

4) Run the migration
> rake db:migrate

# Include the Feature model, e.g. config/initializers/feature.rb:

๐Ÿฆ‘Checking Features
Flip.on? or the dynamic predicate methods are used to check feature state:

Flip.on? :world_domination # true
Flip.world_domination? # true

Flip.on? :shiny_things # false
Flip.shiny_things? # false

๐Ÿฆ‘Views and controllers use the feature?(key) method:

<div>
<% if feature? :world_domination %>
<%= link_to "Dominate World", world_dominations_path %>
<% end %>
</div>

๐Ÿฆ‘FEATURES:

This gem optimizes for:

1) developer ease-of-use,

2) visibility and control for other stakeholders (like marketing); and

3) run-time performance

ยป There are three layers of strategies per feature:

default
database, to flip features site-wide for all users
cookie, to flip features just for you (or someone else)

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Accurately Locate Smartphones # using Social Engineering๐Ÿ’€
2019-2020 (Termux/Linux..)
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

>Kali Linux / Ubuntu / Parrot OS

1) git clone https://github.com/thewhiteh4t/seeker.git
2) cd seeker/
3) chmod 777 install.sh
4) ./install.sh
5)BlackArch Linux
6)pacman -S seeker

> Docker
docker pull thewhiteh4t/seeker

๐Ÿฆ‘Termux

1)git clone https://github.com/thewhiteh4t/seeker.git
2)cd seeker/
3)chmod 777 termux_install.sh
4)./termux_install.sh

ยปUsage

> python3 seeker.py -h
For Help options

> seeker.py [-h] [-s SUBDOMAIN]
to Run it

๐Ÿฆ‘optional arguments:
-h, --help show this help message and exit
-s SUBDOMAIN, --subdomain Subdomain Provide Subdomain for Serveo URL ( Optional )
-k KML, --kml KML Provide KML Filename ( Optional )
-t TUNNEL, --tunnel TUNNEL Specify Tunnel Mode [manual]



๐Ÿฆ‘How It Works ??

> Concept behind Seeker is simple, just like we host phishing pages to get credentials why not host a fake page that requests your location like many popular location based websites.

> Seeker Hosts a fake website on In Built PHP Server and uses Serveo to generate a link which we will forward to the target, website asks for Location

๐Ÿฆ‘we can get :

> Longitude
> Latitude
>Accuracy
>Altitude - Not always available
>Direction - Only available if user is moving
>Speed - Only available if user is moving
>Along with Location Information we also get Device Information

without any permissions :

>Operating System
>Platform
>Number of CPU Cores
>Amount of RAM - Approximate Results
>Screen Resolution
>GPU information
>Browser Name and Version
>Public IP Address
>IP Address Reconnaissance

๐Ÿฆ‘Tested By UndercOde On:

>Ubanto
> Termux
>Kali

E N J O Y W I T H U N D E R C O D E

@UndercOdeOfficial
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘ Before Start Hosting the forked os from our UndercOde Linux weโ€™ve working on stabilities issues & some deadly improvements ...This may take while to done
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘what is a Hyperparameter Optimization ?
instagram.com/UndercodeTestingCompany

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

> The same types of machine learning models may require different assumptions, weights, or learning speeds for different types of data. These parameters are called hyperparameters and should be adjusted so that the model can optimally solve the training problem

๐Ÿฆ‘can be by :

1) Grid Search

> The traditional method for optimizing hyperparameters is to search by a lattice (or a variation of parameters ), which simply does a full search on a manually specified subset of the space of hyperparameters of the training algorithm. A grid search should be accompanied by some measure of performance, usually measured by cross-checking on a training set , or by running an algorithm on an established test set

2) Random Search

>Random search replaces the exhaustive search of all combinations by randomly selecting them. This can be easily applied to the discrete settings given above, but the method can also be generalized to continuous and mixed spaces. Random search can outperform grid search, especially if only a small number of hyperparameters affects the performance of the machine learning algorithm

3) Bayesian Optimization

> Bayesian optimization is a global optimization method for an unknown function (black box) with noise. Applied to hyperparametric optimization, Bayesian optimization constructs a stochastic model of the mapping function from the values โ€‹โ€‹of the hyperparameter to the objective function applied on the set of checks.
> By iteratively applying a promising configuration of hyperparameters based on the current model, and then updating it, Bayesian optimization seeks to collect as much information as possible about this function

4) Gradient Optimization
For specific learning algorithms, you can calculate the gradient of hyperparameters and optimize them using gradient descent

5) Evolutionary Optimization

a) create an initial population of random solutions (that is, a randomly generated tuple of hyperparameters, usually 100+)

b) We evaluate the tuples of hyperparameters and obtain their fitness function (for example, using 10-fold accuracy of cross-checking the learning algorithm of a machine with these hyperparameters)

c) Rank tuples of hyperparameters according to their relative suitability

d) Replace tuples of hyperparameters with worse performance with new tuples of hyperparameters formed by crossing [en] and mutation [en]

e) Repeat steps 2โ€“4 until we obtain a satisfactory algorithm performance or until the performance stops improving

Powred by wiki
@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘How to Speed up Python code using the language itself
Twitter.com/UndercODEtC

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

>Python C Extensions
C API, which makes it possible to relatively transparently integrate C-code into Python programs. There are only two drawbacks to this solution:

1) The "entry threshold" for C and the Python / C API is still higher than for the "bare" Python, which cuts this option off for developers not familiar with C

2) One of the key features of Python is development speed. Writing part of a C program reduces it in proportion to the part of the code rewritten in C for the entire program
> So, this method is also not suitable for everyone.

๐Ÿฆ‘To Speedup :

1) Removing the main program code to a separate

> This step helps the python interpreter to better perform internal optimizations about startup, and when using psyco, this step can help a lot, because psyco only optimizes functions without affecting the main body of the program.
If earlier, the calculated part of the original program looked like this:

for Y in xrange(height):
for X in xrange(width):

> Then, changing it to:
def mandelbrot(height, itt, width):
for Y in xrange(height):
for X in xrange(width):
mandelbrot(height, itt, width)

2) Profiling:
python -m cProfile sample.py
The -m interpreter switch allows you to run modules as separate programs, if the module itself provides such an opportunity.
The result of this command will be to get the โ€œprofileโ€ of the program - a table, of the form. Using it, it is easy to determine the places that need optimization (the rows with the highest values โ€‹โ€‹of ncalls (number of function calls), tottime and percall (the operating time of all calls to this function and each individual respectively)). For convenience, you can add a key
4613944 function calls (4613943 primitive calls) in 2.818 seconds

Ordered by: internal time

ncalls tottime percall cumtime percall filename:lineno(function)
1 2.309 2.309 2.766 2.766 mand_slow.py:22(mandelbrot)
...

3) Profile Analysis

We see that in the first place in timeof the example main function mandelbrot by Undercode , followed by the system function abs, followed by several functions from the math module, then single calls to functions with minimal time costs, we are not interested in.

4) Maths in code :
>that the exponentiation operator is quite โ€œgeneralโ€, but we need only the exponentiation, that is, all constructions of the form x 2 can be replaced by x * x, thus gaining a little more time.
> Let's look at the time:
1.9 sec , or 62% of the original time, achieved by simply replacing Few lines:
p = math.sqrt
better than do

>pix = img.load()
def mandelbrot(height, itt, width):
step_x = (2 - width / 1.29) / (width / 2.6) - (1 - width / 1.29) / (width / 2.6)
for Y in range(height):
y = (Y - height / 2) / (width / 2.6)
.........

๐Ÿฆ‘Steps 5, 6, and 7. Small but Important

> The common truth that all Python programmers know is that working with global variables is slower than working with local variables. But the fact that this is true not only for variables but also for all objects in general is often forgotten. The function code calls several functions from the math module. So why not import them into the function itself? Made by:
def mandelbrot(height, itt, width):
from math import atan2, cos, sqrt
pix = img.load()

Another 0.1 sec.
Recall that abs (x) will return a number of type float. So itโ€™s worth comparing it with float and not int:
if abs(Z_i) > 2: ------> if abs(Z_i) > 2.0:

Another 0.15sec. 53% of the initial time.

ยป And finally, a dirty hack.
In this particular task, it can be understood that the lower half of the image is equal to the upper, i.e. the number of calculations can be halved, resulting in a total of 0.84 seconds or 27% of the original time.

Written by UndercOde
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘How hackany Wifi On Windows 7-8-10 ?
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) download Aircrack :
> https://download.aircrack-ng.org/aircrack-ng-1.2-win.zip

2) Extract via Winar or winzip

3) Go to your 'Local Disk (C:) and open the folder "Program Files" or "Program Files (x86)" depending on your windows architecture. Since my Windows is 64-bit I will choose the 'Program Files' folder.

4) Then, copy and paste the Aircrack-ng folder that you uncompressed before inside the "Program Files" folder.

> The Aircrack-ng folder should look like this inside the "Program Files" folder.

5) After pasting the "Aircrack-ng" folder inside the "Program files" or "Program Files (x86)" you have to go inside of that folder.

Once inside the folder you will have to open the "bin" folder.

6) Depending on your Windows architecture you will choose the folder according to your Windows 32 or 64 bit

7) Once inside your corresponding folder, you will have to copy the address
(the dir location )

8) Now go to pc Propriety :

> left click on Advanced system settings

9) Now you will have to click on the button that says "Environment Variables...

10) Once you got this window, you will have to click the "New" button pointed with the arrow.

In this new window, you have to write (path) inside the "Variable name:" box. Then, you will have to paste the address that you copied before

11) After that, just click "OK" on all the windows that are open. Also, click on "Apply" if you see the option.

Final Step: Go to your desktop and press the keys "Ctrl + R" to open the "Run" program. Inside "Run" type "cmd"

>Then press "OK"

12) type "aireplay-ng" inside the "cmd".
Then, press enter.

13) You should get a set of information
Now you are done and ready to use it : just input the catured file + a wifi worldlist example :

>http://wordlist.softwaresea.com/Windows-software-download/wordlist-wireshark
in addiction you can run this setup to capture wifi packets :
>http://wordlist.softwaresea.com/Windows-software-download

E N J O Y W I T H UndercOde
@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–