UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.4K links
๐Ÿฆ‘ Undercode Cyber World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE

โœจ Web & Services:
โ†’ Undercode.help
Download Telegram
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘INSTALL ALL YOUR FAVOR TOOLS VIA 1 CLICK ON TERMUX
(Automatic hacking tools installer for Android) [ONLY FOR TERMUX]
instagram.com/UndercOdeTestingCompany

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/AnonHackerr/toolss.git

2) cd toolss

3) chmod +x Tools.py

4) python Tools.py

5) choose option via numbers

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘IF YOU WANT TO CLONE A SIM CARD YOU MUST KNOW THIS :
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

SIM CARD:

>Our sim cards contain two secret codes or keys called (imsi value and ki value) which enables the operator to know the mobile number and authenticate the customer ,these codes are related to our mobile numbers which the operators store in their vast data base,it is based on these secret keys that enables the billing to be made to that customer.

>now what we do in sim cloning is extract these two secret codes from the sim and programme it into a new blank smart card often known as wafer, since the operator

>authentication on sims is based on these values,it enables us to fool the operators in thinking that its the

>original sim,this authentication is a big flaw concerning GSM technology

>SIM cards are the most important part of a cell phone that runs on a GSM network. They enable the phone to receive signal from a mobile phone company. Many people who have phones that accept SIM cards find it extremely easy to simply swap out their SIM card for a new SIM card when in a different country.

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Now which sim cards can be cloned:
t.me/iOsDeveloppers

> Sim cards are manufactured on the basis of 3 algorithms COMP128v1,COMP128v2 and COMP128v3

> now an important note currently only COMP128v1 version sim cards can be
cloned ,since this is the only algorithm which has been cracked by users, bear in mind that 70% of all the sim cards we use are COMP128v1 .

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘HOW CLONE SIM CARD FULL TUTORIAL :
instagram.com/UndercOdeTestingCompany

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) Buy a Sim card Reader

2) Need a Blank sim card or super sim card

3) Download
> https://ssl-download.cnet.com/MagicSIM/3000-2094_4-10601728.html
(if server error try below link)
or http://content.mobiledit.com/api/getproduct-expressforensic-win64

4) Download https://usb_sim_card_reader_software.en.downloadastro.com/download/
(or automate driver download via driverbooster app)

5) Install programs.

6) go in phone tools, select sim card, then select unlock sim, it will promt for a code.

7 ) call network provider, they will ask for your phone number, your account info, name and security code,
then they will ask why you want to unlock your simcard, just tell them you need to unlock your sim to get it
to work with your overseas phone or something.

8) Once they give you the sim unlock code, enter it, and it will say sim unlocked.

9) remove the sim from your phone, place it in the cardreader, click read from card in sim clone program.

10) once it says connected, select crack sim in the toolbar. click strong ki and clink all of the other find options and then click start.

11) Once your ki is found and the crack is finished, click file, save as and save your cracked sim info to a that file.

12) IMPORTANT!!! you must click disconnect from the file menu or you will ruin your simcard. once it says
disconnected, remove the sim. put it in your phone and see if it still works, it should. if not, you either did not unlock your sim, or you tried to copy it instead of crack and save.

13) insert black 3g card (must be installed the sim card driver first ) program.

14) click connect

15) it will say no info found if it is truly blank.

16) select write to sim, it will promt you to select a dat file, select the one you saved before, now click start, it will take about 10 minutes to write it, once it is complete, it will ask for a security code, enter the security code network provider gave you, then click finish.

17) your card is cloned. if you try to make 2 calls at the same time, one will go through, the other will say call failed, and both phones will get the same messages, text and voice, and both will recieve the same calls, but only one can talk at a time.

E N J O Y

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Database Hacking :

> sqlsus is an open source MySQL injection and takeover tool, written in perl.

> Via a command line interface, you can retrieve the database(s) structure, inject your own SQL queries (even complex ones), download files from the web server, crawl the website for writable directories, upload and control a backdoor, clone the database(s), and much moreโ€ฆ
Whenever relevant, sqlsus will mimic a MySQL console output.

> sqlsus focuses on speed and efficiency, optimizing the available injection space, making the best use (I can think of) of MySQL functions.
It uses stacked subqueries and an powerful blind injection algorithm to maximize the data gathered per web server hit.
Using multi-threading on top of that, sqlsus is an extremely fast database dumper, be it for inband or blind injection.
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) download official site :
>https://sourceforge.net/projects/sqlsus/files/sqlsus/sqlsus-0.7.2.tgz/download
(kali preinstalled tool)

2) Unzip & go dir then

3) sqlsus -h

๐Ÿฆ‘ Options:
-h, --help brief help message
-v, --version version information
-e, --execute <commands> execute commands and exit
-g, --genconf <filename> generate configuration file

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Flip lets you declare and manage feature flags, backed by cookies (private testing) and database (site-wide). last 2019
instagram.com/UndercOdeTestingCompany

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/pda/flip

2) cd flip

3) Generate the model and migration
> rails g flip:install

4) Run the migration
> rake db:migrate

# Include the Feature model, e.g. config/initializers/feature.rb:

๐Ÿฆ‘Checking Features
Flip.on? or the dynamic predicate methods are used to check feature state:

Flip.on? :world_domination # true
Flip.world_domination? # true

Flip.on? :shiny_things # false
Flip.shiny_things? # false

๐Ÿฆ‘Views and controllers use the feature?(key) method:

<div>
<% if feature? :world_domination %>
<%= link_to "Dominate World", world_dominations_path %>
<% end %>
</div>

๐Ÿฆ‘FEATURES:

This gem optimizes for:

1) developer ease-of-use,

2) visibility and control for other stakeholders (like marketing); and

3) run-time performance

ยป There are three layers of strategies per feature:

default
database, to flip features site-wide for all users
cookie, to flip features just for you (or someone else)

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Accurately Locate Smartphones # using Social Engineering๐Ÿ’€
2019-2020 (Termux/Linux..)
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

>Kali Linux / Ubuntu / Parrot OS

1) git clone https://github.com/thewhiteh4t/seeker.git
2) cd seeker/
3) chmod 777 install.sh
4) ./install.sh
5)BlackArch Linux
6)pacman -S seeker

> Docker
docker pull thewhiteh4t/seeker

๐Ÿฆ‘Termux

1)git clone https://github.com/thewhiteh4t/seeker.git
2)cd seeker/
3)chmod 777 termux_install.sh
4)./termux_install.sh

ยปUsage

> python3 seeker.py -h
For Help options

> seeker.py [-h] [-s SUBDOMAIN]
to Run it

๐Ÿฆ‘optional arguments:
-h, --help show this help message and exit
-s SUBDOMAIN, --subdomain Subdomain Provide Subdomain for Serveo URL ( Optional )
-k KML, --kml KML Provide KML Filename ( Optional )
-t TUNNEL, --tunnel TUNNEL Specify Tunnel Mode [manual]



๐Ÿฆ‘How It Works ??

> Concept behind Seeker is simple, just like we host phishing pages to get credentials why not host a fake page that requests your location like many popular location based websites.

> Seeker Hosts a fake website on In Built PHP Server and uses Serveo to generate a link which we will forward to the target, website asks for Location

๐Ÿฆ‘we can get :

> Longitude
> Latitude
>Accuracy
>Altitude - Not always available
>Direction - Only available if user is moving
>Speed - Only available if user is moving
>Along with Location Information we also get Device Information

without any permissions :

>Operating System
>Platform
>Number of CPU Cores
>Amount of RAM - Approximate Results
>Screen Resolution
>GPU information
>Browser Name and Version
>Public IP Address
>IP Address Reconnaissance

๐Ÿฆ‘Tested By UndercOde On:

>Ubanto
> Termux
>Kali

E N J O Y W I T H U N D E R C O D E

@UndercOdeOfficial
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘ Before Start Hosting the forked os from our UndercOde Linux weโ€™ve working on stabilities issues & some deadly improvements ...This may take while to done
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘what is a Hyperparameter Optimization ?
instagram.com/UndercodeTestingCompany

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

> The same types of machine learning models may require different assumptions, weights, or learning speeds for different types of data. These parameters are called hyperparameters and should be adjusted so that the model can optimally solve the training problem

๐Ÿฆ‘can be by :

1) Grid Search

> The traditional method for optimizing hyperparameters is to search by a lattice (or a variation of parameters ), which simply does a full search on a manually specified subset of the space of hyperparameters of the training algorithm. A grid search should be accompanied by some measure of performance, usually measured by cross-checking on a training set , or by running an algorithm on an established test set

2) Random Search

>Random search replaces the exhaustive search of all combinations by randomly selecting them. This can be easily applied to the discrete settings given above, but the method can also be generalized to continuous and mixed spaces. Random search can outperform grid search, especially if only a small number of hyperparameters affects the performance of the machine learning algorithm

3) Bayesian Optimization

> Bayesian optimization is a global optimization method for an unknown function (black box) with noise. Applied to hyperparametric optimization, Bayesian optimization constructs a stochastic model of the mapping function from the values โ€‹โ€‹of the hyperparameter to the objective function applied on the set of checks.
> By iteratively applying a promising configuration of hyperparameters based on the current model, and then updating it, Bayesian optimization seeks to collect as much information as possible about this function

4) Gradient Optimization
For specific learning algorithms, you can calculate the gradient of hyperparameters and optimize them using gradient descent

5) Evolutionary Optimization

a) create an initial population of random solutions (that is, a randomly generated tuple of hyperparameters, usually 100+)

b) We evaluate the tuples of hyperparameters and obtain their fitness function (for example, using 10-fold accuracy of cross-checking the learning algorithm of a machine with these hyperparameters)

c) Rank tuples of hyperparameters according to their relative suitability

d) Replace tuples of hyperparameters with worse performance with new tuples of hyperparameters formed by crossing [en] and mutation [en]

e) Repeat steps 2โ€“4 until we obtain a satisfactory algorithm performance or until the performance stops improving

Powred by wiki
@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘How to Speed up Python code using the language itself
Twitter.com/UndercODEtC

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

>Python C Extensions
C API, which makes it possible to relatively transparently integrate C-code into Python programs. There are only two drawbacks to this solution:

1) The "entry threshold" for C and the Python / C API is still higher than for the "bare" Python, which cuts this option off for developers not familiar with C

2) One of the key features of Python is development speed. Writing part of a C program reduces it in proportion to the part of the code rewritten in C for the entire program
> So, this method is also not suitable for everyone.

๐Ÿฆ‘To Speedup :

1) Removing the main program code to a separate

> This step helps the python interpreter to better perform internal optimizations about startup, and when using psyco, this step can help a lot, because psyco only optimizes functions without affecting the main body of the program.
If earlier, the calculated part of the original program looked like this:

for Y in xrange(height):
for X in xrange(width):

> Then, changing it to:
def mandelbrot(height, itt, width):
for Y in xrange(height):
for X in xrange(width):
mandelbrot(height, itt, width)

2) Profiling:
python -m cProfile sample.py
The -m interpreter switch allows you to run modules as separate programs, if the module itself provides such an opportunity.
The result of this command will be to get the โ€œprofileโ€ of the program - a table, of the form. Using it, it is easy to determine the places that need optimization (the rows with the highest values โ€‹โ€‹of ncalls (number of function calls), tottime and percall (the operating time of all calls to this function and each individual respectively)). For convenience, you can add a key
4613944 function calls (4613943 primitive calls) in 2.818 seconds

Ordered by: internal time

ncalls tottime percall cumtime percall filename:lineno(function)
1 2.309 2.309 2.766 2.766 mand_slow.py:22(mandelbrot)
...

3) Profile Analysis

We see that in the first place in timeof the example main function mandelbrot by Undercode , followed by the system function abs, followed by several functions from the math module, then single calls to functions with minimal time costs, we are not interested in.

4) Maths in code :
>that the exponentiation operator is quite โ€œgeneralโ€, but we need only the exponentiation, that is, all constructions of the form x 2 can be replaced by x * x, thus gaining a little more time.
> Let's look at the time:
1.9 sec , or 62% of the original time, achieved by simply replacing Few lines:
p = math.sqrt
better than do

>pix = img.load()
def mandelbrot(height, itt, width):
step_x = (2 - width / 1.29) / (width / 2.6) - (1 - width / 1.29) / (width / 2.6)
for Y in range(height):
y = (Y - height / 2) / (width / 2.6)
.........

๐Ÿฆ‘Steps 5, 6, and 7. Small but Important

> The common truth that all Python programmers know is that working with global variables is slower than working with local variables. But the fact that this is true not only for variables but also for all objects in general is often forgotten. The function code calls several functions from the math module. So why not import them into the function itself? Made by:
def mandelbrot(height, itt, width):
from math import atan2, cos, sqrt
pix = img.load()

Another 0.1 sec.
Recall that abs (x) will return a number of type float. So itโ€™s worth comparing it with float and not int:
if abs(Z_i) > 2: ------> if abs(Z_i) > 2.0:

Another 0.15sec. 53% of the initial time.

ยป And finally, a dirty hack.
In this particular task, it can be understood that the lower half of the image is equal to the upper, i.e. the number of calculations can be halved, resulting in a total of 0.84 seconds or 27% of the original time.

Written by UndercOde
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘How hackany Wifi On Windows 7-8-10 ?
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) download Aircrack :
> https://download.aircrack-ng.org/aircrack-ng-1.2-win.zip

2) Extract via Winar or winzip

3) Go to your 'Local Disk (C:) and open the folder "Program Files" or "Program Files (x86)" depending on your windows architecture. Since my Windows is 64-bit I will choose the 'Program Files' folder.

4) Then, copy and paste the Aircrack-ng folder that you uncompressed before inside the "Program Files" folder.

> The Aircrack-ng folder should look like this inside the "Program Files" folder.

5) After pasting the "Aircrack-ng" folder inside the "Program files" or "Program Files (x86)" you have to go inside of that folder.

Once inside the folder you will have to open the "bin" folder.

6) Depending on your Windows architecture you will choose the folder according to your Windows 32 or 64 bit

7) Once inside your corresponding folder, you will have to copy the address
(the dir location )

8) Now go to pc Propriety :

> left click on Advanced system settings

9) Now you will have to click on the button that says "Environment Variables...

10) Once you got this window, you will have to click the "New" button pointed with the arrow.

In this new window, you have to write (path) inside the "Variable name:" box. Then, you will have to paste the address that you copied before

11) After that, just click "OK" on all the windows that are open. Also, click on "Apply" if you see the option.

Final Step: Go to your desktop and press the keys "Ctrl + R" to open the "Run" program. Inside "Run" type "cmd"

>Then press "OK"

12) type "aireplay-ng" inside the "cmd".
Then, press enter.

13) You should get a set of information
Now you are done and ready to use it : just input the catured file + a wifi worldlist example :

>http://wordlist.softwaresea.com/Windows-software-download/wordlist-wireshark
in addiction you can run this setup to capture wifi packets :
>http://wordlist.softwaresea.com/Windows-software-download

E N J O Y W I T H UndercOde
@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Best emulator : full Android system on a regular GNU/Linux system like Ubuntu
>Anbox is a container-based approach to boot a full Android system on a regular GNU/Linux system like Ubuntu. In other words: Anbox will let you run Android on your Linux system without the slowness of virtualization.
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) sudo apt install build-essential cmake cmake-data debhelper dbus google-mock \

2) libboost-dev libboost-filesystem-dev libboost-log-dev libboost-iostreams-dev \

3) libboost-program-options-dev libboost-system-dev libboost-test-dev \

4) libboost-thread-dev libcap-dev libsystemd-dev libegl1-mesa-dev \

5) libgles2-mesa-dev libglm-dev libgtest-dev liblxc1 \

6) libproperties-cpp-dev libprotobuf-dev libsdl2-dev libsdl2-image-dev lxc-dev \

7) pkg-config protobuf-compile

8) git clone https://github.com/anbox/anbox.git

9) cd anbox

10) mkdir build

11) cd build

12) cmake ..

13) make

๐Ÿฆ‘ simple

1) sudo make install
will install the necessary bits into your system.

2) If you want to build the anbox snap instead you can do this with the following steps:

> mkdir android-images
> cp /path/to/android.img android-images/android.img
> snapcraft
The result will be a .snap file you can install on a system supporting snaps

2) snap install --dangerous --devmode anbox_1_amd64.snap

๐Ÿฆ‘Requirements :

libdbus
google-mock
google-test
libboost
libboost-filesystem
libboost-log
libboost-iostreams
libboost-program-options
libboost-system
libboost-test
libboost-thread
libcap
libsystemd
mesa (libegl1, libgles2)
libsdl2
libprotobuf
protobuf-compiler
lxc (>= 3.0)

๐Ÿฆ‘Tested:
>kali
>ubanto
@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Massive automated handshake capture on BlackArch with zizzania automate Wifi Hacking tutorial by UndercOde :
t.me/iOsDeveloppers

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/cyrus-and/zizzania
2) cd zizzania
3) for debian/kali/parrot...
> sudo apt-get install libpcap-dev

๐Ÿฆ‘For macOS systems (Homebrew):
1)brew install libpcap
2)Building
3)make -f config.Makefile
4)make
5)The installation process is not mandatory, zizzania can be run from the src directory. Just in case:
> make install
> make uninstall
6) now Channel switching must be performed manually:

ln -s /System/Library/PrivateFrameworks/Apple80211.framework/Versions/Current/Resources/airport /usr/local/bin/airport
7)sudo airport --disassociate
8)sudo airport --channel=<channel>

๐Ÿฆ‘We re ready now :
1) Suppose we are interested in an access point with BSSID AA: BB: CC: DD: EE: FF, but very rarely (once a day, once a week, once a month) clients connect to it.
We can run zizzania on the network interface -i wlp2s0 , restrict listening to the sixth channel -c 6 (if we specify the channel, the program switches the network interface to monitoring mode), specify the access point we are interested in -b AA: BB: CC: DD: EE: FF and the file to which the intercepted handshakes -w out.pcap should be written :

>
<font style="vertical-align: inherit;"><font style="vertical-align: inherit;">sudo zizzania -i wl

2) Suppose we want to listen to a specific channel and we are interested in all access points on it. Then the command will look something like this (we did not specify the -b switch with the BSSID of any AP):

>
<font style="vertical-align: inherit;"><font style="vertical-align: inherit;">sudo zizzania -i wlp2s0 -c 1 -2 -w zizza / out5</font></font>

3) We want to capture handshakes from all access points of all channels. At the same time,

> use a deauthentication attack to get the maximum possible handshakesWe want to capture handshakes from all access points of all channels. At the same time, we want to use a deauthentication attack to get the maximum possible handshakes

Lets run :
>use the --berlin 1200 option . It is needed only so that access points do not crash too quickly from the screen (this does not affect the work in any way)

2) sudo airodump-ng wlp2s0 -f 30000 -w hndshk/auto5 --berlin 1200
When starting zizzania, I specify only the name of the wireless interface on which it will work (send deauthentication packets)
3) sudo zizzania -i wlp2s0

4) pyrit -r "hndshk/auto5-01.cap" analyze
(note auto5... its name of pcapfile )

5) finallu use any packets in aircrack & Wait till done

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ How Dump a git repository from a website termux or any linux distro
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/arthaud/git-dumper

2) cd git-dumper

3) pip install -r requirements.txt

4) ./git-dumper.py http://website.com/.git ~/website

๐Ÿฆ‘Features :

> Fetch all common files (.gitignore, .git/HEAD, .git/index, etc.);

> Find as many refs as possible (such as refs/heads/master, refs/remotes/origin/HEAD, etc.) by analyzing .git/HEAD, .git/logs/HEAD, .git/config, .git/packed-refs and so on;

> Find as many objects (sha1) as possible by analyzing .git/packed-refs, .git/index, .git/refs/* and .git/logs/*;

> Fetch all objects recursively, analyzing each commits to find their parents;

> Run git checkout . to recover the current working tree

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM