โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆTrity Exploite Tool top 2019:Emulator Escape
>Trinity is the third public jailbreak for the PS Vitaโข, which supports the latest firmwares 3.69 and 3.70. The exploit chain consists of three stages: the MIPS Kernel Exploit, the PSP Emulator Escape and the ARM Kernel Exploit.
t.me/UndercOdeTesting
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) Download and install qcma and psvimgtools.
> https://codestation.github.io/qcma/
>https://github.com/yifanlu/psvimgtools/releases
2) Start qcma and within the qcma settings set the option Use this version for updates to FW 0.00 (Always up-to-date) to spoof the System Software check.
3) Launch Content Manager on your PS Vita and connect it to your computer, where you then need to select PS Vita System -> PC, and after that you select Applications. Finally select PSPโข/Other and click on the game that you want to turn into the Trinity exploit. If you see an error message about System Software, you should simply reboot your device to solve it (if this doesn't solve, then put your device into airplane mode and reboot). If this does still not work, then alternatively set DNS to 212.47.229.76 to block updates.
4) Transfer the game over to your computer by clicking on Copy on your PS Vita. After copying, you go to the folder /Documents/PS Vita/PGAME/xxxxxxxxxxxxxxxx/YYYYZZZZZ on your computer, where xxxxxxxxxxxxxxxx is some string corresponding to your account ID and YYYYZZZZZ is the title id of the game that you've just copied over. You can look at the image at YYYYZZZZZ/sce_sys/icon0.png to verify that it is indeed your chosen game. Furthermore, the YYYYZZZZZ folder should contain these folders: game, license and sce_sys.
5) Before you attempt to modify the backup, you should make a copy of it. Just copy YYYYZZZZZ somewhere else, such that if you fail to follow the instructions, you can copy it back and retry.
6) Insert the xxxxxxxxxxxxxxxx string here. If the AID is valid, it will yield a key that you can now use to decrypt/re-encrypt your game.
7) Decrypt the game backup by executing the following command in your command line/terminal (make sure you're in the right working directory. On Windows you can open the terminal in the current working directory by typing in cmd in the path bar of the file explorer. Also, if you haven't installed psvimgtools yet, then just place them in the YYYYZZZZZ folder):
> psvimg-extract -K YOUR_KEY game/game.psvimg game_dec
If done correctly, you should see an output like this:
> creating file ux0:pspemu/temp/game/PSP/GAME/YYYYZZZZZ/EBOOT.PBP (x bytes)...
>creating file ux0:pspemu/temp/game/PSP/GAME/YYYYZZZZZ/__sce_ebootpbp (x bytes)...
all done.
8) Download Trinity and copy the PBOOT.PBP file to game_dec/ux0_pspemu_temp_game_PSP_GAME_YYYYZZZZZ/PBOOT.PBP (the files EBOOT.PBP, __sce_ebootpbp and VITA_PATH.txt should exist in this folder). If PBOOT.PBP does already exist there, just overwrite it.
> https://github.com/TheOfficialFloW/Trinity/releases/download/v1.0/PBOOT.PBP
9) Now re-encrypt the backup similar to above by typing this in your command line/terminal:
> psvimg-create -n game -K YOUR_KEY game_dec game
If done correctly, you should see an output like this:
>adding files for ux0:pspemu/temp/game/PSP/GAME/YYYYZZZZZ
packing file ux0:pspemu/temp/game/PSP/GAME/YYYYZZZZZ/EBOOT.PBP (x bytes)...
packing file ux0:pspemu/temp/game/PSP/GAME/YYYYZZZZZ/PBOOT.PBP (x bytes)...
packing file ux0:pspemu/temp/game/PSP/GAME/YYYYZZZZZ/__sce_ebootpbp (x bytes)...
created game/game.psvimg (size: x, content size: x)
created game/game.psvmd
10) Remove the game_dec folder (and PSVimg tools if copied here) and
11) select Refresh database in qcma settings.
12) Now you need to copy back the modified backup to your PS Vita: Launch Content Manager on your PS Vita and connect it to your computer (if it's already open, just go back to the first menu), where you then need to select PC -> PS Vita System, and after that you select Applications. Finally select PSPโข/Other and click on the modified game.
๐ฆTrity Exploite Tool top 2019:Emulator Escape
>Trinity is the third public jailbreak for the PS Vitaโข, which supports the latest firmwares 3.69 and 3.70. The exploit chain consists of three stages: the MIPS Kernel Exploit, the PSP Emulator Escape and the ARM Kernel Exploit.
t.me/UndercOdeTesting
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) Download and install qcma and psvimgtools.
> https://codestation.github.io/qcma/
>https://github.com/yifanlu/psvimgtools/releases
2) Start qcma and within the qcma settings set the option Use this version for updates to FW 0.00 (Always up-to-date) to spoof the System Software check.
3) Launch Content Manager on your PS Vita and connect it to your computer, where you then need to select PS Vita System -> PC, and after that you select Applications. Finally select PSPโข/Other and click on the game that you want to turn into the Trinity exploit. If you see an error message about System Software, you should simply reboot your device to solve it (if this doesn't solve, then put your device into airplane mode and reboot). If this does still not work, then alternatively set DNS to 212.47.229.76 to block updates.
4) Transfer the game over to your computer by clicking on Copy on your PS Vita. After copying, you go to the folder /Documents/PS Vita/PGAME/xxxxxxxxxxxxxxxx/YYYYZZZZZ on your computer, where xxxxxxxxxxxxxxxx is some string corresponding to your account ID and YYYYZZZZZ is the title id of the game that you've just copied over. You can look at the image at YYYYZZZZZ/sce_sys/icon0.png to verify that it is indeed your chosen game. Furthermore, the YYYYZZZZZ folder should contain these folders: game, license and sce_sys.
5) Before you attempt to modify the backup, you should make a copy of it. Just copy YYYYZZZZZ somewhere else, such that if you fail to follow the instructions, you can copy it back and retry.
6) Insert the xxxxxxxxxxxxxxxx string here. If the AID is valid, it will yield a key that you can now use to decrypt/re-encrypt your game.
7) Decrypt the game backup by executing the following command in your command line/terminal (make sure you're in the right working directory. On Windows you can open the terminal in the current working directory by typing in cmd in the path bar of the file explorer. Also, if you haven't installed psvimgtools yet, then just place them in the YYYYZZZZZ folder):
> psvimg-extract -K YOUR_KEY game/game.psvimg game_dec
If done correctly, you should see an output like this:
> creating file ux0:pspemu/temp/game/PSP/GAME/YYYYZZZZZ/EBOOT.PBP (x bytes)...
>creating file ux0:pspemu/temp/game/PSP/GAME/YYYYZZZZZ/__sce_ebootpbp (x bytes)...
all done.
8) Download Trinity and copy the PBOOT.PBP file to game_dec/ux0_pspemu_temp_game_PSP_GAME_YYYYZZZZZ/PBOOT.PBP (the files EBOOT.PBP, __sce_ebootpbp and VITA_PATH.txt should exist in this folder). If PBOOT.PBP does already exist there, just overwrite it.
> https://github.com/TheOfficialFloW/Trinity/releases/download/v1.0/PBOOT.PBP
9) Now re-encrypt the backup similar to above by typing this in your command line/terminal:
> psvimg-create -n game -K YOUR_KEY game_dec game
If done correctly, you should see an output like this:
>adding files for ux0:pspemu/temp/game/PSP/GAME/YYYYZZZZZ
packing file ux0:pspemu/temp/game/PSP/GAME/YYYYZZZZZ/EBOOT.PBP (x bytes)...
packing file ux0:pspemu/temp/game/PSP/GAME/YYYYZZZZZ/PBOOT.PBP (x bytes)...
packing file ux0:pspemu/temp/game/PSP/GAME/YYYYZZZZZ/__sce_ebootpbp (x bytes)...
created game/game.psvimg (size: x, content size: x)
created game/game.psvmd
10) Remove the game_dec folder (and PSVimg tools if copied here) and
11) select Refresh database in qcma settings.
12) Now you need to copy back the modified backup to your PS Vita: Launch Content Manager on your PS Vita and connect it to your computer (if it's already open, just go back to the first menu), where you then need to select PC -> PS Vita System, and after that you select Applications. Finally select PSPโข/Other and click on the modified game.
13) In the livearea, the game should now have a different icon and should now be called Trinity (eventually you have to rebuild the database in recovery mode to make the bubble change its look). If not, please re-read the instructions more carefully and begin from fresh.
> Turn on Wi-Fi, then reboot your device and straightly launch Trinity. Do not do anything else, otherwise the exploit will be less reliable. It is very important that you do not have any running downloads in background.
15) Enjoy the exploitation process and wait until it launches the Construct. If the exploit fails, simply rerun Trinity.
16) Within the Construct, select Download VitaShell, then Install HENkaku and finally Exit.
Congratulations, your device is now able to run homebrews. It is highly suggested that you downgrade your device to either firmware 3.60 or 3.65/3.67/3.68 using modoru. On 3.60, you can use HENkaku and on 3.65/3.67/3.68 you can use h-encore. If you don't downgrade your device now, you may lose the ability to launch Trinity later and therefore not be able to hack your device anymore.
Written by UndercOde
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
> Turn on Wi-Fi, then reboot your device and straightly launch Trinity. Do not do anything else, otherwise the exploit will be less reliable. It is very important that you do not have any running downloads in background.
15) Enjoy the exploitation process and wait until it launches the Construct. If the exploit fails, simply rerun Trinity.
16) Within the Construct, select Download VitaShell, then Install HENkaku and finally Exit.
Congratulations, your device is now able to run homebrews. It is highly suggested that you downgrade your device to either firmware 3.60 or 3.65/3.67/3.68 using modoru. On 3.60, you can use HENkaku and on 3.65/3.67/3.68 you can use h-encore. If you don't downgrade your device now, you may lose the ability to launch Trinity later and therefore not be able to hack your device anymore.
Written by UndercOde
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆBest Cleaner for Linux /
BleachBit system cleaner for Windows and Linux
fb.com/UndercOdeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/bleachbit/bleachbit
2) make -C po local # build translations
3) python bleachbit.py
Then, review the preferences.
4) Then, select some options, and click Preview. Review the files, toggle options accordingly, and click Delete.
5) For information regarding the command line interface, run:
>python bleachbit.py --help
That! all
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆBest Cleaner for Linux /
BleachBit system cleaner for Windows and Linux
fb.com/UndercOdeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/bleachbit/bleachbit
2) make -C po local # build translations
3) python bleachbit.py
Then, review the preferences.
4) Then, select some options, and click Preview. Review the files, toggle options accordingly, and click Delete.
5) For information regarding the command line interface, run:
>python bleachbit.py --help
That! all
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHack any android the evil-droid :
t.me/UndercOdeTesting
๐ฆRequirements :
1 ) metasploit-framework
2 ) xterm
3 ) Zenity
4 ) Aapt
5 ) Apktool
6) Zipalign
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) Download the tool from github
> git clone https://github.com/M4sc3r4n0/Evil-Droid.git
2) Set script execution permission
> cd Evil-Droid
> chmod +x evil-droid
3) Run Evil-Droid Framework :
> ./evil-droid
choose option
๐ฆTested by UndercOde
> kali
>debian
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHack any android the evil-droid :
t.me/UndercOdeTesting
๐ฆRequirements :
1 ) metasploit-framework
2 ) xterm
3 ) Zenity
4 ) Aapt
5 ) Apktool
6) Zipalign
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) Download the tool from github
> git clone https://github.com/M4sc3r4n0/Evil-Droid.git
2) Set script execution permission
> cd Evil-Droid
> chmod +x evil-droid
3) Run Evil-Droid Framework :
> ./evil-droid
choose option
๐ฆTested by UndercOde
> kali
>debian
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow design your termux Like Your Desktop Windows ?
T.me/UndercOdeTesting
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) Open Termux and type :
pkg update && pkg upgrade && pkg install x11-repo && pkg install tigervnc openbox obconf xorg-xsetroot xcompmgr xterm polybar st zsh geany pcmanfm rofi feh neofetch htop vim elinks mutt git wget curl xfce4-settings
2) cd $HOME && git clone https://github.com/adi1090x/termux-desktop
3) Now go to the cloned directory termux-desktop and copy or move 'home' & 'usr' directories to /data/data/com.termux/files.
4) Now type:
>!cp -rf ./home /data/data/com.termux/files && cp -rf ./usr /data/data/com.termux/files
or
> mv -f ./home /data/data/com.termux/files && mv -f ./home /data/data/com.termux/files
5) Warning : I'm assuming you're doing this on a fresh termux install. If not so, please backup your files before running these command above. These commands will forcefully copy or move files in home & usr directory. So, before doing that, take a look inside the repo directories, and backup your existing config files (like .vimrc, .zshrc, .gitconfig, etc).
6) VNC Server Now, Let's configure the vnc server for graphical output. Run -
vncserver -localhost
At first time, you will be prompted for setting up passwords -
You will require a password to access your desktops.
7) Password:
Verify:
8) Would you like to enter a view-only password (y/n)? n
Note that passwords are not visible when you are typing them and maximal password length is 8 characters.
If everything is okay, you will see this message -
> New 'localhost:1 ()' desktop is localhost:1
9) Creating default startup script /data/data/com.termux/files/home/.vnc/xstartup
Creating default config /data/data/com.termux/files/home/.vnc/config
10) Starting applications specified in /data/data/com.termux/files/home/.vnc/xstartup
11) Log file is /data/data/com.termux/files/home/.vnc/localhost:1.log
It means that X (vnc) server is available on display 'localhost:1'.
12) Finally, to make programs do graphical output to the display 'localhost:1', set environment variable like shown here (yes, without specifying 'localhost'):
export DISPLAY=":1"
13) You may even put this variable to your bashrc or profile so you don't have to always set it manually unless display address will be changed.
Now You can start the vnc server by,
vncserver
14) And to stop the server, run -
vncserver -kill :1
VNC Client Now you need a vnc client app to connect to server. I'm using this Android VNC client: VNC Viewer (developed by RealVNC Limited). You can use TigerVNC if you're trying to connect to server by a computer (Windows or Linux).
15) Determine port number on which VNC server listens. It can be calculated like this: 5900 + {display number}. So for display 'localhost:1' the port will be 5901.
16) Now open the VNC Viewer application and create a new connection with the following information (assuming that VNC port is 5901) - EXAMPLE:
Address:
127.0.0.1:5901
Name:
Termux
Written by UndercOde
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow design your termux Like Your Desktop Windows ?
T.me/UndercOdeTesting
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) Open Termux and type :
pkg update && pkg upgrade && pkg install x11-repo && pkg install tigervnc openbox obconf xorg-xsetroot xcompmgr xterm polybar st zsh geany pcmanfm rofi feh neofetch htop vim elinks mutt git wget curl xfce4-settings
2) cd $HOME && git clone https://github.com/adi1090x/termux-desktop
3) Now go to the cloned directory termux-desktop and copy or move 'home' & 'usr' directories to /data/data/com.termux/files.
4) Now type:
>!cp -rf ./home /data/data/com.termux/files && cp -rf ./usr /data/data/com.termux/files
or
> mv -f ./home /data/data/com.termux/files && mv -f ./home /data/data/com.termux/files
5) Warning : I'm assuming you're doing this on a fresh termux install. If not so, please backup your files before running these command above. These commands will forcefully copy or move files in home & usr directory. So, before doing that, take a look inside the repo directories, and backup your existing config files (like .vimrc, .zshrc, .gitconfig, etc).
6) VNC Server Now, Let's configure the vnc server for graphical output. Run -
vncserver -localhost
At first time, you will be prompted for setting up passwords -
You will require a password to access your desktops.
7) Password:
Verify:
8) Would you like to enter a view-only password (y/n)? n
Note that passwords are not visible when you are typing them and maximal password length is 8 characters.
If everything is okay, you will see this message -
> New 'localhost:1 ()' desktop is localhost:1
9) Creating default startup script /data/data/com.termux/files/home/.vnc/xstartup
Creating default config /data/data/com.termux/files/home/.vnc/config
10) Starting applications specified in /data/data/com.termux/files/home/.vnc/xstartup
11) Log file is /data/data/com.termux/files/home/.vnc/localhost:1.log
It means that X (vnc) server is available on display 'localhost:1'.
12) Finally, to make programs do graphical output to the display 'localhost:1', set environment variable like shown here (yes, without specifying 'localhost'):
export DISPLAY=":1"
13) You may even put this variable to your bashrc or profile so you don't have to always set it manually unless display address will be changed.
Now You can start the vnc server by,
vncserver
14) And to stop the server, run -
vncserver -kill :1
VNC Client Now you need a vnc client app to connect to server. I'm using this Android VNC client: VNC Viewer (developed by RealVNC Limited). You can use TigerVNC if you're trying to connect to server by a computer (Windows or Linux).
15) Determine port number on which VNC server listens. It can be calculated like this: 5900 + {display number}. So for display 'localhost:1' the port will be 5901.
16) Now open the VNC Viewer application and create a new connection with the following information (assuming that VNC port is 5901) - EXAMPLE:
Address:
127.0.0.1:5901
Name:
Termux
Written by UndercOde
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ2020 Termux tool Zphisher is an upgraded form of Shellphish.
Fb.com/UndercOdeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) apt update
2) apt install git php openssh curl -y
3) git clone https://github.com/htr-tech/zphisher
4) cd zphisher
5) chmod +x zphisher.sh
6) bash zphisher.sh
๐ฆOr ; Use Single Command
> apt update && apt install git php curl openssh -y && git clone https://github.com/htr-tech/zphisher && cd zphisher && chmod +x zphisher.sh && bash zphisher.sh
๐ฆFeatures :
1) Latest Login Pages
2) New Instagram Auto Follower Page
3) All types of Erros Fixed
Written by UnderCode
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ2020 Termux tool Zphisher is an upgraded form of Shellphish.
Fb.com/UndercOdeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) apt update
2) apt install git php openssh curl -y
3) git clone https://github.com/htr-tech/zphisher
4) cd zphisher
5) chmod +x zphisher.sh
6) bash zphisher.sh
๐ฆOr ; Use Single Command
> apt update && apt install git php curl openssh -y && git clone https://github.com/htr-tech/zphisher && cd zphisher && chmod +x zphisher.sh && bash zphisher.sh
๐ฆFeatures :
1) Latest Login Pages
2) New Instagram Auto Follower Page
3) All types of Erros Fixed
Written by UnderCode
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆA new fun way to send virus to your victim from just link in termux
t.me/UnderCodeTesting
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) apt-get update -y
2) apt-get upgrade -y
3) pkg install python -y
4) pkg install python2 -y
5) pkg install git -y
6)pip install lolcat
7) git clone https://github.com/noob-hackers/Infect
8) ls
9) cd infect
10) ls
11) bash infect.sh
๐ฆHow it works ?
Infect :
1) From this option you will get link of virus in your termux just send that link to your victim and let the fun happen.
Save :
2) From this option you can repair damaged device of your victm from that virus by just installing this anti-virus in his device.
3)From this option you can update the infect script.
Exit :
4) From this option you can exit from infect tool
๐ฆTested by UndercOde on
Written by UndercOde
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆA new fun way to send virus to your victim from just link in termux
t.me/UnderCodeTesting
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) apt-get update -y
2) apt-get upgrade -y
3) pkg install python -y
4) pkg install python2 -y
5) pkg install git -y
6)pip install lolcat
7) git clone https://github.com/noob-hackers/Infect
8) ls
9) cd infect
10) ls
11) bash infect.sh
๐ฆHow it works ?
Infect :
1) From this option you will get link of virus in your termux just send that link to your victim and let the fun happen.
Save :
2) From this option you can repair damaged device of your victm from that virus by just installing this anti-virus in his device.
3)From this option you can update the infect script.
Exit :
4) From this option you can exit from infect tool
๐ฆTested by UndercOde on
Written by UndercOde
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ2020 Termux styling
> T Style is a tool to change Font & color Schemes of Termux App.
Instagram.com/UndercOdeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) apt update
2) apt install git -y
3) git clone https://github.com/htr-tech/tstyle
4) cd tstyle
5) bash setup.sh
> type tstyle to run this tool.
๐ฆ Or ; Use Single Command
apt update && apt install git -y && git clone https://github.com/htr-tech/tstyle && cd tstyle && bash setup.sh && tstyle
๐ฆFeatures :
> Latest Fonts & Themes !
>Full Offline
@UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ2020 Termux styling
> T Style is a tool to change Font & color Schemes of Termux App.
Instagram.com/UndercOdeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) apt update
2) apt install git -y
3) git clone https://github.com/htr-tech/tstyle
4) cd tstyle
5) bash setup.sh
> type tstyle to run this tool.
๐ฆ Or ; Use Single Command
apt update && apt install git -y && git clone https://github.com/htr-tech/tstyle && cd tstyle && bash setup.sh && tstyle
๐ฆFeatures :
> Latest Fonts & Themes !
>Full Offline
@UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆThe Dos Protection :
>How to protect the network from cyber attacks of the Wi-Fi Routers (new logo)?
t.me/UndercOdeTesting
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
> SPI (Stateful Packet Inspection) Firewall and DoS (Denial of Service) Protection protect the router from cyber attacks.
> The SPI Firewall can prevent cyber attacks and validate the traffic that is passing through the router based on the protocol. This function is enabled by default, and itโs recommended to keep the default settings.
>The DoS Protection can protect your home network against DoS attacks from flooding your network with server requests.
๐ฆ Follow the steps below to configure DoS Protection.
1) Log in to the web-based interface of the router
2) Go to Advanced > Security > Settings.
3) Enable DoS Protection.
4) Set the level (Off, Low, Middle or High) of protection for ICMP-FLOOD Attack Filtering, UDP-FlOOD Attack Filtering and TCP-SYN-FLOOD Attack Filtering.
โข ICMP-FLOOD Attack Filtering - Enable to prevent the ICMP (Internet Control Message Protocol) flood attack.
โข UDP-FlOOD Attack Filtering - Enable to prevent the UDP (User Datagram Protocol) flood attack.
โข TCP-SYN-FLOOD Attack Filtering - Enable to prevent the TCP-SYN (Transmission Control Protocol-Synchronize) flood attack
5) If you want to ignore the ping packets from the WAN port, select Ignore Ping Packet From WAN Port; if you want to ignore the ping packets form the LAN port, select Ignore Ping Packet From LAN Port.
6) Click Save.
That All !
@UndercodeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆThe Dos Protection :
>How to protect the network from cyber attacks of the Wi-Fi Routers (new logo)?
t.me/UndercOdeTesting
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
> SPI (Stateful Packet Inspection) Firewall and DoS (Denial of Service) Protection protect the router from cyber attacks.
> The SPI Firewall can prevent cyber attacks and validate the traffic that is passing through the router based on the protocol. This function is enabled by default, and itโs recommended to keep the default settings.
>The DoS Protection can protect your home network against DoS attacks from flooding your network with server requests.
๐ฆ Follow the steps below to configure DoS Protection.
1) Log in to the web-based interface of the router
2) Go to Advanced > Security > Settings.
3) Enable DoS Protection.
4) Set the level (Off, Low, Middle or High) of protection for ICMP-FLOOD Attack Filtering, UDP-FlOOD Attack Filtering and TCP-SYN-FLOOD Attack Filtering.
โข ICMP-FLOOD Attack Filtering - Enable to prevent the ICMP (Internet Control Message Protocol) flood attack.
โข UDP-FlOOD Attack Filtering - Enable to prevent the UDP (User Datagram Protocol) flood attack.
โข TCP-SYN-FLOOD Attack Filtering - Enable to prevent the TCP-SYN (Transmission Control Protocol-Synchronize) flood attack
5) If you want to ignore the ping packets from the WAN port, select Ignore Ping Packet From WAN Port; if you want to ignore the ping packets form the LAN port, select Ignore Ping Packet From LAN Port.
6) Click Save.
That All !
@UndercodeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow does DoS protection work?
Instagram.com/UndercOdeTestingCompany
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) A โdenial-of-serverโ attack is an explicit attempt to deny legitimate users from using a service or computer resource.
2) DoS/DDoS attempts to reach below three goals to make victim/system/server fail to provide service.
3) Make victim/system too busy to provide service
4) Occupy LAN bandwidth of victim/system
5) Occupy WAN bandwidth of victim/system
๐ฆEXAMPLE :
ASUS router uses following methods to detect suspicious attack.
1) SYN-Flooding Protection : Only allow one TCP/SYN packet to pass per second.
2) Port Scanner Protection : Protect router from port scanning via external port scan tool
3) Ping of Death : Only allow one ICMP packet(type 8) to pass per second or drop the length of ICMP packet over 65535.
4) Enable DoS protection feature can filter suspicious or unreasonable packets to prevent from flooding the network with large amounts of fake traffic.
@UndercodeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow does DoS protection work?
Instagram.com/UndercOdeTestingCompany
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) A โdenial-of-serverโ attack is an explicit attempt to deny legitimate users from using a service or computer resource.
2) DoS/DDoS attempts to reach below three goals to make victim/system/server fail to provide service.
3) Make victim/system too busy to provide service
4) Occupy LAN bandwidth of victim/system
5) Occupy WAN bandwidth of victim/system
๐ฆEXAMPLE :
ASUS router uses following methods to detect suspicious attack.
1) SYN-Flooding Protection : Only allow one TCP/SYN packet to pass per second.
2) Port Scanner Protection : Protect router from port scanning via external port scan tool
3) Ping of Death : Only allow one ICMP packet(type 8) to pass per second or drop the length of ICMP packet over 65535.
4) Enable DoS protection feature can filter suspicious or unreasonable packets to prevent from flooding the network with large amounts of fake traffic.
@UndercodeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow and what is Dos Attack ?
A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable
by overwhelming it with traffic from multiple sources. They target a wide variety of important resources from banks to news websites, and present a major challenge to making sure people can publish and access important information
t.me/UndercODEtESTING
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) git clone https://github.com/Ha3MrX/DDos-Attack
2) cd DDos-Attack
3) chmod +x ddos-attack.py
4) python ddos-attack.py
๐ฆWorks on :
>Kali
> Debian
> ubanto
> rooted Termux( major android versions)
@UndercodeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow and what is Dos Attack ?
A Distributed Denial of Service (DDoS) attack is an attempt to make an online service unavailable
by overwhelming it with traffic from multiple sources. They target a wide variety of important resources from banks to news websites, and present a major challenge to making sure people can publish and access important information
t.me/UndercODEtESTING
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) git clone https://github.com/Ha3MrX/DDos-Attack
2) cd DDos-Attack
3) chmod +x ddos-attack.py
4) python ddos-attack.py
๐ฆWorks on :
>Kali
> Debian
> ubanto
> rooted Termux( major android versions)
@UndercodeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Telegram
UNDERCODE TESTING COMPANY OFFICIAL
๐ฆ WELCOME TO UNDERCODE TESTING FOR LEARN HACKING & PROGRAMMING & MORE...
๐ ถ๐ ธ๐๐ ป๐ฐ๐ฑ
@UndercOdeTesting
๐๐พ๐๐๐๐ฑ๐ ด
@UnderCodeTestingCompany
๐ ต๐ฐ๐ ฒ๐ ด๐ฑ๐พ๐พ๐ บ
@UndercOdeTestingCompany
๐ ธ๐ ฝ๐๐๐ฐ๐ ถ๐๐ฐ๐ ผ
@UndercOdeTestingCompany
๐๐๐ ธ๐๐๐ ด๐
@UndercOdeTC
UNDERCODE.ORG
๐ ถ๐ ธ๐๐ ป๐ฐ๐ฑ
@UndercOdeTesting
๐๐พ๐๐๐๐ฑ๐ ด
@UnderCodeTestingCompany
๐ ต๐ฐ๐ ฒ๐ ด๐ฑ๐พ๐พ๐ บ
@UndercOdeTestingCompany
๐ ธ๐ ฝ๐๐๐ฐ๐ ถ๐๐ฐ๐ ผ
@UndercOdeTestingCompany
๐๐๐ ธ๐๐๐ ด๐
@UndercOdeTC
UNDERCODE.ORG
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆWindows All DoS Commands :
instagram.com/UndercOdeTestingCompany
help
List commands (only in DOS versions 5 or later).
help command See help for the DOS command.
command /?
List switches for the DOS command.
path=c:\windows ; c:\dos
Specify in which directories DOS searches for commands or programs.
prompt $p$g
Make the DOS prompt display the current directory.
dir
List files in the current directory in one column.
dir /w List files in five columns.
dir /p
List files one page at a time.
dir *.ext
List all files with an .ext extension.
dir z???.ext
List files with .ext extensions that have four letters and start with z (where
z is a character of your choice).
dir file.ext /s
Search for the file.ext in the current directory and all subdirectories under the current directory; most useful if the current directory is the root (i.e., C:\).
type file.ext
View the contents of the text file file.ext.
edit file.ext
Use the DOS editor to edit the file file.ext.
a: Change to the a: drive.
md c:\diry
Make a new subdirectory named diry in the c:\ directory.
cd c:\diry Change to subdirectory diry.
rd c:\diry
Remove the existing subdirectory named diry.
del file.ext Delete a file named file.ext.
ren file1 file2 Rename file file1 to file2.
copy file1 file2 Copy file file1 to file2.
verify on
Turn on verification of copy commands.
verify off
Turn off verification of copy commands.
xcopy diry1 diry2 /s
Copy all files and subdirectories in directory diry1 to diry2.
xcopy diry1 diry2 /p
Ask for confirmation of each file before copying it from diry1 to diry2.
diskcopy a: b:
Duplicate a disk using two floppy drives.
diskcopy a: a:
Duplicate a disk using the same floppy drive.
format a: Format a disk in drive a: .
format a: /s
Format a bootable disk (include system files).
backup c:\diry\*.ext a:
Back up all files with the extension .ext in c:\diry\ to drive a: .
backup c:\ a: /s
Back up the entire c: drive to drive a:.
restore a:\ c:\diry\*.ext
Restore backed-up files with the extension .ext in drive a: to the c:\diry\ directory.
restore a: c:\ /s
Restore backed-up files and subdirectories from drive a: to c:\.
ver Check the version of DOS.
time
Check or correct the system time.
date
Check or correct the system date.
cls Clear the screen.
scandisk
Scan and check drive c: for errors. ScanDisk replaces chkdsk (see below) on DOS version 6.0 and above (including Windows 95).
chkdsk
Check disk and memory usage of the current disk.
chkdsk /f
Fix errors reported by chkdsk.
chkdsk file.ext Check a particular file.
chkdsk a:
Check a particular drive (in this case, a floppy in the a: drive).
mem Check memory usage.
@ Steave
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆWindows All DoS Commands :
instagram.com/UndercOdeTestingCompany
help
List commands (only in DOS versions 5 or later).
help command See help for the DOS command.
command /?
List switches for the DOS command.
path=c:\windows ; c:\dos
Specify in which directories DOS searches for commands or programs.
prompt $p$g
Make the DOS prompt display the current directory.
dir
List files in the current directory in one column.
dir /w List files in five columns.
dir /p
List files one page at a time.
dir *.ext
List all files with an .ext extension.
dir z???.ext
List files with .ext extensions that have four letters and start with z (where
z is a character of your choice).
dir file.ext /s
Search for the file.ext in the current directory and all subdirectories under the current directory; most useful if the current directory is the root (i.e., C:\).
type file.ext
View the contents of the text file file.ext.
edit file.ext
Use the DOS editor to edit the file file.ext.
a: Change to the a: drive.
md c:\diry
Make a new subdirectory named diry in the c:\ directory.
cd c:\diry Change to subdirectory diry.
rd c:\diry
Remove the existing subdirectory named diry.
del file.ext Delete a file named file.ext.
ren file1 file2 Rename file file1 to file2.
copy file1 file2 Copy file file1 to file2.
verify on
Turn on verification of copy commands.
verify off
Turn off verification of copy commands.
xcopy diry1 diry2 /s
Copy all files and subdirectories in directory diry1 to diry2.
xcopy diry1 diry2 /p
Ask for confirmation of each file before copying it from diry1 to diry2.
diskcopy a: b:
Duplicate a disk using two floppy drives.
diskcopy a: a:
Duplicate a disk using the same floppy drive.
format a: Format a disk in drive a: .
format a: /s
Format a bootable disk (include system files).
backup c:\diry\*.ext a:
Back up all files with the extension .ext in c:\diry\ to drive a: .
backup c:\ a: /s
Back up the entire c: drive to drive a:.
restore a:\ c:\diry\*.ext
Restore backed-up files with the extension .ext in drive a: to the c:\diry\ directory.
restore a: c:\ /s
Restore backed-up files and subdirectories from drive a: to c:\.
ver Check the version of DOS.
time
Check or correct the system time.
date
Check or correct the system date.
cls Clear the screen.
scandisk
Scan and check drive c: for errors. ScanDisk replaces chkdsk (see below) on DOS version 6.0 and above (including Windows 95).
chkdsk
Check disk and memory usage of the current disk.
chkdsk /f
Fix errors reported by chkdsk.
chkdsk file.ext Check a particular file.
chkdsk a:
Check a particular drive (in this case, a floppy in the a: drive).
mem Check memory usage.
@ Steave
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ