UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 updated telegram group scraper tool. fetch all information about group members
fb.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) pkg install -y git python

2) $ git clone https://github.com/th3unkn0n/TeleGram-Scraper.git

3) $ cd TeleGram-Scraper

πŸ¦‘ Install requierments

1) $ python3 setup.py -i

2) setup configration file ( apiID, apiHASH )
$ python3 setup.py -c

πŸ¦‘ To Genrate User Data

1) $ python3 scraper.py

( members.csv is default if you changed name use it )

2) Send Bulk sms To Collected Data
$ python3 smsbot.py members.csv

3) Update Tool
$ python3 setup.py -u

πŸ¦‘Tested by Undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Shell programming example-a simple directory menu
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

> until
echo List Directory..........1
echo Change Directory........2
echo Edit File...............3
echo Remove File.............4
echo Exit Menu...............5

read choice
test $choice = 5
do
case $choice in

1) ls;;

2) echo Enter target directory
read dir
cd $dir
;;

3) echo Enter file name
read file
vi $file
;;

4) echo Enter file name
read file
rm $file
;;
q|Q|5) echo Goodbye;;
*) echo illegal Option
esac

Written by Undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ Tested SCRIBD BINS :
530795x6xxx34xx0
FECHA: RND
CVV:RND
IP: USA
use for learn not for steal
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ 2020 best twitter bots :
twitter.com/undercodeNews :

1) @HundredZeros
Amazon has probably the biggest collection of eBooks. But if you’re looking for some really good eBooks, they’ll probably be paid, right? Not really, at least according to HundredZeros, which is a Twitterbot that regularly tweets links to the eBooks that are free on Amazon. This is a good example of a Twitter Bot which helps its followers. If you are an avid book reader, this is going to be one of the best Twitter Bots that you can follow.

2) @DearAssistant
Virtual assistants like Cortana, Siri, and Google Assistant Now are super cool in our smartphones, but if you want some of that help on Twitter? No problem, as DearAssistant is there to help. Ask just about any question, and it will tweet a pretty detailed response quickly. You can ask queries like distance between two places, definition of specific terms, and things like that.

3)@WhatTheFare
Uber has revolutionized the way we book rides for commuting between different places. And if you quickly want to find out the Uber fare between two points, simply send a tweet to WhatTheFare, and the Twitterbot will tweet back with the estimated Uber fare between the specified pick-up and drop-off locations. All Uber cities are supported.

4) @wayback_exe
Ever wanted to know what came before the fancy websites and ultra-modern web browsers of the present? You need to follow wayback_exe, which is an amazing Twitterbot that generates screenshots of old websites in old browsers, and tweets them every two hours. It utilizes data from the Wayback Machine digital archive to do so.


5) @dscovr_epic
Although the entire space is incredibly amazing and beautiful, our Earth can be considered special, for its our true home. And what better way to start (or end) the day, than seeing that home from space? Follow the dscovr_epic bot, which tweets random images of the Earth, as captured by NASA’s DSCOVR satellite, complete with the time and location over which they are taken. The images are breathtaking. This is one of my most favorite Twitter Bots.

6) @MagicRealismBot
Magic realism argues the acceptance of magic, as well as its importance in the real world. And if that’s something you find quite funny, you are going to have a fun time reading the tweets made by the MagicRealismBot, which takes random practices or tasks, and over exaggerates them with some sort of magic. It might not seem that way, but it’s really funny.

7) @MuseumBot
Who doesn’t like museums? They are fascinating places, depicting the amazing relics of our past, encompassing everything from art to history. This is why the MuseumBot is one Twitterbot that’s absolutely worth following. It tweets a random, high-resolution image from the Metropolitan Museum of Art, four times a day.

8) @TwoHeadlines
Headlines are essential for keeping ourselves updated with the latest happenings around the world. But what happens when you take two completely unrelated headlines, and randomly mash them together? To find out, simply follow TwoHeadlines, which mixes headlines about two different topics and tweets the result. You’ll have a hard time keeping yourself from bursting with laughter.

9) @pentametron
If you have a fascination with poetry, especially the works of the great William Shakespeare, pentametron is a no brainer. While the Twitterbot does not exactly post tweets, it searches tweets that have been written using the Iambic pentameter metric line, and then re-tweets them one after the another. Sounds confusing? Well if you understand poetry and the nuances of English, it’s amazing.
> Best twitter bots


10) @EarthquakeBot
Earthquakes happen all around the world, and cause major destruction to life and property. And while natural disasters are beyond anyone’s control, knowing about them in a timely manner can help. The EarthquakeBot is programmed to tweet any earthquakes that measure 5.0 or more on the Richter Scale, as they happen. Extremely useful, but this is one bot we’d want to stay as inactive as possible.

11) @_grammar_
Don’t know about you guys, but as a self-proclaimed Grammar Nazi, this is my favorite Twitterbot. And if the name Grammar Police isn’t still doesn’t explain everything, _grammar_ detects tweets that have improper usage of grammar, and then posts solutions. This one is a must for today’s social network addicted generation.

12) @MoMARobot
MoMA Bot is one of my favorite Twitter Bots on this list. If you are someone who is interested in modern art, you will appreciate this bot. The bot basically tweets a random object from the collection of the Museum of Modern Art four times a day. The best part is that the tweet comes with the link of the object on the Museum of Modern Art’s website, allowing you to check further information on the objects if you want to.

13) @netflix_bot
Want to keep yourself updated with the latest and greatest stuff coming up on Netflix? Follow netflix_bot, which tweets new releases on Netflix Instant as they happen. Perfect for all your binge watching needs.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Android Android crack reverse analysis SO commonly used IDA analysis skills by UNDERCODE :
fb.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Creation and import of structure, structure pointer, etc.
Take JniNativeInterface, DexHeader as an example.
The function of parsing Dex is as follows:

After F5:

File-> load file-> parser c header file, import Dex.h
In the picture above, right-click a1, turn it into a structure, and select dexheader.


2)Adjust the number of parameters in the function pointer, indefinite parameters, etc.
Take __android_log_print as an example, select this function.

Edit-> operand type-> set operand type, modify the parameters as follows:
int (__cdecl *) (int, char *, char *, char *, int *, int *), after F5 refresh, the effect is as follows:



3) Conversion of thumb / arm mode
Shortcut key ALT + G, where 0x01 is THUMB and 0x00 is ARM mode. Generally 4 bytes ARM mode, two bytes are THUMB mode, such as:


4) The function is mistaken for a chunk, resulting in multiple entries for the caller function.
Taking Java_by_Ericky_crackme01_JNI_EatRice as an example, you can see that there are two entrances.


The end position of the first entry is the BX jump instruction. It should be allowed to jump to the second entry to be correct .

All must first remove function tail,
Select, at the end, and then edit-> functions-> remove function tail, the effect:

Then change the jump instruction BL to Call, edit-> others-> force bl call, the effect


5) C ++ RTTI, class name recognition.
JNI_OnLoad

sub_A558 is the constructor.


You can get this function named 9ArtLoader,


6) Create a function and set the end address of the function.
F5, the effect is as follows:

Solution, press P, then F5. If P has no effect, you can select it and then press P.

7) Elf repair, memory dump the so and other files, and then modify the base address of the dump, File-> LoadFile-> binary file .
The dump command is:
dd if = / proc / 1935 / mem of = / sdcard / alimsc4 skip = 1578049536 ibs = 1 count = 3993600

8) Data replication and patch.
Select the data, then edit-> export data, then

9) Script, idc, IDAPython
http://magiclantern.wikia.com/wiki/IDAPython/intro
http://drops.wooyun.org/tips/11849
http://drops.wooyun.org/tips/12060

10) lsof view deleted files, cat gets deleted files from memory
root @ android: / # lsof | busybox grep com.sxiaoao.car3d3
system_se 523 system 298 /data/app/com.sxiaoao.car3d3-2.apk
com.sxiao 10370 u0_a65 44 /data/data/com.sxiaoao.car3d3/files/app_sdk103700_.jar (deleted)
com.sxiao 10370 u0_a65 48 /data/app/com.sxiaoao.car3d3-2.apk
com.sxiao 10370 u0_a65 49 /data/app/com.sxiaoao.car3d3-2.apk

10370 is the process number 44 is the fd of the open file. The fd file is mapped in / prop / pid / fd
Copy the file with the cat command
1 | root @ android: / # cat / proc / 10370 / fd / 44> /data/local/tmp/test.jar

11) arm instruction simulator

Written by Undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘New Android packing and cracking-statically modify so, commonly used cracking methods last tutorial by undercode PART 1
instagram.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Tool introduction
IDA6.5, for static analysis of so files

010 Editor, modify the hexadecimal code of the so file

Android Killer Android decompilation tool

2) Modify SO
The project is the key code of Android jni. You can use AndroidKiller to open the app, find the corresponding so library, and get the package name of the current program.

cn.com.location.hshelldemo

> Source code:

Java_cn_com_location_hshelldemo_MainActivity_stringFromJNI(
JNIEnv *env,
jobject /* this */) {
std::string hello = "Hello from C++";
int ret = getAuthInfo(10000);

if(ret == RET_OK)
{
LOGE(" !!!Check successfully\n");
} else
{

LOGE(" !!!Check failed\n");
}

if(ret != RET_OK)
{
LOGE(" =====Check successfully\n");
}
else
{

LOGE(" =====Check failed\n");
}
return env->NewStringUTF(hello.c_str());
}
so Use IDA to open, and then enter options | General;

3) Just click the function on the left and press Ctrl + F to enter java. Here is to find the jni interface;

πŸ¦‘Example :

1) Click to find the interface, double-click to see the assembly source code, press F5 to find the C code (C is very important, not much understand assembly, C basically still learn):

2) jstring __fastcall Java_cn_com_location_hshelldemo_MainActivity_stringFromJNI(JNIEnv *env, jobject a2)
{
unsigned __int8 *bytes; // ST0C_4
jstring result; // r0
_jstring *v4; // [sp+8h] [bp-78h]
int v5; // [sp+58h] [bp-28h]
_JNIEnv *v6; // [sp+68h] [bp-18h]
std::allocator<char> v7; // [sp+6Ch] [bp-14h]
std::basic_string<char,std::char_traits<char>,std::allocator<char> > v8; // [sp+70h] [bp-10h]
int v9; // [sp+74h] [bp-Ch]

v6 = env;
std::allocator<char>::allocator(&v7);
std::string::string(&v8, "Hello from C++", &v7);
std::allocator<char>::~allocator(&v7);
v5 = getAuthInfo(10000);
if ( v5 == 10000 )
_android_log_print(6, "native-lib-jni", " !!!Check successfully\n");
else
_android_log_print(6, "native-lib-jni", " !!!Check failed\n");
if ( v5 != 10000 )
_android_log_print(6, "native-lib-jni", " =====Check failed\n");
else
_android_log_print(6, "native-lib-jni", " =====Check successfully\n");
bytes = (unsigned __int8 *)std::string::c_str(&v8);
v4 = _JNIEnv::NewStringUTF(v6, bytes);
std::string::~string(&v8);
result = (jstring)_stack_chk_guard;
if ( _stack_chk_guard == v9 )
result = v4;
return result;
}

3)) It can be seen that it is basically the same as the source code above, so now many algorithm libraries must be packed, otherwise it is easy to be cracked;

What we want to do is actually reverse if (v5 == 10000), so that we can succeed;

4) Here is the key code:

loc_4346
11 98 LDR R0, [SP,#0x80+var_3C]
16 90 STR R0, [SP,#0x80+var_28]
16 99 LDR R1, [SP,#0x80+var_28]
42 F2 10 72 MOVW R2, #0x2710
91 42 CMP R1, R2
1C D1 BNE loc_438E

5) > BNE means that if R1 and R2 are not equal, the CMP comparison instruction on the previous line jumps to loc_438E, and the output will fail. Of course, if the values are not equal after normal operation.

6)It can be seen that the hexadecimal machine code corresponding to the jump instruction B is E7. What we have to do now is to change the instruction at 4350 to B loc_4356, which means to jump directly to the normal place without judging the CMP instruction on the previous line.

Use the 010 Editor to modify the so

> part 1 done

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ part 2 : New Android packing and cracking-statically modify so, commonly used cracking methods last tutorial by undercode
> http://fb.com/undercodeTesting

1) Modify the jump address
The HEX machine code corresponding to the BNE jump instruction is D1, the hexadecimal machine code corresponding to B is E7 , and the B unconditional jump instruction

Change D1 to E7

> Save and re-run the project, successfully.

In fact, you can also drag the modified so into IDA to see it, and go directly to where we think;

2) Modify the instruction
About, instruction:

BNE, BEQ;

The BNE instruction is a conditional jump, that is: "unequal (or not 0) jump instruction". If it is not 0, jump to the address specified later.

The BEQ function is just the opposite of BNE.

We can also modify BNE to BEQ, here may need a software to convert machine code; ARM_ASM Converter

3) Change the comparison value
In the third way, we can also modify the compared values such as:

# 0x2710

42 F2 10 72 MOVW R2, # 0x2710

This is similar to 8086 assembly, in that the hexadecimal and assembly codes are generally reversed. We make a correct reversal: 27 10. We can change to

42 F2 10 72-》 42 F2 11 72

The instruction becomes:

MOVW R2, # 0x2711

It can be changed to the value we want, here is hexadecimal;

Recently used Android killer to repackage the so file;
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ SUMMARY :Of new cracking apk process for beginers :by undercode
t.me/undercodeTesting

1) What goal do we want to achieve?
When we reverse the APK, now it is generally necessary to modify the so, but IDA modify the assembly code. Unlike OD, you can directly modify the assembly instruction. You must modify the hexadecimal through WINHEX. We only know that 00 means the code is cleared, and 90 means the NOP instruction, that is, the empty instruction. But just deleting a line of code like this is definitely not enough. We need to modify it a bit deeper.


2) Intel8086 and ARM basic knowledge
Intel8086 is a 16-bit processor of Intel Corporation, ARM is a 32-bit processor of ARM Corporation. Each processor corresponds to its own set of assembly language, so the two processors correspond to 8086 assembly and ARM assembly, respectively. Due to the number of bits in the processor, the machine code of the 8086 assembly instruction is 16 bits, while the machine code of the ARM assembly instruction is 32 bits. The machine code can be regarded as a binary instruction. In fact, the so-called HEX is called a hexadecimal operation code or a hexadecimal machine code. It is also a binary instruction. It just displays the binary value in hexadecimal.


3)
ARM assembly is very important . In my opinion, ARM assembly can do much more than 8086 assembly. If you know ARM, you will get mainstream embedded development, then hardware programming, and then robot or machine manufacturing. Therefore, ARM is re2ally very important. I hope to study it seriously, not only the ARM instruction set, but also the principle of ARM machine code, and the decompilation of ELF files under objdump in Linux. The following can only be explained briefly.


4) The
ARM machine code briefly explains the ARM machine code is 32 bits, we take the jump instructions BL and BEQ as an example to explain. In fact, we only need to pay attention to the highest 8 bits, which is 24-31. First of all, what are the differences between the four numbers 28-31 and the different conditions? Then in the four bits of 27-24, both BL and BEQ are 1010. So the binary of BL instruction is 11101010, which is hexadecimal EA; the hexadecimal of the same BEQ is 0A.


5) Situation in SO
When we put the assembly language in SO into the tool to convert it to HEX, we will find that it is sometimes completely different from HEX in IDA. This is because IDA sometimes decompiles SO instead of ARM, but 16-bit. ARM, which is the Thumb instruction, but sometimes it is an ARM 32-bit instruction.

6) Modify the assembly jump instruction.
This situation is generally Thumb instruction. Generally speaking, one line of code corresponds to 2 HEX codes.
Example: The bne instruction is modified to beq instruction.
Through the tool, we find that the HEX machine code corresponding to the bne jump instruction is D1, and the HEX machine code corresponding to beq is D0, and then modified with WINHEX, and then detected with IDA.


7) Modify the data in
this case is generally an ARM instruction, generally speaking, a line of code corresponds to 4 HEX codes.
Examples: modified human small yellow Run Coin initialized
so inside the original ARM code: mov R1, # 0x49C8
maximum 0XFFFF changed, i.e. 65535, of the modified code should be: mov R1, # 0xFFFF
original code corresponding HEX: C8 19 04 E3, why is it like this, this is similar to 8086 assembly, that is, the hexadecimal and assembly code are generally reversed. The final E3 is the MOV assembly instruction. We make a correct reversal: E3 01 49 C8. Understand now! So, we changed to FF 1F 0F E3.
8) Modify the string
This situation is relatively simple, the string is a string, and the HEX code to modify the string is to use the ASCII to HEX tool. We can compare the two so to see. Of course, the easiest way to modify is to use WINHEX to directly modify the string on the right. In fact, this is the same as modifying the text. Notepad and notepad are fine. Mobile phone's MT, HEXEDITOR, hex editor, etc. can also modify the string of SO, it is recommended to use the ADK editor of Mo Xiaokeng Brothers.


WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Avast license key provides the two things you desire in a complimentary Anti-Virus program: a light system effect and also a significant degree of security - non-tested by undercode :


ID License keys

1) avast free antivirus license key V0339D-DFKOEKOEK

2) avast premier license key JFDIEIJDO-ERKODFKO

3) avast offline registration :

DFJIEJCXJI-DFOEKDLE

πŸ¦‘Avast Free Antivirus 2019 Serial Key Valid Until December 2040
Below is the free serial key which you can use for personal purposes. Simply copy it to the clipboard using CTRL + C and insert it into your Avast.

1) XHZ8FT-JUAKMJ-4KL496
If you are using Avast version 7 or older please use the following universal key.

2) W11332244H9900A0420-8MRTR8W5

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Powerfull and fast DDos-Attack Is A Python script online Attack termux :
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

git clone https://github.com/Ha3MrX/DDos-Attack

cd DDos-Attack

chmod +x ddos-attack.py

python ddos-attack.py
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ 2020 Free advanced and modern Windows botnet with a nice and secure PHP panel:
instagram.com/undercodeTesting

πŸ¦‘ FEATURES :

pload File
DDOS Attack [ TCP,UDP,ARME,Slowloris, HTTPGet, POSTHttp, Bandwidth Flood ]
Start DDOS
Stop DDOS
Open Webpage
Visible
Hidden
Show MessageBox
Take Screenshot
Steal Firefox Cookies
Steal Saved Passwords
Keylogger
Execute Scripts
Computer Operations
Restart
Shutdown
Logout
Bitcoint Wallet Stealer
Uninstall Client
Move Client
Blacklist Client
Update Client
Close Client

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) git clone https://github.com/BlackHacker511/BlackNET

2) cd BlackNet

3) compress BlackNET panel folder and upload it to your hosting

4) Create a database with any name you want

5) Change the data in classes/Database.php

6) Change files and folders permission to 777 [ Uploads Folder, Scripts Folder ]

7) Go to install.php to create the botnet tables automatically

> use for learn only

@undercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to use the Pi-Hole Information OLED Display with Raspberry Pi :
instagram.com/undercodeTesting

πŸ¦‘OLED Information Display: Hardware Installation
The list of necessary equipment is the most basic:

Raspberry Pi (any model, ideal with an Ethernet port)
SD card (8GB or more; with 4GB will also work)
Power Supply
Network Connection:
Ethernet cable
or built-in WiFi
or USB WiFi adapter
Monitor (optional)
Keyboard (optional)
Case for Pi (optional)

πŸ¦‘To install the information display you will need:

OLED display with I2C [ eBay ] [ AliExpress ]
Non-Locking Switch [ eBay ] [ AliExpress ]
Connection cables for connecting the display to the GPIO leg
LED and resistor (optional)
Display frame or mount (optional)

πŸ¦‘ Install and configure Pi-Hole
1) Installing a Pi-Hole is a fairly simple process. We will not even describe the whole procedure here. Instead, we briefly outline what we have done. Depending on your preference, you can use SSH or a keyboard with a monitor for installation.

2) Create a new Raspbian SD card with an image of Raspbian Lite and Etcher

3) To enable SSH, add an empty text file called β€œssh” to the boot section

4)Turn on your Pi with a new SD card

5) Change the default password to your

6)Run β€œsudo update”, then β€œsudo upgrade”

7)Get the IP address of Pi in any of the following ways:
run ifconfig on Pi

8)find it in the router settings
use a network scanner
(optional) configure your router so that it always assigns the same IP address to your Raspberry Pi

9)Follow one of the installation instructions :

>git clone --depth 1 https://github.com/pi-hole/pi-hole.git Pi-hole

>cd "Pi-hole/automated install/"

>sudo bash basic-install.sh

E N J O Y
WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Fast Windows hacking 2020 : Exploits :
instagram.com/undercodeTesting

πŸ¦‘Lastest Exploits :

1) BloodHound : Six Degrees of Domain Admin
> https://github.com/adaptivethreat/BloodHound

2) Empire : Empire is a PowerShell and Python post-exploitation agent
> https://github.com/adaptivethreat/Empire

3) Generate-Macro : Powershell script will generate a malicious Microsoft
> https://github.com/enigma0x3/Invoke-AltDSBackdoor

4) Office document with a specified payload and persistence method
> https://github.com/enigma0x3/Old-Powershell-payload-Excel-Delivery

5) Invoke-AltDSBackdoor : This script will obtain persistence on a
Windows 7+ machine under both Standard and Administrative accounts by using two Alternate Data Streams
> https://github.com/gfoss/PSRecon

6) Old-Powershell-payload-Excel-Delivery : This version touches disk for registry persistence
> https://github.com/FuzzySecurity/PowerShell-Suite

7) PSRecon : PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted data, hashes PowerShell and various system properties, and sends the data off to the security team
> https://github.com/gfoss/PSRecon

8) PowerShell-Suite : Some useful scripts in powershell
> https://github.com/FuzzySecurity/PowerShell-Suite

9) PowerSploit : A PowerShell Post-Exploitation Framework
> https://github.com/PowerShellMafia/PowerSploit

10) PowerTools : A collection of PowerShell projects with a focus on offensive operations
> https://github.com/PowerShellMafia/PowerSploit

11) Powershell-C2 : A PowerShell script to maintain persistance on a Windows machine
> https://github.com/enigma0x3/Powershell-C2

12) Powershell-Payload-Excel-Delivery : Uses Invoke-Shellcode to execute a payload and persist on the system
> https://github.com/enigma0x3/Powershell-Payload-Excel-Delivery

13) mimikittenz : A post-exploitation powershell tool for extracting juicy info from memory.
> https://github.com/putterpanda/mimikittenz

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁