UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.9K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ BEST FREE 2020 VIRTUAL NUMBERS SERVICES 2020-2019 :FOR SOCIAL APPS:
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) https://www.2ndline.co/

2) https://www.numeroesim.com/

3) https://www.openphone.co/

4) https://talkroute.com/mobile-apps-ios-android/

5) https://www.vonage.com/personal/vonage-mobile-app?

6) https://sonetel.com/en/

7) https://www.virtualphone.com/

8) https://www.worldsim.com/virtual-phone-number?___store=usa

9) http://www.telosapp.com/

10) https://www.cloudsimapp.com/

11) https://www.line2.com/

12) https://www.burnerapp.com/

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ NEW TESTED 27 NORDVPN
t.me/undercodeTesting



zeke.fishelll@gmail.com:1234anakin
antonio.bardawil@gmail.com:tama4884
ashley.j.mantell@gmail.com:Samantha88
austinjones.71.aj@gmail.com:Austin71
bigheff83@yahoo.com:cards4ever
blakerobb15@gmail.com:Cornhusker15
browntracy72@gmail.com:Buchanan72
cracknmeup111@yahoo.com:Tron1234
daisybest93@gmail.com:auditt180
david.pietrangelo@gmail.com:Hoboken1
hannahmarymarshall@yahoo.com:breakfast
jarrett.tmnt@gmail.com:spiderman0
jkenley28@gmail.com:secret28
junjunco1997@hotmail.com:Junjun01
kahnatic@gmail.com:12221987
kristiangaskell@gmail.com:Preston1
mandeepjheeta76@gmail.com:Mandeep123
miller.ricka@gmail.com:Silverado01
mquacine@gmail.com:cancer08
obgulma@gmail.com:january15
r.walton94@gmail.com:everlasting1
samschuleman@yahoo.com:emailme11
sbarcal23@gmail.com:shawnb23
zakytp@gmail.com:fable222
aperez7555@gmail.com:a8535129
boehle.karl@gmail.com:jamestkirk
cleininger2@yahoo.com:marley11

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Crack the Pattern Lock on Android devices android 4>5 V
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) the pattern lock is the SHA1 hash sequence of digits (0-8) with length from 3 (4 since Android 2.3.3) to 8.

2) Since Android does not allows the pattern to repeat "balls" and it does not use a salt when computing the SHA1 hash, it really takes a very short period of time to crack the hash and get the pattern.

3) The gesture board is a 3x3 matrix, and can be repressented as follows (each digit represents a "ball"):

-------------------
| 0 | | 1 | | 2 |
-------------------
| 3 | | 4 | | 5 |
-------------------
| 6 | | 7 | | 8 |
-------------------

4) So if you set the pattern lock to 0 -> 1 -> 2 -> 5 -> 4, the SHA1 hash will be output of SHA1("\x00\x01\x02\x05\x04"), and that is the hash to be cracked by this tool.

πŸ¦‘ Where can I find the hash?

> The hash is stored at "/data/system/gesture.key", and (From a rooted device) can be downloaded as follows:

~$ android-sdk-linux/platform-tools/adb pull /data/system/gesture.key
0 KB/s (20 bytes in 0.071s)
~$ ls -l gesture.key
-rw-r--r-- 1 sch3m4 sch3m4 20 ago 21 15:21 gesture.key
~$

πŸ¦‘ How does this tool works?
Let's see a basic output:

1) git clone https://github.com/sch3m4/androidpatternlock

2) cd androidpatternlock

3) python aplc.py

4) Taken from: http://forensics.spreitzenbarth.de/2012/02/28/cracking-the-pattern-lock-on-android/

[+] Usage: aplc.py /path/to/gesture.key

4) And now the output with a given gesture.key:

~$ python aplc.py gesture.sample.key

5) Taken from: http://forensics.spreitzenbarth.de/2012/02/28/cracking-the-pattern-lock-on-android/

> The pattern has been FOUND!!! => 210345876

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Network filtering-About linux + iptables + ADSL to do NAT tutorial by Undercode
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

11) eth0 Intel82558 IP: 192.168.0.1/24 (internal gateway)
eth1 3COM-3C905C (with ADSL)

rc.local configuration
modprobe ip_tables
modprobe ip_nat_ftp
# for IP masquerading
iptables -t nat -A POSTROUTING -o ppp0 -j MASQUERADE

2) in / etc / sysconfig /
FORWARD_IPV4 = YES has been added to the network.

3) ADSL configuration is completed. The dial-up can ping the external address. The internal computer can ping the gateway 192.168.0.1
but the ping cannot reach the external address, nor the point-to-point (ppp0) address. , The following is to run
netstat -r

4) Destination Gateway Genmask Flags MSS Window irtt Iface
218.20.189.1 * 255.255.255.255 UH 40 0 ​​0 ppp0
192.168.0.0 * 255.255.255.0 U 40 0 ​​0 eth0
10.10.40.0 * 255.255.255.0 U 40 0 ​​0 eth1
127.0.0.0 * 255.0.0.0 U 40 0 ​​0 lo
default 218.20 .189.1 0.0.0.0 UG 40 0 ​​0 ppp0

5) [root @ linuxnat /] # iptables -L
Chain INPUT (policy ACCEPT)
target prot opt ​​source destination

Chain FORWARD (policy ACCEPT)
target prot opt ​​source destination

Chain OUTPUT (policy ACCEPT)
target prot Opt source destination

πŸ¦‘ does not know that there is a problem, do you want to compile the ker nel?


1) Your iptables doesn't even have a NAT rule. How can you get out?

iptables -A INPUT -s 192.168.0.0/24 -j ACCEPT
iptables -t nat -A POSTROUTING -o ppp0 -j MASQUERADE
execute these two commands to see how!


2) the version is cooked, and others have already added it. The first rule you wrote shows that you are not familiar with iptables at all. You misunderstood. Why did n’t I write a script for him to use? ? Can support dial-up
so

> suggest that your rc.local write:
echo 0> / proc / sys / net / ipv4 / ip_froward
iptables -t filter -F
iptables -t nat -F
iptables -t nat -A POSTROUTING -s 192.168.0.0 / 24 -j MASQUERADE
echo 1> / proc / sys / net / ipv4 / ip_froward

Written by Undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ BEST 2020 SPOOTIFY CHECKER SITES :
fb.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) https://checkz.net/tools/spotify-account-checker

2) https://pjsins.com/good-spotify-checker-cosy-v2-proxyless/

3) https://pjsins.com/proxyless-spotify-checker-cracked-by-xmoses/
> download

4) http://fencerservices.in/gupk/spotify-checker.html

Written by Undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Best Netflix checker sites 2020 :
t.me/undercodeTesting

1) https://pjsins.com/best-netflix-checker-by-xrisky-v2-2020/

2) https://ouo.io/YAdby5
> download

3) https://cracked.to/Thread-NetFlix-Checker-by-xRisky

4) https://checkz.net/tools/tag/netflix-checker-online

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
# SUPPORT & SHARE

T.me/UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 Fake Valid Credit card numbers for TRIALS
> spootify- netflix-virtual numbers
T.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

4822787842278095 | Name David MartΓ­n | Cvv 194 | Vence | 01/25

5134571890159641 | First name Taylor Lewis | Cvv 117 | Vence | 12/2022
349856972922624 | Diamond Johnson name | Cvv 423 | Vence | 05/2028
3568892723271712 | First name Ethen Gonzalez | Cvv 442 | Vence |
09/2025

6011342228039426 | First name Madison Allen | Cvv 782 | Vence | 02/2026


4771753420740642 | Name Daniel Wright | Cvv 493 | Expires | 01/22
5444780411243272 | Ruby Baker Name | Cvv 134 | Vence | 12/2024
346206148867860 | Name Reagan Brown | Cvv 242 | Vence | 11/2026
3529701135256302 | Name Joseph Edwards | Cvv 732 | Vence | 02/2023
6011796428775230 | Name Jes Johnson | Cvv 764 | Vence | 02/2026

4553227938934074 | First name Michael Mitchell | Cvv 906 | Vence |
11/2022

5519178874098970 | First name Tristan Collins | Cvv 146 | Vence | 01/2029


344005630347676 | Van Baker name | Cvv 557 | Vence | 09/2024


3579308837651175 | First name Walker Anderson | Cvv 369 | Vence | 10/2025


6011200380898973 | First name Brianna Jones | Cvv 275 | Vence | 03/2024


4276090643767346 | First name William Rodriguez | Cvv 847 | Vence | 07/2022


5267907545409651 | Name Noel Williams | Cvv 718 | Vence | 10/2028

379948265263312 | First name Tristan Adams | Cvv 667 | Vence | 04/2026

3539667905342580 | First name Javion Johnson | Cvv 430 | Vence | 11/2025

6011355116046469 | First name Gideon Davis | Cvv 875 | Vence | 02/2026

4094888777502193 | Name Elijah Campbell | Cvv 789 | Vence | 07/2022

5361691169041249 | Name Eliana White | Cvv 667 | Vence | 12/2024


340078524118614 | Name Atticus Miller | Cvv 723 | Vence | 04/2022

3558627383367331 | First name Ruby Garcia | Cvv 624 | Vence | 07/2028


6011136497811444 | Name Faith Jones | Cvv 792 | Vence | 02/2026

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ 2020 lastest trick How hack netflix AND GET WORKING PREM ACCOUNTS by Undercode
> Netflix use cookies . The owner of the Netflix account could be located anywhere in the world and that is not a problem, since if they share Netflix cookies, anyone who copies them in their browser will be able to enter the owner's account without having to enter a Username and password. As a result, you will be able to enjoy extraordinary Netflix content for free.

πŸ¦‘ A disadvantage of the use of cookies is that Netflix does not allow playback on more than 4 screens at the same time. Therefore, if the cookie is already programmed for 4 people and they are currently in use, you must wait a while to be able to enter and reproduce the content. Follow below step by step the following instructions so you can enjoy hours of pleasure and fun on this incredible entertainment platform completely free.

πŸ¦‘ Until now, Netflix could be accessed using the Chrome browser. Currently it is no longer possible due to new browser updates. In this new " Hack" we will use the Mozilla FireFox browser and an extension called Cookie Editor.

1) The first thing you should do is download and install the browser on your PC. Click on the following link
> https://www.mozilla.org/en-US/firefox/new/

2) Install the Cookie Editor Add-on extension
> https://addons.mozilla.org/en-US/firefox/addon/cookie-editor/

3) Once installed you will have to reboot your computer.
3. You must connect to a VPN with an address or IP in the USA. Once connected, click to go to Netflix USA and wait for the page to load completely.

4) In the browser bar click on the tools section on the icon that says "Cookie Editor"

5) Delete all the cookies stored in the browser by clicking on the β€œAdd On” box in the pop-up menu and pressing β€œDelete”.

6) Copy the Netflix cookie from the available list using the "Cookie Editor" extension and import it by pressing the corresponding button, see the images sended here

7) In this step you must do the following as it is essential for this β€œHack” to work. When visiting the official Netflix site, the url of the detected country is automatically re-written. For example, if the company detects that the IP is from the United Kingdom, the url will be rewritten as follows: netflix.com/uk and so on for any country; so you must delete all the text written after the forward slash (/) ... Then just click the "Enter" button .

8) And that's it ...! .. Once the page is fully loaded you will have access to all content as a Premium subscriber.

πŸ¦‘Note:

After logging in to Netflix, avoid changing the data of the original account such as Email and phone number. If you do so, you will lose your access to that account. Also remember that if the session is occupied by 4 people, you must wait your turn to see the content.



πŸ¦‘ Use for learn not for Steal !!!

@UndercodeOfficial
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘Want to setup a DHCP SERVER ?FOLLOW THIS FULL GUIDE BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Setting up DHCP Server

A) Foreword:

1) DHCP is the abbreviation of Dynamic Host Configuration Protocol, mainly used to simplify network management in: The problem of "troublesome" in the configuration of workstation / host network configuration, commonly known as: "" dynamic allocation of IP "".

2) Compared with the dynamic allocation mechanism, it uses manual and manual methods to set one by one , Is called static setting.

3) Static setting is quite inefficient.

Imagine: If there are hundreds of workstations in a network segment, manually set it manually, it is not strange to be tired, and, in the future, if you want to change The network configuration is also extremely inconvenient!

4) Therefore, in the network management work, DHCP Server is a very important installation service. In the

5) past, most of the school ’s DHCP Server was installed on NT / W2K, but the performance and The stability is not very good,

therefore, the following introduces the installation of DHCP Server on RedHat Linux.

πŸ¦‘This article does not talk about too many theories, with the principle of being easy to set up.


B) Required packages:

dhcp-2.0-5.i386.rpm (RedHat 6.2)

dhcp-2.0-12.i186.rpm (RedHat 7.0)

dhcp-2.0-12.i386.rpm (CLE 1.0)

dhcp-2.0p15-4.i386.rpm ( RedHat 7.1)

C) Please choose the dhcp Server package according to your Linux version.


Setting up:

On RedHat Linux, setting up a DHCP Server is very simple!

1) Installation:

(a) rpm -ivh dhcp-2.0-5.i386. After rpm

(b), check, what files does this package place on the host?

rpm -ql dhcp | more

will get the following list:

/etc/rc.d/init.d/dhcpd
/ usr / doc / dhcp- 2.0
/usr/doc/dhcp-2.0/CHANGES
/usr/doc/dhcp-2.0/README
/usr/doc/dhcp-2.0/RELNOTES
/usr/doc/dhcp-2.0/dhcpd.conf.sample
/ usr / man / man5 / dhcp-options.5.gz
/usr/man/man5/dhcpd.conf.5.gz
/usr/man/man5/dhcpd.leases.5.gz
/usr/man/man8/dhcpd.8.gz
/usr/man/man8/dhcrelay.8.gz
/ usr / sbin / dhcpd
/ usr / sbin / dhcrelay
/ var / state / dhcp

, of which two are more important :

One is, /etc/rc.d/init.d/dhcpd, which can be used to control the behavior of the dhcp server, such as:

start: /etc/rc.d/init.d/dhcpd start
stop: / etc / rc .d / init.d / dhcpd stop
restart: /etc/rc.d/init.d/dhcpd restart
Observe the operation status: /etc/rc.d/init.d/dhcpd status The

other is, / usr / doc /dhcp-2.0/dhcpd.conf.sample
(RedHat 7.0 in /usr/share/doc/dhcp-2.0)

As the name implies, this is a configuration file of the dhcp server, we will copy it to / etc , And named dhcpd.conf.

(C) cp /usr/doc/dhcp-2.0/dhcpd.conf.sample /etc/dhcpd.conf

2) Configuration:

Then, you can start the configuration file for dhcp server / etc / dhcpd.conf to do the setting work. The

following is the original content of the file:



subnet 192.168.0.0 netmask 255.255.255.0 {

# --- default gateway

option routers 192.168.0.1;

option subnet-mask 255.255.255.0;



option nis-domain "" domain.org "";

option domain-name "" domain.org "";

option domain-name-servers 192.168.1.1;



3) option time-offset -5; # Eastern Standard Time

# option ntp-servers 192.168.1.1;

# option netbios-name-servers 192.168.1.1;

# --- Selects point -to-point node (default is hybrid). Don``t change this unless

#-you understand Netbios very well

# option netbios-node-type 2;


4) range dynamic-bootp 192.168.0.128 192.168.0.255;

default-lease- time 21600;

max-lease-time 43200;



5) we want the nameserver to appear at a fixed address

host ns {

next-server marvin.redhat.com;

hardware ethernet 12: 34: 56: 78: AB: CD;

fixed-address 207.175.42.254;

}

}

6) Junior High School as an example, the school is the first half of 1/2 C) subnet 163.26.167.0 netmask 255.255.255.128 {

# --- default gateway

# router IP

7) option routers 163.26.197.126;

# network mask

option subnet -mask 255.255.255.128;

# Domain

option domain-name "" jmjh.tnc.edu.tw "";

# Specify which DNS servers to dispatch to provide services?

option domain-name-servers 163.26.167.1, 163.26.200.1 , 168.95.1.1;



option time-offset -5; # Eastern Standard Time
8) Dynamic allocation of IP fence

range dynamic-bootp 163.26.167.50 163.26.167.100;

9) IP lease time

default-lease-time 21600;

max-lease-time 43200;

10) Set your school ’s DNS host to a fixed IP

# we want the nameserver to appear at a fixed address

host ns {

next-server dns.jmjh.tnc.edu.tw;

hardware ethernet 12: 34: 56: 78: AB: CD;

fixed-address 163.26.167.1;

}

} In the

11) above settings, please follow Your school configuration, modify it

by yourself . It should be noted that:

(a) host ns {
next-server dns.jmjh.tnc.edu.tw;
hardware ethernet 12: 34: 56: 78: AB: CD; --- > This is the number of the DNS host network card (6 bytes), please use ifconfig to query, as follows:
fixed-address 163.26.167.1;
}

ifconfig got:



eth0 Link encap: Ethernet HWaddr 48: 54: E8: 26: CC: C9

inet addr: 163.26.167.1 Bcast: 163.26.167.127 Mask: 255.255.255.128

UP BROADCAST RUNNING MULTICAST MTU: 1500 Metric: 1

RX packets: 762193 errors: 0 dropped: 0 overruns: 0 frame: 0

TX packets: 555401 errors: 0 dropped : 0 overruns: 0 carrier: 0

collisions: 0 txqueuelen: 100

Interrupt: 11 Base address: 0x8000


12) take HWaddr 48: 54: E8: 26: CC: C9 48: 54: E8: 26: CC: C9

fill in the above The hardware ethernet setting is sufficient.

πŸ¦‘ Special attention: your school ’s network card number (each card is unique globally) must not be the same as this one, please do not copy the settings here!

(b) This dhcp server can Coexist with the original dhcp server on NT / W2K, but please note that the IP allocation segment should be staggered.

So, in the end, which dhcp server the workstation will get dynamic allocation?

Very simple, when the workstation sends a request (request ) Message, whoever grabs it first will provide it first.

3) Execution:

/etc/rc.d/init.d/dhcpd start

will not succeed the first time,

If it is dhcp-2.0-5 version, it will show a failed red string and warn you:

/var/state/dhcp/dhcpd.leases This file does not exist, so you must manually open a new file:

touch / var /state/dhcp/dhcpd.leases

4) this purpose archives are: IP recording situation lease of each workstation.

5) if the DHCP-2.0-12 later version, it will not appear any message, you will find that it is not up and running.

6) this is Because: Once this version finds that you have not opened this file, it will jump out without running.

And the location of this file is slightly different:

it is located in /var/lib/dhcp/dhcpd.leases

OK, open it manually ?!

touch /var/lib/dhcp/dhcpd.leases

7) can now be started, and set it to run automatically upon booting (either linuxconf or ntsysv can be set)

/etc/rc.d/init.d/dhcpd start

Congratulations ! Your school already has a very stable DHCP server!


πŸ¦‘ Note:

8) If you have a Linux firewall, you want to allocate the DHCP server from a certain network card (one network card represents a network segment),

for example: Zhang network card interface eth1 dispensed, as long as the modifications to /etc/rc.d/init.d/dhcpd.

πŸ¦‘ follows:

9) the start daemons place

by the:

daemon / usr / sbin / dhcpd

10) changed to:

daemon / usr / sbin / dhcpd eth1


πŸ¦‘Conclusion:

11) DHCP Server is a very important weapon in network management work. It is also wise to set up more than two backups.

And, from then on, you can no longer rely on NT / W2K this poor and unstable performance (PE ratio is too low) of the system.

(not necessarily limited to a particular one closed the company, but does not have to cost a lot, is the primary and secondary schools network Build, the best PE ratio choice!)

πŸ¦‘ Don t clone without credits



WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘END OF TUTORIAL FULL SETUP DHCP SERVER BY UNDERCODE
NOW LET S SEND SOME TERMUX-LINUX SCRIPT
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Automater - IP URL and MD5 OSINT Analysis TERMUX-LINUX
fb.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

πŸ¦‘ Linux:

As this is a python script you will need to ensure you have the correct version of python, which for this script is python 2.7. I used mostly standard libraries, but just incase you don't have them, here are the libraries that are required: httplib2, re, sys, argparse, urllib, urllib2

1) With the python and the libraries out of the way, you can simply use git to clone the tekdefense code to your local machine.

<> git clone https://github.com/1aN0rmus/TekDefense-Automater.git

If you don't have git installed you can simply download the script from https://github.com/1aN0rmus/TekDefense-Automater/archive/master.zip

πŸ¦‘ Usage:

2) Once installed the usage is pretty much the same across Windows, Linux, and Kali.

> python Automater.py -h

or if you chmod +x Automater.py you can

3) ./Automater.py -h

πŸ¦‘ usage: Automater.py [-h] [-o OUTPUT] [-w WEB] [-c CSV] [-d DELAY] [-s SOURCE]

[--p]

target



IP, URL, and Hash Passive Analysis tool



positional arguments:

target List one IP Addresses, URL or Hash to query or pass

the filename of a file containing IP Addresses, URL or

Hash to query each separated by a newline.



πŸ¦‘ optional arguments:

-h, --help show this help message and exit

-o OUTPUT, --output OUTPUT

This option will output the results to a file.

-w WEB, --web WEB This option will output the results to an HTML file.

-c CSV, --csv CSV This option will output the results to a CSV file.

-d DELAY, --delay DELAY

This will change the delay to the inputted seconds.

Default is 2.

-s SOURCE, --source SOURCE

This option will only run the target against a

specific source engine to pull associated domains.

Options are defined in the name attribute of the site

element in the XML configuration file

--p This option tells the program to post information to

sites that allow posting. By default the program will

NOT post to sites that require a post.

4) To run Automater against a target ip, hash, url, or file simply type

> Python Automater.py <target>

5) python Automater.py 37.221.161.215

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁