UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
> Then open the configuration file in any text editor. In this case, I used Leafpad

kali> leafpad config

πŸ¦‘ We will need to edit the IPADDRESS variable and the SHELLIPADDRESS variable to reflect the actual IP address of your Kali system (you can find it by entering "ifconfig").

Step 10: Launch the Platform
Now we are ready to launch the Smartphone Pentest Framework. Just enter

kali> ./framework.py

And that should open the Framework menu as shown below.

Finish! Now we are ready to start hacking smartphones!

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ FULL ANDROID HACKING @UndercodeTesting
πŸ¦‘ AFTER ALL THOSE TUTORIALS TIME TO SEND IMPORTANTS TERMUX-LINUX HACKING TOOLS :)
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Best Proxy Grabber Tool!
t.me/undercodeTesting

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) git clone https://github.com/04x/HttpLiveProxyGrabber

2) cd HttpLiveProxyGrabber

3) python ProxGrab.py

simply then choose options
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Fast instagram cracking :

very fast!
work with proxylist
only work on python2.7

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) git clone https://github.com/04x/instagramCracker

2) cd instagramCracker

3)python CheckProxy.py

4)python instagram.py
# SUPPORT & SHARE

t.me/undercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Hacking Tools ⚑️:)
fb.com/undercodeTesting

+] MD5 Hash Cracker
[+] Zone-h Poster
[+] Zone-h Url Grabber
[+] Sqli Finder [With ip Address]
[+] Whois Tools
[+] Dorker
[+] Reverse ip
[+] zip/rar password Cracker
[+] telegram/instagram username checker
[+] ICG wordpress Scanner
[+] Email Crawler
[+] Base64 encode/Decode
[+] Wordpress Hash BruteForce
[+] pyc decompiler
[+] CMs Checker

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) git clone https://github.com/04x/ToolB0x

2) cd ToolB0x

3) run as pthon ToolB0x.py

color.py

E N J O Y

πŸ¦‘ Works for Termux-win-any linux

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Hakku Framework penetration testing
>Hakku is simple framework that has been made for penetration testing tools. Hakku framework offers simple structure, basic CLI, and useful features for penetration testing tools developing. Hakku is on early stages and may be unstable, so please download the released versions from github or sourceforge, don't just clone github repository except you don't want stability, you want to try out latest features, or you just want to develop Hakku. Hakku is under MIT license, in other words you can do what you ever want with the source code

πŸ¦‘FEATURES :

apache_users
arp_dos
arp_monitor
arp_spoof
bluetooth_pod
cloudflare_resolver
dhcp_dos
dir_scanner
dns_spoof
email_bomber
hostname_resolver
mac_spoof
mitm
network_kill
pma_scanner
port_scanner
proxy_scout
whois
web_killer
web_scout
wifi_jammer
zip_cracker
rar_cracker
wordlist_gen

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) git clone https://github.com/4shadoww/hakkuframework

2) cd hakkuframework

3) Hakku doesn't require installation, but if want to do it for some reason you can do it using installation script. That same script will be used to uninstall Hakku

> Installation can be done by simple running command: sudo ./install -i

> use for learn not for harm :(
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘updated Contains Spammers Tools With Various Types With High Limit Even Unlimited indonisian script πŸ‘πŸ»

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

$ pkg update upgrade
$ pkg install git python2 toilet figlet php
$ git clone https://github.com/4L13199/LITESPAM
$ cd LITESPAM

> termux-linux
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to recover A DISABLED INSTAGRAM ACCOUNT ? from official instagram team
t.me/UndercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) If your Instagram account was disabled, you’ll see a message telling you when you try to log in. Accounts that don't follow Community Guidelines
> https://help.instagram.com/477434105621119

or Terms of Use may be disabled without warning. We suggest that you review the Community Guidelines carefully along with the posts on all accounts you've created. Keep in mind, we may permanently remove an account that repeatedly violates the Community Guidelines or Terms of Use.

2) If you think your account was disabled by mistake, you may be able to appeal the decision by opening the app, entering your username and password and following the on-screen instructions.

3) If you don’t see a disabled message, you may be experiencing a login issue. If your account was deleted by you or someone with your password, there's no way to restore it. You can create a new account with the same email address you used before, but you may not be able to get the same username.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Generate Gmail Emailing Keyloggers to Windows :)
fb.com/undercodeTesting

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) git clone https://github.com/4w4k3/BeeLogger.git

Running:
2) cd BeeLogger

3) sudo su

4) chmod +x install.sh

5) ./install.sh

6) python bee.py

πŸ¦‘Features :

> Send logs each 120 seconds.

> Send logs when chars > 50.

> Send logs with GMAIL.

> Some Phishing methods are included.

> Multiple Session disabled.

> Auto Persistence.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ any doubt feel free to ask us :)
@Undercode_Testing
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Is the phone hacked? How to find out and what to do if fears are confirmed ? by Undercode :
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

Hacking signs

1) battery charge. If the smartphone’s battery began to run down quickly, reducing the device’s operating time by several hours under normal use, then this most likely indicates the operation of malicious background applications;

2) applications. The appearance in the general list of new application icons that were not installed by you may indicate that the device was hacked;
notifications. Displaying strange messages on the screen with unreadable characters, links or notifications about the execution of the request, if you did not put your hand to this, also does not bode well - for sure, hackers already have your data;


3) balance. If your mobile account incurs losses, although you are convinced that you did not call toll numbers, did not order additional services and were not involved in any financial transactions, then you can say with accuracy that your gadget is hacked;

4) malfunctions. Strange signals during a conversation, extraneous noise, or even disconnection with a good signal level can also talk about using the device’s microphone or even listening to conversations;

Written by Undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁