UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
after logins send screanshoats @Undercode_Testing
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘easy & fast how to get PrivateVPN Premium 7 Days Trial New :tested :
t.me/UndercodeTesting

1) Go to this link https://privatevpn.com/best-vpn/vpn-free-trial

2) Put Email Address and Password Verify Your Email Address

3) Download App from PlayStore https://play.google.com/store/apps/details?id=com.pvpn.privatevpn

Sign In In app And you Got the 7 days Private VPN trial

πŸ¦‘ You can use it For Other Platform too ~ Windows , Linux , Extension

1 IP Per Trial ( Use Unraped Ip )

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Zee5 Premium Accounts :
t.me/undercodeTesting

sahiltulsiani@gmail.com:kt181213 | Plan Name = All Access Monthly Pack | Exipry Date = 2020-12-31T23:59:59Z | Device = 5 \

aditya.abburi@gmail.com:steelbed43 | Plan Name = All Access Pack | Exipry Date = 2021-03-31T23:59:59Z | Device = 5

aditya.agrawal42@gmail.com:ka8989069164 | Plan Name = All Access (Offer till Oct 31, 2018) | Exipry Date = 2018-10-31T23:59:59Z | Device = 5


aditya.garg@live.in:foreva809 | Plan Name = All Access Pack | Exipry Date = 2021-03-31T23:59:59Z | Device = 5

aditya.gnb@gmail.com:badityajgnb | Plan Name = Migration Zee5 | Exipry Date = 2019-01-01T23:59:59Z | Device = 0 :

aditya.goyal2006@gmail.com:May19th75 | Plan Name = Amazon Free Trial Pack For 7 Days | Exipry Date = 2022-03-31T23:59:59Z | Device = 5



parth0309@gmail.com:p212t1-1 | Plan Name = All Access Pack | Exipry Date = 2021-03-31T23:59:59Z | Device = 5

partha.manjanbail@gmail.com:engineer3027 | Plan Name = All Access Pack | Exipry Date = 2021-03-31T23:59:59Z | Device = 5

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ FRESH PREMIUM PROXIES FROM 1 H :
t.me/UndercodeTesting

197.216.2.14 8080 1 hour ago
1036 ms 51% (65) ao Angola Elite -
201.204.168.106 80 1 hour ago
3190 ms 12% (94) cr Costa Rica - Heredia Elite -
218.204.153.156 443 1 hour ago
2222 ms 11% (74) cn China Elite -
35.220.131.188 80 1 hour ago
848 ms 11% (78) us United States Elite -
35.222.208.56 3128 1 hour ago
1977 ms 60% (59) us United States Elite -
5.79.105.97 8118 1 hour ago
479 ms 5% (113) nl Netherlands Elite -
144.76.214.153 1080 1 hour ago
3361 ms 81% (57) de Germany Elite -
169.57.1.85 80 1 hour ago
263 ms 64% (61) mx Mexico - Mexico City Elite -
175.43.58.23 9999 1 hour ago
0 ms 0% (105) cn China - Quanzhou Elite -
162.223.88.228 8080 1 hour ago
2910 ms 13% (88) us United States - Buffalo Elite -
163.44.153.98 8080 1 hour ago
3947 ms 26% (79) sg Singapore Elite -
115.231.31.130 80 1 hour ago
849 ms 92% (46) cn China Elite -
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Website hacking github topic- linux :
pinterest.com/Undercode_Testing

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) git clone https://github.com/koutto/jok3r.git

2) cd jok3r

3) Pull Jok3r Docker Image:

sudo docker pull koutto/jok3r
Run fresh Docker container:

5) sudo docker run -i -t --name jok3r-container -w /root/jok3r -e DISPLAY=$DISPLAY -v /tmp/.X11-unix:/tmp/.X11-unix --shm-size 2g --net=host koutto/jok3r


πŸ¦‘ Notes:

-e DISPLAY=$DISPLAY -v /tmp/.X11-unix:/tmp/.X11-unix is required in order to be able to start GUI applicationfrom the Docker container (e.g. open web browser to read reports). It requires running xhost +local:root on the host.
--shm-size 2g is used to increase the size of the shared memory, it is required to avoid crashs of web browser when reading reports from the Docker container.
--net=host is required to share host's interface. It is needed for reverse connections (e.g. Ping to container when testing for RCE, Getting a reverse shell)

6) To re-run a stopped container:

sudo docker start -i jok3r-container

7) To open multiple shells inside the container:

sudo docker exec -it jok3r-container bash

8) In order to update, just pull the latest Docker Image from Docker Hub and run a fresh container from this new image:

sudo docker pull koutto/jok3r
sudo docker run -i -t --name jok3r-container-updated -w /root/jok3r -e DISPLAY=$DISPLAY -v /tmp/.X11-unix:/tmp/.X11-unix --shm-size 2g

πŸ¦‘FEATURES :

Selection of Tools: Compilation of 50+ open-source tools & scripts, from various sources.
Docker-based: Application packaged in a Docker image running Kali OS, available on Docker Hub.
Ready-to-use: All tools and dependencies installed, just pull the Docker image and run a fresh container.
Updates made easy: Easily keep the whole toolbox up-to-date by running only one command.
Easy Customization: Easily add/remove tools from a simple configuration file.
Network Infrastructure Security Assessment
Many supported Services: Target most common TCP/UDP services (HTTP, FTP, SSH, SMB, Oracle, MS-SQL, MySQL, PostgreSQL, VNC, etc.).
Combine Power of Tools: Each security check is performed by a tool from the toolbox. Attacks are performed by chaining security checks.
Context Awareness: Security checks to run are selected and adapted according to the context of the target (i.e. detected technologies, credentials, vulnerabilities, etc.).
Reconnaissance: Automatic fingerprinting (product detection) of targeted services is performed.
CVE Lookup: When product names and their versions are detected, a vulnerability lookup is performed on online CVE databases (using Vulners & CVE Details).
Vulnerability Scanning: Automatically check for common vulnerabilities and attempt to perform some exploitations (auto-pwn).
Brute-force Attack: Automatically check for default/common credentials on the service and perform dictionnary attack if necessary. Wordlists are optimized according to the targeted services.
Post-authentication Testing: Automatically perform some post-exploitation checks when valid credentials have been found.
Web Security Assessment
Large Focus on HTTP: More than 60 different security checks targeting HTTP supported for now.
Web Technologies Detection: Fingerprinting engine based on Wappalyzer is run prior to security checks, allowing to detect: Programming language, Framework, JS library, CMS, Web & Application Server.
Server Exploitation: Automatically scan and/or exploit most critical vulnerabilities (e.g. RCE) on web and application servers (e.g. JBoss, Tomcat, Weblogic, Websphere, Jenkins, etc.).
CMS Vulnerability Scanning: Automatically run vulnerability scanners on most common CMS (Wordpress, Drupal, Joomla, etc.).
Local Database & Reporting
Local Database: Data related to targets is organized by missions (workspaces) into a local Sqlite database that is kept updated during security testings.
Metasploit-like Interactive Shell: Access the database through an interactive shell with several built-in commands.
Import Targets from Nmap: Add targets to a mission either manually or by loading Nmap results.
Import Targets from Shodan: Add targets to a mission manually from shodan (need shodan API key).
Access all Results: All outputs from security checks, detected credentials and vulnerabilities are stored into the database and can be accessed easily.
Reporting: Generate full HTML reports with targets summary, web screenshots and all results from security testing.

πŸ¦‘Tested by Undercode on :

> parrot

> ubuntu

> kali


@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ this image explain fonctional of this tool
This media is not supported in your browser
VIEW IN TELEGRAM