UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.4K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘easy & fast how to get PrivateVPN Premium 7 Days Trial New :tested :
t.me/UndercodeTesting

1) Go to this link https://privatevpn.com/best-vpn/vpn-free-trial

2) Put Email Address and Password Verify Your Email Address

3) Download App from PlayStore https://play.google.com/store/apps/details?id=com.pvpn.privatevpn

Sign In In app And you Got the 7 days Private VPN trial

πŸ¦‘ You can use it For Other Platform too ~ Windows , Linux , Extension

1 IP Per Trial ( Use Unraped Ip )

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Zee5 Premium Accounts :
t.me/undercodeTesting

sahiltulsiani@gmail.com:kt181213 | Plan Name = All Access Monthly Pack | Exipry Date = 2020-12-31T23:59:59Z | Device = 5 \

aditya.abburi@gmail.com:steelbed43 | Plan Name = All Access Pack | Exipry Date = 2021-03-31T23:59:59Z | Device = 5

aditya.agrawal42@gmail.com:ka8989069164 | Plan Name = All Access (Offer till Oct 31, 2018) | Exipry Date = 2018-10-31T23:59:59Z | Device = 5


aditya.garg@live.in:foreva809 | Plan Name = All Access Pack | Exipry Date = 2021-03-31T23:59:59Z | Device = 5

aditya.gnb@gmail.com:badityajgnb | Plan Name = Migration Zee5 | Exipry Date = 2019-01-01T23:59:59Z | Device = 0 :

aditya.goyal2006@gmail.com:May19th75 | Plan Name = Amazon Free Trial Pack For 7 Days | Exipry Date = 2022-03-31T23:59:59Z | Device = 5



parth0309@gmail.com:p212t1-1 | Plan Name = All Access Pack | Exipry Date = 2021-03-31T23:59:59Z | Device = 5

partha.manjanbail@gmail.com:engineer3027 | Plan Name = All Access Pack | Exipry Date = 2021-03-31T23:59:59Z | Device = 5

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ FRESH PREMIUM PROXIES FROM 1 H :
t.me/UndercodeTesting

197.216.2.14 8080 1 hour ago
1036 ms 51% (65) ao Angola Elite -
201.204.168.106 80 1 hour ago
3190 ms 12% (94) cr Costa Rica - Heredia Elite -
218.204.153.156 443 1 hour ago
2222 ms 11% (74) cn China Elite -
35.220.131.188 80 1 hour ago
848 ms 11% (78) us United States Elite -
35.222.208.56 3128 1 hour ago
1977 ms 60% (59) us United States Elite -
5.79.105.97 8118 1 hour ago
479 ms 5% (113) nl Netherlands Elite -
144.76.214.153 1080 1 hour ago
3361 ms 81% (57) de Germany Elite -
169.57.1.85 80 1 hour ago
263 ms 64% (61) mx Mexico - Mexico City Elite -
175.43.58.23 9999 1 hour ago
0 ms 0% (105) cn China - Quanzhou Elite -
162.223.88.228 8080 1 hour ago
2910 ms 13% (88) us United States - Buffalo Elite -
163.44.153.98 8080 1 hour ago
3947 ms 26% (79) sg Singapore Elite -
115.231.31.130 80 1 hour ago
849 ms 92% (46) cn China Elite -
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Website hacking github topic- linux :
pinterest.com/Undercode_Testing

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) git clone https://github.com/koutto/jok3r.git

2) cd jok3r

3) Pull Jok3r Docker Image:

sudo docker pull koutto/jok3r
Run fresh Docker container:

5) sudo docker run -i -t --name jok3r-container -w /root/jok3r -e DISPLAY=$DISPLAY -v /tmp/.X11-unix:/tmp/.X11-unix --shm-size 2g --net=host koutto/jok3r


πŸ¦‘ Notes:

-e DISPLAY=$DISPLAY -v /tmp/.X11-unix:/tmp/.X11-unix is required in order to be able to start GUI applicationfrom the Docker container (e.g. open web browser to read reports). It requires running xhost +local:root on the host.
--shm-size 2g is used to increase the size of the shared memory, it is required to avoid crashs of web browser when reading reports from the Docker container.
--net=host is required to share host's interface. It is needed for reverse connections (e.g. Ping to container when testing for RCE, Getting a reverse shell)

6) To re-run a stopped container:

sudo docker start -i jok3r-container

7) To open multiple shells inside the container:

sudo docker exec -it jok3r-container bash

8) In order to update, just pull the latest Docker Image from Docker Hub and run a fresh container from this new image:

sudo docker pull koutto/jok3r
sudo docker run -i -t --name jok3r-container-updated -w /root/jok3r -e DISPLAY=$DISPLAY -v /tmp/.X11-unix:/tmp/.X11-unix --shm-size 2g

πŸ¦‘FEATURES :

Selection of Tools: Compilation of 50+ open-source tools & scripts, from various sources.
Docker-based: Application packaged in a Docker image running Kali OS, available on Docker Hub.
Ready-to-use: All tools and dependencies installed, just pull the Docker image and run a fresh container.
Updates made easy: Easily keep the whole toolbox up-to-date by running only one command.
Easy Customization: Easily add/remove tools from a simple configuration file.
Network Infrastructure Security Assessment
Many supported Services: Target most common TCP/UDP services (HTTP, FTP, SSH, SMB, Oracle, MS-SQL, MySQL, PostgreSQL, VNC, etc.).
Combine Power of Tools: Each security check is performed by a tool from the toolbox. Attacks are performed by chaining security checks.
Context Awareness: Security checks to run are selected and adapted according to the context of the target (i.e. detected technologies, credentials, vulnerabilities, etc.).
Reconnaissance: Automatic fingerprinting (product detection) of targeted services is performed.
CVE Lookup: When product names and their versions are detected, a vulnerability lookup is performed on online CVE databases (using Vulners & CVE Details).
Vulnerability Scanning: Automatically check for common vulnerabilities and attempt to perform some exploitations (auto-pwn).
Brute-force Attack: Automatically check for default/common credentials on the service and perform dictionnary attack if necessary. Wordlists are optimized according to the targeted services.
Post-authentication Testing: Automatically perform some post-exploitation checks when valid credentials have been found.
Web Security Assessment
Large Focus on HTTP: More than 60 different security checks targeting HTTP supported for now.
Web Technologies Detection: Fingerprinting engine based on Wappalyzer is run prior to security checks, allowing to detect: Programming language, Framework, JS library, CMS, Web & Application Server.
Server Exploitation: Automatically scan and/or exploit most critical vulnerabilities (e.g. RCE) on web and application servers (e.g. JBoss, Tomcat, Weblogic, Websphere, Jenkins, etc.).
CMS Vulnerability Scanning: Automatically run vulnerability scanners on most common CMS (Wordpress, Drupal, Joomla, etc.).
Local Database & Reporting
Local Database: Data related to targets is organized by missions (workspaces) into a local Sqlite database that is kept updated during security testings.
Metasploit-like Interactive Shell: Access the database through an interactive shell with several built-in commands.
Import Targets from Nmap: Add targets to a mission either manually or by loading Nmap results.
Import Targets from Shodan: Add targets to a mission manually from shodan (need shodan API key).
Access all Results: All outputs from security checks, detected credentials and vulnerabilities are stored into the database and can be accessed easily.
Reporting: Generate full HTML reports with targets summary, web screenshots and all results from security testing.

πŸ¦‘Tested by Undercode on :

> parrot

> ubuntu

> kali


@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ this image explain fonctional of this tool
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Termux -Linux
> git topic The DumpsterFire Toolset is a modular, menu-driven, cross-platform tool for building repeatable, time-delayed, distributed security events. Easily create custom event chains for Blue Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Turn paper tabletop exercises into controlled "live fire" range events. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
t.me/UndercodeTesting

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) git clone https://github.com/TryCatchHCF/DumpsterFire.git

2) cd DumpsterFire

3) $ ./dumpsterFireFactory.py


dumpsterFireFactory.py - Menu-driven tool for creating, configuring, scheduling, and executing DumpsterFires

FireModules/ - Directory that contains subdirectories of Fires, each subdirectory is a specific Category of Fires to keep your Fire modules organized. Fires are added to a DumpsterFire to create a chain of events and actions.

DumpsterFires/ - Directory containing your collection of DumpsterFires

igniteDumpsterFire.py - Headless script, invoked at command line with the filename of the DumpsterFire you wish to execute. Useful for igniting distributed DumpsterFires.

testFireModule.py - Utility script for unit testing the Class methods of your custom Fire modules, without the hassle of running through the entire DumpsterFire Factory process to debug. Also useful for running a single Fire to check your settings. testFireModule.py will prompt you for configuration settings were applicable.

__init__.py files - Required to make Python treat directories as containing Python packages, allows DumpsterFire toolset to find and load Fire modules.

πŸ¦‘ TESTED BY UNDERCODE ON :

> kali

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁