UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2019-2020 so helpfull scripts termux-linux :
t.me/UndercodeTesting

Make sure you've already git installed. Then you can run the following commands to get the scripts on your computer:

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

OS X, Linux and Windows,termux

1) git clone https://github.com/Logan1x/Python-Scripts.git

2) cd Python-Scripts/bin


πŸ¦‘Air Quality Script
This script renders the air quality from the location of the user

The location is fetched using the user's IP address

This script requires a key from WAQI.

It is free and can be fetched from http://aqicn.org/data-platform/token/#/

Usage Instructions
python air-quality.py token

πŸ¦‘Approximating pi
This script is useful to show a way to approximate the value of pi using a Monte Carlo method. It is also optimized using the @jit (just-in-time) decorator from the numba library.

πŸ¦‘Blog Reader
Blog Reader is the terminal reader that scrapes the article from planet dgplug and displays it on the terminal.

It separates the content accrding to the screen size.

python Blog_reader.py
Bulk add users to Twitter list
Simple script helps you mass add users to your twitter list to follow (Ex: Bitcoin/Altcoins official account, news, traders...)

πŸ¦‘Prepare list screen names
Setup your app and get an access token
pip install twitter
python bulk_add_twitter_list.py

πŸ¦‘Caesar Cipher
Encrypts or Decrypts any message you want, simply enter the message and the rotation number

python caesar_cipher.py

πŸ¦‘contributors list :

python .\contributors.py https://github.com/Logan1x/Python-Scripts/
where the argument is the url of the repo

you may need to install packages like PIL@1.1.7 and requests if not installed

πŸ¦‘End To End Encryption
It is a simple program to implement and understand the basic of end_to_end encryption. Here I am using caesar cipher to encrypt but in reality they use algotihms lile SHA-1, RSA etc.

python end_to_end.py

πŸ¦‘Expense Manager
Simple GUI program which helps you calculate your expenses, monitor them just through mouse clicks. All you have to do is run the script and choose an option from the menu which will displayed when you run the script. Enter Your Expenses as eg: "Biscuits Rs 15" " rs " ignore the quotes.

python expense_manger.py

πŸ¦‘Facebook Auto Post

This is python script that log in into facebook and post the status.

You can see live execution of this script here.

pip install -r facebook-auto-post.requirements.txt
python facebook-auto-post.py
Find Large Files
Searches a file location and subdirectories for files larger than a given size. Useful for phones which might hide files in FileExplorer, but allow use as flash memory. Directly prints results if run directly. May also be imported, yielding results one by one.

πŸ¦‘FTP Download File
A simple application to download a file via FTP with the given remote and local path Parameters:

-hh hostname
-u username
-p password
-rd remote directory
-ld local directory
python ftp_download_file.py

πŸ¦‘Fetch HTML
This script fetch html response from the provided url and parse xml tag to get only text content and print out.

python fetch_html.py https://github.com

πŸ¦‘Get External IP
Gets the external IP-Address from the current machine and prints it to the console

python getExternalIp.py
Group files by type
Group files by their extensions
Files are moved into folders with extension names
Usage Instructions
python group_file_by_type.py 'C:\\test\\products'

πŸ¦‘Handy offline dictionary
A tiny offline dictionary app based on nltk wordnet and pyqt5

cd dictionary
python app.py


βœ… + much more on their readme file
e n j o y

@undercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁


πŸ¦‘2020 Hacking Neural Networks :
youtube.com/undercode

> an offensive manner (bug hunting, shellcode obfuscation, etc.) and how to exploit neural networks found in the wild (information extraction, malware injection, backdooring, etc.)

πŸ¦‘The exercises :

0 - Last Layer Attack
1 - Backdooring
2 - Extracting Information
3 - Brute Forcing
4 - Neural Overflow
5 - Malware Injection
6 - Neural Obfuscation
7 - Bug Hunting
8 - GPU Attack


πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) Keras: Installing Keras can be tricky. We refer to the official installation guide at https://keras.io/#installation and suggest TensorFlow as a backend (using the GPU-enabled version, if one is available on the machine).

2) NumPy, SciPy and scikit-image: NumPy and SciPy are excellent helper packages, which are used throughout all exercises. Following the official SciPy instructions should also install NumPy https://www.scipy.org/install.html. We will also need to install scikit-image for image loading and saving: https://scikit-image.org/docs/stable/install.html.

3) PyCuda: PyCuda is required for the GPU-based attack exercise. If no nVidia GPU is available on the machine, this can be skipped. https://wiki.tiker.net/PyCuda/Installation

4) NLTK: NLTK provides functionalities for natural language processing and is very helpful for some of the exercises. https://www.nltk.org/install.html

E N J O Y

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ DISNEY + βœ…
jarrettbuilding@gmail.com:Anom4u8!

saniul@hotmail.com:slAynet1230
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘BLUETOOTH HACKING :

1) Debian / Ubuntu

sudo apt-get install cmake libusb-1.0-0-dev make gcc g++ libbluetooth-dev \
pkg-config libpcap-dev python-numpy python-pyside python-qt4
Fedora / Red Hat

su -c "yum install libusb1-devel make gcc wget tar bluez-libs-devel"

2) Mac OS X users can use either MacPorts or Homebrew to install the required packages:

brew install libusb wget cmake pkg-config libpcap
or
sudo port install libusb wget cmake python27 py27-numpy py27-pyside

3) FreeBSD users can install the host tools and library directly from the ports and package system:

sudo pkg install ubertooth
libbtbb

4) Next the Bluetooth baseband library (libbtbb) needs to be built for the Ubertooth tools to decode Bluetooth packets:

wget https://github.com/greatscottgadgets/libbtbb/archive/2018-12-R1.tar.gz -O libbtbb-2018-12-R1.tar.gz
tar -xf libbtbb-2018-12-R1.tar.gz
cd libbtbb-2018-12-R1
mkdir build
cd build
cmake ..
make
sudo make install

5) Linux users: if you are installing for the first time, or you receive errors about finding the library, you should run:

sudo ldconfig
Ubertooth tools

6) The Ubertooth repository contains host code for sniffing Bluetooth packets, configuring the Ubertooth and updating firmware. All three are built and installed by default using the following method:

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) wget https://github.com/greatscottgadgets/ubertooth/releases/download/2018-12-R1/ubertooth-2018-12-R1.tar.xz

2) tar xf ubertooth-2018-12-R1.tar.xz

3) cd ubertooth-2018-12-R1/host

4) mkdir build

5) cd build

6) cmake ..

7) make

8) sudo make install

βœ… >
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Configuration example of proxy server and router
fb.com/UndercodeTesting

1) rapid development of network technology, so that enterprises LAN access INTERNET more and more ways to share resources, For the most part, DDN special line with its stable performance, expansion The advantage of good performance has become a commonly used method.

2) The DDN connection is simple in terms of hardware requirements. Only one router (router) and proxy server (proxy server) are required, but many system configuration Network managers are a more difficult problem. Taking CISCO routers as an example, the author introduces several successful configuration methods for the reference of peers:

1. Configuration of accessing Internet resources directly through the router

2. The general idea and the equipment connection method
In general, Internal LAN use reserved addresses on the INTERNET:
10.0.0.0/8:10.0.0.0~10.255.255.255
172.16.0.0/12:172.16.0.0~172.31.255.255
192.168. 0.0 / 16: 192.168.0.0 ~ 192.168.255.255

3.Under normal circumstances, when the workstations inside the unit directly use routing to access externally, they will be filtered out by the router because the workstations use reserved addresses on the Internet, resulting in inaccessibility Internet resources. The solution to this problem is to use the NAT (Network Address Translation) address translation function provided by the routing operating system to convert the private address of the internal network into a legal address on the Internet, so that users without a legal IP address can access it through NAT. External Internet. The advantage of this is that there is no need to be equipped with a proxy server, reducing investment, it can also save legal IP addresses and improve the security of the internal network.

4.There are two types of NAT: Single mode and global mode.
Using the single mode of NAT, just like its name, it can map many local LAN hosts to an Internet address. All hosts in the local area network are regarded as an Internet user to the external Internet network. Hosts in the local area network continue to use the local address.
Using the global mode of NAT, the router's interface maps many local LAN hosts to a certain range of Internet addresses (IP address pool). When the local host port is connected to a host on the Internet, an IP address in the IP address pool is automatically assigned to the local host. The dynamically assigned IP address will be released after the connection is interrupted, and the released IP address can be used by other local hosts. use.
Taking the network environment of my unit as an example, the configuration method and process are listed below for your reference.
Our unit uses Unicom optical cable (V.35) to connect to the Internet. The router is CISCO2610. The LAN uses INTEL550 100M switch. Unicom provides us with the following four IP addresses:
211.90.137.25 (255.255.255.252) for local WAN port router
port 211.90.137.26 (255.255.255.252) for the other side (China Unicom) is
211.90.139.41 (255.255.255.252) for their disposal
211.90.139.42 (255.255.255.252) for their disposal
πŸ¦‘Configuration example of proxy server and router part 2

2) The configuration of the router
en
config t

> ip nat pool c2610 211.90.139.41 211.90.139.42 netmask 255.255.255.252
(define an address pool c2601, which contains two free legal IP addresses for NAT Used during conversion)
int e0 / 0
ip address 192.168.0.3 255.255.255.0
ip nat inside
exit

> (set the IP address of the Ethernet port and set it as the port connected to the internal network)
interface s0 / 0
ip address 211.90.137.25 255.255.255.252
ip nat outside
exit

> (Set the IP address of the WAN port and set it as the port to connect to the external network)
ip route 0.0.0.0 0.0.0.0 211.90.137.26
(set the dynamic route)
access-list 2 permit 192.168.0.1 0.0.0.255
(establish the access control list )
! Dynamic NAT
!
Ip nat inside source list 2 pool c2610 overload
(establish dynamic address translation)
line console 0
exec-timeout 0 0
!
Line vty 0 4
end
wr
(save the settings made)
πŸ¦‘Configuration example of proxy server and router part 3

3) Workstation configuration

1-requires static IP address, set in the TCP / IP properties and set off to network 192.168.0.3 (the IP address of the router Ethernet port), the address is provided, the Internet browser and other tools to provide access to the DNS in No special settings are required.

2-Second, access to INTERNET resources through a proxy server configuration

3-General idea and equipment connection method
The advantage of using proxy server to access INTERNET resources is that the CACHE service provided by the proxy server can be used to improve the access speed and efficiency of INTERNET. It is more suitable for units with more workstations. The disadvantage is that it needs to be equipped with a computer as a proxy server, which increases the investment cost; and it requires two more legal IP addresses than the first legal method, and the network security is not high.

4-To use this scheme to access the Internet, the device connection method is as follows:
two network cards are installed on the proxy server, one is connected to the internal network, and the internal private address is set; And set its gateway to 211.90.139.41 (router Ethernet port)
router Ethernet port also set the legal IP address (211.90.139.41) assigned by Unicom

5- connecting the device, install the proxy software on the proxy server and set it on the workstation An agent can access INTERNET.
πŸ¦‘Configuration example of proxy server and router part 4

Router configuration

(1) Network connection diagram:
Note: In the above figure, all computers in the unit communicate directly with the internal network card (192.168.0.4) on the proxy server through the switch, and then pass under the control of the proxy service software The router accesses the Internet.
(2) Configuration of the router
en
config t
int e0 / 0
ip address 211.90.139.41 255.255.255.252
exit
(set the IP address of the Ethernet port)
interface s0 / 0
ip address 211.90.137.25 255.255.255.252
exit
(set the IP address of the WAN port)
ip route 0.0.0.0 0.0.0.0 211.90.137.26
ip routing
(set the dynamic route and activate the route)
end
wr
(save the settings made)
πŸ¦‘Configuration example of proxy server and router part 5


5) Proxy settings

> proxy server must be installed by two network cards, one for connection to the internal LAN, the IP address set for the internal private address (eg: 192.168.0.4 netmask 255.255.255.0) without providing a gateway. The other one is used to connect to the router, set the legal address assigned by Unicom (211.90.139.42 netmask 255.255.255.252), and set its gateway to: 211.90.139.41 (router Ethernet port).

> After setting up the network card according to the above method, install another set of agent software. (For example: MS PROXY SERVER 2.0, WINGATE, etc., please refer to other materials for the installation and debugging methods of the agent software)

6) Workstation setup
(1) INTERNET EXPLORER set
Tools menu -> internet options -> Connections -> LAN Settings -> Use a proxy server -> Address: 192.168.0.4 port: 80> OK


πŸ¦‘Router configuration
en
config t
ip nat pool c2610 211.90.139.41 211.90.139.42 netmask 255.255.255.252
(define an address pool c2601, which contains two free legal IP addresses , For NAT conversion)
int e0 / 0
ip address 192.168.1.1 255.255.255.0
ip nat inside
exit
(set the Ethernet port's IP address and set it as the port to connect to the internal network)
interface s0 / 0
ip address 211.90.137.25 255.255.255.252
ip nat outside
exit
(set the WAN port IP address, and set it as the port to connect to the external network)
ip route 0.0.0.0 0.0.0.0 211.90.137.26
(set dynamic routing)
access-list 2 permit 192.168.0.1 0.0.0.255
(establish access control list)
! Dynamic NAT
!
ip nat inside source list 2 pool c2610 overload
(establish dynamic address translation)
line console 0
exec-timeout 0 0
!
line vty 0 4
end

wr
(save settings made)