UNDERCODE COMMUNITY
2.71K subscribers
1.24K photos
31 videos
2.65K files
82.5K links
πŸ¦‘ Undercode World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE


✨ Youtube.com/Undercode
by Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 Min Linux Steam Requirements-from git sources :

team for Linux requires the following:

1 GHz Pentium 4 or AMD Opteron with:

1) x86-64 (AMD64) instruction set

2) CMPXCHG16B instruction support (cx16 in /proc/cpuinfo flags)

3) SSE3 instruction support (pni in /proc/cpuinfo flags)

4) 512 megabytes of RAM and 5 gigabytes of hard drive space, or better

5) Internet connection (Cable/DSL speeds recommended)

6) Latest Ubuntu LTS, fully updated

7) 64-bit (x86-64, AMD64) Linux kernel

8) 64-bit (x86-64, AMD64) and 32-bit (i386, IA32) graphics drivers and glibc

9) Latest graphics driver

10) NVidia driver support - For recent cards (e.g. series 8), you will need to install 310.x. For older cards, driver 304.x supports the NVidia 6 and 7 GPU series. To access these drivers, first update your cache and then install the specific driver you need from the list in Additional Drivers.

11) AMD driver support - For recent cards (e.g. series 5 and above), we recommend installing the 12.11 driver. For older cards, Catalyst 13.1 Legacy supports the HD 2400 Pro card and is the latest for the 2 and 4 GPU series.

12) Intel HD 3000/4000 driver support - you will need to use the latest Mesa drivers, Mesa 9 or later.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ¦‘ Modify the configuration file

After entering the project interface, click "Help"-> "Edit Custom VM Options…" in the top menu bar of Idea. If you are prompted to create a file, click "Yes".
πŸ¦‘ At the end of the opened vmoptions edit window,




> add:-javaagent: idea\jetbrains-agent.jar
πŸ¦‘ Please carefully check whether the patch path is correct. If it is wrong, the Idea will not open. At this time, you can delete the Idea folder in the user configuration directory:

1) windwos: C: \ Users \ user name \

2) macos: ~ / Library / Preferences /

3) ubuntu: ~

> After modifying the configuration file, restart Idea

4) Enter the activation code

After restarting Idea, click "Help"-> "Register…" in the menu bar, there are two activation methods:

> Choose the last license server activation method, fill in the address: http://jetbrains-license-server(it should be automatically filled in), or click the button: "Discover Server" to automatically fill in the address and complete the activation

5) If the server activation method cannot be activated, you can also select Activation code to activate, copy the activation code below :


pastebin.com/r8A6W7am


6) View the validity period

When your activation is complete, there will be a small registration prompt box in the lower right corner of Idea. The general content is: You copy is Licensed to XXX, it will tell you: Brother, you have activated successfully, and the source of the activation code is : XXX.

7) To check the validity period, click: Help-> About Here you can see the version number, license source, validity period, and some environments of your Idea

There is no time limit for server activation, which is permanently valid

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
The latest IDEA permanent activation tutorial
> How activate pycharm for free
Lastest version
πŸ¦‘CAN'T SAY CRACKED BY UNDERCODE XD, ALREADY REPORTING FOR THEIR TEAM(jetbrain) AND IN NEXT UPDATE THEY WILL PATCH IT I GUESS
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to evaluate OS security ?


---- With the development of the network, enterprises are connecting their local area networks to wide area networks or connecting their internal networks to the Internet. This gives more and more people (internal and external) access to internal network resources. As a result of this exposure, companies urgently need to address network security issues.

---- A major part of providing effective security is to evaluate how well the existing security mechanism is integrated with the enterprise's network security strategy-that is, to judge whether the security strategy is effectively implemented. The increasing complexity of the network makes the implementation of security policies more and more difficult.

---- Evaluating the effectiveness of each network security component is necessary to ensure effective network security. The two main components that provide network security are: firewall and operating system (OS).

---- Many companies put their energies on the firewall, and according to the report provided by Aberdeen Group, the most easily overlooked security holes are those that exist in the operating environment. Some vendors are committed to providing reliable versions of the operating environment, while most only provide optional, installable security services.

---- The operating system's security mechanism helps protect the machine running the OS from unauthorized access. Special protection for unauthorized access to specific information, specific machine instructions, and UNIX superuser instructions within the machine. Most firewalls and the Internet itself are built on a standard, unsecured UNIX operating environment. This is why everyone is not surprised by the existence of security threats. UNIX is very insecure, it is difficult to configure, and configuration errors may cause vulnerabilities.

---- The following two factors make the OS security mechanism very important:

---- (1) A second line of defense is provided behind the firewall. Hackers often break through or bypass firewalls, and OS security policies can effectively protect the system against such intruders.

---- (2) Defense against intruders in the enterprise. Internal intruders are already inside the firewall, and the FBI report indicates that more than 60% of computer crimes come from inside the enterprise. In most cases, the offenders are angry employees or contractors.

---- Evaluating OS security is quite difficult, especially UNIX, because it has many variants and vendors. Assessing the security of a UNIX system requires mastering the following three aspects:

---- (1) UNIX system settings

---- (2) Weaknesses caused by different versions of UNIX applications, including sending mail, FTP, NFS (Network File System) and TFTP (Simple File Transfer Protocol)

---- (3) Provided by different manufacturers Security patches-The

operating system is constantly patching BUGS and adding features to make the evaluation more complicated. These updates introduce new security vulnerabilities. What is needed at this time is a method for automatically evaluating operating system vulnerabilities and automatically implementing security policies. Only in this way can the gap between security strategy and security implementation be effectively assessed and shortened.

---- OS security scanning? The file just provides the required solution. The scanning software runs on each machine and probes each machine through a series of tests to dig out potential weaknesses. This software evaluates the stand-alone security environment from the perspective of the operating system and generates a detailed report of the vulnerabilities it finds, and proposes solutions.
---- System Security Scanner (S3) from ISS is a security assessment tool that facilitates the management and implementation of security policies. It enables companies to implement security policies across heterogeneous operating platforms. Currently, S3 supports most popular UNIX versions, including Linux, SunOS4.1.3, Solaris, HP-UX, and AIX. It helps companies automatically conduct security assessment and maintenance on their operating system platforms. With this effective tool, companies can make full use of the potential of the network and continuously enhance their competitivenessβ€”without worrying about security.

WRitten by Undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ How to evaluate OS security
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to limit the speed of others by wireless router


A) Router settings

1. First log in to your router to set the URL. The editor is 192.168.1.253. Β» DEFAULT IP After entering it in the browser, a login window will appear. Enter the login password to log in!



2. First of all, we can first look at the IP addresses on our router, click on the IP and MAC binding-ARP mapping table in the left navigation! !



3. Then we can see the IP address segment on the router, most of them start with 192.168.1.100! ! Look at the IP address so it's time to set it!



4. Then click on the IP broadband control in the left navigation. Then click on the control rules! !



5. The editor here has already been set, click the button to add a new item without setting!



6. The most important thing is that this rule is set. Your own IP can avoid this rule. For example, you can set the address range to 192.168.1.2-192.168.1.253, and then set your own IP to 192.168.1.254, which is basically Can control the speed of others in all routers! Set the port segment to 20-65535. This editor is also inquiring online. I don't know why. Haha! ! Then it is to control the network speed. Here is a good control according to the size of your network cable, there is no need to set too dead. It's okay to be average! !



7. After setting, click OK! ! Then restart the router! ! You can restart the router directly in the system settings in the router settings page navigation! !


B) Settings on the computer

1. After setting the router, of course, you need your own IP to avoid this rule! Let's check our IP address and DNS first! This is helpful for setting up! Click "Start"-"Run"! Then enter CMD!



2. After clicking OK, enter the code in this black box: ipconfig / all and then remember your DNS address! !



3. Then right-click on Network Neighborhood-Properties! Then right click on Local Area Connection-Properties! Then the following picture will appear! Click Internet Protocol. Then click on properties! !


4. Then set a fixed IP. IP address setting needs to avoid your setting rules in the router! Then the gateway is the address set by your router! DNS is the address that CMD just came out! After entering, click OK! !

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁▁

πŸ¦‘CUSTOMIZE - CREATE YOUR OWN TERMUX USING THOSE TOOLS > oFFICIAL

> This project contains scripts and patches to build packages for the Termux Android application.

>The packages available here are only from main set. We have some additional repositories:

1) https://github.com/termux/game-packages

Game packages, e.g. angband or moon-buggy.

2) https://github.com/termux/science-packages

Science-related packages like gap and gnucap.

3) https://github.com/termux/termux-root-packages

Packages which can be used only on rooted devices. Some stuff available here requires custom kernel (like aircrack-ng or lxc).

4) https://github.com/termux/unstable-packages

Staging repository. Packages that are not stable are only available here.Most likely, new packages will also be placed here.

5) https://github.com/termux/x11-packages

Packages that require X11 Windows System.


▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁▁


πŸ¦‘TOPIC TERMUX SCRIPTS
> WE ALREADY POST ALL USAGE AND TERMUX-LINUX POPULAR SCRIPTS THIS LIST MAY HELPS NEW TERMUX USERS Β» THIS SOURCE WIKI β€”

Termux App ⭐️
Android terminal and Linux environment - app repository.

Aidlearning Framework ⭐️
AidLearning build Linux environment running on the Android devices with GUI, Deep-Learning and Python Visual Programming support. Now support VSCode,Jupyter, pyToApk! One-click install.πŸš€

Termux Packages ⭐️
Android terminal and Linux environment - packages repository.

Hiddeneye ⭐️
Modern Phishing Tool With Advanced Functionality And Multiple Tunnelling Services Android-Support-Available

Tool X ⭐️
Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install almost 370+ hacking tools in termux app and other linux based distributions.

Snoop ⭐️
Snoop β€” инструмСнт Ρ€Π°Π·Π²Π΅Π΄ΠΊΠΈ Π½Π° основС ΠΎΡ‚ΠΊΡ€Ρ‹Ρ‚Ρ‹Ρ… Π΄Π°Π½Π½Ρ‹Ρ… (OSINT world)

Hacktronian ⭐️
All in One Hacking Tool for Linux

Atilo ⭐️
Linux installer for termux

Termuxarch
You can use setupTermuxArch.bash πŸ“² to install Arch Linux in Amazon, Android, Chromebook and Windows. https://sdrausty.github.io/TermuxArch/docs/install
Anlinux App
AnLinux allow you to run Linux on Android without root access.

Gbt ⭐️
Highly configurable prompt builder for Bash, ZSH and PowerShell written in Go.

Termux Api ⭐️
Termux add-on app which exposes device functionality as API to command line programs.

Termux Adb ⭐️
Install ADB & FastBoot Tools in Termux!

Termux Archlinux ⭐️
You can use setupTermuxArch.bash to install Arch Linux in Termux on Amazon, Android, Chromebook and Windows. https://sdrausty.github.io/termux-archlinux/

Zphisher ⭐️
Automated Phishing Tool

Easyhack ⭐️
Hack the World using Termux

Bombers ⭐️
SMS/Email/Whatsapp bombers Collection πŸ’£

Gcc
termux ⭐️
Gcc for termux with fortran scipy etc... Use apt for newest updates instructions in README.txt

Termux Styling ⭐️
Termux add-on app for customizing the terminal font and color theme.

Hackerpro ⭐️
All in One Hacking Tool for Linux & Android (Termux). Make your linux environment into a Hacking Machine. Hackers are welcome in our blog

Telegram Scraper ⭐️
telegram group scraper tool. fetch all information about group members

Covid19 Tracker Cli ⭐️
A curl-based command line tracker for Novel Coronavirus or COVID-19 pandemic. It Supports terminal for linux and macos, command prompt for windows, and termux for android with real-time updates. curl -L covid19.trackercli.com

Lightnovel Crawler ⭐️
An app to download novels from online sources and generate e-books.

Buildapks ⭐️
Really quickly build APKs on handheld device (smartphone and tablet) in Amazon, Android, Chromebook, PRoot and WindowsπŸ“² See https://buildapks.github.io/docsBuildAPKs/setup to start building APKs.

Txtool ⭐️
an easy pentesting tool.

Termux Api Package ⭐️
Termux package containing scripts to call functionality in Termux:API.

Termux Boot ⭐️
Termux add-on app allowing programs to be run at boot.

Debian On Termux
HOWTO install plain Debian 10 (buster) on your non-rooted Android smartphone

Termux Style
Simple Program for customizing the termux font and color theme...

Andronixorigin
This is the official repository for the back end of the Andronix app πŸš€.
πŸ’£ Impulse Denial-of-service ToolKit

Proot
An chroot-like implementation using ptrace.

Termuxalpine
Use TermuxAlpine.sh calling to install Alpine Linux in Termux on
Android. This setup script will attempt to set Alpine Linux up in your Termux environment.

Anlinux Resources
Image and Script for LinuxOnAndroid App

Nexphisher

Hackapk
An Advanced Tool For Complete Apk-Modding In Termux ...

X11 Packages
Packages using the X Window System.

Termux Widget

Termux add-on app which adds shortcuts to commands on the home screen.

Termux Desktop
Setup A Beautiful Desktop/GUI In Termux

Termux.github.io


▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁▁

πŸ¦‘WIKILEAKS DARKWEB- .ONION 2020 SITES
7/24 & 24/24 ONLINE

http://6sgjmi53igmg7fm7.onion/index.php?title=Main_Page –
Bugged Planet

http://faerieuaahqvzgby.onion/ – Fairie Underground

http://2r2tz6wzqh7gaji7.onion/ – Kavkaz Center

http://tnysbtbxsf356hiy.onion/ – The New Yorker Strongbox

http://duskgytldkxiuqc6.onion/ – Example rendezvous points page

http://rrcc5uuudhh4oz3c.onion/ – The Intel Exchange Forum :: Information and discussion on various topics, ranging from Illegal Activities and Alternative Energy, to Conspiracy Theories and Hacking. Same people from SnapBBS on a fully secure, moderated and categorized forum.

http://opnju4nyz7wbypme.onion/weblog/index.html – A7B blog :: a blog dedicated to the restoration of a limited constitutional republic in the USA

http://assmkedzgorodn7o.onion/ – Anonymous, safe, secure, crowdfunded assassinations.

http://duskgytldkxiuqc6.onion/comsense.html – Commo Sense by Thomas Paine

http://nwycvryrozllb42g.onion/ – Destination Unknown

http://zbnnr7qzaxlk5tms.onion/ – Wiki Leaks



▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁▁
πŸ‘1