UNDERCODE COMMUNITY
2.71K subscribers
1.24K photos
31 videos
2.65K files
82.7K links
πŸ¦‘ Undercode World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE


✨ Youtube.com/Undercode
by Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Termux-linux
> Automater is a URL/Domain, IP Address, and Md5 Hash OSINT tool aimed at making the analysis process easier for intrusion Analysts. Given a target (URL, IP, or HASH) or a file full of targets Automater will return relevant results from sources like the following: IPvoid.com, Robtex.com, Fortiguard.com, unshorten.me, Urlvoid.com, Labs.alienvault.com, ThreatExpert, VxVault, and VirusTotal.

πŸ¦‘π•ƒπ”Όπ•‹'π•Š π•Šπ•‹π”Έβ„π•‹ :

1) git clone https://github.com/1aN0rmus/TekDefense-Automater.git

2) python Automater.py -h

3) ./Automater.py -h

usage: Automater.py -h -o OUTPUT -w WEB -c CSV -d DELAY -s SOURCE

--p

target

4) To run Automater against a target ip, hash, url, or file simply type

Python Automater.py <target>

βœ…Verified by Undercode

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁▁

πŸ¦‘Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. Hence Dracnmap is designed to perform fast scaning with the utilizing script engine of nmap and nmap can perform va…
fb.com/UndercodeTesting

πŸ¦‘π•ƒπ”Όπ•‹'π•Š π•Šπ•‹π”Έβ„π•‹ :

1)git clone https://github.com/Screetsec/Dracnmap.git
2)cd Dracnmap
3)chmod +x Dracnmap.sh
4)sudo ./Dracnmap.sh or sudo su ./Dracnmap.sh

> for termux
> require nmap + root

βœ…Verified as good tool

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘A DEFINITION OF FTP SECURITY-

File Transfer Protocol (FTP) is a standard network protocol used to transfer files between computers over the Internet. FTP is built on client-server architecture and was developed by Abhay Bhushan in 1971. The protocol is still commonly used today, but FTP security is a major concern that can limit its usage when not addressed.

> FTP was not built to be secure. It is generally considered to be an insecure protocol because it relies on clear-text usernames and passwords for authentication and does not use encryption. Data sent via FTP is vulnerable to sniffing, spoofing, and brute force attacks, among other basic attack methods.

-wiki
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘BEST FTP SERVERS 2020 :

https://filezilla-project.org/download.php?type=server

https://www.solarwinds.com/free-tools/free-sftp-server?CMP=BIZ-RVW-ADP-SFTPFT-sftp-LM-Q419

https://www.solarwinds.com/ftp-server-software?CMP=BIZ-RVW-ADP-servu-ftp-LM-Q419

https://www.cerberusftp.com/

https://titanftp.com/

βœ…
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Playing Modem under Linux
γ€€
> Modem can be described as one of the most difficult devices under Linux. It is the source of many disappointments and joys when we use Linux.
instagram.com/UndercodeTesting

1) port Modem type

γ€€γ€€computer interface that has many internal and external world, part of the interface is proprietary, such as the keyboard interface can connect a keyboard and not connected to any other device, not even a mouse.

γ€€γ€€
2) The multi-purpose interface for connecting external devices is called "Port". Most PCs have two serial ports and one parallel port. The serial port uses one line to transmit data serially, one data bit at a time, and it is combined into bytes after reception. The parallel port uses eight lines to transmit 8 data bits in parallel at a time. Most home printers are connected to the parallel port of the PC.

γ€€γ€€
3) Modem is a device that transmits digital information through a telephone line. We know that the telephone system was originally designed only to transmit voice information. Modem technology has broken through this limitation. It can modulate (modulate) digital information and convert the digital information into analog signals that can be sent over the telephone line. At the receiving end, the analog signal is converted back to a digital signal (ie, demodulated). The word Modem is derived from the abbreviation of modulator-demodulator.

γ€€γ€€
4) Modem was invented in the era of serial port widely used. Modems at that time were all independent devices outside the computer, connected to the serial port through cables. Today we can still see this external modem, but more is the modem card inserted into the motherboard, that is, the built-in modem. Since most computers have two serial ports, the built-in Modem usually adds a third port.

γ€€γ€€
5) The setting of the external modem is generally quite simple. Just connect the cable between the serial port and the modem, connect the telephone line, and turn on the power. Most external modems can start working directly.

γ€€γ€€
6) When the built-in Modem first appeared, it always had all the circuit elements needed for communication on the board, and provided jumpers to set the address and IRQ. Hardware manufacturers are always looking for ways to reduce costs. With the PC function getting better and better, Modem manufacturers began to replace some circuit components with software. These Modems are called soft Modems or Winmodems. Soft Modem is inexpensive, and it uses device drivers to complete some of the tasks that had to be done by the circuit elements of the Modem card.

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Random Tips- by Undercode
>The problem with soft modems


1) is that its drivers are written for Windows and not for Linux. Although there is no particular reason why the Linux version of this driver cannot be written, but ultimately it depends on the modem manufacturer. So far no manufacturer has done this. This means that the soft modem cannot work under Linux.

γ€€γ€€
2) When buying a Modem, you should pay attention to whether it indicates Linux compatibility. The list of soft modems can be found at http://www.o2.net/~gromitkc/winmodem.html. According to experience, if the Modem box is marked with "HCF", "HSP", "Winmodem" or "soft modem", then it may not be available for Linux. γ€€γ€€Most accessories of the

bus, interrupt, address and PnP

3) PC are inserted directly into the motherboard together with the CPU and memory. The motherboard provides many expansion card interfaces for the access of devices such as display cards and modems. There are also many motherboards that integrate these functions directly, so there is no need to add these expansion cards. Many Modems integrated into the motherboard can work smoothly under Linux.

γ€€γ€€
4) The interface on the motherboard is connected to the system bus. There are many types of buses. Older PCs use the ISA bus and newer PCs use the PCI bus. There are other bus types, but usually only these two buses are involved. The physical and electrical characteristics of these buses are incompatible, and ISA cards must never be inserted into PCI slots, so be sure to understand the available buses before purchasing a modem. Unless your machine is very old, generally it will support PCI.

γ€€γ€€
5) Before the computer establishes contact with the newly inserted card, the computer must know the card's I / O address (input / output address) and interrupt request line.

γ€€γ€€
6) When the computer wants to communicate with a card inserted into the system bus, it selects the card by sending an I / O address. Each card only answers its own address. All cards must have different addresses.

γ€€γ€€
7) Interrupt is a bit more complicated. When we enter a URL address in the browser, a connection to the target website is established, and the modem begins to receive data; at the same time, the computer can also do other things, such as monitoring the mouse status, printout, and so on. The computer should not focus exclusively on one thing alone. There should be a way for the modem to tell the computer: "Excuse me, there is data sent to you here. This method is interruption.

γ€€γ€€
8) Each interrupt has a unique number, called IRQ. IRQ is the abbreviation of Interrupt ReQuest. There are a lot of interrupts, and you must figure out what device each interrupt is assigned to. For example, if the interrupt comes from the modem, you should not check the mouse.

γ€€γ€€
9) Early expansion cards provided jumpers for users to set their I / O address and IRQ. This method is easy to make mistakes, for example, it is easy to set two cards to the same address or IRQ. To solve this problem, software and hardware manufacturers have jointly established a standard that allows computers to actively query each expansion card and assign I / O addresses and IRQs. It not only automates the allocation of addresses and IRQs, but also avoids possible conflicts. This standard is "Plug and Play", or Plug and Play, or PnP for short.

γ€€γ€€
10) The first software that runs when the computer starts is the BIOS (Basic Input Output System). The BIOS wakes up all the devices of the computer, simply checks which devices are installed on the computer, and then loads the operating system. Many configuration tasks of PnP devices are done by the BIOS, but there are also some tasks to be done by the operating system. Linux has not yet provided complete PnP support. Although many PnP devices can be configured to work under Linux, there are many that cannot.
11) If Linux does not initialize a PnP device, don't despair about it immediately, there is a possible solution. Please check the isapnp tool documentation, Modem-HOWTO can also help. If the list of compatible devices includes this type of Modem, whether it is PnP or not, it is likely to work smoothly without any additional effort.

12) There are three most common problems with installing a modem: conflicting I / O address or IRQ settings, using a soft modem, and imperfect PnP support causing modem configuration errors.

@UndercodetESTING
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘γ€€If you use KDE, kppp is an excellent tool to help you configure and manage your Internet connection. Most Linux distributions provide kppp. Note that before establishing a dial-up connection, you must collect the necessary information, such as user name, password, phone number, and DNS server address. The following is the specific configuration process.

πŸ¦‘Step 1: Specify the Modem installed in the system to

γ€€γ€€start kppp. If you cannot find it on the KDE menu, try the / usr / bin / kppp command.

γ€€γ€€The first thing to do is to let kppp know where the modem is. Click the Setup button and select "Device" in the configuration window.

γ€€γ€€Click the arrow next to "Modem Device:", a list of available modem ports appears, and select the port to which the modem is connected. Next, set the "Connection Speed:" to 115200, of course, if the machine supports this speed can be set higher.

πŸ¦‘Step 2: Test Modem

γ€€γ€€To test the Modem, first select the "Modem" page. Click the "Query Modem" button, and a window will appear showing the progress of the query Modem. Make sure that "Modem Volumn" (volume) is set in the middle of the indicator bar, so that you can hear the sound when the modem is working.

γ€€γ€€If kppp cannot find the Modem, you can go back to step 1 and try another port (or speed).

γ€€γ€€Step 3: Set the account parameters

γ€€γ€€you can then set up the account parameters. Return to the "Accounts" page and select "New" to set up a new account.

γ€€γ€€Under the "Dial" page, take a name that makes it easy to remember the dialing target (recommended to use the name of the ISP) and enter it in the "Connection Name" box. Then enter the phone number of the ISP into the "Phone Number" box.

γ€€γ€€Now select the "IP" page and check the "Dynamic IP Address" check box (if your ISP provides a fixed IP address, do not check this option). On the DNS page, enter the IP address of the DNS server provided by the ISP.

γ€€γ€€Click OK to save the newly created account. Click OK again to close the "Configuration" window.

πŸ¦‘Step 4: Connect

γ€€γ€€Now we are back to the original kppp window. Enter the user name and password, and then click the "Connect" button.

γ€€γ€€If the computer can connect to the modem, it will start dialing to the set ISP. At this time, you can hear the sound of Modem dialing.

Testing the Modem with Minicom

@UndercodetESTING
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘2020 deepweb .onion links PayPal and more :
24/24 or 7/24

http://ow24et3tetp6tvmk.onion/ – OnionWallet – Anonymous Bitcoin Wallet and Bitcoin Laundry

http://qc7ilonwpv77qibm.onion/ – Western Union Exploit

http://3dbr5t4pygahedms.onion/ – ccPal Store

http://y3fpieiezy2sin4a.onion/ – HQER – High Quality Euro Replicas

http://qkj4drtgvpm7eecl.onion/ – Counterfeit USD

http://nr6juudpp4as4gjg.onion/pptobtc.html – PayPal to BitCoins

http://nr6juudpp4as4gjg.onion/doublecoins.html – Double Your
BitCoins Β»>non verified this one by undercode

http://lw4ipk5choakk5ze.onion/raw/4588/ – High Quality Tutorials

βœ…> source hiddenwiki-verified @undercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘HOW CRACK APK FULL BY UNDERCODE + PICTURES :

> [Original] Remember an app in-app purchase cracking-the first experience of Android reverse rookie
πŸ¦‘toolS FOR APK :

1) Android killer v1.3.1.0-used to search for strings and repackagE

2) Apktool Box v1.6.4-used to obtain debugging start commands

3) android7.0-used to run apk

4) Android Studio 2.3.3 (install smideea-0.0.5 plug-in)-used to debug smali source code

5) Jadx-gui 0.7.1-used to view smali decompilation source code, in fact, AK also has decompilation function, but AK decompilation is not as good as jadx, I found that switchcase structure AK is always translated into ifelse structure.

6) Build and debug environment
1) Repackage to generate adjustable APK :

> Debugging smali with AS requires apk to set the debug logo (otherwise AS will display an error: Unable to open debugger port (localhost: 7800): java.net.SocketException "connection reset"), open the apk with AK, and open the file from the project manager bar androidmanifest.xml, add the following code in the application item:
<font style="vertical-align: inherit;"><font style="vertical-align: inherit;">android: debuggable = "true"</font></font>
2) Then select the menu android-> Compile and repackage the APK. And install it in Mi 5.