UNDERCODE COMMUNITY
2.72K subscribers
1.24K photos
31 videos
2.65K files
83.9K links
πŸ¦‘ Undercode World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE


✨ Youtube.com/Undercode
by Undercode.help
Download Telegram
Support & Share πŸ™‚

T.me/UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

Execution logging and tracing :


πŸ¦‘ Wireshark - A free and open-source packet analyzer

πŸ¦‘ tcpdump - A powerful command-line packet analyzer; and libpcap, a portable C/C++ library for network traffic capture

πŸ¦‘ mitmproxy - An interactive, SSL-capable man-in-the-middle proxy for HTTP with a console interface

πŸ¦‘ Charles Proxy - A cross-platform GUI web debugging proxy to view intercepted HTTP and HTTPS/SSL live traffic

πŸ¦‘ usbmon - USB capture for Linux.

πŸ¦‘ USBPcap - USB capture for Windows.

πŸ¦‘ dynStruct - structures recovery via dynamic instrumentation.

πŸ¦‘ drltrace - shared library calls tracing.

@UndercodeTesting
git sources
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Core Technology-Code Example :
EXPERT HACKING BY UNDERCODE :

You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
***********************************************************************/

/* 1 */
#define KERNEL

#include <linux/kernel.h>
#include <linux/sched.h>
#include <linux/tty.h>
#include <linux/signal.h>
#include <linux/errno.h>
#include <linux/malloc.h>

#include <asm/io.h>
#include <asm/segment.h>
#include <asm/system.h>
#include <asm/irq.h>

#include "tdd.h"

/* 2 */
static int tdd_trace;
static int write_busy;
static int read_busy;
static struct tdd_buf *qhead;
static struct tdd_buf *qtail;

/* 3 */
static int tdd_read(struct inode *, struct file *, char *, int);
static int tdd_write(struct inode *, struct file *, char *, int);
static int tdd_ioctl(struct inode *, struct file *, unsigned int,
unsigned long);
static int tdd_open(struct inode *, struct file *);
static void tdd_release(struct inode *, struct file *);
extern void console_print(char *);

struct file_operations tdd_fops =
{
NULL,
tdd_read,
tdd_write,
NULL,
NULL,
tdd_ioctl,
NULL,
tdd_open,
tdd_release,
NULL,
NULL,
NULL,
NULL
};

]
init.c

/*******************************************************

This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.

This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.

You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
***********************************************************************/

void tdd_init(void)
{
tdd_trace = TRUE;

if (register_chrdev(30, "tdd", &tdd_fops))
TRACE_TXT("Cannot register tdd driver as major device 30")
else
TRACE_TXT("Tiny device driver registered successfully")

--------------------------------------------------------------------------------
newthread

/*******************************************************
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.

This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.

You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software

***********************************************************************/

new_thread(int (*start_addr)(void), int stack_size)
{
struct context *ptr;
int esp;

/* 1 */
if (!(ptr = (struct context *)malloc(sizeof(struct context))))
return 0;

/* 2 */
if (!(ptr->stack = (char *)malloc(stack_size)))
return 0;

/* 3 */
esp = (int)(ptr->stack+(stack_size-4));
*(int *)esp = (int)exit_thread;
*(int *)(esp-4) = (int)start_addr;
*(int *)(esp-icon_cool.gif = esp-4;
ptr->ebp = esp-8;
Forwarded from Backup Legal Mega
/* 4 */
if (thread_count++)
{
/* 5 */
ptr->next = current->next;
ptr->prev = current;
current->next->prev = ptr;
current->next = ptr;
}
else
{
/* 6 */
ptr->next = ptr;
ptr->prev = ptr;
current = ptr;
switch_context(&main_thread, current);
}

return 1;
}

--------------------------------------------------------------------------------
exitthead

/*******************************************************
This program is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or
(at your option) any later version.

This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.

You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
***********************************************************************/

static exit_thread(void)
{
struct context dump, *ptr;

/* 1 */
if (--thread_count)
{
/* 2 */
ptr = current;
current->prev->next = current->next;
current->next->prev = current->prev;
current = current->next;
free(ptr->stack);
free(ptr);
switch_context(&dump, current);
}
else
{
/* 3 */
free(current->stack);
free(current);
switch_context(&dump, &main_thread);
}
}


getchannel

/*******************************************************

written by @Undercoder
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
πŸ¦‘This one for experts
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

2020 Hex editors :

πŸ¦‘ HxD - A hex editor which, additionally to raw disk editing and modifying of main memory (RAM), handles files of any size

πŸ¦‘ WinHex - A hexadecimal editor, helpful in the realm of computer forensics, data recovery, low-level data processing, and IT security

πŸ¦‘ wxHexEditor

πŸ¦‘ Synalize It/Hexinator -

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

USEFULL TOOLS FOR PRO HACKERS :


πŸ¦‘ Binwalk - Detects signatures, unpacks archives, visualizes entropy.

πŸ¦‘ Veles - a visualizer for statistical properties of blobs.

πŸ¦‘ Kaitai Struct - a DSL for creating parsers in a variety of programming languages. The Web IDE is particulary useful fir reverse-engineering.

πŸ¦‘ Protobuf inspector

πŸ¦‘ DarunGrim - executable differ.

πŸ¦‘ DBeaver - a DB editor.

πŸ¦‘ Dependencies - a FOSS replacement to Dependency Walker.

πŸ¦‘ PEview - A quick and easy way to view the structure and content of 32-bit Portable Executable (PE) and Component Object File Format (COFF) files

πŸ¦‘ BinText - A small, very fast and powerful text extractor that will be of particular interest to programmers.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

USEFULL TOOLS FOR PRO HACKERS :


πŸ¦‘ Binwalk - Detects signatures, unpacks archives, visualizes entropy.

πŸ¦‘ Veles - a visualizer for statistical properties of blobs.

πŸ¦‘ Kaitai Struct - a DSL for creating parsers in a variety of programming languages. The Web IDE is particulary useful fir reverse-engineering.

πŸ¦‘ Protobuf inspector

πŸ¦‘ DarunGrim - executable differ.

πŸ¦‘ DBeaver - a DB editor.

πŸ¦‘ Dependencies - a FOSS replacement to Dependency Walker.

πŸ¦‘ PEview - A quick and easy way to view the structure and content of 32-bit Portable Executable (PE) and Component Object File Format (COFF) files

πŸ¦‘ BinText - A small, very fast and powerful text extractor that will be of particular interest to programmers.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

2020 Web Hacking tools :
> source git


πŸ¦‘ Spyse - Data gathering service that collects web info using OSINT. Provided info: IPv4 hosts, domains/whois, ports/banners/protocols, technologies, OS, AS, maintains huge SSL/TLS DB, and more... All the data is stored in its own database allowing get the data without scanning.

πŸ¦‘ sqlmap - Automatic SQL injection and database takeover tool

πŸ¦‘ NoSQLMap - Automated NoSQL database enumeration and web application exploitation tool.

πŸ¦‘ tools.web-max.ca - base64 base85 md4,5 hash, sha1 hash encoding/decoding

πŸ¦‘ VHostScan - A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages.

πŸ¦‘ SubFinder - SubFinder is a subdomain discovery tool that discovers valid subdomains for any target using passive online sources.

πŸ¦‘ Findsubdomains - A subdomains discovery tool that collects all possible subdomains from open source internet and validates them through various tools to provide accurate results.

πŸ¦‘ badtouch - Scriptable network authentication cracker

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 Hacking Network TOP RATED TOOLS :
>SOURCE GIT

πŸ¦‘ NetworkMiner - A Network Forensic Analysis Tool (NFAT)

πŸ¦‘ Paros - A Java-based HTTP/HTTPS proxy for assessing web application vulnerability

πŸ¦‘ pig - A Linux packet crafting tool

πŸ¦‘ findsubdomains - really fast subdomains scanning service that has much greater opportunities than simple subs finder(works using OSINT).

πŸ¦‘ cirt-fuzzer - A simple TCP/UDP protocol fuzzer.

πŸ¦‘ ASlookup - a useful tool for exploring autonomous systems and all related info (CIDR, ASN, Org...)

πŸ¦‘ ZAP - The Zed Attack Proxy (ZAP) is an easy to use integrated penetration testing tool for finding vulnerabilities in web applications

πŸ¦‘ mitmsocks4j - Man-in-the-middle SOCKS Proxy for Java

πŸ¦‘ ssh-mitm - An SSH/SFTP man-in-the-middle tool that logs interactive sessions and passwords.

πŸ¦‘ nmap - Nmap (Network Mapper) is a security scanner

πŸ¦‘ Aircrack-ng - An 802.11 WEP and WPA-PSK keys cracking program

πŸ¦‘ Nipe - A script to make Tor Network your default gateway.

πŸ¦‘ Habu - Python Network Hacking Toolkit

πŸ¦‘ Wifi Jammer - Free program to jam all wifi clients in range

πŸ¦‘ Firesheep - Free program for HTTP session hijacking attacks.

πŸ¦‘ Scapy - A Python tool and library for low level packet creation and manipulation

πŸ¦‘ Amass - In-depth subdomain enumeration tool that performs scraping, recursive brute forcing, crawling of web archives, name altering and reverse DNS sweeping

πŸ¦‘ sniffglue - Secure multithreaded packet sniffer

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 Forensic tools- top rated :
> git sources


πŸ¦‘ Autopsy - A digital forensics platform and graphical interface to The Sleuth Kit and other digital forensics tools

πŸ¦‘ sleuthkit - A library and collection of command-line digital forensics tools

πŸ¦‘ EnCase - The shared technology within a suite of digital investigations products by Guidance Software

πŸ¦‘ malzilla - Malware hunting tool

πŸ¦‘ IPED - Indexador e Processador de EvidΓƒΒͺncias Digitais - Brazilian Federal Police Tool for Forensic Investigation

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

2020 Cryptography tools-top rated
> git sources


1) xortool - A tool to analyze multi-byte XOR cipher

2) John the Ripper - A fast password cracker

3) Aircrack - Aircrack is 802.11 WEP and WPA-PSK keys cracking program.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

Wargame- 2020 most popular :

πŸ¦‘ OverTheWire - Semtex

πŸ¦‘ OverTheWire - Vortex

πŸ¦‘ OverTheWire - Drifter

πŸ¦‘ pwnable.kr - Provide various pwn challenges regarding system security

πŸ¦‘ Exploit Exercises - Nebula

πŸ¦‘ SmashTheStack

πŸ¦‘ HackingLab



▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

> 2020 Reverse Engineering-most popular-Helfull :

πŸ¦‘ Reversing.kr - This site tests your ability to Cracking & Reverse Code Engineering

πŸ¦‘ CodeEngn - (Korean)

πŸ¦‘ simples.kr - (Korean)

πŸ¦‘ Crackmes.de - The world first and largest community website for crackmes and reversemes

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

2020 CTF

#Competition :

πŸ¦‘ DEF CON

πŸ¦‘ CSAW CTF

πŸ¦‘ hack.lu CTF

πŸ¦‘ Pliad CTF

πŸ¦‘ RuCTFe

πŸ¦‘ Ghost in the Shellcode

πŸ¦‘ PHD CTF

πŸ¦‘ SECUINSIDE CTF

πŸ¦‘ Codegate CTF

πŸ¦‘ Boston Key Party CTF

πŸ¦‘ ZeroDays CTF

πŸ¦‘ InsomniÒ€ℒhack

πŸ¦‘ Pico CTF

πŸ¦‘ prompt(1) to win - XSS Challeges

πŸ¦‘ HackTheBox

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

2020 General hacking :
> top git resources :


πŸ¦‘ Hack+ - An Intelligent network of bots that fetch the latest InfoSec content.

πŸ¦‘ CTFtime.org - All about CTF (Capture The Flag)

πŸ¦‘ WeChall

πŸ¦‘ CTF archives (shell-storm)

πŸ¦‘ Rookit Arsenal - OS RE and rootkit development

πŸ¦‘ Pentest Cheat Sheets - Collection of cheat sheets useful for pentesting

πŸ¦‘ Movies For Hackers - A curated list of movies every hacker & cyberpunk must watch.

πŸ¦‘ Hopper's Roppers Intro. to CTF Course - A free course that teaches the fundamentals of forensics, cryptography, and web-exploitation required to be successful in Capture the Flag competitions.

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

2020 Post exploitation populars :


πŸ¦‘ empire - A post exploitation framework for powershell and python.

πŸ¦‘ silenttrinity - A post exploitation tool that uses iron python to get past powershell restrictions.

πŸ¦‘ ebowla - Framework for Making Environmental Keyed Payloads


▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Updated Empire is a PowerShell and Python post-exploitation agent.


πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½:

1) git clone https://github.com/EmpireProject/Empire.git

2) Initial Setup

> Run the ./setup/install.sh script. This will install the few dependencies and run the ./setup/setup_database.py script. The setup_database.py file contains various setting that you can manually modify

3) and then initializes the ./data/empire.db backend database. No additional configuration should be needed- hopefully everything works out of the box.

4) Running ./empire will start Empire, and ./empire –debug will generate a verbose debug log at ./empire.debug. The included ./setup/reset.sh will reset/reinitialize the database and launch Empire in debug mode.

> [for more](http://www.powershellempire.com/?page_id=110)

βœ…@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁