UNDERCODE COMMUNITY
2.73K subscribers
1.24K photos
31 videos
2.65K files
84.2K links
πŸ¦‘ Undercode World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE


✨ Youtube.com/Undercode
by Undercode.help
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Tool to increase YouTube views


πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/but3k4/youtube-views

2) $ sudo pip3 install -r requirements.txt
Optional (Incomplete)
If you want, you can install tor and privoxy, once selenium does not work very well with socks proxy.

3) Install Tor and on Mac OS X
$ brew install tor

4) Install Tor on Debian
$ sudo apt-get update
$ sudo apt-get install tor

5) Install Tor on ArchLinux
$ sudo pacman -Sy tor

πŸ¦‘Usage

$ python3 bot.py --help
usage: bot.py [--visits VISITS] [--url URL] [--proxy PROXY] [--enable-tor]
[-v] [-h]

Tool to increase YouTube views

> Main Arguments:
--visits VISITS amount of visits per video, default: 1
--url URL YouTube video url
--proxy PROXY set the proxy server to be used. e.g: 127.0.0.1:8118
--enable-tor enable TOR support (You must have installed TOR at your
system)

πŸ¦‘Example
$ python3 bot.py --visits 2 --url https://www.youtube.com/watch?v=HAQQUDbuudY --verbose


βœ…Verified
@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How sim jacking work ?

1) The attacker sends an SMS with hidden instructions from the Sim App Toolkit

2) Phone receives SMS, S@T Browser on the SIM recognizes the commands

3) The attacks are completely silent. The victim never receives a message in their inbox.

4)The attack targets the S@T Browser, meaning it doesn't matter what kind of device the user is on

5) Attacks are accomplished via sending binary code

We likely won't ever see official source code, but we are surrounded by very intelligent people and someone will replicate this attack in time.


git sources @UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How find exploits-bugs :

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) $ git clone https://github.com/rfunix/Pompem.git

2) cd Pompem

3) $ pip3.5 install -r requirements.txt

4) $ python3.5 pompem.py -h

5) Examples of use:

$ python3.5 pompem.py -s Wordpress
$ python3.5 pompem.py -s Joomla --html
$ python3.5 pompem.py -s "Internet Explorer,joomla,wordpress" --html
$ python3.5 pompem.py -s FortiGate --txt
$ python3.5 pompem.py -s ssh,ftp,mysql

βœ…Verified by Undercode on

>ubuntu

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
any doubt feel free to ask us

t.me/UndercodeTesting
cross site injection-how fonction