UNDERCODE COMMUNITY
2.66K subscribers
1.23K photos
31 videos
2.65K files
79.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Tool to increase YouTube views


πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/but3k4/youtube-views

2) $ sudo pip3 install -r requirements.txt
Optional (Incomplete)
If you want, you can install tor and privoxy, once selenium does not work very well with socks proxy.

3) Install Tor and on Mac OS X
$ brew install tor

4) Install Tor on Debian
$ sudo apt-get update
$ sudo apt-get install tor

5) Install Tor on ArchLinux
$ sudo pacman -Sy tor

πŸ¦‘Usage

$ python3 bot.py --help
usage: bot.py [--visits VISITS] [--url URL] [--proxy PROXY] [--enable-tor]
[-v] [-h]

Tool to increase YouTube views

> Main Arguments:
--visits VISITS amount of visits per video, default: 1
--url URL YouTube video url
--proxy PROXY set the proxy server to be used. e.g: 127.0.0.1:8118
--enable-tor enable TOR support (You must have installed TOR at your
system)

πŸ¦‘Example
$ python3 bot.py --visits 2 --url https://www.youtube.com/watch?v=HAQQUDbuudY --verbose


βœ…Verified
@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How sim jacking work ?

1) The attacker sends an SMS with hidden instructions from the Sim App Toolkit

2) Phone receives SMS, S@T Browser on the SIM recognizes the commands

3) The attacks are completely silent. The victim never receives a message in their inbox.

4)The attack targets the S@T Browser, meaning it doesn't matter what kind of device the user is on

5) Attacks are accomplished via sending binary code

We likely won't ever see official source code, but we are surrounded by very intelligent people and someone will replicate this attack in time.


git sources @UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How find exploits-bugs :

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) $ git clone https://github.com/rfunix/Pompem.git

2) cd Pompem

3) $ pip3.5 install -r requirements.txt

4) $ python3.5 pompem.py -h

5) Examples of use:

$ python3.5 pompem.py -s Wordpress
$ python3.5 pompem.py -s Joomla --html
$ python3.5 pompem.py -s "Internet Explorer,joomla,wordpress" --html
$ python3.5 pompem.py -s FortiGate --txt
$ python3.5 pompem.py -s ssh,ftp,mysql

βœ…Verified by Undercode on

>ubuntu

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
any doubt feel free to ask us

t.me/UndercodeTesting
cross site injection-how fonction
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Updated automating cracking methodologies through Hash

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/trustedsec/hate_crack.git

2) Customize binary and wordlist paths in "config.json"

3) Make sure that at least "rockyou.txt" is within your "wordlists" path

4) mkdir -p hashcat/deps

5) git clone https://github.com/KhronosGroup/OpenCL-Headers.git

6) hashcat/deps/OpenCL

7) cd hashcat/

8) make

9) make install

10 ) to run :
$ ./hate_crack.py usage: python hate_crack.py <hash_file> <hash_type>

πŸ¦‘Quick Crack

> Runs a dictionary attack using all wordlists configured in your "hcatOptimizedWordlists" path and optionally applies a rule that can be selected from a list by ID number. Multiple rules can be selected by using a comma separated list, and chains can be created by using the '+' symbol.

πŸ¦‘Which rule(s) would you like to run?
(1) best64.rule
(2) d3ad0ne.rule
(3) T0XlC.rule
(4) dive.rule
(99) YOLO...run all of the rules

> Now Enter Comma separated list of rules you would like to run. To run rules chained use the + symbol.
For example 1+1 will run best64.rule chained twice and 1,2 would run best64.rule and then d3ad0ne.rule sequentially.
Choose options ..


βœ…
@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁