UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.3K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
admin_login_dorks.txt
4.3 KB
Admin Login Dorks 2020- git source
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Termux Fast tip Ubuntu chroot on termux

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1️⃣A script to install Ubuntu chroot in Termux

You need to install wget and proot in Termux before using this script.

pkg install wget proot

2️⃣The script will make its files in the current directory. So if you want your Ubuntu-filesystem at a particular location switch to that folder first and then call the script with it's relative path. Example:

> mkdir -p ~/jails/ubuntu

> cd ~/jails/ubuntu

> wget https://raw.githubusercontent.com/Neo-Oli/termux-ubuntu/master/ubuntu.sh

> bash ubuntu.sh

3️⃣After running it you can run "start-ubuntu.sh" to switch into your ubuntu

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘SPYWARES & TRACKING 2020 LIST 3 :


- S3BucketList - Firefox Plugin The Lists Amazon S3 Buckets Found In Requests

- Locator - Geolocator, Ip Tracker, Device Info By URL (Serveo And Ngrok)

- Guardedbox - Online Client-Side Manager For Secure Storage And Secrets Sharing

- Faraday v3.11 - Collaborative Penetration Test and Vulnerability Management Platform

- Minimalistic-offensive-security-tools - A Repository Of Tools For Pentesting Of Restricted And Isolated Environments

- Carina - Webshell, Virtual Private Server (VPS) And cPanel Database

- Nishang - Offensive PowerShell For Red Team, Penetration Testing And Offensive Security

- Web Hacker's Weapons - A Collection Of Cool Tools Used By Web Hackers

- S3BucketList - Firefox Plugin The Lists Amazon S3 Buckets Found In Requests

- Locator - Geolocator, Ip Tracker, Device Info By URL (Serveo And Ngrok)

- Guardedbox - Online Client-Side Manager For Secure Storage And Secrets Sharing

- Faraday v3.11 - Collaborative Penetration Test and Vulnerability Management Platform

- Minimalistic-offensive-security-tools - A Repository Of Tools For Pentesting Of Restricted And Isolated Environments

- Carina - Webshell, Virtual Private Server (VPS) And cPanel Database
- Nishang - Offensive PowerShell For Red Team, Penetration Testing And Offensive Security

- Web Hacker's Weapons - A Collection Of Cool Tools Used By Web Hackers

βœ…GIT SOURCES
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Termux for Beginers- if you have trouble show link with hiddeneye or shellphisher or ..

> Tunnel is a bash based script which is made for ngrok users of termux from this tool in just one click you can do lot more. This tool works on both rooted Android device and Non-rooted Android device.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

$ apt-get update -y
$ apt-get upgrade -y
$ pkg install python -y
$ pkg install python2 -y
$ pkg install git -y
$ pip install lolcat
$ git clone https://github.com/noob-hackers/tunnel
$ ls
$ cd tunnel
$ ls
$ bash tunnel.sh

> Now you need internet connection to continue further process...

> You can select any option by clicking on your keyboard

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘#XSS - Cross-Site Scripting 2020 popular sources :

- [Cross-Site Scripting Γ’β‚¬β€œ Application Security Γ’β‚¬β€œ Google](https://www.google.com/intl/sw/about/appsecurity/learning/xss/) - Introduction to XSS by [Google](https://www.google.com/).

- [H5SC](https://github.com/cure53/H5SC) - HTML5 Security Cheatsheet - Collection of HTML5 related XSS attack vectors by [@cure53](https://github.com/cure53).

- [XSS.png](https://github.com/jackmasa/XSS.png) - XSS mind map by [@jackmasa](https://github.com/jackmasa).

- [EXCESS-XSS Guide](https://excess-xss.com/) - Comprehensive tutorial on cross-site scripting by [@JakobKallin](https://github.com/JakobKallin) and [Irene Lobo Valbuena](https://www.linkedin.com/in/irenelobovalbuena/).

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘FOR PRO USERS
>WANT TO CREATE A FAST ANDROID SYSTEM
> MANAGE SOME LIBS
ON GIT This project uses the Gradle build system.
> To build this project, use the gradlew build command or use "Import Project" in Android Studio.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1️⃣curl -sSLO https://github.com/pinterest/ktlint/releases/download/0.37.2/ktlint &&

2️⃣ chmod a+x ktlint &&

3️⃣ sudo mv ktlint /usr/local/bin/
... or just download ktlint from the releases page (ktlint.asc contains PGP signature which you can verify with curl -sS https://keybase.io/pinterestandroid/pgp_keys.asc | gpg --import && gpg --verify ktlint.asc).

4️⃣On macOS (or Linux) you can also use brew - brew install ktlint.

5️⃣If you don't have curl installed - replace curl -sL with wget -qO-.

6️⃣If you are behind a proxy see - curl / wget manpage. Usually simple http_proxy=http://proxy-server:port https_proxy=http://proxy-server:port curl -sL ... is enough.

πŸ¦‘Usage :

1️⃣# check the style of all Kotlin files inside the current dir (recursively)
# (hidden folders will be skipped)
$ ktlint --color [--color-name="RED"]
src/main/kotlin/Main.kt:10:10: Unused import

2️⃣# check only certain locations (prepend ! to negate the pattern,
# Ktlint uses .gitignore pattern style syntax)
$ ktlint "src//*.kt" "!src//*Test.kt"

3️⃣# auto-correct style violations
# (if some errors cannot be fixed automatically they will be printed to stderr)
$ ktlint -F "src/**/*.kt"

# print style violations grouped by file
$ ktlint --reporter=plain?group_by_file
# print style violations as usual + create report in checkstyle format
$ ktlint --reporter=plain --reporter=checkstyle,output=ktlint-report-in-checkstyle-format.xml

4️⃣# install git hook to automatically check files for style violations on commit
# Run "ktlint installGitPrePushHook" if you wish to run ktlint on push instead
$ ktlint installGitPreCommitHook
on Windows you'll have to use java -jar ktlint ....

ktlint --help for more.


βœ…GIT SOURCES
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE SECURITY
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘#INTERESTING HACK NEWS
> Google Chrome caused large-scale user security information leakage

1️⃣Awake Security researchers said they found a spyware in the extension of Google's Chrome browser. The extension containing the spyware has been downloaded 32 million times. This incident highlights the failure of technology companies in browser security, which is widely used in e-mail, payment, and other sensitive functions.

2️⃣Alphabet's Google said that after receiving a reminder from researchers last month, they have removed more than 70 extensions with this malware from the Chrome Web Store.

3️⃣Google spokesman Scott Westover said: "When we were notified that there were extensions in the Web Store that violated the policy, we immediately took action and used this as training material to enhance us Analysis of the results automatically and manually."

4️⃣Awake co-founder and chief scientist Gary Golomb (Gary Golomb) said that according to the number of downloads, this is the most serious malware that has appeared in the Chrome store.

5️⃣Google refused to discuss the difference between the new spyware and the previously appeared malware, and refused to disclose the scope of the software, and why Google did not actively monitor and remove the software, and they had previously promised to pay close attention to product safety.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
WRITTEN TUTORIALS pdfs FOR LINUX-TERMUX
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘THIS POST IS FOR PRO USERS A preliminary study of using in Gtk+/GnomeI :

development environment and development tools

1️⃣The desktop environment of the common Linux Contribution is internationalized, as long as you modify some configuration files. Realize the display of Chinese characters. Chinese character input has also followed the XIM standard. As long as the client program accepts XIM, the Chinese characters can be input in theory. The key problem is that not all familiar applications support internationalization, and sometimes even the software itself Support, also need to do some setting work.

2️⃣My working environment is Mandrake 7.2 and input 3.0 as exmaple recommended to use this old version for Testing

3️⃣ The KDE desktop realizes localization. Generally speaking, my editing tool is Vim. If you want to input arabic characters, you need to have a Terminal that supports XIM, rxvt- CLE is a good choice. I think Gnome-Terminal should obviously be able to achieve Chinese character input and output, but I haven’t got it right now. The main problem is I don’t know where to set the fontset, because only in this way can arabic and English mixed display After two days, look at the original code, it should not be difficult to modify.

4️⃣The vgraphical editor can use Gedit, and the bluefish I am currently using to write this HTML file. If you want to use your own definition in bluefish Fontset, instead of Gtk+'s default settings, needs to set the fontset variable in ~/.bluefish/rcfile to 1.

5️⃣The internationalization of software like Netscape has been done very well. After you set the locale and XIM, the input and output are satisfactory. Of course, you may need to set the font in the configuration file.


πŸ¦‘Gtk+/Gnome example

/* Use the Chinese example ""base.c"" in gtk+/gnome programming
*
* This code uses gtk+/gnome to generate an editing window, through the system's XIM Server
* Input Chinese characters, the input font uses the definition in this program .
*
* Compilation method:
* gcc -o base base.c ``gnome-config --cflags --libs gnome gtk gnomeui`
*/
#include
/* Macro
* Define your locale at PACKAGE_LOCALE_DIR Location.
* I use Mandrake 7.2, LC_ALL=zh_CN.GB2312
* */
#define PACKAGE ""base""
#define PACKAGE_LOCALE_DIR ""/usr/local/share/locale""

gint delete_event (GtkWidget *widget, GdkEvent *event, gpointer data)
{
g_print(""delete event occerred "");
return(FALSE);
}

void destroy( GtkWidget *widget, gpointer data)
{
gtk_main_quit();
}

int main (int argc, char *argv[])
{
GtkWidget *window;
GtkWidget *text;

/* Variables related to font modification */
GtkStyle *style;
GdkFont *tmpfont;
gchar *fontstring;

/* Set the font to use: Two fonts correspond to English and Chinese respectively.
Modify this sentence according to your Xwindow *, Use fonts recognized by the system.
* Available
* xlsfonts |grep gb
* command to find your Chinese font.
* */
fontstring = ""-*-fixed-medium-r-normal--16-*-*-*- *-*-iso8859-1,-*-simsun-medium-r-normal--16-*-*-*-*-*-gb2312.1980-0"";

/* load locale:
* these two sentences have to*/
bindtextdomain (PACKAGE, PACKAGE_LOCALE_DIR);
textdomain (PACKAGE);

/* Gnome initialization */
gnome_init (PACKAGE, ""0.1"", argc, argv);

window = gtk_window_new (GTK_WINDOW_TOPLEVEL);
gtk_signal_connect (GTK_signal_connect (GTK_signal_connect (GTK_signal_connect (GTK_signal_connect (GTK_signal_connect (GTK_signal_connect (GTK_signal_connect)) "",
GTK_SIGNAL_FUNC (delete_event), NULL);
gtk_signal_connect (GTK_OBJECT (window), ""destroy"",
GTK_SIGNAL_FUNC (destroy), NULL);
text = gtk_text_new (NULL, NULL);

/* Set custom font: * /
style = gtk_rc_get_style (GTK_WIDGET(text));
tmpfont = style->font;
if(!(style->font = gdk_fontset_load(fontstring)))
g_print(""fontset_load false "");
gdk_font_unref(tmpfont);
gtk_widget_set_style(GTK_WIDGET(text), style);


gtk_container_add (GTK_CONTAINER (window), text);
gtk_widget_show (text);
gtk_widget_show (window);
gtk_text_set_editable (GTK_TEXT (text), TRUE);
gtk_main ();
return(0);

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁