UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.4K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘TikTok European user privacy protection work will be handed over to Ireland and UK branches on July 29 :
#News

( if you a hater for tiktok call this tracking ennemiesπŸ‘Ί & and if you love tiktok call this a simple news)

> According to a news release issued by ByteDance on Monday, the responsibility for providing privacy protection for European TikTok users will be transferred to branches in Ireland and the United Kingdom. After the adjustment, the service provider of users in the EEA-Swiss region will be changed to TikTok Ireland, and the same adjustment will be made in the UK region.

>In a statement released today, TikTok’s director of trust and security in Europe, the Middle East, and Africa, Cormac Keenan, and Madeline Moncrieff, director of corporate affairs for EMEA, said the adjustment will take effect on July 29.

πŸ¦‘In the statement:

> Since the introduction of TikTok to Europe, we have invested in local talent, created a regional senior leadership team, and established the necessary business functions in the region, because we believe this is the best to support our growing TikTok community here the way.

> From July 29, TikTok's Irish and British branches will succeed our US TikTok Inc, provide TikTok to European users, and manage and protect their personal data.

>TikTok has more than 1,000 employees in Europe, of which 800 employees work in the United Kingdom and Ireland. London remains the company’s main office and its second largest office, and the Trust and Security Center in Dublin is led by Mr. Keenan. In January this year, the company said it would establish a new European base in Dublin, employing 100 employees.

>In the statement: β€œAs we expand throughout the region, TikTok Ireland has been responsible for maintaining the privacy and security of users in Europe. Our Trust and Security Center in Dublin allows us to focus on strengthening policies, technologies and control strategies, To ensure the safety of our community, our new data privacy team will focus on maintaining the highest standards of data protection. This work is overseen by the Office of the Data Protection Officer to promote accountability and encourage privacy awareness and a culture of compliance."

#News
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘Vulnerability Scanners
#FastTips :


> Vulnerability scanners automate security auditing and can play a vital part in your IT security by scanning your network and websites for different security risks. These scanners are also capable of generating a prioritized list of those you should patch, and they also describe the vulnerabilities and provide steps on how to remediate them. It is also possible for some to even automate the patching process.

> One of the best lists of popular vulnerability scanners is maintained by OWASP at:

https://www.owasp.org/index.php/Category:Vulnerability_Scanning_Tools

enjoyβ€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘maybee you have Toolx THE GREAT TOOL
Still need more ?
#tool

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

$ apt update

$ apt upgrade

$ apt install git

$ git clone https://github.com/Ranginang67/DarkFly-Tool

$ cd DarkFly-Tool

$ chmod +x

$ sh install

Run :

$ DarkFly


enjoyβ€οΈπŸ‘πŸ»
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘Gain access to unsecured IP cameras with these Google dorks.
βœ…2020 git source

inurl:/view.shtml
intitle:”Live View / - AXIS” | inurl:view/view.shtml^
inurl:ViewerFrame?Mode=
inurl:ViewerFrame?Mode=Refresh
inurl:axis-cgi/jpg
inurl:axis-cgi/mjpg (motion-JPEG)
inurl:view/indexFrame.shtml
inurl:view/index.shtml
inurl:view/view.shtml
liveapplet
intitle:”live view” intitle:axis
intitle:liveapplet
allintitle:”Network Camera NetworkCamera”
intitle:axis intitle:”video server”
intitle:liveapplet inurl:LvAppl
intitle:”EvoCam” inurl:”webcam.html”
intitle:”Live NetSnap Cam-Server feed”
intitle:”Live View / - AXIS”
intitle:”Live View / - AXIS 206M”
intitle:”Live View / - AXIS 206W”
intitle:”Live View / - AXIS 210β€³
inurl:indexFrame.shtml Axis
inurl:”MultiCameraFrame?Mode=Motion”
intitle:start inurl:cgistart
intitle:”WJ-NT104 Main Page”
intext:”MOBOTIX M1β€³ intext:”Open Menu”
intext:”MOBOTIX M10β€³ intext:”Open Menu”
intext:”MOBOTIX D10β€³ intext:”Open Menu”
intitle:snc-z20 inurl:home/
intitle:snc-cs3 inurl:home/
intitle:snc-rz30 inurl:home/
intitle:”sony network camera snc-p1β€³
intitle:”sony network camera snc-m1β€³
site:.viewnetcam.com -www.viewnetcam.com
intitle:”Toshiba Network Camera” user login
intitle:”netcam live image”
intitle:”i-Catcher Console - Web Monitor”

enjoyβ€οΈπŸ‘πŸ»
βœ…2020 git source
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘Whatsapp Spam via Termux :
> unimited messages- Spam Does Not Make You Hackers, Cyber, Cracker, Anonymous And Minions. Spamming Only For Good Purposes Does Not Violate Religious Law And Rules
#FastTips

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1️⃣$ pkg update upgrade

2️⃣$ pkg install git python2 toilet figlet php

3️⃣$ git clone https://github.com/4L13199/LITESPAM

4️⃣$ cd LITESPAM

use for learn
That's All !

enjoyβ€οΈπŸ‘πŸ»
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
firewall bypss.pdf
1.2 MB
Firewall Bypass Most requested #Tutorial
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘What is Cloud Commander ?

Cloud Commander is a two-pane web file manager with a console and editor. It will help you manage the server and work with files, directories and programs in a browser on any computer, smartphone or tablet.

πŸ¦‘Benefits :

>Open source (MIT License).

>Two classic panels.

>Possibility of authorization.

>The client works in a web browser.

>The server runs on Windows, Linux, Mac OS and Android (using Termux).
It can be used locally or remotely.

>Adapts to Screen size.

>3 built-in editors with syntax highlighting support: Dword, Edward and Deepword.

>Console with support for the standard OS command line.

>Written in JavaScript / Node.js.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1️⃣<font style="vertical-align: inherit;"><font style="vertical-align: inherit;">curl -sL https://deb.nodesource.com/setup_6.x | </font><font style="vertical-align: inherit;">sudo -E bash -</font></font><font></font><font style="vertical-align: inherit;"><font style="vertical-align: inherit;">

2️⃣-------- For version Node.js v7 --------</font></font><font></font><font style="vertical-align: inherit;"><font style="vertical-align: inherit;">

3️⃣curl -sL https://deb.nodesource.com/setup_7.x | </font><font style="vertical-align: inherit;">sudo -E bash -</font></font><font></font><font style="vertical-align: inherit;"><font style="vertical-align: inherit;">

4️⃣sudo apt-get install -y nodejs</font></font>

(html commandsπŸ™‚)

5️⃣After installing the nodejs and npm packages, let's move on to installing Cloud Commander with the following commands

> <font style="vertical-align: inherit;"><font style="vertical-align: inherit;">sudo npm i cloudcmd -g</font></font><font></font><font style="vertical-align: inherit;"><font style="vertical-align: inherit;">


> sudo npm i cloudcmd -g --force</font></font>

6️⃣to run :

<font style="vertical-align: inherit;"><font style="vertical-align: inherit;">cloudcmd</font></font>

7️⃣run as root :

<font style="vertical-align: inherit;"><font style="vertical-align: inherit;">sudo cloudcmd</font></font>

8️⃣Starting from the superuser will allow you to perform any operations and work with any files.

By default, the file manager is available in the browser at http: // localhost: 8000

enjoyβ€οΈπŸ‘πŸ»
written
by
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
πŸ¦‘Now you got :

> Two classic panels.

>Possibility of authorization.

>The client works in a web browser.

>The server runs on Windows, Linux, Mac OS and Android (using Termux).
It can be used locally or remotely.

>Adapts to Screen size.

>3 built-in editors with syntax highlighting support: Dword, Edward and Deepword.

>Console with support for the standard OS command line.

>Written in JavaScript / Node.js.
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ¦‘Wi-Fi Hacking Software

> Full with Pictures & Methodes
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘1️⃣AIRMON-NG TUTORIAL

Switch to monitor mode
airmon-ng is a bash script designed to put wireless cards into surveillance (monitor) mode. It also has the option to close programs that interfere with monitor mode. Sometimes it may fail - in these cases it is recommended to use the β€œmanual” translation into monitor mode.
commands inside
2️⃣boop is a program from the BoopSuite package for putting a wireless card into monitor mode and in controlled mode.

> https://kali.tools/?p=3409

3️⃣Handshake capture

airodump-ng is a tool for capturing wireless packets. Very often used to capture four-stage handshakes, which are later used to crack a Wi-Fi network password. It can capture any frames of wireless networks for further analysis.

https://kali.tools/?p=411
4️⃣boopsniff - a program from the BoopSuite package to display access points in the range of accessibility and capture handshakes.

https://kali.tools/?p=3409
COMMANDS INSIDE THE PICTURE
5️⃣Airbase-ng is a multi-purpose tool designed to attack customers, not access points. It can be used to capture half-handshakes, the attack algorithm is as follows: Airbase-ng looks at which access points clients are looking for (for example, a cell phone with Wi-Fi enabled) and creates an access point with this name; the client tries to connect to this fake access point, as a result, half the handshake is captured, which is suitable for cracking the password from a true Wi-Fi network.

>< https://kali.tools/?p=2377

6️⃣WPA2-HalfHandshake-Crack is a working concept to demonstrate the possibility of hacking a WPA2 network by grabbing a handshake from a user trying to connect to a fake AP. Those. grabs a half handshake.


> https://kali.tools/?p=2794

7️⃣zizzania automates handshake capture for all access points within reach.


https://kali.tools/?p=1075