UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.4K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Install Wireshark in Termux full by undercode:

1) First install x11-repo and nano

2) pkg update

3) pkg upgrade -y

4) pkg install x11-repo

5) pkg install nano

6) Now install xterm

7) pkg install xterm

8) tigervnc and Wireshark

9) pkg install tigervnc

10) pkg install wireshark-gtk

11) Now we need to change one file

12) cd $ HOME

13) nano ../usr/etc/bash.bashrc

14) We go to the very end of the file and write

15) export DISPLAY = ": 1

16) Save - ctrl + x, y, enter

> Now we write

17) source ../usr/etc/bash.bashrc

18) vncserver

19) At the first start, you will be asked to enter a password.

127.0.0.1::5901

20) If when creating vnc in termux you had written localhost: 2, then instead of 1 we write 2, with the remaining numbers the same way.

21) In the name field, at least.

22) It remains only to connect, you will be asked to enter the password that you entered when you first created the vnc server.

use for learn
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Universal Installer Termux Fsociety
what this great tool can do ?

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) pkg update

2) pkg upgrade -y

3) git clone https://github.com/Manisso/fsociety

4) cd fsociety

5) . /install.sh

6) python2 fsociety.py

πŸ¦‘Menu
1. collection of information
2.Password Attacks
3.Wireless Testing
4. Operation Tools
5.Sniffing & Spoofing
6.Web Hack
7. Private Web Hacking
8.After Operation
0.install updates
99.output

enjoyβ€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Termux INSTALL NMAP :

1️⃣pkg update

2️⃣pkg upgrade - y

3️⃣pkg install nmap

4️⃣Launch command

> nmap options ip_address

5️⃣And now I will show you the main functions of nmap :

-sL create a list of running hosts.
-sP check if ip address is available.
-PN consider all hosts to be working even if they are not working.
-sS / sT / sA / sM / sW scan tcp ports.
-sU scan udp ports.
-sN / sF / sX - TCP NULL and FIN scan.
-sC run the default script.
-sI Indle scan.
-p specify the range of ports to check.
-sV port exploration for verifying service versions.
-O define the operating system.
-T 0-5 scan speed, the more the faster.
-D mask the scan using dummy IP.
-S change your IP address to the specified one.
-e use a specific interface.
--spoof-mac set your MAC address.
-A definition of the operating system using spec. scripts.



enjoyβ€οΈπŸ‘πŸ»
#FastTips
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘2020 sms spam Bomber :
After entering the command, wait until $ lights up , if it does not light up, and a question pops up - I wrote about this below, when it caught fire we enter the following commands.

All commands are entered with a capital letter, I advise you to copy

If you entered at least one character incorrectly, then nothing will work.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) pkg update

2) pkg upgrade

3) pkg install git

4) pkg install python

5) pkg install python clang make -y

6) pip install --upgrade pip (it’s important that there is a 2 dash)

7) git clone https://github.com/crinny/b0mb3r

8) pip3 install b0mb3r -U

use for learn
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘SayHello Or how to eavesdrop-For Beginers.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

 update && apt upgrade

2️⃣pkg install openssh git php wget

3️⃣When asked about the continuation we answer y

4️⃣git clone https://github.com/thelinuxchoice/sayhello.git
Launch

5️⃣cd sayhello

6️⃣chmod + x sayhello.sh

7️⃣./ sayhello.sh

8️⃣Choose ngrok

9️⃣We throw the link to the victim.

use for learn
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 Free SMS bomber on Android 100ms in 20 secondsπŸ”₯

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :
 update

2️⃣apt upgrade

3️⃣pkg install python

4️⃣pip install --upgrade pip

5️⃣apt install git

6️⃣git clone https://github.com/FSystem88/spymer

7️⃣sh spymer / install.sh

8️⃣After you better go to Termux.

9️⃣Launch: spymer 7988 ********* (we indicate the number through 7 without +)

use for learn
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

Microsoft Office 2020 Keys(Wiki-2020 keys)



πŸ¦‘Office 365 Keys for FREE
N7PXY-WR4XP-D4FGK-K66JH-CYQ6X

N4M7D-PD46X-TJ2HQ-RPDD7-T28P9

B9GN2-DXXQC-9DHKT-GGWCR-4X6XK

2B8KN-FFK6J-YWMV4-J3DY2-3YF29

FCMXC-RDWMP-RFGVD-8TGPD-
VQQ2X

4HNBK-863MH-6CR6P-GQ6WP-J42C9

2MNJP-QY9KX-MKBKM-9VFJ2-CJ9KK

XRNFT-HG2FV-G74BP-7PVDC-JB29K

DJD94-DFKD9-FJD94JD894-FJKD94JD

DJC4N-DX7PC-GM3GK-V8KKW-XWYGX

DJKSE-DFJS93-DFJKD94JD-DJKD94JD

6KTFN-PQH9H T8MMB-YG8K4-367TX

6PMNJ-Q33T3-VJQFJ-23D3H-6XVTX

PGD67-JN23K-JGVWW-KTHP4-GXR9G

PBTFM-WWN3H-2GD9X-VJRMG-C9VT

MT7YN-TMV9C-7DDX9-64W77-B7R4D

πŸ¦‘Microsoft Office 365 Pro Plus Product Key

4HNBK-863MH-6CR6P-GQ6WP-J42C9

366NX-BQ62X-PQT9G-GPX4H-VT7TX

6KTFN-PQH9H T8MMB-YG8K4-367TX

KDVQM-HMNFJ-P9PJX-96HDF-DJYGX

KBDNM-R8CD9-RK366-WFM3X-C7GXK

H746C-BM4VK-TZBB8-MVZH8-FXR32

MH2KN-96KYR-GTRD4-KBKP4-Q9JP9

2MHJR-V4MR2-V4Z2Y-72MQ7-KC6XK

2MNJP-QY9KX-MKBKM-9VFJ2-CJ9KK

P8TFP-JGFMM-XPV3X-3FQM2-8K4RP

N4M7D-PD46X-TJ2HQ-RPDD7-T28P9
FBFPP-2XG5Y-FG9VH-DVQ2Z-QJRCH

NK8R7-8VXCQ 3M2FM-8446R-WFD6X

πŸ¦‘Microsoft Office 365 Activation Key

MTDNG-PDDGD-MHMV4-F2MBY-RCXKK

DJC4N-DX7PC-GM3GK-V8KKW-XWYGX

46DNX-B4Q98-PQVPW-Q8VM6-FVR29

N4M7D-PD46X-TJ2HQ-RPDD7-T28P9

GYWDG-NMV9P-746HR-Y2VQW-YPXKK

PBTFM-WWN3H-2GD9X-VJRMG-C9VTX

2MNJP-QY9KX-MKBKM-9VFJ2-CJ9KK
NK8R7-8VXCQ 3M2FM-8446R-WFD6X

N7PXY-WR4XP-D4FGK-K66JH-CYQ6X

GPT9W-CWNJK-KB29G-8V93J-TQ429

366NX-BQ62X-PQT9G-GPX4H-VT7TX
4HNBK-863MH-6CR6P-GQ6WP-J42C9

MH2KN-96KYR-GTRD4-KBKP4-Q9JP9

X2YWD-NWJ42-3PGD6-M37DP-VFP9K

N2P94-XV8HD-W9MHF-VQHHH-M4D6X

πŸ¦‘Office 365 Product Key
2B8KN-FFK6J-YWMV4-J3DY2-3YF29

KBDNM-R8CD9-RK366-WFM3X-C7GXK

6HDB9-BNRGY-J3F83-CF43C-D67TX

WTFN9-KRCBV-2VBBH-BC272-27GXM

6KTFN-PQH9H T8MMB-YG8K4-367TX

KDVQM-HMNFJ-P9PJX-96HDF-
DJYGX

XRNFT-HG2FV-G74BP-7PVDC-JB29K

PNP4F-KY64B-JJF4P-7R7J9-7XJP9

DMXHM-GNMM3-MYHHK-6TVT2-XTKKK

G9N3P-GRJK6-VM63J-F9M27-KHGXK
7TPNM-PMWKF-WVHKV-G869H-9BQ6X

433NF-H7TMK-TPMPK-W4FGW-7FP9K

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
+Carding 2020 big pack, Use for learn
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘Facebook re-exposed vulnerability: sharing user data with developers overtime

> Sina Technology News Beijing time on July 2 morning news, after the "Cambridge Analysis Scandal" was exposed, FacebookThere was a promise to impose a time limit when sharing user data with external developers, but the actual deadline exceeded their original promise.

> The company previously stated that if the user does not interact with the developer for more than 90 days, it will prevent the application from obtaining user data. At that time, developers need to re-acquire permission to get access to data such as e-mail, birthday and city,

> But Facebook said in a blog post on Wednesday that this rule has not been implemented smoothly in some cases. If the user also contacts Facebook friends through the application, the developer can obtain the data of the two users at the same time. However, a company spokesperson said that the vulnerability would cause developers to see the data of a user’s friends when they get the data of an active user, even if the latter has not opened the application for more than 90 days.

> Facebook revealed that this issue involves about 5,000 developers. But they did not disclose the number of users who might be affected by this.

> "We will solve the problem after we find it," Facebook wrote in the blog post. "We will continue to investigate and will continue to maintain transparency around any major updates."

> The vulnerability was discovered by a Facebook engineer two weeks ago, but the company said that they have no reason to believe that the relevant data has been misused.

written by undercode
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
Forwarded from Free Premium Accounts Telegram Channel - Netflix - Spotify
Please open Telegram to view this post
VIEW IN TELEGRAM
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘How to generate certificates in OpenSSL ?
#Pro

In fact, the private key of the web server and the private key of the Certification Authority (CA) are no different in nature - they are generated by the same command. But a Certification Authority (CA) has a special status insofar as:

1️⃣Its private key is used for signing certificates (therefore, it is called the root, although in the physical sense it does not differ from the private key of the server)

2️⃣Its public key (certificate) is added to the computers of all users as a trusted

3️⃣The digital signature in the certificate is not intended to be verified by a third party, since the certificate is self-signed.

> The only difference between a self-signed certificate from a Certification Authority (CA) and one that you can generate yourself is that it is located among trusted ones (in the operating system or in the browser).

> You can place a self-created self-signed certificate among trusted ones, and it will have exactly the same strength as the root certificate from Certificate Authority (CA)

πŸ¦‘ Let us return to the procedure of signing, but actually creating a server certificate - the created certificate must be cryptographically associated with the server’s private key. But the private key should be known exclusively to its owner (server). The way out of this situation is the use of the already mentioned Certificate Signing Request (CSR), that is, a "certificate signing request". That is, the Public Key and the domain name are transferred to the Certification Authority, but the private key remains secret. This is precisely the meaning of the existence of CSR.

1) For educational purposes, you can create your own root keys and even your β€œCertificate Authority (CA)”. Then create a pair of private and public server keys. Using the server key, we will create a certificate signing request (CSR). With a private key CA we will sign (create) a certificate for the server.

2) We will also learn how to add our root certificate to trusted certificates, verify and manage trusted certificates already present.

3) Which command to use, genpkey or generate :

There are two commands in the OpenSSL package that perform a very similar action - they generate a RSA private-public key pair:

1️⃣<font style="vertical-align: inherit;"><font style="vertical-align: inherit;">openssl genpkey -algorithm RSA</font></font><font></font><font style="vertical-align: inherit;"><font style="vertical-align: inherit;">

2️⃣openssl genrsa</font></font>

4) In fact, the formats of the keys generated by these RSA programs are slightly different. The genpkey command replaces the genpkey command , as well as two more commands: gendh and gendsa .

5) That is, you need to use genpkey with which you need to specify the key algorithm with the -algorithm option .


ENJOYβ€οΈπŸ‘πŸ»
Written by
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Some Steps for protect your android from Ransomware :
#fastTips

How to protect yourself?

> We recommend that you take basic precautions to protect yourself from these threats:

1) Never open email attachments from unknown senders- also scan any usb plugged in

2) Never click on links in SMS or MMS messages.

3) Even if the letter looks normal from some company ,.

4) Go to Settings β†’ Security and disable "allow installation of applications from sources other than Google Play."

5) We do not recommend connecting to unknown Wi-Fi networks and turn off Wi-Fi when not in use.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
PART 3 is the best, Enjoy πŸ‘Œ