UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ARP SNIFF CODE- not git :




from scapy.all import sniff,ARP

from signal import signal,SIGINT

import sys



ip_mac = {}



def watchArp(pkt):

if point [ARP] .op == 2:

print pkt[ARP].hwsrc + " " + pkt[ARP].psrc



# Device is new. Remember it.

if ip_mac.get(pkt[ARP].psrc) == None:

print "Found new device " + \

pkt[ARP].hwsrc + " " + \

pkt[ARP].psrc

ip_mac[pkt[ARP].psrc] = pkt[ARP].hwsrc



# Device is known but has a different IP

elif ip_mac.get(pkt[ARP].psrc) and ip_mac[pkt[ARP].psrc] != pkt[ARP].hwsrc:

print pkt[ARP].hwsrc + \

" has got new ip " + \

pkt[ARP].psrc + \

" (old " + ip_mac[pkt[ARP].psrc] + ")"



ip_mac[pkt[ARP].psrc] = pkt[ARP].hwsrc



sniff(prn=watchArp,filter="arp",iface="eth0",store=0);

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Building_a_Keyword_Monitoring_Pipeline_with_Python,_Pastebin_and.pdf
543.3 KB
Building a Keyword Monitoring Pipeline with Python, Pastebin and Searx
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Discover and Hack URL handlers :

URL handlers are the bits in the front of the URLs (e.g. http:, https:, ftp:, skype:). They add things a web page can do to you and your device. Surprising applications have a nasty habit to register these without asking

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone git clone https://github.com/ouspg/urlhandlers.git

2) cd handlers/web

3) ./osx/handlers-list.py > handlers.json

4) python -m SimpleHTTPServer 8080

F E A T U R E S :

-Launcher for the OSX Launch Services
-OSX open CLI tool
-Online JavaScript based testing UI for the Browsers
-HTML file with direct invocation (e.g. iframe)
-HTML redirects

βœ…GIT TOPIC
@undercodeTesting
@UndercodeHacking
@Undercodesecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘INSTAGRAM HACKING TOOLS "

https://github.com/fuck3erboy/instahack

https://github.com/Pure-L0G1C/Instagram

https://github.com/04x/instagramCracker

https://github.com/DarkSecDevelopers/HiddenEye

https://github.com/suljot/shellphish

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
Mac malware spreads and exploits vulnerabilities in WebKit and Data Vault through the Xcode project
Forwarded from UNDERCODE NEWS
NSA and FBI jointly reveal Drvorub, a malicious Linux system built in Russia
Forwarded from UNDERCODE NEWS
Reports reveal that the United States treats DDS as a terrorist hacking enterprise
UNDERCODE START A HACKERS NEWS SITE

FOR MORE VISIT: https://www.UndercodeNews.com

To watch more videos, please subscribe to the channel

You can also follow UndercodeNews on other social media platforms:

Twitter https://twitter.com/UndercodeNews
Instagram https://www.instagram.com/UndercodeNews
Facebook https://www.facebook.com/UndercodeNews
Telegram @UndercodeNews

Under code channel provides a news service around the clock, related to hacking & programming & much more... to follow up on events as soon as they happen.
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘topic updated web hacking-GoLismero is an open source framework for security testing. It's currently geared towards web security, but it can easily be expanded to other kinds of scans.

F E A T U R E S :

-Real platform independence. Tested on Windows, Linux, *BSD and OS X.

-No native library dependencies. All of the framework has been written in pure Python.

-Good performance when compared with other frameworks written in Python and other scripting languages.
Very easy to use.

-Plugin development is extremely simple.

-The framework also collects and unifies the results of well known tools: sqlmap, xsser, openvas, dnsrecon, theharvester...

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

-Integration with standards: CWE, CVE and OWASP.

1) sudo bash

2) apt-get install python2.7 python2.7-dev python-pip python-docutils git perl nmap sslscan

3) cd /opt

4) git clone https://github.com/golismero/golismero.git

5) cd golismero

6) pip install -r requirements.txt

7) pip install -r requirements_unix.txt

8) ln -s ${PWD}/golismero.py /usr/bin/golismero

9) exit

πŸ¦‘ If you have an API key for Shodan, or an OpenVAS server or SpiderFoot server you want to integrate with GoLismero, run the following commands:

1) mkdir ~/.golismero

2) touch ~/.golismero/user.conf

3) chmod 600 ~/.golismero/user.conf

4) nano ~/.golismero/user.conf

5) At the editor, add the following sections to the file, as appropriate:

[shodan:Configuration]
apikey = <INSERT YOUR SHODAN API KEY HERE>

[openvas]
host = <INSERT THE OPENVAS HOST HERE>
user = <INSERT THE OPENVAS USERNAME HERE>
*password = <INSERT THE OPENVAS PASSWORD HERE>

[spiderfoot]
url = <INSERT THE SPIDERFOOT URL HERE>

βœ…GIT TOPIC
@undercodeTesting
@UndercodeHacking
@Undercodesecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
How to Get and Set Up a Free Windows VM for Malware Analysis.pdf
1.1 MB
How to Get and Set Up a Free Windows VM for Malware Analysis #full with pictures β€οΈπŸ‘πŸ»
Forwarded from UNDERCODE NEWS
Microsoft has fixed a vulnerability of 0-day Windows file signature that exists since 2018
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Auto Scanning to SSL Vulnerability :
HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc

A. Support Vulnerability

- CVE-2007-1858] Anonymous Cipher
- CVE-2012-4929] CRIME(SPDY)
- CVE-2014-0160] CCS Injection
- CVE-2014-0224] HeartBleed
- CVE-2014-3566] SSLv3 POODLE
- CVE-2015-0204] FREAK Attack
- CVE-2015-4000] LOGJAM Attack
- CVE-2016-0800] SSLv2 DROWN

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

A. Download(clone) & Unpack A2SV

1) $ git clone https://github.com/hahwul/a2sv.git

2) $ cd a2sv

B. Install Python Package / OpenSSL

3) $ pip install argparse

4) $ pip install netaddr

5) $ apt-get install openssl

C. Run A2SV

6) $ python a2sv.py -h

πŸ¦‘How to Use?

usage: a2sv [-h] [-t TARGET] [-tf TARGETFILE] [-p PORT] [-m MODULE]
[-d DISPLAY] [-u] [-v]

βœ…GIT TOPIC
@undercodeTesting
@UndercodeHacking
@Undercodesecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
osif.png
47.5 KB
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘FACEBOOK info gathering :

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) $ pkg update upgrade

2) $ pkg install git python2

3) $ git clone https://github.com/ciku370/OSIF

4) $ cd OSIF

5) $ pip2 install -r requirements.txt

6) $ python2 osif.py

7) if you are confused how to use it, please type 'help' to display the help menu

8) [Warn] please turn off your VPN before using this program !!!

9) [Tips] do not overuse this program !!!

βœ…git topic/verified

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁