UNDERCODE SECURITY
225 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
Forwarded from UNDERCODE COMMUNITY
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁


πŸ¦‘NEW UPDATE WITH MORE FEATURES
ALL THOSE FREE :

Hackingtool Menu
Anonymously Hiding Tools
Information gathering tools
Wordlist Generator
Wireless attack tools
SQL Injection Tools
Phishing attack tools
Web Attack tools
Post exploitation tools
Forensic tools
Payload creation tools
Exploit framework
Reverse engineering tools
DDOS Attack Tools
Remote Administrator Tools (RAT)
XSS Attack Tools
Steganograhy tools
Other tools
SocialMedia Bruteforce
Android Hacking tools
IDN Homograph Attack
Email Verify tools
Hash cracking tools
Wifi Deauthenticate
SocialMedia Finder
Payload Injector
Web crawling
Mix tools
Anonymously Hiding Tools
Anonmously Surf
Multitor
Information gathering tools
Network Map (nmap)
Dracnmap
Port scanning
Host to IP
Xerosploit
RED HAWK (All In One Scanning)
ReconSpider(For All Scaning)
IsItDown (Check Website Down/Up)
Infoga - Email OSINT
ReconDog
Striker
SecretFinder (like API & etc)
Find Info Using Shodan
Port Scanner - rang3r
Breacher
Wordlist Generator
Cupp
WordlistCreator
Goblin WordGenerator
Password list (1.4 Billion Clear Text Password)
Wireless attack tools
WiFi-Pumpkin
pixiewps
Bluetooth Honeypot GUI Framework
Fluxion
Wifiphisher
Wifite
EvilTwin
Fastssh
Howmanypeople
SQL Injection Tools
Sqlmap tool
NoSqlMap
Damn Small SQLi Scanner
Explo
Blisqy - Exploit Time-based blind-SQL injection
Leviathan - Wide Range Mass Audit Toolkit
SQLScan
Phishing attack tools
Setoolkit
SocialFish
HiddenEye
Evilginx2
I-See_You(Get Location using phishing attack)
SayCheese (Grab target's Webcam Shots)
QR Code Jacking
ShellPhish
BlackPhish
Web Attack tools
Web2Attack
Skipfish
SubDomain Finder
CheckURL
Blazy(Also Find ClickJacking)
Sub-Domain TakeOver
Dirb
Post exploitation tools
Vegile - Ghost In The Shell
Chrome Keylogger
Forensic tools
Autopsy
Wireshark
Bulk extractor
Disk Clone and ISO Image Aquire
Toolsley
Payload creation tools
The FatRat
Brutal
Stitch
MSFvenom Payload Creator
Venom Shellcode Generator
Spycam
Mob-Droid
Enigma
Exploit framework
RouterSploit
WebSploit
Commix
Web2Attack
Reverse engineering tools
Androguard
Apk2Gold
JadX
DDOS Attack Tools
SlowLoris
Asyncrone | Multifunction SYN Flood DDoS Weapon
UFOnet
GoldenEye
Remote Administrator Tools (RAT)
Stitch
Pyshell
XSS Attack Tools
DalFox(Finder of XSS)
XSS Payload Generator
Extended XSS Searcher and Finder
XSS-Freak
XSpear
XSSCon
XanXSS
Advanced XSS Detection Suite
RVuln
Steganograhy tools
SteganoHide
StegnoCracker
Whitespace
Other tools
SocialMedia Bruteforce
Instagram Attack
AllinOne SocialMedia Attack
Facebook Attack
Application Checker
Android Hacking tools
Keydroid
MySMS
Lockphish (Grab target LOCK PIN)
DroidCam (Capture Image)
EvilApp (Hijack Session)
HatCloud(Bypass CloudFlare for IP)
IDN Homograph Attack
EvilURL
Email Verify tools
Knockmail
Hash cracking tools
Hash Buster
Wifi Deauthenticate
WifiJammer-NG
KawaiiDeauther
SocialMedia Finder
Find SocialMedia By Facial Recognation System
Find SocialMedia By UserName
Sherlock
SocialScan | Username or Email
Payload Injector
Debinject
Pixload
Web crawling
Gospider

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/Z4nzu/hackingtool.git

2) chmod -R 755 hackingtool

3) cd hackingtool

4) sudo pip3 install -r requirement.txt

5) bash install.sh

6) sudo hackingtool

7) the select any with numbers

USE FOR LEARN !!

βœ…2020 GIT
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁


πŸ¦‘LOOKING FOR FREE MOVIES & TV APPS FOR ANDROID ?

ANDROID - IOS - WINDOWS :
)

https://play.google.com/store/apps/details?id=com.tubitv&hl=en

https://itunes.apple.com/us/app/tubi-tv-stream-free-movies/id886445756

https://www.microsoft.com/en-us/p/tubi-tv/9vwgnh0vbzm2

https://www.amazon.com/Tubi-Watch-Free-Movies-Shows/dp/B07FD85TW6/?tag=makeusw-20&linkCode=ogi&th=1&psc=1

https://play.google.com/store/apps/details?id=com.curiousbrain.popcornflix

https://itunes.apple.com/us/app/popcornflix-free-movies/id493605531

https://www.microsoft.com/en-us/p/popcornflix/9vwgnh0vc01n

https://play.google.com/store/apps/details?id=com.yidio.androidapp

https://itunes.apple.com/us/app/yidio/id664306931

https://www.amazon.com/gp/product/B00KBAJ1QI?
tag=makeusw-20&linkCode=ogi&th=1&psc=1

https://play.google.com/store/apps/details?id=com.gotv.crackle.handset

https://itunes.apple.com/us/app/crackle-movies-tv/id377951542

https://www.microsoft.com/en-us/p/sony-crackle-movies-tv/9n2w64xf1rbr

https://www.microsoft.com/en-us/p/crackle/9wzdncrfj13n

https://www.microsoft.com/en-us/p/snagfilms-watch-free-movies-and-tv-shows/9nblggh431dc?

https://play.google.com/store/apps/details?id=tv.pluto.android

https://itunes.apple.com/us/app/pluto-tv/id751712884

https://play.google.com/store/apps/details?id=air.com.vudu.air.DownloaderTablet

https://itunes.apple.com/us/app/vudu-movies-tv/id487285735

https://www.microsoft.com/en-us/p/vudu-movies-and-tv/9nblggh4v68b

https://play.google.com/store/apps/details?id=com.recipe.filmrise

https://apps.apple.com/us/app/filmrise/id1353108336

https://play.google.com/store/apps/details?id=com.plexapp.android

https://apps.apple.com/us/app/plex-movies-tv-music-more/id383457673

https://www.microsoft.com/en-us/p/plex-for-xbox-one/9nblggh3zzvf


@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁


πŸ¦‘What is Shell? Understand the concept of Shell in 1 minute! #ForBeginers

> The operating systems we use now (Windows, Mac OS, Android , iOS, etc.) are all with a graphical interface, simple and intuitive, easy to use, for professional users (programmers, network managers, etc.) and ordinary users (housewives, elderly, etc.) ) Are very applicable; the popularity of computers is inseparable from the graphical interface.

> However, in the early days of computers, there was no graphical interface. We could only control the computer through commands one by one. There are hundreds of these commands, not to mention that it is very difficult to remember these commands. "Black screen" itself is a boring thing; computers at this time are far from being cool and popular, and only professionals can use it.

> the only thing that can control the computer hardware (CPU, memory, display, etc.) is the kernel of the operating system. The graphical interface and the command line are just a bridge between the user and the kernel.
If you do not understand the role of the operating system, please go to " What is an operating system ".
Due to security, complexity, cumbersome and other reasons, users cannot directly access the kernel (not necessary), and need to develop another program to allow users to directly use this program; the function of the program is to receive user operations (click on the icon, enter commands) , And perform simple processing, and then pass to the kernel, so that users can indirectly use the operating system kernel. You see, adding a layer of "agent" between the user and the kernel can not only simplify the user's operation, but also ensure the security of the kernel. Why not?

> The user interface and command line are this separately developed program, which is the "agent". Under Linux, this command line program is called Shell .

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from WEB UNDERCODE - PRIVATE
Testing_initial_access_with_Generate_Macro_in_Atomic_Red_Team.pdf
1.3 MB
Imagine you’re a criminal and you want to gain access to someone else’s computer. How would you do it? Statistically speaking, there’s a strong chance that you’d send an email message with an attachment concealing a malicious macro. Aer all, is consistently among spearphishing attachment (T1193) the most prevalent ATT&CKβ„’ techniques we observe in our detections.
Forwarded from WEB UNDERCODE - PRIVATE
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Streamer scanner tutorial :

"Streamer" software can detect various vulnerabilities such as POP3, FTP, HTTP, SQL, SMTP, and IPC$, and design different cracking schemes for various vulnerabilities, and can easily obtain the detected user password on a vulnerable system. Today I will explore the mystery of "Streamer" software with everyone.

1) First, install the streamer scanner on the computer, and pay attention to the decompression password when decompressing

download : http://prog3.com/sbdm/download/tag/%E6%B5%81%E5%85%89 (chineese hacking)

2) After the installation is complete, we follow its prompts to enter the main program page, where we can see many services in the taskbar. At the beginning, we can see many weak SA passwords by entering the scanned network segment , Or a weak FTP password, or an empty connection for IPC

3) We can see the FTP server used by the other party's machine, so we can provide us with host analysis

4) When scanning, we can add a dictionary to decipher weak passwords,

5) In the options, we will see a lot of services including connection options, system settings, we can perform the services we need

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from WEB UNDERCODE - PRIVATE
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘What is a Trojan horse and its 6 characteristics :


1) Does not generate icons.
Although the Trojan will run automatically when your system starts, it will not generate an icon in the "task bar". This is easy to understand, otherwise If you see an icon of unknown origin in the taskbar, you can’t be suspicious!

2) Trojan horse programs are automatically hidden in the task manager and deceive the operating system by means of "system services".

3) Has automatic operation.
The Trojan is in order to control the server. It must follow the startup when the system starts, so it must be embedded in your startup configuration files, such as win.ini, system.ini, winstart.bat, and startup groups.

4) Contains programs with undisclosed functions that may have dangerous consequences.

5) With automatic recovery function.
Nowadays, the function modules in many Trojan horse programs are no longer composed of a single file, but have multiple backups that can be mutually restored. When you delete one of them, thinking that everything is fine and running other programs, who knows it appears quietly again. Like a ghost, it's impossible to guard against.

6) Can automatically open special ports.
The purpose of the Trojan horse program in your computer is not to destroy your system, but to obtain useful information in your system. When you are online, you can communicate with remote clients, so that the Trojan horse program will use the server The communication method of the corpse client informs the hackers so that the hackers can control your machine or carry out further invasion attempts. Do you know how many ports your computer has? Don't you know? Tell you not to be scared: According to the TCP/IP protocol, each computer can have 256 times 256 ports, that is, "doors" from 0 to 65535, but There are only a few that we commonly use. Trojans often use these ports that we don't use much to connect to, opening the door to convenience.

7) The particularity of function.
Common Trojan horse functions are very special. In addition to ordinary file operations, some Trojan horses have the ability to search for passwords in the cache, set passwords, scan the IP address of the target robot, perform keyboard recording, remote registry operations, and lock the mouse, etc. Features. Of course, the remote control software mentioned above will not have these functions. After all, the remote control software is used to control the remote machine for easy operation, not to hack the other party's machine.

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from WEB UNDERCODE - PRIVATE
Linux Exploit Development.pdf
92.7 KB
Forwarded from WEB UNDERCODE - PRIVATE
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘HOW TO GET 1K MOBILE HACKING TUTORIALS :

1) Read it on Gitbook(https://github.com/OWASP/owasp-mstg) . The book is automatically synchronized with the main repo.

2) Check the releases. Here you can find a PDF, an archive containing the sources, and a DocX document for any given tagged version. Please note that the documents are generated automatically per tag.

3) Get the book as a printed version. A hardcopy of the book can be ordered via lulu.com. This version of the book is not completely aligned with book printing standards, but we are improving each version. If you recognize any issues or mistakes, even small ones, please raise an issue so we can fix it in the next version.

4) Get the e-book. The book is available for free, but you can choose to purchase it at a price of your choice if you wish to support our project. All funds raised through sales of the e-book go directly into the project budget and will be used to fund the production of future releases.

5) Clone the repository and run the document generator (requires Docker). This produces the PDF, Epub, Mobi, and DOCX in the root of the MSTG folder.


$ git clone https://github.com/OWASP/owasp-mstg/

$ cd owasp-mstg/

$ ./tools/docker/run_docker_mstg_generation_on_local.sh

6) Just check the latest build of the repository at Github actions. This offers you the latest SNAPSHOT version of the document to download.

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
Practical PLC Programming (PLC II) β€”1.66 GBβ€”

https://mega.nz/#F!igcEkCAI!Ml8NqStrX3jFiep_kFT1qg


πŸ¦‘Process Visualization with HMI / SCADA (PLC III) 4.03 GB

https://mega.nz/#F!Ot8mwKJS!S3gGUemgM7cgF59zru7K2Q
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Website provides Paid vcc :

https://myvcc.biz/

https://dreamweavervcc.com/

https://entropay.com/

https://ezzocard.com/

https://supervcc.com/

https://egiftcards24.com/

https://instavcc.com/

http://vccguru.com/

https://wirexapp.com/


▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘NEW TERMUX PACKAGES :

aircrack-ng yes pkg install root-repo
pkg


bettercap yes pkg install root-repo
pkg install bettercap


metasploit no pkg install unstable-repo
pkg install metasploit


nmap recommended pkg install nmap


tshark yes pkg install root-repo
pkg install tshark


sqlmap no pkg install unstable-repo
pkg install sqlmap


wireshark-gtk yes pkg install x11-repo
pkg install wireshark-gtk

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Analysis of the OpenSSL program concept and the "heart bleeding" vulnerability that shocked the industry

Public key/private key/signature/verify signature/encryption/decryption/asymmetric encryption

1) Our general encryption is to use a password to encrypt a file, and then decrypt it with the same password. This is easy to understand, this is a symmetric encryption.

2) In some encryption, one password is used for encryption, and another set of passwords is used for decryption. This is called Asymmetric encryption means that the encryption and decryption passwords are not the same.

3) People who are in contact for the first time may not understand it anyway. In fact, this is an application of the principle of mathematics for the product of prime numbers. If you must understand, Baidu has a big You can see a lot of data, and the result is to use one of this set of keys to encrypt data, and you can use the other to unlock it.

4) Yes, yes, both public and private keys can be used to encrypt data. The other is to unlock, the public key encrypts the data, and then the private key decrypts it is called encryption and decryption, the private key encrypts the data, and the public key decryption is generally called signature and verification signature.

5) Because the data encrypted by the public key can only be unlocked by its corresponding private key, you can give the public key to the person and the person, and let him encrypt the data he wants to send to you. This data can only reach you with the private key. , It can be unlocked into useful data. Others get it and understand the content. Similarly, if you sign the data with your private key, then this data can only be unlocked by the paired public key. There is this private key. The key is only you, so if the paired public key unlocks the data, it means that the data was sent by you, on the contrary, it is not. This is called a signature.


@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁