UNDERCODE SECURITY
226 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
πŸ¦‘ Bin For Apple Music & Amazon Music

Bin : 45140510002xxxxx
CVV/Date: RND
IP : Canada πŸ‡¨πŸ‡¦

> how use bins : https://t.me/UnderCodeTesting/3768
πŸ¦‘Bin For Spotify Premium 1 Yearβœ…

Bin : 4434600003xxxxx
CVV/Date: RND
IP : Australia πŸ‡¦πŸ‡Ί

> how use bins : https://t.me/UnderCodeTesting/3768
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Termux Fast tip Ubuntu chroot on termux

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1️⃣A script to install Ubuntu chroot in Termux

You need to install wget and proot in Termux before using this script.

pkg install wget proot

2️⃣The script will make its files in the current directory. So if you want your Ubuntu-filesystem at a particular location switch to that folder first and then call the script with it's relative path. Example:

> mkdir -p ~/jails/ubuntu

> cd ~/jails/ubuntu

> wget https://raw.githubusercontent.com/Neo-Oli/termux-ubuntu/master/ubuntu.sh

> bash ubuntu.sh

3️⃣After running it you can run "start-ubuntu.sh" to switch into your ubuntu

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘SPYWARES & TRACKING 2020 LIST 3 :


- S3BucketList - Firefox Plugin The Lists Amazon S3 Buckets Found In Requests

- Locator - Geolocator, Ip Tracker, Device Info By URL (Serveo And Ngrok)

- Guardedbox - Online Client-Side Manager For Secure Storage And Secrets Sharing

- Faraday v3.11 - Collaborative Penetration Test and Vulnerability Management Platform

- Minimalistic-offensive-security-tools - A Repository Of Tools For Pentesting Of Restricted And Isolated Environments

- Carina - Webshell, Virtual Private Server (VPS) And cPanel Database

- Nishang - Offensive PowerShell For Red Team, Penetration Testing And Offensive Security

- Web Hacker's Weapons - A Collection Of Cool Tools Used By Web Hackers

- S3BucketList - Firefox Plugin The Lists Amazon S3 Buckets Found In Requests

- Locator - Geolocator, Ip Tracker, Device Info By URL (Serveo And Ngrok)

- Guardedbox - Online Client-Side Manager For Secure Storage And Secrets Sharing

- Faraday v3.11 - Collaborative Penetration Test and Vulnerability Management Platform

- Minimalistic-offensive-security-tools - A Repository Of Tools For Pentesting Of Restricted And Isolated Environments

- Carina - Webshell, Virtual Private Server (VPS) And cPanel Database
- Nishang - Offensive PowerShell For Red Team, Penetration Testing And Offensive Security

- Web Hacker's Weapons - A Collection Of Cool Tools Used By Web Hackers

βœ…GIT SOURCES
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Termux for Beginers- if you have trouble show link with hiddeneye or shellphisher or ..

> Tunnel is a bash based script which is made for ngrok users of termux from this tool in just one click you can do lot more. This tool works on both rooted Android device and Non-rooted Android device.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

$ apt-get update -y
$ apt-get upgrade -y
$ pkg install python -y
$ pkg install python2 -y
$ pkg install git -y
$ pip install lolcat
$ git clone https://github.com/noob-hackers/tunnel
$ ls
$ cd tunnel
$ ls
$ bash tunnel.sh

> Now you need internet connection to continue further process...

> You can select any option by clicking on your keyboard

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘#XSS - Cross-Site Scripting 2020 popular sources :

- [Cross-Site Scripting Γ’β‚¬β€œ Application Security Γ’β‚¬β€œ Google](https://www.google.com/intl/sw/about/appsecurity/learning/xss/) - Introduction to XSS by [Google](https://www.google.com/).

- [H5SC](https://github.com/cure53/H5SC) - HTML5 Security Cheatsheet - Collection of HTML5 related XSS attack vectors by [@cure53](https://github.com/cure53).

- [XSS.png](https://github.com/jackmasa/XSS.png) - XSS mind map by [@jackmasa](https://github.com/jackmasa).

- [EXCESS-XSS Guide](https://excess-xss.com/) - Comprehensive tutorial on cross-site scripting by [@JakobKallin](https://github.com/JakobKallin) and [Irene Lobo Valbuena](https://www.linkedin.com/in/irenelobovalbuena/).

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘Bin For AWS 32GB + EC2βœ…

Bin : 4116000104xxxxxx

CVV : RND
Date: 06/23
IP : USA πŸ‡ΊπŸ‡Έ

> how use bins : https://t.me/UnderCodeTesting/3768
- only verified & not created by us-
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘FOR PRO USERS
>WANT TO CREATE A FAST ANDROID SYSTEM
> MANAGE SOME LIBS
ON GIT This project uses the Gradle build system.
> To build this project, use the gradlew build command or use "Import Project" in Android Studio.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1️⃣curl -sSLO https://github.com/pinterest/ktlint/releases/download/0.37.2/ktlint &&

2️⃣ chmod a+x ktlint &&

3️⃣ sudo mv ktlint /usr/local/bin/
... or just download ktlint from the releases page (ktlint.asc contains PGP signature which you can verify with curl -sS https://keybase.io/pinterestandroid/pgp_keys.asc | gpg --import && gpg --verify ktlint.asc).

4️⃣On macOS (or Linux) you can also use brew - brew install ktlint.

5️⃣If you don't have curl installed - replace curl -sL with wget -qO-.

6️⃣If you are behind a proxy see - curl / wget manpage. Usually simple http_proxy=http://proxy-server:port https_proxy=http://proxy-server:port curl -sL ... is enough.

πŸ¦‘Usage :

1️⃣# check the style of all Kotlin files inside the current dir (recursively)
# (hidden folders will be skipped)
$ ktlint --color [--color-name="RED"]
src/main/kotlin/Main.kt:10:10: Unused import

2️⃣# check only certain locations (prepend ! to negate the pattern,
# Ktlint uses .gitignore pattern style syntax)
$ ktlint "src//*.kt" "!src//*Test.kt"

3️⃣# auto-correct style violations
# (if some errors cannot be fixed automatically they will be printed to stderr)
$ ktlint -F "src/**/*.kt"

# print style violations grouped by file
$ ktlint --reporter=plain?group_by_file
# print style violations as usual + create report in checkstyle format
$ ktlint --reporter=plain --reporter=checkstyle,output=ktlint-report-in-checkstyle-format.xml

4️⃣# install git hook to automatically check files for style violations on commit
# Run "ktlint installGitPrePushHook" if you wish to run ktlint on push instead
$ ktlint installGitPreCommitHook
on Windows you'll have to use java -jar ktlint ....

ktlint --help for more.


βœ…GIT SOURCES
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘#INTERESTING HACK NEWS
> Google Chrome caused large-scale user security information leakage

1️⃣Awake Security researchers said they found a spyware in the extension of Google's Chrome browser. The extension containing the spyware has been downloaded 32 million times. This incident highlights the failure of technology companies in browser security, which is widely used in e-mail, payment, and other sensitive functions.

2️⃣Alphabet's Google said that after receiving a reminder from researchers last month, they have removed more than 70 extensions with this malware from the Chrome Web Store.

3️⃣Google spokesman Scott Westover said: "When we were notified that there were extensions in the Web Store that violated the policy, we immediately took action and used this as training material to enhance us Analysis of the results automatically and manually."

4️⃣Awake co-founder and chief scientist Gary Golomb (Gary Golomb) said that according to the number of downloads, this is the most serious malware that has appeared in the Chrome store.

5️⃣Google refused to discuss the difference between the new spyware and the previously appeared malware, and refused to disclose the scope of the software, and why Google did not actively monitor and remove the software, and they had previously promised to pay close attention to product safety.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁