UNDERCODE SECURITY
226 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
πŸ¦‘Bin For AWS 32GB + EC2βœ…

Bin : 4116000104xxxxxx

CVV : RND
Date: 06/23
IP : USA πŸ‡ΊπŸ‡Έ

> how use bins : https://t.me/UnderCodeTesting/3768
- only verified & not created by us-
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘FOR PRO USERS
>WANT TO CREATE A FAST ANDROID SYSTEM
> MANAGE SOME LIBS
ON GIT This project uses the Gradle build system.
> To build this project, use the gradlew build command or use "Import Project" in Android Studio.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1️⃣curl -sSLO https://github.com/pinterest/ktlint/releases/download/0.37.2/ktlint &&

2️⃣ chmod a+x ktlint &&

3️⃣ sudo mv ktlint /usr/local/bin/
... or just download ktlint from the releases page (ktlint.asc contains PGP signature which you can verify with curl -sS https://keybase.io/pinterestandroid/pgp_keys.asc | gpg --import && gpg --verify ktlint.asc).

4️⃣On macOS (or Linux) you can also use brew - brew install ktlint.

5️⃣If you don't have curl installed - replace curl -sL with wget -qO-.

6️⃣If you are behind a proxy see - curl / wget manpage. Usually simple http_proxy=http://proxy-server:port https_proxy=http://proxy-server:port curl -sL ... is enough.

πŸ¦‘Usage :

1️⃣# check the style of all Kotlin files inside the current dir (recursively)
# (hidden folders will be skipped)
$ ktlint --color [--color-name="RED"]
src/main/kotlin/Main.kt:10:10: Unused import

2️⃣# check only certain locations (prepend ! to negate the pattern,
# Ktlint uses .gitignore pattern style syntax)
$ ktlint "src//*.kt" "!src//*Test.kt"

3️⃣# auto-correct style violations
# (if some errors cannot be fixed automatically they will be printed to stderr)
$ ktlint -F "src/**/*.kt"

# print style violations grouped by file
$ ktlint --reporter=plain?group_by_file
# print style violations as usual + create report in checkstyle format
$ ktlint --reporter=plain --reporter=checkstyle,output=ktlint-report-in-checkstyle-format.xml

4️⃣# install git hook to automatically check files for style violations on commit
# Run "ktlint installGitPrePushHook" if you wish to run ktlint on push instead
$ ktlint installGitPreCommitHook
on Windows you'll have to use java -jar ktlint ....

ktlint --help for more.


βœ…GIT SOURCES
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘#INTERESTING HACK NEWS
> Google Chrome caused large-scale user security information leakage

1️⃣Awake Security researchers said they found a spyware in the extension of Google's Chrome browser. The extension containing the spyware has been downloaded 32 million times. This incident highlights the failure of technology companies in browser security, which is widely used in e-mail, payment, and other sensitive functions.

2️⃣Alphabet's Google said that after receiving a reminder from researchers last month, they have removed more than 70 extensions with this malware from the Chrome Web Store.

3️⃣Google spokesman Scott Westover said: "When we were notified that there were extensions in the Web Store that violated the policy, we immediately took action and used this as training material to enhance us Analysis of the results automatically and manually."

4️⃣Awake co-founder and chief scientist Gary Golomb (Gary Golomb) said that according to the number of downloads, this is the most serious malware that has appeared in the Chrome store.

5️⃣Google refused to discuss the difference between the new spyware and the previously appeared malware, and refused to disclose the scope of the software, and why Google did not actively monitor and remove the software, and they had previously promised to pay close attention to product safety.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
WRITTEN TUTORIALS pdfs FOR LINUX-TERMUX
πŸ¦‘BIN YOUTUBE PREMIUM

πŸ’³: 417170xxxxxxxx00
41717050x3x4xxx1

>CCV/FECHA: RND (Random)

🌎IP: INDIA

> Direction: Street 54 ,c Block, St Floor, Caption Colony, Opp.cross Road, Tardeo

Ciudad: Mumbai
Estado: Maharashtra
Codigo Postal: 400034
Telefono: 02265828692

(Verified only by undercode)
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘THIS POST IS FOR PRO USERS A preliminary study of using in Gtk+/GnomeI :

development environment and development tools

1️⃣The desktop environment of the common Linux Contribution is internationalized, as long as you modify some configuration files. Realize the display of Chinese characters. Chinese character input has also followed the XIM standard. As long as the client program accepts XIM, the Chinese characters can be input in theory. The key problem is that not all familiar applications support internationalization, and sometimes even the software itself Support, also need to do some setting work.

2️⃣My working environment is Mandrake 7.2 and input 3.0 as exmaple recommended to use this old version for Testing

3️⃣ The KDE desktop realizes localization. Generally speaking, my editing tool is Vim. If you want to input arabic characters, you need to have a Terminal that supports XIM, rxvt- CLE is a good choice. I think Gnome-Terminal should obviously be able to achieve Chinese character input and output, but I haven’t got it right now. The main problem is I don’t know where to set the fontset, because only in this way can arabic and English mixed display After two days, look at the original code, it should not be difficult to modify.

4️⃣The vgraphical editor can use Gedit, and the bluefish I am currently using to write this HTML file. If you want to use your own definition in bluefish Fontset, instead of Gtk+'s default settings, needs to set the fontset variable in ~/.bluefish/rcfile to 1.

5️⃣The internationalization of software like Netscape has been done very well. After you set the locale and XIM, the input and output are satisfactory. Of course, you may need to set the font in the configuration file.


πŸ¦‘Gtk+/Gnome example

/* Use the Chinese example ""base.c"" in gtk+/gnome programming
*
* This code uses gtk+/gnome to generate an editing window, through the system's XIM Server
* Input Chinese characters, the input font uses the definition in this program .
*
* Compilation method:
* gcc -o base base.c ``gnome-config --cflags --libs gnome gtk gnomeui`
*/
#include
/* Macro
* Define your locale at PACKAGE_LOCALE_DIR Location.
* I use Mandrake 7.2, LC_ALL=zh_CN.GB2312
* */
#define PACKAGE ""base""
#define PACKAGE_LOCALE_DIR ""/usr/local/share/locale""

gint delete_event (GtkWidget *widget, GdkEvent *event, gpointer data)
{
g_print(""delete event occerred "");
return(FALSE);
}

void destroy( GtkWidget *widget, gpointer data)
{
gtk_main_quit();
}

int main (int argc, char *argv[])
{
GtkWidget *window;
GtkWidget *text;

/* Variables related to font modification */
GtkStyle *style;
GdkFont *tmpfont;
gchar *fontstring;

/* Set the font to use: Two fonts correspond to English and Chinese respectively.
Modify this sentence according to your Xwindow *, Use fonts recognized by the system.
* Available
* xlsfonts |grep gb
* command to find your Chinese font.
* */
fontstring = ""-*-fixed-medium-r-normal--16-*-*-*- *-*-iso8859-1,-*-simsun-medium-r-normal--16-*-*-*-*-*-gb2312.1980-0"";

/* load locale:
* these two sentences have to*/
bindtextdomain (PACKAGE, PACKAGE_LOCALE_DIR);
textdomain (PACKAGE);

/* Gnome initialization */
gnome_init (PACKAGE, ""0.1"", argc, argv);

window = gtk_window_new (GTK_WINDOW_TOPLEVEL);
gtk_signal_connect (GTK_signal_connect (GTK_signal_connect (GTK_signal_connect (GTK_signal_connect (GTK_signal_connect (GTK_signal_connect (GTK_signal_connect)) "",
GTK_SIGNAL_FUNC (delete_event), NULL);
gtk_signal_connect (GTK_OBJECT (window), ""destroy"",
GTK_SIGNAL_FUNC (destroy), NULL);
text = gtk_text_new (NULL, NULL);

/* Set custom font: * /
style = gtk_rc_get_style (GTK_WIDGET(text));
tmpfont = style->font;
if(!(style->font = gdk_fontset_load(fontstring)))
g_print(""fontset_load false "");
gdk_font_unref(tmpfont);
gtk_widget_set_style(GTK_WIDGET(text), style);


gtk_container_add (GTK_CONTAINER (window), text);
gtk_widget_show (text);
gtk_widget_show (window);
gtk_text_set_editable (GTK_TEXT (text), TRUE);
gtk_main ();
return(0);

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Dorks 2020 full lists

βœ…GIT SOURCES
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Tool designed to help identify incorrectly configured Django applications that are exposing sensitive information
Termux
-Linux

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1️⃣https://github.com/jimywork/djangohunter.git

2️⃣cd djangohunter

3️⃣pip install -r requirements.txt

(Those are requirements:
Shodan
Pyfiglet
Requests
BeautifulSoup)

4️⃣python3 djangohunter.py --key {shodan}
Dorks: 'DisallowedHost', 'KeyError', 'OperationalError', 'Page not found at /'

5️⃣More guide about usage :

> https://asciinema.org/a/210648

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Hacker basic knowledge commonly used commands and shortcut keys :

*net user View user list
γ€€γ€€
*net user username password/add add user

γ€€γ€€*net user username password change user password
γ€€γ€€
*net localgroup administrators username/add add user to management group

γ€€γ€€*net user username/delete delete user

γ€€γ€€*net user User name to view the basic situation of the

γ€€γ€€user *net user user name/active:no disable the user

γ€€γ€€*net user user name/active:yes enable the user

γ€€γ€€*net share to view the computer IPC$ shared resources

γ€€γ€€*net share share name to view the share

γ€€γ€€*net share share name=path setting share. For example, net share c$=c:

γ€€γ€€*net share share name/delete delete IPC$ share

γ€€γ€€*net use View IPC$ connection status

γ€€γ€€*net use //ip/ipc$Content$nbsp;"password" /user:"user name" ipc$
connection

γ€€γ€€*net time //ip view the time on the remote computer

γ€€γ€€*copy path: /filename//ip/share name to copy the file to the
computer connected to ipc$

γ€€γ€€*net view ip view the shared resource on the computer

γ€€γ€€*ftp Server address Enter FTP server

γ€€γ€€*at View scheduled jobs on your computer

γ€€γ€€*at //ip to view the scheduled job on the remote computer

γ€€γ€€*at //ip time command (note the extra letter) Add a job on the
remote computer

γ€€γ€€*at //ip scheduled job ID /delete Delete a scheduled job on the
remote computer

γ€€γ€€*at //ip all /delete delete all scheduled jobs on the remote computer

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁