UNDERCODE SECURITY
225 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
My Top 5 Web Hacking Tools.pdf
320.5 KB
TOP 5 WEB HACKING TOOLS & METHODES VIA PICTURES
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘Top 2020 #MITM tools :

BetterCAP | MITM attacks against a network, manipulate HTTP, HTTPS and TCP traffic in realtime, sniff for credentials and much more.

Burp Suite | GUI based tool for testing Web application security.

Ettercap | Ettercap is a comprehensive suite for man in the middle attacks

Evilginx | Man-in-the-middle attack framework used for phishing credentials and session cookies of any web service.

MITMf | Framework for Man-In-The-Middle attacks

mitmproxy | An interactive console program that allows traffic flows to be intercepted, inspected, modified and replayed

enjoyβ€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘Some popular Search Engine for leaks & bugs.. for Penetration Tester

Spyse | Spyse collects valuable data from all open source internet and stores it in its own database to provide instant access to the data.

Censys | Censys continually monitors every reachable server and device on the Internet, so you can search for and analyze them in real time

Shodan | Shodan is the world's first search engine for Internet-connected devices.

WiGLE | Maps and database of 802.11 wireless networks, with statistics, submitted by wardrivers, netstumblers, and net huggers.

Zoomeye | search engine for cyberspace that lets the user find specific network components(ip, services, etc.)

Share usβ€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘Source Code Analysis & decryption Tools

pyup | Automated Security and Dependency Updates

RIPS | PHP Security Analysis

Retire.js | detecting the use of JavaScript libraries with known vulnerabilities

Snyk | find & fix vulnerabilities in dependencies, supports various languages

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘DANGEROUS EXPLOIT TOOLS-USE CVE:

LinEnum | Scripted Local Linux Enumeration & Privilege Escalation Checks

CVE-2017-5123 | Linux Kernel 4.14.0-rc4+ - 'waitid()' Local Privilege Escalation

Oracle Privilege Escalation via Deserialization | CVE-2018-3004 Oracle Privilege Escalation via Deserialization

linux-exploit-suggester | The tool is meant to assist the security analyst in his testing for privilege escalation opportunities on Linux machine

BeRoot Project | BeRoot Project is a post exploitation tool to check common misconfigurations to find a way to escalate our privilege.

yodo: Local Privilege Escalation | yodo proves how easy it is to become root via limited sudo permissions, via dirty COW or using Pa(th)zuzu.

Share usβ€οΈπŸ‘πŸ»
βœ…GIT SOURCES 2020
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘Why Use Password Managers ?
#FastTips

The main rules for the safe use of passwords:

>the password must be complex (i.e. include 4 groups of

>characters - uppercase and lowercase letters, numbers, special

>characters - and not consist of words or a combination of them that can be found in the dictionary)

>you cannot use the same password on different sites and services, because compromising your password, for example, on a poorly protected site / forum, can give an attacker access to your mail, cloud storage, social networks, network folder, etc.

>passwords should not be stored on a computer in text files, as well as in public places (a sticker with a password on a computer is also bad)

>Under these conditions, you need to remember a large number of complex passwords, which is practically impossible. Therefore, many users do not comply with these conditions (which is bad), and those who comply are forced to write passwords, for example, to a text file (if the file is not encrypted, then this is also bad).

πŸ¦‘A password manager can help in this situation - a program that stores your password in encrypted form. That is, instead of many passwords, you only need to remember one master password.

written by undercode
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘TERMUX Parrot Shell :
Beautify your Termux App

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1️⃣apt update

2️⃣apt install git -y

3️⃣git clone https://github.com/htr-tech/termux-shell.git

4️⃣cd termux-shell

5️⃣chmod +x *

6️⃣bash install.sh

7️⃣exit
that's all

> or use Single Command

8️⃣apt update && apt install git -y && git clone https://github.com/htr-tech/termux-shell.git && cd termux-shell && chmod +x * && sh install.sh


enjoyβ€οΈπŸ‘πŸ»
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
Forwarded from Backup Legal Mega
Forwarded from Backup Legal Mega
This good Instagram Marketing 2018: A Step-By-Step guide to 10,000 Followers β€”2.17 GBβ€”
#Requested

https://mega.nz/#F!XDxRQQRY!7whaBxhuPxyAxoy9bczTCw
Bin FreeFire
Bin: 4912823881xxxxxx
49128232x1x44xx0
4912823889x0x9xx
12/20
Ccv RANDON
IP MÉXICO

πŸ¦‘Bin2 FreeFire
BIN: 41523130066xx0xx
4152313706x6xxx0
415231390x6xx5x5
03/25
CC Randon
IP MÉXICO

Bin FreeFire
BIN: 4008200553x22xxx
40082005x4x5xx0x
40082005x3x100x1
09/21
CV Ramdo
Ip MÉXICO

(Only verified )
Forwarded from UNDERCODE HACKING
Get info from gmail & google .pdf
1.4 MB