UNDERCODE SECURITY
225 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
2020 NEW BUGBONTY WRITTEN TUTORIALS
Forwarded from Backup Legal Mega
πŸ¦‘More than 4 Tb Useful things
2019-new
e (Over 8000 Courses, Ebooks, Etc)

#REPOSTED (requested)


ENJOY
β€οΈπŸ‘πŸ»
https://mega.nz/folder/TjAGxSLD#pi9cuU55Kqze_7v9tzsMHQ
HAVE A GOOD SUNDAY FOR EVERYONE β€οΈπŸ‘πŸΌ
Forwarded from WEB UNDERCODE - PRIVATE
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from WEB UNDERCODE - PRIVATE
Advanced PowerUp.ps1 Usage.pdf
726.1 KB
Forwarded from WEB UNDERCODE - PRIVATE
πŸ¦‘RANDOM HELPFUL WRITTEN TUTORIALS
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ThanatosMiner is here, to capture the mining Trojan spread by BlueKeep high-risk vulnerability attacks
#News

> the ThanatosMiner mining Trojan exploited the BlueKeep vulnerability CVE-2019-0708 to spread. The attacker packaged the public Python version BlueKeep exploit code to generate scan.exe, and scanned a large range of randomly generated IP addresses for detection and attack.

> After the vulnerability is successfully exploited, the shellcode is executed to download the Trojan svchost.exe written in C#, and then the Trojan is used to download the Monero mining Trojan and attack modules for the next round of attacks. Because the assembly name of the Payload program is ThanatosCrypt, the mining Trojan is named ThanatosMiner (Death Miner).

> On May 15, 2019, Microsoft released a security update for CVE-2019-0708, a critical remote code execution vulnerability in Remote Desktop Services, which affected some older versions of Windows. Once the attacker successfully triggers the vulnerability, he can execute arbitrary code on the target system. The triggering of the vulnerability does not require any user interaction-meaning that the computer with the vulnerability only needs to be connected to the Internet, and no remote operations may be encountered without any operation. Attack and fall. The BlueKeep vulnerability (CVE-2019-0708) is a high-risk vulnerability that all security vendors attach great importance to.

> The vulnerability affects older versions of Windows systems, including:
Windows 7, Windows Server 2008 R2, Windows Server 2008, Windows 2003, and Windows XP. Windows 8 and Windows 10 and later versions are not affected by this vulnerability.

written by undercode
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘FOR BEGINER GNU and Windows

> To build programs using the GNU toolchain on Windows, two projects are often used: Cygwin and MinGW + MSYS. They have similar goals, but different implementation details. Let's figure it out.

πŸ¦‘ Cygwin

1) Cygwin is the most complete implementation of the GNU environment for Windows. It provides most of the POSIX API as a library, which allows you to build programs from UNIX without porting, unless they require UNIX semantics. A striking example is demons, they also need fork()signals that are not in Windows, and Windows services are completely different.

2) In addition to the library, the distribution kit contains a set of classic UNIX commands and a terminal. Command implementations use this library and support some UNIX features, such as case-sensitive file names.

3) Intended use: if there is no desire or ability to port the program to Windows or use only platform independent APIs, it can be built "under Cygwin", at the cost of dependence on cygwin1.dlland relative isolation from the rest of the system.

4) Many people have installed and continue to install the Cygwin environment to be able to use classic UNIX commands on Windows. Some developers also include Cygwin in their instructions for building their Windows programs, although the program itself does not link with cygwin1.dll. It may be more correct to use MSYS for this purpose.

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘NEW DEEP DANGEROUS WEBSITES Non-English
7
/24 & 24/24 ALIVE

http://germanyhusicaysx.onion - Deutschland im Deep Web - German forum

http://ffi5v46ttwgx3fby.onion/ - Das ist Deutschland hier 2.0 - German Board

http://paisleli66axejos.onion/ - PAIS

http://hyjmkmb3lfymiprp.onion/hen/papieze/ - DzieciΔ™ca pedofilia

http://runionv62ul3roit.onion/ - Russian Onion Union

http://s6cco2jylmxqcdeh.onion/ - ?ltimos bumps

http://5xki35vc4g5ts6gc.onion - GTF Greek Tor Forum . For greek speaking users

http://cipollatnumrrahd.onion/index.php - Cipolla 2.0 - Italian Community

http://runionv62ul3roit.onion - Russian community: market and anonymous talks about security, guns etc.

http://ptrackcp2noqu5fh.onion/ - PoliceTrack - Ne vous faites plus suivre par la police.

http://amberoadychffmyw.onion - Amberoad - russian anonymous market

http://r2d2akbw3jpt4zbf.onion - R2D2 - russian anonymous market

http://ramp2bombkadwvgz.onion - RAMP - biggest russian market (drugs only)

http://szmyt4v4vjbnxpg3.onion/ - Блавянский

http://o2tu5zjxjlibrary.onion/ - Bibliotheca Alexandrina

http://xzzpowtjlobho6kd.onion/wordpress/ - DeepBlog

http://zqiirytam276uogb.onion/ - Thorlauta

http://ocbh4hoqs37unvv6.onion - French Deep Web

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁