UNDERCODE SECURITY
226 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Improper infrastructure configuration caused dozens of corporate database sources to run naked on the Internet :

> Developer and reverse engineer Tillie Kottmann discovered through recent data collection: due to improper configuration of the infrastructure, the source code of the public database of dozens of companies from the technology, finance, retail, video, e-commerce, manufacturing and other industries has been Be exposed on the Internet.

> The leaked code in public repositories has spread to well-known companies such as Microsoft, Adobe, Lenovo, AMD, Qualcomm, Motorola, HiSilicon (owned by Huawei), MediaTek, GE Appliances, Nintendo, Roblox, Disney, Johnson Controls, etc.
> With the help of developer tools, Tillie Kottmann collected the aforementioned leaked source code. Even if some are marked as "confidential and proprietary," they can still be found in large numbers on code hosting and public repository platforms such as GitLab.

> Bank Security, which focuses on research on banking threats and fraud incidents, pointed out that the library contains source code from more than 50 companies. Although not all folders were exposed, in some cases sensitive credentials were leaked.

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from WEB UNDERCODE - PRIVATE
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Garmin was asked to pay a ransom of $10 million,a bad Russian hacker may be behind the scenes :

> Garmin suffered a ransomware attack last Thursday, which caused its service to be interrupted. Garmin is still working to restore the service. More information now shows who is responsible for the entire incident. Garmin admitted to being hacked five days ago. Garmin explained in a vague announcement on Twitter that it is experiencing a service outage and the company is working to fix it.

> Garmin said it is currently experiencing a failure that affects Garmin.com and Garmin Connect. The outage also affected the call center. Service personnel are currently unable to receive any phone calls, emails or online chat services. Garmin is working hard to resolve this issue as quickly as possible and apologizes for the inconvenience caused. According to various reports, Garmin internally announced two days of maintenance in some factories, possibly to recover after the attack. The company has never confirmed that the ransomware attack was the cause of the failure. However, reports from the "Daily Mail" show that Garmin was required to pay a ransom of $10 million to unlock the computer. Ransomware infection will encrypt all files on the device, and the victim needs to pay a ransom to decrypt it.

> Needless to say, Garmin refused. It is believed that the company is now working to restore the backup and bring all services back online. But it turns out that even if Garmin agrees to pay, this kind of thing is impossible. This is because the hacker organization behind this attack is believed to be Evil Corp. This is a Russian organization that has previously cooperated with multiple malicious attacks against the U.S. banking system. Action related. Last year, the US Treasury Department officially announced a series of sanctions against Evil Corp. Therefore, in law, Garmin is not allowed to make any payments to the organization.

> The man behind Evil Corp is Maksim Yakubets. He is a 33-year-old hacker. The FBI is offering a reward of $5 million. It is believed that he has recently launched large-scale attacks on dozens of other US companies. According to relevant sources, Yakubets is still living in Russia. He made a fortune through malicious activities. He is the owner of the famous Lamborghini Huracan. He had previously purchased a tiger as his pet and used a custom number plate with "thief" written on the car. As of now, the Garmin service is still paralyzed, and the company declined to comment on any claims about ransomware attacks.


#News
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from WEB UNDERCODE - PRIVATE
Forwarded from Backup Legal Mega
πŸ¦‘Another 4 tb Money Making Courses/Ebooks and many others:


https://mega.nz/folder/TjAGxSLD#pi9cuU55Kqze_7v9tzsMHQ
TOTAL COURSES HERE 370 TB πŸ₯³
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘WIFI HACKING SOFTWARES LIST 4 WINDOWS-LINUX :

> http://www.tamos.com/products/commwifi/

> http://www.wildpackets.com/products/distributed_network_analysis/omnipeek_network_analyzer

> http://wepattack.sourceforge.net/

> http://sourceforge.net/projects/airjack/

> https://www.wireshark.org/

> http://www.inssider.com/

> http://www.stumbler.net/

> http://www.kismetwireless.net/

> http://sourceforge.net/projects/airsnort/

> http://www.aircrack-ng.org/

... much more softwares but those includeS all features !

ENJOY❀️
πŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘SOME NEW premium NORDVPN after 1 k accounts yesterdayβ€οΈπŸ‘πŸ»


martinezmilian2299@gmail.com:Orlando2299 Expires at: 2021/11/26
juarezandrew63@gmail.com:Bu4d41400- Expires at: 2020/07/10
kpotter711@hotmail.com:Molly716 Expires at: 2020/07/14
only56ninjas@gmail.com:Happy691 Expires at: 2021/11/24
ethan.jverderber@gmail.com:Evapril9 Expires at: 2020/07/18
tmidd6@gmail.com:Wadmalaw1 Expires at: 2023/03/25
ksiemietkoski@gmail.com:Toaster90 Expires at: 2022/05/04
neilscarff@hotmail.co.uk:parish0pe Expires at: 2020/07/01
reptileg1@gmail.com:Reptile1 Expires at: 2020/07/10
lemanreus3@gmail.com:America2014 Expires at: 2022/03/24
Marcus_Edvardsen@live.no:Metroid123 Expires at: 2020/07/07
rux2121@gmail.com:chidori21 Expires at: 2021/08/31
mike.brannan02@gmail.com:Michael2002 Expires at: 2022/03/24
josh_komm@yahoo.com:Kenny10f! Expires at: 2021/08/25
bradley.lane510@gmail.com:Hannah321 Expires at: 2020/06/26
steelio1996@gmail.com:Jbgmnm6tt Expires at: 2020/07/09
wuerdemann.jan@web.de:Eisenbahn233 Expires at: 2023/05/11
RagnorockLG@gmail.com:Titan1987 Expires at: 2023/04/01
colineanderson@hotmail.com:Italia92 Expires at: 2021/04/04
oliverjobim@gmail.com:Oliver07 Expires at: 2023/04/06
mrcampncarl@gmail.com:Mat089800! Expires at: 2020/07/17
danielpdebus@gmail.com:1SweepMiner Expires at: 2022/03/23
jethrocedillo@gmail.com:Aidan2002 Expires at: 2023/05/10
johndolan20@hotmail.com:Instinct20 Expires at: 2020/10/15
rene.assenberg@gmail.com:1Omehenk! Expires at: 2022/07/06
noahhayez@yahoo.com:Awesome1013 Expires at: 2021/02/20
bradleypearson00@gmail.com:Unbourne101 Expires at: 2023/04/07
varindermann339@gmail.com:Yp9xfmrx Expires at: 2023/05/05
christian@marschall-welt.de:Chris2306 Expires at: 2023/03/27
Taylorkellond@hotmail.co.uk:Kellond9 Expires at: 2020/07/15
wsruledby1@gmail.com:Godrules12 Expires at: 2022/05/05
mercedeszaky@gmail.com:Egypt2012 Expires at: 2020/08/30
atherbys@gmail.com:Bicep230 Expires at: 2021/02/19
jonahroessnerberg@mac.com:6Basketball Expires at: 2020/07/21
viktorbrittner@yahoo.de:Haloreach120. Expires at: 2020/07/19
matthew.stephens99@gmail.com:Matthew99 Expires at: 2020/07/15
chase.wilson098@gmail.com:Chaseman123 Expires at: 2020/07/14
jd-faria@hotmail.com:Pstpcc11 Expires at: 2023/06/07
shelby.mcfadden64@gmail.com:Damondi1 Expires at: 2021/06/28
nyman.oskar@gmail.com:marcusbrei1 Expires at: 2021/01/31
matt_osborn123@hotmail.co.uk:Gorndon123 Expires at: 2022/08/04
travisty@hotmail.com.au:Urgone4eva Expires at: 2020/07/09
winkelsimon74@yahoo.dk:Kassadin88 Expires at: 2022/05/04
andrew_rutherford@yahoo.com:Andrew78212 Expires at: 2022/07/23
spamfaux3066@gmail.com:CsRw303066 Expires at: 2020/07/23
jjsharpe24@gmail.com:Darkron24 Expires at: 2022/10/16
cheekit.chong98@gmail.com:MustangGT1! Expires at: 2022/01/01
liulittung@yahoo.com.hk:Tommy145236 Expires at: 2023/06/27
gianluca.55@hotmail.com:Gcofone55 Expires at: 2022/10/20
brettmy23@gmail.com:Beckett23! Expires at: 2020/07/11
davidas.psg22@hotmail.fr:Onepiece24 Expires at: 2020/06/28
lagman.alister@live.com:Impossible23!$ Expires at: 2023/07/03
patterllarsen@hotmail.com:Patman2k11 Expires at: 2021/05/08
parkerbeach@yahoo.com:Parker02 Expires at: 2021/06/20
jimmyman0613@gmail.com:p681523k Expires at: 2022/10/04
izaiah529@hotmail.com:Angelface1! Expires at: 2021/08/09


ENJOYβ€οΈπŸ‘πŸ»
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Parsero | Robots.txt audit tool:
> Parsero is a free script written in Python which reads the Robots.txt file of a web server and looks at the Disallow entries. The Disallow entries tell the search engines what directories or files hosted on a web server mustn't be indexed. For example, "Disallow: /portal/login" means that the content on www.example.com/portal/login it's not allowed to be indexed by crawlers like Google, Bing, Yahoo... This is the way the administrator have to not share sensitive or private information with the search engines.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1️⃣git clone https://github.com/behindthefirewalls/Parsero.git

2️⃣cd Parsero

3️⃣By using setup.py script

> sudo setup.py install

4️⃣By using pip3

> sudo apt-get install python3-pip

> sudo pip3 install parsero

5️⃣In Kali Linux

> sudo apt-get update

> sudo apt-get install parsero

6️⃣example :

> root@real:~# parsero -u www.example.com -sb

πŸ¦‘Compatible with termux-linux

βœ…git Topic
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
How Red Teams Bypass AMSI and WLDP for .NET Dynamic Code.pdf
495.3 KB
How Red Teams Bypass AMSI and WLDP for .NET Dynamic Code
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘REVERSE ENGINEERING & MALWARES LIST 3 :


http://www.woodmann.com/TiGa/idaseries.html

Http://www.binary-auditing.com/

Http://visi.kenshoto.com/

Http://www.radare.org/y/

Http://www.offensivecomputing.net/

ENJOYβ€οΈπŸ‘πŸ»
βœ…sources git 2020
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Example of JS Malware .pdf
615.9 KB
Good example for js malware + Tutorial