UNDERCODE SECURITY
225 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
πŸ¦‘FACEBOOK HACK WITH PICTURES - BY WIKI

ENJOY β€οΈπŸ‘πŸ»
24/24 posts share usβ€οΈπŸ‘πŸ»

T.me/UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘PyPI official warehouse was poisoned by request malicious package, Tencent Security provides a comprehensive solution

> onion anti-intrusion system detected that the official PyPI warehouse was maliciously uploaded with request phishing packages. The attackers used the phishing packages to steal user sensitive information and digital currency keys, plant persistent backdoors, and remote control. Tencent Security Threat Intelligence Center reviewed this software supply chain attack and found that some users have been recruited.

> Overview

On August 5th, Tencent Onion Anti-Intrusion System detected that the official PyPI warehouse was maliciously uploaded with request phishing packages. The attackers used the phishing packages to steal user sensitive information and digital currency keys, plant persistent backdoors, and remote control. activity. Tencent Security Threat Intelligence Center reviewed this software supply chain attack and found that some users have been recruited.

> When the user installs the requests package, it is easy to mistype the name as request. As a result, it will be installed as a request malicious package using pip. Due to the popularity of the requests library and a large amount of downloads, some users have been infected by incorrectly inputting the package name.

> Since the domestic open source mirror sites are synchronized with the official PyPI warehouse, the problem will not only pass through the official warehouse, but may also affect a wider range through various open source mirror sites. Tencent Security Emergency Response Center (TSRC) recommends that all open source mirror sites and companies that rely on open source mirror sites self-check and deal with them as soon as possible to ensure that malicious libraries are removed and user systems are safe.

#News
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
πŸ¦‘Certified Jenkins Engineer (CJE) β€”2.15 GB β€”

https://mega.nz/folder/Dd8jUaRC#-UWy27KxsPmJoL6ADSzBTg
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Some good mods apk :

> netflix mod apk

https://t.me/UnderCodeTesting/7272

> Spootify mod apk

https://apkmody.io/apps/spotify-premium-apk

> https://apkmody.io/apps/textnow-premium-mod-apk

> Textnow mod apk

https://apkmody.io/apps/textnow-premium-mod-apk

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘HOW HACK/MOD AN ANDROID APK ?

1) Any decompilation of the Android application can freely customize any unreinforced APK installation package, can modify the application icon and application name, replace any text and pictures on the interface, translate or Chinese-made multi-language version, It also supports cracking of application software through advanced SMALI code.



2) It has a large number of templates for Android applications and games to facilitate decompilation. Provide a large number of the latest and most complete applications as customized templates. You can directly download and perform reverse engineering, cracking, modification, viewing source code, viewing installation package information and other operations (partial The application cannot be reverse-engineered temporarily due to reinforcement.



3) Provide multi-channel packaging function. Use the packaged APK installation package as a template. After decompilation, dynamically modify the configuration file or the channel logo in the SMALI code to achieve batch re-multi-channel packaging. Because it is not source code level packaging, it is greatly Improve the speed and efficiency of batch packaging.



4) Providing random package name and application name packaged functionality for adult theaters, adult games, APP , they would often be mobile security software and mobile butler class reported virus software that case, you can randomly from time through this function to replace the package name and application name repackaging, Coupled with the web download program, users can download the latest installation package in real time, avoiding the situation of reporting poison .



5) View the source code of the Android application at will

After decompiling the APK installation package, the source code is obtained by de-mapping. The JAVA code obtained by decompilation is suitable for analyzing the source code and viewing the internal logic of the application. Decompilation is not allowed. The decompilation project can only be modified based on the SMALI code.


6) Built-in many Android application decompilation tools

The software also provides a large number of small tools to view the installation package information, and can view mobile phone information, real-time logs, install and manage mobile phone applications, manage mobile phone files, etc. when the mobile phone is connected to the computer. Directly customize and modify the installed applications on the phone.



πŸ¦‘Decompilation process:

1) Select an apk saved on the hard disk locally to start decompiling, or you can select an application from the application template to decompile

2) Modify the application icon, application name, parameters and version number

3) Modify any picture on the application interface

4) Add or delete app permissions

5) Add language support, localize or modify any string on the interface

6) Modify the code logic, realize the cracking of members, add functions or hide functions, you need to understand the basic code knowledge of smali

7) Search and replace keywords, you can change the text in the application to your own, is it cool?

8) Add small plug-ins, add pop-up registration code, pop-up message box, etc. on any interface of any application, is it very dragging?

10) After everything is changed, pack it on your phone and see the result

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
πŸ¦‘aniother pack 2019-2020 courses :

> Linux+ LPIC Level 1 Exam 2
https://mega.nz/folder/7RsBXLSL#rhgbS_lluxFe4SnM_i2IpQ

> Linux+ LPIC Level 1 Exam 1

https://mega.nz/folder/OMtxVTYa#8tpp1GKr4wBdbEiGok_9Fg

> Nagios Certified Professional

https://mega.nz/folder/PF1X0TjJ#4fuurLsqxts3F09goNOpAA

> Introduction to Linux with Ubuntu 14 Desktop

https://mega.nz/folder/XN1hmZiT#JpGvI4Tp-sRtZ26FrBij8w
Forwarded from Backup Legal Mega
πŸ¦‘Updated Profession Linux & commands :

1) Command Line Basics

https://mega.nz/folder/WZ0TzJCR#OCszFzyRzdM2ZLZeHfzLGA

2) Finding Files In Linux

https://mega.nz/folder/LYtlQRJR#NW8ldVIRJeFM31otzztw5A

3) Use Streams, Pipes, Redirects, Grep and Cut!

https://mega.nz/folder/LYtlQRJR#NW8ldVIRJeFM31otzztw5A

4) Advanced Commands And Examples

https://mega.nz/folder/WQsnQDaR#_AeS6Wvj0TgKhEr42tZPKA

E N J O Y β€οΈπŸ‘πŸ»
Forwarded from UNDERCODER
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

ALL GOOD CHECKERS

πŸ¦‘Spootify & more :

> https://checkz.net/tools/spotify-account-checker

> https://github.com/Xpykerz/Spotify-Checker

πŸ¦‘NETFLIX CHECKER ON GITHUB

https://github.com/AbdeslemSmahi/NetflixChecker
Features:

Python 3.x
Simple readable code
Mass Accounts checker
Combolist support
HTTP Proxy Support

πŸ¦‘2020 cc checkers :

> http://necteknoloji.com/bh7cmz/checker-cc.html

> https://www.freeformatter.com/credit-card-number-generator-validator.html

> https://www.creditcards.com/

> http://mde.com.vn/hnragku/eldersc0de-checker.html

\πŸ¦‘BIGGEST COLLECTION OF CHECKERS


https://mega.nz/#F!ZrAlgYRB!FxAbl6lCbEKafkkNm4J-3g

πŸ–‡Steam Checker

https://mega.nz/#F!Ui4nxZaB!1cG90VM6QIJaNpImnyNUBg

πŸ–‡Gmail Checker

https://mega.nz/#F!R7pznRBb!Xicc7uBYhLrEZ7LQKqPR5w

πŸ–‡Ebay Checker

https://mega.nz/#F!FzgQ1ZKK!aq4wyqjpYkRvbZJzIyJwqg

πŸ–‡PSN Checker

https://mega.nz/#F!xzRhQDRZ!fCwrExaL_rbZoV9HZqbTJA

πŸ–‡Skype Checker

https://mega.nz/#F!RmJjDD7C!ETsOJjw0qe-e9StFbSdnfA

πŸ–‡Direct Tv Checker

https://mega.nz/#F!RyZVXJwb!oW0YfM_hkd4rv880_PC6lA

πŸ–‡Instagram Checker

https://mega.nz/#F!FnATESTZ!qux4N4fYy3v__aO1y6ZcXw

πŸ–‡Origin Checker

https://mega.nz/#F!Nm5HyT6b!BxNl7TGp0zMY5uFK66ADoA

πŸ–‡Uplay Checker

https://mega.nz/#F!EnJllRjB!zcQlw2c3FTeeYS8F3rnneg

πŸ–‡NFL Checker

https://mega.nz/#F!1igCSQLZ!XIWhHhAMdt8hMwzqGe0BFg

πŸ–‡NBA checker

https://mega.nz/#F!MiYkGQJI!iS1oNC5OILBgmXqxy1Wqxw

πŸ–‡Hulu Checker

https://mega.nz/#F!06IGSLJA!pE_gPS-zXPH9-sBHaenAWQ

πŸ–‡HBO Checker

https://mega.nz/#F!Vuol1RjJ!p3upMORnPj_yK0tzuM8Bew

πŸ–‡Spotify Checker

https://mega.nz/#F!MrIxzLRb!MrvGM93IoBZNrUqcyd13ZQ

πŸ–‡Minecraft Checker

https://mega.nz/#F!VnYExALD!Gq6s0wcWHBGasqVf7R4VvQ

πŸ–‡FaceBook Checker

https://mega.nz/#F!BqgVCK4Y!wNUr88nr6kXCKQ5C4IMB1Q

πŸ–‡Crunchyroll Checker

https://mega.nz/#F!piwjWZrb!9rOOXFXrSdIqC1EcDsDCjw

πŸ–‡Netflix Checker

https://mega.nz/#F!djxXyIAB!Nif0xPb6QZvGuXctLY6CIQ

U S E F O R L E A R N

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘The blackmailer virus VirLocker strikes again? How to prevent VirLocker virus (with recovery guide included)
#FastTips

1) VirLocker's polymorphic function

VirLocker's changeable capabilities make everyone a headache, researchers, victims, security companies, etc. Every time VirLocker adds itself to a file, in fact the file is different from other versions of itself in many ways. VirLocker can add "pseudo-code" to some parts of itself to make the files different. It can use different APIs in the main loader of the malware to avoid partial fingerprint recognition. It can use different XOR and ROL seeds to make the files available. The encrypted content of the executable file is completely different and so on. This level of polymorphism makes it very difficult to handle.Even when the decompression stub in each file is different, it is usually used to identify each variant, it only leaves behavior and heuristics as a feasible detection method.

2) if the payload stub can be different in each creation request, and the encryption code is always seeded differently, the embedded original file will of course always be different. It depends on the file it attacks, and the resource is just a small icon of the original file it attacks. This leaves very little suitable for testing.

3) The execution of VirLocker is by no means simple. Compared with the blackmailer virus scenario that we have seen in a single case, it truly reflects multiple types of protection. When the infection is executed, the FUD wrapper (which can be polymorphic in some respects itself) unpacks the first decryption function mixed with Base64 and XOR and is always seeded differently. This new decryption function then decrypts another new decryption function mixed with XOR/ROL and is always seeded differently.

E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Recently we post some large wordlists but anyway this so helpful for you :
wordlistctl: large database of dictionaries [Dictionary Collection]
wordlistctl is a program that contains a large database of dictionaries :

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

wordlistctl is created by blackarch.org developers, web site: https://github.com/BlackArch/wordlistctl

How to install wordlistctl
Installing wordlistctl on Kali Linux:

1) sudo apt install python3-pip python3-libtorrent python3-coloredlogs

2) git clone https://github.com/BlackArch/wordlistctl

3) cd wordlistctl

4) Open the requirements.txt file

5) gedit requirements.txt
And remove the line from there

> libtorrent

Then continue:

6) sudo pip3 install -r requirements.txt

7) python3 ./wordlistctl.py

8) In BlackArch, this program is in the standard repository – install directly from there.

> sudo pacman -S wordlistctl

9) How to use wordlistctl

10) All dictionaries are divided into 5 categories:

username
password
hostname
filename
misc = other

11) To show all dictionaries, for example, in the password category:

> wordlistctl -F password
With the -S option, you can search by dictionary names, for example, search for β€˜RU..

enjoyβ€οΈπŸ‘πŸ»
@UndercodeTesting
git topic 2020βœ…
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
RDP Pivoting with Metasploit .pdf
1.4 MB
RDP HACKING FULL WITH PICTURES
E
N J O Y β€οΈπŸ‘πŸ»
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘doork is a open-source passive vulnerability auditor tool that automates the process of searching on Google information about specific website based on dorks.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1
) git clone https://github.com/AeonDave/doork doork
doork works with Python version 2.6.x and 2.7.x on any platform. You have also to install

2) pip install beautifulsoup4

3) pip install requests

4) pip install Django

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ANOTHER WHATSAPP HACKING -2020 UPDATED


QRLJacking or Quick Response Code Login Jacking is a simple social engineering attack vector capable of session hijacking affecting all applications that rely on the β€œLogin with QR code” feature as a secure way to login into accounts. In a nutshell, the victim scans the attacker’s QR code which results in session hijacking.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) Update Firefox browser to the latest version

2) Install the latest geckodriver from https://github.com/mozilla/geckodriver/releases and extract the file then do :

3) chmod +x geckodriver

4) sudo mv -f geckodriver /usr/local/share/geckodriver

5) sudo ln -s /usr/local/share/geckodriver /usr/local/bin/geckodriver

6) sudo ln -s /usr/local/share/geckodriver /usr/bin/geckodriver

7) Clone the repo with git clone https://github.com/OWASP/QRLJacking then do cd QRLJacking/QRLJacker

8) Install all the requirements with pip install -r requirements.txt

9) Now you can run the framework with python3 QrlJacker.py --help

πŸ¦‘Tested by us on :

> Ubuntu lastest v

> Kali Linux lastest v

> parrot os lastest v

> fedora lastest v

πŸ¦‘MORE TUTORIAL ABOUT IT :

https://www.owasp.org/index.php/QRLJacking

https://www.owasp.org/index.php/OWASP_QRLJacker

enjoyβ€οΈπŸ‘πŸ»
@UndercodeTesting
git topic 2020βœ…
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁