UNDERCODE SECURITY
226 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
πŸ¦‘one of the member has shared some links that he has discovered and using those material for his interview and studies

i am sharing those links with you He has share this with the moto of free education
Please dont buy courses from anyone If you do a little reseach you can find with in little time


https://mega.nz/folder/z6QBBCLZ#aCH5fFkt8eHQcSBfxqEuoA

Algoexperts DSA (Torrent):
https://www.1377x.to/torrent/4301420/Premium-AlgoExpert-Become-an-Algorithms-Expert/

Algoexperts DSA(Drive Link):
https://drive.google.com/file/d/1tQrEfB_iJEfWyZAzIVvPfIjQv08T5Cp8/view?usp=drivesdk

ONE DRIVE LINK
https://mygavilan-my.sharepoint.com/:f:/g/personal/kali_masi_my_gavilan_edu/EuI-fMjjTbJLoBFW2hDB9lcBXJTKbvguDj2oFotQo6iYKA?e=8yAG1D
Google Drive
https://drive.google.com/drive/mobile/folders/1ndpfnGW4ed-hxqFuyZ2aMyuc6MseOdCx/1szZmcER2CjAFbcqCLitTn_4nyv0wxUjn?sort=13&direction=a
♦️AlgoExpert COMPLETE
AlgoExpret Systems Design Fundamentals + Become an Algorithms Expert

GOOGLE DRIVE:
https://drive.google.com/drive/folders/1i0vxI-NpgRkTGmFwvrZp7rHY6C6vKSQB?usp=sharing

https://mega.nz/#F!aJUnzKRB!dKybM_7VQGFalmEespiqpw

Algoexperts System Design:
https://drive.google.com/file/d/1rdDtx2mxmBjy2YuPPCDY9TnsOB8mhg0p/view

Backtoback SWE
https://drive.google.com/folderview?id=1j-1zeOcY8xcevVS3Fm9kkPbxZ4ofBHze

Dynamic Programming Playlist | Coding | Interview Questions | Tutorials | Algorithm
https://www.youtube.com/playlist?list=PL_z_8CaSLPWekqhdCPmFohncHwz8TY2Go


I added 246 books as following
Batch One Update 2.5 GIGA BYTE OF BOOKS
1- .NET 13 BOOK
2- ANGULAR 12 BOOK
3- BOOTSTRAP 30 BOOK
4-FRONT END 16 BOOK
5-HTML - CSS 42 BOOK
6- JAVA 30 BOOK
7- JAVA SCRIPT 78 BOOK
8- NODE JS 25 BOOK

TOTAL BOOKS 246 BOOK
https://drive.google.com/drive/u/1/folders/1aXlI-fNsCGmwrFLjSSkHA3FSTClnSSnb

Placement Material
https://drive.google.com/open?id=1oLvYU3uj23fumRNF9IL8yIE4vYIVvvSz

(Not our upload, but i hope you learn some :)
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘TWITTER BOT 2020 :


F E A T U R E S :

Tweets
trending projects every 30 minutes

Refreshes the configuration of twitters URL shortener t.co
every 24 hours

Blacklisting of repositories for 30 days (to avoid tweeting a
project multiple times in a short timeframe)

Maximum use of 140 chars per tweet to fill up with
information

Debug / development mode

Multiple storage backends (currently Redis and in memory)

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) Download the latest release
https://github.com/andygrunwald/TrendingGithub/releases/latest

2) Extract the archive (zip / tar.gz)

3) Start the bot via ./TrendingGithub -debug
For linux this can look like:

4) curl -L https://github.com/andygrunwald/TrendingGithub/releases/download/v0.4.0/TrendingGithub-v0.4.0-linux-amd64.tar.gz -o TrendingGithub-v0.4.0-linux-amd64.tar.gz

5) tar xzvf TrendingGithub-v0.4.0-linux-amd64.tar.gz

6) cd TrendingGithub-v0.4.0-linux-amd64

7) ./TrendingGithub -debug

8) $ ./TrendingGithub -help
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ‘₯ fast and powerful dashboard dashboard search tool (admin) :

Cangibrina is a multi-platform tool that is designed to access the site admin panel using brute force, google, nmap and robots.txt.

> >Dependencies

Python 2.7
mechanize
PySocks
beautifulsoup4
html5lib
Nmap (–nmap)
TOR (–tor)
Installation:
Linux

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://github.com/fnk0c/cangibrina.git

2) cd cangibrina

3) pip install -r requirements.txt
Using
usage: cangibrina.py [-h] -u U [-w W] [-t T] [-v] [--ext EXT] [--user-agent]
[--tor] [--search] [--dork DORK] [--nmap [NMAP]]

4) Fast and powerful admin finder

optional arguments:
-h, --help show this help message and exit
-u U target site
-w W set wordlist (default: wl_medium)
-t T set threads number (default: 5)
-v enable verbose
--ext EXT filter path by target extension
--user-agent modify user-agent
--sub-domain search for sub domains instead of directories
--tor set TOR proxy
--search use google and duckduckgo to search
--dork DORK set custom dork
--nmap [NMAP] use nmap to scan ports and services

E X A M P L E S

python cangibrina.py -u facebook.com

python cangibrina.py -u facebook.com -v

python cangibrina.py -u facebook.com -w /root/diretorios.txt -t 10 -v

python cangibrina.py -u facebook.com --search -v

python cangibrina.py -u facebook.com --search --dork 'site:facebook.com inurl:login'

python cangibrina.py -u facebook.com -v --nmap

python cangibrina.py -u facebook.com -v --nmap 'sudo nmap -D 127.0.0.1 -F facebook.com'

python cangibrina.py -u facebook.com --user-agent

python cangibrina.py -u facebook.com --ext php

[IMPORTANT] DORK MUST BE WRITE BETWEEN QUOTES !
[Example] 'inurl:login.php'

Β― \ _ (ツ) _ / Β―


@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘The main categories of Spam Tools:
Depending on their functionality, Spam tools are usually divided into these categories:

1) E-mail extraction software. Such Spam tools are mostly used for collecting e-mail addresses from various websites, documents and other resources. Once they are collected, they are added to mailing lists and prepared for the use;


2) Mass mailing programs. This category of Spam Tools is usually used to spread email messages. They help spammers to send their emails to thousands of different recipients;


3) E-mail management programs. Such software can be applied for identifying and removing useless email addresses from the list of email recipients. These addresses usually include emails of specific organizations that are capable of identifying the owner of the Spam tool.


4) Referral spam. This technique is used to abuse website’s referrer and change its URL to a needed web page. By using it, spammers expect that website’s owner will see this link in his/hers Google analytics and will think that this site is important. Beware that the most of websites that rely on referrer spam are harmful and visiting them can cause infiltration of malware!


byspyware
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Neptune exploit how it works ?
kit distributes Monero miner

Cybercriminals use the Neptune exploit kit in a malicious miner distribution campaign. This is reported by experts from the firm FireEye. Neptune, also known as Terror, Blaze, and Eris, was originally thought to be a variant of the Sundown exploit kit due to its similarity in code. With the disappearance of kits such as Angler and Neutrino, Sundown also declined in activity, giving way to RIG.

However, Neptune has gained popularity and is still used in malicious advertising campaigns, in particular those aimed at distributing cryptocurrency miners. FireEye recently discovered several changes in Neptune attacks, including URI patterns, landing pages, and malicious payload.

Attackers use a legitimate pop-up ad service to spread malware. Cybercriminals also disguise their sites by changing the top-level domain from .com to .club (for example, highspirittreks.com and highspirittreks.club). One such malicious site also mimics the YouTube video to MP3 converter.

Typically, malicious ads for this campaign are found on popular torrent sites. When a user enters one of these sites, an attempt is made to exploit three vulnerabilities in Internet Explorer and two in Adobe Flash Player. It is noteworthy that none of the exploited vulnerabilities are new, they were all disclosed back in 2014-2016.


@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ§ Shell script for backing up MongoDB database :

1) MongoDB is a cross-platform, document-oriented NoSql database server.

2) In this tutorial, you will find a wrapper script for backing up a MongoDB database.

3) The script also deletes server backups older than the specified day.
You can copy this script:
! / bin / bash


################################################# #####################

##

## MongoDB Database Backup Script

## Written By: Rahul Kumar

## Update on: June 20, 2020

##

################################################# #####################

export PATH = / bin : / usr / bin : / usr / local / bin

TODAY = date + "% d% b% Y "


################################################# #####################

################################################# #####################

DB_BACKUP_PATH = '/ backup / mongo'

MONGO_HOST = 'localhost'

MONGO_PORT = '27017'


# If mongodb is protected with username password.

# Set AUTH_ENABLED to 1

# and add MONGO_USER and MONGO_PASSWD values ​​correctly

AUTH_ENABLED = 0

MONGO_USER = ''

MONGO_PASSWD = ''

# Set DATABASE_NAMES to "ALL" to backup all databases.

# or specify databases names seprated with space to backup

# specific databases only.

DATABASE_NAMES = 'ALL'

# DATABASE_NAMES = 'mydb db2 newdb'

## Number of days to keep local backup copy

BACKUP_RETAIN_DAYS = 30

################################################# #####################

################################################# #####################

mkdir - p $ { DB_BACKUP_PATH } / $ { TODAY }

AUTH_PARAM = ""

if [ $ { AUTH_ENABLED } - eq 1 ] ; then

AUTH_PARAM = "--username $ {MONGO_USER} --password $ {MONGO_PASSWD}"

fi

if [ $ { DATABASE_NAMES } = "ALL" ] ; then

echo "You have choose to backup all databases"

mongodump - host $ { MONGO_HOST } - port $ { MONGO_PORT } $ { AUTH_PARAM } - out $ { DB_BACKUP_PATH } / $ { TODAY } /

else

echo "Running backup for selected databases"

for DB_NAME in $ { DATABASE_NAMES }

do

mongodump - host $ { MONGO_HOST } - port $ { MONGO_PORT } - db $ { DB_NAME } $ { AUTH_PARAM } - out $ { DB_BACKUP_PATH } / $ { TODAY } /

done

fi

######## Remove backups older than {BACKUP_RETAIN_DAYS} days ########

DBDELDATE = date + "% d% b% Y " - date = " $ {BACKUP_RETAIN_DAYS} days ago "


if [ ! - z $ { DB_BACKUP_PATH } ] ; then

cd $ { DB_BACKUP_PATH }

if [ ! - z $ { DBDELDATE } ] && [ - d $ { DBDELDATE } ] ; then

rm - rf $ { DBDELDATE }

fi

fi


######################### End of script ###################### ########

4) MongoDB backup schedule
You can easily schedule this script in crontab for regular database backups.

0 2 * * * / backup / mongo - backup .sh

@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Mind valley
Unlocking Transcendence withJeffrey Allen

https://drive.google.com/folderview?id=1l2usYpm0ajOXZamHi7IJ3ZCAgleuCsKa
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ—„WTLAN | Five Key Considerations When Choosing Floor Standing Server Cabinets :

1) Server cabinet cooling systems
The choice of server cabinet will depend on the cooling system implemented in your data center and server room.

Hot Aisle Containment (HAC) and Cold Aisle Containment (CAC) systems are highly efficient air control processes that optimize the use of cold air by improving the flow of chilled air through aisles and server enclosures.
In connection with the increase in the cost of electricity energy planning it is also an important factor to be taken into account, because such action may include reducing the amount of used by the PDU, rack selection with improved cabling and space for ventilation.
Follow the link to view the solutions from WTLAN - https://wtlan.ru/catalog/Napolnyeshkafy/

2) Power management
Power distribution units (PDUs) and battery backup are also important factors to consider when choosing a server cabinet and the number of outlets required.

Remote power tools such as smart power strips can help reduce server downtime, and reboot problems can be resolved from a remote location via internet access, whereas standard power strips can provide vital information and must be locally controlled.

3) Server cabinet size
Server cabinets and internal racks are available in a wide range of sizes up to 48U, 19 '' and ETSI standard, in a wide range of widths from 600 mm, 800 mm and 1000 mm, in a wide range of depths from 600 mm, 800 mm, 900 mm, 1000 mm and 1200 mm.

Key features and benefits may include: - modular design, factory assembled, bay design (using a docking kit), hybrid design, thermal efficiency, hot and cold aisle isolation, robust locking solutions, a range of cable and accessory options.

4) Security
Companies are constantly looking for ways to improve their security solutions, as security and protection are very important for a growing number of businesses to protect against vandalism.

Floor-standing server cabinets can provide the following security options: - fire protection, highly reliable locking solutions

Additional measures include lockable front and rear doors, limiting the number of windows in a building and ensuring safe entrances and exits, and installing video surveillance for additional security measures.

5) Server cabinet design
Selecting the right server cabinets and racks and installing them according to your business needs will keep your IT equipment running reliably and efficiently and help improve power protection, cabling, and physical security.

When designing a server cabinet, consider: - the height of the internal cabinet, width, depth, and rated load, cabinet layout, room characteristics, electrical equipment placement, cabling and environmental protection.

You can also choose from several cabinet options and accessories, including: - cable trunking kit, chassis rail kit, shelves, top and side panels, mounting rails, heavy duty wheel kit, and paint color.

don't clone those written tutorials,or
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS
New Categories & Speed improuvement added to Undercodenews.com
Forwarded from UNDERCODE NEWS
New technique, how to scientifically identify fake photos with "no PS traces"?
#Updates
_
Forwarded from UNDERCODE NEWS
BE AWARE FROM NEW CVE IN Mida Framework 2.9.0
#Vulnerabilities
_
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘πŸ‰ How to Install Atom Text Editor on Kali Linux 2020.x ?

Key features of the Atom text editor

-Cross-platform editing: works on Windows, Linux and macOS

-Has a built-in package manager: easily find and install packages to extend Atom capabilities.

-Smart AutoComplete: Write and edit code faster with smart and flexible autocomplete.

-File System Browser: Easily view and open a single file, an entire project, or multiple projects in one window.

--Highly Customizable: Customize the look and feel of your user interface with CSS / Less and add basic functionality with HTML and JavaScript.

-Provides Multiple Panels: Split the Atom interface into multiple panels for comparing and editing code between files

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

Installing Atom Text Editor on Kali Linux
Add the official Atom package repository to your system by running the following command.

1) sudo apt update

2) sudo apt -y install wget gpg

3) sudo sh -c 'echo "deb [arch=amd64] https://packagecloud.io/AtomEditor/atom/any/ any main" > /etc/apt/sources.list.d/atom.list'

4) The repository content will be stored in a file:

$ cat /etc/apt/sources.list.d/atom.list
deb [arch=amd64] https://packagecloud.io/AtomEditor/atom/any/ any main

5) Import the GPG key:
wget -qO - https://packagecloud.io/AtomEditor/atom/gpgkey | sudo apt-key add -

6) Then update apt and install the Atom text editor on your Kali Linux machine:

sudo apt update
sudo apt install atom

7) Accept the installation prompt with the y key:


@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁