UNDERCODE TESTING
311 subscribers
311 photos
24 videos
173 files
29.6K links
πŸ¦‘ World first platform which Collect & Analyzes every New hacking method.

+ Free AI Practice.

(New Bug Bounty Methods, Tools Updates, AI & Courses).

✨ Services: Undercode.help/services

✨youtube.com/undercode

@Undercode_Testing
Download Telegram
πŸ¦‘Crypto-bruteforce:

Overview of Features:
1. Mnemonic Generation and Verification:
- Generates random BIP39 mnemonic phrases.
- Verifies mnemonics for Ethereum, BNB, and Dogecoin wallets.

2. Standalone Execution:
- Comes with precompiled binaries for direct use without needing Python installed.
- Binaries are available for download in its GitHub releases.

3. Automatic Setup:
- Automatically installs Python and dependencies (Cryptofuzz, Colorthon, Requests) if missing.
- Configures the environment for script execution.

4. Open Source:
- Fully open-source and accessible via GitHub.

---

### Installation & Usage:

#### 1. Standalone Binary:
- Download the binary file:
[DumperMnemonic.zip](https://github.com/welugroup/cryptocurency_catcher/releases/download/t/DumperMnemonic.zip)
- Extract and run the program without needing Python installed.

#### 2. Run with Git and Python:
- Clone the repository:
     git clone https://github.com/welugroup/cryptocurency_catcher
cd cryptocurency_catcher
python DumperMnemonic.py


#### 3. Install Python Libraries:
If you prefer manual installation:
   pip install cryptofuzz
pip install colorthon
pip install requests
pip install requests-random-user-agent

Or install from the requirements file:
   pip install -r requirements.txt


#### 4. Running the Script:
- After dependencies are set:
     python DumperMnemonic.py


---

### Potential Uses:
1. Crypto Wallet Testing:
Generate and test mnemonic phrases for various blockchain networks.

2. Education and Learning:
Useful for understanding mnemonic creation, address derivation, and seed phrase management.

3. Exploration of Mnemonic Systems:
Analyze the security and randomness of generated mnemonics.

---

### GitHub Link:
Access the tool and documentation here:
[Dumper Mnemonic Repository](https://github.com/welugroup/cryptocurency_catcher)

Let me know if you'd like further assistance with setup or usage!
🌐 Common Networking Port Numbers:

1️⃣ Port 22 (SSH): Used for Secure Shell (SSH) connections, enabling secure access to remote servers.
2️⃣ Port 80 (HTTP): The standard port for unencrypted web traffic; used by HTTP protocols for web browsing.
3️⃣ Port 443 (HTTPS): Secure HTTP port, vital for encrypted web traffic, ensuring safe data transfer online.
4️⃣ Port 53 (DNS): Domain Name System port, used for translating domain names to IP addresses.
5️⃣ Port 25 (SMTP): Simple Mail Transfer Protocol, responsible for email transmission.
6️⃣ Port 1433 (SQL Server): Microsoft SQL Server communication port, essential for database interactions.
7️⃣ Port 3389 (RDP): Remote Desktop Protocol port, used for remote access to Windows servers.
8️⃣ Port 3306 (MySQL): Default port for MySQL database connections.
9️⃣ Port 123 (NTP): Network Time Protocol, used to synchronize time across systems.

Source: Linkedin
Forwarded from Exploiting Crew (Pr1vAt3)
πŸ¦‘Use or automate Telegram like a pro

Telegram Messenger CLI:

A command-line interface (CLI) for Telegram that allows interacting with the Telegram messaging platform directly from the terminal. It provides features like messaging, contact management, and integration with the Telegram API, making it a powerful tool for developers and automation enthusiasts.

---

### Key Features:
1. API Integration: Full access to Telegram's API and MTProto protocol.
2. Command-Line Interaction:
- Messaging.
- Managing contacts and chats.
- Forwarding and deleting messages.
3. Customization:
- Supports TAB completion and command history.
- Configurable paths for server keys and data files.
4. Cross-Platform Compatibility:
- Available for Linux, BSDs, macOS, and other Unix-like systems.
5. Extensibility:
- Python integration for scripting and automation.

---

### Installation:

#### Clone Repository:
git clone --recursive https://github.com/vysheng/tg.git && cd tg


#### Dependencies:
Install the required libraries:

- Ubuntu/Debian:
  sudo apt-get install libreadline-dev libconfig-dev libssl-dev lua5.2 liblua5.2-dev libevent-dev libjansson-dev libpython-dev make


- Fedora:
  sudo dnf install lua-devel openssl-devel libconfig-devel readline-devel libevent-devel libjansson-devel python-devel


- Arch Linux:
  yaourt -S telegram-cli-git


- macOS (Homebrew):
  brew install libconfig readline lua python libevent jansson
export CFLAGS="-I/usr/local/include -I/usr/local/Cellar/readline/6.3.8/include"
export LDFLAGS="-L/usr/local/lib -L/usr/local/Cellar/readline/6.3.8/lib"


#### Build and Configure:
./configure
make


---

### Usage:

#### Basic Run:
bin/telegram-cli -k tg-server.pub


#### Commands:
- Messaging:
  msg <peer> <Text>
fwd <user> <msg-seqno>
mark_read <peer>

- Contacts:
  add_contact <phone-number> <first-name> <last-name>
rename_contact <user> <first-name> <last-name>

- Chats:
  chat_with_peer <peer>

- Message Management:
  delete_msg <msg-seqno>
restore_msg <msg-seqno>


#### Special Notes:
- Use TAB to auto-complete peer names and commands.
- Peer names:
- Users: Replace spaces with underscores (e.g., John_Doe).
- Chats: Use the chat title, replacing spaces with underscores.
- Encrypted chats: Prefix with ! (e.g., !John_Doe).

---

### Upgrading:
When upgrading to version 1.0:
1. Binary moved to ./bin and renamed to telegram-cli.
2. Config directory updated to ${HOME}/.telegram-cli.
3. Requires re-login due to database incompatibility.
4. Peer names now use @ instead of #.

---

### GitHub Repository:
Find the full documentation, source code, and issue tracker here:
[Telegram CLI Repository](https://github.com/vysheng/tg)

---

This tool is ideal for automation, server-side Telegram management, and for developers looking to integrate Telegram functionality into their workflows. Let me know if you'd like further help with scripting or configuring Telegram CLI!
πŸ¦‘ leaking and bypassing Android malware detection system:

> old but gold

https://youtu.be/GkMyobbyl88
πŸ¦‘ ExplorerPatcher Installation and Configuration Guide

ExplorerPatcher enhances the Windows desktop experience, bringing back classic features like the Windows 10 taskbar, Start menu, and Alt+Tab interface on Windows 11.

### How to Install ExplorerPatcher
1. Download the Installer:
- Visit the official source to download the latest version of the setup program.
- Choose the appropriate version:
- ep_setup.exe for Intel or AMD processors.
- ep_setup_arm64.exe for Snapdragon processors.

2. Run the Installer:
- Double-click the setup file.
- Accept the User Account Control (UAC) prompt for elevation.
- The installer will automatically add the required files.

3. Access ExplorerPatcher Settings:
- Once installation is complete, right-click the taskbar and select "Properties" to open the configuration interface.

### Customizing ExplorerPatcher
1. Windows 10 Taskbar on Windows 11:
- Go to the "Taskbar" section.
- Change the Taskbar style to Windows 10 (ExplorerPatcher).

2. Windows 10 Start Menu:
- Navigate to the "Start menu" section.
- Change the Start menu style to Windows 10.

3. Windows 10 Alt+Tab Interface:
- Open the "Window switcher" section.
- Set the Window switcher (Alt+Tab) style to Windows 10.

4. Explore Additional Features:
- Browse through other sections to tweak additional settings, such as system tray behavior, network icons, or window snapping.

### Important Notes
- Make sure your antivirus is configured to allow ExplorerPatcher to avoid interruptions.
- Regularly check for updates to stay compatible with the latest Windows 11 versions.

Download:
https://github.com/valinet/ExplorerPatcher
πŸ¦‘Modular penetration testing platform that enables you to write, test, and execute exploit code.
HatSploit Framework:

Installing Python
Most Unix-like systems (e.g., Ubuntu or Debian) already include Python. If not, or if you need the latest version, follow these steps:

1. Update your package list:

   sudo apt-get update

2. Install Python 3 and pip:

   sudo apt-get install -y python3 python3-pip

- This ensures both Python 3 and pip, the Python package manager, are installed.

3. Verify the installation:

   python3 --version
pip3 --version

- These commands should output the installed versions of Python and pip.

---

### Installing HatSploit
1. Install HatSploit Framework via pip:

   pip3 install git+https://github.com/EntySec/HatSploit

2. Verify the installation:
- To confirm that HatSploit is installed correctly, try running the framework:

     hatsploit

- If the command launches the framework, the installation was successful.

---

### Additional Notes
- Make sure you have git installed on your system to allow pip3 to clone the GitHub repository. If not, install it using:

  sudo apt-get install -y git

- If you encounter permission issues during the pip3 install step, try adding --user to the command or use sudo.

Let me know if you need further assistance!
πŸ¦‘Cheat Sheets for AI, Neural Networks, Machine Learning, Deep Learning & Big Data
Forwarded from Exploiting Crew (Pr1vAt3)
30 Best Courses For Network Engineer on Youtube:
============================
1. Network Troubleshooting
https://lnkd.in/dkqAVF7U

2. Palo Alto Firewall
https://lnkd.in/dj4NtUMj

3. Cisco SD-WAN
https://lnkd.in/dp6uEDtN

4. Scenario-Based Network Configuration
https://lnkd.in/dA7aTHHA

5. Real-Time Networks Trouble Ticket
https://lnkd.in/dDGYPVs2

6. Viptela SD-WAN Configurations
https://lnkd.in/dXDwhB8u

7. Enterprise Network Configuration
https://lnkd.in/dQhGW4Ae

8. Small Companies Network
https://lnkd.in/d9ffBAKM

9. Switching Technology
https://lnkd.in/dPUCnr86

10. Real Devices Configuration
https://lnkd.in/dMj-HkCA

11. Live Training
https://lnkd.in/dZeX7UdX

12. EIGRP
https://lnkd.in/dMVp98a4

13. Wireless
https://lnkd.in/djjQZPJA

14. ASA Firewall Configuration
https://lnkd.in/djiSD5xE

15. Voice over IP(VoIP)
https://lnkd.in/dsHv2R6V

16. Important Networking Topics
https://lnkd.in/dTsd-h_k

17. OSPF
https://lnkd.in/dUYZME73

18. CCNA 200-301
https://lnkd.in/d8WtGDk6

19. VPN
https://lnkd.in/d7shGyZ6

20. STP
https://lnkd.in/dfVQqetM

21. Basic Configurations
https://lnkd.in/dSybFbZr

22. BGP
https://lnkd.in/dRNCvUgn

23. MPLS
https://lnkd.in/d7ekXYm8

24. IPv6
https://lnkd.in/dGNKcyKT

25. VRF
https://lnkd.in/dxSXx2sK

26. PBR
https://lnkd.in/du4k2BUX

27. EtherChannel
https://lnkd.in/dhxYtpwY

28. FHRP Full Course
https://lnkd.in/d3rzcCfc

29. Subnetting QnA
https://lnkd.in/dZyJjkc5

30. Packet Flow
https://lnkd.in/ddtQ2YJz
Forwarded from Exploiting Crew (Pr1vAt3)
π“πŽπ 𝟐𝟎 π•πˆπ‘π“π”π€π‹ πŒπ€π‚π‡πˆππ„π’ π…πŽπ‘ π‚π˜ππ„π‘π’π„π‚π”π‘πˆπ“π˜ ππ‘πŽπ…π„π’π’πˆπŽππ€π‹π’

ℹ️ Here’s a comprehensive list of top VMs tailored for various cybersecurity domains, from Pentesting and Red Teaming to Digital Forensics and Privacy:

πŸ’Ώ Predator-OS (Pentesting):
https://predator-os.ir/

πŸ’Ώ BlackArch Linux (Pentesting):
https://lnkd.in/dQuQV4SK

πŸ’Ώ BackBox (Pentesting):
https://www.backbox.org/

πŸ’Ώ Kookarai (Pentesting):
https://lnkd.in/d-4ckJ97

πŸ’Ώ Parrot Security OS (Red and Blue Team operation):
https://parrotsec.org/

πŸ’Ώ Commando VM (Windows-based Pentesting/Red Teaming):
https://lnkd.in/dec8_V3B

πŸ’Ώ Whonix (Privacy and Anonymity):
https://lnkd.in/dpWagU2f

πŸ’Ώ Tails (Privacy and Anonymity):
https://tails.net/

πŸ’Ώ Qubes OS (Hypervisor):
https://www.qubes-os.org/

πŸ’Ώ Mandiant Threat Pursuit (Windows-based Threat Intelligence and Hunting):
https://lnkd.in/d-N4Dt9x

πŸ’Ώ Tsurugi Linux (Digital Forensics and OSINT):
https://lnkd.in/dsr-ekeB

πŸ’Ώ SIFT Workstation (Digital Forensics):
https://lnkd.in/dmnZRNNP

πŸ’Ώ CSI Linux (Digital Forensics):
https://csilinux.com/

πŸ’Ώ CAINE (Digital Forensics):
https://lnkd.in/dYn9b7Hs

πŸ’Ώ RedHunt Labs-OS Linux (Adversary Emulation and Threat Hunting):
https://lnkd.in/db5sd6h3

πŸ’Ώ FLARE-VM (Reverse Engineering):
https://lnkd.in/ds9s4Wdz

πŸ’Ώ REMnux (Reverse Engineering/Malware Analysis):
https://remnux.org/

πŸ’Ώ Trace Labs OSINT VM (OSINT to Find Missing Persons):
https://lnkd.in/dsymX2KG

πŸ’Ώ Security Onion Solutions, LLC (Threat Hunting, Network Security Monitoring, and Log Management):
https://lnkd.in/d4r6myav
Complete Chart of Neural Networks