———-UNDERCODE——-
🦑Social Engeneer TuTorial:
Generate payload for py2exe applications Completly controle
(t.me/UnderCodeTestingofficial)
🦑REQUIREMENTS:
1)Linux
2)cmake
3)git
4)python2.7
🦑INSTALLISATION:
1) git clone https://github.com/4w4k3/rePy2exe.git
2)cd rePy2exe
3)python rePy2exe.py
4) CHOOSE OPTIONS VIA NUMBERS
@ Steave(t.m.)
———UNDERCODE———-
🦑Social Engeneer TuTorial:
Generate payload for py2exe applications Completly controle
(t.me/UnderCodeTestingofficial)
🦑REQUIREMENTS:
1)Linux
2)cmake
3)git
4)python2.7
🦑INSTALLISATION:
1) git clone https://github.com/4w4k3/rePy2exe.git
2)cd rePy2exe
3)python rePy2exe.py
4) CHOOSE OPTIONS VIA NUMBERS
@ Steave(t.m.)
———UNDERCODE———-
Telegram
UNDERCODE TESTING COMPANY OFFICIAL
🦑 WELCOME TO UNDERCODE TESTING FOR LEARN HACKING & PROGRAMMING & MORE...
🅶🅸🆃🅻🆄🄱
@UndercOdeTesting
🆈🄾🆄🆃🆄🄱🅴
@UnderCodeTestingCompany
🅵🄰🅲🅴🄱🄾🄾🅺
@UndercOdeTestingCompanie
🅸🅽🆂🆃🄰🅶🆁🄰🅼
@UndercOdeTestingCompany
🆃🆆🅸🆃🆃🅴🆁
@UndercOdeTC
🅻🅸🅽🅺🅴🅳🅸🅽
@UnderCodeTesting
🅶🅸🆃🅻🆄🄱
@UndercOdeTesting
🆈🄾🆄🆃🆄🄱🅴
@UnderCodeTestingCompany
🅵🄰🅲🅴🄱🄾🄾🅺
@UndercOdeTestingCompanie
🅸🅽🆂🆃🄰🅶🆁🄰🅼
@UndercOdeTestingCompany
🆃🆆🅸🆃🆃🅴🆁
@UndercOdeTC
🅻🅸🅽🅺🅴🅳🅸🅽
@UnderCodeTesting
--------UNDERCODE-----
The King Hacking Script
(T.me/UnderCodeTestingOfficial)
🦑FEATURES:(Automate)
1) DDOS
2) WIFI HACk
3) WEB HACK
4) Payloads
5) Virus
6) Spam
AND MUCH MORE
🦑Installations:
1)!git clone https://github.com/king-hacking/King-Hacking.git
2) cd King-Hacking
3) bash King-Tools.sh
Written by Steave(t.m)
-------UNDERCODE-----
The King Hacking Script
(T.me/UnderCodeTestingOfficial)
🦑FEATURES:(Automate)
1) DDOS
2) WIFI HACk
3) WEB HACK
4) Payloads
5) Virus
6) Spam
AND MUCH MORE
🦑Installations:
1)!git clone https://github.com/king-hacking/King-Hacking.git
2) cd King-Hacking
3) bash King-Tools.sh
Written by Steave(t.m)
-------UNDERCODE-----
-------UNDERCODE-----
TOPIC
Network Autentication hack
(T.me/UnderCodeTestingOfficial)
🦑INSTALLISATION:
A) archlinux based system,
>. pacman -S badtouch
B) Mac OSX, use
1) brew install badtouch
2) To build from source, make sure you have rust and libssl-dev installed and run
3) cargo install
4) Verify your setup is complete with
badtouch --help
C) Debian
1) Install essential build tools
2) sudo apt-get update
3) sudo apt-get dist-upgrade
4) sudo apt-get install build-essential libssl-dev pkg-config
5) Install rust
curl -sf -L https://static.rust-lang.org/rustup.sh | sh
source $HOME/.cargo/env
🦑 Install badtouch
1)cd /path/to/badtouch
2) cargo install
@ Steave(t.m)
-------UNDERCODE---
TOPIC
Network Autentication hack
(T.me/UnderCodeTestingOfficial)
🦑INSTALLISATION:
A) archlinux based system,
>. pacman -S badtouch
B) Mac OSX, use
1) brew install badtouch
2) To build from source, make sure you have rust and libssl-dev installed and run
3) cargo install
4) Verify your setup is complete with
badtouch --help
C) Debian
1) Install essential build tools
2) sudo apt-get update
3) sudo apt-get dist-upgrade
4) sudo apt-get install build-essential libssl-dev pkg-config
5) Install rust
curl -sf -L https://static.rust-lang.org/rustup.sh | sh
source $HOME/.cargo/env
🦑 Install badtouch
1)cd /path/to/badtouch
2) cargo install
@ Steave(t.m)
-------UNDERCODE---
--------UNDERCODE----
ON SECURITY PATCH IN IOS 13.3.2
NEVER UPGRADE YOUR IOS
BECAUSE THIS VERSION IS SPECIAL
ITS DEFACE ALL SOCIAL ENGENEER ATTACKS
@ Steave(t.m)
ON SECURITY PATCH IN IOS 13.3.2
NEVER UPGRADE YOUR IOS
BECAUSE THIS VERSION IS SPECIAL
ITS DEFACE ALL SOCIAL ENGENEER ATTACKS
@ Steave(t.m)
-------UNDERCODE----
🦑Android-Exploits:
FULL
(T.me/UnderCodeTestingOfficial)
A collection of android Exploits and guide on android exploitation:
🦑FEATURES:
1) root@n3x7:~$ ls -l
drwxr-xr-x dos -
2) Denial Of Service exploits
3) drwxr-xr-x local - Local Exploits
4) drwxr-xr-x remote - remote exploits
drwxr-xr-x webapps - webapp exploits
🦑 Where to start:
1) git clone https://github.com/sundaysec/Android-Exploits.git
>Recommend you grab exploitpack latest version
2) wget https://github.com/juansacco/exploitpack/archive/master.zip
3) Extract then Navigate into the folder and type:
> java -jar ExploitPack.jar
4) Load the exploits
🦑OWASP Top 10 Mobile Risks:
1 Insecure Data Storage
2 Weak Server Side Controls
3 Insufficient Transport Layer Protection
4 Client Side Injection
5 Poor Authorization and Authentication
6 Improper Session Handling
7 Security Decisions Via Untrusted Inputs
8 Side Channel Data Leakage
9 Broken Cryptography
10 Sensitive Information Disclosure
@ Steave(t.m)
----------UNDERCODE--—————
🦑Android-Exploits:
FULL
(T.me/UnderCodeTestingOfficial)
A collection of android Exploits and guide on android exploitation:
🦑FEATURES:
1) root@n3x7:~$ ls -l
drwxr-xr-x dos -
2) Denial Of Service exploits
3) drwxr-xr-x local - Local Exploits
4) drwxr-xr-x remote - remote exploits
drwxr-xr-x webapps - webapp exploits
🦑 Where to start:
1) git clone https://github.com/sundaysec/Android-Exploits.git
>Recommend you grab exploitpack latest version
2) wget https://github.com/juansacco/exploitpack/archive/master.zip
3) Extract then Navigate into the folder and type:
> java -jar ExploitPack.jar
4) Load the exploits
🦑OWASP Top 10 Mobile Risks:
1 Insecure Data Storage
2 Weak Server Side Controls
3 Insufficient Transport Layer Protection
4 Client Side Injection
5 Poor Authorization and Authentication
6 Improper Session Handling
7 Security Decisions Via Untrusted Inputs
8 Side Channel Data Leakage
9 Broken Cryptography
10 Sensitive Information Disclosure
@ Steave(t.m)
----------UNDERCODE--—————
T.me/UnderCodeTestingSupport
FOR CHATS & Support
FOR CHATS & Support
Telegram
UNDERCODE TESTING - HELP & SUPPORT
WELCOME to UnderCode Testing Help & Supports :
>t.me/UnderCodeTestingOfficial
> t.me/UnderCodeSupport
>t.me/iOsDeveloppers
>Instagram.com/UnderCodeTestingCompany
> facebook.com/UnderCodeTestingCompany
>Twitter.com/UnderCodeTC
# Support & Share 😉
>t.me/UnderCodeTestingOfficial
> t.me/UnderCodeSupport
>t.me/iOsDeveloppers
>Instagram.com/UnderCodeTestingCompany
> facebook.com/UnderCodeTestingCompany
>Twitter.com/UnderCodeTC
# Support & Share 😉
UNDERCODE COMMUNITY
T.me/UnderCodeTestingSupport FOR CHATS & Support
AUTO VIRUS SCAN
Anti-spam
Anti-malware
Anti-phishing
Enjoy
Anti-spam
Anti-malware
Anti-phishing
Enjoy
-------UNDERCODE------
🦑NEW TERMUX TOPICS
BY CHINEESE
> AidLearning build Linux environment running on the Android devices with GUI, Deep-Learning and Python Visual Programming support. One-click install.☠️
(Twitter.com/UnderCodeTC)
🦑INSTALLISATION:
1) To install AidLearing, Simply download an App (apk file) and install it on your mobile device.
2) download newest version at : Download v0.76 now!
> Other version at:https://github.com/aidlearning/AidLearning-FrameWork/releases
2) The APP (apk) is only 9M,when you install the apk and launch,the apk will auto download the dependence of the linux and examples of codes .
3) All is about 1G size to download .So it's recommended that you install it in a wifi environment.
4) Important reminder: Click the setting icon after entering the desktop, the dialog box for the camera permission will pop up, please click agree, if you want to use the built-in
🦑examples:
Download v0.76 for chinese version now!
Download v0.77 with Full dependence build-in version now!
🦑HOW TO RUN:
SSH
1) PC can connect to mobile by using ssh-keygen.
2) Generate a new key pair with ssh-keygen command in your PC.
3) the command ssh-keygen produce the file of id_rsa and id_rsa.pub in the dir: ~/.ssh/
4) Just need you do: open the url:mobilephone'sip:8910/upload(for example:http://192.168.1.6:8910/upload) on the pc to upload ssh's file(id_rsa and id_rsa.pub).
4) upload finished , just restart the app on the android ,open the terminal the type this command like this to connect:
🦑Aid_code:
#Tested by UnderCode
1) We provide an AI coding develop tool named Aid_code. It can provide you a visual AI programming IDE by using Python from zero on our framework!
2) Using the tool, you can run your python2 or python3 codes online. So ,you can coding with Aid_code IDE on your phone anywhere, anytime.
Written by Steave(t.m)
---------UNDERCODE-----
🦑NEW TERMUX TOPICS
BY CHINEESE
> AidLearning build Linux environment running on the Android devices with GUI, Deep-Learning and Python Visual Programming support. One-click install.☠️
(Twitter.com/UnderCodeTC)
🦑INSTALLISATION:
1) To install AidLearing, Simply download an App (apk file) and install it on your mobile device.
2) download newest version at : Download v0.76 now!
> Other version at:https://github.com/aidlearning/AidLearning-FrameWork/releases
2) The APP (apk) is only 9M,when you install the apk and launch,the apk will auto download the dependence of the linux and examples of codes .
3) All is about 1G size to download .So it's recommended that you install it in a wifi environment.
4) Important reminder: Click the setting icon after entering the desktop, the dialog box for the camera permission will pop up, please click agree, if you want to use the built-in
🦑examples:
Download v0.76 for chinese version now!
Download v0.77 with Full dependence build-in version now!
🦑HOW TO RUN:
SSH
1) PC can connect to mobile by using ssh-keygen.
2) Generate a new key pair with ssh-keygen command in your PC.
3) the command ssh-keygen produce the file of id_rsa and id_rsa.pub in the dir: ~/.ssh/
4) Just need you do: open the url:mobilephone'sip:8910/upload(for example:http://192.168.1.6:8910/upload) on the pc to upload ssh's file(id_rsa and id_rsa.pub).
4) upload finished , just restart the app on the android ,open the terminal the type this command like this to connect:
ssh
u0_a311@192.168.1.6 -p8022
🦑Aid_code:
#Tested by UnderCode
1) We provide an AI coding develop tool named Aid_code. It can provide you a visual AI programming IDE by using Python from zero on our framework!
2) Using the tool, you can run your python2 or python3 codes online. So ,you can coding with Aid_code IDE on your phone anywhere, anytime.
Written by Steave(t.m)
---------UNDERCODE-----
---------undercode------
ROOKIT FULL LIST :
(T.me/UnderCodeTestingOfficial)
🦑RootKits-List-Download
This is the list of all rootkits found so far on github and other sites:
> https://github.com/mempodippy/vlany
> http://www.ussrback.com/UNIX/penetration/rootkits/
>https://github.com/Alifcccccc/Windows-Rootkits
>https://github.com/chokepoint/azazel https://packetstormsecurity.com/files/125240/Azazel-Userland-Rootkit.html
>https://github.com/islamTaha12/Python-Rootkit
>https://github.com/Eterna1/puszek-rootkit
>https://github.com/juxing/AdoreForAndroid
>https://github.com/HackerFantastic/Public/tree/master/rootkits
>https://github.com/m0nad/Diamorphine
>https://github.com/maK-/maK_it-Linux-Rootkit
>https://github.com/RagingGrim/Rootkit/tree/master/Rootkit
>https://github.com/NexusBots/Umbreon-Rootkit
>https://github.com/josephjkong/designing-bsd-rootkits
>https://github.com/citypw/suterusu/
>https://citypw.blogspot.gr/2014/08/an-awesome-linux-kernel-rootkit-suterusu.html
>https://github.com/Cr4sh/WindowsRegistryRootkit
>https://packetstormsecurity.com/files/139665/Vlany-Linux-LD_PRELOAD-Rootkit.html
🦑OTHERS:
> https://github.com/JReFrameworker/JReFrameworker
>https://packetstormsecurity.com/files/128945/Xingyiquan-Linux-2.6.x-3.x-Rootkit.html
https://packetstormsecurity.com/files/118317/Linux-2.6-Kernel-proc-Rootkit-Backdoor.html
https://packetstormsecurity.com/files/108286/KBeast-Kernel-Beast-Linux-Rootkit-2012.html
https://github.com/chokepoint/Jynx2 https://packetstormsecurity.com/files/110942/Jynx-Kit-Release-2.html
https://packetstormsecurity.com/files/25071/_root_040.zip.html
https://github.com/bones-codes/the_colonel
https://github.com/x0r1/jellyfish
https://github.com/ecume/simple-rootkit
https://github.com/Nervous/GreenKit-Rootkit
https://github.com/cloudsec/brootkit
https://github.com/unix-thrust/beurk
https://github.com/NextSecurity/Gozi-MBR-rootkit
https://github.com/rbertin/basic-rootkit
https://github.com/miagilepner/porny
https://turbochaos.blogspot.gr/2013/09/linux-rootkits-101-1-of-3.html
https://github.com/r00tkillah/HORSEPILL
https://github.com/matteomattia/moo_rootkit
https://github.com/ivyl/rootkit
https://github.com/enzolovesbacon/inficere
https://github.com/hiteshd/Android-Rootkit
https://github.com/QuokkaLight/rkduck
https://github.com/0xroot/whitesnow
https://github.com/falk3n/subversive
https://github.com/nnewson/km/tree/master/src
https://github.com/Cr4sh/DrvHide-PoC
https://github.com/Christian-Roggia/open-myrtus/tree/master/rootkit
https://github.com/PoppySeedPlehzr/rookit_playground/tree/master/rootkits
https://github.com/a7vinx/liinux
https://github.com/osiris123/CDriver_Loader
https://github.com/varshapaidi/Kernel_Rootkit
https://github.com/karol-gruszczyk/win-rootkit
https://github.com/hanj4096/wukong
https://github.com/uzyszkodnik/rootkit
https://github.com/kacheo/KernelRootkit
https://github.com/rvillordo/libpreload
https://github.com/soad003/rootkit
https://github.com/NinnOgTonic/Out-of-Sight-Out-of-Mind-Rootkit
https://github.com/HeapLock/THOR
https://github.com/ring-1/zendar
https://github.com/amanone/amark
https://github.com/majdi/deadlands
https://github.com/cccssw/JynKbeast
https://github.com/joshimhoff/toykit
https://github.com/pasv/Z34107
https://github.com/maK-/Keylogger-lkm
https://github.com/Aearnus/syscall-rootkit
https://github.com/schischi/slrk
https://github.com/bhassani/Alina/tree/master/Rootkit
https://github.com/jiayy/lkm-rootkit
https://github.com/ChristianPapathanasiou/apache-rootkit
https://github.com/ChristianPapathanasiou/DEFCON-18-Android-rootkit-Mindtrick
https://github.com/elfmaster/kprobe_rootkit
https://github.com/ah450/rootkit
https://github.com/Jyang772/HideProcessHookMDL
https://github.com/Aarons100/Rootkits-Playground
https://github.com/dluengo/yarr
https://github.com/NotALaser/trk
https://github.com/NoviceLive/research-rootkit
https://github.com/t0t3m/AFkit
https://github.com/dsmatter/brootus
http://github.com/kevinkoo001/rootkit
ROOKIT FULL LIST :
(T.me/UnderCodeTestingOfficial)
🦑RootKits-List-Download
This is the list of all rootkits found so far on github and other sites:
> https://github.com/mempodippy/vlany
> http://www.ussrback.com/UNIX/penetration/rootkits/
>https://github.com/Alifcccccc/Windows-Rootkits
>https://github.com/chokepoint/azazel https://packetstormsecurity.com/files/125240/Azazel-Userland-Rootkit.html
>https://github.com/islamTaha12/Python-Rootkit
>https://github.com/Eterna1/puszek-rootkit
>https://github.com/juxing/AdoreForAndroid
>https://github.com/HackerFantastic/Public/tree/master/rootkits
>https://github.com/m0nad/Diamorphine
>https://github.com/maK-/maK_it-Linux-Rootkit
>https://github.com/RagingGrim/Rootkit/tree/master/Rootkit
>https://github.com/NexusBots/Umbreon-Rootkit
>https://github.com/josephjkong/designing-bsd-rootkits
>https://github.com/citypw/suterusu/
>https://citypw.blogspot.gr/2014/08/an-awesome-linux-kernel-rootkit-suterusu.html
>https://github.com/Cr4sh/WindowsRegistryRootkit
>https://packetstormsecurity.com/files/139665/Vlany-Linux-LD_PRELOAD-Rootkit.html
🦑OTHERS:
> https://github.com/JReFrameworker/JReFrameworker
>https://packetstormsecurity.com/files/128945/Xingyiquan-Linux-2.6.x-3.x-Rootkit.html
https://packetstormsecurity.com/files/118317/Linux-2.6-Kernel-proc-Rootkit-Backdoor.html
https://packetstormsecurity.com/files/108286/KBeast-Kernel-Beast-Linux-Rootkit-2012.html
https://github.com/chokepoint/Jynx2 https://packetstormsecurity.com/files/110942/Jynx-Kit-Release-2.html
https://packetstormsecurity.com/files/25071/_root_040.zip.html
https://github.com/bones-codes/the_colonel
https://github.com/x0r1/jellyfish
https://github.com/ecume/simple-rootkit
https://github.com/Nervous/GreenKit-Rootkit
https://github.com/cloudsec/brootkit
https://github.com/unix-thrust/beurk
https://github.com/NextSecurity/Gozi-MBR-rootkit
https://github.com/rbertin/basic-rootkit
https://github.com/miagilepner/porny
https://turbochaos.blogspot.gr/2013/09/linux-rootkits-101-1-of-3.html
https://github.com/r00tkillah/HORSEPILL
https://github.com/matteomattia/moo_rootkit
https://github.com/ivyl/rootkit
https://github.com/enzolovesbacon/inficere
https://github.com/hiteshd/Android-Rootkit
https://github.com/QuokkaLight/rkduck
https://github.com/0xroot/whitesnow
https://github.com/falk3n/subversive
https://github.com/nnewson/km/tree/master/src
https://github.com/Cr4sh/DrvHide-PoC
https://github.com/Christian-Roggia/open-myrtus/tree/master/rootkit
https://github.com/PoppySeedPlehzr/rookit_playground/tree/master/rootkits
https://github.com/a7vinx/liinux
https://github.com/osiris123/CDriver_Loader
https://github.com/varshapaidi/Kernel_Rootkit
https://github.com/karol-gruszczyk/win-rootkit
https://github.com/hanj4096/wukong
https://github.com/uzyszkodnik/rootkit
https://github.com/kacheo/KernelRootkit
https://github.com/rvillordo/libpreload
https://github.com/soad003/rootkit
https://github.com/NinnOgTonic/Out-of-Sight-Out-of-Mind-Rootkit
https://github.com/HeapLock/THOR
https://github.com/ring-1/zendar
https://github.com/amanone/amark
https://github.com/majdi/deadlands
https://github.com/cccssw/JynKbeast
https://github.com/joshimhoff/toykit
https://github.com/pasv/Z34107
https://github.com/maK-/Keylogger-lkm
https://github.com/Aearnus/syscall-rootkit
https://github.com/schischi/slrk
https://github.com/bhassani/Alina/tree/master/Rootkit
https://github.com/jiayy/lkm-rootkit
https://github.com/ChristianPapathanasiou/apache-rootkit
https://github.com/ChristianPapathanasiou/DEFCON-18-Android-rootkit-Mindtrick
https://github.com/elfmaster/kprobe_rootkit
https://github.com/ah450/rootkit
https://github.com/Jyang772/HideProcessHookMDL
https://github.com/Aarons100/Rootkits-Playground
https://github.com/dluengo/yarr
https://github.com/NotALaser/trk
https://github.com/NoviceLive/research-rootkit
https://github.com/t0t3m/AFkit
https://github.com/dsmatter/brootus
http://github.com/kevinkoo001/rootkit
https://github.com/nnedkov/swiss_army_rootkit
https://github.com/David-Reguera-Garcia-Dreg/enyelkm
https://github.com/m0hamed/lkm-rootkit
https://github.com/elfmaster/skeksi_virus
https://github.com/cranklin/cranky-data-virus
https://github.com/mempodippy/cub3
@ Steave(t.m)
----------UNDERCODE-----
https://github.com/David-Reguera-Garcia-Dreg/enyelkm
https://github.com/m0hamed/lkm-rootkit
https://github.com/elfmaster/skeksi_virus
https://github.com/cranklin/cranky-data-virus
https://github.com/mempodippy/cub3
@ Steave(t.m)
----------UNDERCODE-----
GitHub
nnedkov/swiss_army_rootkit
Contribute to nnedkov/swiss_army_rootkit development by creating an account on GitHub.
--------UNDERCODE-----
ANY LINUX OS SHOULD HAVE THIS SCRIPT FOR ANY HACKer
(T.me/UnderCodeTestingOfficial)
🦑INSTALLISATION:
1) Clone or download the project files (no compilation nor installation is required) ;
> git clone https://github.com/CISOfy/lynis
2) Execute:
> cd lynis;
3) ./lynis audit system
4) If you want to run the software as root, we suggest changing the ownership of the files.
5) Use chown -R 0:0 to recursively alter the owner and group and set it to user ID 0 (root).
🦑WHY ALL HACKERS NEEDED :
The main goals are:
• Automated security auditing
• Compliance testing (e.g. ISO27001, PCI-DSS, HIPAA)
• Vulnerability detection
The software (also) assists with:
• Configuration and asset management
• Software patch management
• System hardening
• Penetration testing (privilege escalation)
• Intrusion detection
🦑Audience:
Typical users of the software:
• System administrators
• Auditors
• Security officers
• Penetration testers
• Security professionals
@ Steave(t.m)
--------UNDERCODE------
ANY LINUX OS SHOULD HAVE THIS SCRIPT FOR ANY HACKer
(T.me/UnderCodeTestingOfficial)
🦑INSTALLISATION:
1) Clone or download the project files (no compilation nor installation is required) ;
> git clone https://github.com/CISOfy/lynis
2) Execute:
> cd lynis;
3) ./lynis audit system
4) If you want to run the software as root, we suggest changing the ownership of the files.
5) Use chown -R 0:0 to recursively alter the owner and group and set it to user ID 0 (root).
🦑WHY ALL HACKERS NEEDED :
The main goals are:
• Automated security auditing
• Compliance testing (e.g. ISO27001, PCI-DSS, HIPAA)
• Vulnerability detection
The software (also) assists with:
• Configuration and asset management
• Software patch management
• System hardening
• Penetration testing (privilege escalation)
• Intrusion detection
🦑Audience:
Typical users of the software:
• System administrators
• Auditors
• Security officers
• Penetration testers
• Security professionals
@ Steave(t.m)
--------UNDERCODE------
UNDERCODE COMMUNITY
Photo
—————UNDERCODE————-
🦑BEST Useful Coding Apps for iOS to Code :
(Instagram.com/UnderCodeTestingOfficial)
🦑LIST :
1) Coda:
Coda by Panic is well-renowned with web developers as an excellent sublime-alternative IDE on the desktop. Beyond being a strong text editor, it also comes with in-built tools to preview dynamic websites, strong regular expression tools, a built-in terminal and MySQL.
> https://panic.com/coda/
2) Pythonista
For the Python coders out there, Pythonista is a compete python editor for coding completely via one’s iPad or iPhone. While the python developers would be familiar with the standard libraries provided, the benefits that Pythonista provides includes the ability to interact with native iOS features like location, reminders and data.
> http://omz-software.com/pythonista/
3) Koder Code Editor
Koder is a fully-baked development environment built specifically for iOS with support for over 80 programming languages, syntax highlighting and auto-complete, which makes developing on the smaller screens a lot more convenient. Like Coda, Koder also provides SSH and SFTP access, as well as Dropbox cloud access for remote access, and the ability to preview your code in a browser.
> http://www.koderapp.com/
4) Buffer Code Editor
Like Koder, Buffer Editor provides a native and purposely-built development environment with features similar to the two development environments just mentioned with the exception of direct access to GitHub, which is very convenient for the source-control minded developers
> http://buffereditor.com/
5)Git2Go
Git2Go isn’t a text editor IDE per-se but more a quintessential iOS app for managing your Git repository, although it does have an editor for editing Git-stored files on the fly.
> https://git2go.com/
Written by Steave(t.m)
—————-UNDERCODE—————
🦑BEST Useful Coding Apps for iOS to Code :
(Instagram.com/UnderCodeTestingOfficial)
🦑LIST :
1) Coda:
Coda by Panic is well-renowned with web developers as an excellent sublime-alternative IDE on the desktop. Beyond being a strong text editor, it also comes with in-built tools to preview dynamic websites, strong regular expression tools, a built-in terminal and MySQL.
> https://panic.com/coda/
2) Pythonista
For the Python coders out there, Pythonista is a compete python editor for coding completely via one’s iPad or iPhone. While the python developers would be familiar with the standard libraries provided, the benefits that Pythonista provides includes the ability to interact with native iOS features like location, reminders and data.
> http://omz-software.com/pythonista/
3) Koder Code Editor
Koder is a fully-baked development environment built specifically for iOS with support for over 80 programming languages, syntax highlighting and auto-complete, which makes developing on the smaller screens a lot more convenient. Like Coda, Koder also provides SSH and SFTP access, as well as Dropbox cloud access for remote access, and the ability to preview your code in a browser.
> http://www.koderapp.com/
4) Buffer Code Editor
Like Koder, Buffer Editor provides a native and purposely-built development environment with features similar to the two development environments just mentioned with the exception of direct access to GitHub, which is very convenient for the source-control minded developers
> http://buffereditor.com/
5)Git2Go
Git2Go isn’t a text editor IDE per-se but more a quintessential iOS app for managing your Git repository, although it does have an editor for editing Git-stored files on the fly.
> https://git2go.com/
Written by Steave(t.m)
—————-UNDERCODE—————
Instagram
Login • Instagram
Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.
-------UNDERCODE------
🦑TERMUX TUTORIAL & CODING ON ANDROID By UnderCode:
(T.me/UnderCodeTestingOfficial)
🦑Why Termux?
1) Termux has in its arsenal enough packages to work with programming languages: C / C ++, Python, Golang, PHP, Lua
2) Also there are databases, I only know about mariadb and postgresql.
3) pkg search is a command for finding packages.
> Example: pkg search vim pkg install - command to install the package.
>Example: pkg install vim
For coding, we need a text editor.
4) Here there are different options, undercOde chose Vim and briefly tell you how to work with it:
> Installing vim:
pkg install vim
> For an example of working with vim, write "Hello World" in C.
vim main.c
5) After that Vim will start. To start writing code, press the "i" key.
6) Write the code:
include <stdio.h>
int main() { printf("Hello World!\n"); return 0; }
7) After that, we press on the key "Esc", put a colon and write wq (": wq").
8) This saves our file and changes it (w - write) and closes it (q - quit).
> pkg install gcc
main.c - file with our code program - our program.
9) Now we can run our program and see if it works:
./programname
or
sh program
10) Result
Hello World
Written by Steave(t.m)
---------UNDERCODE-----
🦑TERMUX TUTORIAL & CODING ON ANDROID By UnderCode:
(T.me/UnderCodeTestingOfficial)
🦑Why Termux?
1) Termux has in its arsenal enough packages to work with programming languages: C / C ++, Python, Golang, PHP, Lua
2) Also there are databases, I only know about mariadb and postgresql.
3) pkg search is a command for finding packages.
> Example: pkg search vim pkg install - command to install the package.
>Example: pkg install vim
For coding, we need a text editor.
4) Here there are different options, undercOde chose Vim and briefly tell you how to work with it:
> Installing vim:
pkg install vim
> For an example of working with vim, write "Hello World" in C.
vim main.c
5) After that Vim will start. To start writing code, press the "i" key.
6) Write the code:
include <stdio.h>
int main() { printf("Hello World!\n"); return 0; }
7) After that, we press on the key "Esc", put a colon and write wq (": wq").
8) This saves our file and changes it (w - write) and closes it (q - quit).
> pkg install gcc
main.c - file with our code program - our program.
9) Now we can run our program and see if it works:
./programname
or
sh program
10) Result
Hello World
Written by Steave(t.m)
---------UNDERCODE-----
————- undercOde—-———
WANT MORE WA GRPS FROM undercOde (14 whatsapp groupes)
# Support & SHARE
> https://chat.whatsapp.com/HrFYL94B7Kx3uTUSWa7kKe
(Admins send)
> https://chat.whatsapp.com/JBVtuW3AnO4LEwTKGz7gAx
(Admins send)
>https://chat.whatsapp.com/GzkP126UuCxGEiUf8NqZvQ
(Admins send)
> https://chat.whatsapp.com/JNn6o7ByGRUDQwrvT0aTOZ
(All can send)
> Official admins send
https://chat.whatsapp.com/Bc54qusd5wq8giVb6KevnB
> telegram Groupes
(Anti-spam
Anti-malware
Auto-virus scan
Anti-phishing websites)
>T.me/UnderCodeTestingOfficial
+ Discussion @
>t.me/UnderCodeTestingSupport
—————UNDERCODE—————-
WANT MORE WA GRPS FROM undercOde (14 whatsapp groupes)
# Support & SHARE
> https://chat.whatsapp.com/HrFYL94B7Kx3uTUSWa7kKe
(Admins send)
> https://chat.whatsapp.com/JBVtuW3AnO4LEwTKGz7gAx
(Admins send)
>https://chat.whatsapp.com/GzkP126UuCxGEiUf8NqZvQ
(Admins send)
> https://chat.whatsapp.com/JNn6o7ByGRUDQwrvT0aTOZ
(All can send)
> Official admins send
https://chat.whatsapp.com/Bc54qusd5wq8giVb6KevnB
> telegram Groupes
(Anti-spam
Anti-malware
Auto-virus scan
Anti-phishing websites)
>T.me/UnderCodeTestingOfficial
+ Discussion @
>t.me/UnderCodeTestingSupport
—————UNDERCODE—————-
WhatsApp.com
WhatsApp Group Invite
WhatsApp Messenger: More than 1 billion people in over 180 countries use WhatsApp to stay in touch with friends and family, anytime and anywhere. WhatsApp is free and offers simple, secure, reliable messaging and calling, available on phones all over the…
UNDERCODE COMMUNITY
Photo
————-undercOde—————
🦑TOP APPS FOR FAKE SMS ALERTS
IOS // ANDROID:
(Facebook.com/UnderCodeTestingCompanie)
🦑BEST FOR IOS FAKE MESSAGE:
> https://apps.apple.com/us/app/fake-text/id1437741191
>https://apps.apple.com/us/app/fake-text-me/id1366931611
>https://apps.apple.com/us/app/fake-sms/id512174468
>https://apps.apple.com/ru/app/hushed-2nd-phone-number/id600520752?l=en
>https://itunes.apple.com/ru/app/fake-conversation-text-messages/id566978141?l=en&mt=8
>https://apps.apple.com/cn/app/best-fake-caller-sms-mms/id418374074?l=en
> https://apps.apple.com/in/app/fake-message-make-prank-message-spoof-sms-prank-conversation/id1140117035
>https://apps.apple.com/gb/app/new-message-notification-prank/id1303481715
> https://apps.apple.com/ch/app/best-fake-caller-free/id435154411
> https://apps.apple.com/jp/app/new-text-tones/id464955043?l=en
>https://apps.apple.com/jp/app/smiley-private-texting-sms/id883312358?l=en
🦑FOR ANDROID :
>https://m.apkpure.com/fake-alert-maker/com.bfrontier.android.alertmaker
>https://m.apkpure.com/fake-text-message/com.neurondigital.FakeTextMessage
>https://play.google.com/store/apps/details?id=com.neurondigital.FakeTextMessage&hl=en
BEST APPS TESTED BY UNDERCODE
@ Steave(t.m.)
—————UNDERCODE—————-
🦑TOP APPS FOR FAKE SMS ALERTS
IOS // ANDROID:
(Facebook.com/UnderCodeTestingCompanie)
🦑BEST FOR IOS FAKE MESSAGE:
> https://apps.apple.com/us/app/fake-text/id1437741191
>https://apps.apple.com/us/app/fake-text-me/id1366931611
>https://apps.apple.com/us/app/fake-sms/id512174468
>https://apps.apple.com/ru/app/hushed-2nd-phone-number/id600520752?l=en
>https://itunes.apple.com/ru/app/fake-conversation-text-messages/id566978141?l=en&mt=8
>https://apps.apple.com/cn/app/best-fake-caller-sms-mms/id418374074?l=en
> https://apps.apple.com/in/app/fake-message-make-prank-message-spoof-sms-prank-conversation/id1140117035
>https://apps.apple.com/gb/app/new-message-notification-prank/id1303481715
> https://apps.apple.com/ch/app/best-fake-caller-free/id435154411
> https://apps.apple.com/jp/app/new-text-tones/id464955043?l=en
>https://apps.apple.com/jp/app/smiley-private-texting-sms/id883312358?l=en
🦑FOR ANDROID :
>https://m.apkpure.com/fake-alert-maker/com.bfrontier.android.alertmaker
>https://m.apkpure.com/fake-text-message/com.neurondigital.FakeTextMessage
>https://play.google.com/store/apps/details?id=com.neurondigital.FakeTextMessage&hl=en
BEST APPS TESTED BY UNDERCODE
@ Steave(t.m.)
—————UNDERCODE—————-
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
——————undercOde——————
🦑SECRET CARDING Methode Not patched ☠️☠️☠️☠️☠️
(Follow us instagram.com/UnderCodeTestingCompany)
🦑Amazon Carding New 2k18
March method
Fresh and New and Highly working Method created by top
carders in world.
Note: All other methods are patched...
This is the only working and didn’t patched method...
For sellers and teacher:
Price is too high. Don’t sell it for low prices otherwise this
method gets patched…
How to Card Amazon ♥
Things you will need:
Quality CC/CVV to an address, full name, phone number, zip code, city, and
state (don’t get junk cards pay good money for good cards)
Socks 4/5 to the state and if you can the city since that would be perfect. This
sock must have never been used before so don’t be cheap and get a quality
sock. Socks are just as important as quality cards!
You will need programs to cleanup cookies and other flagging shit. Get
CCleaner- get the free version it has everything you need. Get the flash cookie
cleaner- it is free as well
Antidetect 7 or Fraudfox VM: These are not needed but they really increase
your carding success to almost 100% if used correctly and setup properly which
both are not very hard to do.
A drop address or if you’re carding digital items you don’t need that.
OK now let’s card
-------------------------
🦑---------------------------------
You just need a Diners Club international cc, Indian NON-VBV
or AMEX, Some Amex are still working
I’m listing some bins here which will work on Amazon.
542034542034 IN MASTERCARD CREDIT BANK OF INDIA
542086 IN MASTERCARD CREDIT ANDHRA BANK
376900 IN AMEX CREDIT AMERICAN EXPRESS
376901 IN AMEX CREDIT AMERICAN EXPRESS
376902 IN AMEX CREDIT AMERI EXPRESS
376903 IN AMEX CREDIT AMERI EXPRESS
#All are Non-VBV
First Method (Most successful)
Restart the computer and make sure you have used ccleaner and flash cookie
cleaner and they are running. Used disk cleanup in windows as well.
Create a new account on Amazon using a fresh good socks. Modern protection
against carding tracks the user's behavior on the site. Therefore, you must act as
a typical buyer, not jump directly to your product. Use the search, see different
knick-knacks, add them to the cart, but do not buy. It should be quite different
items, not those that you want to card.
After the virtual shopping logout from Amazon, leave the computer, and stop
the activity on it. Put it to sleep. After 5 or more hours, go back to Amazon and
clean your cart. Now let’s card.
Now find the items falling into the limit of your card somewhere between $30
and $150. Using a credit card, pay for the goods that you selected. You may need
to wait for amazon to approve your order or not. Sometimes it’s random I swear.
Now the order should have been accepted and shipped. If not, then you either
have a shitty card worth less than what you trying to card or you threw a flag. Go
back and check your setup. This is pretty full proof way to card amazon. If
everything is in place and you have your bases covered, you should be in and
out. Make sure you check to see if you IP leaking cause that would throw a flag
as well: https://www.dnsleaktest.com
Now we can also speed up this order if it’s in processing just so it doesn’t get
charged back and flagged before it gets shipped. Send amazon an email from
the email that you created for this account. Gmail is preferred email for this setup
as it is much more trustworthy do to its security signed up measures. Use an
excuse to make them speed it up. There is excuse kind of tie into what you are
buying. So let’s say you want a 800 dollar cannon camera then tell them that you
it’s real person on the other end so make your excuse real and don’t go too in
depth.
Now they may ask to call you on the phone number associated with the CC
account. This happens maybe 30% of the time. Just say OK and hope no one
picks up the phone on the other end and luck I on your side. If they send you
🦑SECRET CARDING Methode Not patched ☠️☠️☠️☠️☠️
(Follow us instagram.com/UnderCodeTestingCompany)
🦑Amazon Carding New 2k18
March method
Fresh and New and Highly working Method created by top
carders in world.
Note: All other methods are patched...
This is the only working and didn’t patched method...
For sellers and teacher:
Price is too high. Don’t sell it for low prices otherwise this
method gets patched…
How to Card Amazon ♥
Things you will need:
Quality CC/CVV to an address, full name, phone number, zip code, city, and
state (don’t get junk cards pay good money for good cards)
Socks 4/5 to the state and if you can the city since that would be perfect. This
sock must have never been used before so don’t be cheap and get a quality
sock. Socks are just as important as quality cards!
You will need programs to cleanup cookies and other flagging shit. Get
CCleaner- get the free version it has everything you need. Get the flash cookie
cleaner- it is free as well
Antidetect 7 or Fraudfox VM: These are not needed but they really increase
your carding success to almost 100% if used correctly and setup properly which
both are not very hard to do.
A drop address or if you’re carding digital items you don’t need that.
OK now let’s card
-------------------------
🦑---------------------------------
You just need a Diners Club international cc, Indian NON-VBV
or AMEX, Some Amex are still working
I’m listing some bins here which will work on Amazon.
542034542034 IN MASTERCARD CREDIT BANK OF INDIA
542086 IN MASTERCARD CREDIT ANDHRA BANK
376900 IN AMEX CREDIT AMERICAN EXPRESS
376901 IN AMEX CREDIT AMERICAN EXPRESS
376902 IN AMEX CREDIT AMERI EXPRESS
376903 IN AMEX CREDIT AMERI EXPRESS
#All are Non-VBV
First Method (Most successful)
Restart the computer and make sure you have used ccleaner and flash cookie
cleaner and they are running. Used disk cleanup in windows as well.
Create a new account on Amazon using a fresh good socks. Modern protection
against carding tracks the user's behavior on the site. Therefore, you must act as
a typical buyer, not jump directly to your product. Use the search, see different
knick-knacks, add them to the cart, but do not buy. It should be quite different
items, not those that you want to card.
After the virtual shopping logout from Amazon, leave the computer, and stop
the activity on it. Put it to sleep. After 5 or more hours, go back to Amazon and
clean your cart. Now let’s card.
Now find the items falling into the limit of your card somewhere between $30
and $150. Using a credit card, pay for the goods that you selected. You may need
to wait for amazon to approve your order or not. Sometimes it’s random I swear.
Now the order should have been accepted and shipped. If not, then you either
have a shitty card worth less than what you trying to card or you threw a flag. Go
back and check your setup. This is pretty full proof way to card amazon. If
everything is in place and you have your bases covered, you should be in and
out. Make sure you check to see if you IP leaking cause that would throw a flag
as well: https://www.dnsleaktest.com
Now we can also speed up this order if it’s in processing just so it doesn’t get
charged back and flagged before it gets shipped. Send amazon an email from
the email that you created for this account. Gmail is preferred email for this setup
as it is much more trustworthy do to its security signed up measures. Use an
excuse to make them speed it up. There is excuse kind of tie into what you are
buying. So let’s say you want a 800 dollar cannon camera then tell them that you
it’s real person on the other end so make your excuse real and don’t go too in
depth.
Now they may ask to call you on the phone number associated with the CC
account. This happens maybe 30% of the time. Just say OK and hope no one
picks up the phone on the other end and luck I on your side. If they send you
Instagram
Login • Instagram
Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.
another email saying they tried to contact, you but no answer then simply say- “I
am so sorry I changed my number and I haven’t update it with my CC company
yet” then give them a burner number where you can actually answer.
Now if all goes smooth then you have carded your first real item on Amazon.
Now that you have done that your account is trusted and you can place an order
between $500-$800 or until the card is maxed out. Stay below $2000 per order.
Max the card out as quick as you can but be inconspicuous and act like a real
buyer. The security for the most part are bots and the formulas they use are really
intense so when I say act like a real buyer I mean that or you will get limited and
blocked.
Just understand that these methods work 90% of the time and the majority of the
success of carding I on the carder himself and the setup he has. With Antidetect
or Fraudfox the carding success is closer to 95%. Amazon, eBay, and PayPal are
getting harder and harder to card and fraud every day and pretty soon it won’t
be possible so understand that you need to have everything in tip top setup and
stay ahead of bots.
-------------------------------------------X---------------------------------------------------
Second Method
This method is a little better for low level cards or just an easier method then
the above as the security is a little more lenient because the purchase amount is
less. This method is also not as successful as the above method.
Everything is the same as above except this time purchase an item worth
around $2.00. Get the lowest and cheapest delivery time as it throws less of a security flag.
Now once your order is approved just like the first one your account is now a
trusted account. I recommend using FedEx for your shipping method as it has
less security compared to UPS and USPS for the real order.
Now card a total of $600-$800 dollars and it should go right through.
You can also open a seller account and attach the CC to it and purchase
through a seller account. It is a little more work but your success will be greater.
Thank you and don’t forget if a payment is declined it’s 50% of the time the
card so make sure your cards are good.
----------------------------------X--------------------------------------------
Method (which I use) By
REMO
Use an old account must be 6-12 months older or you can use cracked
accounts too.
OR If u have a new and fresh account. Order a small and cheap product
at COD. Cancel it after some hours (5 hours) or let it be delivered.
YEP………Now Your account is verified. Now the real part begins...
Do it in fresh reboot
Use CCleaner to clean cookies. And delete all cookies and history. Use
Antidetect browser (Optional)
Use socks5 proxy or VPN of the CC owner’s location (USA preferred).
If doing with Indian CC, just connect with India location in VPN
Now open Amazon.com and Login to your verified account and add
the cc (Diners Club or Indian or AMEX) via the payment method. Add
billing address over there. Now logout from amazon.com.
Don’t clear anything or mix up. Wait for 15 Mins.
Be fully anonymous its necessary. Check your anonymity at
https://www.whoer.net , Make sure you check to see if you IP leaking
cause that would throw a flag as well: https://www.dnsleaktest.com
Now head towards Amazon.in and search some products act as a
typical buyer, not jump directly to your product. Use the search, see
different knick-knacks, add them to the cart, but do not buy. It should
be quite different items, not those that you want to card.
After the virtual shopping logout from Amazon, leave the computer,
and stop the activity on it. Put it to sleep. After 5 or more hours, go
back to Amazon and clean your cart. Now let’s card.
Now add your desired product in to your cart according to the cc limit.
Check it out. Done payment via the CC.
Now u successfully placed your order. To avoid cancellation “Archive
your order”
Now logout from that account.
am so sorry I changed my number and I haven’t update it with my CC company
yet” then give them a burner number where you can actually answer.
Now if all goes smooth then you have carded your first real item on Amazon.
Now that you have done that your account is trusted and you can place an order
between $500-$800 or until the card is maxed out. Stay below $2000 per order.
Max the card out as quick as you can but be inconspicuous and act like a real
buyer. The security for the most part are bots and the formulas they use are really
intense so when I say act like a real buyer I mean that or you will get limited and
blocked.
Just understand that these methods work 90% of the time and the majority of the
success of carding I on the carder himself and the setup he has. With Antidetect
or Fraudfox the carding success is closer to 95%. Amazon, eBay, and PayPal are
getting harder and harder to card and fraud every day and pretty soon it won’t
be possible so understand that you need to have everything in tip top setup and
stay ahead of bots.
-------------------------------------------X---------------------------------------------------
Second Method
This method is a little better for low level cards or just an easier method then
the above as the security is a little more lenient because the purchase amount is
less. This method is also not as successful as the above method.
Everything is the same as above except this time purchase an item worth
around $2.00. Get the lowest and cheapest delivery time as it throws less of a security flag.
Now once your order is approved just like the first one your account is now a
trusted account. I recommend using FedEx for your shipping method as it has
less security compared to UPS and USPS for the real order.
Now card a total of $600-$800 dollars and it should go right through.
You can also open a seller account and attach the CC to it and purchase
through a seller account. It is a little more work but your success will be greater.
Thank you and don’t forget if a payment is declined it’s 50% of the time the
card so make sure your cards are good.
----------------------------------X--------------------------------------------
Method (which I use) By
REMO
Use an old account must be 6-12 months older or you can use cracked
accounts too.
OR If u have a new and fresh account. Order a small and cheap product
at COD. Cancel it after some hours (5 hours) or let it be delivered.
YEP………Now Your account is verified. Now the real part begins...
Do it in fresh reboot
Use CCleaner to clean cookies. And delete all cookies and history. Use
Antidetect browser (Optional)
Use socks5 proxy or VPN of the CC owner’s location (USA preferred).
If doing with Indian CC, just connect with India location in VPN
Now open Amazon.com and Login to your verified account and add
the cc (Diners Club or Indian or AMEX) via the payment method. Add
billing address over there. Now logout from amazon.com.
Don’t clear anything or mix up. Wait for 15 Mins.
Be fully anonymous its necessary. Check your anonymity at
https://www.whoer.net , Make sure you check to see if you IP leaking
cause that would throw a flag as well: https://www.dnsleaktest.com
Now head towards Amazon.in and search some products act as a
typical buyer, not jump directly to your product. Use the search, see
different knick-knacks, add them to the cart, but do not buy. It should
be quite different items, not those that you want to card.
After the virtual shopping logout from Amazon, leave the computer,
and stop the activity on it. Put it to sleep. After 5 or more hours, go
back to Amazon and clean your cart. Now let’s card.
Now add your desired product in to your cart according to the cc limit.
Check it out. Done payment via the CC.
Now u successfully placed your order. To avoid cancellation “Archive
your order”
Now logout from that account.
whoer.net
What Is My IP — IP Lookup, VPN & Proxy Check, DNS/WebRTC Leak Test | Whoer.net
Check your privacy with free My IP lookup (IPv4/IPv6), VPN & proxy checker (HTTP/HTTPS/SOCKS5), browser fingerprint, DNS/WebRTC/IPv6 leak tests, IP blacklist check, and a basic port scan.
After getting order confirmation.
Hurraaayyyy!!! U have successfully carded
🦑T.me/UnderCodeTestingOfficial
@ Steave(t.m)
—————-UNDERCODE——————-
Hurraaayyyy!!! U have successfully carded
🦑T.me/UnderCodeTestingOfficial
@ Steave(t.m)
—————-UNDERCODE——————-