UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.4K links
๐Ÿฆ‘ Undercode Cyber World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE

โœจ Web & Services:
โ†’ Undercode.help
Download Telegram
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘2019 a good facebook hacking tool:
Facebook.com/UnderCodeTestingCompanie

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) pkg install git

2) git clone https://github.com/LOoLzeC/ASU

3) cd ASU

4) bash install.sh

5) Well done, all automate just choose option via numbers

๐Ÿฆ‘vid tutorial
https://youtu.be/G6U2P3T746A

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm)
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Parse email Headers:
> Email Reply Parser

EmailReplyParser is a small library to parse plain text email content. See the rocco-documented source code for specifics on how it works.

This is what GitHub uses to display comments that were created from email replies. This code is being open sourced in an effort to crowdsource the quality of our email representation.
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) git clone https://github.com/github/email_reply_parser

2) cd email_reply_parser

3) gem install email_reply_parser.

4) Type:

> rake : to run the tests.

5) To parse reply body:

> parsed_body = EmailReplyParser.parse_reply(email_body)

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm)
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘Blended threat mALWARE:
t.me/UnderCodeTestingOfficial

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

> Blended Threats are combination of worms, trojan, virus, and other kinds of malware.

> A blended threat (also known as a blended attack[1]) is a software exploit which in turn involves a combination of attacks against different vulnerabilities

>Blended threat is a popular term for a multi-pronged attack against networked computers.

> Symantec describes a blended threat as an attack that combines "viruses, worms, Trojan Horses, and malicious code with server and Internet vulnerabilities to initiate, transmit, and spread an attack." Blended threats are designed to propagate quickly, like worms, but instead of relying on a single attack vector (such as email), blended threats are designed to use whatever propagation path exists.|

๐Ÿฆ‘Worm or blended threat?

> Many of the most nefarious worms - nimbda, CodeRed, BugBear, Klez and slammer - are more accurately categorized as blended threats. Nimbda variants used email attachments; file downloads from a compromised web server; and Microsoft file sharing (e.g., anonymous shares) as propagation methods.

> Some Nimbda variants modified user (guest) accounts to provide the attacker or maliciously installed executable code with administrative privileges. The more recent Conficker and ZeuS/LICAT worms are also blended threats. Conficker employed all the traditional distribution methods. Both use domain generation algorithms to contact C&C hosts and download malware; LICAT file infector amplifies ZeuS' formidable man-in-th-browser trojan.

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm)
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Blendid is a delicious stand-alone blend of tasks and build tools poured together as a full-featured modern asset pipeline.

> It can be used as-is as a static site builder, or can be configured and integrated into your own development environment and site or app structure.
instagram.com/UnderCodeTestingCompany

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

require centos or fedora os

1) Open Terminal and start Typing:

2) yarn init

3) yarn add blendid

4) yarn run blendid init

5) yarn run blendid

Written by Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm)
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘A Stealthy Trojan Spyware (keylogger-spyware-malware-worm-spy-virus-fud-undetectable-computer-windows-pc-c-c++)
instagram.com/UnderCodeTestingCompany

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) Download :
> https://minhaskamal.github.io/DownGit/#/home?url=https://github.com/MinhasKamal/TrojanCockroach/tree/master/com/minhaskamal/trojanCockroach

2) Change the method sendData() of TrojanCockroach.cpp- place your email and password in the command.

3) change email address

4) Compile TrojanCockroach.cpp & Infect.cpp. Transmit.exe is actually the executable distribution of curl for Windows.

5) Place TrojanCockroach.exe, Infect.exe, Transmit.exe, Infect.lnk & TrojanCockroach.lnk in the same folder.

6) Now run TrojanCockroach.exe then insert a pendrive (see the magic!). You will get a hidden folder and link file in your pendrive. The hidden folder contains the full package, & the link file is actually renamed form of Infect.lnk

๐Ÿฆ‘Attack:

1) Insert the USB-Drive in the subject's PC (Yes, you have to start the spreading process from somewhere!). Run Infect.lnk and the spyware will be injected.

2) The syware will be activated after a reboot. Now (after a restart) every time any USB-Drive is inserted in the affected PC, the virus will copy itself in that, and the cycle will start again.

๐Ÿฆ‘Data Collection

1) You need to wait several days (depending on the number of power on/off of the PC), before getting any data.

2) After getting the email copy the full message to a text file.

๐Ÿฆ‘Data Collection

1) You need to wait several days (depending on the number of power on/off of the PC), before getting any data.

2) After getting the email copy the full message to a text file

3) Now, run DecodeMessage.exe for decoding the message as plain text.

E N J O Y

@ Mr.Botnet
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘WHAT IS NASM ?
t.me/undercOdeTestingOfficial

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

> The Netwide Assembler (NASM) is an assembler and disassembler for the Intel x86 architecture. It can be used to write 16-bit, 32-bit (IA-32) and 64-bit (x86-64) programs. NASM is considered to be one of the most popular assemblers for Linux.[1]

> NASM can output several binary formats, including COFF, OMF, a.out, Executable and Linkable Format (ELF), Mach-O and binary file (.bin, binary disk image, used to compile operating systems), though position-independent code is supported only for ELF object files. NASM also has its own binary format called RDOFF.

> The variety of output formats allows retargeting programs to virtually any x86 operating system (OS). Also, NASM can create flat binary files, usable to write boot loaders, read-only memory (ROM) images, and in various facets of OS development.[4] NASM can run on non-x86 platforms as a cross assembler, such as PowerPC and SPARC, though it cannot generate programs usable by those machines.

๐Ÿฆ‘EXAMPLES :

> Examples of programs for various operating systems

1) This is a "Hello, world!" program for the DOS operating system.

section .text
org 0x100
mov ah, 0x9
mov dx, hello
int 0x21

mov ax, 0x4c00
int 0x21

section .data
hello: db 'Hello, world!', 13, 10, '$'


2) An equivalent program for Linux:

global _start

section .text
_start:
mov eax, 4 ; write
mov ebx, 1 ; stdout
mov ecx, msg
mov edx, msg.len
int 0x80 ; write(stdout, msg, strlen(msg));

xor eax, msg.len ; invert return value from write()
xchg eax, ebx ; value for exit()
mov eax, 1 ; exit
int 0x80 ; exit(...)

section .data
msg: db "Hello, world!", 10
.len: equ $ - msg

Written by Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm)
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘How setup Anonymous WiFi Hotspot with Raspberry Pi 3 ?
instagraM.com/UnderCodeTestingCompany


๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) First Download Raspbian OS for RPi3, Etcher.
> https://www.raspberrypi.org/downloads/raspbian/

2) Flash Raspbian OS on Your SD Card Using Etcher.

3) Create a simple empty file named ssh on Boot Partition of SD Card.

4) Insert the SD card into the Raspberry Pi and Power it up.

5) Connect Router's LAN Cable with Raspberry Pi

6) Connect it with Monitor Using HDMI Cable.

7) Log in (pi:raspberry), Open Terminal, Get Root Access (sudo bash / sudo -i).

8) Clone Github Repo by Typing git clone https://github.com/thehackingsage/torfi.git

9) Open TorFi Folder : cd torfi

10) Run TorFi : ./torFi.sh

11) Setup SSID and Password

12) After That Reboot Your Raspberry Pi To Start Tor Access Point

That's It !!! Enjoy Anonymous WiFi Hotspot..

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm)
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘How speed up android on any new softwares 2019
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

1) Clear your Cached Data

> if your device is running low on storage, cached data will start hurting more than it helps. Hereโ€™s how to clear it out and start fresh:

> Navigate to Settings on your phone.You can find settings in the app drawer the > storage > clean cached

2) Turn animation-off

> Tap the Build number 7 times.You will see a message that you have enabled Developer options.

> Return to Settings and Tap Developer options.

> Tap Windows animation scale and select โ€œAnimation offโ€.

3) Remove or Reduce Widgets (30 seconds)

Widgets are an amazing feature of the Android operating system that allow you to see and interact with apps on your homescreen without needing to actually launch the app

4) Remove/Disable Bloatware and Unused Apps (1 minute)

Right out of the box, your Android phone probably had a number of apps pre-installed by your carrier or the phone manufacturer that have gone completely unused. Itโ€™s even more likely that over months or years, youโ€™ve added some unused apps of your own that are still taking up precious space on your phone. If things are slowing down on your device, a lack of available storage might just be the culprit. Hereโ€™s how to free up space.

5) Install a custom ROM

If Google or your carrier is not being forthcoming with updates, installing a custom ROM may be the solution. This is essentially installing a custom version of Android.

> It will let you install mods built by the community to provide better performance or more features, or make the jump to the latest version of Android when your device no longer officially supports it.

6) clean Android homescreen

Switching to a better launcher can also often help to make things nippier. I personally try to restrict my layout to a single page with folders, rather than multiple screens. This doesnโ€™t speed up Android, so much as it speeds up the wetware (me) so I can get to things much quicker.

7) force GPU rendering

> Note: The GPU takes more power than the CPU, so this can also reduce battery life by around 5-15 percent. Your call.
Switch to SKIA

> If you are on Android Nougat or above, you can try swapping the GPU rendering engine to SKIA, which some users report reduces lag in games. Using this setting actually slowed down performance in Dolphin
While youโ€™re at it, you could also try out Force 4x MSAA.

8) Google Chrome Data Saver compression-proxy

> Itโ€™s in the settings menu in Chrome. Of course, you can also try other browsers that claim to be faster.

9) Turn of auto syntax:

> If you have a relatively modern phone, chances are it behaves pretty well under most conditions. The one time you might have noticed slow down is when downloading and installing new apps.

10) Background services

> Consider removing any unnecessary background services. Background services are apps that run in the background continuously. A positive example is the SMS app, which runs in the background so it can listen out for messages. But many more have background processes too

Written by Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm)
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘What is Bin In CC ?
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

> Bank Identification Number (โ€œBINโ€)

> Bank Identification Number (โ€œBINโ€) or Issuer identification number (โ€œIINโ€) is the first six digits of a bank card number or payment cards number and it is part of ISO/IEC 7812.

> It is commonly used in credit cards and debit cards, stored-value cards, gift cards and other similar cards.

> BIN is beneficial to identify a card brand, issuing institution or bank, country of issuance, card type and category of cards. This information is very useful in commercial business for fraud prevention, especially in online store.

๐Ÿฆ‘An ISO/IEC 7812 number is up to 19 digits in length and used the following format

1> A BBBBB CCCCCCCCCCCC D

2> where A BBBBB denote the Bank Identification Numbers ("BIN") or Issuer identification number ("IIN")

3)
- A (Single Digit) specify the Major Industry Identifier (MII).

- BBBBB (5 Digits) specify the issuing institution or bank.

- CCCCCCCCCCCC (up to 12 digits) specify the individual account identifier.

- D (Single Digit) specify the checksum for validation.

Written by Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm)
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘2019 Bin Tools (uses or pentesting or hacking)
instagram.com/UndercOdetestingCompany

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

> Web Base BIN Tools

1) BIN Checker - To validate user input BIN.

>https://www.bincodes.com/bin-checker/

2) BIN Search & Finder - To find out BIN.

> https://www.bincodes.com/bin-search/

3) IP/BIN Combo Checker - To validate user input IP Address and BIN.

> https://www.bincodes.com/ip-bin-checker/

4) Credit Card Checker - To validate user input Credit Card or Debit Card.

> https://www.bincodes.com/creditcard-checker/

5) Credit Card Number Generator

> https://www.bincodes.com/creditcard-generator/

6) Random Credit Card Number Generator - To generate valid (but fake) random Credit Card or Debit Card Numbers.

> https://www.bincodes.com/random-creditcard-generator/

7) BIN Credit Card Number Generator - To generate valid (but fake)
random Credit Card or Debit Card Numbers base on user input BIN.

> https://www.bincodes.com/bin-creditcard-generator/

8) Bank Credit Card Number Generator - To generate valid (but fake) random Credit Card or Debit Card Numbers base on bank specific BIN.

> https://www.bincodes.com/bank-creditcard-generator/

9) BIN Lists and Ranges - Information on BIN Lists and Ranges.

> https://www.bincodes.com/bin-list/

E N J O Y

@UndercOdeOfficial
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘API Lookup BIN Tools New
t.me/UndercOdeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) API Lookup Access - Documentation on our API Access tools.

> https://www.bincodes.com/api-lookup/


2) BIN Checker API

> https://www.bincodes.com/api-bin-checker/

3) Credit Card Checker API

> https://www.bincodes.com/api-creditcard-checker/

4) Credit Card Generator API

> https://www.bincodes.com/api-creditcard-generator/

5) Multi BIN Checker Premium API

> https://www.bincodes.com/api-multi-bin-checker/

6) BIN Search Premium API

> https://www.bincodes.com/api-bin-search/

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm)
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘THE BIN LIST 2019 :
instagram.com/UndercOdeTestingCompany

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

> The bin list and bin range used on binlist by the major card schemes are:

- Amex bin list: Card numbers start with a 37.

- Visa bin list: Card numbers start with a 4.

- MasterCard bin list: Card numbers start with the numbers 51 through 55.

- Diners Club bin list: Card numbers begin with 300 through 305, 36 or
38.

- Discover bin list: Card numbers begin with 6011 or 65.

- JCB bin list: Card numbers begin with 35.

๐Ÿฆ‘Small List :

372734 - Blue for Business credit (small business)
372888 - American Express Gold Card (USA)
3732** - American Express Blue Airmiles Cash Back Card (Canada)
3733** - American Express Blue Airmiles Card / SPG Credit Card (Canada) / AMEX Aeroplan Plus Platinum (Canada) / Business Platinum Charge Card (Canada)
3735** - American Express Gold Cash Back Card / American Express Platinum Charge Card (Canada)
3742** - Charge Card (UK)
374288 - Centurion Charge Card (UK)
374289 - Platinum Charge Card (UK)
3743** - American Express International Euro Charge Card (UK)
374328 - American Express Gift Card (Only at US merchants)
374345 - Citi American Express Cards (USA)
374350 - Citibank (American Airlines) American Express credit card
3745** - American Express International Dollar Charge Card (UK)
374614 - British Airways American Express Premium Plus Card
374622 - American Express Optima Credit Card (France)
374660 - American Express BMW Card
374661 - American Express BMW Card
374671 - Blue American Express Card
374691 - Platinum Credit Card (UK)
374693 - Platinum Credit Card (UK)
374801 - Platinum Charge Card (Finland)
374970 - Air France KLM Flying Blue co-branded Gold Charge Card (France)
374996 - Corporate Card (France)
3750** - American Express Germany Products
3751** - American Express Finland
3752** - American Express Italy
3753** - American Express The Netherlands
3754150 - Commonwealth Bank of Australia Standard American Express
3754151 - Commonwealth Bank of Australia Gold American Express
3754155 - Commonwealth Bank of Australia Gold American Express
3754165 - Commonwealth Bank of Australia Platinum American Express
3755490 - American Express Blue Swedbank (Estonia)
3755492 - American Express Gold Swedbank (Estonia)
375622 - Garanti Bank American Express Green Card (Turkey)
375628 - Garanti Bank American Express Shop&Miles co-branded Gold Card (Turkey)
375790 - American Express Sweden corporate card (SE)
3758** - American Express Switzerland corporate card (CH)
3759** - American Express Cathay Pacific Credit Card (Hong Kong)
3760** - American Express Card Australia
376211 - Singapore Airlines Krisflyer American Express Gold Credit Card (Singapore)
3763** - American Express Card (Hong Kong)
3764** - American Express Credit Card
3766** - Platinum Charge Card (Mexico)
3767** - Platinum Credit Card (Mexico)
376966 - China CITIC Bank American Express Card (PRC)
376968 - China CITIC Bank American Express Gold Card (PRC)
400937-44 - Bank of China Great Wall Visa
400937 - CN BOC Great Wall International Card Corporate
400938 - CN BOC Great Wall International Card Corporate Gold
400941 - CN BOC Great Wall International Card
400942 - CN BOC Great Wall International Card Gold
400944 - Associated Bank (Citibank (South Dakota) N.A.)
401171 - Delta Community Credit Union Visa
401106 - McCoy Federal Credit Union VISA debit card
401180 - Suntrust Bank Debit Card
4013** - Visa Debit Card
401343 - Tesco Bank Bonus Visa
401344 - Tesco Bank Clubcard Visa
4016** - Citybank (El Salvador)
401612 - Banco Tequendama Visa CREDIT PLATINUM CARD (Colombia)
401773 - Electron IRL
404527 - Cabela's World's Foremost Bank
404586 - Open Bank, Russia - Visa Platinum Transaero Card
404645 - US Bank Visa Debit Card (USA)


@ Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm)
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘How Install node .js ON Any Debian Base (kali/parrot..) Linux ?
t.me/UnderCodeTestingOfficial

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

#!/bin/bash

1) sudo apt-get install python g++ make checkinstall fakeroot

2) src=$(mktemp -d) && cd $src

3) wget -N http://nodejs.org/dist/node-latest.tar.gz

4) tar xzvf node-latest.tar.gz && cd node-v*

5) ./configure

6) sudo fakeroot checkinstall -y --install=no --pkgversion $(echo $(pwd) |

7) sed -n -re's/.+node-v(.+)$/\1/p') make -j$(($(nproc)+1)) install

8) sudo dpkg -i node_*

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(og)
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ HOW INSTALL mnp ON Termux No-Root :
instagram.com/UNdercOdeTestingCompany

๐Ÿฆ‘๐•€โ„•๐•Š๐•‹๐”ธ๐•ƒ๐•ƒ๐•€๐•Š๐”ธ๐•‹๐•€๐•†โ„• & โ„๐•Œโ„•:

1) pkg install nodejs

2) If it asks you confirmation, choose Yes with the letter y and press Enter.

3) Wait for the installers and then check the npm and node version.

For npm execute:

> npm -v

4) So far you have correctly installed Node.js and NPM on Android. You can start developing and installing new dependencies or packages with npm install.

๐Ÿฆ‘Test Node and NPM on Android with web app using Express 2019 :

1) pkg install git

2) git clone https://github.com/parzibyte/Node-Express-Plantilla-Base

3) npm install

4) Run the server:

> node index.js

If everything is ok, a message will appear showing the port number of the server.

5) Now visit your browser on port 3000 (localhost: 3000). If you visit the / route you will see your browser information:

Well Done!

@Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm)
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘JOIN US FOR LEARN HACKING๐Ÿฆ‘
EveryDay new Tutorials :

<Those Only Our ENGLISH HACK GROUPES>

๐Ÿฆ‘RESPECT RULES :

> NO ADDS

> NO OTHER GROUPES LINKS


๐Ÿฆ‘ if groupe full try another link :

>https://chat.whatsapp.com/GWFHLdu7lpE14cw1soVHsg

> https://chat.whatsapp.com/FFYmyrnFdmo5R5EvwM7z9b

> https://chat.whatsapp.com/CMpnD53pY0xH6UK77oBNGt

> https://chat.whatsapp.com/DtiBC1Dp8cXHgTL0poEygc

> https://chat.whatsapp.com/LwWtKgQ59PeLM80qTZxmzE

> (This groupe for only Tested Youtube)
https://chat.whatsapp.com/Jn6ITcdWzF0EDja2YYLBvb

> https://chat.whatsapp.com/HrFYL94B7Kx3uTUSWa7kKe

> https://chat.whatsapp.com/Cd8CcBnWSEBJBUGg9AtbXg

> https://chat.whatsapp.com/DCF1oQiKFZED0kepp5ytyT

> https://chat.whatsapp.com/GWFHLdu7lpE14cw1soVHsg

> https://chat.whatsapp.com/GzkP126UuCxGEiUf8NqZvQ

> https://chat.whatsapp.com/Bc54qusd5wq8giVb6KevnB
(official Under cOde Groupe)

> https://chat.whatsapp.com/DtiBC1Dp8cXHgTL0poEygc

> https://chat.whatsapp.com/FjXZAAeYsus0J0h86XrRdk

> https://chat.whatsapp.com/GtiYBUOtfu95VeeE4RG6No

> https://chat.whatsapp.com/G78hIYxBNVa1kqRDRpJNpO
(Fav)

> https://chat.whatsapp.com/Lo3uVSUYEjMGY3sLzWvxy2

> (IOS Developpers /This Only Ios)
https://chat.whatsapp.com/F2OCn7jbgjAACKouOnILHm

MAIL US To Get More Links:
UndercodeTesting@Hotmail.com


๐Ÿฆ‘TELEGRAM:

> T.me/UndercOdeTestingOfficial
(OFFICIAL HACK CHANNEL)

> t.me/iOsDeveloppers
(only Ios)

๐Ÿฆ‘Mail :

UndercOdeTesting@Hotmail.com

๐Ÿฆ‘Instagram.com/UndercOdeTestingCompany
> Facebook.com/UndercOdeTestingCompanie
> Twitter.con/UnderCodeTC

โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Our english groupes for Once want to posted here
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ best 2019 video editing apps for Android/ios:
instagram.com/UnderCodeTestingCompany

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

1) Quik Video Editing AppQuik app is another free video editing app

> https://itunes.apple.com/app/apple-store/id694164275?mt=8&ls=1

> https://play.google.com/store/apps/details?id=com.stupeflix.replay

2) Mobile Video Editing Adobe Premiere Clip

> https://itunes.apple.com/us/app/adobe-premiere-clip/id919399401?ls=1&mt=8

> https://play.google.com/store/apps/details?id=com.adobe.premiereclip

3) Mobile Video Editing InShot App

> https://itunes.apple.com/us/app/inshot-video-editor-music-cut/id997362197?mt=8

> https://play.google.com/store/apps/details?id=com.flambestudios.picplaypost&hl=en

4) KineMaster

> https://play.google.com/store/apps/details?id=com.nexstreaming.app.kinemasterfree

> https://itunes.apple.com/us/app/kinemaster/id1223932558?mt=8

5) WeVideo

> https://play.google.com/store/apps/details?id=com.wevideo.mobile.android

> https://itunes.apple.com/us/app/wevideo-uploader/id615796920?mt=8

6) PicPlayPost

> https://itunes.apple.com/us/app/picplaypost/id498127541?mt=8

> https://play.google.com/store/apps/details?id=com.flambestudios.picplaypost&hl=en

Written by @Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm)
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ 7 Best Android Hacking Apps in 2019 โ€“ Hack Android Phone without Root-from wiKi & Tested by UndercOde:
instagram.com/UndercOdeTestingCompany

๐Ÿฆ‘๐Ÿ…ป๐Ÿ…ด๐Ÿ†ƒ ๐Ÿ†‚ ๐Ÿ†‚๐Ÿ†ƒ๐Ÿ…ฐ๏ธ๐Ÿ†๐Ÿ†ƒ:

1) AndroRAT

AndroRAT (Android and Remote Administrative Tools) is one of the best hacking apps for Android devices. The tool was initially released as a client/server application. The app allows you to remotely control an Android device and get any information that you want from it. It runs as a service on any device right after booting, and so, you wouldnโ€™t even know itโ€™s running in the background. AndroRAT can trigger a server connection by a simple call or SMS.

> https://github.com/DesignativeDave/androrat

2) Hackode

Hackode app consists of a variety of hacking tools for Android phones. The tools are divided into three categories called Reconnaissance, Security feed, and Scanning. The app can perform Google hacking, MySQL server, SQL injection, DNS lookup, DNS Dif, RSS feed, and much more. The app can also scan the phone for specific details that you might need.

> https://apkpure.com/hackode/com.techfond.hackode

3) FaceNiff

FaceNiff is an Android hacking app that lets you sniff a WiFi network traffic. The app can help you snoop onto peopleโ€™s twitter, Facebook, and other social media through your Android phone. The tool is a favorite of hackers and works by stealing cookies from a WiFi network. The hacker gets unauthorized access into the victimโ€™s social media accounts. Bartosz Ponurkiewicz, the developer of desktop hacking app Firesheep for Firefox has developed FaceNiff.

> http://faceniff.ponury.net/

4) Shark for Root

Shark for Root is one of the superior hacking tools for Android that security experts and hackers use. The tool is a traffic snipper and can work with WiFi, 3G, and FroYo tethered mode. The app can work on both rooted and non-rooted Android devices.

> http://www.mediafire.com/file/c654s093zk4898m/Shark-lv.n3o.shark-102-v1.0.2.apk

5) zANTI

zANTI is another Android hacking app for network sniffing. The mobile hacking app from Zimperium comes filled with tools that are popular with penetration testers. The penetration testing toolkit in the app allows a user to scan a network with ease. It also helps IT administrators to simulate an advanced hacking environment.

The app helps them detect multiple malicious techniques. zANTI uses the power of backtracking on an Android device. It can sniff all the websites accessed on a device. The app uses ARP cache poisoning and maps the entire network

> https://www.zimperium.com/zanti-mobile-penetration-testing

6) Droidsheep

Droidsheep is an app made for security analysts who love checking the strength of a WiFi network. The hacking app can hijack a networkโ€™s web session profile with ease. It can sniff the data of almost all services and websites. The Droidsheep app can act as a router and monitor and intercept all the active WiFi network traffic. The app fetches the profiles of active sessions.

> https://forum.xda-developers.com/showthread.php?t=1593990

7) DroidBox

You can use DroidBox to hack an Android phone and get a dynamic analysis of all the applications on the device. The app helps you get a wide set of information like the network traffic, data on SMS and phone calls, and more. It can help you get the hashes of an APK package.

> https://github.com/pjlantz/droidbox

8) cSploit

cSploit is one of the most advanced and powerful IT security toolkits for an Android operating system. The Android hacking tool can penetrate into any system and catalog all the local hosts on it. It can also find vulnerabilities on a network and exploit it to your benefits.

> http://www.csploit.org/

Written by @Mฬตอ˜ ฬ ฬ–rฬถฬ•.ฬตฬ ฬทอ Bฬดอ˜Oฬทฬ“Tฬถฬ†NฬดฬEฬถอ›Tฬถฬ…(tm)
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–