UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘List of changes in Android 11
instagram.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1 Conversations section in the notification panel
At the top of the notification panel, the β€œConversations” section has appeared. It contains all the notifications from messengers so that you do not need to look for them among others. There is a transparent barrier between each section to make it easier to find notifications.

Alerts in the β€œConversations” section have additional settings when you make a gesture to the left and click on the gear icon. Remind Me disables default notifications for an hour. Show Bubble causes an alert from this app to appear in a floating bubble

2) Built-in screen recording
Google advertised this in Android 10, but in the end, the built-in screen recording will appear in Android 11. It is located in the quick settings section and opens a simple user interface where you can activate audio recording and displaying touches on the screen. In the status bar, a countdown is activated. You can stop recording using a notification or a tile in the quick settings.

3) Sending images in responses via notifications
When you reply to a message in the notification panel using the "Reply" button, it is possible to attach an image.

4)Wireless debugging
In Android 11, you can send ADB and fastboot commands wirelessly without a USB cable. Although this requires an updated version of the tools, this functionality allows you to connect to a computer wirelessly using a QR code or a pairing code when the mobile device and the computer are on the same network. ADB commands can be sent as usual.

5) New interfaces for 5G
Android 11 introduces three new application programming interfaces to improve 5G connectivity.

6) Hinge Angle for Flexible Devices
More and more flexible mobile devices will appear on sale. Google adds a new application programming interface that allows applications to use the loop angle sensor. This interface resembles Samsung Flex Mode and Microsoft Peek. They change the picture on the screen depending on the angle at which it is located.

7) Google Pixel 4a or 5 wireless reverse charging
There is information that references to wireless reverse charging are found in the Android 11 code. It allows you to recharge other devices from your smartphone. Such an opportunity is now on the devices Samsung and Huawei. It requires special components that may appear on Pixel 4a or Pixel 5 smartphones.

8) The application "Files" will receive new features
The default file manager on Android was known as Files Go, and will now be called Files by Google. This new conductor has a number of features that were not there before. Including the ability to clear unused files and send files via Wi-Fi Direct.

9) Using Bluetooth Headphones in Airplane Mode
In previous versions of Android, activating Airplane mode turned off Bluetooth accessories, even if you were listening to audio at that moment. In Android 11, this will change. When you connect an audio device via Bluetooth, Airplane mode will not disable it.

This functionality is not available in the first preliminary version for developers. However, it is mentioned in the Android Open Source Project under the heading Context-aware Bluetooth airplane mode. This means that the function should appear in Android 11.

The Dynamic Meteredness API can be used by applications to see if your rate is unlimited. If so, the application will use more 5G traffic to improve the quality of multimedia content.
Bandwidth Estimator API gives applications a tool to check the speed of incoming and outgoing connections without having to make a request to the network. This improves accuracy and simplifies data tracking.
The 5G status interface allows applications to quickly detect if the user is on 5G New Radio or Non-Standalone networks. An app can use this information to alert you to how 5G improves its performanc
> all news tips android 11

10) Scrolling screenshots
Another feature that is under development, but is still inactive. This is a new interface with support for scrolling screenshots. At this interface, the β€œExpand” button appears after you take a screenshot. The button allows you to shoot multiple pages and combine them into one long screenshot.

11) Synchronized IME Transition
Android 11 brings a new set of interfaces that let you synchronize how the software keyboard is displayed on the screen. The animation will become smoother.

12) New permissions
The Android 11 permission system will be new. The option β€œAsk every time” appears. This function is available for all permissions when using the system settings. In pop-ups, it appears only when the application requests access to the camera, microphone or location.

If applications ask for such permissions, the window contains three answers: β€œOnly this time”, β€œWhen the application is used” and β€œReject”. If you select β€œOnly this time,” the next time the application needs access to this data, the request will be repeated. For other permissions, the window will display β€œAllow” or β€œReject”. The first option will give the application permanent access.

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ BEST FREE VIRTUAL-VALID CREDIT CARD FOR TRANSFERE AND TRIALS...
fb.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) https://www.netspend.com/

2) https://link.10besty.com/Payoneer

3) https://www.americanexpress.com/us/payment-solutions/amex-go-virtual-cards/index.html

4) https://link.10besty.com/Neteller

5) https://link.10besty.com/Neteller

6) https://www.walmartmoneycard.com/

7) https://www.netspend.com/prepaid-debit/features/virtual-cards/

8) https://www.freecharge.in/mobile/freecharge-go

9) https://www.kotak.com/en/personal-banking/cards/prepaid-card/kotak-netcard.html

10) https://dhanipay.in/
written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁]
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁]

πŸ¦‘ How to Create a Virtual Credit Card For Netflix Trial In Ewire :
instagram.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) First, go to the play store and download the Ewire Rupay application.
>https://play.google.com/store/apps/details?id=in.MadMoveGlobal.CashierCard

2) Sign up with your mobile number on the Ewire mobile app, and you are ready to go.

3)To top-up your virtual card, you need to add money to your card by u sing a different bank account.

4) Now pay any online bills and payment using this Ewire(cashier) virtual card.

πŸ¦‘ Features of Ewire Virtual Credit Card :

>Simple and secure transaction
>Compliant domestic and cross-border payments in a single platform
>Provide MasterCard Vcc which is acceptable in most of the merchant website
>Does not require any document submission process

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁]
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁]

πŸ¦‘ Do not get caught! How to protect your hard drive from law enforcement by undercode :
t.me/undercodeTesting

1) Download and burn DBAN
> https://sourceforge.net/projects/dban/files/dban/dban-2.2.6/dban-2.2.6_i586.iso/download
You can download beta 2.2.6 from Sourceforge . When you have at your disposal an .ISO image,

2) all that remains to be done is to burn it to a blank CD / DVD disc. Insert the disc into the CD-ROM and restart the computer. Most computers are configured primarily to boot from a CD and only the second one checks whether the system can boot from a hard drive. If this is not the case and your computer does not boot from CDs, then you will need to go into the BIOS settings and change the order of boot priorities.

3) Boot and work
After starting from the CD
>Just press Enter to start DBAN interactively. The main menu, shown in the screenshot below, should display your hard drive, over which it is supposed to carry out the data stripping procedure.

4) The following screenshot shows that DBAN is ready to get started. By default, the DoD Short wipe method is used, and it is perfect for our purposes.

5) To select this method, just press the spacebar and DBAM will begin its dirty work of cleaning your data. DoD cleanup will take some time, especially on large hard drives. But in any case, it is still not as long as a prison term.

>Finally
DBAM is a great tool for cleaning hard drives. We advise you to always carry a copy of such a CD in your laptop bag. It works faster, easier and better than most of the other tools that we had to use. Be careful (thanks, Cap!), Because after such cleaning the hard drive, data recovery is impossible. Therefore, do not mistake the discs!

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Trusted - working spy apps :
twitter.com/undercodeNews


1) mSpy - has many exclusive features, so it is considered the best in terms of price and quality.

2)Mobistealth spy is an almost complete analogue of the previous utility.

3) FlexiSpy - in addition to all standard options for tracking mobile equipment, it has the function of recording voice calls and surrounding conversations, but such features are available only if the most expensive tariff plan is selected.

4) XNSpy is the newest application of all the listed. The main advantage of XNSpy is its lower price compared to its competitors.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ LAST 24 h undercode posts :

1) 6 best external drives

2) External drives against the cloud
+ Before buying storage you must know ...

3) Main reasons why DotVPN is better than VPN

4) Full List of changes in Android 11

5) BEST FREE VIRTUAL-VALID CREDIT CARD FOR TRANSFERE AND TRIALS...

6) How to Create a Virtual Credit Card For Netflix Trial In Ewire

7) Trusted - working spy apps android-ios

8) Best file encryption apps before uploading to the cloud

9) How to protect your hard drive from law enforcement by undercode


E N J O Y
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘VIRTUAL PHONE NUMBERS
t.me/UnderCodeTesting

To receive your messages of confirmation!

⁩⁩1. Receivefreesms.net
2. Sms-receive.net
3. Receive-a-sms.com⁩
4. ⁦Hs3x.com⁩
5. Receive-sms-now.com - (There are Russian numbers)
6. Smsreceivefree.com
7. Receivesmsonline.com
8. Getsms.org - (Рус.Π½ΠΎΠΌΠ΅Ρ€Π°)
9. Tempsms.ru - (Rus.number)
10. Numberforsms.com - (There are Russian numberps)
11. Sonetel.com
12. Smska.us - (Rus.number)
13. Sellaite.com
14. Sms.ink - (Rus.numera)
15. Proovl.com
16. Onlinesim.ru
17. Zadarma.com - (There are Russian numbers)
18. Smsc.ru - (You need to register, there are Russian and Ukrainian numbers)
19. Freevirtualnumber.skycallbd.com
20. Getfreesmsnumber.com
21. Receive-smsonline.net - Yearly design 
22. Receivefreesms.com
23. Receivesmsverification.com
24. Sms-online.co
25. Ireceivesmsonline.com
26. Receive-sms-online.com - (There are a number of scores)
27. Receive-sms-free.com
28. Esendex.com.au - (Registration required)
29. Receivesmsonline.in

@kadrino
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Java 14 is coming, why are so many people sticking to Java 8?
twitter.com/undercodeNews:

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Since Java 9, the release of the Java version has been dazzling.

2) Every 6 months, a new version comes out, Java 10, Java 11, Java 12, Java 13, and by March 2020, Java 14 starting.

3) To be honest, such frequent releases are a bit tiring. Every time I see an article introducing a new version of Java, I have no interest in reading articles.

4) Among so many versions, only Java 8, Java 11 and future Java 17 are long-term support versions (LTS) . Oracle will support 3 years, others will only support 6 months. Once the new version comes out, the old version will be abandoned Technical support.

πŸ¦‘ Is this quick release good?

1) Have! Small steps and fast running have always been a tool for our software development. Iterative method is used to release a part of the function each time, and it is pushed to the developer to verify, a typical agile idea.

2) However, this benefit is more conducive to JDK developers . It is too difficult for individuals and companies using Java to keep up with the pace of upgrading every six months. JDK is a very core infrastructure. In addition to security holes, who has nothing to do to upgrade the JDK in the production environment? Who is responsible if something goes wrong?

3) So, in principle, everyone will find those LTS versions to upgrade, such as Java 11, but it turns out that most people are still sticking to Java 8:

4) This survey shows that up to 80% of companies and programmers use Java 8. Why? Why don't you upgrade to Java 11?

> I personally think the main reason is that there are few major feature upgrades that are good for development, and they are not attractive enough

πŸ¦‘version Important features
Java 9
Modular system system

Java Shell: interactive command line console

Java 10 Local variable type derivation
Java 11
Various enhancements: Stream, String, Collection

Standardized HTTP Client

ZGC

Java 12 Switch expression expansion
Java 13
Reimplement Socket API

Text block (multi-line string)

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to maintain complete anonymity on the Internet
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Tor
The list of anonymity tools would not be complete without the Tor network. This network consists of volunteer sites around the world and is synonymous with anonymity. The word Tor is short for The Onion Router. The network allows you to encrypt your traffic and each time you connect to a web server, direct this traffic through randomly selected nodes before it reaches its destination.

2) Live OS
The browser is suitable for not being tracked by advertisers and for periodic visits to DarkNet. However, if you need complete anonymity, a nuclear option is required. Although no one can track your activity in Tor Browser, you probably have many applications running in the background. These are programs for working with text, video players, various managers who send data to the Internet. It is believed that authorities use unencrypted Windows error reports to search for people. Windows 10 contains a large amount of tracking software, all of which are enabled by default.

3) VPN without logs
Virtual private networks encrypt all traffic on the device and direct them through the intermediate server to the desired point. Your real IP address is hidden and third-party observers, including your provider, cannot monitor traffic.

4) DNS without logs
When you enter the URL in the address bar of the browser, the request is sent to the DNS server to find the IP address that matches the specified URL. Even when using a proxy like VPN, these DNS queries can be sent outside the encrypted tunnel to the default server. By default, DNS queries usually go and are recorded to the nearest server of your provider.

> If this happens while working with the VPN, this is called a DNS leak. Many VPN providers offer DNS leak protection, in which all Internet traffic, including DNS queries, goes through the VPN. These providers usually work with their own DNS servers, which do not record which sites you visit if you are promised not to keep logs.

5) Temporary Email
To remain anonymous, you must not be logged into your existing accounts. Meanwhile, many websites and applications require an account login. In this case, temporary email addresses may come in handy.

6) Cryptocurrencies
If you want to make an anonymous purchase or donate money, cryptocurrencies are better than credit cards or payment systems like PayPal. Which does not mean that you just have to open a bitcoin wallet on large exchanges like Coinbase, and start spending money.

7) Search engines
Google tracks your every search query. If you use Tor, it does not matter, but still it is advisable to find another option for the search.

For example, DuckDuckGo . This is one of the most popular search services that does not monitor user profiles. It can be set as the default search engine in your browser.

8) File transfer
It happens that you need to send someone anonymously a file that is too large to be attached to an email. For example, you want to publish some documents, but so that no one knows that you did it. In this case, uploading files to Dropbox will not be enough.

FileDropper is a simple and convenient solution where you can upload up to 5 GB of data without registration. WeTransfer is another option that allows you to upload up to 2 GB of data without registration. In such services, you can upload files and send links to them

9) Choose browser extensions carefully
Tor Browser is little supported in browser extensions, for which there is a reason. Advertisers are tracking users more sophisticatedly. One of the most advanced tracking methods is fingerprinting. By collecting information about your web browser, which extensions are installed, which device you have, in which language, etc., companies create your profile.
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 updated wifihacking TERMUX-ANY LINUX :
> knife for 802.11, BLE and Ethernet networks reconnaissance and MITM attacks.
fb.com/undercodeTesting

πŸ¦‘FEATURES :

1) WiFi networks scanning, deauthentication attack, clientless PMKID association attack and automatic WPA/WPA2 client handshakes capture.

2) Bluetooth Low Energy devices scanning, characteristics enumeration, reading and writing.

3) 2.4Ghz wireless devices scanning and MouseJacking attacks with over-

4) the-air HID frames injection (with DuckyScript support).

5) Passive and active IP network hosts probing and recon.
ARP, DNS and DHCPv6 spoofers for MITM attacks on IP based networks.

6) Proxies at packet level, TCP level and HTTP/HTTPS application level fully scriptable with easy to implement javascript plugins.

7) A powerful network sniffer for credentials harvesting which can also be used as a network protocol fuzzer.

8) A very fast port scanner.

9) A powerful REST API with support for asynchronous events notification on websocket to orchestrate your attacks easily.

10) A very convenient web UI.
More!

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

A) INSTALL USING DOCKER:

1) docker pull bettercap/bettercap
To pull latest source code build of the image:

2) docker pull bettercap/dev
To run:

3) docker run -it --privileged --net=host bettercap/bettercap -h

B) Compiling from Sources
In order to compile bettercap from sources, make sure that:

πŸ¦‘ You have a correctly configured Go >= 1.8 environment.
$GOPATH is defined and $GOPATH/bin is in $PATH.

ou’ll also need to install the dependencies:

>build-essential

>libpcap-dev

>libusb-1.0-0-dev (required by the HID module)

>libnetfilter-queue-dev (on Linux only, required by the packet.proxy module)

>Once you’ve met this conditions, you can run the following commands to compile and install bettercap in /usr/local/bin/bettercap:

>go get github.com/bettercap/bettercap

>cd $GOPATH/src/github.com/bettercap/bettercap

>make build

>sudo make install

B) Compiling on Android TERMUX :

1) pkg install root-repo

2) pkg install golang git libpcap-dev libusb-dev

3) There’s a golang bug in termux about some hardcoded path, the fix is ugly but it works:

> sudo su

>mount -o rw,remount /
>mkdir -p /home/builder/.termux-build/_cache/18-arm-21-v2/bin/

>ln -s which pkg-config /home/builder/.termux-build/_cache/18-arm-21-v2/bin/arm-linux-androideabi-pkg-config

πŸ¦‘ TESTED BY UNDERCODE :

> ubuntu

> Termux

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘TYPES OF PROXY BEST TYPES :

You’ll find a variety of proxies on our list. Here’s what they mean:

1) SOCKS 4
SOCKet Secure Internet protocol, routing network packets between a client and server through a proxy server. Only supports TCP application.

2) SOCKS 5
SOCKet Secure Internet protocol, routing network packets between a client and server through a proxy server. Supports TCP, IPv6 and UDP (for DNS lookups). Provides authentication so only authorized users can access a server.

3) https (SSL)
Use this option to access website URLs that start with https, and to enable SSL debugging. These use encrypted connections between servers and visitors. The proxy will dynamically create an SSL certificate for you.
HTTP

Acts as HTTP client and server. This routes client requests from a web browser to the internet, caching (for increased speed) while keeping you anonymous.

4) Google proxy
These proxies are not blocking access to Google.com search.

πŸ¦‘ LEVELS OF ANONYMITY

1) These are usually divided into 3 categories. These are based on levels of anonymity, depending on how much information is sent to the server:

2) Transparent (level 3)
The lowest level of anonymity. Your IP address is hidden from the websites you access. However, these proxies cache the website pages you visit. This makes web access faster… but it also means your IP can be found on the server. People often choose this option when their goal is to visit blocked websites, bypass firewalls or download from file hosting sites – rather than hide identity.

3) Anonymous (level 2)
Medium anonymity, suitable for most internet activities. Your IP address stays hidden from the proxy server, and nobody can establish a connection with your PC. However, the server records your connection as behind a proxy, even though it can’t pinpoint your location. Connection speed is average.

4) Elite (level 1)
The highest level of anonymity, but also the slowest connection. The server you connect to doesn’t know you’re using a proxy, and it behaves as though the IP address you provide is your β€œreal” IP.


πŸ¦‘ ALTERNATIVES FOR ANONYMOUS BROWSING 2020 :

1) Hidester VPN
Our Virtual Private Network (VPN) encrypts all your online activity, so you stay anonymous. Our private servers keeps no logs, so there’s no record of the websites you visit or the applications you use. You can download the VPN App in one click.

1) Hidester web proxy
Enjoy easy, fast and free access to blocked websites. Our web proxy is browser-based, so you can go online from any device, anywhere in the world. Plus you get automatic SSL security for extra protection!

@undercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘PREM PROXIES FOR FREE
> IP address Port Protocol Country Region City Anonymity Speed Uptime Response Last checked
instagram.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) 134.209.44.228 80 HTTP
United States United States
Massachusetts Mansfield Anonymous 7077 kB/s
72%
53 ms
7 hours ago


2) 165.227.77.10 3128 HTTP
United States United States
New Jersey Clifton Anonymous 6623 kB/s
100%
52 ms
6 hours ago

3) 206.189.194.4 80 HTTP
United States United States
California Alameda Anonymous 6575 kB/s
100%
51 ms
7 hours ago


4) 167.172.23.177 3128 HTTP
United Kingdom United Kingdom
Hertford Stevenage Anonymous 6355 kB/s
33.3%
52 ms
4 hours ago


5) 198.50.177.44 44699 SOCKS4
Canada Canada
Quebec MontrΓ©al High anonymity 6190 kB/s
75%
3 ms
5 hours ago


6) 142.93.57.37 80 HTTP
Canada Canada
Ontario Toronto High anonymity 5922 kB/s
99.7%
51 ms
6 hours ago


7) 174.138.54.49 1080 SOCKS5
United States United States
New Jersey Clifton High anonymity 5803 kB/s
99.9%
61 ms
7 hours ago


8) 167.71.183.113 8888 HTTPS
United States United States
New York New York Transparent 5458 kB/s
66.7%
552 ms
8 hours ago

9) 138.197.32.120 3128 HTTPS
United States United States
New Jersey Clifton Transparent 5424 kB/s
18.1%
74 ms
8 hours ago

10) 54.156.164.61 80 HTTP
United States United States
Virginia Ashburn High anonymity 5410 kB/s
92.2%
85 ms
6 hours ago

11) 8.9.15.11 8080 HTTPS
United States United States
Illinois Chicago Transparent 4350 kB/s
84.2%
130 ms
5 hours ago

12) 67.205.149.230 1080 SOCKS5
United States United States
New Jersey North Bergen High anonymity 4225 kB/s
99.1%
59 ms
5 hours ago

13) 168.169.146.12 8080 HTTP
United States United States
New York Buffalo Transparent 2783 kB/s
50.1%
315 ms
3 hours ago

14) 138.197.145.103 1080 SOCKS5
Canada Canada
Ontario Toronto High anonymity 2768 kB/s
99.9%
48 ms
8 hours ago


15) 155.138.148.76 8080 HTTPS
United States United States
Michigan University Center Transparent 2405 kB/s
92.3%
195 ms
7 hours ago

16) 70.165.64.33 48678 HTTP
United States United States
Virginia Virginia Beach Transparent 2357 kB/s
70.5%
5982 ms
7 hours ago

17) 138.197.157.60 1080 SOCKS5
Canada Canada
Ontario Toronto High anonymity 2289 kB/s
98.5%
47 ms
8 hours ago

18) 64.235.204.107 8080 HTTPS
Canada Canada
Ontario Cornwall Anonymous 2215 kB/s
99.3%
44 ms
6 hours ago

19) 67.205.132.241 1080 SOCKS5
United States United States
New Jersey North Bergen High anonymity 2201 kB/s
98.6%
59 ms
6 hours ago

20) 206.71.228.129 8841 SOCKS4
United States United States
New York New York High anonymity 2185 kB/s
88.5%
150 ms
6 hours ago

21) 206.71.228.193 8841 SOCKS4
United States United States
New York New York High anonymity 2152 kB/s
85.9%
31148 ms
2 hours ago

22) 159.203.91.6 1080 SOCKS5
United States United States
New Jersey Clifton High anonymity 2000 kB/s
99%
72 ms
9 hours ago

23) 52.179.231.206 80 HTTP
United States United States
Virginia Boydton High anonymity 1874 kB/s
100%
245 ms
6 hours ago

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ brute force directories and files in websites 2020 updated topic:
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) git clone https://github.com/maurosoria/dirsearch.git

2) cd dirsearch

3) python3 dirsearch.py -u <URL> -e <EXTENSION>

4) Options:
-h, --help show this help message and exit

Mandatory:
-u URL, --url=URL URL target
-L URLLIST, --url-list=URLLIST
URL list target
-e EXTENSIONS, --extensions=EXTENSIONS
Extension list separated by comma (Example: php,asp)
-E, --extensions-list
Use predefined list of common extensions

Dictionary Settings:
-w WORDLIST, --wordlist=WORDLIST
-l, --lowercase
-f, --force-extensions
Force extensions for every wordlist entry (like in
DirBuster)
πŸ¦‘Features :

> Multithreaded

>Keep alive connections

>Support for multiple extensions (-e|--extensions asp,php)

>Reporting (plain text, JSON)

>Heuristically detects invalid web pages

>Recursive brute forcing

>HTTP proxy support

>User agent randomization

>Batch processing

>Request delaying

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ NETFLIX 2020 FREE UNLIMED MOD:

> https://moddroid.com/netflix-7-49-0.html?download (SPIDER SERVER)

> https://www.mediafire.com/file/jcv654rlqfn3rjm/Netflix-Premium-mod-2-v7.44.0.apk/file

> https://www.mediafire.com/file/9rxr54qfujzow6q/Netflix-mod-v7.48.0.apk/file

πŸ¦‘ Spootify 2020 mod

https://apkmody.io/apps/spotify-premium-apk.html?download

https://apkfolks.com/go/spotifymod/

πŸ¦‘ Nord vpn new accounts 100% tested :

john.rink56@yahoo.com:Football56
marinushove@hotmail.com:Kasperkat20
tonymiller750@gmail.com:Subaru90
thinkfirst@live.com:25Isaac25
hacimelih75@gmail.com:Delideli18
trym_96_96@hotmail.com:90669688
jasongarland8x8@gmail.com:jasonstar3
ginaper94@yahoo.com:Texas1993
markataylor86@gmail.com:Alfie2009
ericlevesque559@gmail.com:El908301
goreflex22@gmail.com:lolapa22
sullyjrsworld@comcast.net:Sully1212
chandiragardiyehewa@yahoo.com:UQMed123
tsherman219@gmail.com:tristan123
1981przemko@gmail.com:Jolusia27
gv3gg13@gmail.com:Panchovanilla1
shkrevans@gmail.com:shakir98
phlppjnz@gmail.com:Jobro500
MattBreland@gmail.com:redwall1
arazukie@gmail.com:Poopface12
anthonyamigon05@gmail.com:1Antysecas
sanchezfranklin005@gmail.com:Jamuel1205
Brandon10161996@gmail.com:Jennifer12

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ ways to make money with cryptocurrencies in 2020 :
fb.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Purchase and storage of cryptocurrencies
>The most simple and reliable way to make money on cryptocurrencies is to buy and store in the hope of increasing the rate of the selected coins. Cryptocurrencies like

Bitcoin
Ethereum
Binance
Nexo
Tezos
Monero etc.
>Most often they are a fairly reliable investment. You can buy and store them for a long time, because their value in real money like the dollar and the euro is growing. This is not to say that this is serious investment advice. Rather, this is an example of how you can enter the cryptocurrency market.

2) Cryptocurrency Stacking
Stacking is a round-the-clock storage of cryptocurrency in a wallet. You get extra coins as a reward for this storage and maintenance of the blockchain network. In this segment, you should pay attention to the following cryptocurrencies:

Tezos (XTZ)
Neblio
Komodo
PIVX
Decred
NAV Coin
Tezos is the most popular and well-funded coin, with a margin of 6% per year.

3) Another smart way to make money on cryptocurrencies is to buy and store, for which you will receive dividends. There are many excellent cryptocurrencies that will pay only for the fact that you own them. It does not even require stacking, holding coins in an online wallet. Among these cryptocurrencies are the following:

NEO
Btmx
KuCoin

4) Launch cryptocurrency masternodes to generate passive income. A masternode is a complete cryptocurrency node or wallet on a computer where a real copy of the blockchain is stored in real time, how the complete nodes of bitcoin are stored . This computer allows you to perform certain tasks.

For the performance of such tasks on a network of different cryptocurrencies, the masternode owners are paid. However, to start a masternode, you must be the owner of a certain number of coins in this currency. This amount is different for different cryptocurrencies, but usually from 1000 to 25000 coins.

Among these cryptocurrencies are:

Dash
PIVX

5) Micro-tasks for cryptocurrencies
If you have extra time, you can perform micro-tasks for customers or some services and make money on this cryptocurrency. It can be tasks like downloading new applications for testing, watching videos, conducting online surveys, etc. Among the servers with such micro-tasks can be called:

Bituro
Coinbucks
These services pay in different currencies, such as Bitcoin, Dogecoin and others.

6) Work for cryptocurrency
If you are a developer or tester, writer or designer, you can get paid for your work in cryptocurrencies.

There are many platforms and websites that offer bitcoins in exchange for services:

Cointiply
Jobs4bitcoins
XBTFreelancer
Coinworker
Angle.Co
21.co
So you will not only earn cryptocurrency, but also be able to profit in the future if their rate grows. You can select the following cryptocurrencies:

Bitcoin
Litecoin
Ethereum
Monero

7) Arbitration of cryptocurrencies


The cryptocurrency market is free, over which there is no control from the governments of different countries. That is why the rate of one cryptocurrency on different exchanges can be very different.

Another way to earn money is to buy on one exchange at a lower price and sell on another exchange at a higher price. This is called arbitration.

The range of the course can be 5-40% and you can make money on it. Exchanges like Bittrex and Poloniex provide this opportunity.

Written by Undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Fastest way to crack password-protected Microsoft Office documents - doc files and Excel spreadsheets
t.me/undercodeTesting

1) Microsoft Office files are password protected to prevent tampering and data integrity. But the protected documents of earlier versions of the Office are vulnerable to extracting their hashes with a simple program called office2john. The hashes thus obtained can be cracked using John the Ripper and Hashcat.

> It takes just a couple of seconds to extract the hash from the password-protected Microsoft Office file using office2john . Despite the fact that the encryption standards in various Office products have changed over the years, none of them can resist the extraction of hashes using office2john.
> This utility is written in Python and can be run directly from the terminal. As for compatibility with Office files, it is known that office2john works with any password-protected Word, Excel, PowerPoint, OneNote, Project, Access, and Outlook files created in Office 97, Office 2000, Office XP, Office 2003, Office 2007, Office 2010 and Office 2013, including versions of Office for Mac. It may not work with newer versions of Office, but we saved the .docx file in Office 2016 by marking it as an Office 2013 file.

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Install Office2John
First, we need to download this utility from GitHub, since office2john is not included in the standard version of John the Ripper (which must already be installed on your Kali system). You can download it using wget.

wget https://raw.githubusercontent.com/magnumripper/JohnTheRipper/bleeding-jumbo/run/office2john.py

2) - https://raw.githubusercontent.com/magnumripper/JohnTheRipper/bleeding-jumbo/run/office2john.py
Resolving raw.githubusercontent.com (raw.githubusercontent.com)... 151.101.148.133
Connecting to raw.githubusercontent.com (raw.githubusercontent.com)|151.101.148.133|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 131690 (129K) [text/plain]
Saving to: β€˜office2john.py’

office2john.py 100%[=======================================================================>] 128.60K --.-KB/s in 0.09s

> (1.45 MB/s) - β€˜office2john.py’ saved [131690/131690]

2) Make sure everything is in the same directory
To start office2john using Python, we need to go to the directory in which it was installed. By default, for most of you, this will be the Home directory (just type cd in the console), but you can create any other directory.

3) For our tests you will need a suitable file. We will use a simple .docx file called β€œdummy.docx”, which we created using Word 2007 and password protected it. Download it to have something to work with. The password for the file is β€œpassword123”, however, you will recognize it already. You can also download documents created in Word 2010 and (which appears to be created in Word 2013). The password for them is the same - β€œpassword123”.

4) Get the hash using Office2john
The first thing to do is to extract the hash of our secure Office file. Run the following command and write the output to the hash.txt file, which we will use a little later.

5) python office2john.py dummy.docx > hash.txt
To verify that the hash was successfully retrieved, use the cat command. We see that the saved hash corresponds to Microsoft Office 2007. Great!

cat hash.txt
dummy.docx:$office$*20*128*16*a7c7a4eadc2d90fb22c073c6324b6b49*abc5f80409f5f96f97e184e44aacd0b7*930b0c48a7eb5e13a57af4f3030b48e9402b6870

5) Hack the hash you just saved
We show two ways to crack the hash of the protected Microsoft Office file that you just saved. Both methods work great, so choose the one you like best.

Option 1: Hack with John the Reaper
Set the –wordlist flag and pass the path to your favorite wordlist into it. The wordlist that is included in Nmap is perfect for our purposes, but for more complex passwords you should use a more detailed wordlist.
john --wordlist=/usr/share/wordlists/nmap.lst hash.txt
Using default input encoding: UTF-8
Loaded 1 password hash (Office, 2007/2010/2013 [SHA1 128/128 SSE2 4x / SHA512 128/128 SSE2 2x AES])
Cost 1 (MS Office version) is 2007 for all loaded hashes
Cost 2 (iteration count) is 50000 for all loaded hashes
Will run 4 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
John will begin to crack, and depending on the complexity of the password, he will finish work when he finds a match. To view the current status of the process, press any key. When the hash is cracked, a message with the password from the document will appear on the screen. Since our password was very simple, it took only a few seconds to crack it.

password123 (dummy.docx)
1g 0:00:00:03 DONE (2019-02-05 15:00) 0.2824g/s 415.8p/s 415.8c/s 415.8C/s lacoste..cooldude
Use the "--show" option to display all of the cracked passwords reliably
Session completed

Written by Undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁