UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
80K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to maintain complete anonymity on the Internet
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Tor
The list of anonymity tools would not be complete without the Tor network. This network consists of volunteer sites around the world and is synonymous with anonymity. The word Tor is short for The Onion Router. The network allows you to encrypt your traffic and each time you connect to a web server, direct this traffic through randomly selected nodes before it reaches its destination.

2) Live OS
The browser is suitable for not being tracked by advertisers and for periodic visits to DarkNet. However, if you need complete anonymity, a nuclear option is required. Although no one can track your activity in Tor Browser, you probably have many applications running in the background. These are programs for working with text, video players, various managers who send data to the Internet. It is believed that authorities use unencrypted Windows error reports to search for people. Windows 10 contains a large amount of tracking software, all of which are enabled by default.

3) VPN without logs
Virtual private networks encrypt all traffic on the device and direct them through the intermediate server to the desired point. Your real IP address is hidden and third-party observers, including your provider, cannot monitor traffic.

4) DNS without logs
When you enter the URL in the address bar of the browser, the request is sent to the DNS server to find the IP address that matches the specified URL. Even when using a proxy like VPN, these DNS queries can be sent outside the encrypted tunnel to the default server. By default, DNS queries usually go and are recorded to the nearest server of your provider.

> If this happens while working with the VPN, this is called a DNS leak. Many VPN providers offer DNS leak protection, in which all Internet traffic, including DNS queries, goes through the VPN. These providers usually work with their own DNS servers, which do not record which sites you visit if you are promised not to keep logs.

5) Temporary Email
To remain anonymous, you must not be logged into your existing accounts. Meanwhile, many websites and applications require an account login. In this case, temporary email addresses may come in handy.

6) Cryptocurrencies
If you want to make an anonymous purchase or donate money, cryptocurrencies are better than credit cards or payment systems like PayPal. Which does not mean that you just have to open a bitcoin wallet on large exchanges like Coinbase, and start spending money.

7) Search engines
Google tracks your every search query. If you use Tor, it does not matter, but still it is advisable to find another option for the search.

For example, DuckDuckGo . This is one of the most popular search services that does not monitor user profiles. It can be set as the default search engine in your browser.

8) File transfer
It happens that you need to send someone anonymously a file that is too large to be attached to an email. For example, you want to publish some documents, but so that no one knows that you did it. In this case, uploading files to Dropbox will not be enough.

FileDropper is a simple and convenient solution where you can upload up to 5 GB of data without registration. WeTransfer is another option that allows you to upload up to 2 GB of data without registration. In such services, you can upload files and send links to them

9) Choose browser extensions carefully
Tor Browser is little supported in browser extensions, for which there is a reason. Advertisers are tracking users more sophisticatedly. One of the most advanced tracking methods is fingerprinting. By collecting information about your web browser, which extensions are installed, which device you have, in which language, etc., companies create your profile.
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 updated wifihacking TERMUX-ANY LINUX :
> knife for 802.11, BLE and Ethernet networks reconnaissance and MITM attacks.
fb.com/undercodeTesting

πŸ¦‘FEATURES :

1) WiFi networks scanning, deauthentication attack, clientless PMKID association attack and automatic WPA/WPA2 client handshakes capture.

2) Bluetooth Low Energy devices scanning, characteristics enumeration, reading and writing.

3) 2.4Ghz wireless devices scanning and MouseJacking attacks with over-

4) the-air HID frames injection (with DuckyScript support).

5) Passive and active IP network hosts probing and recon.
ARP, DNS and DHCPv6 spoofers for MITM attacks on IP based networks.

6) Proxies at packet level, TCP level and HTTP/HTTPS application level fully scriptable with easy to implement javascript plugins.

7) A powerful network sniffer for credentials harvesting which can also be used as a network protocol fuzzer.

8) A very fast port scanner.

9) A powerful REST API with support for asynchronous events notification on websocket to orchestrate your attacks easily.

10) A very convenient web UI.
More!

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

A) INSTALL USING DOCKER:

1) docker pull bettercap/bettercap
To pull latest source code build of the image:

2) docker pull bettercap/dev
To run:

3) docker run -it --privileged --net=host bettercap/bettercap -h

B) Compiling from Sources
In order to compile bettercap from sources, make sure that:

πŸ¦‘ You have a correctly configured Go >= 1.8 environment.
$GOPATH is defined and $GOPATH/bin is in $PATH.

ou’ll also need to install the dependencies:

>build-essential

>libpcap-dev

>libusb-1.0-0-dev (required by the HID module)

>libnetfilter-queue-dev (on Linux only, required by the packet.proxy module)

>Once you’ve met this conditions, you can run the following commands to compile and install bettercap in /usr/local/bin/bettercap:

>go get github.com/bettercap/bettercap

>cd $GOPATH/src/github.com/bettercap/bettercap

>make build

>sudo make install

B) Compiling on Android TERMUX :

1) pkg install root-repo

2) pkg install golang git libpcap-dev libusb-dev

3) There’s a golang bug in termux about some hardcoded path, the fix is ugly but it works:

> sudo su

>mount -o rw,remount /
>mkdir -p /home/builder/.termux-build/_cache/18-arm-21-v2/bin/

>ln -s which pkg-config /home/builder/.termux-build/_cache/18-arm-21-v2/bin/arm-linux-androideabi-pkg-config

πŸ¦‘ TESTED BY UNDERCODE :

> ubuntu

> Termux

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘TYPES OF PROXY BEST TYPES :

You’ll find a variety of proxies on our list. Here’s what they mean:

1) SOCKS 4
SOCKet Secure Internet protocol, routing network packets between a client and server through a proxy server. Only supports TCP application.

2) SOCKS 5
SOCKet Secure Internet protocol, routing network packets between a client and server through a proxy server. Supports TCP, IPv6 and UDP (for DNS lookups). Provides authentication so only authorized users can access a server.

3) https (SSL)
Use this option to access website URLs that start with https, and to enable SSL debugging. These use encrypted connections between servers and visitors. The proxy will dynamically create an SSL certificate for you.
HTTP

Acts as HTTP client and server. This routes client requests from a web browser to the internet, caching (for increased speed) while keeping you anonymous.

4) Google proxy
These proxies are not blocking access to Google.com search.

πŸ¦‘ LEVELS OF ANONYMITY

1) These are usually divided into 3 categories. These are based on levels of anonymity, depending on how much information is sent to the server:

2) Transparent (level 3)
The lowest level of anonymity. Your IP address is hidden from the websites you access. However, these proxies cache the website pages you visit. This makes web access faster… but it also means your IP can be found on the server. People often choose this option when their goal is to visit blocked websites, bypass firewalls or download from file hosting sites – rather than hide identity.

3) Anonymous (level 2)
Medium anonymity, suitable for most internet activities. Your IP address stays hidden from the proxy server, and nobody can establish a connection with your PC. However, the server records your connection as behind a proxy, even though it can’t pinpoint your location. Connection speed is average.

4) Elite (level 1)
The highest level of anonymity, but also the slowest connection. The server you connect to doesn’t know you’re using a proxy, and it behaves as though the IP address you provide is your β€œreal” IP.


πŸ¦‘ ALTERNATIVES FOR ANONYMOUS BROWSING 2020 :

1) Hidester VPN
Our Virtual Private Network (VPN) encrypts all your online activity, so you stay anonymous. Our private servers keeps no logs, so there’s no record of the websites you visit or the applications you use. You can download the VPN App in one click.

1) Hidester web proxy
Enjoy easy, fast and free access to blocked websites. Our web proxy is browser-based, so you can go online from any device, anywhere in the world. Plus you get automatic SSL security for extra protection!

@undercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘PREM PROXIES FOR FREE
> IP address Port Protocol Country Region City Anonymity Speed Uptime Response Last checked
instagram.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) 134.209.44.228 80 HTTP
United States United States
Massachusetts Mansfield Anonymous 7077 kB/s
72%
53 ms
7 hours ago


2) 165.227.77.10 3128 HTTP
United States United States
New Jersey Clifton Anonymous 6623 kB/s
100%
52 ms
6 hours ago

3) 206.189.194.4 80 HTTP
United States United States
California Alameda Anonymous 6575 kB/s
100%
51 ms
7 hours ago


4) 167.172.23.177 3128 HTTP
United Kingdom United Kingdom
Hertford Stevenage Anonymous 6355 kB/s
33.3%
52 ms
4 hours ago


5) 198.50.177.44 44699 SOCKS4
Canada Canada
Quebec MontrΓ©al High anonymity 6190 kB/s
75%
3 ms
5 hours ago


6) 142.93.57.37 80 HTTP
Canada Canada
Ontario Toronto High anonymity 5922 kB/s
99.7%
51 ms
6 hours ago


7) 174.138.54.49 1080 SOCKS5
United States United States
New Jersey Clifton High anonymity 5803 kB/s
99.9%
61 ms
7 hours ago


8) 167.71.183.113 8888 HTTPS
United States United States
New York New York Transparent 5458 kB/s
66.7%
552 ms
8 hours ago

9) 138.197.32.120 3128 HTTPS
United States United States
New Jersey Clifton Transparent 5424 kB/s
18.1%
74 ms
8 hours ago

10) 54.156.164.61 80 HTTP
United States United States
Virginia Ashburn High anonymity 5410 kB/s
92.2%
85 ms
6 hours ago

11) 8.9.15.11 8080 HTTPS
United States United States
Illinois Chicago Transparent 4350 kB/s
84.2%
130 ms
5 hours ago

12) 67.205.149.230 1080 SOCKS5
United States United States
New Jersey North Bergen High anonymity 4225 kB/s
99.1%
59 ms
5 hours ago

13) 168.169.146.12 8080 HTTP
United States United States
New York Buffalo Transparent 2783 kB/s
50.1%
315 ms
3 hours ago

14) 138.197.145.103 1080 SOCKS5
Canada Canada
Ontario Toronto High anonymity 2768 kB/s
99.9%
48 ms
8 hours ago


15) 155.138.148.76 8080 HTTPS
United States United States
Michigan University Center Transparent 2405 kB/s
92.3%
195 ms
7 hours ago

16) 70.165.64.33 48678 HTTP
United States United States
Virginia Virginia Beach Transparent 2357 kB/s
70.5%
5982 ms
7 hours ago

17) 138.197.157.60 1080 SOCKS5
Canada Canada
Ontario Toronto High anonymity 2289 kB/s
98.5%
47 ms
8 hours ago

18) 64.235.204.107 8080 HTTPS
Canada Canada
Ontario Cornwall Anonymous 2215 kB/s
99.3%
44 ms
6 hours ago

19) 67.205.132.241 1080 SOCKS5
United States United States
New Jersey North Bergen High anonymity 2201 kB/s
98.6%
59 ms
6 hours ago

20) 206.71.228.129 8841 SOCKS4
United States United States
New York New York High anonymity 2185 kB/s
88.5%
150 ms
6 hours ago

21) 206.71.228.193 8841 SOCKS4
United States United States
New York New York High anonymity 2152 kB/s
85.9%
31148 ms
2 hours ago

22) 159.203.91.6 1080 SOCKS5
United States United States
New Jersey Clifton High anonymity 2000 kB/s
99%
72 ms
9 hours ago

23) 52.179.231.206 80 HTTP
United States United States
Virginia Boydton High anonymity 1874 kB/s
100%
245 ms
6 hours ago

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ brute force directories and files in websites 2020 updated topic:
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) git clone https://github.com/maurosoria/dirsearch.git

2) cd dirsearch

3) python3 dirsearch.py -u <URL> -e <EXTENSION>

4) Options:
-h, --help show this help message and exit

Mandatory:
-u URL, --url=URL URL target
-L URLLIST, --url-list=URLLIST
URL list target
-e EXTENSIONS, --extensions=EXTENSIONS
Extension list separated by comma (Example: php,asp)
-E, --extensions-list
Use predefined list of common extensions

Dictionary Settings:
-w WORDLIST, --wordlist=WORDLIST
-l, --lowercase
-f, --force-extensions
Force extensions for every wordlist entry (like in
DirBuster)
πŸ¦‘Features :

> Multithreaded

>Keep alive connections

>Support for multiple extensions (-e|--extensions asp,php)

>Reporting (plain text, JSON)

>Heuristically detects invalid web pages

>Recursive brute forcing

>HTTP proxy support

>User agent randomization

>Batch processing

>Request delaying

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ NETFLIX 2020 FREE UNLIMED MOD:

> https://moddroid.com/netflix-7-49-0.html?download (SPIDER SERVER)

> https://www.mediafire.com/file/jcv654rlqfn3rjm/Netflix-Premium-mod-2-v7.44.0.apk/file

> https://www.mediafire.com/file/9rxr54qfujzow6q/Netflix-mod-v7.48.0.apk/file

πŸ¦‘ Spootify 2020 mod

https://apkmody.io/apps/spotify-premium-apk.html?download

https://apkfolks.com/go/spotifymod/

πŸ¦‘ Nord vpn new accounts 100% tested :

john.rink56@yahoo.com:Football56
marinushove@hotmail.com:Kasperkat20
tonymiller750@gmail.com:Subaru90
thinkfirst@live.com:25Isaac25
hacimelih75@gmail.com:Delideli18
trym_96_96@hotmail.com:90669688
jasongarland8x8@gmail.com:jasonstar3
ginaper94@yahoo.com:Texas1993
markataylor86@gmail.com:Alfie2009
ericlevesque559@gmail.com:El908301
goreflex22@gmail.com:lolapa22
sullyjrsworld@comcast.net:Sully1212
chandiragardiyehewa@yahoo.com:UQMed123
tsherman219@gmail.com:tristan123
1981przemko@gmail.com:Jolusia27
gv3gg13@gmail.com:Panchovanilla1
shkrevans@gmail.com:shakir98
phlppjnz@gmail.com:Jobro500
MattBreland@gmail.com:redwall1
arazukie@gmail.com:Poopface12
anthonyamigon05@gmail.com:1Antysecas
sanchezfranklin005@gmail.com:Jamuel1205
Brandon10161996@gmail.com:Jennifer12

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ ways to make money with cryptocurrencies in 2020 :
fb.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Purchase and storage of cryptocurrencies
>The most simple and reliable way to make money on cryptocurrencies is to buy and store in the hope of increasing the rate of the selected coins. Cryptocurrencies like

Bitcoin
Ethereum
Binance
Nexo
Tezos
Monero etc.
>Most often they are a fairly reliable investment. You can buy and store them for a long time, because their value in real money like the dollar and the euro is growing. This is not to say that this is serious investment advice. Rather, this is an example of how you can enter the cryptocurrency market.

2) Cryptocurrency Stacking
Stacking is a round-the-clock storage of cryptocurrency in a wallet. You get extra coins as a reward for this storage and maintenance of the blockchain network. In this segment, you should pay attention to the following cryptocurrencies:

Tezos (XTZ)
Neblio
Komodo
PIVX
Decred
NAV Coin
Tezos is the most popular and well-funded coin, with a margin of 6% per year.

3) Another smart way to make money on cryptocurrencies is to buy and store, for which you will receive dividends. There are many excellent cryptocurrencies that will pay only for the fact that you own them. It does not even require stacking, holding coins in an online wallet. Among these cryptocurrencies are the following:

NEO
Btmx
KuCoin

4) Launch cryptocurrency masternodes to generate passive income. A masternode is a complete cryptocurrency node or wallet on a computer where a real copy of the blockchain is stored in real time, how the complete nodes of bitcoin are stored . This computer allows you to perform certain tasks.

For the performance of such tasks on a network of different cryptocurrencies, the masternode owners are paid. However, to start a masternode, you must be the owner of a certain number of coins in this currency. This amount is different for different cryptocurrencies, but usually from 1000 to 25000 coins.

Among these cryptocurrencies are:

Dash
PIVX

5) Micro-tasks for cryptocurrencies
If you have extra time, you can perform micro-tasks for customers or some services and make money on this cryptocurrency. It can be tasks like downloading new applications for testing, watching videos, conducting online surveys, etc. Among the servers with such micro-tasks can be called:

Bituro
Coinbucks
These services pay in different currencies, such as Bitcoin, Dogecoin and others.

6) Work for cryptocurrency
If you are a developer or tester, writer or designer, you can get paid for your work in cryptocurrencies.

There are many platforms and websites that offer bitcoins in exchange for services:

Cointiply
Jobs4bitcoins
XBTFreelancer
Coinworker
Angle.Co
21.co
So you will not only earn cryptocurrency, but also be able to profit in the future if their rate grows. You can select the following cryptocurrencies:

Bitcoin
Litecoin
Ethereum
Monero

7) Arbitration of cryptocurrencies


The cryptocurrency market is free, over which there is no control from the governments of different countries. That is why the rate of one cryptocurrency on different exchanges can be very different.

Another way to earn money is to buy on one exchange at a lower price and sell on another exchange at a higher price. This is called arbitration.

The range of the course can be 5-40% and you can make money on it. Exchanges like Bittrex and Poloniex provide this opportunity.

Written by Undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Fastest way to crack password-protected Microsoft Office documents - doc files and Excel spreadsheets
t.me/undercodeTesting

1) Microsoft Office files are password protected to prevent tampering and data integrity. But the protected documents of earlier versions of the Office are vulnerable to extracting their hashes with a simple program called office2john. The hashes thus obtained can be cracked using John the Ripper and Hashcat.

> It takes just a couple of seconds to extract the hash from the password-protected Microsoft Office file using office2john . Despite the fact that the encryption standards in various Office products have changed over the years, none of them can resist the extraction of hashes using office2john.
> This utility is written in Python and can be run directly from the terminal. As for compatibility with Office files, it is known that office2john works with any password-protected Word, Excel, PowerPoint, OneNote, Project, Access, and Outlook files created in Office 97, Office 2000, Office XP, Office 2003, Office 2007, Office 2010 and Office 2013, including versions of Office for Mac. It may not work with newer versions of Office, but we saved the .docx file in Office 2016 by marking it as an Office 2013 file.

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Install Office2John
First, we need to download this utility from GitHub, since office2john is not included in the standard version of John the Ripper (which must already be installed on your Kali system). You can download it using wget.

wget https://raw.githubusercontent.com/magnumripper/JohnTheRipper/bleeding-jumbo/run/office2john.py

2) - https://raw.githubusercontent.com/magnumripper/JohnTheRipper/bleeding-jumbo/run/office2john.py
Resolving raw.githubusercontent.com (raw.githubusercontent.com)... 151.101.148.133
Connecting to raw.githubusercontent.com (raw.githubusercontent.com)|151.101.148.133|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 131690 (129K) [text/plain]
Saving to: β€˜office2john.py’

office2john.py 100%[=======================================================================>] 128.60K --.-KB/s in 0.09s

> (1.45 MB/s) - β€˜office2john.py’ saved [131690/131690]

2) Make sure everything is in the same directory
To start office2john using Python, we need to go to the directory in which it was installed. By default, for most of you, this will be the Home directory (just type cd in the console), but you can create any other directory.

3) For our tests you will need a suitable file. We will use a simple .docx file called β€œdummy.docx”, which we created using Word 2007 and password protected it. Download it to have something to work with. The password for the file is β€œpassword123”, however, you will recognize it already. You can also download documents created in Word 2010 and (which appears to be created in Word 2013). The password for them is the same - β€œpassword123”.

4) Get the hash using Office2john
The first thing to do is to extract the hash of our secure Office file. Run the following command and write the output to the hash.txt file, which we will use a little later.

5) python office2john.py dummy.docx > hash.txt
To verify that the hash was successfully retrieved, use the cat command. We see that the saved hash corresponds to Microsoft Office 2007. Great!

cat hash.txt
dummy.docx:$office$*20*128*16*a7c7a4eadc2d90fb22c073c6324b6b49*abc5f80409f5f96f97e184e44aacd0b7*930b0c48a7eb5e13a57af4f3030b48e9402b6870

5) Hack the hash you just saved
We show two ways to crack the hash of the protected Microsoft Office file that you just saved. Both methods work great, so choose the one you like best.

Option 1: Hack with John the Reaper
Set the –wordlist flag and pass the path to your favorite wordlist into it. The wordlist that is included in Nmap is perfect for our purposes, but for more complex passwords you should use a more detailed wordlist.
john --wordlist=/usr/share/wordlists/nmap.lst hash.txt
Using default input encoding: UTF-8
Loaded 1 password hash (Office, 2007/2010/2013 [SHA1 128/128 SSE2 4x / SHA512 128/128 SSE2 2x AES])
Cost 1 (MS Office version) is 2007 for all loaded hashes
Cost 2 (iteration count) is 50000 for all loaded hashes
Will run 4 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
John will begin to crack, and depending on the complexity of the password, he will finish work when he finds a match. To view the current status of the process, press any key. When the hash is cracked, a message with the password from the document will appear on the screen. Since our password was very simple, it took only a few seconds to crack it.

password123 (dummy.docx)
1g 0:00:00:03 DONE (2019-02-05 15:00) 0.2824g/s 415.8p/s 415.8c/s 415.8C/s lacoste..cooldude
Use the "--show" option to display all of the cracked passwords reliably
Session completed

Written by Undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ LAST 24H TUTORIALS :

>VIRTUAL PHONE NUMBERS

> Java 14 is coming, why are so many people sticking to Java 8?

> How to maintain complete anonymity on the Internet

> 2020 updated wifihacking TERMUX-ANY LINUX :
> knife for 802.11, BLE and Ethernet networks reconnaissance and MITM attacks.

> TYPES OF PROXY BEST TYPES :

> LEVELS OF ANONYMITY

> PREM PROXIES FOR FREE
> IP address Port Protocol Country Region City Anonymity Speed Uptime Response Last checked

> brute force directories and files in websites 2020 updated topic

> NETFLIX 2020 FREE UNLIMED MOD
> Spootify 2020 mod

> Nord vpn new accounts 100% tested

> ways to make money with cryptocurrencies in 2020

> Fastest way to crack password-protected Microsoft Office documents - doc files and Excel spreadsheets

well free tutorials written by our bot in 4 minutes> helps for days enjoy
& like us @undercodeTesting

Written by Undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Top Spyware -virus 2020 at git - download :
instagram.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) NGINUX hack 1,4 k stars

> https://github.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker

> tested

2) Fake News and Click Bait List 511 stars

> https://github.com/EnergizedProtection/block

> tested by undercode

3) Spyware Generator for Windows systems written in Java. [Discontinued]
413 Stars
>https://github.com/tiagorlampert/sAINT


4) Torjan
>https://github.com/MinhasKamal/TrojanCockroach
>320 stars

Written by Undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Popular methodes for hack proxies servers :
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) This path is the most widespread. Some fresh email Trojan is taken - for example, the latest version of Naebi Soseda, Stealth, Shtirliz, Hooker, GIP (work under 95/98 / NT).

>Using Microangelo98, it changes the icon to the icon from the image file (or any other one at your discretion), and the trojan server after all the manipulations is renamed to something like "photo.jpg (a lot of spaces) .exe".

> When transferring a file via ICQ, only the beginning of the name will be visible, and the victim will not suspect anything until he clicks on "open". But then it will be too late. Usually the file is transferred under the guise of a photograph after a short conversation with the victim. See also the Trojan FAQ on our website.

2) If you have an idea of ​​the protocols by which the ICQ client registers with the server every time you connect to the network, you can take the password directly from the intercepted network traffic. Various methods can be used for such an interception. If the UIN owner is on your local network,@ undercodetesting you can use the sniffer.

> If not, try to make it run on your computer a .reg file containing (in addition to useful actions, such as optimizing the Windows file system) the lines: [HKEY_CURRENT_USERSoftwareMirabilisICQDefaultPrefs] "Default Server Host" = "Name or ip address of your server" On this server, you will need to extract from the traffic all the information you need, and then redirect it to icq.mirabilis.com. The same thing can be done using a "fake" proxy server. By the way, on many hacker sites now you can find lists of anonymous proxy servers.

> Many users, wanting to hide their ip, use their services, not suspecting that some of these servers belong to very curious owners, or even special services of some countries. The reason for the interest of special services is simple: since a person wants anonymity, then he has something to hide. And you do not need to install expensive equipment at all Internet providers, as they are trying to do now in Russia. It is enough to control several dozen "anonymous" proxies - and the "client" will give itself away! Moreover, it is absolutely impossible to calculate such an β€œeavesdropping” - after all, the proxy looks absolutely reliable and anonymous. In principle, he is anonymous. For almost everyone. Except the owner. Not the one listed in the WhoIs database,


3) Remote access to a computer. This method implies some communication skills with programs and methods that provide remote access to a computer on which ICQ with the number you are interested in is installed. Typically, the Trojan horses Back Orifice, NetBus, Sub7, etc. are used for these purposes. But they are too widespread and are now detected by antiviruses. So look for the less common. In addition, it is possible to remotely connect to the victim's computer via port 139 via the NetBIOS protocol. Very often, the resources available through this port do not have a password at all, and if this password is present, selecting it is much faster and more convenient than, for example, the ICQ registration password. There are a huge number of specialized programs for this, the most popular is Legion. You only need to get ICQ system files. Namely: "number_asi.dat and number_asi.idx" from the directory "crogram filesicqdb". This is if Asya is installed in the default directory. The rest of the files for this UIN can be fabricated from similar files of any other number. After that, correctly changing the information in the system registry, you can connect under this number.
4) Is it possible to change the password of someone else's ICQ account without gaining access to the computer of its owner? At one time, in the days of icq98, it was possible. There was a program for hacking ICQ called "ICQhijeck" (or "ICQhijeek"). If there was an IP of the victim, his UINa and port number for communication with the client, ICQhijeck sent a spoofed packet stating that the packet belongs to the client itself and carries with it the task of changing the password. Password selected forward. In the end, Mirabilis removed this bug, but suddenly you are lucky and you will find a user who has not updated his ICQ client in the last two years ...

5) Another old vulnerability was that when ICQ homepage was activated, it was possible to access local files using the directory path back. Starting with the 99th version, ICQ provides users with a new, quite convenient and easy to implement opportunity - to create a small personal web server. At the same time, the user is required a minimum of effort - just select in the menu Services -> My ICQ Page -> Activate Homepage. This opens access to the virtual server, which by default is located on port 80 of the user's computer. Moreover, this server, without any configuration, is able to perform most of the functions necessary for a typical home page. And everything would be fine, if not one: in earlier versions of icq it was possible to access any file on the user's computer using addresses of the form: http: //current.ip. user.address ...... / config.sys. Generally speaking, the return path is one of the most common http server errors. Almost all known web servers had this or that version of this error in their earlier versions, and ICQ was no exception. Only since version 3.19 was this hole closed and access to user files and access to such addresses led to the standard 403 Forbidden error. However, users with older versions of ICQ can still be found online. accessing such addresses began to lead to the standard 403 Forbidden error. However, users with older versions of ICQ can still be found online. accessing such addresses began to lead to the standard 403 Forbidden error. However, users with older versions of ICQ can still be found online.

6) If you have direct access to the computer on which you are interested in (or any other information you need), simply bring it to a diskette and install a keylogger, for example SAM 007, when the victim will not see. You can find out what, where and when was typed on the keyboard. You will have all the information you are interested in.

7) In the end, ICQ UIN can just be bought. At the same time, your conscience will be almost clean - you can sincerely convince yourself that the number you bought from the very beginning belonged to the seller and is not stolen. True, in this case, you should always be prepared for the fact that one day the legal owner of your "new" UINa will appear, and the money paid for it will be thrown into the wind. And no one will give you a guarantee that after a successfully completed transaction, the UIN will not be stolen again, this time from you.

Written by Undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ¦‘Wich One you think more safe :
Anonymous Poll
48%
Premium Proxies ?
52%
Trusted VPN Provider ?
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to Root any Xiaomi Device without PC
twitter.com/undercodeNews


1) Prerequisites before you Root Any Xiaomi Phone Without Using Computer

2) Before going forward please follow all the pre-requirements below to complete the rooting process on any Xioami device.

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Make sure you have Enabled USB Debugging on your Xiaomi device from the developer options.

2) Make Sure you have at least 65% of battery on your mobile device.

3) Don’t forget to take a complete back up of your device.

4)Now download and install the latest version of Kingoroot on your device From kingoroot.com

5) Now download and install the latest version of Root Checker Android Application on your Device From Google PlayStore. This

6) App will help you to check whether your phone is rooted or not.

7) Make sure that you have Good Internet Connection on your device. If you don’t have a Good internet connection then this tutorial will not work on your Xiaomi Device.

πŸ¦‘ How to Root your Xiaomi Smartphone Easily Without PC :

1) Since you have made sure that all the conditions given in the Prerequisites are fulfilled, you can now go and open the Kingoroot App.

2) In the Kingoroot App press the β€œTry to Root” button which will start the process of rooting your device. Wait for this process to complete.

3) After that just go to the root checker app that we installed earlier and press the option which says β€œCheck for Root”, this will give you a root access dialog box, give Root Checker the root permission and you will see that your device is successfully rooted!



by<Mod Edit-XDA DEVE > Undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Facebook Likers apps- Sites list 2020 :
fb.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

https://apkpure.com/get-instant-likes/socials.com.application/download?from=details

http://mylikelo.com/

http://mylikelo.com/

https://swipa.me/

http://myfbliker.com/

https://wefbee.com/autoliker

http://mg-likers.com/

http://hublaa.me/

http://machineliker.com/

https://apkpure.com/social-liker/com.hill.socialliker

https://apkpure.com/king-auto-liker/com.king.autoliker

@undercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Millions of netflix accounts hacked this month :
Recently frm undercode Tweets


1) Unsubscribed Netflix users complain about hacking accounts - hackers use their data to resell a subscription
Attackers re-subscribe to inactive accounts, and then sell it cheaper on eBay.

2) Some Netflix users who unsubscribed from the video service complained on Twitter that their accounts were re-activated a few months later and that the money for the subscription was debited from their bank cards. At the same time, users could not log into their accounts - email and password did not fit.

3) According to the BBC, cybercriminals hack into the accounts of former Netflix users and restore the subscription without even knowing the details of bank cards. This is possible because Netflix stores customer data for ten months - if the user changes his mind, he can easily subscribe again.

4) According to the publication, after reactivating the account, the attackers change the account information and resell the eBay subscription - for example, a Premium subscription for a month costs $ 4.99. On Netflix, the price is € 11.99. How many users were affected are not reported.

5) Netflix told the publication that they delete account information after canceling a subscription at the user's request. The company added that account security is a priority of the service, and if users notice unusual activity, they should contact support. EBay said it will remove ads for the sale of subscriptions.

@undercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁#