UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.9K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Fastest way to crack password-protected Microsoft Office documents - doc files and Excel spreadsheets
t.me/undercodeTesting

1) Microsoft Office files are password protected to prevent tampering and data integrity. But the protected documents of earlier versions of the Office are vulnerable to extracting their hashes with a simple program called office2john. The hashes thus obtained can be cracked using John the Ripper and Hashcat.

> It takes just a couple of seconds to extract the hash from the password-protected Microsoft Office file using office2john . Despite the fact that the encryption standards in various Office products have changed over the years, none of them can resist the extraction of hashes using office2john.
> This utility is written in Python and can be run directly from the terminal. As for compatibility with Office files, it is known that office2john works with any password-protected Word, Excel, PowerPoint, OneNote, Project, Access, and Outlook files created in Office 97, Office 2000, Office XP, Office 2003, Office 2007, Office 2010 and Office 2013, including versions of Office for Mac. It may not work with newer versions of Office, but we saved the .docx file in Office 2016 by marking it as an Office 2013 file.

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Install Office2John
First, we need to download this utility from GitHub, since office2john is not included in the standard version of John the Ripper (which must already be installed on your Kali system). You can download it using wget.

wget https://raw.githubusercontent.com/magnumripper/JohnTheRipper/bleeding-jumbo/run/office2john.py

2) - https://raw.githubusercontent.com/magnumripper/JohnTheRipper/bleeding-jumbo/run/office2john.py
Resolving raw.githubusercontent.com (raw.githubusercontent.com)... 151.101.148.133
Connecting to raw.githubusercontent.com (raw.githubusercontent.com)|151.101.148.133|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 131690 (129K) [text/plain]
Saving to: β€˜office2john.py’

office2john.py 100%[=======================================================================>] 128.60K --.-KB/s in 0.09s

> (1.45 MB/s) - β€˜office2john.py’ saved [131690/131690]

2) Make sure everything is in the same directory
To start office2john using Python, we need to go to the directory in which it was installed. By default, for most of you, this will be the Home directory (just type cd in the console), but you can create any other directory.

3) For our tests you will need a suitable file. We will use a simple .docx file called β€œdummy.docx”, which we created using Word 2007 and password protected it. Download it to have something to work with. The password for the file is β€œpassword123”, however, you will recognize it already. You can also download documents created in Word 2010 and (which appears to be created in Word 2013). The password for them is the same - β€œpassword123”.

4) Get the hash using Office2john
The first thing to do is to extract the hash of our secure Office file. Run the following command and write the output to the hash.txt file, which we will use a little later.

5) python office2john.py dummy.docx > hash.txt
To verify that the hash was successfully retrieved, use the cat command. We see that the saved hash corresponds to Microsoft Office 2007. Great!

cat hash.txt
dummy.docx:$office$*20*128*16*a7c7a4eadc2d90fb22c073c6324b6b49*abc5f80409f5f96f97e184e44aacd0b7*930b0c48a7eb5e13a57af4f3030b48e9402b6870

5) Hack the hash you just saved
We show two ways to crack the hash of the protected Microsoft Office file that you just saved. Both methods work great, so choose the one you like best.

Option 1: Hack with John the Reaper
Set the –wordlist flag and pass the path to your favorite wordlist into it. The wordlist that is included in Nmap is perfect for our purposes, but for more complex passwords you should use a more detailed wordlist.
john --wordlist=/usr/share/wordlists/nmap.lst hash.txt
Using default input encoding: UTF-8
Loaded 1 password hash (Office, 2007/2010/2013 [SHA1 128/128 SSE2 4x / SHA512 128/128 SSE2 2x AES])
Cost 1 (MS Office version) is 2007 for all loaded hashes
Cost 2 (iteration count) is 50000 for all loaded hashes
Will run 4 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
John will begin to crack, and depending on the complexity of the password, he will finish work when he finds a match. To view the current status of the process, press any key. When the hash is cracked, a message with the password from the document will appear on the screen. Since our password was very simple, it took only a few seconds to crack it.

password123 (dummy.docx)
1g 0:00:00:03 DONE (2019-02-05 15:00) 0.2824g/s 415.8p/s 415.8c/s 415.8C/s lacoste..cooldude
Use the "--show" option to display all of the cracked passwords reliably
Session completed

Written by Undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ LAST 24H TUTORIALS :

>VIRTUAL PHONE NUMBERS

> Java 14 is coming, why are so many people sticking to Java 8?

> How to maintain complete anonymity on the Internet

> 2020 updated wifihacking TERMUX-ANY LINUX :
> knife for 802.11, BLE and Ethernet networks reconnaissance and MITM attacks.

> TYPES OF PROXY BEST TYPES :

> LEVELS OF ANONYMITY

> PREM PROXIES FOR FREE
> IP address Port Protocol Country Region City Anonymity Speed Uptime Response Last checked

> brute force directories and files in websites 2020 updated topic

> NETFLIX 2020 FREE UNLIMED MOD
> Spootify 2020 mod

> Nord vpn new accounts 100% tested

> ways to make money with cryptocurrencies in 2020

> Fastest way to crack password-protected Microsoft Office documents - doc files and Excel spreadsheets

well free tutorials written by our bot in 4 minutes> helps for days enjoy
& like us @undercodeTesting

Written by Undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Top Spyware -virus 2020 at git - download :
instagram.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) NGINUX hack 1,4 k stars

> https://github.com/mitchellkrogza/nginx-ultimate-bad-bot-blocker

> tested

2) Fake News and Click Bait List 511 stars

> https://github.com/EnergizedProtection/block

> tested by undercode

3) Spyware Generator for Windows systems written in Java. [Discontinued]
413 Stars
>https://github.com/tiagorlampert/sAINT


4) Torjan
>https://github.com/MinhasKamal/TrojanCockroach
>320 stars

Written by Undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Popular methodes for hack proxies servers :
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) This path is the most widespread. Some fresh email Trojan is taken - for example, the latest version of Naebi Soseda, Stealth, Shtirliz, Hooker, GIP (work under 95/98 / NT).

>Using Microangelo98, it changes the icon to the icon from the image file (or any other one at your discretion), and the trojan server after all the manipulations is renamed to something like "photo.jpg (a lot of spaces) .exe".

> When transferring a file via ICQ, only the beginning of the name will be visible, and the victim will not suspect anything until he clicks on "open". But then it will be too late. Usually the file is transferred under the guise of a photograph after a short conversation with the victim. See also the Trojan FAQ on our website.

2) If you have an idea of ​​the protocols by which the ICQ client registers with the server every time you connect to the network, you can take the password directly from the intercepted network traffic. Various methods can be used for such an interception. If the UIN owner is on your local network,@ undercodetesting you can use the sniffer.

> If not, try to make it run on your computer a .reg file containing (in addition to useful actions, such as optimizing the Windows file system) the lines: [HKEY_CURRENT_USERSoftwareMirabilisICQDefaultPrefs] "Default Server Host" = "Name or ip address of your server" On this server, you will need to extract from the traffic all the information you need, and then redirect it to icq.mirabilis.com. The same thing can be done using a "fake" proxy server. By the way, on many hacker sites now you can find lists of anonymous proxy servers.

> Many users, wanting to hide their ip, use their services, not suspecting that some of these servers belong to very curious owners, or even special services of some countries. The reason for the interest of special services is simple: since a person wants anonymity, then he has something to hide. And you do not need to install expensive equipment at all Internet providers, as they are trying to do now in Russia. It is enough to control several dozen "anonymous" proxies - and the "client" will give itself away! Moreover, it is absolutely impossible to calculate such an β€œeavesdropping” - after all, the proxy looks absolutely reliable and anonymous. In principle, he is anonymous. For almost everyone. Except the owner. Not the one listed in the WhoIs database,


3) Remote access to a computer. This method implies some communication skills with programs and methods that provide remote access to a computer on which ICQ with the number you are interested in is installed. Typically, the Trojan horses Back Orifice, NetBus, Sub7, etc. are used for these purposes. But they are too widespread and are now detected by antiviruses. So look for the less common. In addition, it is possible to remotely connect to the victim's computer via port 139 via the NetBIOS protocol. Very often, the resources available through this port do not have a password at all, and if this password is present, selecting it is much faster and more convenient than, for example, the ICQ registration password. There are a huge number of specialized programs for this, the most popular is Legion. You only need to get ICQ system files. Namely: "number_asi.dat and number_asi.idx" from the directory "crogram filesicqdb". This is if Asya is installed in the default directory. The rest of the files for this UIN can be fabricated from similar files of any other number. After that, correctly changing the information in the system registry, you can connect under this number.
4) Is it possible to change the password of someone else's ICQ account without gaining access to the computer of its owner? At one time, in the days of icq98, it was possible. There was a program for hacking ICQ called "ICQhijeck" (or "ICQhijeek"). If there was an IP of the victim, his UINa and port number for communication with the client, ICQhijeck sent a spoofed packet stating that the packet belongs to the client itself and carries with it the task of changing the password. Password selected forward. In the end, Mirabilis removed this bug, but suddenly you are lucky and you will find a user who has not updated his ICQ client in the last two years ...

5) Another old vulnerability was that when ICQ homepage was activated, it was possible to access local files using the directory path back. Starting with the 99th version, ICQ provides users with a new, quite convenient and easy to implement opportunity - to create a small personal web server. At the same time, the user is required a minimum of effort - just select in the menu Services -> My ICQ Page -> Activate Homepage. This opens access to the virtual server, which by default is located on port 80 of the user's computer. Moreover, this server, without any configuration, is able to perform most of the functions necessary for a typical home page. And everything would be fine, if not one: in earlier versions of icq it was possible to access any file on the user's computer using addresses of the form: http: //current.ip. user.address ...... / config.sys. Generally speaking, the return path is one of the most common http server errors. Almost all known web servers had this or that version of this error in their earlier versions, and ICQ was no exception. Only since version 3.19 was this hole closed and access to user files and access to such addresses led to the standard 403 Forbidden error. However, users with older versions of ICQ can still be found online. accessing such addresses began to lead to the standard 403 Forbidden error. However, users with older versions of ICQ can still be found online. accessing such addresses began to lead to the standard 403 Forbidden error. However, users with older versions of ICQ can still be found online.

6) If you have direct access to the computer on which you are interested in (or any other information you need), simply bring it to a diskette and install a keylogger, for example SAM 007, when the victim will not see. You can find out what, where and when was typed on the keyboard. You will have all the information you are interested in.

7) In the end, ICQ UIN can just be bought. At the same time, your conscience will be almost clean - you can sincerely convince yourself that the number you bought from the very beginning belonged to the seller and is not stolen. True, in this case, you should always be prepared for the fact that one day the legal owner of your "new" UINa will appear, and the money paid for it will be thrown into the wind. And no one will give you a guarantee that after a successfully completed transaction, the UIN will not be stolen again, this time from you.

Written by Undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ¦‘Wich One you think more safe :
Anonymous Poll
48%
Premium Proxies ?
52%
Trusted VPN Provider ?
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to Root any Xiaomi Device without PC
twitter.com/undercodeNews


1) Prerequisites before you Root Any Xiaomi Phone Without Using Computer

2) Before going forward please follow all the pre-requirements below to complete the rooting process on any Xioami device.

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Make sure you have Enabled USB Debugging on your Xiaomi device from the developer options.

2) Make Sure you have at least 65% of battery on your mobile device.

3) Don’t forget to take a complete back up of your device.

4)Now download and install the latest version of Kingoroot on your device From kingoroot.com

5) Now download and install the latest version of Root Checker Android Application on your Device From Google PlayStore. This

6) App will help you to check whether your phone is rooted or not.

7) Make sure that you have Good Internet Connection on your device. If you don’t have a Good internet connection then this tutorial will not work on your Xiaomi Device.

πŸ¦‘ How to Root your Xiaomi Smartphone Easily Without PC :

1) Since you have made sure that all the conditions given in the Prerequisites are fulfilled, you can now go and open the Kingoroot App.

2) In the Kingoroot App press the β€œTry to Root” button which will start the process of rooting your device. Wait for this process to complete.

3) After that just go to the root checker app that we installed earlier and press the option which says β€œCheck for Root”, this will give you a root access dialog box, give Root Checker the root permission and you will see that your device is successfully rooted!



by<Mod Edit-XDA DEVE > Undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Facebook Likers apps- Sites list 2020 :
fb.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

https://apkpure.com/get-instant-likes/socials.com.application/download?from=details

http://mylikelo.com/

http://mylikelo.com/

https://swipa.me/

http://myfbliker.com/

https://wefbee.com/autoliker

http://mg-likers.com/

http://hublaa.me/

http://machineliker.com/

https://apkpure.com/social-liker/com.hill.socialliker

https://apkpure.com/king-auto-liker/com.king.autoliker

@undercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Millions of netflix accounts hacked this month :
Recently frm undercode Tweets


1) Unsubscribed Netflix users complain about hacking accounts - hackers use their data to resell a subscription
Attackers re-subscribe to inactive accounts, and then sell it cheaper on eBay.

2) Some Netflix users who unsubscribed from the video service complained on Twitter that their accounts were re-activated a few months later and that the money for the subscription was debited from their bank cards. At the same time, users could not log into their accounts - email and password did not fit.

3) According to the BBC, cybercriminals hack into the accounts of former Netflix users and restore the subscription without even knowing the details of bank cards. This is possible because Netflix stores customer data for ten months - if the user changes his mind, he can easily subscribe again.

4) According to the publication, after reactivating the account, the attackers change the account information and resell the eBay subscription - for example, a Premium subscription for a month costs $ 4.99. On Netflix, the price is € 11.99. How many users were affected are not reported.

5) Netflix told the publication that they delete account information after canceling a subscription at the user's request. The company added that account security is a priority of the service, and if users notice unusual activity, they should contact support. EBay said it will remove ads for the sale of subscriptions.

@undercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁#
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ HACK NETFLIX using cookies 2020 :
instagram.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Cookies are the saved data or information in the browser. This collected data includes credentials (Username & Passwords), form details, login information, and so on.

2) Now if you steal someone else’s cookies, then you don’t need any credentials for the account. The cookies will help you pass the security without any issues. The cookies do have expiry time. Some cookies last for a day and some for weeks.

3) This is far most the most straightforward method which requires no hacking, no virtual card or not even the real credit card to get Netflix premium account.

4) If you have a friend who has a Netflix subscription, then you have to copy his browser’s cookies and import them in your browser using any cookies importer extension like editthiscookie and reopen your browser.

5) Also, there are j2team cookies that seem to work better with .json format cookies. After that, Netflix Account will start directly without even asking for credentials.

6) Even if you don’t know anyone with Netflix Subscription, then use the web.

7) There are tons of cookies on the web; you can find them just by googling them on the internet. This way, you can hack Netflix without literally doing anything complex.

Step 1: Download Netflix cookies. Do confirm its legitimacy before downloading.

Step 2: Add the j2team cookies or editthiscookie extension in chrome

Step 3: Click on the extension and click on import cookies.

Always keep your device’s cookies safe, you never know.


Step 4: Select the cookies to import and click on save.

Step 5: Refresh and open Netflix you should be automatically logged in.

POwered by Wiki
@undercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Use Torrent to hack Netflix and watch Netflix premium shows.
Torrent is the number one source of all the premium shows all over the world. With the torrent website, you can just search using a torrent engine and find the series you need.
fb.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

Hackers hack Netflix and record their shows and upload it on torrent websites.

Step 1: Go to a torrent website like sky torrents and pirate bay. If you want movies then Yts is the perfect site for it.

Step 2: Download a torrent application like Utorrent or BitTorrent. Even a transmission is a good option, especially for Linux systems.

Step 3: Install the application and make sure it has access to the internet. Sometimes they are blocked by firewalls so be careful.

Step 4: Search the series you are looking to download. You can always try google search first rather than other search engines.

Step 5: Click on download or magnet link and the torrent will start downloading.

Step 6: Wait for the download to finish and enjoy the movies and series for free.

This is one of the most popular ways of getting access to premium Netflix movies and series without hacking Netflix account directly.

POwered by Wiki
@undercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘> Vim Editor and Shell Command Script learn to hack like expert
Vim editor mode switching method:
instagram.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Each time you run the Vim editor, the command mode is entered by default. At this time, you need to switch to the input mode before writing the document, and you need to return to the command mode after writing the document each time, and then enter the last line mode Save or exit the document.

2) In Vim, it is not possible to switch directly from input mode to last line mode. The built-in commands in the Vim editor have hundreds of thousands of usages. To help readers master the Vim editor faster, Table 4-1 summarizes some of the most commonly used commands in the command mode.

πŸ¦‘ Commonly used commands in Vim :

command effect
dd Delete (cut) the entire line under the cursor
5dd Delete (cut) 5 lines starting from the cursor
yy Copy the entire line where the cursor is
5yy Copy 5 lines starting at the cursor
n Display the next string located by the search command
N Display the previous string located by the search command
u Undo the previous step
p Paste the deleted (dd) or copied (yy) data behind the cursor
The last line mode is mainly used to save or exit files, and to set the working environment of the Vim editor. It also allows users to execute external Linux commands or jump to a specific number of lines in the written document. To switch to the last line mode, enter a colon in the command mode. The commands available in the last line mode are shown in Table 4-2.

πŸ¦‘ Commands available in the last line mode :

command effect
: w save
: q drop out
: q! Forced withdrawal (abandon the modification of the document)
: wq! Force save and exit
: set nu Show line number
: set nonu No line number
:command Execute the command
: Integer Jump to the line
: s / one / two Replace the first one of the current cursor line with two
: s / one / two / g Replace all one of the current cursor line with two
:% s / one / two / g Replace all one in the full text with two
? String Search the string from bottom to top in the text
/ String Search the string from top to bottom in the text

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Kaspersky Total Security License Key 2020 working 100% hurry up before they used :

MHE3X-TFXO7-PFZ2B-RJTC1-AUBT4


B3DFM-Q3KGA-UP7WG-X5SQ6-5GOLV


VYRVR-YHE4C-QQXMK-PVYJE-CSO9P


NBFFR5-VOIFS-NHRS4-SDVG9-XDVJ7


4CH4C-PPFDT-NFK4B-45R69-VT9SL
πŸ¦‘

KHYVD-TGXE3-LJUV7-VFXE4

WN2CH-P55VX-B53EK-UY222

NQJMW-GBXCX-HSJZ3-Z2ZQS


783RV-DQRXR-XXVM9-93HKM

@undercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘NORD VPN 100 % WORKING - again news accounts 90% accounts tested by undercode
instagram.com/undercodeTesting

nkatakura1@gmail.com:kata73247
cherise-mayte@hotmail.com:Lincoln1
lewisproctor7@gmail.com:rooney07
crow.stephen@gmail.com:savior11
wings_ting@hotmail.com:y0430232
nehmerabih@hotmail.com:03953538
kajcampbell@sbcglobal.net:kajl1040
Lucas@saugmann.dk:Farogmor123
kobilee98@hotmail.com:Delldell12
khatib_elboss1@hotmail.com:elhenry14
horsejay2003@gmail.com:Swimmer4
thecheeseapache@hotmail.com:79264833pc
treyturner74@gmail.com:Corvette14
adam_bonham4@hotmail.com:zero1644
berjali@gmail.com:maryama2011
spmantor@yahoo.com:spm060587
benedict3121@gmail.com:wanderlust
ericklanda423@gmail.com:171623El
razielphisher@gmail.com:Lancas7er
aaronjbreuer@yahoo.com:k2M93pyW
sean-peck@hotmail.com:sp16ae78
torabi142003@yahoo.de:Midda1350
terrynwf@hotmail.com:selina00
difranco.michael@gmail.com:Michael1
christopherconrell@gmail.com:kansas9904
alexsander-veiby@hotmail.com:Banjokazooie99
egarstad@gmail.com:VutRa4aW
zachsaddress03@gmail.com:Zach2003
sethdymoke@gmail.com:Laxbro10
curtgaebriel@gmail.com:Aiypwzqp1996
josef.bremberger@googlemail.com:Avalanche123
john.van.krieken@live.com:andrew16
zacottaway@gmail.com:Starwars10
mikewsm.15@gmail.com:Monster15
alvaradonestor7@gmail.com:Buddha420
Jalal.X@gmail.com:Kenshin13
alfredocmarques@gmail.com:2am707mr
nicolas.dontschev@gmail.com:plumeplume0
prathapan@gmail.com:Sabara12
autisticsheep.com@gmail.com:Soccer03
dustin_mustach@yahoo.com:Dnmdaman123
bonurozdemir@gmail.com:17agustoS
bakobanmana@gmail.com:Phantom1
mattmix@bluemavid.com:visV5kapr3
kevinscripture@hotmail.com:Eyes2020
ruth.ruckle@gmail.com:children3
kachinax@usc.edu:kachina0306
stevechambers15t@gmail.com:station1
oscwiegs@gmail.com:Slimjim1
kogashuko@hotmail.com:ultima27
johngeorgiou1989@hotmail.com:crazyone1
matianbarnard100@gmail.com:Mat13579



@undercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Snoop - open source intelligence hacking tool -termux-linux :
instagram.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) git clone https://github.com/snooppr/snoop

# Enter the working directory
2) $ cd ~ / snoop

# Install python3 and python3-pip if they are not installed
3) $ apt-get update && apt-get install python3

# Install dependencies 'requirements'
4) $ pip install --upgrade pip

5) $ python3 -m pip install -r requirements.txt
# Either install all the dependencies from 'requirements.txt' manually through

6) $ pip3 install module

πŸ¦‘python3 snoop.py --help

usage: snoop.py [-h] [--donate Y] [--sort Y] [--version] [--verbose] [--csv]
[--json] [--site] [--time] [--found-print] [--no-func]
[--userload] [--list all] [--country] [--update Y]
USERNAMES [USERNAMES ...]

Snoop: nickname search on all fronts ! (Version 1.1.5_eng Snoop Desktop Branch)

positional arguments:
USERNAMES wanted user nickname, supported
several names

optional arguments:
-h, --help show this help message and exit

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ TESTED EXPRESS VPN, HURRY UP BEFORE USED 100% WOKING :
LOGIN WITH PROXIE
t.me/undercodeTesting



ethanbco@gmail.com:hannah@68, Account is Valid. Try logging in App to
Telegram Proxy: 180.92.233.82:4145





mduboef@aol.com:zzzzzz10, Account is Valid. Try logging in App to find out Status., Proxy: 195.206.4.16:48006




grahamrgreenhill@gmail.com:4288Michelle!, Account is Valid. Try logging in App to find out Status.Proxy: 167.99.72.55:8080






stressedcorgi58@gmail.com:Sueshe123, Account is Valid. Try logging in App to find out Status., Proxy: 190.196.20.166:44907








sghoor@gmail.com:WorkerBees, Account is Valid. Try logging in App to find out Status.,Proxy: 35.235.75.244:3128





zacmangaming@gmail.com:slender123, Account is Valid. Try logging in App to find out Status., Proxy: 157.245.11.44:9050







saxraleigh@me.com:Saxman97, Account is Valid. Try logging in App to find out Status., Proxy: 193.106.231.145:4145




bbert94@live.com:bbert1994, Account is Valid. Try logging in App to find out Status.Proxy: 103.123.66.150:4145





michael@elittosmjr.com:Dmanthe1, Account is Valid. Try logging in App to find out Status., Proxy: 5.196.132.124:3128






chenyu1998@hotmail.com:music1998, Account is Valid. Try logging in App to find out Status., Proxy: 176.223.11.5:34464


@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁