UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Best Proxy Grabber Tool!
t.me/undercodeTesting

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) git clone https://github.com/04x/HttpLiveProxyGrabber

2) cd HttpLiveProxyGrabber

3) python ProxGrab.py

simply then choose options
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Fast instagram cracking :

very fast!
work with proxylist
only work on python2.7

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) git clone https://github.com/04x/instagramCracker

2) cd instagramCracker

3)python CheckProxy.py

4)python instagram.py
# SUPPORT & SHARE

t.me/undercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Hacking Tools ⚑️:)
fb.com/undercodeTesting

+] MD5 Hash Cracker
[+] Zone-h Poster
[+] Zone-h Url Grabber
[+] Sqli Finder [With ip Address]
[+] Whois Tools
[+] Dorker
[+] Reverse ip
[+] zip/rar password Cracker
[+] telegram/instagram username checker
[+] ICG wordpress Scanner
[+] Email Crawler
[+] Base64 encode/Decode
[+] Wordpress Hash BruteForce
[+] pyc decompiler
[+] CMs Checker

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) git clone https://github.com/04x/ToolB0x

2) cd ToolB0x

3) run as pthon ToolB0x.py

color.py

E N J O Y

πŸ¦‘ Works for Termux-win-any linux

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Hakku Framework penetration testing
>Hakku is simple framework that has been made for penetration testing tools. Hakku framework offers simple structure, basic CLI, and useful features for penetration testing tools developing. Hakku is on early stages and may be unstable, so please download the released versions from github or sourceforge, don't just clone github repository except you don't want stability, you want to try out latest features, or you just want to develop Hakku. Hakku is under MIT license, in other words you can do what you ever want with the source code

πŸ¦‘FEATURES :

apache_users
arp_dos
arp_monitor
arp_spoof
bluetooth_pod
cloudflare_resolver
dhcp_dos
dir_scanner
dns_spoof
email_bomber
hostname_resolver
mac_spoof
mitm
network_kill
pma_scanner
port_scanner
proxy_scout
whois
web_killer
web_scout
wifi_jammer
zip_cracker
rar_cracker
wordlist_gen

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) git clone https://github.com/4shadoww/hakkuframework

2) cd hakkuframework

3) Hakku doesn't require installation, but if want to do it for some reason you can do it using installation script. That same script will be used to uninstall Hakku

> Installation can be done by simple running command: sudo ./install -i

> use for learn not for harm :(
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘updated Contains Spammers Tools With Various Types With High Limit Even Unlimited indonisian script πŸ‘πŸ»

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

$ pkg update upgrade
$ pkg install git python2 toilet figlet php
$ git clone https://github.com/4L13199/LITESPAM
$ cd LITESPAM

> termux-linux
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to recover A DISABLED INSTAGRAM ACCOUNT ? from official instagram team
t.me/UndercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) If your Instagram account was disabled, you’ll see a message telling you when you try to log in. Accounts that don't follow Community Guidelines
> https://help.instagram.com/477434105621119

or Terms of Use may be disabled without warning. We suggest that you review the Community Guidelines carefully along with the posts on all accounts you've created. Keep in mind, we may permanently remove an account that repeatedly violates the Community Guidelines or Terms of Use.

2) If you think your account was disabled by mistake, you may be able to appeal the decision by opening the app, entering your username and password and following the on-screen instructions.

3) If you don’t see a disabled message, you may be experiencing a login issue. If your account was deleted by you or someone with your password, there's no way to restore it. You can create a new account with the same email address you used before, but you may not be able to get the same username.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Generate Gmail Emailing Keyloggers to Windows :)
fb.com/undercodeTesting

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) git clone https://github.com/4w4k3/BeeLogger.git

Running:
2) cd BeeLogger

3) sudo su

4) chmod +x install.sh

5) ./install.sh

6) python bee.py

πŸ¦‘Features :

> Send logs each 120 seconds.

> Send logs when chars > 50.

> Send logs with GMAIL.

> Some Phishing methods are included.

> Multiple Session disabled.

> Auto Persistence.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ any doubt feel free to ask us :)
@Undercode_Testing
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Is the phone hacked? How to find out and what to do if fears are confirmed ? by Undercode :
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

Hacking signs

1) battery charge. If the smartphone’s battery began to run down quickly, reducing the device’s operating time by several hours under normal use, then this most likely indicates the operation of malicious background applications;

2) applications. The appearance in the general list of new application icons that were not installed by you may indicate that the device was hacked;
notifications. Displaying strange messages on the screen with unreadable characters, links or notifications about the execution of the request, if you did not put your hand to this, also does not bode well - for sure, hackers already have your data;


3) balance. If your mobile account incurs losses, although you are convinced that you did not call toll numbers, did not order additional services and were not involved in any financial transactions, then you can say with accuracy that your gadget is hacked;

4) malfunctions. Strange signals during a conversation, extraneous noise, or even disconnection with a good signal level can also talk about using the device’s microphone or even listening to conversations;

Written by Undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Best Jailbreak :

iOS 12.4
Jailbreak using unc0ver


Semi-Untethered Only. Follow the Cydia Impactor method of installing the Jailbreak.

iOS 12.1.3 β†’ 12.2
Jailbreak using Chimera


Semi-Untethered Only. Follow the Cydia Impactor method of installing the Jailbreak. A12 devices are not supported. Sileo installed by default (not Cydia).

iOS 12.0 β†’ 12.1.2
Jailbreak using Chimera


Semi-Untethered Only. Follow the Cydia Impactor method of installing the Jailbreak. Sileo installed by default (not Cydia).

iOS 11.0 β†’ 12.2
Jailbreak using unc0ver


Semi-Untethered Only. Follow the Cydia Impactor method of installing the Jailbreak.

iOS 10.0 β†’ 10.3.3
Jailbreak using Meridian


Semi-Untethered Only. Follow the Cydia Impactor method of installing the Jailbreak.

iOS 10.0 β†’ 10.3.4
Jailbreak using doubleH3lix


64-bit devices with a headphone jack supported. Semi-untethered only. Follow the Cydia Impactor method of installing the Jailbreak.

iOS 10.0 β†’ 10.3.4
Jailbreak using H3lix


32-bit devices only. Semi-untethered only. Follow the Cydia Impactor method of installing the Jailbreak.

iOS 9.3.5 β†’ 9.3.6
Jailbreak using PhΕ“nix


32-bit devices only. Semi-untethered only. Follow the Cydia Impactor method of installing the Jailbreak.

iOS 9.1 β†’ 9.3.4
Jailbreak using Jailbreak.me

32-bit devices only. Visit jailbreak.me in Safari on the iOS device itself.

iOS 9.1 β†’ 9.3.4
Jailbreak using Home Depot


32-bit devices only. Semi-untethered, but can be untethered by installing UntetherHomeDepot via tihmstar's Cydia repo. Follow the Cydia Impactor method of installing the Jailbreak.

iOS 9.2 β†’ 9.3.3
Jailbreak using Pangu


64-bit devices only. Semi-untethered only. Follow the Cydia Impactor method of installing the Jailbreak.

iOS 9.0 β†’ 9.1
Jailbreak using Pangu


iOS 9.1 Jailbreak is for 64-bit devices only.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
# Join if you only interested in iOs

T.me/iUNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to quickly help a hacked phone by Undercode :
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Check for viruses. More often than not, data from mobile devices falls into the hands of hackers through malware, and simply put, viruses that transmit information from a device directly to an attacker. "Infection" most often occurs when downloading applications from unreliable sources.

2) The easiest way to find out if there are viruses on your smartphone is to check it with an antivirus , i.e. a program that detects and removes viruses.

3) Check battery usage statistics. The battery charge should be consumed in direct proportion to the use of the smartphone. You can track which applications consume a charge (including in the background) in the β€œEnergy consumption” section of the device.

4) On Samsung Galaxy, you can check the battery consumption statistics through the "Device Maintenance> Battery" section. Android will offer to transfer energy-consuming applications to sleep mode.

5) We remove suspicious and hidden applications . The presence of a large number of applications cannot be called useful for any gadget, and the presence of malicious ones is definitely harmful. Therefore, remove suspicious applications from your smartphone, and then install them from official markets and pay attention to what permissions you provide for work.

6) Check the statistics of the use of mobile traffic on the phone: (Settings> Connections> Data Usage). If you have the habit of not disconnecting the mobile Internet, check the data transfer statistics to track the suspicious activity of the device.

7) We use only reliable Wi-Fi access points. Do not use public Wi-Fi points to enter payment customers, make bank transfers and any other financial transactions. Public networks are poorly protected, and there is a risk of connecting to a hacker network, through which your data will fall into the hands of attackers. It will not be superfluous to completely disable automatic connection.

8)we update the phone to the latest version (Settings> Software update> Download and installation> Download). Do not ignore system alerts about a new version of the operating system. This is to increase security and combat updated threats. Believe me, it’s better to spend half an hour installing the new version of Android and rebooting the gadget, than to eliminate the consequences of hacking.

9) We check the credit card account - are there any suspicious charges. Using mobile payment systems is very convenient, but tying the card to a smartphone is very risky. If you don’t want to give up comfort, and security is compromised, then contact your bank and request a transaction history. If there are suspicious transactions - take measures up to blocking the old account and opening a new one.

10) The last method is to make a Hard Reset on the phone, after making a backup copy of important data. If the methods used are ineffective or you fear that you could not completely eliminate the threat, then it is worth returning the device to its factory state by making a Hard Reset of the smartphone. Resetting all settings affects all data, including user data, so it is better to save important contacts, photos, notes and other information in advance to third-party media. After resetting the settings, you will receive the gadget β€œout of the box”, which means you will have to re-configure it for yourself.

11) This method is the most radical, because it allows you to completely remove all third-party applications, but it can also be useless if you do not take care of protecting your accounts in advance by changing passwords to new ones.

Written by Undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘CARDING TUTORIALS :
t.me/undercodeTesting



πŸ¦‘ Types of Credit Cards:

1) After getting the CC, I recommend checking whether the CC is live or dead with this tool: Credit Card Verifier
Regular Credit Card :

Β· NAME:

Β· ADDRESS:
Β· CITY:
Β· STATE:
Β· ZIP CODE:
Β· TEL. BILLING NUMBER:
Β· CARD NUMBER:
Β· CARD EXP DATE:
Β· CVV CODE:

2) Well, this is the minimum information you’ll get from a CC whenever you’ll buy it. If you don’t get any of these details, then you can’t do anything with that CC. You are out of luck this time. With this CC you can card simple sites.

πŸ¦‘ Partial Full-Info CC

In these Cards, you will get some additional information with the details mentioned above. This Information is:


Β· Social Security Number (SSN):
Β· Date Of Birth (DOB):
Β· ******’s Maiden Name (MMN):

4) with the help of this info, you can even card C2IT and even PayPal. So this is Great if you’ll get these Details too.
Full-Info Credit Card

πŸ¦‘ This Card provides you full Details in it. These details are below
Β· BANK ACCOUNT NUMBER:
Β· ROUTING NUMBER:
Β· BANK NAME:
Β· BANK NUMBER:
Β· DRIVERS LICENSE NUMBER:
Β· PIN NUMBER (For CC or ATM card)

5) If you’ll have this info, you can card anything. Yes, I said anything.
Below are some of the Companies, which provide credit cards. I must suggest you use AMEX Premium, as it has mainly usage by many of the carders.

These companies are
Β· AMEX
Β· VISA
Β· DISCOVER
Β· MasterCard


▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Carding for beginers :

BIN - What is It?

πŸ¦‘ BIN Stands for Bank Identification Number, It’s the first 6 digits of your credit card, suppose your Credit card number is 4305873969346315, then your BIN will be 430587. I will suggest you collect some information related to BIN, this may help you in learning carding easily. For BIN’s BinsBase, Bins.su and BinLists are the best. This will help you in learning almost everything about Bins.


1) Well, before starting make sure you have gathered all the required things I earlier mentioned in the post. For the links of software download and purchase see the end of post.
Set Up Socks in Mozilla

2) Just open Firefox, then go to Options and Click on General on the left pane of the browser. Then scroll down to the Network Settings section and click on Settings. A Pop-Up will appear. Select the fourth option of Manual Proxy Configuration. Now type the proxy and port below, that’s it!

3) After adding the Proxy there, Just Hit OK and restart Firefox and now you’ll be connected with secure socks.

> Note: Make Sure to Buy Socks with the Matching Location of the Address in credit card. Suppose that the credit card holder is from South Africa, your socks are also supposed to be for South Africa.


πŸ¦‘ SO HOW TO USE BINS :


1) Create a new Email account with the matching name of CC holder. If CC holder’s name is Smith Parker then make something like Smithparker78@***.com
Note: Never use disposable Emails for carding.

2) Run RDP and connect with your Host, in case you are not using RDP, follow the steps below-

3)Change all the MAC addresses using MAC Address Changer.

4) Clear all the history of your PC including Cache, Temp Files using CC Cleaner.

5)Set up sock5 in Mozilla Firefox, check above I have explained how to setup socks in Mozilla.

6) Now, restart your browser and visit This link to check if your IP has changed with the location of CC holder or not.


7) Open any local online market store, I will suggest you use anyone which is from your own country.

8)Register a new account with the name of CC holder and Email you made for carding.

9) Try to add an item to your cart, the item should below USD $500, never use big orders for the first transaction.

10) In shipping address, add the address where you want to deliver the product.

11) Now, go for the payment option, choose credit card for payment.

12) Enter all the credit card details you received when you bought the credit card.

13) For the Billing address, use the address of CC Holder.

POWERED BY wiki
@UNDERCODETESTING
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁