UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.3K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Hatch is a brute force tool that is used to brute force most websites
fb.com/undercodeTesting

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) git clone https://github.com/MetaChar/Hatch
python2 main.py
Requirements

2) pip2 install selenium

3) pip2 install requests

πŸ¦‘How to use :

1). Find a website with a login page
2). Inspect element to find the Selector of the username form
3). Do the same for the password field
4). The the login form
5). When Asked put in the username to brute force
6). Watch it go!

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Disney Plus Premium Accounts new :


Dezzi_rover@hotmail.co.uk:Shearer79 | Subscription: Disney Plus Yearly - UK - Web | Expiration: 2021-03-25
================
: d152386@gmail.com:Db162386 | Subscription: Disney Plus Monthly - UK - Web | Expiration: 2020-05-11
================
: jjoyner77@gmail.com:Mysaab93 | Subscription: Disney Plus Yearly with 7 Day Free Trial | Expiration:
================
: mcbridesbills@gmail.com:Mistymcb60 | Subscription: Disney Plus Non-Recurring - US - Verizon | Expiration: 2022-11-13
================
: kellyhead@live.com.au:Jenny230490 | Subscription: Disney Plus Monthly - AUS - Web | Expiration: 2020-01-13
================

: eriknyu@hotmail.com:Vandeep9 | Subscription: Disney Plus Non-Recurring - US - Verizon | Expiration: 2022-11-16
================
: TomaszMK@bigpond.com:Zefcol2325 | Subscription: Disney Plus Monthly - AUS - Web | Expiration: 2019-12-07
================
: chevy0104@bellsouth.net:Rocket09 | Subscription: Disney Plus Monthly Pre-Sales - US - Web | Expiration: 2020-04-20
================
: jnorton78@bigpond.com:snorty30 | Subscription: Disney Plus Yearly - AUS - Web | Expiration: 2021-04-01
================
: andrewchaupc@gmail.com:Kicker94 | Subscription: Disney Plus Non-Recurring - US - Verizon | Expiration: 2022-12-30
================
: arnaud.arhancet@wanadoo.fr:Roselier77 | Subscription: Disney Plus Non-Recurring - FR - Canal Plus - Bundle | Expiration:
================
: sh022275@buckeye-express.com:Meijers2 | Subscription: Disney Plus Monthly - US - Web | Expiration: 2020-05-05
================
rahshakes@gmail.com:brooklyn84 | Subscription: Disney Plus Monthly With 7 Day FT | Expiration:
================
: kevingr78@gmail.com:Schuss12 | Subscription: Disney Plus Monthly - CH - Web | Expiration: 2020-04-12
================
: sabbiedf@hotmail.co.uk:madeira2k9 | Subscription: Disney Plus Monthly - UK - Web | Expiration: 2020-05-10
================
: lainarc@gmail.com:vocaloid38 | Subscription: Disney Plus Non-Recurring - ES - Movistar - Bundle | Expiration: 2023-03-26
================
: chaynap@hotmail.com:Hardware18 | Subscription: Disney Plus Non-Recurring - US - Verizon | Expiration: 2022-11-18
================:

mburk@optonline.net:knicks23 | Subscription: Disney Plus Monthly - US - Web | Expiration: 2020-05-16
================
: amanda.orosco.01@gmail.com:Ilovehim01 | Subscription: Disney Plus Monthly - US - Web | Expiration: 2020-05-13
================
: Anthonycastellon99@gmail.com:Airsoft99 | Subscription: Disney Plus Non-Recurring - US - Verizon | Expiration: 2022-11-12
================
: jsmikalson@mac.com:June1398 | Subscription: Disney Plus Non-Recurring - US - Verizon | Expiration: 2022-11-24
================
: nwo655@yahoo.com:Xkd6vbiq | Subscription: Disney Plus Monthly - US - Web | Expiration: 2020-04-27
================
: danielclarke7@hotmail.co.uk:Clarkey123 | Subscription: Disney Plus Monthly - UK - Web | Expiration: 2020-05-02
================
gordon89wu@gmail.com:Iamawesome89 | Subscription: Disney Plus Monthly - AUS - Web | Expiration: 2020-03-01
================
: kaylynrome@gmail.com:Kaiden08 | Subscription: Disney Plus Monthly - US - Web | Expiration: 2020-05-09
================
: kimmyc3@ymail.com:Apache2013 | Subscription: Disney Plus Yearly Pre-Sales - US - Web | Expiration: 2020-11-20
================

: angelo59778@gmail.com:Abc12333 | Subscription: Disney Plus Monthly - US - XBox | Expiration: 2020-03-02

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ x3 Bins For Amazon Shopping 30$

[BIN]
442788001889xxxx
44278800100xxxx3
44278800449xxx00
10/20
CCV: 000
IP USA

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to change proxy settings in Browsers :
t.me/UndercodeTesting

πŸ¦‘ Mozilla Firefox

1. Open Mozilla Firefox.
2. Click on Tools then click on Options….
3. Click on the Advance tab, then click on the Network sub-tab and finally on the Settings… button.
4. Tick the Manual Proxy Configuration: radio button.
5. In the HTTP Proxy: box, type the IP address of the proxy server.
6. In the Port: box, type the in the port number that is used by the proxy server.
7. Click OK to close the Connection Settings window.
8. Click OK to close the Options window.
9. DONE

πŸ¦‘ Internet Explorer

1. On the Tools menu in Internet Explorer, click Internet Options, click the Connections tab, and then click LAN Settings.
2. Under Proxy server, click to select the Use a proxy server for your LAN check box.
3. In the Address box, type the IP address of the proxy server.
4. In the Port box, type the port number that is used by the proxy server for client connections (by default, 8080).
5. You can click to select the Bypass proxy server for local addresses check box if you do not want the proxy server computer to be used when you connect to a computer on the local network (this may speed up performance).
6. Click OK to close the LAN Settings dialog box.
7. Click OK again to close the Internet Options dialog box.

πŸ¦‘ proxy settings In Google Chrome.

* To change proxy settings: Click β€œCustomize and control Google Chrome” icon right under the β€œwindow close” button.
* A popup menu will be dipslayed. Click β€œOptions”.
* Select the β€œUnder the Hood” tab.
* Scroll down and Click β€œchange proxy settings” button.
* A popup dialog will be display. Select the Connections tab on this dialg.
* If you are using LAN, click β€œLAN Settings” button. If you are using Dial-up or Virtual Private Network connection, select necessary connection and click β€œSettings” button.
* Make sure the β€œautomatically detect proxy settings” and β€œuse a proxy automatic configuration script” options are not checked.
* In the β€œProxy Server” area, click the check box next to Use a proxy server for this connection.
* If nessesary, enable β€œbypass proxy server for local addresses”.
* Click the β€œAdvanced” button and set Proxy Server address (proxy IP), proxy server port.
* Click OK.
* Done

πŸ¦‘ proxy settings in Safari.

* To change proxy settings: Open Safari
* Click Safari on top of the screen.
* Click β€œPreferences”.
* In the menu bar at the top of the window, Click β€œAdvanced”.
* Click on the β€œChange Settings” button next to the Proxies label
* Click on the check box button next to Web Proxy (HTTP)
* Enter proxy server and port information
* Select β€œApply Now” to save settings.
* Done.

powered by wiki

@undercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ CVS Server Quick GuideCVS server Quick Guide by Undercode
t.me/undercodeTesting



πŸ¦‘ 1) introduction

CVS is the Concurrent Version System (Concurrent Versions System) is an abbreviation for version management. If you have ever participated in a project developed by many people, you must have such a painful experience: because multiple people modify the same file at the same time, the program that you worked hard to modify was completely deleted by others. In addition, if your software / program has been released in three versions, and the user requires you to modify the second version at this time, you may cry because you only keep the latest version. Another thing is that you have made some changes to the program, but the changes are very few. You only want to send a difference file between the two versions to colleagues in the distance, so that you can avoid problems such as the mailbox is not large enough, and the network speed is too slow. . In order to solve problems like this, as well as generating patch files, historical revisions, etc., a group of hackers (commendations) developed CVS on the basis of SCCS and RCS, which were very mature in the original Unix system. (SCCS: Source Code Control System, RCS: Revision Control System).


2) The basic working idea of ​​CVS is this: build a warehouse on a server, and the source code of many different projects can be stored in the warehouse. These source programs are managed by the warehouse administrator. In this way, it seems as if only one person is modifying the file. Avoid conflicts. Before using the warehouse, each user must first download the project files in the warehouse to the local. Any changes made by the user are first made locally, and then submitted with the cvs command, which is uniformly modified by the cvs warehouse administrator. In this way, you can track file changes, conflict control, and so on.

3) Since CVS is a typical C / S structured software, it is also divided into two parts, server and client. However, most CVS software combines them into one. Here we discuss the use of cvs from the perspective of the server and the client.

πŸ¦‘ Cvs server installation :

> First make sure that the system has cvs installed:
[root @ mail xinetd.d] # rpm -qa | grep cvs
cvs-1.11.1p1-3
If the command output is similar to the above output, it means that the system has installed cvs, otherwise you need to install the cvs rpm package from the installation CD .

1. Create a CVS owner user:
# useradd -d / cvsroot cvs
# chmod 771 / cv sroot

2. Establish a CVS warehouse (initialize cvs)

# su cvs
$ cvs -d / cvsroot init
$ exit
#

4. Start the cvs server

in / etc Create a file cvspserver in the /xinetd.d/ directory, the content is as follows:
# default: on
# description: The cvs server sessions;

service cvspserver
{
socket_type = stream
wait = no
user = root
server = / usr / bin / cvs
server_args = -f --allow-root = / cvsroot pserver
log_on_failure + = USERID
only_from = 192.168.0.0/24
}
Among them only_from is used to restrict access, you can not according to the actual situation or modify.
Modify the file permissions:
# chmod 644 cvspserver
and restart xinetd:
# /etc/rc.d/init.d/xined restart
Then check whether the cvs server is already running:
[root @ mail xinetd.d] # netstat -lnp | grep 2401
tcp 0 0 0.0.0.0:2401 0.0.0.0:* LISTEN 7866 / xinetd
indicates that the cvs server is already running.

Fifth, create a user to access cvs The cvs user

created earlier is a cvs warehouse management user, and in order to allow users to access, you also need an access user:
# useradd cvspub
# usemod -G cvs cvspub
Here, a user cvspub is added, and the The user is added to the cvs group.

Six, manage cvs server
Manage cvs server. The server is ready for use. Now everyone is most concerned about how to manage the server. For example, I want some people to have the authority to read and / or write the CVS repository, but what if I do n’t want to give it system authority? It is not difficult, after the initialization of cvs, there is a CVSROOT directory in the main directory of the administrator user (here is the cvs user), and there are three configuration files in this directory: passwd, readers, writers. We can configure the CVS server by setting these three files. The functions of these files are described below:
passwd: the user list file of the cvs user. Its format is much like the shadow file:
{cvs user name}: [encrypted password ]: [Equivalent system user name]
If you want a user to be only a cvs user, not a system user, then you need to set this file. This file may not exist immediately after installation, you need to be a cvs administrator (su cvs) Created by the user manually, of course, according to the above format; the
second field is the user ’s encrypted password, which is encrypted with crypt (3), you can write a program to do the encryption yourself, or you can use two lazy methods : Create a system user with the same name as the cvs user. The password is the password of the cvs user to be prepared for it. After the creation, copy the second field of the user from / etc / shadow, and then delete the user. This method is more convenient for a small number of users. It is not suitable if there are more people, and there are hidden security risks of conflict conditions (race condition), and root permissions are not very good, but it is a matter of rights and interests; another method Is to use apche's htpasswd command to create a passwd user, add users only need htpasswd passwd username to add users to the passwd file, but need to add a "": "" colon at the end of the corresponding line in the file and the corresponding equivalent system user The best thing is to write a program to generate this passwd file.
The third field is the equivalent system user name. In fact, it is the right to give a cvs user an equivalent system user. See the following example to understand its function.
readers: A user list file with cvs read permission is a one-dimensional list. The users in this file
only have read access to cvs .
writers: A list file of users with cvs write permissions, like readers, is a one-dimensional list. The users in this file have write permission for cvs.
The above three files may not exist during the default installation, we need to create our own, well, now let us use an example to teach it. Suppose we have the following users who need to use cvs:
cvsuser1, cvsuser2, henry, betty, anonymous
where laser and gumpwu are system users, and henry, betty, anonymous we do not want to give system user permissions, and betty and anonymous are both read-only Users, and anonymous even has no password.
Then edit cvs administrator home directory CVSROOT / passwd file, you add the following lines:

Laser: $ xxefajfka; faffa33: cvspub
gumpwu: $ ajfaal; 323r0ofeeanv: cvspub
henry: $ fajkdpaieje: cvspub
Betty: fjkal; ffjieinfn /: cvspub
Anonymous: : cvspub
Note: The second field above (the delimiter is :) is the cipher text password, you have to use the program or use my local method to generate.
Edit readers file, add the following lines:
Anonymous
Betty
editor writer file, add the following lines:
Laser
gumpwu
henry
so ok, then you are landing a few test users, you will find everything is ok. I don't want to say more about the principles and explanations here. In fact, it is very simple, and the concept of system management users is the same.

Seven, the establishment of a new CVS project
πŸ¦‘ Generally we already have one or more projects, so that we can use the following steps to generate a new CVS project.
Putting a project file in CVs for version control is called import in CVS terminology. As you can see from the name, you need to make some preparations before importing.
The basic requirement for input operations is to have a "clean" directory structure. "" Clean "" means that files that do not require version control are removed (such as files generated by compilation, backup files, etc.). This is important if the project has been started for a while. There may be some files in the directory that you don't plan to put under version control, but you want to put them here. In this case, you need to remove them before entering and then move them back.
Note that CVS believes that empty directories do not exist. If you want to add a directory that contains neither files nor subdirectories, you need to create a dummy file under it. It is recommended that you create a file named README.txt, which contains a brief description of the directory.
Enter the directory of the existing project, for example, cvstest:
$ cd cvstest
Run command to import the project file into the cvs warehouse:
$ cvs import -m "" this is a cvstest project "" cvstest v_0_0_1 start
Description: import is one of the commands of cvs, which means to input the project file to the cvs warehouse.
The string after the -m parameter is the description text, which describes the project. If the -m parameter is not added, cvs will automatically run an editor (usually vi, but you can change it to your favorite by modifying the environment variable EDITOR Editor) allows you to enter information, cvstest is the project name (actually the name of the warehouse, it will be stored in the warehouse named after this name on the CVS server)
v_0_0_1 is the total mark of this branch. Useless (or not commonly used)
start is a mark that identifies the input level of the file each time it is imported, and is useless.
In this way, we have established a CVS warehouse, and then, we can delete the files of this test project, and experiment how to obtain files from the warehouse.

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 updated The Browser Exploitation Framework Project https://beefproject.com
fb.com/undercodeTesting

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) In order to install BeEF and RVM you will need to install Git and Curl first, as they do not come out of the box with Ubuntu.

$ sudo apt-get install git
$ sudo apt-get install curl

2) To install RVM, firstly go to https://rvm.io/rvm/install and install the GPG keys. Then install RVM, without dependencies:

$ \curl -sSL https://get.rvm.io | bash -s -- --autolibs=install-packages
Now install those dependencies as root while in the applications users $HOME directory:

$ sudo .rvm/bin/rvm requirements

3) Now that the dependencies are installed we need to install the stable releases of both RVM and Ruby. As the application user enter:

$ \curl -sSL https://get.rvm.io | bash -s stable --ruby

4) BeEF requires Ruby 2.5.x. Before navigating to the beef directory run:

$ rvm install "ruby-2.5.3"

5) Then simply reload your shell!

You can verify your installation of RVM and Ruby by running:

$ rvm -v
$ ruby -v

5) Once a suitable version of Ruby is installed, run the install script in the BeEF directory:

$ ./install
This script installs the required operating system packages and all the prerequisite Ruby gems.

6) Upon successful installation, be sure to read the Configuration page on the wiki for important details on configuring and securing BeEF.

7) Start BeEF
To start BeEF, first change the username and password config.yaml and then simply run:

$ ./beef

πŸ¦‘Testing
If you want to install the test pre-requisites just run:

$ bundle install --with test
This will install the pre-requisite gem's for tests.

If you want to run the test suit run:

$ bundle exec rake

πŸ¦‘ tested by undercode on

> ubuntu last version

@UnderodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Netdiscover is a network address discovering
tool, developed mainly for those wireless networks without dhcp server, it
also works on hub/switched networks. Its based on arp packets, it will send arp
requests and sniff for replys.
instagram.com/undercodeTesting

πŸ¦‘REQUIREMENTS :

Requeriments
============

- libpcap
- libnet > 1.1.2
- Tested to work on Linux, Solaris MacOS X and OpenBSD, other unixes may work



πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) git clone https://github.com/alexxy/netdiscover

2) cd netdiscover

3) $ sh update-oui-database.sh (optional)

4) $ cmake .

5) $ make

6) # make install

πŸ¦‘ HOW TO USE :

> ./netdiscover [-i device] [-r range | -p] [-s time] [-n node] [-c count] [-f] [-S]

-i device
The network device to sniff at and inject packets. If no device was
specified, first available will be used.

-r range
Scan a given range instead of auto scan. Valid range values are:
192.168.0.0/24, 192.168.0.0/16 or 192.168.0.0/8

-p
Enable passive mode do not send anything, only sniff

-s time
It will sleep given time in milliseconds between each arp request
injection. (default 1)

-c count
Number of times to send each arp reques. Usefull for networks with
packet loss, so it will scan given times for each host.

-n node
Last ip octet used for scanning as source host, you can change it
if the default host is already used (from 2 to 253) (default 66)

-S
Enable sleep time supression betwen each request. I will sleep each 255
scanned hosts instead of do it by each one, this mode was used on 0.3 beta4
and older releases. Avoid this option on networks with packet lossing,
or in wireless networks with low signal level. (also called hardcore mode)

-f
Enable fastmode scan, it will only scan for hosts .1, .100, .254 on each
network, usefull when searching for addresses being used, after find one
you can make a specific range scan to see online boxes.
Scanned hosts can be easily modified at fast_ips[] array on main.c source.

If -p or -r options are not used, netdiscover will automatically scan for common
lan addresses. Those address lists can be modified at common_net[] on main.c

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘League of Legends Premium Accounts verified
t.me/undercodeTesting


franzougame:franzou57 Level : 42 | BE : 1570 | RP : 198 | RefundsRemaining : 3 | emailVerified : true | ChampsCount : 23 | SkinsCount : 14 |
supergallego:pepillo69926992 | Level : 152 | BE : 4221 | RP : 89 | RefundsRemaining : 1 | emailVerified : true | ChampsCount : 126 | SkinsCount : 51 |
felt83:Luffy830 | Level : 35 | BE : 1009 | RP : 0 | RefundsRemaining : 0 | emailVerified : true | ChampsCount : 24 | SkinsCount : 3 |
dzelric:aboud032003 | Level : 8 | BE : 5105 | RP : 15 | RefundsRemaining : 3 | emailVerified : true | ChampsCount : 3 | SkinsCount : 1 |
kosior1996:kotek2909 | Level : 30 | BE : 2705 | RP : 110 | RefundsRemaining : 1 | emailVerified : true | ChampsCount : 28 | SkinsCount : 2 |
thorthenoob:Email172801 | Level : 7 | BE : 3570 | RP : 0 | RefundsRemaining : 3 | emailVerified : true | ChampsCount : 4 | SkinsCount : 0 |
technologeek17:laurent474 | Level : 19 | BE : 2025 | RP : 315 | RefundsRemaining : 2 | emailVerified : true | ChampsCount : 25 | SkinsCount : 2 |
laer4167:ggp84bvkk | Level : 16 | BE : 5782 | RP : 0 | RefundsRemaining : 3 | emailVerified : true | ChampsCount : 7 | SkinsCount : 3 |
mafioso97:DG9ottobre1997 | Level : 30 | BE : 2275 | RP : 310 | RefundsRemaining : 1 | emailVerified : true | ChampsCount : 38 | SkinsCount : 12 |
breakstuff155:oriebir123 | Level : 16 | BE : 1759 | RP : 0 | RefundsRemaining : 3 | emailVerified : true | ChampsCount : 9 | SkinsCount : 1 |
faiizenn:2702TOMI | Level : 97 | BE : 556 | RP : 124 | RefundsRemaining : 0 | emailVerified : true | ChampsCount : 91 | SkinsCount : 89 |
xavikuervo:jackskipper1987 | Level : 169 | BE : 9161 | RP : 115 | RefundsRemaining : 1 | emailVerified : true | ChampsCount : 148 | SkinsCount : 73 |
kaximpo:hoyo1805 | Level : 23 | BE : 389 | RP : 25 | RefundsRemaining : 3 | emailVerified : true | ChampsCount : 20 | SkinsCount : 2 |
pifpaf451:Bibi451021 | Level : 31 | BE : 2726 | RP : 40 | RefundsRemaining : 1 | emailVerified : true | ChampsCount : 37 | SkinsCount : 14 |
flotrethcq:legolegoflo0 | Level : 161 | BE : 8760 | RP : 9 | RefundsRemaining : 1 | emailVerified : true | ChampsCount : 148 | SkinsCount : 66 |
alexopri3:avatar5137 Level : 11 | BE : 505 | RP : 22 | RefundsRemaining : 3 | emailVerified : true | ChampsCount : 12 | SkinsCount : 2 |
naugtyboyfr:lenae1996 | Level : 15 | BE : 1910 | RP : 0 | RefundsRemaining : 3 | emailVerified : true | ChampsCount : 9 | SkinsCount : 0 |
spirigan:32noispol | Level : 28 | BE : 3042 | RP : 53 | RefundsRemaining : 1 | emailVerified : true | ChampsCount : 13 | SkinsCount : 6 |
errorkappa:ignac2003 | Level : 10 | BE : 2715 | RP : 0 | RefundsRemaining : 3 | emailVerified : true | ChampsCount : 7 | SkinsCount : 0 |
makinapro13:davidpro69 | Level : 30 | BE : 2388 | RP : 98 | RefundsRemaining : 1 | emailVerified : true | ChampsCount : 43 | SkinsCount : 6 |
aurumr3k3r:raisha18 | Level : 16 | BE : 114 | RP : 0 | RefundsRemaining : 3 | emailVerified : true | ChampsCount : 16 | SkinsCount : 4 |

winampcz:Momadik125 | Level : 10 | BE : 3842 | RP : 140 | RefundsRemaining : 3 | emailVerified : true | ChampsCount : 1 | SkinsCount : 1 |


@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Hulu Premium Accounts verified

erika_kristen@yahoo.com:Lotr1111 | Subscription: Hulu (No Ads) | Renewal: Billed using other service
erikaoneil7@yahoo.com:Fallebelle7 | Subscription: Hulu | Renewal: Billed using other service
erivers@scwhitmoreschool.org:kp7tr9?? | Subscription: Hulu | Renewal: Billed using other service
ernt3563@gmail.com:Mdigt07? | : Subscription: Hulu + Live TV | Renewal: Billed using other service
escoon13@icloud.com:Cooner8384 | Subscription: Hulu | Renewal: Billed using other service
estamand7@yahoo.com:auntemhc | Subscription: Hulu | Renewal: Billed using other service
escoon13@icloud.com:Cooner8384 | Subscription: Hulu | Renewal: Billed using other service
eureke_15@yahoo.com:love2531 | Subscription: Hulu (No Ads) | Renewal: Billed using other service
eymonge@gmail.com:Jj1107 | : Subscription: Hulu | Renewal: Billed using other service
ewella_21@hotmail.com:35Dolloff* | Subscription: Hulu | Renewal: Billed using other service
fayjd@hotmail.com:michael1 | : Subscription: Hulu | Renewal: Billed using other service
fieldofdreams_8@yahoo.com:Hallee16 | Subscription: Hulu | Renewal: Billed using other service
ferrucci1515@yahoo.com:11johnnyjr | Subscription: Hulu | Renewal: Billed using other service
flyfsh33@gmail.com:Summer@15! | Subscription: Hulu + Live TV | Renewal: Billed using other service
Fireguys_girl_2004@yahoo.com:HTL020313! | Subscription: Hulu | Renewal: Billed using other service
frederickson.robyn@gmail.com:Gabebabe15 | Subscription: Hulu | Renewal: Billed using other service
lgfarhadi@gmail.com:108Coldwater | Subscription: Hulu (No Ads) | Renewal: Billed using other service
leslie.ashleyk@gmail.com:Kyla51412 | Subscription: Hulu (No Ads) |
@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ ANDROID BUGS - CVE DETAILED LIST 2020 :

1) CVE-2019-14783 264 2019-08-08 2019-09-25 2.1 None Local Low Not required None Partial None
On Samsung mobile devices with N(7.x), and O(8.x), P(9.0) software, FotaAgent allows a malicious application to create privileged files. The Samsung ID is SVE-2019-14764.

2) CVE-2019-9506 310 2019-08-14 2019-08-28 4.8 None Local Network Low Not required Partial Partial None
The Bluetooth BR/EDR specification up to and including version 5.1 permits sufficiently low encryption key length and does not prevent an attacker from influencing the key length negotiation. This allows practical brute-force attacks (aka "KNOB") that can decrypt traffic and inject arbitrary ciphertext without the victim noticing.

3) CVE-2019-9463 269 Bypass 2019-09-27 2019-10-03 4.4 None Local Medium Not required Partial Partial Partial
In Platform, there is a possible bypass of user interaction requirements due to background app interception. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-113584607

4) CVE-2019-9462 125 DoS 2019-09-27 2019-09-30 5.0 None Remote Low Not required None None Partial
In Bluetooth, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-91544774

5) CVE-2019-9461 200 +Info 2019-09-06 2019-09-09 7.8 None Remote Low Not required Complete None None
In the Android kernel in VPN routing there is a possible information disclosure. This could lead to remote information disclosure by an adjacent network attacker with no additional execution privileges needed. User interaction is not needed for exploitation.

6) CVE-2019-9460 787 2019-09-27 2019-10-02 4.6 None Local Low Not required Partial Partial Partial
In mediaserver, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-62535446

7) CVE-2019-9459 120 Overflow 2019-09-27 2019-09-30 7.5 None Remote Low Not required Partial Partial Partial
In libttspico, there is a possible OOB write due to a heap buffer overflow. This could lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-79593569

8) CVE-2019-9458 362 2019-09-06 2019-09-09 4.4 None Local Medium Not required Partial Partial Partial
In the Android kernel in the video driver there is a use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.

9) CVE-2019-9456 787 2019-09-06 2019-09-24 4.6 None Local Low Not required Partial Partial Partial
In the Android kernel in Pixel C USB monitor driver there is a possible OOB write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.

10) CVE-2019-9455 200 +Info 2019-09-06 2019-09-09 2.1 None Local Low Not required Partial None None
In the Android kernel in the video driver there is a kernel pointer leak due to a WARN_ON statement. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.
11) CVE-2019-9454 787 Mem. Corr. 2019-09-06 2019-09-09 4.6 None Local Low Not required Partial Partial Partial
In the Android kernel in i2c driver there is a possible out of bounds write due to memory corruption. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.

12) CVE-2019-9453 20 2019-09-06 2019-09-09 2.1 None Local Low Not required Partial None None
In the Android kernel in F2FS touch driver there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure with system execution privileges needed. User interaction is not needed for exploitation.

13) CVE-2019-9452 125 2019-09-06 2019-09-09 2.1 None Local Low Not required Partial None None
In the Android kernel in SEC_TS touch driver there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.

14) CVE-2019-9451 787 2019-09-06 2019-09-10 4.6 None Local Low Not required Partial Partial Partial
In the Android kernel in the touchscreen driver there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.

15) CVE-2019-9450 362 Mem. Corr. 2019-09-06 2019-09-10 4.4 None Local Medium Not required Partial Partial Partial
In the Android kernel in the FingerTipS touchscreen driver there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.

16) CVE-2019-9449 125 2019-09-06 2019-09-09 2.1 None Local Low Not required Partial None None
In the Android kernel in FingerTipS touchscreen driver there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with system execution privileges needed. User interaction is not needed for exploitation.

17) CVE-2019-9448 787 2019-09-06 2019-09-09 4.6 None Local Low Not required Partial Partial Partial
In the Android kernel in the FingerTipS touchscreen driver there is a possible out of bounds write due to a missing bounds check. This could lead to a local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.

18) CVE-2019-9447 416 2019-09-06 2019-09-09 4.6 None Local Low Not required Partial Partial Partial
In the Android kernel in the FingerTipS touchscreen driver there is a possible use-after-free due to improper locking. This could lead to a local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.

19) CVE-2019-9446 787 2019-09-06 2019-09-09 4.6 None Local Low Not required Partial Partial Partial
In the Android kernel in the FingerTipS touchscreen driver there is a possible out of bounds write due to improper input validation. This could lead to a local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.

20) CVE-2019-9445 125 2019-09-06 2019-09-09 2.1 None Local Low Not required Partial None None
In the Android kernel in F2FS driver there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with system execution privileges needed. User interaction is not needed for exploitation.
21) CVE-2019-9444 200 +Info 2019-09-06 2019-09-09 2.1 None Local Low Not required Partial None None
In the Android kernel in sync debug fs driver there is a kernel pointer leak due to the usage of printf with %p. This could lead to local information disclosure with system execution privileges needed. User interaction is not needed for exploitation.

22) CVE-2019-9443 264 Bypass 2019-09-06 2019-09-09 4.6 None Local Low Not required Partial Partial Partial
In the Android kernel in the vl53L0 driver there is a possible out of bounds write due to a permissions bypass. This could lead to local escalation of privilege due to a set_fs() call without restoring the previous limit with System execution privileges needed. User interaction is not needed for exploitation.

23) CVE-2019-9442 416 Mem. Corr. 2019-09-06 2019-09-09 4.6 None Local Low Not required Partial Partial Partial
In the Android kernel in the mnh driver there is possible memory corruption due to a use after free. This could lead to local escalation of privilege with System privileges required. User interaction is not needed for exploitation.

24) CVE-2019-9441 787 2019-09-06 2019-09-09 4.6 None Local Low Not required Partial Partial Partial
In the Android kernel in the mnh driver there is a possible out of bounds write due to improper input validation. This could lead to escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.

25) CVE-2019-9440 610 2019-09-27 2019-10-04 2.1 None Local Low Not required Partial None None
In AOSP Email, there is a possible information disclosure due to a confused deputy. This could lead to local disclosure of the Email app's protected files with User execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-37637796

26) CVE-2019-9438 610 2019-09-27 2019-10-03 2.1 None Local Low Not required Partial None None
In the Package Manager service, there is a possible information disclosure due to a confused deputy. This could lead to local disclosure of information about installed packages for other users with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-77821568


@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ FULL LIST OF RECENTLY VULNERABILITIES FOR ANDROID DEVICES
# SUPPORT & SHARE :

T.me/UndercodeTesting