UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.4K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
FB.COM/UNDERCODETESTING

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

Zip

1) wget -c https://github.com/danielmiessler/SecLists/archive/master.zip -O SecList.zip \

2) && unzip SecList.zip \

3) && rm -f SecList.zip

> Git (Small)

git clone --depth 1 https://github.com/danielmiessler/SecLists.git
Git (Complete)

git clone https://github.com/danielmiessler/SecLists.git
Kali Linux (Tool Page)

apt -y install seclists

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 updated Weaponized web shell


πŸ¦‘ FEATURES :

Shell access to the target
SQL console pivoting on the target
HTTP/HTTPS proxy to browse through the target
Upload and download files
Spawn reverse and direct TCP shells
Audit remote target security
Port scan pivoting on target
Mount the remote filesystem
Bruteforce SQL accounts pivoting on the target

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

Linux
The following example runs on a Debian/Ubuntu derived Linux environments with Python 3.

# Make sure that the python package manager and yaml libraries are installed
$ sudo apt-get install -y python3 python3-pip curl
$ cd weevely3/
$ sudo pip3 install -r requirements.txt --upgrade
OS X
OS X requires Python3 to be installed in the system. Follow the following commands to install manually gnureadline Python package.

$ sudo pip3 install gnureadline
$ cd weevely3/
$ sudo pip3 install -r requirements.txt --upgrade

@uNDERCODEtESTING
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Tool to look for several security related Android application vulnerabilities
T.me/undercodeTesting

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

With pip (no security checks on requirements):

~ pip install --user qark # --user is only needed if not using a virtualenv
~ qark --help
With requirements.txt (security checks on requirements):

~ git clone https://github.com/linkedin/qark
~ cd qark
~ pip install -r requirements.txt
~ pip install . --user # --user is only needed if not using a virtualenv
~ qark --help

πŸ¦‘Exploit APK
QARK can generate a basic exploit APK for a few of the vulnerabilities that have been found.

To generate the exploit APK there are a few steps to follow. You need to have the Android SDK v21 and build-tools v21.1.2

1) Install the android SDK, you can get it under the 'command line tools': https://developer.android.com/studio/#downloads

2) Unzip the android SDK

3) Go into the new directory and generate the licenses with bin/sdkmanager --licenses

4) Make sure the generated licenses are in the android SDK directory.

5) Install the SDK and the proper build-tools version: bin/sdkmanager --

6) install "platforms;android-21" "sources;android-21" "build-tools;21.1.2"

πŸ¦‘Included in the types of security vulnerabilities this tool attempts to find are:

Inadvertently exported components
Improperly protected exported components
Intents which are vulnerable to interception or eavesdropping
Improper x.509 certificate validation
Creation of world-readable or world-writeable files
Activities which may leak data
The use of Sticky Intents
Insecurely created Pending Intents
Sending of insecure Broadcast Intents
Private keys embedded in the source
Weak or improper cryptography use
Potentially exploitable WebView configurations
Exported Preference Activities
Tapjacking
Apps which enable backups
Apps which are debuggable
Apps supporting outdated API versions, with known vulnerabilities


@uNDERCODEtESTING
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers

πŸ¦‘FEATURES :

This repository contains the mitmproxy and pathod projects.

1) mitmproxy is an interactive, SSL/TLS-capable intercepting proxy with a console interface for HTTP/1, HTTP/2, and WebSockets.

2) mitmdump is the command-line version of mitmproxy. Think tcpdump for HTTP.

3) mitmweb is a web-based interface for mitmproxy.

> pathoc and pathod are perverse HTTP client and server applications designed to let you craft almost any conceivable HTTP request, including ones that creatively violate the standards.

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

While there are plenty of options around1, we recommend the installation using pipx:

1) Install a recent version of Python (we require at least 3.6).

2) Install pipx.
pipx install mitmproxy

3) To install additional Python packages, run pipx inject mitmproxy <your-package-name>.

πŸ¦‘ WORK S ON :

> ANY LINUX DISTRO

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁


πŸ¦‘LiveCCN :

4355280077621713|09|2023|350 CCN MATCHED [Info: - ]

4355280644705866|06|2022|478 CCN MATCHED [Info: - ]

4355287658422585|11|2026|177 CCN MATCHED [Info: - ]

4355285026437772|09|2026|523 CCN MATCHED [Info: - ]

4355284624565357|12|2022|133 CCN MATCHED [Info: - ]

4355282530356333|10|2023|167 CCN MATCHED [Info: -

4355282468548448|07|2023|315 CCN MATCHED [Info: - ]

4355280355201774|06|2025|962 CCN MATCHED [Info: - ]

4355285041816737|01|2026|267 CCN MATCHED [Info: - ]

4355282010735162|05|2025|769 CCN MATCHED [Info: - ]

4355287363772852|01|2025|560 CCN MATCHED [Info: -

4355286264622562|04|2024|337 CCN MATCHED [Info: - ]

4355286817542614|03|2024|324 CCN MATCHED [Info: - ]

4355282687502648|07|2026|684 CCN MATCHED [Info: - ]

4355281517027123|02|2024|189 CCN MATCHED [Info: - ]

@UNDERCODEtESTING
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Bins For Netflix Premium VERIFIED :


413100xxxxxxxxxx need lives
IP: πŸ‡΅πŸ‡­ Philippines
use this site for otp OTP:
https://t.co/w5f7UP50xt
----------------------------
Bin : 379217xxxxx100x
IP : USA πŸ‡ΊπŸ‡Έ
Zip Code : 10080
NOTE :
β˜‘οΈ USE GOOD VPN
β˜‘οΈ OTP BYPASSING THROUGH GODADDY SMARTLINE
------------------------------------------

Bin : 413100xxxxxxxxxx
IP : Philippines πŸ‡΅πŸ‡­
OTP : use go daddy bin for numbers
------------------------------------------

BIN: 379217xxxxx100x
IP: USA
ZIP: 10080
------------------------------------------

519404864321xxxx
519404767586xxxx
519404765826xxxx
IP: USA πŸ‡ΊπŸ‡Έ
------------------------------------------

Bin : 437133xx8xx8xx92
Date : 12/21
CVV : 983
IP : USA πŸ‡ΊπŸ‡Έ
NOTE :
◽️USE CHROME PRIVATE TAB
OR FIREFOX OR BRAVE
◽️NORD VPN OR HMA



> > how use bin https://t.me/UnderCodeTesting/3768

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ¦‘ Bin For Spotify Premium


Bin : 450553008596xxxx

Date : 03/21
CVV : RND
IP : Canada πŸ‡¨πŸ‡¦

> > how use bin https://t.me/UnderCodeTesting/3768

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ Bin For Gucci :

Bin : 512669361xxxxxxx

Date : 03/22
CVV : RND

> > how use bin https://t.me/UnderCodeTesting/3768

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ x3 Bins For Amazon Shopping 30$ verified !

[BIN]
442788001889xxxx
44278800100xxxx3
44278800449xxx00
10/20
CCV: 000
IP USA

> > how use bin https://t.me/UnderCodeTesting/3768

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ NETFLIX CHANGE EMAIL ADDRESS NEW METHOD
[ Working !
t.me/UndercodeTesting

1) First of all i found the account i wanted to crack then i went to the email address for example : gamersunis@att.net ,

2) i went to google and made a new account and the address was gamersunis@gmail.com , so i made the same name on a diffrent gmail next step was going to the account , login as normal and go down to support then live chat with netflix and wait a bit ,

3) when someone comes in you say i got an email saying a new sign in to my account and it wasnt me ! they will ask for your email address then for your name which you will find in the billing info , after that he will ask for your new email address , so you provide him with the gmail one .

4) and boom ! thats about it Netflix Support: https://help.netflix.com/en/

Enjoy

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Email and Messaging deepweb :


http://bitmailendavkbec.onion – swiss email
http://365u4txyqfy72nul.onion/ – Anonymous E-mail sevice. You can only communicate with other users currently using this service. So tell all your friends about it!
http://sms4tor3vcr2geip.onion/ – SMS4TOR – Self destructing messages
http://notestjxctkwbk6z.onion/ – NoteBin – Create encrypted self-destructing notes
http://torbox3uiot6wchz.onion/ – [TorBox] The Tor Mail Box
http://u6lyst27lmelm6oy.onion/index.php – Blue matrix chat NOT UP ALL THE TIME so chek often to see

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM