UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Carding tutorial --- How to CC Cashout PayPal (How to return CVV to PayPal wallet ? by undercode :

CC refunds through PayPal > trick deepweb
1. You need a Socks5 with the same good condition. You must like fresh stickers within 5 minutes, otherwise it will reduce the chance.


2. PP must be very fresh and ready to use.


3. You must use Mozilla Firefox and


4. Clear the cache and use CCleaner.


5. Log in to your real PayPal and make a buy button now


6. Go to blogspot.com or accept any HTML other website


7. Now create a buy button or donate this is your choice.


8. After creating the HTML button placed on BlogSpot and checking if it works.


9. Now after checking, now work closely with Firefox and clean cache and use CCleaner


10. Open Firefox and freshen the socks.


11. Go to BlogSpot with the buy now button or donate.


12. Now use the PP balance or Cc connected to it for charging.


13. You will be successful


14 donations per cubic centimeter


15. To do it, you just transfer the money in your account.


16. Load the account, then transfer to another PayPal then refund the money to the bank account or spend.


Do not use this method with your real PayPal. PayPal can still be charged back if the boss reports fraudulent charges on their credit card


@undercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ The whole process of washing materials 2020 latest washing materials cvv-carding tutorial by Undercode-Testing
instagram.com/UndercodeTesting

πŸ¦‘ 𝕃𝔼𝕋'π•Š π•Šπ•‹π”Έβ„π•‹ :


Now we have cleared the basic concepts and started with the actual process of combing.
Set up SOCKS proxy in Firefox:

> follow these steps to open Firefox, to go to select to advanced options to network to


A pop-up window will come. It will show options

No agent 2. Automatic detection 3. Use system agent 4. Manual agent configuration

Select manual proxy configuration. Enter the socks host: << proxy ip >> and port: << proxy port >> For example: 141.141.141.141:8080. Press ok and restart Firefox. Now you are connected to the secure Socks5 J

Note: When buying socks, always match the address of the credit card holder. If the credit card holder is from California, the United States, try to make SOCKS5 at least match the state, country J

Guys are now starting to sort out the process. Please follow the steps below:

Create an email ID that matches the name of the credit card holder. If his name is John Cena (random name is taken), then the email ID should be johncena92@gmail.com or close to it.
Now run RDP and connect to the credit card holder location system to continue. If you do not have an RDP, please follow the steps below.
Turn on the MAC converter and change the address randomly.
Run CCleaner and clear all unnecessary data (cookies / history / temporary data, etc.).
Set up SOCKS5 proxy in Firefox. "It has already been explained."
Be sure to use SOCK5 to match the location of the credit card holder, and be careful not to use blacklisted IP. Please visit www.check2ip.com to
open the website for shopping. I want to recommend a website store in your country because you do n’t need to wait for many packages.
Registered credit card holder information (John Cena), name, country, city, address and email.
Shop and select your products and add to cart. Note: The first step is to choose a project that does not exceed US $ 500.
Add the address or address where the product will be delivered to the shipping address.
Then go to the payment page and select a payment method such as credit card.
Enter all the details of the credit card manually, because most websites have copy-and-paste detector scripts.
Finally, add the credit card owner ’s address information to the billing address and continue the payment process.
If all goes well, then the order will be placed successfully.
After the order arrives at the delivery address, it is received from the delivery person.
(If the delivery person asks for proof, very few people will arrange a fake ID).
Method of combing using mobile phone:

Extra pro carder uses a mobile phone for carding. If you follow the steps carefully, you will do the same.

basic requirements:

Android phone that requires root.
Several applications need to be installed (agent application, CCleaner, IMEI converter, photo and Android ID converter).
You can use any VPN for combing, I suggest using HMA or Zen pairing.
You can use SOCKS5 proxy with proxy robot application.
In addition, continue to use IMEI and Android ID changer and perform this operation.
Now use SOCKS5 proxy to connect the proxy robot and connect it.
Now, follow all the steps explained above J
Reference site:

CC from the store β†’ [The freshest CC store

Buy socks from Γ  www.vip72.com

Download CCleaner's software Γ  www.piriform.com/ccleaner

Download MAC address translation Γ  www.zokali.com/win7-mac-addresschanger

Download SOCKS Check Γ  www.socksproxychecker.com

Acronyms:

BIN: Bank Identification Number
CC: Credit Card
CCN: Credit Card Number
CVV / CVV2: Credit Verification Value (Card Security Code)
SSN: Social Security Number
MMN: Mother ’s
Last Surname DOB: Date of Birth
COB: Bill Change
VBV: Visa Verification
MCSC: Master Card Security code
POS: Point of sale
VPN: Virtual private network
BTC: Bitcoin


WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ full carding tutorials use for learn Only !
πŸ¦‘ FREE CCAM SERVER FOR EUROP CHANNELS FOR 1 K USERS BY UNDERCODE :

Your Free CCcam line is :

> C: fast1.mycccam24.com 21100 jequue mycccam24

and it will expire=2020-05-02

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Network configuration-multiple network cards are bound to an IP address (bonding)

πŸ¦‘π•·π•°π•Ώ'𝕾 𝕾𝕿𝕬𝕽𝕿

1) Use multiple network cards to virtually become a network card with the same IP address. This technology actually exists in sun and cisco, respectively called Trunking and etherchannel technology, in Linux, this technology is called bonding.
γ€€γ€€
2) Because bonding is included in the kernel 2.4.x, you only need to select Bonding driver support in the network device options during compilation.
γ€€γ€€
3) Then, recompile the core, restart the computer, and execute the following command:

γ€€γ€€ismod bonding
γ€€γ€€ifconfig eth0 down
γ€€γ€€ifconfig eth1 down
γ€€γ€€ifconfig bond0 ipaddress
γ€€γ€€ifenslave bond0 eth0
γ€€γ€€ifenslave bond0 eth1

4) Now the two network cards are working like one, which can improve the data between cluster nodes transmission.
γ€€γ€€
5) You'd better write these sentences into a script, and then call it from /etc/rc.d/rc.local, so that it will take effect as soon as you turn it on.
γ€€γ€€
6) Bonding is a better choice for the server. When there is no Gigabit network card, using two or three 100-megabit network cards for bonding can greatly increase the bandwidth between the server and the switch.

> However, it is necessary to set the two ports connected to the bonding network card on the switch to be mapped to the same virtual interface.

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ Hack news
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘THIS TUESDAY- GitLab awards $ 20,000 to researchers reporting remote code execution vulnerabilities :
t.me/UndercodeTesting

πŸ¦‘π•·π•°π•Ώ'𝕾 𝕾𝕿𝕬𝕽𝕿

1) According to the bug bounty hunter, if the vulnerability is exploited by an attacker, it may be used to "read any file on the server, including tokens, private data, and configuration." Both the GitLab instance and the GitLab.com domain are affected by this vulnerability, which was judged as a severe level by HackerOne.

2) Bowling added that by using an arbitrary file reading vulnerability to grab information from GitLab's secret_key_base service, the vulnerability can be turned into a remote code execution (RCE) attack. For example, if an attacker changes the secret_key_base of his instance to match the project, the cookie service can also be manipulated to trigger RCE attacks.

3) Bowling sent the vulnerability to the GitLab security team. The engineers reproduced the problem and pointed out that the attacker must at least become a project member to exploit the vulnerability, but according to GitLab senior engineer Heinrich Lee Yu, the attacker can also "create himself Projects or groups to achieve the same purpose. "

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

>>> EHTOOLS <<<
itS a best collection of hacking tools and scripts . Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework
is a framework of serious penetration tools that can be explored easily from within it. This
powerful and simple tool can be used for everything from installing new add-ons to grabbing
a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.

πŸ¦‘ simply open terminal or termux and type:
> cd Desktop
> git clone https://github.com/entynetproject/ehtools.git
>>> Ehtools installation

cd ehtools

chmod +x install.sh

./install.sh

>>> Ehtools uninstallation

cd ehtools

chmod +x uninstall.sh

./uninstall.sh

Now use tool and enjoy its functionality
Stay blesseed && Happy
Powered by SAMI
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ANDROID HACKING

> I got bunch of hacking tools and android hacking apps that can change your perception of android smartphone security and computer privacy as
> github.com tools


1. Kali Linux for Smartphones
Kali Linux on any Android Phone or Tablet. Getting Kali Linux to run on ARM hardware has been a major goal for us since day one. In fact, the developers of Linux Deploy have made it extremely easy to get any number of Linux distributions installed in a chroot environment using a simple GUI builder.




2. Faceniff for Android
FaceNiff is a well-known application in certain circles on the Android OS that allows you to scan and intercept Internet sessions. The functionality of the utilities will provide an opportunity to hack into the accounts even if an encrypted network (WPA2). FaceNiff is used to intercept web sessions. The application works as follows. You connect to a public Wi-fi network. The utility scans the shared access point and determines the sessions available for interception. The user selects the "victim" and, after seconds of waiting, can already send messages on behalf of the "victim" from her account in the social network or forum, make orders on the site, as well as carry out other illegal actions.




3. Androrat
AndroRAT is a tool for Windows that allows us to control remotely any Android device from a PC. With this app, users can connect to a smartphone or tablet and receive information from it. However, it's a program that is based on an old vulnerability of the operating system that has been corrected in modern versions of Android.
This program offers us a user interface developed in Java and allows us to easily connect to any device by entering data such as its IP address or port number to complete the connection. The latter is enabled by sending an SMS or making a call.



4. Droidsheep for Android
DroidSheep is an open-source Android application made by Corsin Camichel that allows you to intercept unprotected web-browser sessions using WiFi. DroidSheep APK is a software developed only for testing security vulnerabilities and it is not made for harming any person. It works on Android platform and in order to use DroidSheep you need to have your device rooted. DroidSheep is bundled as an APK file, but if you want the source code, you can get it from original author's Github repo. This is not managed by Corsin Camichel and the content of this website should be used only as instructions.



5. zAnti for Android
zANTI is a mobile penetration testing toolkit that lets security managers assess the risk level of a network with the push of a button. This easy to use mobile toolkit enables IT Security Administrators to simulate an advanced attacker to identify the malicious techniques they use in the wild to compromise the corporate network



6. DroidJack RAT
DroidJack is an android RAT which gives you the power to establish control over your victim's Android devices with an easy to use GUI and all the features you need to monitor them


7. dSploit for AndroiD
If you're the admin of a WiFi network, you'll be interested in controlling all its different aspects. dSploit is an application that allows you to do so, although it's true that some of its functions go way beyond simple control features and we could even discuss whether they're legal or not.

It's an application that allows us to audit a wireless network carrying out a complete mapping process to search for vulnerabilities capable of detecting all the devices connected to it, being able to intercept their traffic in real time. Therefore, its use is only recommended for those cases in which the user is the owner and admin of the WiFi network in question, and that the app is only going to be used for security and maintenance reasons, not attempting to violate the users' privacy.
8. Spymax RAT
Spy MAX is a remote administration tools allows a user to control the system with a Graphical User Interface (GUI). It is capable of taking complete control of victim's mobile. It has many features which allows a user to access android as an administrator. SpyMax is the upgraded version of Spynote that has the most powerful remote features. Spymax is more powerful then spynote .You can bypass Google play protected easily with SpyMax and can hack android pie (9.0).



9. Spynote RAT
Remote Access Trojans (RATs) for Android devices may pack a lot of features that enable their authors with the ability to carry out a broad range of unsafe operations on the infected device. One of the more popular Android RAT projects is SpyNote, and its full source code can be found on many hacking forums. One of the scary things about the SpyNote RAT is that it is absolutely free to use so that anyone can start distributing their unique version of it. Furthermore, criminals who are experienced with programming can write additional modules to extend the SpyNote RAT's features.



10. Dendroid RAT
Dendroid is malware that affects Android OS and targets the mobile platform. It was first discovered in early of 2014 by Symantec and appeared in the underground for sale for $300. Certain features were noted as being used in Dendroid, such as the ability to hide from emulators at the time.

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
Hacking
Carding
Accounts
Courses
Bins
Proxies
& Much more ...



T.me/UndercodeTesting
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ FRESH PREMIUM PROXIES FROM 1 MINUTE :


36.67.223.67 57877 ID Indonesia elite proxy no no 1 minute ago
192.140.42.81 39292 BR Brazil elite proxy no no 1 minute ago
5.190.63.55 8080 IR Iran elite proxy no yes 1 minute ago
5.63.165.178 40561 AM Armenia elite proxy no no 1 minute ago
104.148.76.178 3128 US United States elite proxy no no 1 minute ago
103.220.207.242 32227 BD Bangladesh elite proxy no no 1 minute ago
103.78.75.165 8080 ID Indonesia anonymous no yes 1 minute ago
220.247.174.12 54661 ID Indonesia elite proxy no yes 1 minute ago
88.99.10.250 1080 DE Germany elite proxy no yes 1 minute ago
91.209.11.131 80 UA Ukraine transparent no no 1 minute ago
202.165.47.26 8080 ID Indonesia anonymous no no 1 minute ago
186.15.233.218 45999 CR Costa Rica elite proxy no yes 1 minute ago
181.168.206.106 38024 AR Argentina elite proxy no no 1 minute ago
85.10.219.100 1080 DE Germany elite proxy no yes 1 minute ago
119.226.97.170 8080 IN India elite proxy no yes 1 minute ago
103.140.24.21 34925 BD Bangladesh elite proxy no yes 1 minute ago
103.216.82.44 8080 IN India elite proxy no yes 1 minute ago
101.109.255.17 48661 TH Thailand elite proxy no yes 1 minute ago
117.212.194.240 39470 IN India elite proxy no yes 1 minute ago
88.99.10.251 1080 DE Germany elite proxy no yes 1 minute ago

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ 2020 RANSOWARE:
twitter.com/UndercodeNews

πŸ¦‘FEATURES :

Features

Generate a ransomware payload
With or without GUI payload
FUD (Fully Undetectable by Anti-Virus)
Works on Windows, MacOS and Linux
Super fast encryption with PyCrypto
Compile to EXE, APP or Unix/Linux executable
Custom icon for your EXE payload
Receive keys of victims
Decrypt files
Demo mode (payload won't encrypt anything)
Fullscreen mode (Warning takes over the screen)
Custom warning message for your victim
Custom image in your payload
Ghost mode (Rename by adding .DEMON extention instead of encrypting the files)
Multiple encryption methods
Select file extentions to target
Decide if payload should self-destruct (Console mode feature only)
Decide wich drive to target for encryption (working directory)
Verified server access through port forwarding VPN


πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) git clone https://github.com/leonv024/RAASNet.git

2) pip3 install -r requirements.txt
python3 RAASNet.py

πŸ¦‘ On Linux, you might need to install these packages:

1) sudo apt install python3-tk python3-pil python3-pil.imagetk
Testing connection with remote server:

2) # Change the host and port in test_socket.py, default is 127.0.0.1 on port 8989

3) python3 test_socket.py

E N J O Y
@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ 2020 RANSOWARE:
twitter.com/UndercodeNews

πŸ¦‘FEATURES :

Features

Generate a ransomware payload
With or without GUI payload
FUD (Fully Undetectable by Anti-Virus)
Works on Windows, MacOS and Linux
Super fast encryption with PyCrypto
Compile to EXE, APP or Unix/Linux executable
Custom icon for your EXE payload
Receive keys of victims
Decrypt files
Demo mode (payload won't encrypt anything)
Fullscreen mode (Warning takes over the screen)
Custom warning message for your victim
Custom image in your payload
Ghost mode (Rename by adding .DEMON extention instead of encrypting the files)
Multiple encryption methods
Select file extentions to target
Decide if payload should self-destruct (Console mode feature only)
Decide wich drive to target for encryption (working directory)
Verified server access through port forwarding VPN


πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) git clone https://github.com/leonv024/RAASNet.git

2) pip3 install -r requirements.txt
python3 RAASNet.py

πŸ¦‘ On Linux, you might need to install these packages:

1) sudo apt install python3-tk python3-pil python3-pil.imagetk
Testing connection with remote server:

2) # Change the host and port in test_socket.py, default is 127.0.0.1 on port 8989

3) python3 test_socket.py

E N J O Y
@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁