UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ANDROID HACKING

> I got bunch of hacking tools and android hacking apps that can change your perception of android smartphone security and computer privacy as
> github.com tools


1. Kali Linux for Smartphones
Kali Linux on any Android Phone or Tablet. Getting Kali Linux to run on ARM hardware has been a major goal for us since day one. In fact, the developers of Linux Deploy have made it extremely easy to get any number of Linux distributions installed in a chroot environment using a simple GUI builder.




2. Faceniff for Android
FaceNiff is a well-known application in certain circles on the Android OS that allows you to scan and intercept Internet sessions. The functionality of the utilities will provide an opportunity to hack into the accounts even if an encrypted network (WPA2). FaceNiff is used to intercept web sessions. The application works as follows. You connect to a public Wi-fi network. The utility scans the shared access point and determines the sessions available for interception. The user selects the "victim" and, after seconds of waiting, can already send messages on behalf of the "victim" from her account in the social network or forum, make orders on the site, as well as carry out other illegal actions.




3. Androrat
AndroRAT is a tool for Windows that allows us to control remotely any Android device from a PC. With this app, users can connect to a smartphone or tablet and receive information from it. However, it's a program that is based on an old vulnerability of the operating system that has been corrected in modern versions of Android.
This program offers us a user interface developed in Java and allows us to easily connect to any device by entering data such as its IP address or port number to complete the connection. The latter is enabled by sending an SMS or making a call.



4. Droidsheep for Android
DroidSheep is an open-source Android application made by Corsin Camichel that allows you to intercept unprotected web-browser sessions using WiFi. DroidSheep APK is a software developed only for testing security vulnerabilities and it is not made for harming any person. It works on Android platform and in order to use DroidSheep you need to have your device rooted. DroidSheep is bundled as an APK file, but if you want the source code, you can get it from original author's Github repo. This is not managed by Corsin Camichel and the content of this website should be used only as instructions.



5. zAnti for Android
zANTI is a mobile penetration testing toolkit that lets security managers assess the risk level of a network with the push of a button. This easy to use mobile toolkit enables IT Security Administrators to simulate an advanced attacker to identify the malicious techniques they use in the wild to compromise the corporate network



6. DroidJack RAT
DroidJack is an android RAT which gives you the power to establish control over your victim's Android devices with an easy to use GUI and all the features you need to monitor them


7. dSploit for AndroiD
If you're the admin of a WiFi network, you'll be interested in controlling all its different aspects. dSploit is an application that allows you to do so, although it's true that some of its functions go way beyond simple control features and we could even discuss whether they're legal or not.

It's an application that allows us to audit a wireless network carrying out a complete mapping process to search for vulnerabilities capable of detecting all the devices connected to it, being able to intercept their traffic in real time. Therefore, its use is only recommended for those cases in which the user is the owner and admin of the WiFi network in question, and that the app is only going to be used for security and maintenance reasons, not attempting to violate the users' privacy.
8. Spymax RAT
Spy MAX is a remote administration tools allows a user to control the system with a Graphical User Interface (GUI). It is capable of taking complete control of victim's mobile. It has many features which allows a user to access android as an administrator. SpyMax is the upgraded version of Spynote that has the most powerful remote features. Spymax is more powerful then spynote .You can bypass Google play protected easily with SpyMax and can hack android pie (9.0).



9. Spynote RAT
Remote Access Trojans (RATs) for Android devices may pack a lot of features that enable their authors with the ability to carry out a broad range of unsafe operations on the infected device. One of the more popular Android RAT projects is SpyNote, and its full source code can be found on many hacking forums. One of the scary things about the SpyNote RAT is that it is absolutely free to use so that anyone can start distributing their unique version of it. Furthermore, criminals who are experienced with programming can write additional modules to extend the SpyNote RAT's features.



10. Dendroid RAT
Dendroid is malware that affects Android OS and targets the mobile platform. It was first discovered in early of 2014 by Symantec and appeared in the underground for sale for $300. Certain features were noted as being used in Dendroid, such as the ability to hide from emulators at the time.

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
Hacking
Carding
Accounts
Courses
Bins
Proxies
& Much more ...



T.me/UndercodeTesting
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ FRESH PREMIUM PROXIES FROM 1 MINUTE :


36.67.223.67 57877 ID Indonesia elite proxy no no 1 minute ago
192.140.42.81 39292 BR Brazil elite proxy no no 1 minute ago
5.190.63.55 8080 IR Iran elite proxy no yes 1 minute ago
5.63.165.178 40561 AM Armenia elite proxy no no 1 minute ago
104.148.76.178 3128 US United States elite proxy no no 1 minute ago
103.220.207.242 32227 BD Bangladesh elite proxy no no 1 minute ago
103.78.75.165 8080 ID Indonesia anonymous no yes 1 minute ago
220.247.174.12 54661 ID Indonesia elite proxy no yes 1 minute ago
88.99.10.250 1080 DE Germany elite proxy no yes 1 minute ago
91.209.11.131 80 UA Ukraine transparent no no 1 minute ago
202.165.47.26 8080 ID Indonesia anonymous no no 1 minute ago
186.15.233.218 45999 CR Costa Rica elite proxy no yes 1 minute ago
181.168.206.106 38024 AR Argentina elite proxy no no 1 minute ago
85.10.219.100 1080 DE Germany elite proxy no yes 1 minute ago
119.226.97.170 8080 IN India elite proxy no yes 1 minute ago
103.140.24.21 34925 BD Bangladesh elite proxy no yes 1 minute ago
103.216.82.44 8080 IN India elite proxy no yes 1 minute ago
101.109.255.17 48661 TH Thailand elite proxy no yes 1 minute ago
117.212.194.240 39470 IN India elite proxy no yes 1 minute ago
88.99.10.251 1080 DE Germany elite proxy no yes 1 minute ago

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ 2020 RANSOWARE:
twitter.com/UndercodeNews

πŸ¦‘FEATURES :

Features

Generate a ransomware payload
With or without GUI payload
FUD (Fully Undetectable by Anti-Virus)
Works on Windows, MacOS and Linux
Super fast encryption with PyCrypto
Compile to EXE, APP or Unix/Linux executable
Custom icon for your EXE payload
Receive keys of victims
Decrypt files
Demo mode (payload won't encrypt anything)
Fullscreen mode (Warning takes over the screen)
Custom warning message for your victim
Custom image in your payload
Ghost mode (Rename by adding .DEMON extention instead of encrypting the files)
Multiple encryption methods
Select file extentions to target
Decide if payload should self-destruct (Console mode feature only)
Decide wich drive to target for encryption (working directory)
Verified server access through port forwarding VPN


πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) git clone https://github.com/leonv024/RAASNet.git

2) pip3 install -r requirements.txt
python3 RAASNet.py

πŸ¦‘ On Linux, you might need to install these packages:

1) sudo apt install python3-tk python3-pil python3-pil.imagetk
Testing connection with remote server:

2) # Change the host and port in test_socket.py, default is 127.0.0.1 on port 8989

3) python3 test_socket.py

E N J O Y
@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ 2020 RANSOWARE:
twitter.com/UndercodeNews

πŸ¦‘FEATURES :

Features

Generate a ransomware payload
With or without GUI payload
FUD (Fully Undetectable by Anti-Virus)
Works on Windows, MacOS and Linux
Super fast encryption with PyCrypto
Compile to EXE, APP or Unix/Linux executable
Custom icon for your EXE payload
Receive keys of victims
Decrypt files
Demo mode (payload won't encrypt anything)
Fullscreen mode (Warning takes over the screen)
Custom warning message for your victim
Custom image in your payload
Ghost mode (Rename by adding .DEMON extention instead of encrypting the files)
Multiple encryption methods
Select file extentions to target
Decide if payload should self-destruct (Console mode feature only)
Decide wich drive to target for encryption (working directory)
Verified server access through port forwarding VPN


πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) git clone https://github.com/leonv024/RAASNet.git

2) pip3 install -r requirements.txt
python3 RAASNet.py

πŸ¦‘ On Linux, you might need to install these packages:

1) sudo apt install python3-tk python3-pil python3-pil.imagetk
Testing connection with remote server:

2) # Change the host and port in test_socket.py, default is 127.0.0.1 on port 8989

3) python3 test_socket.py

E N J O Y
@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ HOW OPEN IMAGES IN TERMUX OR TERMINAL ?

Ubuntu -Debian -


sudo apt-get update && sudo apt-get install imagemagick

CentOS:

sudo yum update && sudo yum install ImageMagick

Fedora:

sudo dnf update && sudo dnf install ImageMagick

OpenSUSE:

sudo zypper refresh && sudo zypper install ImageMagick

Arch Linux:

pacman -Sy imagemagick

πŸ¦‘ Using ImageMagick to display a file

To display an image file, run display <file name>. For example:

> go to image location then


>display logo.jpg

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘HOW TO CONVERT FROM BTC TO DOLLAR OR ANY REAL MONEY ?
t.me/UndercodeTesting


1) Via Fiat Accepting Exchanges
The easiest way is to find out fiat accepting exchanges in your country. You can then sell them your Bitcoins in exchange for fiats like USD, EUR or GBP :

CoinMama-USD/EUR
Coinbase-USD/EUR
BitFlyer– USD/JPY
CoinSpot (Australia): AUD
WazirX(India Only)- Convert BTC to INR or USDT
> https://coinsutra.com/goto/coinmama/
> https://coinsutra.com/go/Bitflyer/
> https://coinsutra.com/goto/wazirx/

cash system varies from country to country.

For such sellers, there is another option of P2P selling/buying of Bitcoins via LocalBitcoins (aka LBC).

2) Via LocalBitcoins
Local-Bitcoins
> https://coinsutra.com/go/Localbitcoins/

The beauty of Localbitcoins is that you dealing with the buyer directly and you can receive money in any of the supported formats (bank deposit, PayPal, Payoneer, cash). When it comes to converting Bitcoin into fiat, Localbitcoins is one of the most preferred choices of those who don’t want to use an exchange.

> You can meet buyers/sellers online and execute a trade offline. You can either pay in cash or wire the amount. You can also choose from various other options like PayPal or SEPA or direct bank deposits for converting Bitcoins into cash (USD, EUR, INR, JPY, CNY, AUD, Dinar etc) [all depending on the buyer/seller].

πŸ¦‘SUPPORTED CONTRIES :

The USA
Australia
Europe
China
Japan
india

@UndercodeOfficial
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Bin Freefire bin :
t.me/UndercodeTesting

Bin: 4912823881xxxxxx
49128232x1x44xx0
4912823889x0x9xx
12/20
Ccv RANDON
IP MEXICO

🎁 bin2 Freefire
BIN: 41523130066xx0xx
4152313706x6xxx0
415231390x6xx5x5
03/25
CC Randon
IP MEXICO
TAKE LIVE

🎁 Bin Freefire
BIN: 4008200553x22xxx
40082005x4x5xx0x
40082005x3x100x1
09/21
CV Ramdo
IP MEXICO


▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from TARJETAS PRO UNDER CARDING
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from TARJETAS PRO UNDER CARDING
πŸ¦‘New Bin Google Play & Apple Store Subscriptions & MULTIFUNCTIONAL

BIN: 515462001xxxxxxx
GEN: DATE & CCV
IP: USA

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from TARJETAS PRO UNDER CARDING
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Why should some carders buy emails ?

1) Because with special checkers like Netflix, Amazon, Steam and more you could take accounts of these services.

2) For example you buy 500 emails and put them in the Netflix checker and it takes out 10 Netflix accounts because some of the emails you bought are registered on the platform and may be active accounts with an annual or monthly payment plan.

3) The same is true for other digital services.

4) Emails can be used for spam / scam, what is it? Simply send to all emails a scam page that is Paypal, bank or more and you are going to get the victim's data.

> There are different checkers on the internet that you can download clearly, many are basic checkers that you find.

> The most complex checkers are paid.

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from TARJETAS PRO UNDER CARDING
πŸ¦‘ veridfied BIN Spotify

450553008596xxxx

Fetcha : 03/21
CVV : RND
IP : Canada


> how use bin https://t.me/UnderCodeTesting/3768

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘BIN WISH SHOPPING

BIN: 4895040448xxxxxx
ALL GENERATED
IP: SPAINπŸ‡ͺπŸ‡Έ

πŸ¦‘METHOD:

1) Register from the wish app without vpn (or if you like use one with Spain IP)

2)Change the Country to Spain (from configuration) in the app

3) add a product less than 10 USD and close the app and enter again

4) proceed to pay and add an address (you can use yours, no box is required)

5) when paying, an option appears that says postal code adds one from Spain example 28019

6) Try several CCs that you generated until you pay one (lives are not necessary)

7) in the status of the order you have to exit PROCESSING OR ARRIVING

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM