UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.7K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
- [mfcuk](https://github.com/nfc-tools/mfcuk) - MiFare Classic Universal toolKit (MFCUK). :star:487
- [mfoc](https://github.com/nfc-tools/mfoc) - Mifare Classic Offline Cracker. :star:626
- [termux-fedora](https://github.com/nmilosev/termux-fedora) - A script to install a Fedora chroot into Termux. :star:124
- [AutoSploit](https://github.com/NullArray/AutoSploit) - Automated Mass Exploiter. :star:3965
- [AutoPixieWps](https://github.com/nxxxu/AutoPixieWps) - Automated pixieWps python script. :star:97
- [exploitdb](https://github.com/offensive-security/exploitdb) - The official Exploit Database repository. :star:4837
- [gobuster](https://github.com/OJ/gobuster) - Directory/File, DNS and VHost busting tool written in Go. :star:2505
- [Simple-Fuzzer](https://github.com/orgcandman/Simple-Fuzzer) - Simple Fuzzer is a simple config-file driven block/mutation based fuzzing system. :star:52
- [OWASP-WebScarab](https://github.com/OWASP/OWASP-WebScarab) - OWASP WebScarab. :star:464
- [QRLJacking](https://github.com/OWASP/QRLJacking) - QRLJacking or Quick Response Code Login Jacking is a simple-but-nasty attack vector affecting all the applications that relays on Ò€œLogin with QR codeÒ€ feature as a secure way to login into accounts which aims for hijacking users session by attackers.. :star:548
- [WiFi-Pumpkin](https://github.com/P0cL4bs/WiFi-Pumpkin) - Framework for Rogue Wi-Fi Access Point Attack. :star:2740
- [Spammer-Grab](https://github.com/p4kl0nc4t/Spammer-Grab) - A brand new, awakened version of the old Spammer-Grab.. :star:24
- [zirikatu](https://github.com/pasahitz/zirikatu) - Fud Payload generator script. :star:134
- [eternal_scanner](https://github.com/peterpt/eternal_scanner) - An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance). :star:245
- [get](https://github.com/peterpt/get) - Get is a simple script to retrieve an ip from hostname or vice-versa .. :star:0
- [enum4linux](https://github.com/portcullislabs/enum4linux) - enum4Linux is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts.. :star:175
- [KatanaFramework](https://github.com/PowerScript/KatanaFramework) - The New Hacking Framework. :star:416
- [PowerSploit](https://github.com/PowerShellMafia/PowerSploit) - PowerSploit - A PowerShell Post-Exploitation Framework. :star:6187
- [proxystrike](https://github.com/qunxyz/proxystrike) - Automatically exported from code.google.com/p/proxystrike. :star:0
- [FakeImageExploiter](https://github.com/r00t-3xp10it/FakeImageExploiter) - Use a Fake image.jpg to exploit targets (hide known file extensions). :star:444
- [Meterpreter_Paranoid_Mode-SSL](https://github.com/r00t-3xp10it/Meterpreter_Paranoid_Mode-SSL) - Meterpreter Paranoid Mode - SSL/TLS connections. :star:227
- [morpheus](https://github.com/r00t-3xp10it/morpheus) - Morpheus - Automating Ettercap TCP/IP (MITM-hijacking Tool). :star:577
- [trojanizer](https://github.com/r00t-3xp10it/trojanizer) - Trojanize your payload - WinRAR (SFX) automatization - under Linux distros. :star:218
- [ExploitOnCLI](https://github.com/r00tmars/ExploitOnCLI) - Trying to be the best tool to search for exploits in the terminal.. :star:9
- [XPL-SEARCH](https://github.com/r00tmars/XPL-SEARCH) - Search exploits in multiple exploit databases!. :star:1
- [MyServer](https://github.com/Rajkumrdusad/MyServer) - MyServer is your own localhost web server. you can setup PHP, Apache, Nginx and MySQL servers on your android devices or linux like Ubuntu etc. MyServer is Developed for android terminal like Termux or GNURoot Debian terminal.. :star:50
- [Tool-X](https://github.com/Rajkumrdusad/Tool-X) - Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other android terminals. using Tool-X you can install almost 370+ hacking tools in termux app and other linux based distributions.. :star:750
- [ezsploit](https://github.com/rand0m1ze/ezsploit) - Linux bash script automation for metasploit. :star:205
- [binwalk](https://github.com/ReFirmLabs/binwalk) - Firmware Analysis Tool. :star:5185
- [routersploit](https://github.com/threat9/routersploit) - Exploitation Framework for Embedded Devices. :star:7522
- [shellnoob](https://github.com/reyammer/shellnoob) - A shellcode writing toolkit. :star:509
- [joomscan](https://github.com/rezasp/joomscan) - OWASP Joomla Vulnerability Scanner Project. :star:494
- [shell-scan](https://github.com/Rhi7/shell-scan) - Look for a backdoor shell on the website. :star:2
- [catphish](https://github.com/ring0lab/catphish) - CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM. . :star:475
- [killerbee](https://github.com/riverloopsec/killerbee) - IEEE 802.15.4/ZigBee Security Research Toolkit. :star:445
- [masscan](https://github.com/robertdavidgraham/masscan) - TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.. :star:11412
- [intrace](https://github.com/robertswiecki/intrace) - Enumeration of IP hops using existing TCP connections. :star:35
- [jsql-injection](https://github.com/ron190/jsql-injection) - jSQL Injection is a Java application for automatic SQL database injection.. :star:677
- [arp-scan](https://github.com/royhills/arp-scan) - The ARP Scanner. :star:327
- [killchain](https://github.com/ruped24/killchain) - A unified console to perform the "kill chain" stages of attacks.. :star:112
- [eaphammer](https://github.com/s0lst1c3/eaphammer) - Targeted evil twin attacks against WPA2-Enterprise networks. Indirect wireless pivots using hostile portal attacks.. :star:1017
- [Blazy](https://github.com/s0md3v/Blazy) - Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .. :star:549
- [Hash-Buster](https://github.com/s0md3v/Hash-Buster) - Crack hashes in seconds.. :star:760
- [sqlmate](https://github.com/s0md3v/sqlmate) - A friend of SQLmap which will do what you always expected from SQLmap.. :star:259
- [Striker](https://github.com/s0md3v/Striker) - Striker is an offensive information and vulnerability scanner.. :star:1370
- [XSStrike](https://github.com/s0md3v/XSStrike) - Most advanced XSS scanner.. :star:7392
- [EasY_HaCk](https://github.com/sabri-zaki/EasY_HaCk) - Hack the World using Termux. :star:125
- [nishang](https://github.com/samratashok/nishang) - Nishang - Offensive PowerShell for red team, penetration testing and offensive security. . :star:3405
- [pwnat](https://github.com/samyk/pwnat) - The only tool and technique to punch holes through firewalls/NATs where both clients and server can be behind separate NATs without any 3rd party involvement. Pwnat uses a newly developed technique, exploiting a property of NAT translation tables, with no 3rd party, port forwarding, DMZ, router administrative requirements, STUN/TURN/UPnP/ICE, or spoofing required.. :star:1568
- [kojawafft](https://github.com/sandalpenyok/kojawafft) - newfft. :star:7
- [DDosy](https://github.com/Sanix-Darker/DDosy) - Perform a Ddos attack with Threads (Educational purpose). :star:2
- [fern-wifi-cracker](https://github.com/savio-code/fern-wifi-cracker) - Automatically exported from code.google.com/p/fern-wifi-cracker. :star:460
- [ghost-phisher](https://github.com/savio-code/ghost-phisher) - Automatically exported from code.google.com/p/ghost-phisher. :star:185
- [Brutal](https://github.com/Screetsec/Brutal) - Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy ). :star:540
- [Dracnmap](https://github.com/Screetsec/Dracnmap) - Dracnmap is an open source program which is using to exploit the network and gathering information with nmap help. Nmap command comes with lots of options that can make the utility more robust and difficult to follow for new users. Hence Dracnmap is designed to perform fast scaning with the utilizing script engine of nmap and nmap can perform various automatic scanning techniques with the advanced commands.. :star:787
- [LALIN](https://github.com/Screetsec/LALIN) - this script automatically install any package for pentest with uptodate tools , and lazy command for run the tools like lazynmap , install another and update to new #actually for lazy people hahaha #and Lalin is remake the lazykali with fixed bugs , added new features and uptodate tools . It's compatible with the latest release of Kali (Rolling). :star:310
- [TheFatRat](https://github.com/Screetsec/TheFatRat) - Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .. :star:3339
- [Vegile](https://github.com/Screetsec/Vegile) - This tool will setting up your backdoor/rootkits when backdoor already setup it will be hidden your spesisifc process,unlimited your session in metasploit and transparent. Even when it killed, it will re-run again. There always be a procces which while run another process,So we can assume that this procces is unstopable like a Ghost in The Shell. :star:374
- [the-backdoor-factory](https://github.com/secretsquirrel/the-backdoor-factory) - Patch PE, ELF, Mach-O binaries with shellcode (NOT Supported). :star:2386
- [termineter](https://github.com/securestate/termineter) - Smart Meter Security Testing Framework. :star:166
- [kwetza](https://github.com/sensepost/kwetza) - Python script to inject existing Android applications with a Meterpreter payload.. :star:468
- [D-TECT-1](https://github.com/shawarkhanethicalhacker/D-TECT-1) - D-TECT - Pentesting the Modern Web. :star:27
- [smbmap](https://github.com/ShawnDEvans/smbmap) - SMBMap is a handy SMB enumeration tool. :star:722
- [slowhttptest](https://github.com/shekyan/slowhttptest) - Application Layer DoS attack simulator. :star:769
- [johnny](https://github.com/shinnok/johnny) - The GUI frontend to the John the Ripper password cracker. :star:209
- [HT-WPS-Breaker](https://github.com/SilentGhostX/HT-WPS-Breaker) - HT-WPS Breaker (High Touch WPS Breaker). :star:549
- [PwnSTAR](https://github.com/SilverFoxx/PwnSTAR) - PwnSTAR (Pwn SofT-Ap scRipt) - for all your fake-AP needs!. :star:216
- [termux-wordpresscan](https://github.com/silverhat007/termux-wordpresscan) - No description provided :star:0
- [bulk_extractor](https://github.com/simsong/bulk_extractor) - This is the development tree. For downloads please see:. :star:383
- [uidsploit](https://github.com/siruidops/uidsploit) - The Uidsploit Framework | Penetration Test Tool. :star:2
- [fuckshitup](https://github.com/Smaash/fuckshitup) - php-cli vulnerability scanner. :star:60
- [snitch](https://github.com/Smaash/snitch) - information gathering via dorks. :star:255
- [Zerodoor](https://github.com/Souhardya/Zerodoor) - A script written lazily for generating cross-platform backdoors on the go :) . :star:151
- [deblaze](https://github.com/SpiderLabs/deblaze) - Performs method enumeration and interrogation against flash remoting end points.. :star:28
- [jboss-autopwn](https://github.com/SpiderLabs/jboss-autopwn) - A JBoss script for obtaining remote shell access. :star:150
- [sqlmap](https://github.com/sqlmapproject/sqlmap) - Automatic SQL injection and database takeover tool. :star:15814
- [termux-sudo](https://github.com/st42/termux-sudo) - A bash script that provides sudo for Termux. :star:259
- [DSSS](https://github.com/stamparm/DSSS) - Damn Small SQLi Scanner. :star:382
- [DSVW](https://github.com/stamparm/DSVW) - Damn Small Vulnerable Web. :star:464
- [DSXS](https://github.com/stamparm/DSXS) - Damn Small XSS Scanner. :star:301
- [kalibrate-rtl](https://github.com/steve-m/kalibrate-rtl) - fork of http://thre.at/kalibrate/ for use with rtl-sdr devices. :star:271
- [Gloom-Framework](https://github.com/StreetSec/Gloom-Framework) - Gloom-Framework :: Linux Penetration Testing Framework. :star:14
- [nikto](https://github.com/sullo/nikto) - Nikto web server scanner. :star:3440
- [cpscan](https://github.com/SusmithKrishnan/cpscan) - website admin panel finder. :star:19
- [torghost](https://github.com/SusmithKrishnan/torghost) - Tor anonimizer. :star:245
- [Wordpresscan](https://github.com/swisskyrepo/Wordpresscan) - WPScan rewritten in Python + some WPSeku ideas. :star:349
- [IP-FY](https://github.com/T4P4N/IP-FY) - Gathers information about a Particular IP address. :star:2
- [reaver-wps-fork-t6x](https://github.com/t6x/reaver-wps-fork-t6x) - No description provided :star:1037
- [leviathan](https://github.com/utkusen/leviathan) - wide range mass audit toolkit. :star:811
- [websploit](https://github.com/The404Hacking/websploit) - Websploit is an advanced MITM framework.. :star:25
- [hacktronian](https://github.com/thehackingsage/hacktronian) - All in One Hacking Tool for Linux & Android. :star:418
- [EagleEye](https://github.com/ThoughtfulDev/EagleEye) - Stalk your Friends. Find their Instagram, FB and Twitter Profiles using Image Recognition and Reverse Image Search.. :star:1120
- [CHAOS](https://github.com/tiagorlampert/CHAOS) - :fire: CHAOS is a PoC that allow generate payloads and control remote operating systems.. :star:826
- [sAINT](https://github.com/tiagorlampert/sAINT) - :eye: (s)AINT is a Spyware Generator for Windows systems written in Java. [Discontinued]. :star:387
- [yersinia](https://github.com/tomac/yersinia) - A framework for layer 2 attacks. :star:311
- [ridenum](https://github.com/trustedsec/ridenum) - Rid_enum is a null session RID cycle attack for brute forcing domain controllers.. :star:153
- [social-engineer-toolkit](https://github.com/trustedsec/social-engineer-toolkit) - The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.. :star:4947
- [CMSeeK](https://github.com/Tuhinshubhra/CMSeeK) - CMS Detection and Exploitation suite - Scan WordPress, Joomla, Drupal and over 170 other CMSs. :star:923
- [fbvid](https://github.com/Tuhinshubhra/fbvid) - Facebook Video Downloader (CLI) For Linux Systems Coded in PHP. :star:10
- [RED_HAWK](https://github.com/Tuhinshubhra/RED_HAWK) - All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers. :star:1097
- [shellstack](https://github.com/Tuhinshubhra/shellstack) - A PHP Based Tool That Helps You To Manage All Your Backdoored Websites Efficiently.. :star:77
- [Androspy](https://github.com/Cyb0r9/Androspy) - Androspy framework is a Backdoor Crypter & Creator with Automatic IP Poisener. :star:83
- [SocialBox](https://github.com/Cyb0r9/SocialBox) - SocialBox is a Bruteforce Attack Framework [ Facebook , Gmail , Instagram ,Twitter ] , Coded By Belahsan Ouerghi. :star:291
- [gasmask](https://github.com/twelvesec/gasmask) - Information gathering tool - OSINT. :star:307
- [Blazy](https://github.com/s0md3v/Blazy) - Blazy is a modern login bruteforcer which also tests for CSRF, Clickjacking, Cloudflare and WAF .. :star:549
- [Breacher](https://github.com/s0md3v/Breacher) - An advanced multithreaded admin panel finder written in python.. :star:271
- [Hash-Buster](https://github.com/s0md3v/Hash-Buster) - Crack hashes in seconds.. :star:760
- [ReconDog](https://github.com/s0md3v/ReconDog) - Reconnaissance Swiss Army Knife. :star:859
- [sqlmate](https://github.com/s0md3v/sqlmate) - A friend of SQLmap which will do what you always expected from SQLmap.. :star:259
- [Striker](https://github.com/s0md3v/Striker) - Striker is an offensive information and vulnerability scanner.. :star:1370
- [XSStrike](https://github.com/s0md3v/XSStrike) - Most advanced XSS scanner.. :star:7392
- [EvilURL](https://github.com/UndeadSec/EvilURL) - Generate unicode evil domains for IDN Homograph Attack and detect them.. :star:435
- [GoblinWordGenerator](https://github.com/UndeadSec/GoblinWordGenerator) - Python wordlist generator . :star:27
- [SocialFish](https://github.com/UndeadSec/SocialFish) - Educational Phishing Tool & Information Collector . :star:1337
- [bing-ip2hosts](https://github.com/urbanadventurer/bing-ip2hosts) - bingip2hosts is a Bing.com web scraper that discovers websites by IP address. :star:3
- [WhatWeb](https://github.com/urbanadventurer/WhatWeb) - Next generation web scanner. :star:2088
- [CredSniper](https://github.com/ustayready/CredSniper) - CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA tokens.. :star:838
- [airgeddon](https://github.com/v1s1t0r1sh3r3/airgeddon) - This is a multi-use bash script for Linux systems to audit wireless networks.. :star:2270
- [thc-ipv6](https://github.com/vanhauser-thc/thc-ipv6) - IPv6 attack toolkit. :star:553
- [sniffjoke](https://github.com/vecna/sniffjoke) - a client-only layer of protection from the wiretap/sniff/IDS analysis. :star:72
- [termux-lazysqlmap](https://github.com/verluchie/termux-lazysqlmap) - SQLMAP for Lazy People on Termux. :star:23
- [volatility](https://github.com/volatilityfoundation/volatility) - An advanced memory forensics framework. :star:3261
- [websploit](https://github.com/websploit/websploit) - websploit is an advanced MITM framework. :star:288
- [air-hammer](https://github.com/Wh1t3Rh1n0/air-hammer) - No description provided :star:162
- [wifiphisher](https://github.com/wifiphisher/wifiphisher) - The Rogue Access Point Framework. :star:8422
- [pixiewps](https://github.com/wiire-a/pixiewps) - An offline Wi-Fi Protected Setup brute-force utility. :star:986
- [PiDense](https://github.com/WiPi-Hunter/PiDense) - Γ°ΕΈΒβ€œΓ°ΕΈβ€œΒ‘Γ°ΕΈΒΒMonitor illegal wireless network activities. (Fake Access Points), (WiFi Threats: KARMA Attacks, WiFi Pineapple, Similar SSID, OPN Network Density etc.). :star:259
- [doona](https://github.com/wireghoul/doona) - Network based protocol fuzzer. :star:42
- [dotdotpwn](https://github.com/wireghoul/dotdotpwn) - DotDotPwn - The Directory Traversal Fuzzer. :star:427
- [wpscan](https://github.com/wpscanteam/wpscan) - WPScan is a free, for non-commercial use, black box WordPress Vulnerability Scanner written for security professionals and blog maintainers to test the security of their WordPress websites.. :star:4539
- [brutespray](https://github.com/x90skysn3k/brutespray) - Brute-Forcing from Nmap output - Automatically attempts default creds on found services.. :star:842
- [fbi](https://github.com/xHak9x/fbi) - Facebook Information. :star:213
- [A-Rat](https://github.com/Xi4u7/A-Rat) - No description provided :star:42
- [wfuzz](https://github.com/xmendez/wfuzz) - Web application fuzzer. :star:2406
- [giskismet](https://github.com/xtr4nge/giskismet) - giskismet Γ’β‚¬β€œ Wireless recon visualization tool. :star:22
- [Cookie-stealer](https://github.com/Xyl2k/Cookie-stealer) - Crappy cookie stealer. :star:21
- [cdpsnarf](https://github.com/Zapotek/cdpsnarf) - CDPSnarf is a network sniffer exclusively written to extract information from CDP (Cisco Discovery Protocol) packets. . :star:21
- [zaproxy](https://github.com/zaproxy/zaproxy) - The OWASP ZAP core project. :star:6679
- [koadic](https://github.com/zerosum0x0/koadic) - Koadic C3 COM Command & Control - JScript RAT. :star:1517
- [webpwn3r](https://github.com/zigoo0/webpwn3r) - WebPwn3r - Web Applications Security Scanner.. :star:241
πŸ¦‘ BIGGEST LIST OF TERMUX & LINUX SCRIPTS
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ¦‘ BIN FACEBOOK ADS

5306920x08xx7860

IP: USA

Zip Code : 90210

> how use bin : https://t.me/UnderCodeTesting/3768

> cc generators 2020 : https://t.me/UnderCodeTesting/3411

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How DNS pan-resolution is used by hackers ?

The creation of DNS is a major work of network masters. According to DNS, many netizens can browse relative URLs according to the domain name of the website. In that way, you only need to remember the domain name of the website, not the complicated IP address. For example, people often browse www.vants.org, the whole process of DNS analysis is as follows:
1) As you can see in the figure, DNS analysis is very portable. It uses UDP protocol, a DNS search packet, a response packet, and 2 packets.


2) It is simple, lightweight, and efficient. However, in the whole process of the specific process, a problem is often encountered: in the case of typing the domain name of the website, such as www.vants.org, accidentally type one more w to become wwwwant.org, in that case, can everything be analyzed normally? I did a test, type wwww.vants.org in the computer browser, the computer browser immediately error "cannot open this website"
3) People discussed the DNS analysis steps. The mobile client carried out a DNS search. After the DNS server query, it returned a result "NOsuchnameAwwww.vants.org". After seeing the DNS server virtual machine search, the search did not find that result.

4) Why is www.vants.org not able to analyze relative IP? The reason is very simple, DNS has no relative equipment, but in practice, there is no doubt that there are often situations where customers type incorrect domain name prefixes. If the website tester considers sufficient personalization, it can be equipped with a DNS analysis record.

> A default setting analyzes the results. In maintaining DNS, there is indeed such a system. This is called DNS pan-resolution.

5) Now that there is a system of DNS pan-analysis, there is no doubt that there will be relative applications in specific daily life. So people come to test, first use google for surgery, type a second-level domain name to see if everything is normal analysis, analysis is not possible; then undercode knows, it is also not analyzed.

6) The two major oligarchs are not compatible with pan-resolution. Searching Huaming Town again, the company infiltrated the gods and dismissed a batch of website domain names that have opened pan-resolution.

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
How DNS pan-resolution is used by hackers guide
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Clone SIM card using SIM Cloning Tool :
fb.com/UndercodeTesting

πŸ¦‘ 𝕃𝔼𝕋'π•Š π•Šπ•‹π”Έβ„π•‹ :

> This program is used to view a lot of information that is normally hidden or appears as deleted on our phone. Devices save important evidence in criminal cases and agencies around the world need the necessary tools advantage to help catch criminals and in many cases, devices have important proofs that professionals require to catching the correct person and those proofs can be used in the court with specific information details on it like call history, contacts, messages, photos, voice recordings, video, and more.

> With just one click, the software collects all possible part from the target device and generates comprehensive details on a computer that can be stored or printed.


πŸ¦‘ How to clone a SIM card using SIM Cloning Tool – Mobiledit Forensic? Check the following steps:

Step 1: Download the software to your computer.

Step 2: Remove the SIM card from the device.

Step 3: Insert it to the SIM Card Clone Device and connect it to the computer.

Step 4: Run the SIM Clone tool from the main toolbar. The SIM Clone window will appear and you are ready to clone the SIM card.

Step 5: Click on the Read SIM button to read the content of the original SIM card. The data will be read and you can choose which data you wish to copy.

Step 6: When the writable SIM card is inserted, Write SIM button will be enabled. Wait until the process is done.

BY DR. fone
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ HOW CLONE SIM CARD METHODE 2 :
T.me/UndercodeTesting

> How to clone SIM card using programmable cards :


> A SIM cloning can serve as a backup in case you lose or steal your mobile phone, or given the circumstances in which you need to solve problems related to the space of the calendar, text messages or others.

> Here we will teach you to use programmable cards to clone a SIM card but first, we want to explain to you that not all SIM cards can be cloned,
πŸ¦‘ just check the following differences:

COMP128v1: this kind of cards can be cloned easily.
COMP128v2: this contains a secure firmware making the cloning a really hard work.

> To perform this task, you will need certain components such as the following:

1. Blank SIM programmable Cards: These cards do not have phone numbers and you can purchase them online.

2. A SIM Firmware Writer: It allows you to copy many different numbers to one SIM card.

3. Download Woron Scan: Software for Reading

4. The target’s SIM for at least 30 minutes.

Now, proceed to follow the next steps to know how to clone a SIM card with a programmable card:

Step 1: connect the SIM Reader, install the Woron software and get the target’s SIM.

Step 2: Configure the software to clone SIM card.

Step 3: Run the IMSI Search. When the results appear, write them down and proceed to start the ICC Search and also write down the ICC number.

πŸ¦‘ Now Run the KI search and after it finishes, remove the target’s SIM card.

clone SIM card-Run the KI search

Step 4: Now is necessary to download the software SIM-EMU to write settings on Blank SIM Card, so insert it and wait a moment and run SIM-EMU and go to configure tab and add all the info obtained from the Woron scan process such as IMSI, KI, ICC and for the rest info, add:

For ADN/SMS/FDN# (ADN= Abbreviated Dialing No./

SMS = No. of SMSes stored on SIM /

FDN = Fixed Dialing No.) Enter: 140 / 10 / 4

For the phone number, it should be with an International Format, for example: for Argentina +54 (the international code) 99999999999 (the number)

clone SIM card-write settings on Blank SIM Card

Step 5: Let The Writing Begin, Select the Write To Disk button and Name the File: SuperSIM.HEX. A write EEPROM file window will appear. Name the EEPROM file SuperSIM_EP.HEX and click the Save button.

clone SIM card-Name the File

Step 6: Now We Flash the files on Blank SIM Card so install the card that came with the card writer and adds the required files in the appropriate fields

clone SIM card-install the card

Step 7: run the writing task, Click on done when it has completed and the SIM cloning is ready.

BY DR. fone posted on undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ SIM CARD CLONING TWO METHODES