UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Programming
> technology-best compilation parameters for different CPUs by undercode
t.me/undercodeTesting

πŸ¦‘π•ƒπ”Όπ•‹'π•Š π•Šπ•‹π”Έβ„π•‹ :


> gcc has different compilation effects under different architectures / CPUs, and you need to use different Compile parameters to achieve the best results.

1. Version 1.2 (gcc version 2.9.x)

-pipe -fomit-frame-pointer "
CXXFLAGS ="-march = i486 -O3 -pipe -fomit-frame-pointer "

Pentium, Pentium MMX +, Celeron (Mendocino) (Intel)
CHOST = "i586-pc-linux-gnu"
CFLAGS = "-march = pentium -O3 -pipe -fomit-frame-pointer"
CXXFLAGS = "-march = pentium -O3 -pipe -fomit-frame-pointer"

Pentium Pro / II / III / 4, Celeron (Coppermine), Celeron (Willamette?) (Intel)
CHOST = "i686-pc-linux-gnu"
CFLAGS = "-march = i686 -O3 -pipe -fomit-frame-pointer"
CXXFLAGS = "


CHOST="i586-pc-linux-gnu"
CFLAGS="-march=i586 -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=i586 -O3 -pipe -fomit-frame-pointer"

Quote : I did the original gentoo install using 1.2, with gcc 2.95 using -march=i586. i686 won't work.

K6 or beyond (AMD)
CHOST="i586-pc-linux-gnu"
CFLAGS="-march=k6 -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=k6 -O3 -pipe -fomit-frame-pointer"

(A Duron will report "Athlon" in its /proc/cpuinfo)

Athlon (AMD)
CHOST="i686-pc-linux-gnu"
CFLAGS="-march=k6 -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=k6 -O3 -pipe -fomit-frame-pointer"

For the following, i don't know of any flag that enhance performances..., do you ?

PowerPC
CHOST="powerpc-unknown-linux-gnu"
CFLAGS="-O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-O3 -pipe -fomit-frame-pointer"

Sparc
CHOST="sparc-unknown-linux-gnu"
CFLAGS="-O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-O3 -pipe -fomit-frame-pointer"

Sparc 64
CHOST="sparc64-unknown-linux-gnu"
CFLAGS="-O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-O3 -pipe -fomit-frame-pointer"


δΊŒγ€1.4η‰ˆ(gcc 3.xη‰ˆ):


i386 (Intel), do you really want to install gentoo on that ?
CHOST="i386-pc-linux-gnu"
CFLAGS="-march=i386 -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=i386 -O3 -pipe -fomit-frame-pointer"

i486 (Intel), do you really want to install gentoo on that ?
CHOST="i486-pc-linux-gnu"
CFLAGS="-march=i486 -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=i486 -O3 -pipe -fomit-frame-pointer"

Pentium 1 (Intel)
CHOST="i586-pc-linux-gnu"
CFLAGS="-march=pentium -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=pentium -O3 -pipe -fomit-frame-pointer"

Pentium MMX (Intel)
CHOST="i586-pc-linux-gnu"
CFLAGS="-march=pentium-mmx -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=pentium-mmx -O3 -pipe -fomit-frame-pointer"

Pentium PRO (Intel)
CHOST="i686-pc-linux-gnu"
CFLAGS="-march=pentiumpro -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=pentiumpro -O3 -pipe -fomit-frame-pointer"

Pentium II (Intel)
CHOST="i686-pc-linux-gnu"
CFLAGS="-march=pentium2 -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=pentium2 -O3 -pipe -fomit-frame-pointer"

Celeron (Mendocino), aka Celeron1 (Intel)
CHOST="i686-pc-linux-gnu"
CFLAGS="-march=pentium2 -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=pentium2 -O3 -pipe -fomit-frame-pointer"

Pentium III (Intel)
CHOST="i686-pc-linux-gnu"
CFLAGS="-march=pentium3 -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=pentium3 -O3 -pipe -fomit-frame-pointer"

Celeron (Coppermine) aka Celeron2 (Intel)
CHOST="i686-pc-linux-gnu"
CFLAGS="-march=pentium3 -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=pentium3 -O3 -pipe -fomit-frame-pointer"

Celeron (Willamette?) (Intel)
CHOST="i686-pc-linux-gnu"
CFLAGS="-march=pentium4 -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=pentium4 -O3 -pipe -fomit-frame-pointer"

Pentium 4 (Intel)
CHOST="i686-pc-linux-gnu"
CFLAGS="-march=pentium4 -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=pentium4 -O3 -pipe -fomit-frame-pointer"

Eden C3/Ezra (Via)
CHOST="i586-pc-linux-gnu"
CFLAGS="-march=i586 -m3dnow -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=i586 -m3dnow -O3 -pipe -fomit-frame-pointer"

quote : the ezra doesn't have any special instructions that you could optimize for, just consider is a K6-3...basically
a p2 with 3dnow
K6 (AMD)
CHOST="i586-pc-linux-gnu"
CFLAGS="-march=k6 -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=k6 -O3 -pipe -fomit-frame-pointer"

K6-2 (AMD)
CHOST="i586-pc-linux-gnu"
CFLAGS="-march=k6-2 -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=k6-2 -O3 -pipe -fomit-frame-pointer"

K6-3 (AMD)
CHOST="i586-pc-linux-gnu"
CFLAGS="-march=k6-3 -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=k6-3 -O3 -pipe -fomit-frame-pointer"

Athlon (AMD)
CHOST="i686-pc-linux-gnu"
CFLAGS="-march=athlon -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=athlon -O3 -pipe -fomit-frame-pointer"

Athlon-tbird, aka K7 (AMD)
CHOST="i686-pc-linux-gnu"
CFLAGS="-march=athlon-tbird -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=athlon-tbird -O3 -pipe -fomit-frame-pointer"

Athlon-tbird XP (AMD)
CHOST="i686-pc-linux-gnu"
CFLAGS="-march=athlon-xp -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=athlon-xp -O3 -pipe -fomit-frame-pointer"

Athlon 4(AMD)
CHOST="i686-pc-linux-gnu"
CFLAGS="-march=athlon-4 -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=athlon-4 -O3 -pipe -fomit-frame-pointer"

Athlon XP (AMD)
CHOST="i686-pc-linux-gnu"
CFLAGS="-march=athlon-xp -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=athlon-xp -O3 -pipe -fomit-frame-pointer"

Athlon MP (AMD)
CHOST="i686-pc-linux-gnu"
CFLAGS="-march=athlon-mp -O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-march=athlon-mp -O3 -pipe -fomit-frame-pointer"

603 (PowerPC)
CHOST="powerpc-unknown-linux-gnu"
CFLAGS="-O3 -pipe -fomit-frame-pointer -fsigned-char"
CXXFLAGS="-O3 -pipe -fomit-frame-pointer -fsigned-char"

603e (PowerPC)
CHOST="powerpc-unknown-linux-gnu"
CFLAGS="-O3 -pipe -fomit-frame-pointer -fsigned-char"
CXXFLAGS="-O3 -pipe -fomit-frame-pointer -fsigned-char"

604 (PowerPC)
CHOST="powerpc-unknown-linux-gnu"
CFLAGS="-O3 -pipe -fomit-frame-pointer -fsigned-char"
CXXFLAGS="-O3 -pipe -fomit-frame-pointer -fsigned-char"

604e (PowerPC)
CHOST="powerpc-unknown-linux-gnu"
CFLAGS="-O3 -pipe -fomit-frame-pointer -fsigned-char"
CXXFLAGS="-O3 -pipe -fomit-frame-pointer -fsigned-char"

750 aka as G3 (PowerPC)
CHOST="powerpc-unknown-linux-gnu"
CFLAGS="-mcpu=750 -O3 -pipe -fomit-frame-pointer
-fsigned-char"
CXXFLAGS="-mcpu=750 -O3 -pipe -fomit-frame-pointer
-fsigned-char"

Note: do not use -march=

7400, aka G4 (PowerPC)
CHOST="powerpc-unknown-linux-gnu"
CFLAGS="-mcpu=7400 -O3 -pipe -fomit-frame-pointer
-fsigned-char -maltivec"
CXXFLAGS="-mcpu=7400 -O3 -pipe -fomit-frame-pointer
-fsigned-char -maltivec"

Note: do not use -march=

7450, aka G4 second generation (PowerPC)
CHOST="powerpc-unknown-linux-gnu"
CFLAGS="-mcpu=7450 -O3 -pipe -fomit-frame-pointer
-fsigned-char -maltivec"
CXXFLAGS="-mcpu=7450 -O3 -pipe -fomit-frame-pointer
-fsigned-char -maltivec"

Note: do not use -march=

PowerPC (If you don't know which one)
CHOST="powerpc-unknown-linux-gnu"
CFLAGS="-O3 -pipe -fomit-frame-pointer -fsigned-char"
CXXFLAGS="-O3 -pipe -fomit-frame-pointer -fsigned-char"

Sparc
CHOST="sparc-unknown-linux-gnu"
CFLAGS="-O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-O3 -pipe -fomit-frame-pointer"

Sparc 64
CHOST="sparc64-unknown-linux-gnu"
CFLAGS="-O3 -pipe -fomit-frame-pointer"
CXXFLAGS="-O3 -pipe -fomit-frame-pointer"

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘full (Programming) technology-best compilation parameters for different CPUs by undercode
Forwarded from TARJETAS PRO UNDER CARDING
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘QQ password + mailbox password = method for breaking QQ second-generation password protection:
youtube.com/undercode

πŸ¦‘π•ƒπ”Όπ•‹'π•Š π•Šπ•‹π”Έβ„π•‹ :

1) bring it on. Just got the ground, everyone looks at the operation, first enter dna.qq.com to log in, I have logged in, click to send to the mailbox, this email titled "Password Protection Information" has been sent to m ***** @ 163.com, this email is very important, please keep it confidential and keep it properly.


2) example I sent it to the mailbox. I can only see one letter at the beginning of the mailbox for a letter. I came to this Q information or business to find it. The mailbox mlqiji@163.com is this. Of course, some QQ is not set here. For the sake of speed, I only open this one. When you break it in the future, you can look for business or other places, and then enter the mailbox to confirm.

> Dear QQ users:

Hello!

According to your request submitted at [2011-01-03 14:28:16], the following will send you the password protection (DNA) information of QQ account [10 *******]:

Confidential question 1: What is your mother ’s name?
Answer: *******
Confidential question 2: What is your father ’s name?
Answer: *****
Confidential question 2: What is your birthplace?
Answer: **** *
Security phone: 135 ******* 7
Name: *****
ID number: 2 *************

3) See it, sent it over, it turns out to be this mailbox, and then click on, confidential question

Has been set

[Verify and modify immediately] Click to modify. Of course, we do not know the password. Enter the QQ password. The email has been sent to the secure mailbox you specified.

To reset the confidential question, go to the inbox where you can receive the e-mail, open the message titled "Reset QQ Account Confidential Question", and follow the instructions.

I sent it to the mailbox, refreshed it, received it, the network speed is relatively slow, wait a minute, see it, you can modify the settings without the previous prompt answers, congratulations, the secret question is set successfully!

Confidentiality issues are important credentials for password changes and sensitive information changes, please bear in mind.

πŸ¦‘ The modification is successful, click on my account, you can modify the mobile phone verification through security question modification, as long as the prompt answer is added,

Original mobile phone number:

Original document number:

There is no need to add these two, because there is no * in the back,

New mobile phone number: *

The verification code you received:

This input

Then it's ok, it's as simple as breaking the second generation of protection!

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘INSTALL ALL KALI-PARROT-UBUNTU TOOLS ON TERMUX :
Onex is a library of all hacking tools for Termux and other Linux distribution
t.me/undercodeTesting

πŸ¦‘π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) apt update

2) apt install git

3) git clone https://github.com/rajkumardusad/onex.git

4) chmod +x onex/install

5) sh onex/install if not work than use ./onex/install

πŸ¦‘HOW TO USE :

CLI Mode :
onex -h or onex help for help.

Options :

onex install [tool_name] install any tool.
onex -i [tool_name] install any tool.
onex search [tool_name] search any tool.
onex -s [tool_name] search any tool.
onex list list all tools.
onex list -a list all tools.
onex -l list all tools.
onex -l -a list all tools.
onex help get help.
onex -h get help.
Menu Mode :
onex start to start onex menu mode.

Enter a Number for a specific output:

(1) : To show all available tools and type the number of a tool which you want to install.
(2) : To show tools category.
(3) : If you want to update onex.
(4) : If you want to know About Us.
(5) : To exit the tool.


βœ… VERIFIED BY UNDERCODE
@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Paid Netflix alternatives :

1) Amazon Prime Video: Β£79 a year or 7.99 a month. Full Prime package also includes free one-hour/one-day delivery on Amazon items, access to thousands of e-books, films, TV shows (including Top Gear) and songs though Amazon's extensive media library. See our Amazon Prime FAQ to discover more.


2) NOW TV: Passes start from Β£3.99 a month or you can invest in a one off box for around Β£20. The box will turn your TV into a smart device using its USB plug-in. Users can then purchase 24-hour and 30-day Sky passes ad hoc for football matches, movies and entertainment contract free.

2) YouTube Premium: Β£11.99 a month. YouTube Premium gives you access to TV shows, series, films and music ad-free and you can also access offline from a number of platforms. It's also contract free and you can watch without any obligations and under no time constraints.

3) Sky TV: Sky's Original TV bundle starts at Β£25 a month - and the deal includes its new Sky Q, next generation box. The package includes catch up TV, Sky+ and Sky Go, as well as usual suspects Sky Atlantic, itv Encore and even Netflix. Find out more about the Sky TV Original Package here.

4)Disney+: Β£5.99 a month or Β£59 a year. Includes access to Disney's huge back catalogue of films, series and box sets as well as content from Pixar, Star Wars, Marvel and National Geographic.

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Best free Netflix alternatives :
twitter.com/undercodeNews

1) Vimeo: You're unlikely to find anything you've ever heard of at Vimeo, but it's worth diving into for indie and independent films like Thunder Road and A Fighting Chance. Check out their staff picks for inspiration.
> www.vimeo.com/

2) YouTube: At 800 million unique visitors per month, with roughly 72 hours of content being uploaded each minute, YouTube is by far the most used video-sharing platform on the web. Get yourself a Google account and you can watch (and upload) TV shows and video content on its platform for free.

3) SkyGo: If you (or mum and dad) have a Sky account, you can actually log-in on any desktop, mobile or tablet on the go and watch or catch up on TV shows (included in your plan) for free. Ideal for students, all you need is your membership login details to get watching.
> https://www.sky.com/shop/tv/sky-go/

4) iPlayer: BBC iPlayer has a vast movie library available at your fingertips online. It's also great for documentaries. The service's video library covers just about every genre - including Sherlock and Killing Eve. You will need a TV Licence to watch it, though.
> https://www.bbc.co.uk/iplayer

5) ITV Player and All 4: You'll need log-in details to access these services, but again, they're free to watch. Both feature a long list of films, documentaries, dramas and reality TV shows like Derry Girls and Love Island.
> https://www.itv.com/

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Bypass Chrome password management, check the saved password of browser, pay attention to computer security
T.ME/UNDERCODETesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

> In the office or other places, when a colleague or friend is out of business, the computer leaves the seat without a lock screen, you can use this gap to view his account password saved on the Chrome browser.

1) Enter chrome: // settings / passwords in the address bar to view a list of all saved passwords

2) Come out this interface:


Click the eye logo to pop up the Google Chrome protection password.


3) Use the mobile 10086 website for testing here, click on the website 10086.cn


4) Enter this interface, see if there is, the password is invisible:

5) Position the mouse pointer to the SMS password box, right-click [Check], or [Ctrl + Shift + i], and the code window will come out. If it is not easy to find, you can position the mouse pointer to the password input box again Right mouse button 【Check】

6) Rewrite type = "password" to type = "Text", and then look at the password box to see the password.

7) Firefox browser in [Settings]-[Options]-[Security]-[Saved Security Information]-[Display Password], you can directly view the password, without any credentials, so it is best not to get used to the public computer It is good to save the password, and the personal computer should also be safe.

8) For the sake of convenience, many people like to save passwords with their browsers for the next use, but they must be security-conscious. People are no longer at the computer and remember to lock the screen. If you like it, just give it a follower!

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Memory read crack QQ password full
instagram.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) We complete the QQ login by entering the correct account password. In this process, in addition to sending the account password to the server for verification, QQ will also store at least one hash value of the password in memory.

2) This value can be After the verification of some access, such as opening QQ games. We need to obtain the QQ password by reading from the memory, we first need to know where the QQ password hash value is placed in the memory. Of course, we do not need to program the location of the hash value ourselves.

3) There is an open source software called Cheat Engine, which was originally used to cheat when playing games, but we can use it to complete the search for the hash value. Mission.

4) First run QQ, if the version is different, the memory location of the hash value may also be different), enter your own account password after logging in, you don't have to worry about it. Then we need to obtain the hash value of our QQ password. This value will be used to search the location of the password hash value in the QQ process space. The hash value of the QQ password is calculated using the MD5 algorithm, so we also need an MD5 calculation tool to calculate the hash value of our own password.

5) There are many such calculation tools, both online and local. It is a tool called HASH. We create a new text file, write the password in it and then save the file. Use this tool to open the text file where the password is saved and you can see the hash value of the password is 21232F297A57A5A743894AOE4A801FC3.


6) Open Cheat Engine 5.4, click the icon of the small computer in the upper left corner to select the process "QQ.exe" that we want to open. Select "Array fo Bytes" for "Value type" on the interface, indicating that we want to search for consecutive bytes, check the check box in front of the "Hex" label, and then paste the hash value obtained before into the text after "Hex9" frame.

7) Click "First Scan" to start the first search. The left side of the software interface immediately shows three locations for storing hash values: OOf07494, Ola9a364, and Olaba97c. These three values ​​are just the addresses where the password hashes are stored. These positions may change, and I will continue to look for pointers to these addresses. Change "Value fo type" to "4 Bytes", paste the above three addresses into the search box, you can get the address pointing to OOf07494 is Ola2e448, the address pointing to Ola9a364 is 019749ec, the value of Olaba97c was not found. Now we start to wonder, which address above is the base address?

8) Since it is a base address, it is certain that its location in the same environment will not change. Therefore, we can open another QQ decisively and complete the above process again in the newly opened QQ process. This time, I still got 3 sets of data similar to the previous ones: the address pointing to OOf07494 is Ola2e448, the address pointing to Ola99c e4 is 01974aac, and Olaca34c was not found. It is not difficult to see that the pointer at address Ola2e448 has not changed in the two QQs. We can use this address to programmatically read the memory hash value.

9) I have written a GUI program with MFC, but for the sake of explanation, I re-written a console interface program to avoid the interference of MFC content. This program is written and run through using VC6.0.
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘To be 100% Be anounymously on net you must know this
> Application and Advantages and Disadvantages of
Various Agent Methods The role of various agent methods by Undercode

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) IP Disguised, Squid's traditional proxy and transparent proxy are suitable for users with no real IP address on the LAN to access the Internet.

2) Apache reverse proxy, plug-gw general proxy, port forwarding is suitable for external users to access
the server without real IP address in the LAN .

πŸ¦‘ The advantages and disadvantages of various proxy methods:

1) The advantage of Squid is that it requires few clients, as long as it can connect to the Squid server.
However, it is necessary to set the proxy server IP address and port number for each machine.

3) The advantage of Squid transparent proxy is that it does not require each client to set the proxy address and port, simplifying the client
configuration. However, the default gateway of each client needs to be set to the Squid proxy server, and the client needs to do
DNS resolution

4) IP masquerading can be suitable for most application layer services, unlike Squid which only supports http and ftp. But also requires the client ’s The default
gateway is set to the address of the firewall. And unlike Squid has a cache function plug-gw can proxy various servers like HTTP, POP3, etc. But Apache reverse proxy can only proxy http reverse request

5) Port forwarding is suitable for most services. It has nothing to do with the specific application. It is fast and implemented at the core IP layer without requiring special

application layer services to run. But it may be necessary to recompile the kernel.

Written by Undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ BEST FREE 2020 VIRTUAL NUMBERS SERVICES 2020-2019 :FOR SOCIAL APPS:
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) https://www.2ndline.co/

2) https://www.numeroesim.com/

3) https://www.openphone.co/

4) https://talkroute.com/mobile-apps-ios-android/

5) https://www.vonage.com/personal/vonage-mobile-app?

6) https://sonetel.com/en/

7) https://www.virtualphone.com/

8) https://www.worldsim.com/virtual-phone-number?___store=usa

9) http://www.telosapp.com/

10) https://www.cloudsimapp.com/

11) https://www.line2.com/

12) https://www.burnerapp.com/

written by undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 Fake Valid Credit card numbers for TRIALS
> spootify- netflix-virtual numbers
T.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

4822787842278095 | Name David MartΓ­n | Cvv 194 | Vence | 01/25

5134571890159641 | First name Taylor Lewis | Cvv 117 | Vence | 12/2022
349856972922624 | Diamond Johnson name | Cvv 423 | Vence | 05/2028
3568892723271712 | First name Ethen Gonzalez | Cvv 442 | Vence |
09/2025

6011342228039426 | First name Madison Allen | Cvv 782 | Vence | 02/2026


4771753420740642 | Name Daniel Wright | Cvv 493 | Expires | 01/22
5444780411243272 | Ruby Baker Name | Cvv 134 | Vence | 12/2024
346206148867860 | Name Reagan Brown | Cvv 242 | Vence | 11/2026
3529701135256302 | Name Joseph Edwards | Cvv 732 | Vence | 02/2023
6011796428775230 | Name Jes Johnson | Cvv 764 | Vence | 02/2026

4553227938934074 | First name Michael Mitchell | Cvv 906 | Vence |
11/2022

5519178874098970 | First name Tristan Collins | Cvv 146 | Vence | 01/2029


344005630347676 | Van Baker name | Cvv 557 | Vence | 09/2024


3579308837651175 | First name Walker Anderson | Cvv 369 | Vence | 10/2025


6011200380898973 | First name Brianna Jones | Cvv 275 | Vence | 03/2024


4276090643767346 | First name William Rodriguez | Cvv 847 | Vence | 07/2022


5267907545409651 | Name Noel Williams | Cvv 718 | Vence | 10/2028

379948265263312 | First name Tristan Adams | Cvv 667 | Vence | 04/2026

3539667905342580 | First name Javion Johnson | Cvv 430 | Vence | 11/2025

6011355116046469 | First name Gideon Davis | Cvv 875 | Vence | 02/2026

4094888777502193 | Name Elijah Campbell | Cvv 789 | Vence | 07/2022

5361691169041249 | Name Eliana White | Cvv 667 | Vence | 12/2024


340078524118614 | Name Atticus Miller | Cvv 723 | Vence | 04/2022

3558627383367331 | First name Ruby Garcia | Cvv 624 | Vence | 07/2028


6011136497811444 | Name Faith Jones | Cvv 792 | Vence | 02/2026

@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Carding for beginers :

BIN - What is It?

πŸ¦‘ BIN Stands for Bank Identification Number, It’s the first 6 digits of your credit card, suppose your Credit card number is 4305873969346315, then your BIN will be 430587. I will suggest you collect some information related to BIN, this may help you in learning carding easily. For BIN’s BinsBase, Bins.su and BinLists are the best. This will help you in learning almost everything about Bins.


1) Well, before starting make sure you have gathered all the required things I earlier mentioned in the post. For the links of software download and purchase see the end of post.
Set Up Socks in Mozilla

2) Just open Firefox, then go to Options and Click on General on the left pane of the browser. Then scroll down to the Network Settings section and click on Settings. A Pop-Up will appear. Select the fourth option of Manual Proxy Configuration. Now type the proxy and port below, that’s it!

3) After adding the Proxy there, Just Hit OK and restart Firefox and now you’ll be connected with secure socks.

> Note: Make Sure to Buy Socks with the Matching Location of the Address in credit card. Suppose that the credit card holder is from South Africa, your socks are also supposed to be for South Africa.


πŸ¦‘ SO HOW TO USE BINS :


1) Create a new Email account with the matching name of CC holder. If CC holder’s name is Smith Parker then make something like Smithparker78@***.com
Note: Never use disposable Emails for carding.

2) Run RDP and connect with your Host, in case you are not using RDP, follow the steps below-

3)Change all the MAC addresses using MAC Address Changer.

4) Clear all the history of your PC including Cache, Temp Files using CC Cleaner.

5)Set up sock5 in Mozilla Firefox, check above I have explained how to setup socks in Mozilla.

6) Now, restart your browser and visit This link to check if your IP has changed with the location of CC holder or not.


7) Open any local online market store, I will suggest you use anyone which is from your own country.

8)Register a new account with the name of CC holder and Email you made for carding.

9) Try to add an item to your cart, the item should below USD $500, never use big orders for the first transaction.

10) In shipping address, add the address where you want to deliver the product.

11) Now, go for the payment option, choose credit card for payment.

12) Enter all the credit card details you received when you bought the credit card.

13) For the Billing address, use the address of CC Holder.

POWERED BY wiki
@UNDERCODETESTING
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Types of Attacks against Web Servers :
t.me/undercodeTesting

1) Directory traversal attacks– This type of attacks exploits bugs in the web server to gain unauthorized access to files and folders that are not in the public domain. Once the attacker has gained access, they can download sensitive information, execute commands on the server or install malicious software.

2) Denial of Service Attacks– With this type of attack, the web server may crash or become unavailable to the legitimate users.
Domain Name System Hijacking – With this type of attacker, the DNS setting are changed to point to the attacker’s web server. All traffic that was supposed to be sent to the web server is redirected to the wrong one.

3) Sniffing– Unencrypted data sent over the network may be intercepted and used to gain unauthorized access to the web server.

4) Phishing– With this type of attack, the attack impersonates the websites and directs traffic to the fake website. Unsuspecting users may be tricked into submitting sensitive data such as login details, credit card numbers, etc.

5) Pharming– With this type of attack, the attacker compromises the Domain Name System (DNS) servers or on the user computer so that traffic is directed to a malicious site.

6) Defacement– With this type of attack, the attacker replaces the organization’s website with a different page that contains the hacker’s name, images and may include background music and messages.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ESSENTIAL APPS FOR IOS DEVELOPERS :

1) https://apps.apple.com/us/app/adaptivity-a/id1054670022
> It seems ridiculous that this app costs just $3.99, because if you use it just once to figure out a layout problem it has earned its money back immediately. Even better, it’s a universal purchase that works across both iOS and macOS, making it even better value for money.

Adaptivity is not just highly recommended – it’s essential.

2) https://apps.apple.com/us/app/working-copy/id896694807

3) https://apps.apple.com/us/app/aurora-color-picker/id1493055655

4) https://www.fireworksapp.xyz/

5) https://www.barebones.com/

6) https://www.rotato.xyz/

7) https://apps.apple.com/us/app/asset-catalog-creator-pro/id809625456

8) https://studiocode.app/

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How Social Mapper open source smart tools work ?


But, "What if it can be done automatically and on a large scale with hundreds or thousands of people?"


πŸ¦‘ Social Mapper runs through three phases:


> Phase 1- The tool is based on what you provide The input of creates a target list (consisting of name and picture). The list can be provided through a link in the CSV file, an image in the folder, or someone registered on LinkedIn on the company.


> Stage 2- Once the target is processed, the second stage of Social Mapper automatically starts online search for social media sites to obtain the target.Researchers recommend running the tool overnight via a good Internet connection, because searching can take more than 15 hours to get a list of 1,000 people and use a lot of bandwidth.


> After the third stage search, the third stage of Social Mapper starts generating reports, such as a spreadsheet that contains a link to the profile page of the target list, or a more intuitive HTML report that contains photos for quick inspection and verification results.

Written by Undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ ABOUT SOCIAL MEDIA TRACKING :

What could go wrong?

1) Although the end result is ideal for promoting highly complex phishing activities or intelligence gathering, Trustwave said it will help security professionals and ethical hackers provide the same tools as bad guys to test customers' security.

2) However, because the tool is now available in open source, anyone including bad guys or intelligence agencies can reuse facial recognition technology to build their own monitoring tools to search for the large amount of data that has been collected. further outlines some evil uses of the social mapper.

3) Once you have mastered the end result, these uses are limited to "only your imagination", which shows that it can be used for:

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Create a fake social media profile for the "friends" target, and then send its link to downloadable malware or obtain credentials for landing pages.
The goal of spoofing is to disclose their emails and phone numbers through vouchers and offers to turn to "phishing, predatory or predatory."

2) Create custom phishing campaigns for each social media platform, make sure the target has an account, and make these more real by including their profile picture in the email. Then capture the password to reuse it.

3) Look at the photo of the target, find the badge of the employee visit card, and get familiar with the interior of the building.


Written by Undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ HOW TO STAY ANONYMOUSLY ON INTERNET FULL BY UNDERCODE :


A) SOCIAL METHODES :


1) Get yourself another account
Today, email has become a universal identifier for a network user identity. Therefore, first of all, it is worth taking care of the second (third, fourth) email address. It can be either just an additional Gmail account, or one of the special mail services described in this article . After that, register on it new accounts in social networks and other necessary services. Never mix your public and private profile.

2) Do not use domestic services
I have nothing against our search, mail, social sites, in many ways they are even better. They are worse only in that, if necessary, interested people or structures can quite easily scratch out the information they need about you. Therefore, do not use the services of the country in which you reside.

3) Change the connection location
If you want to further complicate the work of potential pursuers, then do not sit at home, but take a walk around the neighborhood. An attentive and thoughtful search will tell you dozens of available cafes, computer clubs, libraries from which you can use the Internet, without risking highlighting your real and network address.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁