β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦2020 Free SMS bomber on Android 100ms in 20 secondsπ₯
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦2020 Free SMS bomber on Android 100ms in 20 secondsπ₯
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
updateuse for learn
2οΈβ£apt upgrade
3οΈβ£pkg install python
4οΈβ£pip install --upgrade pip
5οΈβ£apt install git
6οΈβ£git clone https://github.com/FSystem88/spymer
7οΈβ£sh spymer / install.sh
8οΈβ£After you better go to Termux.
9οΈβ£Launch: spymer 7988 ********* (we indicate the number through 7 without +)
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
β β β Uππ»βΊπ«6π¬πβ β β β
Microsoft Office 2020 Keys(Wiki-2020 keys)
π¦Office 365 Keys for FREE
N7PXY-WR4XP-D4FGK-K66JH-CYQ6X
N4M7D-PD46X-TJ2HQ-RPDD7-T28P9
B9GN2-DXXQC-9DHKT-GGWCR-4X6XK
2B8KN-FFK6J-YWMV4-J3DY2-3YF29
FCMXC-RDWMP-RFGVD-8TGPD-
VQQ2X
4HNBK-863MH-6CR6P-GQ6WP-J42C9
2MNJP-QY9KX-MKBKM-9VFJ2-CJ9KK
XRNFT-HG2FV-G74BP-7PVDC-JB29K
DJD94-DFKD9-FJD94JD894-FJKD94JD
DJC4N-DX7PC-GM3GK-V8KKW-XWYGX
DJKSE-DFJS93-DFJKD94JD-DJKD94JD
6KTFN-PQH9H T8MMB-YG8K4-367TX
6PMNJ-Q33T3-VJQFJ-23D3H-6XVTX
PGD67-JN23K-JGVWW-KTHP4-GXR9G
PBTFM-WWN3H-2GD9X-VJRMG-C9VT
MT7YN-TMV9C-7DDX9-64W77-B7R4D
π¦Microsoft Office 365 Pro Plus Product Key
4HNBK-863MH-6CR6P-GQ6WP-J42C9
366NX-BQ62X-PQT9G-GPX4H-VT7TX
6KTFN-PQH9H T8MMB-YG8K4-367TX
KDVQM-HMNFJ-P9PJX-96HDF-DJYGX
KBDNM-R8CD9-RK366-WFM3X-C7GXK
H746C-BM4VK-TZBB8-MVZH8-FXR32
MH2KN-96KYR-GTRD4-KBKP4-Q9JP9
2MHJR-V4MR2-V4Z2Y-72MQ7-KC6XK
2MNJP-QY9KX-MKBKM-9VFJ2-CJ9KK
P8TFP-JGFMM-XPV3X-3FQM2-8K4RP
N4M7D-PD46X-TJ2HQ-RPDD7-T28P9
FBFPP-2XG5Y-FG9VH-DVQ2Z-QJRCH
NK8R7-8VXCQ 3M2FM-8446R-WFD6X
π¦Microsoft Office 365 Activation Key
MTDNG-PDDGD-MHMV4-F2MBY-RCXKK
DJC4N-DX7PC-GM3GK-V8KKW-XWYGX
46DNX-B4Q98-PQVPW-Q8VM6-FVR29
N4M7D-PD46X-TJ2HQ-RPDD7-T28P9
GYWDG-NMV9P-746HR-Y2VQW-YPXKK
PBTFM-WWN3H-2GD9X-VJRMG-C9VTX
2MNJP-QY9KX-MKBKM-9VFJ2-CJ9KK
NK8R7-8VXCQ 3M2FM-8446R-WFD6X
N7PXY-WR4XP-D4FGK-K66JH-CYQ6X
GPT9W-CWNJK-KB29G-8V93J-TQ429
366NX-BQ62X-PQT9G-GPX4H-VT7TX
4HNBK-863MH-6CR6P-GQ6WP-J42C9
MH2KN-96KYR-GTRD4-KBKP4-Q9JP9
X2YWD-NWJ42-3PGD6-M37DP-VFP9K
N2P94-XV8HD-W9MHF-VQHHH-M4D6X
π¦Office 365 Product Key
2B8KN-FFK6J-YWMV4-J3DY2-3YF29
KBDNM-R8CD9-RK366-WFM3X-C7GXK
6HDB9-BNRGY-J3F83-CF43C-D67TX
WTFN9-KRCBV-2VBBH-BC272-27GXM
6KTFN-PQH9H T8MMB-YG8K4-367TX
KDVQM-HMNFJ-P9PJX-96HDF-
DJYGX
XRNFT-HG2FV-G74BP-7PVDC-JB29K
PNP4F-KY64B-JJF4P-7R7J9-7XJP9
DMXHM-GNMM3-MYHHK-6TVT2-XTKKK
G9N3P-GRJK6-VM63J-F9M27-KHGXK
7TPNM-PMWKF-WVHKV-G869H-9BQ6X
433NF-H7TMK-TPMPK-W4FGW-7FP9K
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
Microsoft Office 2020 Keys(Wiki-2020 keys)
π¦Office 365 Keys for FREE
N7PXY-WR4XP-D4FGK-K66JH-CYQ6X
N4M7D-PD46X-TJ2HQ-RPDD7-T28P9
B9GN2-DXXQC-9DHKT-GGWCR-4X6XK
2B8KN-FFK6J-YWMV4-J3DY2-3YF29
FCMXC-RDWMP-RFGVD-8TGPD-
VQQ2X
4HNBK-863MH-6CR6P-GQ6WP-J42C9
2MNJP-QY9KX-MKBKM-9VFJ2-CJ9KK
XRNFT-HG2FV-G74BP-7PVDC-JB29K
DJD94-DFKD9-FJD94JD894-FJKD94JD
DJC4N-DX7PC-GM3GK-V8KKW-XWYGX
DJKSE-DFJS93-DFJKD94JD-DJKD94JD
6KTFN-PQH9H T8MMB-YG8K4-367TX
6PMNJ-Q33T3-VJQFJ-23D3H-6XVTX
PGD67-JN23K-JGVWW-KTHP4-GXR9G
PBTFM-WWN3H-2GD9X-VJRMG-C9VT
MT7YN-TMV9C-7DDX9-64W77-B7R4D
π¦Microsoft Office 365 Pro Plus Product Key
4HNBK-863MH-6CR6P-GQ6WP-J42C9
366NX-BQ62X-PQT9G-GPX4H-VT7TX
6KTFN-PQH9H T8MMB-YG8K4-367TX
KDVQM-HMNFJ-P9PJX-96HDF-DJYGX
KBDNM-R8CD9-RK366-WFM3X-C7GXK
H746C-BM4VK-TZBB8-MVZH8-FXR32
MH2KN-96KYR-GTRD4-KBKP4-Q9JP9
2MHJR-V4MR2-V4Z2Y-72MQ7-KC6XK
2MNJP-QY9KX-MKBKM-9VFJ2-CJ9KK
P8TFP-JGFMM-XPV3X-3FQM2-8K4RP
N4M7D-PD46X-TJ2HQ-RPDD7-T28P9
FBFPP-2XG5Y-FG9VH-DVQ2Z-QJRCH
NK8R7-8VXCQ 3M2FM-8446R-WFD6X
π¦Microsoft Office 365 Activation Key
MTDNG-PDDGD-MHMV4-F2MBY-RCXKK
DJC4N-DX7PC-GM3GK-V8KKW-XWYGX
46DNX-B4Q98-PQVPW-Q8VM6-FVR29
N4M7D-PD46X-TJ2HQ-RPDD7-T28P9
GYWDG-NMV9P-746HR-Y2VQW-YPXKK
PBTFM-WWN3H-2GD9X-VJRMG-C9VTX
2MNJP-QY9KX-MKBKM-9VFJ2-CJ9KK
NK8R7-8VXCQ 3M2FM-8446R-WFD6X
N7PXY-WR4XP-D4FGK-K66JH-CYQ6X
GPT9W-CWNJK-KB29G-8V93J-TQ429
366NX-BQ62X-PQT9G-GPX4H-VT7TX
4HNBK-863MH-6CR6P-GQ6WP-J42C9
MH2KN-96KYR-GTRD4-KBKP4-Q9JP9
X2YWD-NWJ42-3PGD6-M37DP-VFP9K
N2P94-XV8HD-W9MHF-VQHHH-M4D6X
π¦Office 365 Product Key
2B8KN-FFK6J-YWMV4-J3DY2-3YF29
KBDNM-R8CD9-RK366-WFM3X-C7GXK
6HDB9-BNRGY-J3F83-CF43C-D67TX
WTFN9-KRCBV-2VBBH-BC272-27GXM
6KTFN-PQH9H T8MMB-YG8K4-367TX
KDVQM-HMNFJ-P9PJX-96HDF-
DJYGX
XRNFT-HG2FV-G74BP-7PVDC-JB29K
PNP4F-KY64B-JJF4P-7R7J9-7XJP9
DMXHM-GNMM3-MYHHK-6TVT2-XTKKK
G9N3P-GRJK6-VM63J-F9M27-KHGXK
7TPNM-PMWKF-WVHKV-G869H-9BQ6X
433NF-H7TMK-TPMPK-W4FGW-7FP9K
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Facebook re-exposed vulnerability: sharing user data with developers overtime
> Sina Technology News Beijing time on July 2 morning news, after the "Cambridge Analysis Scandal" was exposed, FacebookThere was a promise to impose a time limit when sharing user data with external developers, but the actual deadline exceeded their original promise.
> The company previously stated that if the user does not interact with the developer for more than 90 days, it will prevent the application from obtaining user data. At that time, developers need to re-acquire permission to get access to data such as e-mail, birthday and city,
> But Facebook said in a blog post on Wednesday that this rule has not been implemented smoothly in some cases. If the user also contacts Facebook friends through the application, the developer can obtain the data of the two users at the same time. However, a company spokesperson said that the vulnerability would cause developers to see the data of a userβs friends when they get the data of an active user, even if the latter has not opened the application for more than 90 days.
> Facebook revealed that this issue involves about 5,000 developers. But they did not disclose the number of users who might be affected by this.
> "We will solve the problem after we find it," Facebook wrote in the blog post. "We will continue to investigate and will continue to maintain transparency around any major updates."
> The vulnerability was discovered by a Facebook engineer two weeks ago, but the company said that they have no reason to believe that the relevant data has been misused.
written by undercode
β β β Uππ»βΊπ«6π¬πβ β β β
π¦Facebook re-exposed vulnerability: sharing user data with developers overtime
> Sina Technology News Beijing time on July 2 morning news, after the "Cambridge Analysis Scandal" was exposed, FacebookThere was a promise to impose a time limit when sharing user data with external developers, but the actual deadline exceeded their original promise.
> The company previously stated that if the user does not interact with the developer for more than 90 days, it will prevent the application from obtaining user data. At that time, developers need to re-acquire permission to get access to data such as e-mail, birthday and city,
> But Facebook said in a blog post on Wednesday that this rule has not been implemented smoothly in some cases. If the user also contacts Facebook friends through the application, the developer can obtain the data of the two users at the same time. However, a company spokesperson said that the vulnerability would cause developers to see the data of a userβs friends when they get the data of an active user, even if the latter has not opened the application for more than 90 days.
> Facebook revealed that this issue involves about 5,000 developers. But they did not disclose the number of users who might be affected by this.
> "We will solve the problem after we find it," Facebook wrote in the blog post. "We will continue to investigate and will continue to maintain transparency around any major updates."
> The vulnerability was discovered by a Facebook engineer two weeks ago, but the company said that they have no reason to believe that the relevant data has been misused.
written by undercode
β β β Uππ»βΊπ«6π¬πβ β β β
Forwarded from Free Premium Accounts Telegram Channel - Netflix - Spotify
Please open Telegram to view this post
VIEW IN TELEGRAM
β β β Uππ»βΊπ«6π¬πβ β β β
π¦How to generate certificates in OpenSSL ?
#Pro
In fact, the private key of the web server and the private key of the Certification Authority (CA) are no different in nature - they are generated by the same command. But a Certification Authority (CA) has a special status insofar as:
1οΈβ£Its private key is used for signing certificates (therefore, it is called the root, although in the physical sense it does not differ from the private key of the server)
2οΈβ£Its public key (certificate) is added to the computers of all users as a trusted
3οΈβ£The digital signature in the certificate is not intended to be verified by a third party, since the certificate is self-signed.
> The only difference between a self-signed certificate from a Certification Authority (CA) and one that you can generate yourself is that it is located among trusted ones (in the operating system or in the browser).
> You can place a self-created self-signed certificate among trusted ones, and it will have exactly the same strength as the root certificate from Certificate Authority (CA)
π¦ Let us return to the procedure of signing, but actually creating a server certificate - the created certificate must be cryptographically associated with the serverβs private key. But the private key should be known exclusively to its owner (server). The way out of this situation is the use of the already mentioned Certificate Signing Request (CSR), that is, a "certificate signing request". That is, the Public Key and the domain name are transferred to the Certification Authority, but the private key remains secret. This is precisely the meaning of the existence of CSR.
1) For educational purposes, you can create your own root keys and even your βCertificate Authority (CA)β. Then create a pair of private and public server keys. Using the server key, we will create a certificate signing request (CSR). With a private key CA we will sign (create) a certificate for the server.
2) We will also learn how to add our root certificate to trusted certificates, verify and manage trusted certificates already present.
3) Which command to use, genpkey or generate :
There are two commands in the OpenSSL package that perform a very similar action - they generate a RSA private-public key pair:
1οΈβ£<font style="vertical-align: inherit;"><font style="vertical-align: inherit;">openssl genpkey -algorithm RSA</font></font><font></font><font style="vertical-align: inherit;"><font style="vertical-align: inherit;">
2οΈβ£openssl genrsa</font></font>
4) In fact, the formats of the keys generated by these RSA programs are slightly different. The genpkey command replaces the genpkey command , as well as two more commands: gendh and gendsa .
5) That is, you need to use genpkey with which you need to specify the key algorithm with the -algorithm option .
ENJOYβ€οΈππ»
Written by
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦How to generate certificates in OpenSSL ?
#Pro
In fact, the private key of the web server and the private key of the Certification Authority (CA) are no different in nature - they are generated by the same command. But a Certification Authority (CA) has a special status insofar as:
1οΈβ£Its private key is used for signing certificates (therefore, it is called the root, although in the physical sense it does not differ from the private key of the server)
2οΈβ£Its public key (certificate) is added to the computers of all users as a trusted
3οΈβ£The digital signature in the certificate is not intended to be verified by a third party, since the certificate is self-signed.
> The only difference between a self-signed certificate from a Certification Authority (CA) and one that you can generate yourself is that it is located among trusted ones (in the operating system or in the browser).
> You can place a self-created self-signed certificate among trusted ones, and it will have exactly the same strength as the root certificate from Certificate Authority (CA)
π¦ Let us return to the procedure of signing, but actually creating a server certificate - the created certificate must be cryptographically associated with the serverβs private key. But the private key should be known exclusively to its owner (server). The way out of this situation is the use of the already mentioned Certificate Signing Request (CSR), that is, a "certificate signing request". That is, the Public Key and the domain name are transferred to the Certification Authority, but the private key remains secret. This is precisely the meaning of the existence of CSR.
1) For educational purposes, you can create your own root keys and even your βCertificate Authority (CA)β. Then create a pair of private and public server keys. Using the server key, we will create a certificate signing request (CSR). With a private key CA we will sign (create) a certificate for the server.
2) We will also learn how to add our root certificate to trusted certificates, verify and manage trusted certificates already present.
3) Which command to use, genpkey or generate :
There are two commands in the OpenSSL package that perform a very similar action - they generate a RSA private-public key pair:
1οΈβ£<font style="vertical-align: inherit;"><font style="vertical-align: inherit;">openssl genpkey -algorithm RSA</font></font><font></font><font style="vertical-align: inherit;"><font style="vertical-align: inherit;">
2οΈβ£openssl genrsa</font></font>
4) In fact, the formats of the keys generated by these RSA programs are slightly different. The genpkey command replaces the genpkey command , as well as two more commands: gendh and gendsa .
5) That is, you need to use genpkey with which you need to specify the key algorithm with the -algorithm option .
ENJOYβ€οΈππ»
Written by
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Some Steps for protect your android from Ransomware :
#fastTips
How to protect yourself?
> We recommend that you take basic precautions to protect yourself from these threats:
1) Never open email attachments from unknown senders- also scan any usb plugged in
2) Never click on links in SMS or MMS messages.
3) Even if the letter looks normal from some company ,.
4) Go to Settings β Security and disable "allow installation of applications from sources other than Google Play."
5) We do not recommend connecting to unknown Wi-Fi networks and turn off Wi-Fi when not in use.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Some Steps for protect your android from Ransomware :
#fastTips
How to protect yourself?
> We recommend that you take basic precautions to protect yourself from these threats:
1) Never open email attachments from unknown senders- also scan any usb plugged in
2) Never click on links in SMS or MMS messages.
3) Even if the letter looks normal from some company ,.
4) Go to Settings β Security and disable "allow installation of applications from sources other than Google Play."
5) We do not recommend connecting to unknown Wi-Fi networks and turn off Wi-Fi when not in use.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to Port Forward Minecraft ?
When you are playing Minecraft you might need to forward some ports in your router. Forwarding ports is a useful trick in gaming because it can really help to make your network connection most stable and sometimes even faster. Routers were not designed to allow incoming network requests and some games can play tremendously better if an incoming connection is forwarded through the router to the game.
Before You Forward a Port
π¦Before you can forward a port you need to know the following things:
1οΈβ£The IP address of your router.
2οΈβ£ Your gaming machine's IP address.
3οΈβ£ A list of TCP and UDP ports that need to be forwarded.
π¦How to locate your router's IP Address ?
> The easiest way to locate your router's IP address is to run our free Router Detector utility. It's a part of the Network Utilities suite of tools and it's completely free to use.
How To Forward Ports
> Use our Network Utilities for a quick way to get your ports forwarded. Network utilities makes it easy to enable and disable your port forwards to keep your network security as tight as possible. You can also do it by hand by following these steps.
π¦The process for forwarding a port is generally:
1οΈβ£ Start by logging in to your router.
2οΈβ£Find your routers port forwarding section.
3οΈβ£ Put the IP address of your computer or gaming console in the correct box in your router.
4οΈβ£Put the TCP and UDP ports for your game in the matching boxes in your router.
5οΈβ£Frequently you have to reboot your router for the changes to take effect.
π¦Which Ports Does Minecraft Require
The incoming ports that need to be forwarded for Minecraft are as follows:
1) Minecraft - Xbox 360
TCP: 3074
UDP: 88,3074
2) Minecraft - Playstation 3
TCP: 3478-3480,5223,8080
UDP: 3074,3478-3479,3658
3) Minecraft - Xbox One
TCP: 3074
UDP: 88,500,3074,3544,4500,1935,3478-3480
4) Minecraft - Playstation 4
TCP: 1935,3478-3480
UDP: 3074,3478-3479,19132-19133
5) Minecraft - PC
TCP: 25565
UDP: 19132-19133,25565
6) Minecraft - Switch
TCP: 6667,12400,28910,29900,29901,29920
UDP: 1-65535
Powered by Wiki
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β
π¦How to Port Forward Minecraft ?
When you are playing Minecraft you might need to forward some ports in your router. Forwarding ports is a useful trick in gaming because it can really help to make your network connection most stable and sometimes even faster. Routers were not designed to allow incoming network requests and some games can play tremendously better if an incoming connection is forwarded through the router to the game.
Before You Forward a Port
π¦Before you can forward a port you need to know the following things:
1οΈβ£The IP address of your router.
2οΈβ£ Your gaming machine's IP address.
3οΈβ£ A list of TCP and UDP ports that need to be forwarded.
π¦How to locate your router's IP Address ?
> The easiest way to locate your router's IP address is to run our free Router Detector utility. It's a part of the Network Utilities suite of tools and it's completely free to use.
How To Forward Ports
> Use our Network Utilities for a quick way to get your ports forwarded. Network utilities makes it easy to enable and disable your port forwards to keep your network security as tight as possible. You can also do it by hand by following these steps.
π¦The process for forwarding a port is generally:
1οΈβ£ Start by logging in to your router.
2οΈβ£Find your routers port forwarding section.
3οΈβ£ Put the IP address of your computer or gaming console in the correct box in your router.
4οΈβ£Put the TCP and UDP ports for your game in the matching boxes in your router.
5οΈβ£Frequently you have to reboot your router for the changes to take effect.
π¦Which Ports Does Minecraft Require
The incoming ports that need to be forwarded for Minecraft are as follows:
1) Minecraft - Xbox 360
TCP: 3074
UDP: 88,3074
2) Minecraft - Playstation 3
TCP: 3478-3480,5223,8080
UDP: 3074,3478-3479,3658
3) Minecraft - Xbox One
TCP: 3074
UDP: 88,500,3074,3544,4500,1935,3478-3480
4) Minecraft - Playstation 4
TCP: 1935,3478-3480
UDP: 3074,3478-3479,19132-19133
5) Minecraft - PC
TCP: 25565
UDP: 19132-19133,25565
6) Minecraft - Switch
TCP: 6667,12400,28910,29900,29901,29920
UDP: 1-65535
Powered by Wiki
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
β β β Uππ»βΊπ«6π¬πβ β β β