UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.7K links
๐Ÿฆ‘ Undercode Cyber World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE

โœจ Web & Services:
โ†’ Undercode.help
Download Telegram
FULL GUIDES 2019
T.me/UnderCodeTestingOfficial
๐Ÿ˜Š
- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -

๐Ÿฆ‘BEST CREDIT CARD GENERATOR SITES SOME INCLUDE MONEY
> CAN GENERATRE MILLIARS CREDIT CARDS
(instagram.com/UnderCodeTestingCompany)

๐Ÿฆ‘๐Ÿ„ป๐Ÿ„ด๐Ÿ…ƒ ๐Ÿ…‚ ๐Ÿ…‚๐Ÿ…ƒ๐Ÿ„ฐ๐Ÿ…๐Ÿ…ƒ:

1) PAYPALL

> https://developer.paypal.com/developer/creditCardGenerator/

2) Valid Credit Card Generator and Validator

> https://www.creditcardrush.com/credit-card-generator/

3) Credit Card Numbers Generator

> http://www.getcreditcardnumbers.com/

4) Generate Credit Card Number from Bank Name - BIN Codes

> https://www.creditcardrush.com/

5)Visa Credit Card Generator | Generate Valid Credit Card Numbers

> https://www.getcreditcardinfo.com/

6) generatevisacreditcard.php
Credit Card Generator | Fake Person Generator

> https://www.fakepersongenerator.com/credit-card-generator

7) Generate Validate MasterCard credit card numbers Generator online

> https://www.getnewidentity.com/mastercard-credit-card.php
VISA Credit Card Generator With Money (Valid Credit Card Generator)

>https://www.creditcardrush.com/visa-credit-card-generator/


@ฬถฬ ฬธฬ› ฬฬนMฬถฬ†rฬตฬ‡.ฬถฬ อ›อ ฬดฬBฬตฬ… ฬนoฬตอ’tฬท ฬ›อ‘nฬถฬ ฬอ“eฬดอ‘tฬดฬŽ อŒฬ (ฬตอ’tฬด อ’ฬฝ.ฬธอ„mฬถฬ’ ฬ‘อ–.ฬทฬ‘
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘STRESSING TOOLS TUTORIAL by undercOde:
(instagram.com/UnderCodeTestingCompany)

๐Ÿฆ‘Slowhttptest
Slowhttptest is one of the DoS attacking tools. It especially uses HTTP protocol to connect with the server and to keep the resources busy such as CPU and RAM. Letโ€™s see in detail how to use it and explain its functions.

๐Ÿฆ‘๐Ÿ„ป๐Ÿ„ด๐Ÿ…ƒ ๐Ÿ…‚ ๐Ÿ…‚๐Ÿ…ƒ๐Ÿ„ฐ๐Ÿ…๐Ÿ…ƒ:

COMMANDS:

1) To open slowhttptest, first open the terminal and type โ€œslowhttptest โ€“parametersโ€.

2) You can type โ€œslowhttptest โ€“hโ€ to see all the paramenters that you need to use. In case you receive an output, โ€˜Command not foundโ€™ you have to first type

> โ€œapt-get install slowhttptestโ€.

3) Show Http Test
Command Not Found

> Then after installation, again type slowhttptest โ€“h

4) Slow Headers
Type the following command โˆ’

> slowhttptest -c 500 -H -g -o outputfile -i 10 -r 200 -t GET โ€“u
http://192.168.1.202/index.php -x 24 -p 2

5) All Stress testing test will be done on metsploitable machine which has IP of 192.168.1.102

6) SO :

(-c 500) = 500 connections

(-H) = Slowloris mode

-g = Generate statistics

-o outputfile = Output file name

-i 10 = Use 10 seconds to wait for data

-r 200 = 200 connections with -t GET = GET requests

-u http://192.168.1.202/index.php = target URL

-x 24 = maximum of length of 24 bytes

-p 2 = 2-second timeout


@ฬถฬ ฬธฬ› ฬฬนMฬถฬ†rฬตฬ‡.ฬถฬ อ›อ ฬดฬBฬตฬ… ฬนoฬตอ’tฬท ฬ›อ‘nฬถฬ ฬอ“eฬดอ‘tฬดฬŽ อŒฬ (ฬตอ’tฬด อ’ฬฝ.ฬธอ„mฬถฬ’ ฬ‘อ–.ฬทฬ‘
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -

๐Ÿฆ‘STRESSING TOOL TUTORIAL 2 BY UNDERCODE:
(Facebook.com/UnderCodeTestingCompanie):

๐Ÿฆ‘๐Ÿ„ป๐Ÿ„ด๐Ÿ…ƒ ๐Ÿ…‚ ๐Ÿ…‚๐Ÿ…ƒ๐Ÿ„ฐ๐Ÿ…๐Ÿ…ƒ:

Inviteflood>
Inviteflood is a SIP/SDP INVITE message flooding over UDP/IP. It executes on a variety of Linux distributions. It carries out DoS (Denial of Service) attacks against SIP devices by sending multiple INVITE requests.

๐Ÿฆ‘Commands:
( it s kali tool installed par default)
1) To open Inviteflood, first open the terminal and type โ€œinviteflood โ€“parametersโ€

> For help, you can use โ€œinviteflood โ€“hโ€

2) Next, you can use the following command โˆ’

> inviteflood eth0 target_extension target_domain target_ip number_of_packets

3) its show like this Example:

target_extension is 2000

target_domain is 192.168.x.x

target_ip is 192.168.x.x

number_of_packets is 1

-a is alias of SIP account

๐Ÿฆ‘THAT S ALL YOU NOW USING STRESS TOOL

@า‰ า‰Mา‰rา‰.า‰ า‰Bา‰oา‰tา‰Nา‰eา‰tา‰(t.m)

- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -
A person who breaks in to a computer through a network, without authorization and with mischievous or destructive intent.
๐Ÿฆ‘Crash
A hardware or software problem that causes information to be lost or the computer to malfunction. Sometimes a crash can cause permanent damage to a computer.

๐Ÿฆ‘Cursor
A moving position-indicator displayed on a computer monitor that shows a computer operator where the next action or operation will take place.

๐Ÿฆ‘Cyberspace
Slang for internet ie. An international conglomeration of interconnected computer networks. Begun in the late 1960s, it was developed in the 1970s to allow government and university researchers to share information. The Internet is not controlled by any single group or organization. Its original focus was research and communications, but it continues to expand, offering a wide array of resources for business and home users.

๐Ÿฆ‘Database
A collection of similar information stored in a file, such as a database of addresses. This information may be created and stored in a database management system (DBMS).

๐Ÿฆ‘Debug
Slang. To find and correct equipment defects or program malfunctions.

๐Ÿฆ‘Default
The pre-defined configuration of a system or an application. In most programs, the defaults can be changed to reflect personal preferences.

๐Ÿฆ‘Desktop publishing
The production of publication-quality documents using a personal computer in combination with text, graphics, and page layout programs.

๐Ÿฆ‘Directory
A repository where all files are kept on computer.

๐Ÿฆ‘Disk
Two distinct types. The names refer to the media inside the container:

A hard disc stores vast amounts of data. It is usually inside the computer but can be a separate peripheral on the outside. Hard discs are made up of several rigid coated metal discs. Currently, hard discs can store 15 to 30 Gb (gigabytes).

A floppy disc, 3.5" square, usually inserted into the computer and can store about 1.4 megabytes of data. The 3.5" square floppies have a very thin, flexible disc inside. There is also an intermediate-sized floppy disc, trademarked Zip discs, which can store 250 megabytes of data.

๐Ÿฆ‘Disk drive
The equipment that operates a hard or floppy disc.

๐Ÿฆ‘Domain
Represents an IP (Internet Protocol) address or set of IP addresses that comprise a domain. The domain name appears in URLs to identify web pages or in email addresses. For example, the email address for the First Lady is first.lady@whitehouse.gov, whitehouse.gov, being the domain name. Each domain name ends with a suffix that indicates what top level domain it belongs to. These are : .com for commercial, .gov for government, .org for organization, .edu for educational institution, .biz for business, .info for information, .tv for television, .ws for website. Domain suffixes may also indicate the country in which the domain is registered. No two parties can ever hold the same domain name.

๐Ÿฆ‘Domain name
The name of a network or computer linked to the Internet. Domains are defined by a common IP address or set of similar IP (Internet Protocol) addresses.

๐Ÿฆ‘DOS
Disk Operating System. An operating system designed for early IBM-compatible PCs.

๐Ÿฆ‘Drop-down menu
A menu window that opens vertically on-screen to display context-related options. Also called pop-up menu or pull-down menu.

๐Ÿฆ‘DSL
Digital Subscriber Line, a method of connecting to the Internet via a phone line. A DSL connection uses copper telephone lines but is able to relay data at much higher speeds than modems and does not interfere with telephone use.

๐Ÿฆ‘Emoticon
A text-based expression of emotion created from ASCII characters that mimics a facial expression when viewed with your head tilted to the left. Here are some examples:

Smiling
Frowning
Winking
Crying

๐Ÿฆ‘Encryption
The process of transmitting scrambled data so that only authorized recipients can unscramble it. For instance, encryption is used to scramble credit card information when purchases are made over the Internet.

๐Ÿฆ‘Gopher
An Internet search tool that allows users to access textual information through a series of menus, or if using FTP, through downloads.

๐Ÿฆ‘GUI
Graphical User Interface, a system that simplifies selecting computer commands by enabling the user to point to symbols or illustrations (called icons) on the computer screen with a mouse.

๐Ÿฆ‘Groupware
Software that allows networked individuals to form groups and collaborate on documents, programs, or databases.

๐Ÿฆ‘Hacker
A person with technical expertise who experiments with computer systems to determine how to develop additional features. Hackers are occasionally requested by system administrators to try and break into systems via a network to test security. The term hacker is sometimes incorrectly used interchangeably with cracker. A hacker is called a white hat and a cracker a black hat.

๐Ÿฆ‘Hard copy
A paper printout of what you have prepared on the computer.


๐Ÿฆ‘Virtual reality (VR)
A technology that allows one to experience and interact with images in a simulated three-dimensional environment. For example, you could design a room in a house on your computer and actually feel that you are walking around in it even though it was never built. (The Holodeck in the science-fiction TV series Star Trek : Voyager would be the ultimate virtual reality.) Current technology requires the user to wear a special helmet, viewing goggles, gloves, and other equipment that transmits and receives information from the computer.

wฬฝอ“rฬฝอ“iฬฝอ“tฬฝอ“tฬฝอ“eฬฝอ“nฬฝอ“ ฬฝอ“bฬฝอ“yฬฝอ“ ฬฝอ“Mฬฝอ“rฬฝอ“.ฬฝอ“ ฬฝอ“Bฬฝอ“oฬฝอ“tฬฝอ“Nฬฝอ“eฬฝอ“tฬฝอ“ ฬฝอ“(ฬฝอ“tฬฝอ“.ฬฝอ“mฬฝอ“.ฬฝอ“)ฬฝอ“

- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -
- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -

๐Ÿฆ‘Iaxflood
Iaxflood is a VoIP DoS tool. To open it, type โ€œiaxflood sourcename destinationname numpacketsโ€ in the terminal.
(t.me/UnderCodeTestingOfficial)

๐Ÿฆ‘๐Ÿ„ป๐Ÿ„ด๐Ÿ…ƒ ๐Ÿ…‚ ๐Ÿ…‚๐Ÿ…ƒ๐Ÿ„ฐ๐Ÿ…๐Ÿ…ƒ:

1) This tools by offensive security

2) designed for kali and installed per default

3) To know how to use, type

> โ€œiaxflood โ€“hโ€

Then it Show :

usage: iaxflood sourcename destinationname numpackets

PLZ use this Dos Stress tool For Learning

@ฬถฬ ฬธฬ› ฬฬนMฬถฬ†rฬตฬ‡.ฬถฬ อ›อ ฬดฬBฬตฬ… ฬนoฬตอ’tฬท ฬ›อ‘nฬถฬ ฬอ“eฬดอ‘tฬดฬŽ อŒฬ (ฬตอ’tฬด อ’ฬฝ.ฬธอ„mฬถฬ’ ฬ‘อ–.ฬทฬ‘
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Hacking Email Accounts ๐Ÿฆ‘.pdf
1.8 MB
Computer_Networking_Principles_Bonaventure.pdf
10.7 MB
โ„๐•’๐•”๐•œ_๐”ฝ๐•ฅ๐•ก_๐•Š๐•–๐•ฃ๐•ง๐•–๐•ฃ_๐•‹๐•–๐•ค๐•ฅ๐•–๐••_๐Ÿฆ‘.pdf
787.9 KB
๐”น๐•’๐•ค๐•š๐•”_โ„•๐•–๐•ฅ๐•จ๐• ๐•ฃ๐•œ๐•š๐•Ÿ๐•˜๐Ÿฆ‘.pdf
1.2 MB
Hacking_the_industrial_network_USversion.pdf
1.1 MB
FAST CRACKING METHODE ๐Ÿฆ‘.pdf
515.8 KB
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘LEAKED NSA TOOL Use Only If YOu are Pro Hacker
(T.me/UnderCodeTestingOfficial)

๐Ÿฆ‘The goal of this project is to examine, reverse, and document the different modules available in the Equation Group's DanderSpritz post-exploitation framework leaked by the ShadowBrokers:

๐Ÿฆ‘FOR INSTALLISATION:

1) This repository alone is not enough to run DanderSpritz.

If you're interested in viewing the entire contents of the leak use this repo:

> EQGRP_Lost_in_Translation:
https://github.com/x0rz/EQGRP_Lost_in_Translation

2) Decrypted content of odd.tar.xz.gpg, swift.tar.xz.gpg and windows.tar.xz.gpg

> NOW:

> Downloaded from https://yadi.sk/d/NJqzpqo_3GxZA4 Original post from the #ShadowBrokers https://steemit.com/shadowbrokers/@theshadowbrokers/lost-in-translation

๐Ÿฆ‘SO After Get the full Python Packages What this illegal tool can do ?

1) windows: contains Windows exploits, implants and payloads
swift

2) contains operational notes from banking attacks
oddjob: docs related to the ODDJOB backdoo

Written by Mr. BotNet(tm)
- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -
- - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - -

๐Ÿฆ‘FULL CARDING 2019 BY undercOde:
(t.me/UnderCodeTestingOfficial)

๐Ÿฆ‘๐•ƒ๐•–๐•ฅ ๐•ค ๐•Š๐•ฅ๐•’๐•ฃ๐•ฅ:

A) What is Carding??

> Carding is term described as a trick whereby products are being shopped/ordered from any online shops e.g Amazon, Jumia, FlipKart using Fake Cards(Credit/Debit).

๐Ÿฆ‘Who is a Carder ??

A carder is referred to as a man who make uses of Hacked credit card details or buys credit cards from Credit card shops, or even pick up Credit Cards from Dumps Via DarkWeb for the purpose of carding online shops.

๐Ÿฆ‘What You Will Need To Start Carding:

1) Computer or Laptop

2) Socks (Compulsory, But some people do use VPN, but itโ€™s advisable to use Socks)

3) Mac Address Changer (Compulsory)

4) CCleaner

5) RDP (is optional,but itโ€™s advisable to use it for security purposes)

6) Drop (optional but itโ€™s advisable to use it for more Secured shopping sites)

7) Cc (Credit Card)


๐Ÿฆ‘Keypoints In Carding Method:-

1) Computer:

For carding always use a computer. I know some other carders uses a mobile device, but it is less secure and involves more risk.

2) SOCKs:

SOCKS (SOCKet Secure). It is an internet protocol which allows network packets between a client and server traffic pass through a proxy server, so your real IP is hidden and proxy IP get showed.

๐Ÿฆ‘We use this for the purpose of matching our location same with the Credit Card owner Location to make a successful transaction. And also it doesnโ€™t leak your DNS details but VPN do, so itโ€™s more secure than VPN.

3) MAC Address Changer:

MAC stands for Media Access Control. It is the unique address of every Network Interface Card (NIC), so the work of MAC address changer is to give you another MAC Address for the better anonymousity and safety.

4) CCleaner:

It is very useful tool to clean your browsing history help in cleaning your browsing history, cookies, temp files, etc. But many people neglect this part and they get caught, so please make use you take note of this part.

5) RDP (Remote Desktop Protocol):

RDP It is protocol developed by Microsoft which provides users with a graphical interface to connect a computer to another computer over the network.

๐Ÿฆ‘i.e carders uses it to connect someone else computer while carding, using someone else PC to card from their own Computer.. mainly for anonymity purpose.

6) Drop:

> DROP is an address which the you uses for the shipping address in the carding ops.

> If you are carding with a USA Credit card, then you need to use a USA address as shipping address then your order will be shipped successfully and safely, and you your self will be safe.

> So If you have relative or friends, then no problem, otherwise make use of sites that provides drop services only if you can pay extra for shipping.

7)Credit Card (CC):

This part is main,,sensitive and important part of carding,so calm down and read gently, Any credit card it is in the following format:

| credit card Number |Exp Date| CVV2 code | Name on the Card | Address | City | State | Country | Zip code | Phone # (sometimes not included depending on where you get your credit card from)|

e.g: (randomly taken number/details)

| 4305873969346315 | 05 | 2018 | 591 | UNITED STATES | Dave Washington | 201 |
Stoney Brook Lane | Washingtonton | MA | 01949 |

> IN NEXT TUTORIAL WILL SEND START
Written by Mr. BotNet(tm)
- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -
- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -

๐Ÿฆ‘Types Of Carding ALL:
(t.me/UnderCodeTestingOfficial)

A) According to some great carders, there are three types/levels of carding. They are listed as:

๐Ÿฆ‘Easy Carding:

> In this level a carder do carding of very cheap goods. For example: small phone call bills, etc. Mostly in this level the carder use to do carding of goods below 50$. This is known as the beginners level of carding.

๐Ÿฆ‘Intermediate Carding:

In this level the carder do carding of slightly higher goods like background reports, or very small physical items like some clothes. Mostly in this level carders use to do carding of goods below 50$. The different between the Level 1 and Level 2 carding is that Level 2 do carding of physical items.

๐Ÿฆ‘Hard Carding:

This is regarded as the advance carding. In this level the carder do carding of everything this includes: cellphones , laptops and other goods. Mostly in this level the carder use to do carding of goods above 50$ and the upper limits is not fixed.
We suggest that if you want to start your life as carder mover from level 1 to 3 gradually. Donโ€™t try to go on Hard Carding if you have no idea of carding because it may end up you at jail.

๐Ÿฆ‘Now that you know all the needful about carding, letโ€™s move to the main partโ€ฆ.

To progress with this stage make sure you have gathered all your tools:

1) Credit Card

2) Socks5 matching with the CC owner address

3) CCleaner Software

4) MAC address changer software

5) High Speed internet

๐Ÿฆ‘How to use socks in Mozilla Firefox:

6) Open your firefox

7) Go to Options

> Click on Advanced setting

8) Select Network and setup port and proxy

9) Now the screen will pop up with various options like :

> 1. No proxy;

2.Auto Detect;

3.Use system proxy;

4. Manual proxy configuration.

> You mark 4. Manual proxy configuration. Now type in socks host IP you have,

> For example Socks Host: 161.0.8.34 Port: 1080

@ Mr. BotNet(tm)
- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -
- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -

๐Ÿฆ‘Latest Method Of Carding 2019:
AFTER DONE ALL WE WRITE BEFORE: NOW YOU ARE READY TO START
(instagram.com/UnderCodeTestingCOMPANY)

1) This carding method is easy and simple to do on any online shopping site, you just have to buy a valid cc and viola! you can start carding but make sure there is balance in cc otherwise order will be failed (You can buy live cc from +18607173981 he is a legit guy with 90% sure live valid CCโ€™s )

2) Create an email account with CC matching name.

> E.g If CC name is Martins John then make like

Example777@gmail.com

3) Now Run Remote Desktop Connection and connect with your RDP Host. But if are not using rdp then follow the below stepsโ€ฆ
Run MAC address changer, change all MAC address.

4) Run CCleaner. Analyze and clean.

5) Set socks5 in Mozzila firefox. I believe I explained that already, scroll up if you didnโ€™t read it.

6) Now Restart Firefox and goto www.check2ip.com and check if your ip is blacklisted or not and is it the same as CC holder address.

7) Now open any shopping site. I will recommend a shopping site from your country. Why? Because you dont need to wait a lot to get your package

8) Now Register with credit card holder information, name, country, city, address, and email you made one just for this order.

9) Choose your item & add to cart. Never choose big amount items first.

10) In shipping address enter your address or your drop address, where you want to deliver product.

11) Go to payment page, choose Credit Card as payment method
Enter your CC details. Like CC Number, CC holder name, CVV/CVV, Exp. Date. Donโ€™t copy & paste info.

> Type it one by one. Cause most site have copy-paste detector script..

> In Billing address enter CC holder address. Now proceed to payment.

๐Ÿฆ‘Wait for order to arrive to your shipping address. When they arrive the courier boy will call you. Then ask for any ID card. If you can make fake ID card then good. Otherwise show your any ID card (School ID Voter ID, College ID card)

NOTE: Try to card small amount item first within $200, then after shipping you can go for big order, try to use fast delivery

@ Mr. BotNet(tm)
- - - - - - Uา‰Nา‰Dา‰Eา‰Rา‰Cา‰Oา‰Dา‰Eา‰- - - - -
โญ๏ธ ENJOY WITH OUR TUTORIALS FULL CARDING 2019 PC / ANDROID

Share us t.me/undercOdeTestingOfficial