- - - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆFULL CARDING 2019 BY undercOde:
(t.me/UnderCodeTestingOfficial)
๐ฆ๐๐๐ฅ ๐ค ๐๐ฅ๐๐ฃ๐ฅ:
A) What is Carding??
> Carding is term described as a trick whereby products are being shopped/ordered from any online shops e.g Amazon, Jumia, FlipKart using Fake Cards(Credit/Debit).
๐ฆWho is a Carder ??
A carder is referred to as a man who make uses of Hacked credit card details or buys credit cards from Credit card shops, or even pick up Credit Cards from Dumps Via DarkWeb for the purpose of carding online shops.
๐ฆWhat You Will Need To Start Carding:
1) Computer or Laptop
2) Socks (Compulsory, But some people do use VPN, but itโs advisable to use Socks)
3) Mac Address Changer (Compulsory)
4) CCleaner
5) RDP (is optional,but itโs advisable to use it for security purposes)
6) Drop (optional but itโs advisable to use it for more Secured shopping sites)
7) Cc (Credit Card)
๐ฆKeypoints In Carding Method:-
1) Computer:
For carding always use a computer. I know some other carders uses a mobile device, but it is less secure and involves more risk.
2) SOCKs:
SOCKS (SOCKet Secure). It is an internet protocol which allows network packets between a client and server traffic pass through a proxy server, so your real IP is hidden and proxy IP get showed.
๐ฆWe use this for the purpose of matching our location same with the Credit Card owner Location to make a successful transaction. And also it doesnโt leak your DNS details but VPN do, so itโs more secure than VPN.
3) MAC Address Changer:
MAC stands for Media Access Control. It is the unique address of every Network Interface Card (NIC), so the work of MAC address changer is to give you another MAC Address for the better anonymousity and safety.
4) CCleaner:
It is very useful tool to clean your browsing history help in cleaning your browsing history, cookies, temp files, etc. But many people neglect this part and they get caught, so please make use you take note of this part.
5) RDP (Remote Desktop Protocol):
RDP It is protocol developed by Microsoft which provides users with a graphical interface to connect a computer to another computer over the network.
๐ฆi.e carders uses it to connect someone else computer while carding, using someone else PC to card from their own Computer.. mainly for anonymity purpose.
6) Drop:
> DROP is an address which the you uses for the shipping address in the carding ops.
> If you are carding with a USA Credit card, then you need to use a USA address as shipping address then your order will be shipped successfully and safely, and you your self will be safe.
> So If you have relative or friends, then no problem, otherwise make use of sites that provides drop services only if you can pay extra for shipping.
7)Credit Card (CC):
This part is main,,sensitive and important part of carding,so calm down and read gently, Any credit card it is in the following format:
| credit card Number |Exp Date| CVV2 code | Name on the Card | Address | City | State | Country | Zip code | Phone # (sometimes not included depending on where you get your credit card from)|
e.g: (randomly taken number/details)
| 4305873969346315 | 05 | 2018 | 591 | UNITED STATES | Dave Washington | 201 |
Stoney Brook Lane | Washingtonton | MA | 01949 |
> IN NEXT TUTORIAL WILL SEND START
Written by Mr. BotNet(tm)
- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆFULL CARDING 2019 BY undercOde:
(t.me/UnderCodeTestingOfficial)
๐ฆ๐๐๐ฅ ๐ค ๐๐ฅ๐๐ฃ๐ฅ:
A) What is Carding??
> Carding is term described as a trick whereby products are being shopped/ordered from any online shops e.g Amazon, Jumia, FlipKart using Fake Cards(Credit/Debit).
๐ฆWho is a Carder ??
A carder is referred to as a man who make uses of Hacked credit card details or buys credit cards from Credit card shops, or even pick up Credit Cards from Dumps Via DarkWeb for the purpose of carding online shops.
๐ฆWhat You Will Need To Start Carding:
1) Computer or Laptop
2) Socks (Compulsory, But some people do use VPN, but itโs advisable to use Socks)
3) Mac Address Changer (Compulsory)
4) CCleaner
5) RDP (is optional,but itโs advisable to use it for security purposes)
6) Drop (optional but itโs advisable to use it for more Secured shopping sites)
7) Cc (Credit Card)
๐ฆKeypoints In Carding Method:-
1) Computer:
For carding always use a computer. I know some other carders uses a mobile device, but it is less secure and involves more risk.
2) SOCKs:
SOCKS (SOCKet Secure). It is an internet protocol which allows network packets between a client and server traffic pass through a proxy server, so your real IP is hidden and proxy IP get showed.
๐ฆWe use this for the purpose of matching our location same with the Credit Card owner Location to make a successful transaction. And also it doesnโt leak your DNS details but VPN do, so itโs more secure than VPN.
3) MAC Address Changer:
MAC stands for Media Access Control. It is the unique address of every Network Interface Card (NIC), so the work of MAC address changer is to give you another MAC Address for the better anonymousity and safety.
4) CCleaner:
It is very useful tool to clean your browsing history help in cleaning your browsing history, cookies, temp files, etc. But many people neglect this part and they get caught, so please make use you take note of this part.
5) RDP (Remote Desktop Protocol):
RDP It is protocol developed by Microsoft which provides users with a graphical interface to connect a computer to another computer over the network.
๐ฆi.e carders uses it to connect someone else computer while carding, using someone else PC to card from their own Computer.. mainly for anonymity purpose.
6) Drop:
> DROP is an address which the you uses for the shipping address in the carding ops.
> If you are carding with a USA Credit card, then you need to use a USA address as shipping address then your order will be shipped successfully and safely, and you your self will be safe.
> So If you have relative or friends, then no problem, otherwise make use of sites that provides drop services only if you can pay extra for shipping.
7)Credit Card (CC):
This part is main,,sensitive and important part of carding,so calm down and read gently, Any credit card it is in the following format:
| credit card Number |Exp Date| CVV2 code | Name on the Card | Address | City | State | Country | Zip code | Phone # (sometimes not included depending on where you get your credit card from)|
e.g: (randomly taken number/details)
| 4305873969346315 | 05 | 2018 | 591 | UNITED STATES | Dave Washington | 201 |
Stoney Brook Lane | Washingtonton | MA | 01949 |
> IN NEXT TUTORIAL WILL SEND START
Written by Mr. BotNet(tm)
- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆTypes Of Carding ALL:
(t.me/UnderCodeTestingOfficial)
A) According to some great carders, there are three types/levels of carding. They are listed as:
๐ฆEasy Carding:
> In this level a carder do carding of very cheap goods. For example: small phone call bills, etc. Mostly in this level the carder use to do carding of goods below 50$. This is known as the beginners level of carding.
๐ฆIntermediate Carding:
In this level the carder do carding of slightly higher goods like background reports, or very small physical items like some clothes. Mostly in this level carders use to do carding of goods below 50$. The different between the Level 1 and Level 2 carding is that Level 2 do carding of physical items.
๐ฆHard Carding:
This is regarded as the advance carding. In this level the carder do carding of everything this includes: cellphones , laptops and other goods. Mostly in this level the carder use to do carding of goods above 50$ and the upper limits is not fixed.
We suggest that if you want to start your life as carder mover from level 1 to 3 gradually. Donโt try to go on Hard Carding if you have no idea of carding because it may end up you at jail.
๐ฆNow that you know all the needful about carding, letโs move to the main partโฆ.
To progress with this stage make sure you have gathered all your tools:
1) Credit Card
2) Socks5 matching with the CC owner address
3) CCleaner Software
4) MAC address changer software
5) High Speed internet
๐ฆHow to use socks in Mozilla Firefox:
6) Open your firefox
7) Go to Options
> Click on Advanced setting
8) Select Network and setup port and proxy
9) Now the screen will pop up with various options like :
> 1. No proxy;
2.Auto Detect;
3.Use system proxy;
4. Manual proxy configuration.
> You mark 4. Manual proxy configuration. Now type in socks host IP you have,
> For example Socks Host: 161.0.8.34 Port: 1080
@ Mr. BotNet(tm)
- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆTypes Of Carding ALL:
(t.me/UnderCodeTestingOfficial)
A) According to some great carders, there are three types/levels of carding. They are listed as:
๐ฆEasy Carding:
> In this level a carder do carding of very cheap goods. For example: small phone call bills, etc. Mostly in this level the carder use to do carding of goods below 50$. This is known as the beginners level of carding.
๐ฆIntermediate Carding:
In this level the carder do carding of slightly higher goods like background reports, or very small physical items like some clothes. Mostly in this level carders use to do carding of goods below 50$. The different between the Level 1 and Level 2 carding is that Level 2 do carding of physical items.
๐ฆHard Carding:
This is regarded as the advance carding. In this level the carder do carding of everything this includes: cellphones , laptops and other goods. Mostly in this level the carder use to do carding of goods above 50$ and the upper limits is not fixed.
We suggest that if you want to start your life as carder mover from level 1 to 3 gradually. Donโt try to go on Hard Carding if you have no idea of carding because it may end up you at jail.
๐ฆNow that you know all the needful about carding, letโs move to the main partโฆ.
To progress with this stage make sure you have gathered all your tools:
1) Credit Card
2) Socks5 matching with the CC owner address
3) CCleaner Software
4) MAC address changer software
5) High Speed internet
๐ฆHow to use socks in Mozilla Firefox:
6) Open your firefox
7) Go to Options
> Click on Advanced setting
8) Select Network and setup port and proxy
9) Now the screen will pop up with various options like :
> 1. No proxy;
2.Auto Detect;
3.Use system proxy;
4. Manual proxy configuration.
> You mark 4. Manual proxy configuration. Now type in socks host IP you have,
> For example Socks Host: 161.0.8.34 Port: 1080
@ Mr. BotNet(tm)
- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆLatest Method Of Carding 2019:
AFTER DONE ALL WE WRITE BEFORE: NOW YOU ARE READY TO START
(instagram.com/UnderCodeTestingCOMPANY)
1) This carding method is easy and simple to do on any online shopping site, you just have to buy a valid cc and viola! you can start carding but make sure there is balance in cc otherwise order will be failed (You can buy live cc from +18607173981 he is a legit guy with 90% sure live valid CCโs )
2) Create an email account with CC matching name.
> E.g If CC name is Martins John then make like
Example777@gmail.com
3) Now Run Remote Desktop Connection and connect with your RDP Host. But if are not using rdp then follow the below stepsโฆ
Run MAC address changer, change all MAC address.
4) Run CCleaner. Analyze and clean.
5) Set socks5 in Mozzila firefox. I believe I explained that already, scroll up if you didnโt read it.
6) Now Restart Firefox and goto www.check2ip.com and check if your ip is blacklisted or not and is it the same as CC holder address.
7) Now open any shopping site. I will recommend a shopping site from your country. Why? Because you dont need to wait a lot to get your package
8) Now Register with credit card holder information, name, country, city, address, and email you made one just for this order.
9) Choose your item & add to cart. Never choose big amount items first.
10) In shipping address enter your address or your drop address, where you want to deliver product.
11) Go to payment page, choose Credit Card as payment method
Enter your CC details. Like CC Number, CC holder name, CVV/CVV, Exp. Date. Donโt copy & paste info.
> Type it one by one. Cause most site have copy-paste detector script..
> In Billing address enter CC holder address. Now proceed to payment.
๐ฆWait for order to arrive to your shipping address. When they arrive the courier boy will call you. Then ask for any ID card. If you can make fake ID card then good. Otherwise show your any ID card (School ID Voter ID, College ID card)
NOTE: Try to card small amount item first within $200, then after shipping you can go for big order, try to use fast delivery
@ Mr. BotNet(tm)
- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆLatest Method Of Carding 2019:
AFTER DONE ALL WE WRITE BEFORE: NOW YOU ARE READY TO START
(instagram.com/UnderCodeTestingCOMPANY)
1) This carding method is easy and simple to do on any online shopping site, you just have to buy a valid cc and viola! you can start carding but make sure there is balance in cc otherwise order will be failed (You can buy live cc from +18607173981 he is a legit guy with 90% sure live valid CCโs )
2) Create an email account with CC matching name.
> E.g If CC name is Martins John then make like
Example777@gmail.com
3) Now Run Remote Desktop Connection and connect with your RDP Host. But if are not using rdp then follow the below stepsโฆ
Run MAC address changer, change all MAC address.
4) Run CCleaner. Analyze and clean.
5) Set socks5 in Mozzila firefox. I believe I explained that already, scroll up if you didnโt read it.
6) Now Restart Firefox and goto www.check2ip.com and check if your ip is blacklisted or not and is it the same as CC holder address.
7) Now open any shopping site. I will recommend a shopping site from your country. Why? Because you dont need to wait a lot to get your package
8) Now Register with credit card holder information, name, country, city, address, and email you made one just for this order.
9) Choose your item & add to cart. Never choose big amount items first.
10) In shipping address enter your address or your drop address, where you want to deliver product.
11) Go to payment page, choose Credit Card as payment method
Enter your CC details. Like CC Number, CC holder name, CVV/CVV, Exp. Date. Donโt copy & paste info.
> Type it one by one. Cause most site have copy-paste detector script..
> In Billing address enter CC holder address. Now proceed to payment.
๐ฆWait for order to arrive to your shipping address. When they arrive the courier boy will call you. Then ask for any ID card. If you can make fake ID card then good. Otherwise show your any ID card (School ID Voter ID, College ID card)
NOTE: Try to card small amount item first within $200, then after shipping you can go for big order, try to use fast delivery
@ Mr. BotNet(tm)
- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
โญ๏ธ ENJOY WITH OUR TUTORIALS FULL CARDING 2019 PC / ANDROID
Share us t.me/undercOdeTestingOfficial
Share us t.me/undercOdeTestingOfficial
W A N T N E X T :
Anonymous Poll
47%
HACK ON KALI ?
49%
HACK ON TERMUX ?
4%
โ๐๐๐๐ธโ๐ป๐ ๐๐โ๐ผ ๐พ๐๐๐ป๐ผ๐ ?
- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆ bypass sni-based https filtering ON KALI LINUX
(t.me/UnderCodeTestingOfficial)
UnderStanding L attack FULL
๐ฆWHAT IS SNI:
> SNI is a technology that allows multiple web server to be hosted on the same IP and listening on the same port but use different SSL/TLS certificates for encryption. Before SNI two web servers listening on the same port had to share the certificate, for example having a reverse proxy handling the TLS channel and redirecting the traffic to the actual web-server
> Until now, we have bypassed censorship by connecting with the https protocol. But now it is useless. All Korean men consider this very serious.
๐ฆWHAT ABOUT HTTPS:
> HTTPS (HTTP with TLS or SSL) does not avoid censorship, what it does is encrypt - and provide integrity and authentication in some schemes - the communication channel so an adversary that is able to watch the traffic - a.k.a. eavesdropper - is not able to know what information is being transmitted. It does not have any anti-censorship property, an attacker that is able to cut the transmission channel won't know what it was sent but the communication will be stopped anyway.
>Even more, for the particular case of HTTPS with SNI, not every information is encrypted. The hostname you're connecting to is sent in the clear when the TLS handshake is made
> There are ways to do things like using proxy, VPN, Tor, but I do not think it's a fundamental solution. It is not a fundamental solution unless taking action on the server.
๐ฆ How GOV Bypass:
1) governments ban access to certain websites through DNS.
> DNS is a protocol to translate hostnames into IPs that a computer can connect to, this means that if you have configured your DNS resolver to be x.x.x.x you can only access those hostnames for whom x.x.x.x knows the IP.
2) In some cases changing the DNS resolver is enough to recover access to banned websites
> (Some popular DNS resolvers are 8.8.8.8 and 8.8.4.4 from Google or 1.1.1.1 and 1.0.0.1 from Cloudflare).
3) This happened in Syria some years ago where the Google DNS was written with paint on the walls to recover access to media information. Note that in this case, changing the DNS resolver won't prevent an adversary in the local network or in an intermediary node from knowing that the client is communicating with the webserver
4) using a VPN or Tor an adversary in the local network of the client or in an intermediary node until the Tor entry point will know that you're connecting to that VPN or Tor entry node but won't be able to know anything after that. In a similar way the web server - and an adversary in its local network - will know that the connection is coming from a Tor exit node.
> For VPNs and Tor network special care needs to be taken to prevent DNS leaks
> Using proxies may be secure depending on the proxy type.
5) A SOCKS proxy will work similar to the Tor network but with a single node, this greatly reduces privacy as an adversary eavesdropping the incoming and outgoing traffic of the proxy can easily identify which proxy user is connecting to which web server, this is not as simple in Tor as entry and exit nodes are different and don't communicate directly.
6) If an HTTPS proxy is used instead, the connection is encrypted between the client and the proxy using the proxy certificate, then decrypted and reencrypted using the web server certificate. This means that the client needs to trust the proxy as it can see all the traffic going through it. Furthermore, client's browser will probably show warnings as the proxy certificate won't be trusted.
7) Finallly using a VPN, Tor or both is the best solution. Contrary to what it seems, censorship is applied on the "client side" of the connection and not on the web server. What is disallowed is that clients from certain countries connect to the webserver, the webserver can't do anything about that AFAIK
@ฬถฬ ฬธฬ ฬฬนMฬถฬrฬตฬ.
๐ฆ bypass sni-based https filtering ON KALI LINUX
(t.me/UnderCodeTestingOfficial)
UnderStanding L attack FULL
๐ฆWHAT IS SNI:
> SNI is a technology that allows multiple web server to be hosted on the same IP and listening on the same port but use different SSL/TLS certificates for encryption. Before SNI two web servers listening on the same port had to share the certificate, for example having a reverse proxy handling the TLS channel and redirecting the traffic to the actual web-server
> Until now, we have bypassed censorship by connecting with the https protocol. But now it is useless. All Korean men consider this very serious.
๐ฆWHAT ABOUT HTTPS:
> HTTPS (HTTP with TLS or SSL) does not avoid censorship, what it does is encrypt - and provide integrity and authentication in some schemes - the communication channel so an adversary that is able to watch the traffic - a.k.a. eavesdropper - is not able to know what information is being transmitted. It does not have any anti-censorship property, an attacker that is able to cut the transmission channel won't know what it was sent but the communication will be stopped anyway.
>Even more, for the particular case of HTTPS with SNI, not every information is encrypted. The hostname you're connecting to is sent in the clear when the TLS handshake is made
> There are ways to do things like using proxy, VPN, Tor, but I do not think it's a fundamental solution. It is not a fundamental solution unless taking action on the server.
๐ฆ How GOV Bypass:
1) governments ban access to certain websites through DNS.
> DNS is a protocol to translate hostnames into IPs that a computer can connect to, this means that if you have configured your DNS resolver to be x.x.x.x you can only access those hostnames for whom x.x.x.x knows the IP.
2) In some cases changing the DNS resolver is enough to recover access to banned websites
> (Some popular DNS resolvers are 8.8.8.8 and 8.8.4.4 from Google or 1.1.1.1 and 1.0.0.1 from Cloudflare).
3) This happened in Syria some years ago where the Google DNS was written with paint on the walls to recover access to media information. Note that in this case, changing the DNS resolver won't prevent an adversary in the local network or in an intermediary node from knowing that the client is communicating with the webserver
4) using a VPN or Tor an adversary in the local network of the client or in an intermediary node until the Tor entry point will know that you're connecting to that VPN or Tor entry node but won't be able to know anything after that. In a similar way the web server - and an adversary in its local network - will know that the connection is coming from a Tor exit node.
> For VPNs and Tor network special care needs to be taken to prevent DNS leaks
> Using proxies may be secure depending on the proxy type.
5) A SOCKS proxy will work similar to the Tor network but with a single node, this greatly reduces privacy as an adversary eavesdropping the incoming and outgoing traffic of the proxy can easily identify which proxy user is connecting to which web server, this is not as simple in Tor as entry and exit nodes are different and don't communicate directly.
6) If an HTTPS proxy is used instead, the connection is encrypted between the client and the proxy using the proxy certificate, then decrypted and reencrypted using the web server certificate. This means that the client needs to trust the proxy as it can see all the traffic going through it. Furthermore, client's browser will probably show warnings as the proxy certificate won't be trusted.
7) Finallly using a VPN, Tor or both is the best solution. Contrary to what it seems, censorship is applied on the "client side" of the connection and not on the web server. What is disallowed is that clients from certain countries connect to the webserver, the webserver can't do anything about that AFAIK
@ฬถฬ ฬธฬ ฬฬนMฬถฬrฬตฬ.
ฬถฬ ออ ฬดฬBฬตฬ
ฬนoฬตอtฬท ฬอnฬถฬ ฬอeฬดอtฬดฬ อฬ (ฬตอtฬด อฬฝ.ฬธอmฬถฬ ฬอ.ฬทฬ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆfull control of network operations
Ncrack network authentication tool
2019 Update For kali % parrot :
(instagram.com/UndercodeTestingCompany)
๐ฆINSTALLISATION & RUN;
> Installed On kali % Parrot os AS default Tools:
For manual install:
>git clone https://github.com/nmap/ncrack
๐ฆHow use ncrack :
1) Use verbose mode (-v), read a list of IP addresses (-iL win.txt),
2) attempt to login with the username victim
> (โuser victim) along with the passwords in a dictionary
> (-P passes.txt) using the RDP protocol (-p rdp) with a one connection at a time (CL=1):
๐ฆFULL COMMAND:
3) ncrack -v -iL win.txt --user victim -P passes.txt -p rdp CL=1
4) IT SHOW (OUTPUT)
>Starting Ncrack 0.6 ( http://ncrack.org ) at ...
๐ฆFeatures:
1) Ncrack's features include a very flexible interface granting the user full control of network operations, allowing for very sophisticated bruteforcing attacks, timing templates for ease of use, runtime interaction similar to Nmap's and many more.
2) Protocols supported are: SSH, RDP, FTP, Telnet, HTTP(S), Wordpress, POP3(S), IMAP, CVS, SMB, VNC, SIP, Redis, PostgreSQL, MQTT, MySQL, MSSQL, MongoDB, Cassandra, WinRM, OWA, DICOM.
@ฬถฬ ฬธฬ ฬฬนMฬถฬrฬตฬ.ฬถฬ ออ ฬดฬBฬตฬ ฬนoฬตอtฬท ฬอnฬถฬ ฬอeฬดอtฬดฬ อฬ (ฬตอtฬด อฬฝ.ฬธอmฬถฬ ฬอ.ฬทฬ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆfull control of network operations
Ncrack network authentication tool
2019 Update For kali % parrot :
(instagram.com/UndercodeTestingCompany)
๐ฆINSTALLISATION & RUN;
> Installed On kali % Parrot os AS default Tools:
For manual install:
>git clone https://github.com/nmap/ncrack
๐ฆHow use ncrack :
1) Use verbose mode (-v), read a list of IP addresses (-iL win.txt),
2) attempt to login with the username victim
> (โuser victim) along with the passwords in a dictionary
> (-P passes.txt) using the RDP protocol (-p rdp) with a one connection at a time (CL=1):
๐ฆFULL COMMAND:
3) ncrack -v -iL win.txt --user victim -P passes.txt -p rdp CL=1
4) IT SHOW (OUTPUT)
>Starting Ncrack 0.6 ( http://ncrack.org ) at ...
๐ฆFeatures:
1) Ncrack's features include a very flexible interface granting the user full control of network operations, allowing for very sophisticated bruteforcing attacks, timing templates for ease of use, runtime interaction similar to Nmap's and many more.
2) Protocols supported are: SSH, RDP, FTP, Telnet, HTTP(S), Wordpress, POP3(S), IMAP, CVS, SMB, VNC, SIP, Redis, PostgreSQL, MQTT, MySQL, MSSQL, MongoDB, Cassandra, WinRM, OWA, DICOM.
@ฬถฬ ฬธฬ ฬฬนMฬถฬrฬตฬ.ฬถฬ ออ ฬดฬBฬตฬ ฬนoฬตอtฬท ฬอnฬถฬ ฬอeฬดอtฬดฬ อฬ (ฬตอtฬด อฬฝ.ฬธอmฬถฬ ฬอ.ฬทฬ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆTERMUX GUIDE BY undercOde:
(Twitter.com/UndercodeTC)
๐ฆSOME USEFULL TOOLS:
1- How To Install NMAP tool in Termux:
> pkg install nmap
2-How To Install Hydra in Termux
> Pkg install Hydra
3- How To Install RED_HAWK Tool in Termux
>Pkg install php
> y for Yes
> pkg install git
> git is used to directly cloning files from github or you can download scripts, tools from github or other sources and use
> git clone https://github.com/Tuhinshubhra/RED_HAWK.git
> After success response
> Find the Directory of RED_HAWK
> cd
> ls
>Chmod +x RED_HAWK
> cd RED_HAWK
> Then again type chmod +x rhawk.php
> Finally type this command in Termux to use
> php rhawk.php
ENJOY
Written by Steave(tm)
- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆTERMUX GUIDE BY undercOde:
(Twitter.com/UndercodeTC)
๐ฆSOME USEFULL TOOLS:
1- How To Install NMAP tool in Termux:
> pkg install nmap
2-How To Install Hydra in Termux
> Pkg install Hydra
3- How To Install RED_HAWK Tool in Termux
>Pkg install php
> y for Yes
> pkg install git
> git is used to directly cloning files from github or you can download scripts, tools from github or other sources and use
> git clone https://github.com/Tuhinshubhra/RED_HAWK.git
> After success response
> Find the Directory of RED_HAWK
> cd
> ls
>Chmod +x RED_HAWK
> cd RED_HAWK
> Then again type chmod +x rhawk.php
> Finally type this command in Termux to use
> php rhawk.php
ENJOY
Written by Steave(tm)
- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
HOW CONVERT Hack files to PHP 5.4 files
(T.me/UnderCodeTestingOfficial)
๐ฆINSTALLISATION:
1) CLONE THIS REPO
git clone https://github.com/codeneric/hack2php
2) cd hack2php
๐ฆRUN:
hhvm composer.phar install
4) To compile run again:
Compile a Hack file to PHP: ./bin/hack2php <hack-file>
5) PLEASE USE THIS FOR LEARNING AND NOT THIS NOT SAFE ON TERMUX AND CAUSE MANY ERRORS
๐ฆTHE CODE :
namespace codeneric\phmm\legacy\validate;
use codeneric\phmm\legacy\blub;
function blub(string $v): ?string {
return null;
}
function ano(): void {
$a = 42;
$arr = [1, 2, 3, 42, 5, 6];
$f = ($e) ==> {
return \in_array($a, $arr);
};
}
is transpiled to this PHP code:
<?php //strict
namespace codeneric\phmm\legacy\validate;
use \codeneric\phmm\legacy\blub;
function blub($v){
return null;
}
function ano(){
$a = 42;
$arr = [1, 2, 3, 42, 5, 6];
$f = function ($e) use($a,$arr) {
return \in_array($a, $arr);
};
}
Written by Mr. BotNet(t.m)
- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
HOW CONVERT Hack files to PHP 5.4 files
(T.me/UnderCodeTestingOfficial)
๐ฆINSTALLISATION:
1) CLONE THIS REPO
git clone https://github.com/codeneric/hack2php
2) cd hack2php
๐ฆRUN:
hhvm composer.phar install
4) To compile run again:
Compile a Hack file to PHP: ./bin/hack2php <hack-file>
5) PLEASE USE THIS FOR LEARNING AND NOT THIS NOT SAFE ON TERMUX AND CAUSE MANY ERRORS
๐ฆTHE CODE :
namespace codeneric\phmm\legacy\validate;
use codeneric\phmm\legacy\blub;
function blub(string $v): ?string {
return null;
}
function ano(): void {
$a = 42;
$arr = [1, 2, 3, 42, 5, 6];
$f = ($e) ==> {
return \in_array($a, $arr);
};
}
is transpiled to this PHP code:
<?php //strict
namespace codeneric\phmm\legacy\validate;
use \codeneric\phmm\legacy\blub;
function blub($v){
return null;
}
function ano(){
$a = 42;
$arr = [1, 2, 3, 42, 5, 6];
$f = function ($e) use($a,$arr) {
return \in_array($a, $arr);
};
}
Written by Mr. BotNet(t.m)
- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆ15+ Best APKs For Free Movies & TV Shows With No Buffering:
Tested
(instagram.com/UnderCodeTestingCompany)
๐ฆINSTALLISATION:
1) UnlockMyTv
> https://morphtv.org/unlockmytv-apk/
2) Kodi
> https://kodi.tv/download
3) Cinema APK
> https://cinemaapk.net
4) CatMouse APK
> https://olatv.me/catmouse-apk/
5) Morph TV
> https://morphtv.net/
6) TVZion
> https://tvzion.me/
7) CyberFlix TV
> https://cyberflixtv.info/
8) BeeTV
> http://beetvapk.me/
9) Popcorn Time APK
> https://getpopcorntime.is/android.html
10) Live Lounge
> https://olatv.me/live-lounge-apk/
11) Typhoon TV
> https://www.typhoontv.me/
12) MediaBox HD
> https://mediaboxhd.net/
13) Solex TV
> https://www.solextv.com/
14) Megabox HD
> https://megaboxhdofficial.com/
15) Nova TV
> https://olatv.me/nova-tv-apk/
wฬฝอrฬฝอiฬฝอtฬฝอtฬฝอeฬฝอnฬฝอ ฬฝอbฬฝอyฬฝอ ฬฝอMฬฝอrฬฝอ.ฬฝอ ฬฝอBฬฝอoฬฝอtฬฝอNฬฝอeฬฝอtฬฝอ ฬฝอ(ฬฝอtฬฝอ.ฬฝอmฬฝอ.ฬฝอ)ฬฝอ
- - - - - - UาNาDาEาRาCาOาDาEา- - - - - -
๐ฆ15+ Best APKs For Free Movies & TV Shows With No Buffering:
Tested
(instagram.com/UnderCodeTestingCompany)
๐ฆINSTALLISATION:
1) UnlockMyTv
> https://morphtv.org/unlockmytv-apk/
2) Kodi
> https://kodi.tv/download
3) Cinema APK
> https://cinemaapk.net
4) CatMouse APK
> https://olatv.me/catmouse-apk/
5) Morph TV
> https://morphtv.net/
6) TVZion
> https://tvzion.me/
7) CyberFlix TV
> https://cyberflixtv.info/
8) BeeTV
> http://beetvapk.me/
9) Popcorn Time APK
> https://getpopcorntime.is/android.html
10) Live Lounge
> https://olatv.me/live-lounge-apk/
11) Typhoon TV
> https://www.typhoontv.me/
12) MediaBox HD
> https://mediaboxhd.net/
13) Solex TV
> https://www.solextv.com/
14) Megabox HD
> https://megaboxhdofficial.com/
15) Nova TV
> https://olatv.me/nova-tv-apk/
wฬฝอrฬฝอiฬฝอtฬฝอtฬฝอeฬฝอnฬฝอ ฬฝอbฬฝอyฬฝอ ฬฝอMฬฝอrฬฝอ.ฬฝอ ฬฝอBฬฝอoฬฝอtฬฝอNฬฝอeฬฝอtฬฝอ ฬฝอ(ฬฝอtฬฝอ.ฬฝอmฬฝอ.ฬฝอ)ฬฝอ
- - - - - - UาNาDาEาRาCาOาDาEา- - - - - -
Instagram
Login โข Instagram
Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.
- - - - - - UาNาDาEาRาCาOาDาEา- - - - - -
๐ฆHOW BROWSING USING COMMAND LINE ONE TERMUX SIMPLY
(T.me/UnderCodeTestingOfficial)
๐ฆLET S START:
Open termux & Type:
1) apt update
2) apt upgrade
3) type
> pkg install w3m
>press Enter from your keyboard
> press y
4) RUN w3m along side the url of our choice.
> Now type w3m url kindly replace the url with any website.
> For instance, to access www.google.com ,
It Show After Typing the same example site like
> w3m www.google.com then press Enter from your keyboard.
5) WELL DONE NOW U BROWSING USING TERMUX
๐ฆHow to use the Keyboard while browsing via command line
6) tap anywhere in the search space
7) Simply slide from Left of your screen to Right,
> then tap on keyboard.
7) Now type Site url or text... in search engine
ENJOY
wฬฝอrฬฝอiฬฝอtฬฝอtฬฝอeฬฝอnฬฝอ ฬฝอbฬฝอyฬฝอ ฬฝอMฬฝอrฬฝอ.ฬฝอ ฬฝอBฬฝอoฬฝอtฬฝอNฬฝอeฬฝอtฬฝอ ฬฝอ(ฬฝอtฬฝอ.ฬฝอmฬฝอ.ฬฝอ)ฬฝอ
- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆHOW BROWSING USING COMMAND LINE ONE TERMUX SIMPLY
(T.me/UnderCodeTestingOfficial)
๐ฆLET S START:
Open termux & Type:
1) apt update
2) apt upgrade
3) type
> pkg install w3m
>press Enter from your keyboard
> press y
4) RUN w3m along side the url of our choice.
> Now type w3m url kindly replace the url with any website.
> For instance, to access www.google.com ,
It Show After Typing the same example site like
> w3m www.google.com then press Enter from your keyboard.
5) WELL DONE NOW U BROWSING USING TERMUX
๐ฆHow to use the Keyboard while browsing via command line
6) tap anywhere in the search space
7) Simply slide from Left of your screen to Right,
> then tap on keyboard.
7) Now type Site url or text... in search engine
ENJOY
wฬฝอrฬฝอiฬฝอtฬฝอtฬฝอeฬฝอnฬฝอ ฬฝอbฬฝอyฬฝอ ฬฝอMฬฝอrฬฝอ.ฬฝอ ฬฝอBฬฝอoฬฝอtฬฝอNฬฝอeฬฝอtฬฝอ ฬฝอ(ฬฝอtฬฝอ.ฬฝอmฬฝอ.ฬฝอ)ฬฝอ
- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
- - - - - - UาNาDาEาRาCาOาDาEา- - - - - -
๐ฆTHE Most Usuable SCRipt For Termux Now
> The missing terminal file manager for X NOW AVAIBLE FOR TERMUX
+ Video Tutorial:
(Twitter.com/UnderCodeTC)
๐ฆWHAT CAN USE FOR ?
1) nnn is a full-featured terminal file manager. It's tiny, extremely light and fast.
2) nnn is also a disk usage analyzer, a fuzzy app launcher, a batch file renamer and a file picker. The plugin repository has 30+ plugins to extend the capabilities further. There's an independent (neo)vim plugin.
3) It runs smoothly on the Raspberry Pi, Termux on Android, Linux, macOS, BSD, Cygwin and Linux subsystem for Windows. nnn works seamlessly with DEs and GUI utilities. It's nearly zero-config (with sensible defaults) and can be setup in less than 5 minutes.
๐ฆ๐ธ๐ฝ๐ ๐ ๐ฐ๐ป๐ป๐ธ๐ ๐ฐ๐ ๐ธ๐พ๐ฝ & ๐ ๐ ๐ฝ:
Lets install DEpencies:
> TYPE
1) apt update && apt upgrade
2) sudo apt-get install pkg-config libncursesw5-dev libreadline-dev
3) make
4) sudo make strip install
5) Pick the appropriate file for your shell from misc/quitcd and add the contents to your shell's rc file. You'll need to spawn a new shell for the change to take effect. You should start nnn as n (or your preferred function name/alias).
If opted, nnn writes the last working directory to
> ${XDG_CONFIG_HOME:-$HOME/.config}/nnn/.lastd
๐ฆFOR MORE:
https://github.com/jarun/nnn/wiki/Basic-use-cases#configure-cd-on-quit
6) TYPE:
> curl -Ls https://raw.githubusercontent.com/jarun/nnn/master/plugins/getplugs | sh
๐ฆFOR MORE
> https://github.com/jarun/nnn/tree/master/plugins#installing-plugins
> https://github.com/jarun/nnn/tree/master/misc/nlaunch
7) Plugins are installed to
> ${XDG_CONFIG_HOME:-$HOME/.config}/nnn/plugins.
8) TO RUN :
> nnn -h
> man nnn
9) ๐ฆVideo Tutorial:
> https://www.youtube.com/watch?v=AbaauM7gUJw
ENJOY WITH OUR TUTORIALS
wฬฝอrฬฝอiฬฝอtฬฝอtฬฝอeฬฝอnฬฝอ ฬฝอbฬฝอyฬฝอ ฬฝอMฬฝอrฬฝอ.ฬฝอ ฬฝอBฬฝอoฬฝอtฬฝอNฬฝอeฬฝอtฬฝอ ฬฝอ(ฬฝอtฬฝอ.ฬฝอmฬฝอ.ฬฝอ)ฬฝอ
- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆTHE Most Usuable SCRipt For Termux Now
> The missing terminal file manager for X NOW AVAIBLE FOR TERMUX
+ Video Tutorial:
(Twitter.com/UnderCodeTC)
๐ฆWHAT CAN USE FOR ?
1) nnn is a full-featured terminal file manager. It's tiny, extremely light and fast.
2) nnn is also a disk usage analyzer, a fuzzy app launcher, a batch file renamer and a file picker. The plugin repository has 30+ plugins to extend the capabilities further. There's an independent (neo)vim plugin.
3) It runs smoothly on the Raspberry Pi, Termux on Android, Linux, macOS, BSD, Cygwin and Linux subsystem for Windows. nnn works seamlessly with DEs and GUI utilities. It's nearly zero-config (with sensible defaults) and can be setup in less than 5 minutes.
๐ฆ๐ธ๐ฝ๐ ๐ ๐ฐ๐ป๐ป๐ธ๐ ๐ฐ๐ ๐ธ๐พ๐ฝ & ๐ ๐ ๐ฝ:
Lets install DEpencies:
> TYPE
1) apt update && apt upgrade
2) sudo apt-get install pkg-config libncursesw5-dev libreadline-dev
3) make
4) sudo make strip install
5) Pick the appropriate file for your shell from misc/quitcd and add the contents to your shell's rc file. You'll need to spawn a new shell for the change to take effect. You should start nnn as n (or your preferred function name/alias).
If opted, nnn writes the last working directory to
> ${XDG_CONFIG_HOME:-$HOME/.config}/nnn/.lastd
๐ฆFOR MORE:
https://github.com/jarun/nnn/wiki/Basic-use-cases#configure-cd-on-quit
6) TYPE:
> curl -Ls https://raw.githubusercontent.com/jarun/nnn/master/plugins/getplugs | sh
๐ฆFOR MORE
> https://github.com/jarun/nnn/tree/master/plugins#installing-plugins
> https://github.com/jarun/nnn/tree/master/misc/nlaunch
7) Plugins are installed to
> ${XDG_CONFIG_HOME:-$HOME/.config}/nnn/plugins.
8) TO RUN :
> nnn -h
> man nnn
9) ๐ฆVideo Tutorial:
> https://www.youtube.com/watch?v=AbaauM7gUJw
ENJOY WITH OUR TUTORIALS
wฬฝอrฬฝอiฬฝอtฬฝอtฬฝอeฬฝอnฬฝอ ฬฝอbฬฝอyฬฝอ ฬฝอMฬฝอrฬฝอ.ฬฝอ ฬฝอBฬฝอoฬฝอtฬฝอNฬฝอeฬฝอtฬฝอ ฬฝอ(ฬฝอtฬฝอ.ฬฝอmฬฝอ.ฬฝอ)ฬฝอ
- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆNEW GREAT LINUX INSTALLER FOR TERMUX 2019
(Facebook.com/UnderCodeTestingCompanie)
๐ฆ๐ธ๐ฝ๐ ๐ ๐ฐ๐ป๐ป๐ธ๐ ๐ฐ๐ ๐ธ๐พ๐ฝ & ๐ ๐ ๐ฝ:
open termux & Type:
1) apt update
2) apt upgrade
3) echo "deb [trusted=yes] https://yadominjinta.github.io/files/ termux extras" >> $PREFIX/etc/apt/sources.list
4) pkg in atilo
๐ฆTO RUN
5) Commands:
> list list available distributions
> installed list installed distributions
> remove remove installed distributions
> install install distributions
> help Show this help
๐ฆFEATURES :
> CAN INSTALL:
1) aarch64 arm x86_64 i686
Arch โ โ ร ร
Alpine โ โ โ โ
CentOS โ โ โ โ
Debian โ โ โ โ
Fedora โ โ โ ร
Kali โ โ โ โ
OpenSuSE โ โ ร ร
ParrotOS โ โ โ โ
Ubuntu Cosmic โ โ โ
ENJOY WITH undercOde TUTORIALS
๐ฆ will send later video tut for this
wฬฝอrฬฝอiฬฝอtฬฝอtฬฝอeฬฝอnฬฝอ ฬฝอbฬฝอyฬฝอ ฬฝอMฬฝอrฬฝอ.ฬฝอ ฬฝอBฬฝอoฬฝอtฬฝอNฬฝอeฬฝอtฬฝอ ฬฝอ(ฬฝอtฬฝอ.ฬฝอmฬฝอ.ฬฝอ)ฬฝอ
- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆNEW GREAT LINUX INSTALLER FOR TERMUX 2019
(Facebook.com/UnderCodeTestingCompanie)
๐ฆ๐ธ๐ฝ๐ ๐ ๐ฐ๐ป๐ป๐ธ๐ ๐ฐ๐ ๐ธ๐พ๐ฝ & ๐ ๐ ๐ฝ:
open termux & Type:
1) apt update
2) apt upgrade
3) echo "deb [trusted=yes] https://yadominjinta.github.io/files/ termux extras" >> $PREFIX/etc/apt/sources.list
4) pkg in atilo
๐ฆTO RUN
5) Commands:
> list list available distributions
> installed list installed distributions
> remove remove installed distributions
> install install distributions
> help Show this help
๐ฆFEATURES :
> CAN INSTALL:
1) aarch64 arm x86_64 i686
Arch โ โ ร ร
Alpine โ โ โ โ
CentOS โ โ โ โ
Debian โ โ โ โ
Fedora โ โ โ ร
Kali โ โ โ โ
OpenSuSE โ โ ร ร
ParrotOS โ โ โ โ
Ubuntu Cosmic โ โ โ
ENJOY WITH undercOde TUTORIALS
๐ฆ will send later video tut for this
wฬฝอrฬฝอiฬฝอtฬฝอtฬฝอeฬฝอnฬฝอ ฬฝอbฬฝอyฬฝอ ฬฝอMฬฝอrฬฝอ.ฬฝอ ฬฝอBฬฝอoฬฝอtฬฝอNฬฝอeฬฝอtฬฝอ ฬฝอ(ฬฝอtฬฝอ.ฬฝอmฬฝอ.ฬฝอ)ฬฝอ
- - - - - - UาNาDาEาRาCาOาDาEา- - - - -
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
- - - - - - UาNาDาEาRาCาOาDาEา- - - - - -
๐ฆBLUTHOOTH DDOSER/KILLER/ JAMMER FOR ANY LINUX DISTRO OR ROOT ANDROID (TERMUX) 2019 script
This is very usefull bluetooth jammer or doser tool in kali or parrot linux...
(instagram.com/UnderCodeTestingCompany)
๐ฆINSTALLISATION & RUN:
1) apt update
2) apt upgrade
3) Use this tool.. Fun in jamming or dosing Bluetooth related devices like Hometheater,Erphones,etc...
4) git clone https://github.com/Anlos0023/bluedoser.git
5) cd bluedoser
6) chmod 7777 bluedoser.sh
7) ./bluedoser.sh
wฬฝอrฬฝอiฬฝอtฬฝอtฬฝอeฬฝอnฬฝอ ฬฝอbฬฝอyฬฝอ ฬฝอMฬฝอrฬฝอ.ฬฝอ ฬฝอBฬฝอoฬฝอtฬฝอNฬฝอeฬฝอtฬฝอ ฬฝอ(ฬฝอtฬฝอ.ฬฝอmฬฝอ.ฬฝอ)ฬฝอ
- - - - - - UาNาDาEาRาCาOาDาEา- - - - - -
๐ฆBLUTHOOTH DDOSER/KILLER/ JAMMER FOR ANY LINUX DISTRO OR ROOT ANDROID (TERMUX) 2019 script
This is very usefull bluetooth jammer or doser tool in kali or parrot linux...
(instagram.com/UnderCodeTestingCompany)
๐ฆINSTALLISATION & RUN:
1) apt update
2) apt upgrade
3) Use this tool.. Fun in jamming or dosing Bluetooth related devices like Hometheater,Erphones,etc...
4) git clone https://github.com/Anlos0023/bluedoser.git
5) cd bluedoser
6) chmod 7777 bluedoser.sh
7) ./bluedoser.sh
wฬฝอrฬฝอiฬฝอtฬฝอtฬฝอeฬฝอnฬฝอ ฬฝอbฬฝอyฬฝอ ฬฝอMฬฝอrฬฝอ.ฬฝอ ฬฝอBฬฝอoฬฝอtฬฝอNฬฝอeฬฝอtฬฝอ ฬฝอ(ฬฝอtฬฝอ.ฬฝอmฬฝอ.ฬฝอ)ฬฝอ
- - - - - - UาNาDาEาRาCาOาDาEา- - - - - -
Instagram
Login โข Instagram
Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.