- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆTermux Lazy Script New 2019:
(instagram.com/UnderCodeTestingCompany)
๐ฆInstallisation & Run:
1) apt update && apt upgrade
2) apt install git
3) apt install python2
4) git clone https://github.com/TechnicalMujeeb/Termux-Lazyscript.git
5) cd Termux-Lazyscript
6) chmod +x *
7) sh setup.sh
@ฬถอ ฬฏฬฏ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆTermux Lazy Script New 2019:
(instagram.com/UnderCodeTestingCompany)
๐ฆInstallisation & Run:
1) apt update && apt upgrade
2) apt install git
3) apt install python2
4) git clone https://github.com/TechnicalMujeeb/Termux-Lazyscript.git
5) cd Termux-Lazyscript
6) chmod +x *
7) sh setup.sh
@ฬถอ ฬฏฬฏ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
Instagram
Login โข Instagram
Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆBEST My top favorite example Of Hacks:
1) Ransomware / Wannacry-like attacks โ attacks against network shares.
2) Data Exposures โ forget breaches, this is where we do it to ourselves.
3) Device / Server Defacement โ no hacking is needed if we leave the front door open.
4) DDoS Botnets and Booters โ we are helping them make their networks bigger.
5) Phishing
Pishing is one of the most common hacking terminology used by security people. Phishing is a technique which tricks users into revealing sensitive information (like usernames, passwords or credit card details) to seemingly benign sources. A phisher disguises as a trustworthy entity and contacts potential victims asking them to reveal information. This could be further used for malicious intent
6) Spoofing
E-mail and IP spoofing are few common hack techniques encountered by users worldwide. E-mail spoofing involves altering the header of an e-mail to make it look legit. For instance, a black hat hacker can make an e-mail look as if it has appeared from your bank or any other source you may trust. On the other hand, IP spoofing refers to an illegitimate packet sent to a computer with an altered IP appearing to be a trusted host. This is carried out with the hope that the packet would be accepted to allow the sender access to the target machine.
7 ) Encryption
Encryption is a process of encoding a message or information to make it unreadable and secretive. This ensures that the concerned information is concealed only to the authorized parties. Often, encryption is employed by hackers to extort money by unleashing ransomware on computer systems, thus locking out victims and encrypting their files.
8) Adware
Adware is typically a software which acts as a spyware to track a userโs browsing activities covertly. It then generates advertisements based on the userโs browsing history. Some adware is maliciously designed to pop up ads with a frequency ultimately slowing down your system. It can collect your personal information, browsing history and provide inputs for further phishing attack
9) Zero Day threat
A zero-day threat refers to a threat which is undocumented and hence hidden from any antivirus scanner installed on the system. This kind of flaw is inherent in anti-virus scanners, making it oblivious to developers who built antivirus functionalities based on knowledge of these vulnerabilities. Such vulnerabilities are exploited through different vectors, popularly web browsers, and malicious attachments via e-mails.
10) Brute Force Attack
Another commonly hacking terminology to get bypass the login pages. Brute Force, aka Exhaustive key search, is a trial and error method to decrypt data such as passwords, Data Encryption Standard (DES) keys or other encrypted information. This method is widely used to crack passwords to admin accounts, which in turn can be used to steal information and documents of paramount importance.
11) HTTPS/SSL/TLS
HTTPS, which stands for Hypertext Transfer Protocol with the โSโ for โSecureโ, is a basic framework that controls how data is transferred across the web. This protocol adds a layer of encryption to provide you with secure daily browsingโyour bank, your email provider, and social network. SSL and TLS are protocols used by HTTPS to provide an added identity proof to your website. It is advised to avoid browsing the website using HTTP and enter any passwords or credit card detail on it.
12) Bot
A bot is a software robot that runs automated tasks (scripts) over the Internet. Many search engines like Google and Bing employ bots, also called spiders, to scan websites and index them for purpose of ranking them according to returns on search queries. ..
13) Rootkit
Rootkits are one of the scariest methods to perform a cyber intrusion mostly because it goes undetected. ..
Wiritten by ฬฏฬฏ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆBEST My top favorite example Of Hacks:
1) Ransomware / Wannacry-like attacks โ attacks against network shares.
2) Data Exposures โ forget breaches, this is where we do it to ourselves.
3) Device / Server Defacement โ no hacking is needed if we leave the front door open.
4) DDoS Botnets and Booters โ we are helping them make their networks bigger.
5) Phishing
Pishing is one of the most common hacking terminology used by security people. Phishing is a technique which tricks users into revealing sensitive information (like usernames, passwords or credit card details) to seemingly benign sources. A phisher disguises as a trustworthy entity and contacts potential victims asking them to reveal information. This could be further used for malicious intent
6) Spoofing
E-mail and IP spoofing are few common hack techniques encountered by users worldwide. E-mail spoofing involves altering the header of an e-mail to make it look legit. For instance, a black hat hacker can make an e-mail look as if it has appeared from your bank or any other source you may trust. On the other hand, IP spoofing refers to an illegitimate packet sent to a computer with an altered IP appearing to be a trusted host. This is carried out with the hope that the packet would be accepted to allow the sender access to the target machine.
7 ) Encryption
Encryption is a process of encoding a message or information to make it unreadable and secretive. This ensures that the concerned information is concealed only to the authorized parties. Often, encryption is employed by hackers to extort money by unleashing ransomware on computer systems, thus locking out victims and encrypting their files.
8) Adware
Adware is typically a software which acts as a spyware to track a userโs browsing activities covertly. It then generates advertisements based on the userโs browsing history. Some adware is maliciously designed to pop up ads with a frequency ultimately slowing down your system. It can collect your personal information, browsing history and provide inputs for further phishing attack
9) Zero Day threat
A zero-day threat refers to a threat which is undocumented and hence hidden from any antivirus scanner installed on the system. This kind of flaw is inherent in anti-virus scanners, making it oblivious to developers who built antivirus functionalities based on knowledge of these vulnerabilities. Such vulnerabilities are exploited through different vectors, popularly web browsers, and malicious attachments via e-mails.
10) Brute Force Attack
Another commonly hacking terminology to get bypass the login pages. Brute Force, aka Exhaustive key search, is a trial and error method to decrypt data such as passwords, Data Encryption Standard (DES) keys or other encrypted information. This method is widely used to crack passwords to admin accounts, which in turn can be used to steal information and documents of paramount importance.
11) HTTPS/SSL/TLS
HTTPS, which stands for Hypertext Transfer Protocol with the โSโ for โSecureโ, is a basic framework that controls how data is transferred across the web. This protocol adds a layer of encryption to provide you with secure daily browsingโyour bank, your email provider, and social network. SSL and TLS are protocols used by HTTPS to provide an added identity proof to your website. It is advised to avoid browsing the website using HTTP and enter any passwords or credit card detail on it.
12) Bot
A bot is a software robot that runs automated tasks (scripts) over the Internet. Many search engines like Google and Bing employ bots, also called spiders, to scan websites and index them for purpose of ranking them according to returns on search queries. ..
13) Rootkit
Rootkits are one of the scariest methods to perform a cyber intrusion mostly because it goes undetected. ..
Wiritten by ฬฏฬฏ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
โโโโโUNDERCODEโโโโโ
๐ฆHOW INSTALL BEST PORT SCANNER ON Termux :
(Instagram.com/UndercodeTestingCompany)
๐ฆGeth Port Scanner and Save - Geth Hacking
๐ฆ First install masscan
1) centos yum install masscan ubuntu
> sudo apt-get install masscan
2) first scan 8545 port masscan
3) sh masscan.sh
4) scan finish and start.py
5) python start.py The success.txt file shows you successful results.
6) if it finds a file for you. After that, it's your talent.
๐ฆOther Option
r = requests.get('https://www.ethernodes.org/network/1/data?draw=1&columns[0][data]=id&columns[0][name]=&columns[0][searchable]=true&columns[0][orderable]=true&columns[0][search][value]=&columns[0][search][regex]=false&columns[1][data]=host&columns[1][name]=&columns[1][searchable]=true&columns[1][orderable]=true&columns[1][search][value]=&columns[1][search][regex]=false&columns[2][data]=port&columns[2][name]=&columns[2][searchable]=true&columns[2][orderable]=true&columns[2][search][value]=&columns[2][search][regex]=false&columns[3][data]=country&columns[3][name]=&columns[3][searchable]=true&columns[3][orderable]=true&columns[3][search][value]=&columns[3][search][regex]=false&columns[4][data]=clientId&columns[4][name]=&columns[4][searchable]=true&columns[4][orderable]=true&columns[4][search][value]=&columns[4][search][regex]=false&columns[5][data]=client&columns[5][name]=&columns[5][searchable]=true&columns[5][orderable]=true&columns[5][search][value]=&columns[5][search][regex]=false&columns[6][data]=clientVersion&columns[6][name]=&columns[6][searchable]=true&columns[6][orderable]=true&columns[6][search][value]=&columns[6][search][regex]=false&columns[7][data]=os&columns[7][name]=&columns[7][searchable]=true&columns[7][orderable]=true&columns[7][search][value]=&columns[7][search][regex]=false&columns[8][data]=lastUpdate&columns[8][name]=&columns[8][searchable]=true&columns[8][orderable]=true&columns[8][search][value]=&columns[8][search][regex]=false&order[0][column]=8&order[0][dir]=desc&start=0&length=30000&search[value]=&search[regex]=false&_=1517230965098')
data = r.json()["data"]
for val in data:
host = val["host"]
clientId = val["clientId"]
port = val["port"]
@ Steave(t.m)
โโโโโ-๐๐d๐๐๐ฎ๐d๐โโโ__
๐ฆHOW INSTALL BEST PORT SCANNER ON Termux :
(Instagram.com/UndercodeTestingCompany)
๐ฆGeth Port Scanner and Save - Geth Hacking
๐ฆ First install masscan
1) centos yum install masscan ubuntu
> sudo apt-get install masscan
2) first scan 8545 port masscan
3) sh masscan.sh
4) scan finish and start.py
5) python start.py The success.txt file shows you successful results.
6) if it finds a file for you. After that, it's your talent.
๐ฆOther Option
r = requests.get('https://www.ethernodes.org/network/1/data?draw=1&columns[0][data]=id&columns[0][name]=&columns[0][searchable]=true&columns[0][orderable]=true&columns[0][search][value]=&columns[0][search][regex]=false&columns[1][data]=host&columns[1][name]=&columns[1][searchable]=true&columns[1][orderable]=true&columns[1][search][value]=&columns[1][search][regex]=false&columns[2][data]=port&columns[2][name]=&columns[2][searchable]=true&columns[2][orderable]=true&columns[2][search][value]=&columns[2][search][regex]=false&columns[3][data]=country&columns[3][name]=&columns[3][searchable]=true&columns[3][orderable]=true&columns[3][search][value]=&columns[3][search][regex]=false&columns[4][data]=clientId&columns[4][name]=&columns[4][searchable]=true&columns[4][orderable]=true&columns[4][search][value]=&columns[4][search][regex]=false&columns[5][data]=client&columns[5][name]=&columns[5][searchable]=true&columns[5][orderable]=true&columns[5][search][value]=&columns[5][search][regex]=false&columns[6][data]=clientVersion&columns[6][name]=&columns[6][searchable]=true&columns[6][orderable]=true&columns[6][search][value]=&columns[6][search][regex]=false&columns[7][data]=os&columns[7][name]=&columns[7][searchable]=true&columns[7][orderable]=true&columns[7][search][value]=&columns[7][search][regex]=false&columns[8][data]=lastUpdate&columns[8][name]=&columns[8][searchable]=true&columns[8][orderable]=true&columns[8][search][value]=&columns[8][search][regex]=false&order[0][column]=8&order[0][dir]=desc&start=0&length=30000&search[value]=&search[regex]=false&_=1517230965098')
data = r.json()["data"]
for val in data:
host = val["host"]
clientId = val["clientId"]
port = val["port"]
@ Steave(t.m)
โโโโโ-๐๐d๐๐๐ฎ๐d๐โโโ__
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆMost advanced web application testing tool: INSTALLED PAR DEFAULT ON KALI
The OWASP Web Security Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and a "low level" penetration testing guide that describes techniques for testing most common web application and web service security issues.
(instagram.com/UnderCodeTestingCompany)
๐ฆREQUIREMENTS BEFORE INSTALL:
> Before you start the installation, ensure that:
1) The system you are installing on
has 100 MB of free disk space.
2) You have installed PHP 5.2 or above, and have set (for example) the
Windows PATH environment variable appropriately.
3) You have installed the mbstring extension and enabled it using
Eclipse 3.5 or newer, with PDT 2.1 or newer
or NetBeans 6.7 or newer
๐ฆINSTALLISATION & RUN:
((INSTALLED DEFAULT ON KALI LINUX)
> https://github.com/OWASP/wstg
1) Copy the ESAPI for PHP distribution directory structure into a suitable
location on the target machine.
2) Copy the ESAPI for PHP configuration file (
ESAPI.xml
) from the
/test/testresources
directory to a suitable location outside of the
document root on the target machine.
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆMost advanced web application testing tool: INSTALLED PAR DEFAULT ON KALI
The OWASP Web Security Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and a "low level" penetration testing guide that describes techniques for testing most common web application and web service security issues.
(instagram.com/UnderCodeTestingCompany)
๐ฆREQUIREMENTS BEFORE INSTALL:
> Before you start the installation, ensure that:
1) The system you are installing on
has 100 MB of free disk space.
2) You have installed PHP 5.2 or above, and have set (for example) the
Windows PATH environment variable appropriately.
3) You have installed the mbstring extension and enabled it using
Eclipse 3.5 or newer, with PDT 2.1 or newer
or NetBeans 6.7 or newer
๐ฆINSTALLISATION & RUN:
((INSTALLED DEFAULT ON KALI LINUX)
> https://github.com/OWASP/wstg
1) Copy the ESAPI for PHP distribution directory structure into a suitable
location on the target machine.
2) Copy the ESAPI for PHP configuration file (
ESAPI.xml
) from the
/test/testresources
directory to a suitable location outside of the
document root on the target machine.
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - -
Instagram
Login โข Instagram
Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆ Sheet(owasp) Series was created to provide a concise collection of high value information on specific application security topics:
(instagram.com/UnderCodeTestingCompany)
๐ฆINSTALLISATION & RUN:
1) git clone https://github.com/OWASP/CheatSheetSeries
2) Move on to the master branch:
> git pull
3) Create a branch named CSS-[ID] where [ID] is the number of the linked issue opened prior to the PR to follow the contribution process:
> git checkout -b CSS-[ID]
4) Switch to this new branch (normally it's already the case):
> git checkout CSS-[ID]
5) Push the new branch:
> git push origin CSS-[ID]
6) When the work is ready for the review, create a pull request by visiting this link:
> https://github.com/OWASP/CheatSheetSeries/pull/new/CSS-[ID]
7) Implement the modifications requested by the reviewers. Once the reviewers approve the PR, it is then merged to the master branch.
Once merged, delete the branch using this GitHub feature.
๐ฆNotes:
>PDF file generation is not possible because the content is cut in some cheat sheets, for example, the abuse case one.
> book.json: Gitbook configuration file.
>Preface.md: Project preface description applied to the generated site
๐ฆTested by UnderCode on
> Debian 10
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆ Sheet(owasp) Series was created to provide a concise collection of high value information on specific application security topics:
(instagram.com/UnderCodeTestingCompany)
๐ฆINSTALLISATION & RUN:
1) git clone https://github.com/OWASP/CheatSheetSeries
2) Move on to the master branch:
> git pull
3) Create a branch named CSS-[ID] where [ID] is the number of the linked issue opened prior to the PR to follow the contribution process:
> git checkout -b CSS-[ID]
4) Switch to this new branch (normally it's already the case):
> git checkout CSS-[ID]
5) Push the new branch:
> git push origin CSS-[ID]
6) When the work is ready for the review, create a pull request by visiting this link:
> https://github.com/OWASP/CheatSheetSeries/pull/new/CSS-[ID]
7) Implement the modifications requested by the reviewers. Once the reviewers approve the PR, it is then merged to the master branch.
Once merged, delete the branch using this GitHub feature.
๐ฆNotes:
>PDF file generation is not possible because the content is cut in some cheat sheets, for example, the abuse case one.
> book.json: Gitbook configuration file.
>Preface.md: Project preface description applied to the generated site
๐ฆTested by UnderCode on
> Debian 10
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
Instagram
Login โข Instagram
Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆWHAT WE MEAN WITH LIB OR LIBRAIRIES ON LINUX OS?
(instagram.com/UnderCodeTestingCompany)
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
>In programming, a library is an assortment of pre-compiled pieces of code that can be reused in a program.
>Libraries simplify life for programmers, in that they provide reusable functions, routines, classes, data structures and so on (written by a another programmer), which they can use in their programs.
>if you are building an application that needs to perform math operations, you donโt have to create a new math function for that, you can simply use existing functions in libraries for that programming language.
๐ฆExamples
> of libraries in Linux include libc (the standard C library) or glibc (GNU version of the standard C library), libcurl (multiprotocol file transfer library), libcrypt (library used for encryption, hashing, and encoding in C) and many more.
๐ฆLinux supports two classes of libraries, namely:
1) Static libraries โ are bound to a program statically at compile time.
2) Dynamic or shared libraries โ are loaded when a program is launched and loaded into memory and binding occurs at run time.
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆWHAT WE MEAN WITH LIB OR LIBRAIRIES ON LINUX OS?
(instagram.com/UnderCodeTestingCompany)
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
>In programming, a library is an assortment of pre-compiled pieces of code that can be reused in a program.
>Libraries simplify life for programmers, in that they provide reusable functions, routines, classes, data structures and so on (written by a another programmer), which they can use in their programs.
>if you are building an application that needs to perform math operations, you donโt have to create a new math function for that, you can simply use existing functions in libraries for that programming language.
๐ฆExamples
> of libraries in Linux include libc (the standard C library) or glibc (GNU version of the standard C library), libcurl (multiprotocol file transfer library), libcrypt (library used for encryption, hashing, and encoding in C) and many more.
๐ฆLinux supports two classes of libraries, namely:
1) Static libraries โ are bound to a program statically at compile time.
2) Dynamic or shared libraries โ are loaded when a program is launched and loaded into memory and binding occurs at run time.
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
Instagram
Login โข Instagram
Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆEVERYONE USE APT COMMANDS FOR IONSTALL BUT 90% DOESN T KNOW WHAT IS APT:
(Instagram.com/UnderCodeTestingCompany):
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
>APT is a collection of tools distributed in a package named apt.
>A significant part of APT is defined in a C++ library of functions; APT also includes command-line programs for dealing with packages, which use the library.
>Three such programs are apt, apt-get and apt-cache.
>They are commonly used in examples of APT because they are simple and ubiquitous. The apt package is of "important" priority in all current Debian releases, and is therefore included in a default Debian installation.
>APT can be considered a front-end to dpkg, friendlier than the older dselect front-end. While dpkg performs actions on individual packages, APT manages relations (especially dependencies) between them, as well as sourcing and management of higher-level versioning decisions (release tracking and version pinning).
๐ฆIN FILES:
> /etc/apt/sources.list[14]: Locations to fetch packages from.
> /etc/apt/sources.list.d/: Additional source list fragments.
> /etc/apt/apt.conf: APT configuration file.
> /etc/apt/apt.conf.d/: APT configuration file fragments.
> /etc/apt/preferences.d/: directory with version preferences files. This is where you would specify "pinning", i.e. a preference to get certain packages from a separate source or from a different version of a distribution.
> /var/cache/apt/archives/: storage area for retrieved package files.
> /var/cache/apt/archives/partial/: storage area for package files in transit.
> /var/lib/apt/lists/: storage area for state information for each package resource specified in sources.list
> /var/lib/apt/lists/partial/: storage area for state information in transit.
WRITTEN BY MR BOTNET(tm)
โโโโ-๐๐D๐๐๐ฎ๐D๐โโโโโ
๐ฆEVERYONE USE APT COMMANDS FOR IONSTALL BUT 90% DOESN T KNOW WHAT IS APT:
(Instagram.com/UnderCodeTestingCompany):
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
>APT is a collection of tools distributed in a package named apt.
>A significant part of APT is defined in a C++ library of functions; APT also includes command-line programs for dealing with packages, which use the library.
>Three such programs are apt, apt-get and apt-cache.
>They are commonly used in examples of APT because they are simple and ubiquitous. The apt package is of "important" priority in all current Debian releases, and is therefore included in a default Debian installation.
>APT can be considered a front-end to dpkg, friendlier than the older dselect front-end. While dpkg performs actions on individual packages, APT manages relations (especially dependencies) between them, as well as sourcing and management of higher-level versioning decisions (release tracking and version pinning).
๐ฆIN FILES:
> /etc/apt/sources.list[14]: Locations to fetch packages from.
> /etc/apt/sources.list.d/: Additional source list fragments.
> /etc/apt/apt.conf: APT configuration file.
> /etc/apt/apt.conf.d/: APT configuration file fragments.
> /etc/apt/preferences.d/: directory with version preferences files. This is where you would specify "pinning", i.e. a preference to get certain packages from a separate source or from a different version of a distribution.
> /var/cache/apt/archives/: storage area for retrieved package files.
> /var/cache/apt/archives/partial/: storage area for package files in transit.
> /var/lib/apt/lists/: storage area for state information for each package resource specified in sources.list
> /var/lib/apt/lists/partial/: storage area for state information in transit.
WRITTEN BY MR BOTNET(tm)
โโโโ-๐๐D๐๐๐ฎ๐D๐โโโโโ
Instagram
Login โข Instagram
Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.
โโโโ-๐๐D๐๐๐ฎ๐D๐โโโโโ
๐ฆDIFFERENT ZIP FORMATS DETAILS:
(INSTAGRam.com/UndercOdeTestingCompany)
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
.0 Hacha Split Archive File
.000 DoubleSpace Compressed File
.7Z 7-Zip Compressed File
.7Z.001 7-Zip Split Archive Part 1 File
.7Z.002 7-Zip Split Archive Part 2 File
.A00 ALZip Second Split Archive File
.A01 ALZip Third Split Archive File
.A02 ALZip Fourth Split Archive File
.ACE WinAce Compressed File
.AGG Bulk Data File
.AIN AIN Compressed File Archive
.ALZ ALZip Archive
.APZ Autoplay Media Studio Exported Project
.AR Unix Static Library
.ARC Compressed File Archive
.ARCHIVER Archiver Compressed File Archive
.ARDUBOY Arduboy Game Package
.ARH ProTool Compressed Project File
.ARI ARI Compressed File Archive
.ARJ ARJ Compressed File Archive
.ARK PowerDesk Pro Archive
.ASR Audio Streaming Resource Archive
.B1 B1 Compressed Archive
.B64 Base64 MIME-Encoded File
.B6Z B6Z Archive
.BA Scifer External Header Archive
.BDOC Binary DigiDoc Signature File
.BH BlakHole Archive
.BNDL Game Data Bundle File
.BOO Booasm Compressed Archive
.BUNDLE Game Data Bundle File
.BZ Bzip Compressed File
.BZ2 Bzip2 Compressed File
.BZA IZArc BGA Archive
.BZIP Bzip Compressed Archive
.BZIP2 Bzip2 Compressed Archive
.C00 WinAce Split Archive File
.C01 WinAce Split Archive Part 1 File
.C02 WinAce Split Archive Part 1 File
.C10 WinAce Split Archive Part 10
.CAR CAR Archive
.CB7 Comic Book 7-Zip Archive
.CBA Comic Book ACE Archive
.CBR Comic Book RAR Archive
.CBT Comic Book TAR File
.CBZ Comic Book Zip Archive
.CDZ Compressed CD Image File
.COMPPKG.HAUPTWERK.RAR Hauptwerk Component Package
.COMPPKG_HAUPTWERK_RAR Hauptwerk Component Package
.CP9 ChoicePoint Encrypted File
.CPGZ Compressed CPIO Archive
.CPT Compact Pro Archive
.CTX Cherrytree Password-protected SQLite Document
.CTZ Cherrytree Password-protected XML Document
.CXARCHIVE CrossOver Bottle Archive
.CZIP ZipGenius CryptoZip File
.DAF DupArchive Format File
.DAR DAR Disk Archive
.DD DiskDoubler Archive
.DEB Debian Software Package
.DGC DGCA File Archive
.DIST Mac OS X Distribution Script
.DL_ Compressed DLL File
.DZ Dzip File
.ECS Sony Ericsson Phone Backup File
.ECSBX Error-Correcting SeqBox Container File
.EDZ EPLAN Electric P8 Data Archive Zipped File
.EFW Renamed Zip or Executable File
.EGG ALZip Archive
.EPI EclipsePackager2000 Compressed File
.F Freeze Compressed File
.F3Z Fusion 360 Shared Project Archive
.FDP MySafe Encrypted Data
.FP8 FP8 (= Fast PAQ8) Compressed File
.FZBZ Fritzing Bundled Bin File
.FZPZ Fritzing Bundled Part File
.GCA GCA File Archive
.GMZ Compressed GameMaker File
.GZ Gnu Zipped Archive
.GZ2 Misnamed BZ2 File
.GZA IZArc BGA Archive File
.GZI Unix Gzip File
.GZIP Gnu Zipped File
.HA HA Compressed Archive
.HBC HyperBac Compressed Archive
.HBC2 HyperBac Compressed File Archive
.HBE HyperBac Compressed and Encrypted Archive
.HKI WinHKI Archive
.HKI1 WinHKI HKI1 Archive
.HKI2 WinHKI HKI2 Archive
.HKI3 WinHKI HKI3 Archive
.HPK HPack Compressed Archive
.HPKG Haiku Package File
.HYP HYPER Compressed Archive
.IADPROJ iAd Producer Project
.ICE ICE File Archive
.IPG iPod Game File
.IPK Itsy Package
.ISH ISH Compressed Archive
.ISX SimulationX Project
.ITA IconTweaker Theme Archive
.IZE IZArc Archive
.J JAR Archive
.JAR.PACK Pack200 Packed Jar File
.JGZ Gzipped Javascript File
.JIC Java Icon File
.JSONLZ4 Compressed Firefox Bookmarks Backup File
.KGB KGB Archive File
.KZ KuaiZip Compressed File
.LAYOUT LayOut Document
.LBR LU Library Archive
.LEMON LemonShare.net Download
.LHA LHARC Compressed Archive
.LHZD Live Home 3D Compressed Project
.LIBZIP Camtasia Studio Zipped Library File
.LNX Commodore 64 Lynx Archive
.
๐ฆDIFFERENT ZIP FORMATS DETAILS:
(INSTAGRam.com/UndercOdeTestingCompany)
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
.0 Hacha Split Archive File
.000 DoubleSpace Compressed File
.7Z 7-Zip Compressed File
.7Z.001 7-Zip Split Archive Part 1 File
.7Z.002 7-Zip Split Archive Part 2 File
.A00 ALZip Second Split Archive File
.A01 ALZip Third Split Archive File
.A02 ALZip Fourth Split Archive File
.ACE WinAce Compressed File
.AGG Bulk Data File
.AIN AIN Compressed File Archive
.ALZ ALZip Archive
.APZ Autoplay Media Studio Exported Project
.AR Unix Static Library
.ARC Compressed File Archive
.ARCHIVER Archiver Compressed File Archive
.ARDUBOY Arduboy Game Package
.ARH ProTool Compressed Project File
.ARI ARI Compressed File Archive
.ARJ ARJ Compressed File Archive
.ARK PowerDesk Pro Archive
.ASR Audio Streaming Resource Archive
.B1 B1 Compressed Archive
.B64 Base64 MIME-Encoded File
.B6Z B6Z Archive
.BA Scifer External Header Archive
.BDOC Binary DigiDoc Signature File
.BH BlakHole Archive
.BNDL Game Data Bundle File
.BOO Booasm Compressed Archive
.BUNDLE Game Data Bundle File
.BZ Bzip Compressed File
.BZ2 Bzip2 Compressed File
.BZA IZArc BGA Archive
.BZIP Bzip Compressed Archive
.BZIP2 Bzip2 Compressed Archive
.C00 WinAce Split Archive File
.C01 WinAce Split Archive Part 1 File
.C02 WinAce Split Archive Part 1 File
.C10 WinAce Split Archive Part 10
.CAR CAR Archive
.CB7 Comic Book 7-Zip Archive
.CBA Comic Book ACE Archive
.CBR Comic Book RAR Archive
.CBT Comic Book TAR File
.CBZ Comic Book Zip Archive
.CDZ Compressed CD Image File
.COMPPKG.HAUPTWERK.RAR Hauptwerk Component Package
.COMPPKG_HAUPTWERK_RAR Hauptwerk Component Package
.CP9 ChoicePoint Encrypted File
.CPGZ Compressed CPIO Archive
.CPT Compact Pro Archive
.CTX Cherrytree Password-protected SQLite Document
.CTZ Cherrytree Password-protected XML Document
.CXARCHIVE CrossOver Bottle Archive
.CZIP ZipGenius CryptoZip File
.DAF DupArchive Format File
.DAR DAR Disk Archive
.DD DiskDoubler Archive
.DEB Debian Software Package
.DGC DGCA File Archive
.DIST Mac OS X Distribution Script
.DL_ Compressed DLL File
.DZ Dzip File
.ECS Sony Ericsson Phone Backup File
.ECSBX Error-Correcting SeqBox Container File
.EDZ EPLAN Electric P8 Data Archive Zipped File
.EFW Renamed Zip or Executable File
.EGG ALZip Archive
.EPI EclipsePackager2000 Compressed File
.F Freeze Compressed File
.F3Z Fusion 360 Shared Project Archive
.FDP MySafe Encrypted Data
.FP8 FP8 (= Fast PAQ8) Compressed File
.FZBZ Fritzing Bundled Bin File
.FZPZ Fritzing Bundled Part File
.GCA GCA File Archive
.GMZ Compressed GameMaker File
.GZ Gnu Zipped Archive
.GZ2 Misnamed BZ2 File
.GZA IZArc BGA Archive File
.GZI Unix Gzip File
.GZIP Gnu Zipped File
.HA HA Compressed Archive
.HBC HyperBac Compressed Archive
.HBC2 HyperBac Compressed File Archive
.HBE HyperBac Compressed and Encrypted Archive
.HKI WinHKI Archive
.HKI1 WinHKI HKI1 Archive
.HKI2 WinHKI HKI2 Archive
.HKI3 WinHKI HKI3 Archive
.HPK HPack Compressed Archive
.HPKG Haiku Package File
.HYP HYPER Compressed Archive
.IADPROJ iAd Producer Project
.ICE ICE File Archive
.IPG iPod Game File
.IPK Itsy Package
.ISH ISH Compressed Archive
.ISX SimulationX Project
.ITA IconTweaker Theme Archive
.IZE IZArc Archive
.J JAR Archive
.JAR.PACK Pack200 Packed Jar File
.JGZ Gzipped Javascript File
.JIC Java Icon File
.JSONLZ4 Compressed Firefox Bookmarks Backup File
.KGB KGB Archive File
.KZ KuaiZip Compressed File
.LAYOUT LayOut Document
.LBR LU Library Archive
.LEMON LemonShare.net Download
.LHA LHARC Compressed Archive
.LHZD Live Home 3D Compressed Project
.LIBZIP Camtasia Studio Zipped Library File
.LNX Commodore 64 Lynx Archive
.
LPKG Liferay Application
.LQR SQ Compressed LBR Archive
.LZ Lzip Compressed File
.LQR SQ Compressed LBR Archive
.LZ Lzip Compressed File
.TZST Zstandard Compressed Tar File
.UC2 UltraCompressor 2 Archive
.UFS.UZIP Compressed Unix File System File
.UHA UHarc Compressed Archive
.UZIP FreeBSD Compressed Disk Image
.VEM Virtual Expander Compressed File
.VFS Animated Slide File
.VIP Virtual Instrument Package
.VMCZ Hyper-V Compressed Virtual Machine
.VOCA PhotoVOCA Communication Board File
.VPK PlayStation Vita Application Package
.VSI Visual Studio Content Installer File
.WA Windows Addon Archive
.WAFF Internet Explorer for Mac Web Archive
.WAR Java Web Archive
.WARC Web Archive
.WASTICKERS Sticker Maker Sticker Pack File
.WDZ WDZip Compressed Archive
.WHL Python Wheel Package
.WLB WinList Protocol Bundle
.WOT Web Of Trust File
.WUX Compressed Wii U Disk Image File
.XAPK Compressed Android Package File
.XAR Extensible Archive Format File
.XEF WinAce Encrypted File
.XEZ eManager Template Package
.XIP macOS Signed Archive
.XMCDZ Mathcad Compressed Worksheet File
.XX XXEncoded File
.XZ XZ Compressed Archive
.XZM Porteus Module
.Y Amiga Yabba Compressed File
.YZ YAC Compressed File
.YZ1 Yamazaki ZIPPER File
.Z Unix Compressed File
.Z01 First Split Zip File
.Z02 Second Split Zip File
.Z03 Third Split Zip File
.Z04 Fourth Split Zip File
.ZAP FileWrangler Archive
.ZFSENDTOTARGET Compressed Folder
.ZI Renamed Zip File
.ZI_ Renamed Zip File
.ZIP Zipped File
.ZIPX Extended Zip File
.ZIX WinZix Compressed File
.ZL Zlib Compressed File
.ZOO Zoo Compressed File
.ZPI Zipped File
.ZSPLIT Archiver Compressed Split File
.ZST Zstandard Compressed File
.ZW Zooper Widget Template
.ZZ Zzip Compressed Archive
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
.UC2 UltraCompressor 2 Archive
.UFS.UZIP Compressed Unix File System File
.UHA UHarc Compressed Archive
.UZIP FreeBSD Compressed Disk Image
.VEM Virtual Expander Compressed File
.VFS Animated Slide File
.VIP Virtual Instrument Package
.VMCZ Hyper-V Compressed Virtual Machine
.VOCA PhotoVOCA Communication Board File
.VPK PlayStation Vita Application Package
.VSI Visual Studio Content Installer File
.WA Windows Addon Archive
.WAFF Internet Explorer for Mac Web Archive
.WAR Java Web Archive
.WARC Web Archive
.WASTICKERS Sticker Maker Sticker Pack File
.WDZ WDZip Compressed Archive
.WHL Python Wheel Package
.WLB WinList Protocol Bundle
.WOT Web Of Trust File
.WUX Compressed Wii U Disk Image File
.XAPK Compressed Android Package File
.XAR Extensible Archive Format File
.XEF WinAce Encrypted File
.XEZ eManager Template Package
.XIP macOS Signed Archive
.XMCDZ Mathcad Compressed Worksheet File
.XX XXEncoded File
.XZ XZ Compressed Archive
.XZM Porteus Module
.Y Amiga Yabba Compressed File
.YZ YAC Compressed File
.YZ1 Yamazaki ZIPPER File
.Z Unix Compressed File
.Z01 First Split Zip File
.Z02 Second Split Zip File
.Z03 Third Split Zip File
.Z04 Fourth Split Zip File
.ZAP FileWrangler Archive
.ZFSENDTOTARGET Compressed Folder
.ZI Renamed Zip File
.ZI_ Renamed Zip File
.ZIP Zipped File
.ZIPX Extended Zip File
.ZIX WinZix Compressed File
.ZL Zlib Compressed File
.ZOO Zoo Compressed File
.ZPI Zipped File
.ZSPLIT Archiver Compressed Split File
.ZST Zstandard Compressed File
.ZW Zooper Widget Template
.ZZ Zzip Compressed Archive
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆTOPIC 2019 INSTALL TERMUX DESKTOP INSIDE SAME TERMUX APP VIA SIMPLE SCRIPT:
(t.me/UnderCodeTestingOfficial)
๐ฆINSTALLISATION & RUN:
Setup A Beautiful Desktop/GUI In Termux
1) pkg update
2) pkg upgrade
3) pkg install x11-repo
4) pkg install tigervnc openbox obconf xorg-xsetroot xcompmgr xterm polybar st zsh geany pcmanfm rofi feh neofetch htop vim elinks mutt git wget curl xfce4-settings
5) cd $HOME && git clone https://github.com/adi1090x/termux-desktop
6) cp -rf ./home /data/data/com.termux/files && cp -rf ./usr /data/data/com.termux/files
7) vncserver -localhost
8) You will require a password to access your desktops.
Password:
Verify:
Would you like to enter a view-only password (y/n)? n
9) Note that passwords are not visible when you are typing them and maximal password length is 8 characters.
If everything is okay, you will see this message -
> New 'localhost:1 ()' desktop is localhost:1
10) then
>export DISPLAY=":1"
11) You may even put this variable to your bashrc or profile so you don't have to always set it manually unless display address will be changed.
Now You can start the vnc server by,
> vncserver
And to stop the server, run -
> vncserver -kill :1
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆTOPIC 2019 INSTALL TERMUX DESKTOP INSIDE SAME TERMUX APP VIA SIMPLE SCRIPT:
(t.me/UnderCodeTestingOfficial)
๐ฆINSTALLISATION & RUN:
Setup A Beautiful Desktop/GUI In Termux
1) pkg update
2) pkg upgrade
3) pkg install x11-repo
4) pkg install tigervnc openbox obconf xorg-xsetroot xcompmgr xterm polybar st zsh geany pcmanfm rofi feh neofetch htop vim elinks mutt git wget curl xfce4-settings
5) cd $HOME && git clone https://github.com/adi1090x/termux-desktop
6) cp -rf ./home /data/data/com.termux/files && cp -rf ./usr /data/data/com.termux/files
7) vncserver -localhost
8) You will require a password to access your desktops.
Password:
Verify:
Would you like to enter a view-only password (y/n)? n
9) Note that passwords are not visible when you are typing them and maximal password length is 8 characters.
If everything is okay, you will see this message -
> New 'localhost:1 ()' desktop is localhost:1
10) then
>export DISPLAY=":1"
11) You may even put this variable to your bashrc or profile so you don't have to always set it manually unless display address will be changed.
Now You can start the vnc server by,
> vncserver
And to stop the server, run -
> vncserver -kill :1
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
YOU need Next Post Focus on :
Final Results
44%
Carding Posts ?
24%
Termux Api- Scripts ?
26%
Kali Tutorials ?
6%
Paid Books ?
As well 44%
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆHOW BE 100% ANONYMOUS BEFORE CARDING :
(instagram.com/UnderCodeTestingCompany)
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
> Stay anonymous while hacking online using TOR and Proxychains
1) Open kali linux terminal and type
>root@kali:-# sudo apt-get install tor proxychains
>root@kali:-# sudo service tor start
>root@kali:-# gedit /etc/proxychains.conf
2) Go to http://proxylist.hidemyass.com/ . Select one ip and add the proxie you have it example :
https ((ip))
sacks4 (ip)
3) root@kali:-# proxychains wget http://ipinfo.io/ip -qO-
now sorting:
4) root@kali:-# proxychains sqlmap -u http://www.sqldummywebsite.com/cgi-bin/item.cgi?item_id=15 --dbs
5) install virtual box
>https://www.virtualbox.org/
6) Configure Whonix in VirtualBox
& make sure its kali used in
7) Routing Kali Through Whonix
8) add trusted vpn
9) run thought tor
SEE NEXT TUTORIAL BY undercOde
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆHOW BE 100% ANONYMOUS BEFORE CARDING :
(instagram.com/UnderCodeTestingCompany)
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
> Stay anonymous while hacking online using TOR and Proxychains
1) Open kali linux terminal and type
>root@kali:-# sudo apt-get install tor proxychains
>root@kali:-# sudo service tor start
>root@kali:-# gedit /etc/proxychains.conf
2) Go to http://proxylist.hidemyass.com/ . Select one ip and add the proxie you have it example :
https ((ip))
sacks4 (ip)
3) root@kali:-# proxychains wget http://ipinfo.io/ip -qO-
now sorting:
4) root@kali:-# proxychains sqlmap -u http://www.sqldummywebsite.com/cgi-bin/item.cgi?item_id=15 --dbs
5) install virtual box
>https://www.virtualbox.org/
6) Configure Whonix in VirtualBox
& make sure its kali used in
7) Routing Kali Through Whonix
8) add trusted vpn
9) run thought tor
SEE NEXT TUTORIAL BY undercOde
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
Instagram
Login โข Instagram
Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.
โโโโโโundercOdeโโโโโโ
๐ฆ CARDING Methode Not patched โ ๏ธโ ๏ธโ ๏ธโ ๏ธโ ๏ธ
( instagram.com/UnderCodeTestingCompany)
๐ฆAmazon Carding New
> March method
Fresh and New and Highly working Method created by top
carders in world.
>Note: All other methods are patched...
This is the only working and didnโt patched method...
For sellers and teacher:
1) Price is too high. Donโt sell it for low prices otherwise this
method gets patchedโฆ
๐ฆHow to Card Amazon
Things you will need:
1) Quality CC/CVV to an address, full name, phone number, zip code, city, and
2) state (donโt get junk cards pay good money for good cards)
Socks 4/5 to the state and if you can the city since that would be perfect. This
sock must have never been used before so donโt be cheap and get a quality
3) sock. Socks are just as important as quality cards!
You will need programs to cleanup cookies and other flagging shit. Get
CCleaner- get the free version it has everything you need. Get the flash cookie
4) cleaner- it is free as well
Antidetect 7 or Fraudfox VM: These are not needed but they really increase
5) your carding success to almost 100% if used correctly and setup properly which
both are not very hard to do.
A drop address or if youโre carding digital items you donโt need that.
๐ฆOK now letโs card
1) You just need a Diners Club international cc, Indian NON-VBV
or AMEX, Some Amex are still working
Iโm listing some bins here which will work on Amazon.
542034542034 IN MASTERCARD CREDIT BANK OF INDIA
542086 IN MASTERCARD CREDIT ANDHRA BANK
376900 IN AMEX CREDIT AMERICAN EXPRESS
376901 IN AMEX CREDIT AMERICAN EXPRESS
376902 IN AMEX CREDIT AMERI EXPRESS
376903 IN AMEX CREDIT AMERI EXPRESS
#All are Non-VBV
First Method (Most successful)
2) Restart the computer and make sure you have used ccleaner and flash cookie
3) cleaner and they are running. Used disk cleanup in windows as well.
Create a new account on Amazon using a fresh good socks.
4) Modern protection
against carding tracks the user's behavior on the site. Therefore, you must act as
a typical buyer, not jump directly to your product. Use the search, see different
5) knick-knacks, add them to the cart, but do not buy. It should be quite different
items, not those that you want to card.
After the virtual shopping logout from Amazon, leave the computer, and stop
the activity on it. Put it to sleep. After 5 or more hours, go back to Amazon and
clean your cart. Now letโs card.
6) Now find the items falling into the limit of your card somewhere between $30
and $150. Using a credit card, pay for the goods that you selected. You may need
to wait for amazon to approve your order or not. Sometimes itโs random I swear.
7) Now the order should have been accepted and shipped. If not, then you either
have a shitty card worth less than what you trying to card or you threw a flag. Go
8) back and check your setup. This is pretty full proof way to card amazon. If
everything is in place and you have your bases covered, you should be in and
out. Make sure you check to see if you IP leaking cause that would throw a flag
> as well: https://www.dnsleaktest.com
Now we can also speed up this order if itโs in processing just so it doesnโt get
charged back and flagged before it gets shipped.
9) Send amazon an email from
the email that you created for this account. Gmail is preferred email for this setup
as it is much more trustworthy do to its security signed up measures. Use an
excuse to make them speed it up. There is excuse kind of tie into what you are
buying.
10) So letโs say you want a 800 dollar cannon camera then tell them that you
itโs real person on the other end so make your excuse real and donโt go too in
depth.
11) Now they may ask to call you on the phone number associated with the CC
account. This happens maybe 30% of the time. Just say OK and hope no one
picks up the phone on the other end and luck I on your side. If they send you
12) After getting order confirmation.
๐ฆ CARDING Methode Not patched โ ๏ธโ ๏ธโ ๏ธโ ๏ธโ ๏ธ
( instagram.com/UnderCodeTestingCompany)
๐ฆAmazon Carding New
> March method
Fresh and New and Highly working Method created by top
carders in world.
>Note: All other methods are patched...
This is the only working and didnโt patched method...
For sellers and teacher:
1) Price is too high. Donโt sell it for low prices otherwise this
method gets patchedโฆ
๐ฆHow to Card Amazon
Things you will need:
1) Quality CC/CVV to an address, full name, phone number, zip code, city, and
2) state (donโt get junk cards pay good money for good cards)
Socks 4/5 to the state and if you can the city since that would be perfect. This
sock must have never been used before so donโt be cheap and get a quality
3) sock. Socks are just as important as quality cards!
You will need programs to cleanup cookies and other flagging shit. Get
CCleaner- get the free version it has everything you need. Get the flash cookie
4) cleaner- it is free as well
Antidetect 7 or Fraudfox VM: These are not needed but they really increase
5) your carding success to almost 100% if used correctly and setup properly which
both are not very hard to do.
A drop address or if youโre carding digital items you donโt need that.
๐ฆOK now letโs card
1) You just need a Diners Club international cc, Indian NON-VBV
or AMEX, Some Amex are still working
Iโm listing some bins here which will work on Amazon.
542034542034 IN MASTERCARD CREDIT BANK OF INDIA
542086 IN MASTERCARD CREDIT ANDHRA BANK
376900 IN AMEX CREDIT AMERICAN EXPRESS
376901 IN AMEX CREDIT AMERICAN EXPRESS
376902 IN AMEX CREDIT AMERI EXPRESS
376903 IN AMEX CREDIT AMERI EXPRESS
#All are Non-VBV
First Method (Most successful)
2) Restart the computer and make sure you have used ccleaner and flash cookie
3) cleaner and they are running. Used disk cleanup in windows as well.
Create a new account on Amazon using a fresh good socks.
4) Modern protection
against carding tracks the user's behavior on the site. Therefore, you must act as
a typical buyer, not jump directly to your product. Use the search, see different
5) knick-knacks, add them to the cart, but do not buy. It should be quite different
items, not those that you want to card.
After the virtual shopping logout from Amazon, leave the computer, and stop
the activity on it. Put it to sleep. After 5 or more hours, go back to Amazon and
clean your cart. Now letโs card.
6) Now find the items falling into the limit of your card somewhere between $30
and $150. Using a credit card, pay for the goods that you selected. You may need
to wait for amazon to approve your order or not. Sometimes itโs random I swear.
7) Now the order should have been accepted and shipped. If not, then you either
have a shitty card worth less than what you trying to card or you threw a flag. Go
8) back and check your setup. This is pretty full proof way to card amazon. If
everything is in place and you have your bases covered, you should be in and
out. Make sure you check to see if you IP leaking cause that would throw a flag
> as well: https://www.dnsleaktest.com
Now we can also speed up this order if itโs in processing just so it doesnโt get
charged back and flagged before it gets shipped.
9) Send amazon an email from
the email that you created for this account. Gmail is preferred email for this setup
as it is much more trustworthy do to its security signed up measures. Use an
excuse to make them speed it up. There is excuse kind of tie into what you are
buying.
10) So letโs say you want a 800 dollar cannon camera then tell them that you
itโs real person on the other end so make your excuse real and donโt go too in
depth.
11) Now they may ask to call you on the phone number associated with the CC
account. This happens maybe 30% of the time. Just say OK and hope no one
picks up the phone on the other end and luck I on your side. If they send you
12) After getting order confirmation.
Instagram
Login โข Instagram
Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.
Hurraaayyyy!!! U have successfully carded
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
--------๐๐D๐๐๐ฎ๐D๐----
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
--------๐๐D๐๐๐ฎ๐D๐----
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆHow unwanted software Works By Microsoft
(Instagram.com/UnderCodeTestingCompany)
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
Unwanted software can be introduced when a user searches for and downloads applications from the internet. Some applications are software bundlers, which means that they are packed with other applications. As a result, other programs can be inadvertently installed when the original application is downloaded.
๐ฆHere are some indications of unwanted software:
1) There are programs that you did not install and that may be difficult to uninstall
2) Browser features or settings have changed, and you canโt view or modify them
3) There are excessive messages about your device's health or about files and programs
4) There are ads that cannot be easily closed
5) Some indicators are harder to recognize because they are less disruptive, but are still unwanted. For example, unwanted software can modify web pages to display specific ads, monitor browsing activities, or remove control of the browser.
6) Microsoft uses an extensive evaluation criteria to identify unwanted software
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆHow unwanted software Works By Microsoft
(Instagram.com/UnderCodeTestingCompany)
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
Unwanted software can be introduced when a user searches for and downloads applications from the internet. Some applications are software bundlers, which means that they are packed with other applications. As a result, other programs can be inadvertently installed when the original application is downloaded.
๐ฆHere are some indications of unwanted software:
1) There are programs that you did not install and that may be difficult to uninstall
2) Browser features or settings have changed, and you canโt view or modify them
3) There are excessive messages about your device's health or about files and programs
4) There are ads that cannot be easily closed
5) Some indicators are harder to recognize because they are less disruptive, but are still unwanted. For example, unwanted software can modify web pages to display specific ads, monitor browsing activities, or remove control of the browser.
6) Microsoft uses an extensive evaluation criteria to identify unwanted software
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - -
Instagram
Login โข Instagram
Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.
UNDERCODE COMMUNITY
โโโโโโundercOdeโโโโโโ ๐ฆ CARDING Methode Not patched โ ๏ธโ ๏ธโ ๏ธโ ๏ธโ ๏ธ ( instagram.com/UnderCodeTestingCompany) ๐ฆAmazon Carding New > March method Fresh and New and Highly working Method created by top carders in world. >Note: All other methods are patched...โฆ
Use for learn iam not responsible in what you use this tutorial
Enjoy ๐
Enjoy ๐