As well 44%
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆHOW BE 100% ANONYMOUS BEFORE CARDING :
(instagram.com/UnderCodeTestingCompany)
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
> Stay anonymous while hacking online using TOR and Proxychains
1) Open kali linux terminal and type
>root@kali:-# sudo apt-get install tor proxychains
>root@kali:-# sudo service tor start
>root@kali:-# gedit /etc/proxychains.conf
2) Go to http://proxylist.hidemyass.com/ . Select one ip and add the proxie you have it example :
https ((ip))
sacks4 (ip)
3) root@kali:-# proxychains wget http://ipinfo.io/ip -qO-
now sorting:
4) root@kali:-# proxychains sqlmap -u http://www.sqldummywebsite.com/cgi-bin/item.cgi?item_id=15 --dbs
5) install virtual box
>https://www.virtualbox.org/
6) Configure Whonix in VirtualBox
& make sure its kali used in
7) Routing Kali Through Whonix
8) add trusted vpn
9) run thought tor
SEE NEXT TUTORIAL BY undercOde
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆHOW BE 100% ANONYMOUS BEFORE CARDING :
(instagram.com/UnderCodeTestingCompany)
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
> Stay anonymous while hacking online using TOR and Proxychains
1) Open kali linux terminal and type
>root@kali:-# sudo apt-get install tor proxychains
>root@kali:-# sudo service tor start
>root@kali:-# gedit /etc/proxychains.conf
2) Go to http://proxylist.hidemyass.com/ . Select one ip and add the proxie you have it example :
https ((ip))
sacks4 (ip)
3) root@kali:-# proxychains wget http://ipinfo.io/ip -qO-
now sorting:
4) root@kali:-# proxychains sqlmap -u http://www.sqldummywebsite.com/cgi-bin/item.cgi?item_id=15 --dbs
5) install virtual box
>https://www.virtualbox.org/
6) Configure Whonix in VirtualBox
& make sure its kali used in
7) Routing Kali Through Whonix
8) add trusted vpn
9) run thought tor
SEE NEXT TUTORIAL BY undercOde
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
Instagram
Login โข Instagram
Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.
โโโโโโundercOdeโโโโโโ
๐ฆ CARDING Methode Not patched โ ๏ธโ ๏ธโ ๏ธโ ๏ธโ ๏ธ
( instagram.com/UnderCodeTestingCompany)
๐ฆAmazon Carding New
> March method
Fresh and New and Highly working Method created by top
carders in world.
>Note: All other methods are patched...
This is the only working and didnโt patched method...
For sellers and teacher:
1) Price is too high. Donโt sell it for low prices otherwise this
method gets patchedโฆ
๐ฆHow to Card Amazon
Things you will need:
1) Quality CC/CVV to an address, full name, phone number, zip code, city, and
2) state (donโt get junk cards pay good money for good cards)
Socks 4/5 to the state and if you can the city since that would be perfect. This
sock must have never been used before so donโt be cheap and get a quality
3) sock. Socks are just as important as quality cards!
You will need programs to cleanup cookies and other flagging shit. Get
CCleaner- get the free version it has everything you need. Get the flash cookie
4) cleaner- it is free as well
Antidetect 7 or Fraudfox VM: These are not needed but they really increase
5) your carding success to almost 100% if used correctly and setup properly which
both are not very hard to do.
A drop address or if youโre carding digital items you donโt need that.
๐ฆOK now letโs card
1) You just need a Diners Club international cc, Indian NON-VBV
or AMEX, Some Amex are still working
Iโm listing some bins here which will work on Amazon.
542034542034 IN MASTERCARD CREDIT BANK OF INDIA
542086 IN MASTERCARD CREDIT ANDHRA BANK
376900 IN AMEX CREDIT AMERICAN EXPRESS
376901 IN AMEX CREDIT AMERICAN EXPRESS
376902 IN AMEX CREDIT AMERI EXPRESS
376903 IN AMEX CREDIT AMERI EXPRESS
#All are Non-VBV
First Method (Most successful)
2) Restart the computer and make sure you have used ccleaner and flash cookie
3) cleaner and they are running. Used disk cleanup in windows as well.
Create a new account on Amazon using a fresh good socks.
4) Modern protection
against carding tracks the user's behavior on the site. Therefore, you must act as
a typical buyer, not jump directly to your product. Use the search, see different
5) knick-knacks, add them to the cart, but do not buy. It should be quite different
items, not those that you want to card.
After the virtual shopping logout from Amazon, leave the computer, and stop
the activity on it. Put it to sleep. After 5 or more hours, go back to Amazon and
clean your cart. Now letโs card.
6) Now find the items falling into the limit of your card somewhere between $30
and $150. Using a credit card, pay for the goods that you selected. You may need
to wait for amazon to approve your order or not. Sometimes itโs random I swear.
7) Now the order should have been accepted and shipped. If not, then you either
have a shitty card worth less than what you trying to card or you threw a flag. Go
8) back and check your setup. This is pretty full proof way to card amazon. If
everything is in place and you have your bases covered, you should be in and
out. Make sure you check to see if you IP leaking cause that would throw a flag
> as well: https://www.dnsleaktest.com
Now we can also speed up this order if itโs in processing just so it doesnโt get
charged back and flagged before it gets shipped.
9) Send amazon an email from
the email that you created for this account. Gmail is preferred email for this setup
as it is much more trustworthy do to its security signed up measures. Use an
excuse to make them speed it up. There is excuse kind of tie into what you are
buying.
10) So letโs say you want a 800 dollar cannon camera then tell them that you
itโs real person on the other end so make your excuse real and donโt go too in
depth.
11) Now they may ask to call you on the phone number associated with the CC
account. This happens maybe 30% of the time. Just say OK and hope no one
picks up the phone on the other end and luck I on your side. If they send you
12) After getting order confirmation.
๐ฆ CARDING Methode Not patched โ ๏ธโ ๏ธโ ๏ธโ ๏ธโ ๏ธ
( instagram.com/UnderCodeTestingCompany)
๐ฆAmazon Carding New
> March method
Fresh and New and Highly working Method created by top
carders in world.
>Note: All other methods are patched...
This is the only working and didnโt patched method...
For sellers and teacher:
1) Price is too high. Donโt sell it for low prices otherwise this
method gets patchedโฆ
๐ฆHow to Card Amazon
Things you will need:
1) Quality CC/CVV to an address, full name, phone number, zip code, city, and
2) state (donโt get junk cards pay good money for good cards)
Socks 4/5 to the state and if you can the city since that would be perfect. This
sock must have never been used before so donโt be cheap and get a quality
3) sock. Socks are just as important as quality cards!
You will need programs to cleanup cookies and other flagging shit. Get
CCleaner- get the free version it has everything you need. Get the flash cookie
4) cleaner- it is free as well
Antidetect 7 or Fraudfox VM: These are not needed but they really increase
5) your carding success to almost 100% if used correctly and setup properly which
both are not very hard to do.
A drop address or if youโre carding digital items you donโt need that.
๐ฆOK now letโs card
1) You just need a Diners Club international cc, Indian NON-VBV
or AMEX, Some Amex are still working
Iโm listing some bins here which will work on Amazon.
542034542034 IN MASTERCARD CREDIT BANK OF INDIA
542086 IN MASTERCARD CREDIT ANDHRA BANK
376900 IN AMEX CREDIT AMERICAN EXPRESS
376901 IN AMEX CREDIT AMERICAN EXPRESS
376902 IN AMEX CREDIT AMERI EXPRESS
376903 IN AMEX CREDIT AMERI EXPRESS
#All are Non-VBV
First Method (Most successful)
2) Restart the computer and make sure you have used ccleaner and flash cookie
3) cleaner and they are running. Used disk cleanup in windows as well.
Create a new account on Amazon using a fresh good socks.
4) Modern protection
against carding tracks the user's behavior on the site. Therefore, you must act as
a typical buyer, not jump directly to your product. Use the search, see different
5) knick-knacks, add them to the cart, but do not buy. It should be quite different
items, not those that you want to card.
After the virtual shopping logout from Amazon, leave the computer, and stop
the activity on it. Put it to sleep. After 5 or more hours, go back to Amazon and
clean your cart. Now letโs card.
6) Now find the items falling into the limit of your card somewhere between $30
and $150. Using a credit card, pay for the goods that you selected. You may need
to wait for amazon to approve your order or not. Sometimes itโs random I swear.
7) Now the order should have been accepted and shipped. If not, then you either
have a shitty card worth less than what you trying to card or you threw a flag. Go
8) back and check your setup. This is pretty full proof way to card amazon. If
everything is in place and you have your bases covered, you should be in and
out. Make sure you check to see if you IP leaking cause that would throw a flag
> as well: https://www.dnsleaktest.com
Now we can also speed up this order if itโs in processing just so it doesnโt get
charged back and flagged before it gets shipped.
9) Send amazon an email from
the email that you created for this account. Gmail is preferred email for this setup
as it is much more trustworthy do to its security signed up measures. Use an
excuse to make them speed it up. There is excuse kind of tie into what you are
buying.
10) So letโs say you want a 800 dollar cannon camera then tell them that you
itโs real person on the other end so make your excuse real and donโt go too in
depth.
11) Now they may ask to call you on the phone number associated with the CC
account. This happens maybe 30% of the time. Just say OK and hope no one
picks up the phone on the other end and luck I on your side. If they send you
12) After getting order confirmation.
Instagram
Login โข Instagram
Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.
Hurraaayyyy!!! U have successfully carded
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
--------๐๐D๐๐๐ฎ๐D๐----
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
--------๐๐D๐๐๐ฎ๐D๐----
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆHow unwanted software Works By Microsoft
(Instagram.com/UnderCodeTestingCompany)
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
Unwanted software can be introduced when a user searches for and downloads applications from the internet. Some applications are software bundlers, which means that they are packed with other applications. As a result, other programs can be inadvertently installed when the original application is downloaded.
๐ฆHere are some indications of unwanted software:
1) There are programs that you did not install and that may be difficult to uninstall
2) Browser features or settings have changed, and you canโt view or modify them
3) There are excessive messages about your device's health or about files and programs
4) There are ads that cannot be easily closed
5) Some indicators are harder to recognize because they are less disruptive, but are still unwanted. For example, unwanted software can modify web pages to display specific ads, monitor browsing activities, or remove control of the browser.
6) Microsoft uses an extensive evaluation criteria to identify unwanted software
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆHow unwanted software Works By Microsoft
(Instagram.com/UnderCodeTestingCompany)
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
Unwanted software can be introduced when a user searches for and downloads applications from the internet. Some applications are software bundlers, which means that they are packed with other applications. As a result, other programs can be inadvertently installed when the original application is downloaded.
๐ฆHere are some indications of unwanted software:
1) There are programs that you did not install and that may be difficult to uninstall
2) Browser features or settings have changed, and you canโt view or modify them
3) There are excessive messages about your device's health or about files and programs
4) There are ads that cannot be easily closed
5) Some indicators are harder to recognize because they are less disruptive, but are still unwanted. For example, unwanted software can modify web pages to display specific ads, monitor browsing activities, or remove control of the browser.
6) Microsoft uses an extensive evaluation criteria to identify unwanted software
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - -
Instagram
Login โข Instagram
Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.
UNDERCODE COMMUNITY
โโโโโโundercOdeโโโโโโ ๐ฆ CARDING Methode Not patched โ ๏ธโ ๏ธโ ๏ธโ ๏ธโ ๏ธ ( instagram.com/UnderCodeTestingCompany) ๐ฆAmazon Carding New > March method Fresh and New and Highly working Method created by top carders in world. >Note: All other methods are patched...โฆ
Use for learn iam not responsible in what you use this tutorial
Enjoy ๐
Enjoy ๐
- - - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆVmware Working Serials:
(instagram.com/UndercOdeTestingCompany):
CU3MA-2LG1N-48EGQ-9GNGZ-QG0UD
FU512-2DG1H-M85QZ-U7Z5T-PY8ZD
CU3MA-2LG1N-48EGQ-9GNGZ-QG0UD
GV7N2-DQZ00-4897Y-27ZNX-NV0TD
YZ718-4REEQ-08DHQ-JNYQC-ZQRD0
GZ3N0-6CX0L-H80UP-FPM59-NKAD4
YY31H-6EYEJ-480VZ-VXXZC-QF2E0
ZG51K-25FE1-H81ZP-95XGT-WV2C0
VG30H-2AX11-H88FQ-CQXGZ-M6AY4
CU7J2-4KG8J-489TY-X6XGX-MAUX2
FY780-64E90-0845Z-1DWQ9-XPRC0
UF312-07W82-H89XZ-7FPGE-XUH80
AA3DH-0PYD1-0803P-X4Z7V-PGHR4
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆVmware Working Serials:
(instagram.com/UndercOdeTestingCompany):
CU3MA-2LG1N-48EGQ-9GNGZ-QG0UD
FU512-2DG1H-M85QZ-U7Z5T-PY8ZD
CU3MA-2LG1N-48EGQ-9GNGZ-QG0UD
GV7N2-DQZ00-4897Y-27ZNX-NV0TD
YZ718-4REEQ-08DHQ-JNYQC-ZQRD0
GZ3N0-6CX0L-H80UP-FPM59-NKAD4
YY31H-6EYEJ-480VZ-VXXZC-QF2E0
ZG51K-25FE1-H81ZP-95XGT-WV2C0
VG30H-2AX11-H88FQ-CQXGZ-M6AY4
CU7J2-4KG8J-489TY-X6XGX-MAUX2
FY780-64E90-0845Z-1DWQ9-XPRC0
UF312-07W82-H89XZ-7FPGE-XUH80
AA3DH-0PYD1-0803P-X4Z7V-PGHR4
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - -
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆHow to protect against unwanted software
(instagram.com/UnderCodeTestingCompany)
๐ฆTo prevent unwanted software infection? by microsoft:
1) download software only from official websites, or from the Microsoft Store. Be wary of downloading software from third-party sites.
2) Use Microsoft Edge when browsing the internet. Microsoft Edge includes additional protections that effectively block browser modifiers that can change your browser settings.
3) Microsoft Edge also blocks known websites hosting unwanted software using SmartScreen (also used by Internet Explorer).
4) Enable Windows Defender Antivirus in Windows 10. It provides real-time protection against threats and detects and removes known unwanted software.
5) Download Microsoft Security Essentials for real-time protection in Windows 7 or Windows Vista.
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆHow to protect against unwanted software
(instagram.com/UnderCodeTestingCompany)
๐ฆTo prevent unwanted software infection? by microsoft:
1) download software only from official websites, or from the Microsoft Store. Be wary of downloading software from third-party sites.
2) Use Microsoft Edge when browsing the internet. Microsoft Edge includes additional protections that effectively block browser modifiers that can change your browser settings.
3) Microsoft Edge also blocks known websites hosting unwanted software using SmartScreen (also used by Internet Explorer).
4) Enable Windows Defender Antivirus in Windows 10. It provides real-time protection against threats and detects and removes known unwanted software.
5) Download Microsoft Security Essentials for real-time protection in Windows 7 or Windows Vista.
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - -
Instagram
Login โข Instagram
Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.
- - - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆWhat should I do if my device is infected? with unwanted software:
(t.me/UnderCodeTestingOfficial)
> If you suspect that you have unwanted software, you can submit files for analysis.
> Some unwanted software adds uninstallation entries, which means that you can remove them using Settings.
1) Select the Start button
2) Go to Settings > Apps > Apps & features.
3) Select the app you want to uninstall, then click Uninstall.
>If you only recently noticed symptoms of unwanted software infection, consider sorting the apps by install date, and then uninstall the most recent apps that you did not install.
>You may also need to remove browser add-ons in your browsers, such as Internet Explorer, Firefox, or Chrome.
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆWhat should I do if my device is infected? with unwanted software:
(t.me/UnderCodeTestingOfficial)
> If you suspect that you have unwanted software, you can submit files for analysis.
> Some unwanted software adds uninstallation entries, which means that you can remove them using Settings.
1) Select the Start button
2) Go to Settings > Apps > Apps & features.
3) Select the app you want to uninstall, then click Uninstall.
>If you only recently noticed symptoms of unwanted software infection, consider sorting the apps by install date, and then uninstall the most recent apps that you did not install.
>You may also need to remove browser add-ons in your browsers, such as Internet Explorer, Firefox, or Chrome.
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - -
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆHow Check if android is infected?
(instagram.com/UnderCodeTestingCompany)
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) Increased data usage
If you notice a sudden spike in data usage, this could be a sign that a virus is running background tasks on your device or trying to use the internet to transmit information from your phone. (While you're at it, find out how to keep your data usage under control on mobile phones).
2) Excessive app crashing
Apps crash from time to time, but if your apps start crashing regularly for seemingly no reason, your phone could have a virus/malware.
3) Adware pop-ups
Most pop-up ads are just annoying, not malicious. And the good news is that these can easily be blocked by using an ad block browser extension, or the free Opera Browser app, which comes with a built-in ad blocker. However, if youโre seeing pop-up ads on your Android or iPhone even when your browser is closed, you could be dealing with adware: malicious pop-ups caused by malware trying to steal your data.
4) Unexplained phone bill increases
Some malware strains attack by sending premium rate SMS messages from your phone, causing your phone bill to take a hit. For example, Ztorg Trojans were found doing this in 2017, in addition to deleting incoming messages.
5) Unfamiliar apps
If you notice an app on your phone that you donโt recall downloading, stay away! A common symptom of malware on Android phones, fake apps should be uninstalled immediately.
6) Faster battery drain
Malware mischief can use up a lot of energy, which subsequently takes a toll on your Android or iPhoneโs battery. If your battery is draining faster than usual, you shouldnโt rule out a virus as the cause.
7) Overheating
While the majority of reasons your phone is overheating are normal and relatively harmless, itโs also possible that the cause is a malware infection.
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆHow Check if android is infected?
(instagram.com/UnderCodeTestingCompany)
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) Increased data usage
If you notice a sudden spike in data usage, this could be a sign that a virus is running background tasks on your device or trying to use the internet to transmit information from your phone. (While you're at it, find out how to keep your data usage under control on mobile phones).
2) Excessive app crashing
Apps crash from time to time, but if your apps start crashing regularly for seemingly no reason, your phone could have a virus/malware.
3) Adware pop-ups
Most pop-up ads are just annoying, not malicious. And the good news is that these can easily be blocked by using an ad block browser extension, or the free Opera Browser app, which comes with a built-in ad blocker. However, if youโre seeing pop-up ads on your Android or iPhone even when your browser is closed, you could be dealing with adware: malicious pop-ups caused by malware trying to steal your data.
4) Unexplained phone bill increases
Some malware strains attack by sending premium rate SMS messages from your phone, causing your phone bill to take a hit. For example, Ztorg Trojans were found doing this in 2017, in addition to deleting incoming messages.
5) Unfamiliar apps
If you notice an app on your phone that you donโt recall downloading, stay away! A common symptom of malware on Android phones, fake apps should be uninstalled immediately.
6) Faster battery drain
Malware mischief can use up a lot of energy, which subsequently takes a toll on your Android or iPhoneโs battery. If your battery is draining faster than usual, you shouldnโt rule out a virus as the cause.
7) Overheating
While the majority of reasons your phone is overheating are normal and relatively harmless, itโs also possible that the cause is a malware infection.
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - -
Instagram
Login โข Instagram
Welcome back to Instagram. Sign in to check out what your friends, family & interests have been capturing & sharing around the world.
- - - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆHow improve gaming performance On Pc: any os:
(instagram.com/UnderCodeTestingCompany)
1) Update your graphics drivers
2) Give your GPU a slight overclock
3) Boost your PC with an optimization tool
4) Upgrade your graphics card to a newer model
5) Switch out that old HDD and get yourself an SSD
6) Turn off Superfetch and Prefetch
7) Defrag & TRIM your hard disk for faster access
8) Tweak your Intel, AMD or NVIDIA Control Panels
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆHow improve gaming performance On Pc: any os:
(instagram.com/UnderCodeTestingCompany)
1) Update your graphics drivers
2) Give your GPU a slight overclock
3) Boost your PC with an optimization tool
4) Upgrade your graphics card to a newer model
5) Switch out that old HDD and get yourself an SSD
6) Turn off Superfetch and Prefetch
7) Defrag & TRIM your hard disk for faster access
8) Tweak your Intel, AMD or NVIDIA Control Panels
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
- - - - - UาNาDาEาRาCาOาDาEา- - - - -
๐ฆAwesome Termux Automate script:
(t.me/UnderCodeRepoUpdates)
๐ฆINSTALLISATION & RUN:
1) Termux
> pkg install git && python2
2) Ubuntu :
> sudo apt-get install python2 && git
3) git clone github.com/m4rktn/jogan/
4) cd jogan
5) python jogan.py
Thats all now choose option Via Numbers
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆAwesome Termux Automate script:
(t.me/UnderCodeRepoUpdates)
๐ฆINSTALLISATION & RUN:
1) Termux
> pkg install git && python2
2) Ubuntu :
> sudo apt-get install python2 && git
3) git clone github.com/m4rktn/jogan/
4) cd jogan
5) python jogan.py
Thats all now choose option Via Numbers
@ ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - -
- - - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆHowyour wireless network password in Windows , Linux and Mac OS
(instagram.com/UnderCodeTestingCompany)
๐ฆINSTALLISATION & RUN:
On linux open terminal and run
1) sudo su
2) git clone https://github.com/LionSec/wifresti.git
3) cp wifresti/wifresti.py /usr/bin/wifresti
4) chmod +x /usr/bin/wifresti
5) sudo wifresti thenrun as bash
๐ฆWithout Python (.exe file)
1) if you do not have Python installed, you can also download the executable version (Only for Windows)
2) Download link : http://lionsec.net/tools/download.php?Down=wifresti_windows.zip
3) unzip and click
Written by ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆHowyour wireless network password in Windows , Linux and Mac OS
(instagram.com/UnderCodeTestingCompany)
๐ฆINSTALLISATION & RUN:
On linux open terminal and run
1) sudo su
2) git clone https://github.com/LionSec/wifresti.git
3) cp wifresti/wifresti.py /usr/bin/wifresti
4) chmod +x /usr/bin/wifresti
5) sudo wifresti thenrun as bash
๐ฆWithout Python (.exe file)
1) if you do not have Python installed, you can also download the executable version (Only for Windows)
2) Download link : http://lionsec.net/tools/download.php?Down=wifresti_windows.zip
3) unzip and click
Written by ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - -
- - - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆ advanced man in the middle framework for Linux Distro
(instagram.com/UnderCodeTestingCompany)
๐ฆINSTALLISATION & RUN:
1) git clone https://github.com/LionSec/xerosploit
2) cd xerosploit
3) sudo python install.py
4) sudo xerosploit
๐ฆRequirements:
1) nmap
2) hping3
3) build-essential
4) ruby-dev
5) libpcap-dev
6) libgmp3-dev
7) tabulate
8) terminaltables
Written by ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆ advanced man in the middle framework for Linux Distro
(instagram.com/UnderCodeTestingCompany)
๐ฆINSTALLISATION & RUN:
1) git clone https://github.com/LionSec/xerosploit
2) cd xerosploit
3) sudo python install.py
4) sudo xerosploit
๐ฆRequirements:
1) nmap
2) hping3
3) build-essential
4) ruby-dev
5) libpcap-dev
6) libgmp3-dev
7) tabulate
8) terminaltables
Written by ฬตอMฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
- - - - - UาNาDาEาRาCาOาDาEา- - - -
- - - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆTrick to crack the password If you forgot your Windows Password fastest way by UndercOde:
(t.me/UnderCodeTestingOfficial)
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) get windows-10 bootlable DVD.
2) at bios settings Make sure your PC setup is configured to boot from DVD.
3) boot The Disk
4) Press SHIFT + F10 to open the Command prompt
5) Replace the utilman.exe with cmd.exe. (Utilman.exe is a built in Windows application that is designed to allow the user to configure Accessibility options such as the Magnifier, High Contrast Theme, Narrator and On Screen Keyboard before they log onto the system.)
> move d: \System32\utilman.exe d: \System32\utilman.exe.bak
7) Then copy :
copy d: \System32 \cmd.exe d: \System32 \ultiman.exe
8) Windows-10 is usually installed in Drive D:/ if you can not trace it by finding file using d:\windows\system32\utilman.exe, if canโt trace this file in current drive then try in another Drive.
9) After successfully moving utilman.exe, remove your bootable DVD and reboot your problematic windows-10 installation from same CMD prompt.
> wpeutil reboot
10) On the Windows Login page,
> Click Utility Manager Icon at Bottom left.
11) As we have already replaced Utility Manager EXE file with Command Prompt EXE, so it will get open CMD prompt. (Avoid error message)
12) Directly reset the windows-10 password from command prompt! It will not ask you for old password and direct reset your new password.
> net user <username> <new_password>
13) Now, the password has been changed successfully
> Exit from command prompt, Get to the Login screen and apply your new password
Written by UnderCode
Tested on lastest win version
- - - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆTrick to crack the password If you forgot your Windows Password fastest way by UndercOde:
(t.me/UnderCodeTestingOfficial)
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) get windows-10 bootlable DVD.
2) at bios settings Make sure your PC setup is configured to boot from DVD.
3) boot The Disk
4) Press SHIFT + F10 to open the Command prompt
5) Replace the utilman.exe with cmd.exe. (Utilman.exe is a built in Windows application that is designed to allow the user to configure Accessibility options such as the Magnifier, High Contrast Theme, Narrator and On Screen Keyboard before they log onto the system.)
> move d: \System32\utilman.exe d: \System32\utilman.exe.bak
7) Then copy :
copy d: \System32 \cmd.exe d: \System32 \ultiman.exe
8) Windows-10 is usually installed in Drive D:/ if you can not trace it by finding file using d:\windows\system32\utilman.exe, if canโt trace this file in current drive then try in another Drive.
9) After successfully moving utilman.exe, remove your bootable DVD and reboot your problematic windows-10 installation from same CMD prompt.
> wpeutil reboot
10) On the Windows Login page,
> Click Utility Manager Icon at Bottom left.
11) As we have already replaced Utility Manager EXE file with Command Prompt EXE, so it will get open CMD prompt. (Avoid error message)
12) Directly reset the windows-10 password from command prompt! It will not ask you for old password and direct reset your new password.
> net user <username> <new_password>
13) Now, the password has been changed successfully
> Exit from command prompt, Get to the Login screen and apply your new password
Written by UnderCode
Tested on lastest win version
- - - - - UาNาDาEาRาCาOาDาEา- - - -
- - - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆ A gd collection of android Exploits and Hacks
(instagram.com/UnderCodeTestingCompany)
๐ฆInstallisation & Run:
1) git clone https://github.com/sundaysec/Android-Exploits.git
> Recommend you grab exploitpack latest version
2) wget https://github.com/juansacco/exploitpack/archive/master.zip
3) Extract then Navigate into the folder and type:
> java -jar ExploitPack.jar
4) Load the exploits
Learn and hack
๐ฆOWASP Top 10 Mobile Risks:
1) Insecure Data Storage
2) Weak Server Side Controls
3) Insufficient Transport Layer Protection
4) Client Side Injection
5) Poor Authorization and Authentication
6) Improper Session Handling
7) Security Decisions Via Untrusted Inputs
8) Side Channel Data Leakage
9) Broken Cryptography
10) Sensitive Information Disclosure
Written by UnderCode
- - - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆ A gd collection of android Exploits and Hacks
(instagram.com/UnderCodeTestingCompany)
๐ฆInstallisation & Run:
1) git clone https://github.com/sundaysec/Android-Exploits.git
> Recommend you grab exploitpack latest version
2) wget https://github.com/juansacco/exploitpack/archive/master.zip
3) Extract then Navigate into the folder and type:
> java -jar ExploitPack.jar
4) Load the exploits
Learn and hack
๐ฆOWASP Top 10 Mobile Risks:
1) Insecure Data Storage
2) Weak Server Side Controls
3) Insufficient Transport Layer Protection
4) Client Side Injection
5) Poor Authorization and Authentication
6) Improper Session Handling
7) Security Decisions Via Untrusted Inputs
8) Side Channel Data Leakage
9) Broken Cryptography
10) Sensitive Information Disclosure
Written by UnderCode
- - - - - UาNาDาEาRาCาOาDาEา- - - -
- - - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆDifferent Types of Ransomware:
(t.me/UnderCodeTestingOfficial)
๐ฆCryptoLocker
CyptoLocker botnet is one of the oldest forms of cyber attacks which has been around for the past two decades. The CyptoLocker ransomware came into existence in 2013 when hackers used the original CryptoLocker botnet approach in ransomware.
CyptoLocker ransomware is the most destructive form of ransomware since it uses strong encryption algorithms. It is often impossible to decrypt (restore) the Crypto ransomware-infected computer and files without paying the ransom.
๐ฆWannaCry
WannaCry is the most widely known ransomware variant across the globe. The WannaCry ransomware has infected nearly 125,000 organizations in over 150 countries. Some of the alternative names given to the WannaCry ransomware are WCry or WanaCrypt0r.
๐ฆBad Rabbit
Bad Rabbit is another strain of ransomware which has infected organizations across Russia and Eastern Europe. It usually spreads through a fake Adobe Flash update on compromised websites.
๐ฆCerber
Cerber is another ransomware variant which targets cloud-based Office 365 users. Millions of Office 365 users have fallen prey to an elaborate phishing campaign carried out by the Cerber ransomware.
๐ฆCrysis
Crysis is a special type of ransomware which encrypts files on fixed drives, removable drives, and network drives. It spreads through malicious email attachments with double-file extension. It uses strong encryption algorithms making it difficult to decrypt within a fair amount of time.
๐ฆCryptoWall
CryptoWall is an advanced form of CryptoLocker ransomware. It came into existence since early 2014 after the downfall of the original CryptoLocker variant. Today, there are multiple variants of CryptoWall in existence. It includes CryptoDefense, CryptoBit, CryptoWall 2.0, and CryptoWall 3.0.
๐ฆGoldenEye
GoldenEye is similar to the infamous Petya ransomware. It spreads through a massive social engineering campaign that targets human resources departments. When a user downloads a GoldenEye-infected file, it silently launches a macro which encrypts files on the victim's computer.
๐ฆJigsaw
Jigsaw is one of the most destructive types of ransomware which encrypts and progressively deletes the encrypted files until a ransom is paid. It starts deleting the files one after the other on an hourly basis until the 72-hour mark- when all the remaining files are deleted.
๐ฆLocky
Locky is another ransomware variant which is designed to lock the victim's computer and prevent them from using it until a ransom is paid. It usually spread through seemingly benign email message disguised as an invoice.
When a user opens the email attachment, the invoice gets deleted automatically, and the victim is directed to enable macros to read the document. When the victim enables macros, Locky begins encrypting multiple file types using AES encryption.
> Petya, NotPetya, TeslaCrypt, TorrentLocker, ZCryptor, etc., are some of the other ransomware variants that are well-known for their malicious activities.
Written by UnderCode
- - - - - UาNาDาEาRาCาOาDาEา- - - -
๐ฆDifferent Types of Ransomware:
(t.me/UnderCodeTestingOfficial)
๐ฆCryptoLocker
CyptoLocker botnet is one of the oldest forms of cyber attacks which has been around for the past two decades. The CyptoLocker ransomware came into existence in 2013 when hackers used the original CryptoLocker botnet approach in ransomware.
CyptoLocker ransomware is the most destructive form of ransomware since it uses strong encryption algorithms. It is often impossible to decrypt (restore) the Crypto ransomware-infected computer and files without paying the ransom.
๐ฆWannaCry
WannaCry is the most widely known ransomware variant across the globe. The WannaCry ransomware has infected nearly 125,000 organizations in over 150 countries. Some of the alternative names given to the WannaCry ransomware are WCry or WanaCrypt0r.
๐ฆBad Rabbit
Bad Rabbit is another strain of ransomware which has infected organizations across Russia and Eastern Europe. It usually spreads through a fake Adobe Flash update on compromised websites.
๐ฆCerber
Cerber is another ransomware variant which targets cloud-based Office 365 users. Millions of Office 365 users have fallen prey to an elaborate phishing campaign carried out by the Cerber ransomware.
๐ฆCrysis
Crysis is a special type of ransomware which encrypts files on fixed drives, removable drives, and network drives. It spreads through malicious email attachments with double-file extension. It uses strong encryption algorithms making it difficult to decrypt within a fair amount of time.
๐ฆCryptoWall
CryptoWall is an advanced form of CryptoLocker ransomware. It came into existence since early 2014 after the downfall of the original CryptoLocker variant. Today, there are multiple variants of CryptoWall in existence. It includes CryptoDefense, CryptoBit, CryptoWall 2.0, and CryptoWall 3.0.
๐ฆGoldenEye
GoldenEye is similar to the infamous Petya ransomware. It spreads through a massive social engineering campaign that targets human resources departments. When a user downloads a GoldenEye-infected file, it silently launches a macro which encrypts files on the victim's computer.
๐ฆJigsaw
Jigsaw is one of the most destructive types of ransomware which encrypts and progressively deletes the encrypted files until a ransom is paid. It starts deleting the files one after the other on an hourly basis until the 72-hour mark- when all the remaining files are deleted.
๐ฆLocky
Locky is another ransomware variant which is designed to lock the victim's computer and prevent them from using it until a ransom is paid. It usually spread through seemingly benign email message disguised as an invoice.
When a user opens the email attachment, the invoice gets deleted automatically, and the victim is directed to enable macros to read the document. When the victim enables macros, Locky begins encrypting multiple file types using AES encryption.
> Petya, NotPetya, TeslaCrypt, TorrentLocker, ZCryptor, etc., are some of the other ransomware variants that are well-known for their malicious activities.
Written by UnderCode
- - - - - UาNาDาEาRาCาOาDาEา- - - -