โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆMobile Apps (Hack On Android)
i know we already sent 250 android hack app in one git link but lets focus on most usuable apps !"
t.me/UndercOdeTestingOfficial
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) AndroRat - Android Remote Administrative Tool
>https://github.com/wszf/androrat
2)cspoilt - A tool that enumerates local hosts, finds vulnerabilities and their exploits, cracks Wi-Fi password, installs backdoors blablabla!!!
> http://www.csploit.org/
3) Hackode - All In One Android Pentest Tool
>https://play.google.com/store/apps/details?id=com.techfond.hackode&hl=en
4) zANTI - Network mapping, port discovery, sniffing, packet manipulation, DoS, MITM blablabla!!
> https://www.zimperium.com/zanti-mobile-penetration-testing
5) FaceNiff - Intercept and sniff WiFi network traffic for Social Media packets
> http://faceniff.ponury.net/
6) Droidsheep - Android application that analyzes security in wireless networks and also captures Twitter, Linked, Facebook, and other accounts
> http://droidsheep.downloadxapp.com/
7) USB Cleaver - Silently recover information from a target Windows 2000 or higher computer, including password hashes, LSA secrets, IP information
>https://forum.xda-developers.com/showthread.php?t=1656497
8) Shark - Network Packate analysis tool
> https://github.com/sundaysec/Android-Exploits/blob/master
9) DroidBox - Dynamic analysis of Android apps
>https://github.com/pjlantz/droidbox
10) Wi-Fi Kill - Disable other Users from WiFi Access
> https://wifikillapk.com/
@ Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆMobile Apps (Hack On Android)
i know we already sent 250 android hack app in one git link but lets focus on most usuable apps !"
t.me/UndercOdeTestingOfficial
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) AndroRat - Android Remote Administrative Tool
>https://github.com/wszf/androrat
2)cspoilt - A tool that enumerates local hosts, finds vulnerabilities and their exploits, cracks Wi-Fi password, installs backdoors blablabla!!!
> http://www.csploit.org/
3) Hackode - All In One Android Pentest Tool
>https://play.google.com/store/apps/details?id=com.techfond.hackode&hl=en
4) zANTI - Network mapping, port discovery, sniffing, packet manipulation, DoS, MITM blablabla!!
> https://www.zimperium.com/zanti-mobile-penetration-testing
5) FaceNiff - Intercept and sniff WiFi network traffic for Social Media packets
> http://faceniff.ponury.net/
6) Droidsheep - Android application that analyzes security in wireless networks and also captures Twitter, Linked, Facebook, and other accounts
> http://droidsheep.downloadxapp.com/
7) USB Cleaver - Silently recover information from a target Windows 2000 or higher computer, including password hashes, LSA secrets, IP information
>https://forum.xda-developers.com/showthread.php?t=1656497
8) Shark - Network Packate analysis tool
> https://github.com/sundaysec/Android-Exploits/blob/master
9) DroidBox - Dynamic analysis of Android apps
>https://github.com/pjlantz/droidbox
10) Wi-Fi Kill - Disable other Users from WiFi Access
> https://wifikillapk.com/
@ Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆWHAT IS Definition
virtual network computing (VNC)
t.me/iOsDeveloppers
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
> Virtual network computing (VNC) is a type of remote-control software that makes it possible to control another computer over a network connection. Keystrokes and mouse clicks are transmitted from one computer to another, allowing technical support staff to manage a desktop, server, or other networked device without being in the same physical location.
> VNC works on a client/server model: A VNC viewer (or client) is installed on the local computer and connects to the server component, which must be installed on the remote computer.
> The server transmits a duplicate of the remote computer's display screen to the viewer. It also interprets commands coming from the viewer and carries them out on the remote computer.
@ Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆWHAT IS Definition
virtual network computing (VNC)
t.me/iOsDeveloppers
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
> Virtual network computing (VNC) is a type of remote-control software that makes it possible to control another computer over a network connection. Keystrokes and mouse clicks are transmitted from one computer to another, allowing technical support staff to manage a desktop, server, or other networked device without being in the same physical location.
> VNC works on a client/server model: A VNC viewer (or client) is installed on the local computer and connects to the server component, which must be installed on the remote computer.
> The server transmits a duplicate of the remote computer's display screen to the viewer. It also interprets commands coming from the viewer and carries them out on the remote computer.
@ Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Telegram
iUNDERCODE IOS JAILBREAK SUPPORT & HELP
WELCOME TO iUNDERCODE BY UNDERCODE TESTING FOR IOS JAILBREAK & TWEAKS GROUP RULES @UNDERCODERULES
๐๐พ๐๐๐๐ฑ๐ ด
Youtube.com/c/Undercode
๐ ต๐ฐ๐ ฒ๐ ด๐ฑ๐พ๐พ๐ บ
@UndercOdeTesting
@iUNDERCODE
๐ ธ๐ ฝ๐๐๐ฐ๐ ถ๐๐ฐ๐ ผ
@UndercOdeTestinG
@iUNDERCODE
๐๐๐ ธ๐๐๐ ด๐
@iUNDERCODE
@UNDERCODENEWS
๐๐พ๐๐๐๐ฑ๐ ด
Youtube.com/c/Undercode
๐ ต๐ฐ๐ ฒ๐ ด๐ฑ๐พ๐พ๐ บ
@UndercOdeTesting
@iUNDERCODE
๐ ธ๐ ฝ๐๐๐ฐ๐ ถ๐๐ฐ๐ ผ
@UndercOdeTestinG
@iUNDERCODE
๐๐๐ ธ๐๐๐ ด๐
@iUNDERCODE
@UNDERCODENEWS
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow Control vnc servers ?
>LibVNCServer/LibVNCClient are cross-platform C libraries that allow you to easily implement VNC server or client functionality in your program.
>VNC is a set of programs using the RFB (Remote Frame Buffer) protocol. They are designed to "export" a frame buffer via net (if you don't know VNC, I suggest you read "Basics" below). It is already in wide use for administration, but it is not that easy to program a server yourself.
instagram.com/UndercOdeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/LibVNC/libvncserver
2) cd libvncserver
3) mkdir build
4) cd build
5) cmake ..
6) cmake --build .
๐ฆHow It Works ?
1) To make a server, you just have to initialise a server structure using the function rfbDefaultScreenInit, like rfbScreenInfoPtr rfbScreen = rfbGetScreen(argc,argv,width,height,8,3,bpp); where byte per pixel should be 1, 2 or 4. If performance doesn't matter, you may try bpp=3 (internally one cannot use native data types in this case; if you want to use this, look at pnmshow24).
2) You then can set hooks and io functions (see below) or other options
> And you allocate the frame buffer like this: rfbScreen->frameBuffer = (char*)malloc(widthheightbpp);
3) After that, you initialize the server, like rfbInitServer(rfbScreen);
4) You can use a blocking event loop, a background (pthread based) event loop, or implement your own using the rfbProcessEvents function.
@ Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow Control vnc servers ?
>LibVNCServer/LibVNCClient are cross-platform C libraries that allow you to easily implement VNC server or client functionality in your program.
>VNC is a set of programs using the RFB (Remote Frame Buffer) protocol. They are designed to "export" a frame buffer via net (if you don't know VNC, I suggest you read "Basics" below). It is already in wide use for administration, but it is not that easy to program a server yourself.
instagram.com/UndercOdeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/LibVNC/libvncserver
2) cd libvncserver
3) mkdir build
4) cd build
5) cmake ..
6) cmake --build .
๐ฆHow It Works ?
1) To make a server, you just have to initialise a server structure using the function rfbDefaultScreenInit, like rfbScreenInfoPtr rfbScreen = rfbGetScreen(argc,argv,width,height,8,3,bpp); where byte per pixel should be 1, 2 or 4. If performance doesn't matter, you may try bpp=3 (internally one cannot use native data types in this case; if you want to use this, look at pnmshow24).
2) You then can set hooks and io functions (see below) or other options
> And you allocate the frame buffer like this: rfbScreen->frameBuffer = (char*)malloc(widthheightbpp);
3) After that, you initialize the server, like rfbInitServer(rfbScreen);
4) You can use a blocking event loop, a background (pthread based) event loop, or implement your own using the rfbProcessEvents function.
@ Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆSPOOTIFY ACCOUNTS 2019-2020 NON-TESTED
cnb2001@gmail.com 01122001 1-Month
philfroese@gmail.com groovy11 1-Month
carlton.t.jones@gmail.com gotwins1 1-Month
amberenixon@gmail.com macie123 1-Month
kristenreeson@hotmail.com NCC74656 1-Month
s.curry.e@gmail.com shannon 1-Month
ranzi.vogel1@web.de shakira 1-Month
maddiepwheeler@gmail.com ilikepie4 US Accounts
reagankurtz@yahoo.com mackenzie2002 US Accounts
jenniferrocks101@gmail.com rebecca US Accounts
a.carroll12@icloud.com Leopard13 US Accounts
guardianangel6066@gmail.com Samson10 US Accounts
sophieconcannon@gmail.com piggy2011 US Accounts
tianosale85@gmail.com mamita1990 1-Month
jutsilveira@gmail.com juju5940 1-Month
keliann214@gmail.com Fitness1 1-Month
finfan41@yahoo.com legs1234 1-Month
joey230michael@icloud.com Joey129453 1-Month
@ Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆSPOOTIFY ACCOUNTS 2019-2020 NON-TESTED
cnb2001@gmail.com 01122001 1-Month
philfroese@gmail.com groovy11 1-Month
carlton.t.jones@gmail.com gotwins1 1-Month
amberenixon@gmail.com macie123 1-Month
kristenreeson@hotmail.com NCC74656 1-Month
s.curry.e@gmail.com shannon 1-Month
ranzi.vogel1@web.de shakira 1-Month
maddiepwheeler@gmail.com ilikepie4 US Accounts
reagankurtz@yahoo.com mackenzie2002 US Accounts
jenniferrocks101@gmail.com rebecca US Accounts
a.carroll12@icloud.com Leopard13 US Accounts
guardianangel6066@gmail.com Samson10 US Accounts
sophieconcannon@gmail.com piggy2011 US Accounts
tianosale85@gmail.com mamita1990 1-Month
jutsilveira@gmail.com juju5940 1-Month
keliann214@gmail.com Fitness1 1-Month
finfan41@yahoo.com legs1234 1-Month
joey230michael@icloud.com Joey129453 1-Month
@ Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow to scan for general system information, vulnerable software packages, and possible configuration issues... in one tool
t.me/UndercOdeTestingOfficial
๐ฆFeatures :
> Automated security auditing
> Compliance testing (e.g. ISO27001, PCI-DSS, HIPAA)
> Vulnerability detection
The software (also) assists with:
> Configuration and asset management
> Software patch management
> System hardening
> Penetration testing (privilege escalation)
> Intrusion detection
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/CISOfy/lynis
2) cd lynis
3) ./lynis audit system
๐ฆTested by UndercOde on
> kali
> ubanto
@ Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHow to scan for general system information, vulnerable software packages, and possible configuration issues... in one tool
t.me/UndercOdeTestingOfficial
๐ฆFeatures :
> Automated security auditing
> Compliance testing (e.g. ISO27001, PCI-DSS, HIPAA)
> Vulnerability detection
The software (also) assists with:
> Configuration and asset management
> Software patch management
> System hardening
> Penetration testing (privilege escalation)
> Intrusion detection
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/CISOfy/lynis
2) cd lynis
3) ./lynis audit system
๐ฆTested by UndercOde on
> kali
> ubanto
@ Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆCloudflarew 2020 Features & Why Its secure & safe to use this protection ?
twitter.com/UndercodeTC
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
> Fast, Global Content Delivery Network.
> Fast, Powerful, And Secure DNS.
>Load Balancing.
> A rgo Smart Routing.
> Web Optimizations.
> Local Storage Caching.
> AutoMinify.
> Rocket Loader
> anti-ddos solution
> hide admin mail & phones from website
> hide cms feature include
> multi language + Two-factor login
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆCloudflarew 2020 Features & Why Its secure & safe to use this protection ?
twitter.com/UndercodeTC
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
> Fast, Global Content Delivery Network.
> Fast, Powerful, And Secure DNS.
>Load Balancing.
> A rgo Smart Routing.
> Web Optimizations.
> Local Storage Caching.
> AutoMinify.
> Rocket Loader
> anti-ddos solution
> hide admin mail & phones from website
> hide cms feature include
> multi language + Two-factor login
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆPython wrapper for the Cloudflare Client API v4
updated
t.me/UndercOdeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) sudo pip install cloudflare
or via git
1) git clone https://github.com/cloudflare/python-cloudflare
2) cd python-cloudflare
3) ./setup.py build
4) sudo ./setup.py install
๐ฆExample
A very simple listing of zones within your account; including the IPv6 status of the zone.
import CloudFlare
def main():
cf = CloudFlare.CloudFlare()
zones = cf.zones.get()
for zone in zones:
zone_id = zone['id']
zone_name = zone['name']
print zone_id, zone_name
if name == 'main':
main()
>This example works when there are less than 50 zones (50 is the default number of values returned from a query like this).
๐ฆProviding Cloudflare Username and API Key
When you create a CloudFlare class you can pass up to four parameters.
1> API Token or API Key
2> Account email (only if an API Key is being used)
3> Optional Origin-CA Certificate Token
4> Optional Debug flag (True/False)
๐ฆimport CloudFlare
# A minimal call - reading values from environment variables or configuration file
cf = CloudFlare.CloudFlare()
# A minimal call with debug enabled
cf = CloudFlare.CloudFlare(debug=True))
# An authenticated call using an API Token (note the missing email)
cf = CloudFlare.CloudFlare(token='00000000000000000000000000000000')
# An authenticated call using an API Key
cf = CloudFlare.CloudFlare(email='user@example.com', token='00000000000000000000000000000000')
# An authenticated call using an API Key and CA-Origin info
cf = CloudFlare.CloudFlare(email='user@example.com', token='00000000000000000000000000000000', certtoken='v1.0-...')
> If the account email and API key are not passed when you create the class, then they are retrieved from either the use exported shell environment variables or the .cloudflare.cfg or ~/.cloudflare.cfg or ~/.cloudflare/cloudflare.cfg files, in that order.
๐ฆexample Using shell environment variables
1> export CF_API_EMAIL='user@example.com' # Do not set if using an API Token
2> export CF_API_KEY='00000000000000000000000000000000'
3> export CF_API_CERTKEY='v1.0-...
๐ฆUsing configuration file to store email and keys
1> cat ~/.cloudflare/cloudflare.cfg
[CloudFlare]
2>email = user@example.com # Do not set if using an API Token
token = 00000000000000000000000000000000
certtoken = v1.0-...
extras =
E N J O Y
Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆPython wrapper for the Cloudflare Client API v4
updated
t.me/UndercOdeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) sudo pip install cloudflare
or via git
1) git clone https://github.com/cloudflare/python-cloudflare
2) cd python-cloudflare
3) ./setup.py build
4) sudo ./setup.py install
๐ฆExample
A very simple listing of zones within your account; including the IPv6 status of the zone.
import CloudFlare
def main():
cf = CloudFlare.CloudFlare()
zones = cf.zones.get()
for zone in zones:
zone_id = zone['id']
zone_name = zone['name']
print zone_id, zone_name
if name == 'main':
main()
>This example works when there are less than 50 zones (50 is the default number of values returned from a query like this).
๐ฆProviding Cloudflare Username and API Key
When you create a CloudFlare class you can pass up to four parameters.
1> API Token or API Key
2> Account email (only if an API Key is being used)
3> Optional Origin-CA Certificate Token
4> Optional Debug flag (True/False)
๐ฆimport CloudFlare
# A minimal call - reading values from environment variables or configuration file
cf = CloudFlare.CloudFlare()
# A minimal call with debug enabled
cf = CloudFlare.CloudFlare(debug=True))
# An authenticated call using an API Token (note the missing email)
cf = CloudFlare.CloudFlare(token='00000000000000000000000000000000')
# An authenticated call using an API Key
cf = CloudFlare.CloudFlare(email='user@example.com', token='00000000000000000000000000000000')
# An authenticated call using an API Key and CA-Origin info
cf = CloudFlare.CloudFlare(email='user@example.com', token='00000000000000000000000000000000', certtoken='v1.0-...')
> If the account email and API key are not passed when you create the class, then they are retrieved from either the use exported shell environment variables or the .cloudflare.cfg or ~/.cloudflare.cfg or ~/.cloudflare/cloudflare.cfg files, in that order.
๐ฆexample Using shell environment variables
1> export CF_API_EMAIL='user@example.com' # Do not set if using an API Token
2> export CF_API_KEY='00000000000000000000000000000000'
3> export CF_API_CERTKEY='v1.0-...
๐ฆUsing configuration file to store email and keys
1> cat ~/.cloudflare/cloudflare.cfg
[CloudFlare]
2>email = user@example.com # Do not set if using an API Token
token = 00000000000000000000000000000000
certtoken = v1.0-...
extras =
E N J O Y
Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆA Cloudflare WebExtension
>so helpful for hackers
instagram.com/UndercOdeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) adding to google chrome browser
>https://chrome.google.com/webstore/detail/claire/fgbpcgddpmjmamlibbaobboigaijnmkl
2) adding to firefox
>https://addons.mozilla.org/en-US/firefox/addon/cloudflare-claire/
๐ฆ manual mode
>to use the extension from source:
1> Clone this repository (git clone https://github.com/cloudflare/claire.git)
2> In the checked out directory, run yarn install && yarn run build.
3> Bring up the extensions page (Wrench icon -> Tools -> Extensions)
4> If Developer mode is not checked, check it and this will expose a few additional buttons
5> Click on the Load unpacked extension button and browse to the "dist" folder in the Claire repo folder
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆA Cloudflare WebExtension
>so helpful for hackers
instagram.com/UndercOdeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) adding to google chrome browser
>https://chrome.google.com/webstore/detail/claire/fgbpcgddpmjmamlibbaobboigaijnmkl
2) adding to firefox
>https://addons.mozilla.org/en-US/firefox/addon/cloudflare-claire/
๐ฆ manual mode
>to use the extension from source:
1> Clone this repository (git clone https://github.com/cloudflare/claire.git)
2> In the checked out directory, run yarn install && yarn run build.
3> Bring up the extensions page (Wrench icon -> Tools -> Extensions)
4> If Developer mode is not checked, check it and this will expose a few additional buttons
5> Click on the Load unpacked extension button and browse to the "dist" folder in the Claire repo folder
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHack any wps wifi on Termux/Linux Withou root :
t.me/UndercOdeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/SilentGhostX/HT-WPS-Breaker
2) cd Desktop
3) unzip HT-WPS-Breaker.zip
4) cd HT-WPS-Breaker
5) chmod +x HT-WB.sh
6) ./HT-WB.sh or bash HT-WB.sh
7) Choose Options via Numbers
> note also hidden any wifi can be sucessful getting here name
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHack any wps wifi on Termux/Linux Withou root :
t.me/UndercOdeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/SilentGhostX/HT-WPS-Breaker
2) cd Desktop
3) unzip HT-WPS-Breaker.zip
4) cd HT-WPS-Breaker
5) chmod +x HT-WB.sh
6) ./HT-WB.sh or bash HT-WB.sh
7) Choose Options via Numbers
> note also hidden any wifi can be sucessful getting here name
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆA Kubernetes ingress controller for Cloudflare's Argo Tunnels
Updated
>Argo Tunnel Ingress Controller provides Kubernetes Ingress via Argo Tunnels. The controller establishes or destroys tunnels by monitoring changes to resources.
>Argo Tunnel offers an easy way to expose web servers securely to the internet, without opening up firewall ports and configuring ACLs. Argo Tunnel also ensures requests route through Cloudflare before reaching the web server so you can be sure attack traffic is stopped with Cloudflareโs WAF and Unmetered DDoS mitigation and authenticated with Access if youโve enabled those features for your account.
t.me/UndercOdeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/cloudflare/cloudflare-ingress-controller
2) cd cloudflare-ingress-controller
3) kubectl apply -f deploy/argo-tunnel.yaml
4) Update the ServiceAccount namespace and bindings to deploy in an alternate namespace.Without role based access control (RBAC).
>kubectl apply -f deploy/argo-tunnel-no-rbac.yaml
5) With Helm:
>helm install --name anydomain cloudflare/argo-tunnel
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆA Kubernetes ingress controller for Cloudflare's Argo Tunnels
Updated
>Argo Tunnel Ingress Controller provides Kubernetes Ingress via Argo Tunnels. The controller establishes or destroys tunnels by monitoring changes to resources.
>Argo Tunnel offers an easy way to expose web servers securely to the internet, without opening up firewall ports and configuring ACLs. Argo Tunnel also ensures requests route through Cloudflare before reaching the web server so you can be sure attack traffic is stopped with Cloudflareโs WAF and Unmetered DDoS mitigation and authenticated with Access if youโve enabled those features for your account.
t.me/UndercOdeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/cloudflare/cloudflare-ingress-controller
2) cd cloudflare-ingress-controller
3) kubectl apply -f deploy/argo-tunnel.yaml
4) Update the ServiceAccount namespace and bindings to deploy in an alternate namespace.Without role based access control (RBAC).
>kubectl apply -f deploy/argo-tunnel-no-rbac.yaml
5) With Helm:
>helm install --name anydomain cloudflare/argo-tunnel
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆGreat Tool To Automate checking Vulnerability For Any Website :
t.me/UndercOdeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/penetrate2hack/ITWSV.git
2) cd ITWSV
3) chmod +x start.sh
4) chmod +x update.sh (only if required)
5) ./start.sh
๐ฆFeatures :
WHOIS
DNSWALK
FIERCE
DNSRecon
DNSenum
NMAP
DMitry
theHarvester
LBD
SSLScan
SSLYze
WhatWeb
Automater
Grabber
Parsero
Uniscan
Metagoofil
A2SV
WPScan
Droopescan
WPSeku
XssPy
Spaghetti
sublist3r
WAFW00F
nslookup
nslookup
dirsearch
OWASP Joomscan
Spaghetti
Globuster
Grabber
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆGreat Tool To Automate checking Vulnerability For Any Website :
t.me/UndercOdeTestingOfficial
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/penetrate2hack/ITWSV.git
2) cd ITWSV
3) chmod +x start.sh
4) chmod +x update.sh (only if required)
5) ./start.sh
๐ฆFeatures :
WHOIS
DNSWALK
FIERCE
DNSRecon
DNSenum
NMAP
DMitry
theHarvester
LBD
SSLScan
SSLYze
WhatWeb
Automater
Grabber
Parsero
Uniscan
Metagoofil
A2SV
WPScan
Droopescan
WPSeku
XssPy
Spaghetti
sublist3r
WAFW00F
nslookup
nslookup
dirsearch
OWASP Joomscan
Spaghetti
Globuster
Grabber
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆKALI CRACKING TOOLS + How Run & USE:
t.me/UndercOdeTestingOfficial
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) Hydra
Hydra is a login cracker that supports many protocols to attack ( Cisco AAA, Cisco auth, Cisco enable, CVS, FTP, HTTP(S)-FORM-GET, HTTP(S)-FORM-POST, HTTP(S)-GET, HTTP(S)-HEAD, HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MS-SQL, MySQL, NNTP, Oracle Listener, Oracle SID, PC-Anywhere, PC-NFS, POP3, PostgreSQL, RDP, Rexec, Rlogin, Rsh, SIP, SMB(NT), SMTP, SMTP Enum, SNMP v1+v2+v3, SOCKS5, SSH (v1 and v2), SSHKEY, Subversion, Teamspeak (TS2), Telnet, VMware-Auth, VNC and XMPP).
> To open it, go to Applications โ Password Attacks โ Online Attacks โ hydra.
Hydra
> It will open the terminal console, as shown in the following screenshot.
> Open Terminal
In this case, we will brute force FTP service of metasploitable machine, > which has IP 192.168.1.101
Brute Force
> now you created in Kali a word list with extension โlstโ in the path usr\share\wordlist\metasploit.
Share Wordlist
The command will be as follows โ
hydra -l /usr/share/wordlists/metasploit/user -P
/usr/share/wordlists/metasploit/ passwords ftp://192.168.1.101 โV
where โV is the username and password while trying
> >Hydra Command
As shown in the following screenshot, the username and password are found which are msfadmin:msfadmin
Admin Password
๐ฆ Johnny
Johnny is a GUI for the John the Ripper password cracking tool. Generally, it is used for weak passwords.
1) To open it, go to Applications โ Password Attacks โ johnny.
Johnny
2) will get the password of Kali machine with the following command and a file will be created on the desktop.
Desktop
3) Click โOpen Passwd Fileโ โ OK and all the files
shown then Open File
4) Click โStart Attackโ.
Start Attack
5) After the attack is complete, click the left panel at โPasswordsโ and the password will be unshaded
john is a command line version of Johnny GUI. To start it, open the Terminal and type โjohnโ.
Unshadowing
In case of unshadowing the password, we need to write the following command โ
root@kali:~# unshadow passwd shadow > unshadowed.txt
๐ฆ Rainbowcrack
The RainbowCrack software cracks hashes by rainbow table lookup. Rainbow tables are ordinary files stored on the hard disk. Generally, Rainbow tables are bought online or can be compiled with different tools.
To open it, go to Applications โ Password Attacks โ click โrainbowcrackโ.
RainbowCrack
The command to crack a hash password is โ
rcrack path_to_rainbow_tables -f path_to_password_hash
๐ฆ SQLdict
It is a dictionary attack tool for SQL server and is very easy and basic to be used. To open it, open the terminal and type โsqldictโ. It will open the following view.
Sql Dict
Under โTarget IP Serverโ, enter the IP of the server holding the SQL. Under โTarget Accountโ, enter the username. Then load the file with the password and click โstartโ until it finishes.
hash-identifier
It is a tool that is used to identify types of hashes, meaning what they are being used for. For example, if I have a HASH, it can tell me if it is a Linux or windows HASH.
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆKALI CRACKING TOOLS + How Run & USE:
t.me/UndercOdeTestingOfficial
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
1) Hydra
Hydra is a login cracker that supports many protocols to attack ( Cisco AAA, Cisco auth, Cisco enable, CVS, FTP, HTTP(S)-FORM-GET, HTTP(S)-FORM-POST, HTTP(S)-GET, HTTP(S)-HEAD, HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MS-SQL, MySQL, NNTP, Oracle Listener, Oracle SID, PC-Anywhere, PC-NFS, POP3, PostgreSQL, RDP, Rexec, Rlogin, Rsh, SIP, SMB(NT), SMTP, SMTP Enum, SNMP v1+v2+v3, SOCKS5, SSH (v1 and v2), SSHKEY, Subversion, Teamspeak (TS2), Telnet, VMware-Auth, VNC and XMPP).
> To open it, go to Applications โ Password Attacks โ Online Attacks โ hydra.
Hydra
> It will open the terminal console, as shown in the following screenshot.
> Open Terminal
In this case, we will brute force FTP service of metasploitable machine, > which has IP 192.168.1.101
Brute Force
> now you created in Kali a word list with extension โlstโ in the path usr\share\wordlist\metasploit.
Share Wordlist
The command will be as follows โ
hydra -l /usr/share/wordlists/metasploit/user -P
/usr/share/wordlists/metasploit/ passwords ftp://192.168.1.101 โV
where โV is the username and password while trying
> >Hydra Command
As shown in the following screenshot, the username and password are found which are msfadmin:msfadmin
Admin Password
๐ฆ Johnny
Johnny is a GUI for the John the Ripper password cracking tool. Generally, it is used for weak passwords.
1) To open it, go to Applications โ Password Attacks โ johnny.
Johnny
2) will get the password of Kali machine with the following command and a file will be created on the desktop.
Desktop
3) Click โOpen Passwd Fileโ โ OK and all the files
shown then Open File
4) Click โStart Attackโ.
Start Attack
5) After the attack is complete, click the left panel at โPasswordsโ and the password will be unshaded
john is a command line version of Johnny GUI. To start it, open the Terminal and type โjohnโ.
Unshadowing
In case of unshadowing the password, we need to write the following command โ
root@kali:~# unshadow passwd shadow > unshadowed.txt
๐ฆ Rainbowcrack
The RainbowCrack software cracks hashes by rainbow table lookup. Rainbow tables are ordinary files stored on the hard disk. Generally, Rainbow tables are bought online or can be compiled with different tools.
To open it, go to Applications โ Password Attacks โ click โrainbowcrackโ.
RainbowCrack
The command to crack a hash password is โ
rcrack path_to_rainbow_tables -f path_to_password_hash
๐ฆ SQLdict
It is a dictionary attack tool for SQL server and is very easy and basic to be used. To open it, open the terminal and type โsqldictโ. It will open the following view.
Sql Dict
Under โTarget IP Serverโ, enter the IP of the server holding the SQL. Under โTarget Accountโ, enter the username. Then load the file with the password and click โstartโ until it finishes.
hash-identifier
It is a tool that is used to identify types of hashes, meaning what they are being used for. For example, if I have a HASH, it can tell me if it is a Linux or windows HASH.
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆOffice 2019 All Version SERIALS TESTED By undercOde :
instagram.com/UndercOdeTestingCompany
1) Office Professional Plus 2019
NMMKJ-6RK4F-KMJVX-8D9MJ-6MWKP
2) Office Standard 2019
6NWWJ-YQWMR-QKGCB-6TMB3-9D9HK
3) Project Professional 2019
B4NPR-3FKK7-T2MBV-FRQ4W-PKD2B
4) Project Standard 2019
C4F7P-NCP8C-6CQPT-MQHV9-JXD2M
5) Visio Professional 2019
9BGNQ-K37YR-RQHF2-38RQ3-7VCBB
6) Visio Standard 2019
7TQNQ-K3YQQ-3PFH7-CCPPM-X4VQ2
7) Access 2019
9N9PT-27V4Y-VJ2PD-YXFMF-YTFQT
8) Excel 2019
TMJWT-YYNMB-3BKTF-644FC-RVXBD
9) Outlook 2019
7HD7K-N4PVK-BHBCQ-YWQRW-XW4VK
10) PowerPoint 2019
RRNCX-C64HY-W2MM7-MCH9G-TJHMQ
11) Publisher 2019
G2KWX-3NW6P-PY93R-JXK2T-C9Y9V
12) Skype for Business 2019
NCJ33-JHBBY-HTK98-MYCV8-HMKHJ
13) Word 2019
PBX3G-NWMT6-Q7XBW-PYJGG-WXD33
@UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆOffice 2019 All Version SERIALS TESTED By undercOde :
instagram.com/UndercOdeTestingCompany
1) Office Professional Plus 2019
NMMKJ-6RK4F-KMJVX-8D9MJ-6MWKP
2) Office Standard 2019
6NWWJ-YQWMR-QKGCB-6TMB3-9D9HK
3) Project Professional 2019
B4NPR-3FKK7-T2MBV-FRQ4W-PKD2B
4) Project Standard 2019
C4F7P-NCP8C-6CQPT-MQHV9-JXD2M
5) Visio Professional 2019
9BGNQ-K37YR-RQHF2-38RQ3-7VCBB
6) Visio Standard 2019
7TQNQ-K3YQQ-3PFH7-CCPPM-X4VQ2
7) Access 2019
9N9PT-27V4Y-VJ2PD-YXFMF-YTFQT
8) Excel 2019
TMJWT-YYNMB-3BKTF-644FC-RVXBD
9) Outlook 2019
7HD7K-N4PVK-BHBCQ-YWQRW-XW4VK
10) PowerPoint 2019
RRNCX-C64HY-W2MM7-MCH9G-TJHMQ
11) Publisher 2019
G2KWX-3NW6P-PY93R-JXK2T-C9Y9V
12) Skype for Business 2019
NCJ33-JHBBY-HTK98-MYCV8-HMKHJ
13) Word 2019
PBX3G-NWMT6-Q7XBW-PYJGG-WXD33
@UndercOdeOfficial
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆINSTALL ALL YOUR FAVOR TOOLS VIA 1 CLICK ON TERMUX
(Automatic hacking tools installer for Android) [ONLY FOR TERMUX]
instagram.com/UndercOdeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/AnonHackerr/toolss.git
2) cd toolss
3) chmod +x Tools.py
4) python Tools.py
5) choose option via numbers
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆINSTALL ALL YOUR FAVOR TOOLS VIA 1 CLICK ON TERMUX
(Automatic hacking tools installer for Android) [ONLY FOR TERMUX]
instagram.com/UndercOdeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) git clone https://github.com/AnonHackerr/toolss.git
2) cd toolss
3) chmod +x Tools.py
4) python Tools.py
5) choose option via numbers
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆIF YOU WANT TO CLONE A SIM CARD YOU MUST KNOW THIS :
t.me/UndercOdeTestingOfficial
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
SIM CARD:
>Our sim cards contain two secret codes or keys called (imsi value and ki value) which enables the operator to know the mobile number and authenticate the customer ,these codes are related to our mobile numbers which the operators store in their vast data base,it is based on these secret keys that enables the billing to be made to that customer.
>now what we do in sim cloning is extract these two secret codes from the sim and programme it into a new blank smart card often known as wafer, since the operator
>authentication on sims is based on these values,it enables us to fool the operators in thinking that its the
>original sim,this authentication is a big flaw concerning GSM technology
>SIM cards are the most important part of a cell phone that runs on a GSM network. They enable the phone to receive signal from a mobile phone company. Many people who have phones that accept SIM cards find it extremely easy to simply swap out their SIM card for a new SIM card when in a different country.
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆIF YOU WANT TO CLONE A SIM CARD YOU MUST KNOW THIS :
t.me/UndercOdeTestingOfficial
๐ฆ๐ ป๐ ด๐ ๐ ๐๐๐ ฐ๏ธ๐๐:
SIM CARD:
>Our sim cards contain two secret codes or keys called (imsi value and ki value) which enables the operator to know the mobile number and authenticate the customer ,these codes are related to our mobile numbers which the operators store in their vast data base,it is based on these secret keys that enables the billing to be made to that customer.
>now what we do in sim cloning is extract these two secret codes from the sim and programme it into a new blank smart card often known as wafer, since the operator
>authentication on sims is based on these values,it enables us to fool the operators in thinking that its the
>original sim,this authentication is a big flaw concerning GSM technology
>SIM cards are the most important part of a cell phone that runs on a GSM network. They enable the phone to receive signal from a mobile phone company. Many people who have phones that accept SIM cards find it extremely easy to simply swap out their SIM card for a new SIM card when in a different country.
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆNow which sim cards can be cloned:
t.me/iOsDeveloppers
> Sim cards are manufactured on the basis of 3 algorithms COMP128v1,COMP128v2 and COMP128v3
> now an important note currently only COMP128v1 version sim cards can be
cloned ,since this is the only algorithm which has been cracked by users, bear in mind that 70% of all the sim cards we use are COMP128v1 .
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆNow which sim cards can be cloned:
t.me/iOsDeveloppers
> Sim cards are manufactured on the basis of 3 algorithms COMP128v1,COMP128v2 and COMP128v3
> now an important note currently only COMP128v1 version sim cards can be
cloned ,since this is the only algorithm which has been cracked by users, bear in mind that 70% of all the sim cards we use are COMP128v1 .
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Telegram
iUNDERCODE IOS JAILBREAK SUPPORT & HELP
WELCOME TO iUNDERCODE BY UNDERCODE TESTING FOR IOS JAILBREAK & TWEAKS GROUP RULES @UNDERCODERULES
๐๐พ๐๐๐๐ฑ๐ ด
Youtube.com/c/Undercode
๐ ต๐ฐ๐ ฒ๐ ด๐ฑ๐พ๐พ๐ บ
@UndercOdeTesting
@iUNDERCODE
๐ ธ๐ ฝ๐๐๐ฐ๐ ถ๐๐ฐ๐ ผ
@UndercOdeTestinG
@iUNDERCODE
๐๐๐ ธ๐๐๐ ด๐
@iUNDERCODE
@UNDERCODENEWS
๐๐พ๐๐๐๐ฑ๐ ด
Youtube.com/c/Undercode
๐ ต๐ฐ๐ ฒ๐ ด๐ฑ๐พ๐พ๐ บ
@UndercOdeTesting
@iUNDERCODE
๐ ธ๐ ฝ๐๐๐ฐ๐ ถ๐๐ฐ๐ ผ
@UndercOdeTestinG
@iUNDERCODE
๐๐๐ ธ๐๐๐ ด๐
@iUNDERCODE
@UNDERCODENEWS
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHOW CLONE SIM CARD FULL TUTORIAL :
instagram.com/UndercOdeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) Buy a Sim card Reader
2) Need a Blank sim card or super sim card
3) Download
> https://ssl-download.cnet.com/MagicSIM/3000-2094_4-10601728.html
(if server error try below link)
or http://content.mobiledit.com/api/getproduct-expressforensic-win64
4) Download https://usb_sim_card_reader_software.en.downloadastro.com/download/
(or automate driver download via driverbooster app)
5) Install programs.
6) go in phone tools, select sim card, then select unlock sim, it will promt for a code.
7 ) call network provider, they will ask for your phone number, your account info, name and security code,
then they will ask why you want to unlock your simcard, just tell them you need to unlock your sim to get it
to work with your overseas phone or something.
8) Once they give you the sim unlock code, enter it, and it will say sim unlocked.
9) remove the sim from your phone, place it in the cardreader, click read from card in sim clone program.
10) once it says connected, select crack sim in the toolbar. click strong ki and clink all of the other find options and then click start.
11) Once your ki is found and the crack is finished, click file, save as and save your cracked sim info to a that file.
12) IMPORTANT!!! you must click disconnect from the file menu or you will ruin your simcard. once it says
disconnected, remove the sim. put it in your phone and see if it still works, it should. if not, you either did not unlock your sim, or you tried to copy it instead of crack and save.
13) insert black 3g card (must be installed the sim card driver first ) program.
14) click connect
15) it will say no info found if it is truly blank.
16) select write to sim, it will promt you to select a dat file, select the one you saved before, now click start, it will take about 10 minutes to write it, once it is complete, it will ask for a security code, enter the security code network provider gave you, then click finish.
17) your card is cloned. if you try to make 2 calls at the same time, one will go through, the other will say call failed, and both phones will get the same messages, text and voice, and both will recieve the same calls, but only one can talk at a time.
E N J O Y
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHOW CLONE SIM CARD FULL TUTORIAL :
instagram.com/UndercOdeTestingCompany
๐ฆ๐โ๐๐๐ธ๐๐๐๐๐ธ๐๐๐โ & โ๐โ:
1) Buy a Sim card Reader
2) Need a Blank sim card or super sim card
3) Download
> https://ssl-download.cnet.com/MagicSIM/3000-2094_4-10601728.html
(if server error try below link)
or http://content.mobiledit.com/api/getproduct-expressforensic-win64
4) Download https://usb_sim_card_reader_software.en.downloadastro.com/download/
(or automate driver download via driverbooster app)
5) Install programs.
6) go in phone tools, select sim card, then select unlock sim, it will promt for a code.
7 ) call network provider, they will ask for your phone number, your account info, name and security code,
then they will ask why you want to unlock your simcard, just tell them you need to unlock your sim to get it
to work with your overseas phone or something.
8) Once they give you the sim unlock code, enter it, and it will say sim unlocked.
9) remove the sim from your phone, place it in the cardreader, click read from card in sim clone program.
10) once it says connected, select crack sim in the toolbar. click strong ki and clink all of the other find options and then click start.
11) Once your ki is found and the crack is finished, click file, save as and save your cracked sim info to a that file.
12) IMPORTANT!!! you must click disconnect from the file menu or you will ruin your simcard. once it says
disconnected, remove the sim. put it in your phone and see if it still works, it should. if not, you either did not unlock your sim, or you tried to copy it instead of crack and save.
13) insert black 3g card (must be installed the sim card driver first ) program.
14) click connect
15) it will say no info found if it is truly blank.
16) select write to sim, it will promt you to select a dat file, select the one you saved before, now click start, it will take about 10 minutes to write it, once it is complete, it will ask for a security code, enter the security code network provider gave you, then click finish.
17) your card is cloned. if you try to make 2 calls at the same time, one will go through, the other will say call failed, and both phones will get the same messages, text and voice, and both will recieve the same calls, but only one can talk at a time.
E N J O Y
@Mฬตอ ฬ ฬrฬถฬ.ฬตฬ ฬทอ BฬดอOฬทฬTฬถฬNฬดฬEฬถอTฬถฬ (tm
โ โ โ ๏ฝ๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ