Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🌐 A Hilariously Honest Wedding Invite Takes the Internet by Storm
https://undercodenews.com/a-hilariously-honest-wedding-invite-takes-the-internet-by-storm/
@Undercode_News
https://undercodenews.com/a-hilariously-honest-wedding-invite-takes-the-internet-by-storm/
@Undercode_News
UNDERCODE NEWS
A Hilariously Honest Wedding Invite Takes the Internet by Storm - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚡️ Airtel Introduces New Prepaid Plan with Hotstar Mobile
https://undercodenews.com/airtel-introduces-new-prepaid-plan-with-hotstar-mobile/
@Undercode_News
https://undercodenews.com/airtel-introduces-new-prepaid-plan-with-hotstar-mobile/
@Undercode_News
UNDERCODE NEWS
Airtel Introduces New Prepaid Plan with Hotstar Mobile - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE TESTING
🦑Safe CC Checkers :
S O :
To Check you CC Validity use only These URLS !!!
1️⃣Stripe
https://stripe.com
A powerful payment processing platform with fraud prevention features.
2️⃣PayPal
https://www.paypal.com
A widely used and secure platform for online transactions.
3️⃣Square
https://squareup.com
Offers payment solutions and tools for small businesses.
4️⃣Kount
https://kount.com
Fraud prevention and digital identity trust solutions.
5️⃣Fraud.net
https://fraud.net
Provides AI-powered fraud detection for businesses.
6️⃣Riskified
https://www.riskified.com
Fraud prevention and chargeback protection for eCommerce.
@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Credit card checker (CC checker) sites are generally unsafe and pose serious risks, as they are commonly used for fraudulent purposes or involve illegal activities. Legitimate businesses and individuals should avoid such platforms to protect themselves legally and financially. Here's why these sites are risky:
Illegal Usage: Most CC checkers facilitate fraud by validating stolen credit card information.
Data Theft: Entering sensitive details on these platforms can lead to your personal data being stolen.
Malware Risks: Many such sites embed malware or phishing attempts.
Legal Issues: Accessing or using these sites can expose you to legal action.
S O :
To Check you CC Validity use only These URLS !!!
1️⃣Stripe
https://stripe.com
A powerful payment processing platform with fraud prevention features.
2️⃣PayPal
https://www.paypal.com
A widely used and secure platform for online transactions.
3️⃣Square
https://squareup.com
Offers payment solutions and tools for small businesses.
4️⃣Kount
https://kount.com
Fraud prevention and digital identity trust solutions.
5️⃣Fraud.net
https://fraud.net
Provides AI-powered fraud detection for businesses.
6️⃣Riskified
https://www.riskified.com
Fraud prevention and chargeback protection for eCommerce.
@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Stripe
Stripe | Financial Infrastructure to Grow Your Revenue
Stripe is a suite of APIs powering online payment processing and commerce solutions for internet businesses of all sizes. Accept payments and scale faster with AI.
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
#Samsung Unveils Exclusive Olympic Edition #Galaxy Z Flip 6
https://undercodenews.com/samsung-unveils-exclusive-olympic-edition-galaxy-z-flip-6/
@Undercode_News
https://undercodenews.com/samsung-unveils-exclusive-olympic-edition-galaxy-z-flip-6/
@Undercode_News
UNDERCODE NEWS
Samsung Unveils Exclusive Olympic Edition Galaxy Z Flip 6 - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚡️ GM and #LG Energy Solution Gear Up for Prismatic Battery Era in New Partnership
https://undercodenews.com/gm-and-lg-energy-solution-gear-up-for-prismatic-battery-era-in-new-partnership/
@Undercode_News
https://undercodenews.com/gm-and-lg-energy-solution-gear-up-for-prismatic-battery-era-in-new-partnership/
@Undercode_News
UNDERCODE NEWS
GM and LG Energy Solution Gear Up for Prismatic Battery Era in New Partnership - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
One UI 70 Beta: #Galaxy S23 Series Users Face Delays
https://undercodenews.com/one-ui-70-beta-galaxy-s23-series-users-face-delays/
@Undercode_News
https://undercodenews.com/one-ui-70-beta-galaxy-s23-series-users-face-delays/
@Undercode_News
UNDERCODE NEWS
One UI 70 Beta: Galaxy S23 Series Users Face Delays - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Exploiting Crew (Pr1vAt3)
🦑SSO (Single Sign-On) Explained.
SSO can be thought of as a master key to open all different locks. It allows a user to log in to different systems using a single set of credentials.
In a time where we are accessing more applications than ever before, this is a big help to mitigate password fatigue and streamlines user experience.
To fully understand the SSO process, 𝗹𝗲𝘁’𝘀 𝘁𝗮𝗸𝗲 𝗮 𝗹𝗼𝗼𝗸 𝗮𝘁 𝗵𝗼𝘄 𝗮 𝘂𝘀𝗲𝗿 𝘄𝗼𝘂𝗹𝗱 𝗹𝗼𝗴 𝗶𝗻𝘁𝗼 𝗟𝗶𝗻𝗸𝗲𝗱𝗜𝗻 𝘂𝘀𝗶𝗻𝗴 𝗚𝗼𝗼𝗴𝗹𝗲 𝗮𝘀 𝘁𝗵𝗲 𝗶𝗱𝗲𝗻𝘁𝗶𝘁𝘆 𝗽𝗿𝗼𝘃𝗶𝗱𝗲𝗿:
1️⃣ 𝗨𝘀𝗲𝗿 𝗿𝗲𝗾𝘂𝗲𝘀𝘁𝘀 𝗮𝗰𝗰𝗲𝘀𝘀
First, the user would attempt to access the Service Provider (LinkedIn). At this point, a user would be presented with login options, and in this example, they would select "Sign in with Google".
2️⃣ 𝗔𝘂𝘁𝗵𝗲𝗻𝘁𝗶𝗰𝗮𝘁𝗶𝗼𝗻 𝗿𝗲𝗾𝘂𝗲𝘀𝘁
From here, the Service Provider (LinkedIn) will redirect the user to the Identity Provider (Google) with an authentication request.
3️⃣ 𝗜𝗱𝗣 𝗰𝗵𝗲𝗰𝗸𝘀 𝗳𝗼𝗿 𝗮𝗰𝘁𝗶𝘃𝗲 𝘀𝗲𝘀𝘀𝗶𝗼𝗻
Once the Identity Provider (Google) has received the request, it will check for an active session. If it doesn't find one, authentication will be requested.
4️⃣𝗨𝘀𝗲𝗿 𝘀𝘂𝗯𝗺𝗶𝘁𝘀 𝗰𝗿𝗲𝗱𝗲𝗻𝘁𝗶𝗮𝗹𝘀
At this stage, the user will submit their login credentials (username and password) to the Identity Provider (IdP).
5️⃣ 𝗜𝗱𝗣 𝘃𝗲𝗿𝗶𝗳𝗶𝗲𝘀 𝗰𝗿𝗲𝗱𝗲𝗻𝘁𝗶𝗮𝗹𝘀
The Identity Provider will then verify the submitted credentials against its User Directory (database). If the credentials are correct, the IdP will create an authentication token or assertion.
6️⃣ 𝗜𝗱𝗣 𝘀𝗲𝗻𝗱𝘀 𝘁𝗼𝗸𝗲𝗻 𝘁𝗼 𝗦𝗲𝗿𝘃𝗶𝗰𝗲 𝗣𝗿𝗼𝘃𝗶𝗱𝗲𝗿
Once the token or assertion has been created, the IdP sends it back to the Service Provider confirming the user's identity. The user is now authenticated and can access the Service Provier (LinkedIn).
7️⃣ 𝗔𝗰𝗰𝗲𝘀𝘀 𝗴𝗿𝗮𝗻𝘁𝗲𝗱 𝘂𝘀𝗶𝗻𝗴 𝗲𝘅𝗶𝘀𝘁𝗶𝗻𝗴 𝘀𝗲𝘀𝘀𝗶𝗼𝗻
Since the Identity Provider has established a session, when the user goes to access a different Service Provider (eg; GitHub), they won't need to re-enter their credentials. Future service providers will request authentication from the Identity Provider, recognize the existing session, and grant access to the user based on the previously authenticated session.
SSO workflows like the above operate on SSO protocols, which are a set of rules that govern how the IdP and SP communicate and trust each other. Common protocols include Security Assertion Markup Language (SAML), OpenID Connect, and OAuth.
ref: Sayed Jillani
@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
SSO can be thought of as a master key to open all different locks. It allows a user to log in to different systems using a single set of credentials.
In a time where we are accessing more applications than ever before, this is a big help to mitigate password fatigue and streamlines user experience.
To fully understand the SSO process, 𝗹𝗲𝘁’𝘀 𝘁𝗮𝗸𝗲 𝗮 𝗹𝗼𝗼𝗸 𝗮𝘁 𝗵𝗼𝘄 𝗮 𝘂𝘀𝗲𝗿 𝘄𝗼𝘂𝗹𝗱 𝗹𝗼𝗴 𝗶𝗻𝘁𝗼 𝗟𝗶𝗻𝗸𝗲𝗱𝗜𝗻 𝘂𝘀𝗶𝗻𝗴 𝗚𝗼𝗼𝗴𝗹𝗲 𝗮𝘀 𝘁𝗵𝗲 𝗶𝗱𝗲𝗻𝘁𝗶𝘁𝘆 𝗽𝗿𝗼𝘃𝗶𝗱𝗲𝗿:
1️⃣ 𝗨𝘀𝗲𝗿 𝗿𝗲𝗾𝘂𝗲𝘀𝘁𝘀 𝗮𝗰𝗰𝗲𝘀𝘀
First, the user would attempt to access the Service Provider (LinkedIn). At this point, a user would be presented with login options, and in this example, they would select "Sign in with Google".
2️⃣ 𝗔𝘂𝘁𝗵𝗲𝗻𝘁𝗶𝗰𝗮𝘁𝗶𝗼𝗻 𝗿𝗲𝗾𝘂𝗲𝘀𝘁
From here, the Service Provider (LinkedIn) will redirect the user to the Identity Provider (Google) with an authentication request.
3️⃣ 𝗜𝗱𝗣 𝗰𝗵𝗲𝗰𝗸𝘀 𝗳𝗼𝗿 𝗮𝗰𝘁𝗶𝘃𝗲 𝘀𝗲𝘀𝘀𝗶𝗼𝗻
Once the Identity Provider (Google) has received the request, it will check for an active session. If it doesn't find one, authentication will be requested.
4️⃣𝗨𝘀𝗲𝗿 𝘀𝘂𝗯𝗺𝗶𝘁𝘀 𝗰𝗿𝗲𝗱𝗲𝗻𝘁𝗶𝗮𝗹𝘀
At this stage, the user will submit their login credentials (username and password) to the Identity Provider (IdP).
5️⃣ 𝗜𝗱𝗣 𝘃𝗲𝗿𝗶𝗳𝗶𝗲𝘀 𝗰𝗿𝗲𝗱𝗲𝗻𝘁𝗶𝗮𝗹𝘀
The Identity Provider will then verify the submitted credentials against its User Directory (database). If the credentials are correct, the IdP will create an authentication token or assertion.
6️⃣ 𝗜𝗱𝗣 𝘀𝗲𝗻𝗱𝘀 𝘁𝗼𝗸𝗲𝗻 𝘁𝗼 𝗦𝗲𝗿𝘃𝗶𝗰𝗲 𝗣𝗿𝗼𝘃𝗶𝗱𝗲𝗿
Once the token or assertion has been created, the IdP sends it back to the Service Provider confirming the user's identity. The user is now authenticated and can access the Service Provier (LinkedIn).
7️⃣ 𝗔𝗰𝗰𝗲𝘀𝘀 𝗴𝗿𝗮𝗻𝘁𝗲𝗱 𝘂𝘀𝗶𝗻𝗴 𝗲𝘅𝗶𝘀𝘁𝗶𝗻𝗴 𝘀𝗲𝘀𝘀𝗶𝗼𝗻
Since the Identity Provider has established a session, when the user goes to access a different Service Provider (eg; GitHub), they won't need to re-enter their credentials. Future service providers will request authentication from the Identity Provider, recognize the existing session, and grant access to the user based on the previously authenticated session.
SSO workflows like the above operate on SSO protocols, which are a set of rules that govern how the IdP and SP communicate and trust each other. Common protocols include Security Assertion Markup Language (SAML), OpenID Connect, and OAuth.
ref: Sayed Jillani
@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚡️ The #iPhone 16's USB-C Revolution: A New Connectivity
https://undercodenews.com/the-iphone-16s-usb-c-revolution-a-new-connectivity/
@Undercode_News
https://undercodenews.com/the-iphone-16s-usb-c-revolution-a-new-connectivity/
@Undercode_News
UNDERCODE NEWS
The iPhone 16's USB-C Revolution: A New Connectivity - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from DailyCVE
🟠 Synack Tarjet SQL Injection (Blind Time-Based) Medium
https://dailycve.com/sql-injection-blind-time-based-medium/
@Daily_CVE
https://dailycve.com/sql-injection-blind-time-based-medium/
@Daily_CVE
DailyCVE
SQL Injection (Blind Time-Based) Medium - DailyCVE
Vulnerability Type: SQLi Blind Time-Based Overview: During an engagement with a Synack target with a limited attack surface, a blind […]
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🛒 Salesforce Expands Reach: Unified South Asia Operating Unit
https://undercodenews.com/salesforce-expands-reach-unified-south-asia-operating-unit/
@Undercode_News
https://undercodenews.com/salesforce-expands-reach-unified-south-asia-operating-unit/
@Undercode_News
UNDERCODE NEWS
Salesforce Expands Reach: Unified South Asia Operating Unit - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
🦑Scammers Actually Conduct Phishing Calls
- Secure yourself
ref: instagram
@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
- Secure yourself
ref: instagram
@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
📱 #Apple's Mac Pro: A Chip Short of a Full Deck
https://undercodenews.com/apples-mac-pro-a-chip-short-of-a-full-deck/
@Undercode_News
https://undercodenews.com/apples-mac-pro-a-chip-short-of-a-full-deck/
@Undercode_News
UNDERCODE NEWS
Apple's Mac Pro: A Chip Short of a Full Deck - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🛡️ Microsegmentation Revolutionized: Secure Workload 310
https://undercodenews.com/microsegmentation-revolutionized-secure-workload-310/
@Undercode_News
https://undercodenews.com/microsegmentation-revolutionized-secure-workload-310/
@Undercode_News
UNDERCODE NEWS
Microsegmentation Revolutionized: Secure Workload 310 - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
⚠️ Level Up Your Security Game: Leverage #Copilot Chat for #GitHub Advanced Security Alerts
https://undercodenews.com/level-up-your-security-game-leverage-copilot-chat-for-github-advanced-security-alerts/
@Undercode_News
https://undercodenews.com/level-up-your-security-game-leverage-copilot-chat-for-github-advanced-security-alerts/
@Undercode_News
UNDERCODE NEWS
Level Up Your Security Game: Leverage Copilot Chat for GitHub Advanced Security Alerts - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information and…
Forwarded from Exploiting Crew (Pr1vAt3)
🦑Python Remote Administration Tool (RAT)
☠️This feature list outlines a Python-based Remote Administration Tool (RAT) with extensive functionality across Windows, macOS, and Linux. Here's a detailed breakdown of the core features and their implications:
>> Cross-Platform Support
- Core Utilities
- Command and file auto-completion: Enhances usability, streamlining interactions.
- Antivirus detection: Useful for evasion tactics or reconnaissance.
- Display monitor control: Provides surveillance or energy management options.
- File/Directory manipulation: Hiding or unhiding files adds stealth capabilities.
- Hosts file modification: Potential for blocking or redirecting network traffic.
- Environment variables access: Useful for reconnaissance and configuration.
- Keylogger: Logs keystrokes with options to manage logs.
- Target machine info: Location and system details provide situational awareness.
- Python script execution: Flexibility for custom tasks.
- Screenshots: Remote visual access to the system's desktop.
- VM detection: Helps evade analysis environments.
- File transfer: Enables exfiltration or delivery of additional payloads.
- Password hash dumping: Attempts to extract sensitive authentication details.
- Payload disguise: Adds stealth by masquerading as legitimate applications.
>> Windows-Specific Features
- Credential Harvesting
- User/password dialog: Captures user input for credentials.
- Chrome password dumping: Extracts stored browser passwords.
- System Control
- Log clearing: Obscures tracks by erasing event logs.
- Service control: Manipulates RDP, UAC, and Windows Defender.
- File timestamp editing: Alters evidence of file access or modification.
- Custom popups: Creates distractions or elicits user input.
- Hardware Interaction
- Webcam snapshots: Spies on users via their webcam.
- Drive info: Provides details about connected drives.
- Registry summary: Fetches system configuration details.
>> macOS-Specific Features
- Credential Harvesting
- Similar password dialog as Windows.
- System Customization
- Changes login text, potentially confusing or misleading users.
- Webcam snapshots: Monitors users like the Windows version.
>> macOS/Linux Features
- SSH pivoting: Leverages the target system to access other hosts.
- Sudo command execution: Elevates privilege level for administrative tasks.
- Bruteforce user password: Exploits weak password practices.
- Webcam snapshots: Unverified functionality on Linux.
>> Transport and Encryption
- AES encryption secures host-target communication, with keys shared manually between systems for authentication.
>> Payload Installation
- NSIS installers (Windows): Packages payloads with elevation utilities.
- Makeself installers (macOS/Linux): Simplifies deployment and persistence.
>> Setup and Dependencies
- The project uses Python 2.7, various libraries like PyCrypto, Requests, and platform-specific tools like PyInstaller, PyObjC, and py2exe.
🦑 Here are the commands for setting up and running Stitch from the specified GitHub repository:
>> Installation Commands
1. For Windows:
2. For macOS:
3. For Linux:
>> Execution Commands
1. Run using Python:
2. Run as an executable (if permissions are set):
🦑Be Ethical, Use it for learning purposes !!!
@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
☠️This feature list outlines a Python-based Remote Administration Tool (RAT) with extensive functionality across Windows, macOS, and Linux. Here's a detailed breakdown of the core features and their implications:
>> Cross-Platform Support
- Core Utilities
- Command and file auto-completion: Enhances usability, streamlining interactions.
- Antivirus detection: Useful for evasion tactics or reconnaissance.
- Display monitor control: Provides surveillance or energy management options.
- File/Directory manipulation: Hiding or unhiding files adds stealth capabilities.
- Hosts file modification: Potential for blocking or redirecting network traffic.
- Environment variables access: Useful for reconnaissance and configuration.
- Keylogger: Logs keystrokes with options to manage logs.
- Target machine info: Location and system details provide situational awareness.
- Python script execution: Flexibility for custom tasks.
- Screenshots: Remote visual access to the system's desktop.
- VM detection: Helps evade analysis environments.
- File transfer: Enables exfiltration or delivery of additional payloads.
- Password hash dumping: Attempts to extract sensitive authentication details.
- Payload disguise: Adds stealth by masquerading as legitimate applications.
>> Windows-Specific Features
- Credential Harvesting
- User/password dialog: Captures user input for credentials.
- Chrome password dumping: Extracts stored browser passwords.
- System Control
- Log clearing: Obscures tracks by erasing event logs.
- Service control: Manipulates RDP, UAC, and Windows Defender.
- File timestamp editing: Alters evidence of file access or modification.
- Custom popups: Creates distractions or elicits user input.
- Hardware Interaction
- Webcam snapshots: Spies on users via their webcam.
- Drive info: Provides details about connected drives.
- Registry summary: Fetches system configuration details.
>> macOS-Specific Features
- Credential Harvesting
- Similar password dialog as Windows.
- System Customization
- Changes login text, potentially confusing or misleading users.
- Webcam snapshots: Monitors users like the Windows version.
>> macOS/Linux Features
- SSH pivoting: Leverages the target system to access other hosts.
- Sudo command execution: Elevates privilege level for administrative tasks.
- Bruteforce user password: Exploits weak password practices.
- Webcam snapshots: Unverified functionality on Linux.
>> Transport and Encryption
- AES encryption secures host-target communication, with keys shared manually between systems for authentication.
>> Payload Installation
- NSIS installers (Windows): Packages payloads with elevation utilities.
- Makeself installers (macOS/Linux): Simplifies deployment and persistence.
>> Setup and Dependencies
- The project uses Python 2.7, various libraries like PyCrypto, Requests, and platform-specific tools like PyInstaller, PyObjC, and py2exe.
🦑 Here are the commands for setting up and running Stitch from the specified GitHub repository:
>> Installation Commands
1. For Windows:
pip install -r win_requirements.txt
2. For macOS:
pip install -r osx_requirements.txt
3. For Linux:
pip install -r lnx_requirements.txt
>> Execution Commands
1. Run using Python:
python main.py
2. Run as an executable (if permissions are set):
./main.py
🦑Be Ethical, Use it for learning purposes !!!
@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁