UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.5K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘some Hack-News by UndercOde from our tweets : MIT: Blockchain voting system Voatz is vulnerable and vulnerable
16-2-2020
Twitter.com/UndercOdeTC

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

> A recent study by the MIT team of engineers found a series of shocking vulnerabilities in a blockchain voting system called Voatz. After reverse engineering Voatz's Android app, researchers concluded that by invading voters' phones, attackers could observe, suppress and change votes almost at will. The paper states that a cyber attack could also reveal where a given user is voting and may suppress voting in the process.

>The researchers said that the most disturbing thing is that an attacker who broke the server that manages the Voatz API can even change the ballot when the vote comes, which should theoretically prevent the threat of distributed ledger.

>The researchers concluded: "Given the gravity of the failure discussed in this article, the lack of transparency, the risks of voter privacy, and the trivial nature of the attack, we recommend that any recent plans to use this application for high-risk elections be abandoned."

>Voatz's blockchain-based voting project is designed to replace absentee ballots, and security researchers are skeptical, but many in the tech community have expressed strong interest and it has received more than $ 9 million in venture capital. Under Voatz, users will vote remotely through the app and verify their identity through the phone's facial recognition system.

>Voatz has been used in some minor elections in the United States, collecting more than 150 votes early West Virginia elections.

> Voatz challenged MIT's findings in a blog post, saying the research methodology was "wrong." The company's main complaint is that researchers are testing outdated versions of the Voatz client software and have not tried to connect to the Voatz server itself.

> "This flawed approach invalidates any claims about its ability to disrupt the entire system," the blog post wrote.Voatz also highlighted measures that allow voters and election officials to verify ballots after the fact. "Each ballot filed with Voatz will generate a paper ballot, and every voter who uses Voatz will receive a ballot," said Hilary Braseth, the company's product owner.

Written by UndercOde
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Google removes more than 500 malicious extensions few days ago
instagram.com/UndercOdeTestingCompany

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) After more than two months of in-depth investigation by Cisco Duo Security team and security researcher Jamila Kaya, Google recently announced the removal of more than 500 malicious Chrome extensions from the official online store. These extensions are known to inject malicious advertisements into user browsing sessions.

2) The malicious code injected by these extensions activates under certain conditions and redirects users to specific pages. In some cases, the redirect address may be a member link on a legitimate website such as Macys, DELL, or BestBuy; in other cases, it may be a malicious site, such as a download site for malware or a phishing page.

4) According to a report shared by the Duo Security team and Jamila Kaya, these malicious extensions have been online for at least two years. These malicious extensions were originally discovered by Kaya, who discovered them during a routine threat scan to access malicious websites through a universal URL pattern.

5) Using CRXcavator (a service for analyzing Chrome extensions), Kaya discovered the original cluster of extensions, which ran on almost the same code base, but used a variety of common names, and few related to their true use information.

6) Kaya said that we then returned the findings to Google. Later, Google found more extensions that met this pattern after self-examination, and then deleted more than 500 extensions. It is unclear how many users have more than 500 malicious extensions installed, but the number may exceed millions.

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ CVE-2020-7053 LINUX DEBIAN TRACKER- AGAINST KALI-PARROT-(DEBIAN FORKS)
pinterest.com/UndercOdeOfficial

πŸ¦‘ DESCRIPTION :

1) In the Linux kernel 4.14 longterm through 4.14.165 and 4.19 longterm through 4.19.96 (and 5.x before 5.2), there is a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c, aka CID-7dc40713618c.

> This is related to i915_gem_context_destroy_ioctl in drivers/gpu/drm/i915/i915_gem_context.c.

2)
Release Version Status
linux (PTS) jessie 3.16.56-1+deb8u1 fixed
jessie (security) 3.16.81-1 fixed
stretch 4.9.210-1 fixed
stretch (security) 4.9.189-3+deb9u2 fixed
buster 4.19.98-1 vulnerable
buster (security) 4.19.67-2+deb10u2 vulnerable
bullseye 5.4.13-1 fixed
sid 5.4.19-1 fixed


3) [stretch] - linux <not-affected> (Vulnerable code introduced later)
[jessie] - linux <not-affected> (Vulnerable code introduced later)


4) MORE DETAILS :

Base Score 7.8 5.3
Vector CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Access Vector Local Local
Access Complexity Low Low
Privileges Required Low Low
User Interaction None None
Scope Unchanged Unchanged
Confidentiality Impact High Low
Integrity Impact High Low
Availability Impact High Low
CVSSv3 Version 3.1 3.1


Powered by Wiki
WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
We recently Posted Carding Tutorial 2020 from deep web to UndercOde wa Grps, will forward Then to here later
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Carding Tutorial: How to Buy Any Product Online for Free : FOR PROTECTING YOUR SITE- PRODUCT NOT USE FOR HACK :
t.me/UndercOdeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Welcome dear visitors, I hope you are all right, today I posted a post about Carding, with this tip, you can buy any product online for free. Here today, I posted a complete combing tutorial method. What is grooming?

2) Carding is a term describing online trafficking of credit cards, bank accounts and other personal information, and related fraud services. The term "comb" is often associated with credit card fraud. At this point every shopping site or other purchase on the site using a credit card will attract hackers' attention, they notice this and start using it for profit.

3) Grooming is completely fraudulent and illegal in Australia and other countries. But most cases in chinia and the US are for online shopping.

4) Grooming is insecure and a complete scam for all users. There are many tricks and secrets to sorting out, which makes every country illegal and fraudulent.

5) Primarily, Carders used fake credit cards for online shopping or used credit cards for cracking. Today I will share all the secret and hidden tips of Carding.

6) I think you have to see some recently posts in the UndercOde facebook or whatsapp groups, according to them learn free carding.

7) Carding exactly is example :

>One person cracks someone's credit card and their details and buys a small amount of product online and tries to deliver it in a fake place. This is Cardel. But 99% of cadres are fake and will deceive you with your money. So don't try to contact any truck. Grooming or not grooming is a type of cybercrime.

8) Carding is used to obtain online products through fake payment methods. Carders uses information and data from others. This is a big deal for anyone and their money. If someone finds it in this case, there are hard rules for punishing them. Cyber ​​police departments handle these cases and they are not affected by anything from any government in any country.

πŸ¦‘ First, Before Starts Require :

1) computer
(windows 7 recommended not 10)

2) MacBook

2) laptop

3) Android phone

4) (One of them.) VPN: But Trusted providers :
A virtual private network VPN is a network built using a public line (usually the Internet) to connect to a private network, such as a company's internal network. There are many systems that allow you to create a network using the Internet as a medium for transmitting data. VPNs use encryption and other security mechanisms to protect private networks to ensure that only authorized users can access the network, and data cannot access the network.


5) Remote Desktop Protocol RDP is a proprietary protocol developed by Microsoft that provides users with a graphical interface to connect to another computer through a network connection. The user uses the RDP client software for this purpose, and another computer must run the RDP server software. Most versions of Microsoft Windows (including Windows Mobile Linux, Unix OS X iOS Android, and other operating systems) exist client RDP servers built into the Windows operating system; there are also RDP servers for Unix and OS X. By default, the server listens on TCP port 3389 and UDP port 3389. Microsoft currently refers to its official RDP client software as Remote Desktop Connection (formerly known as "Terminal Services Client"). This protocol is an extension of the ITU-T T.128 application sharing protocol.

6) Socks 5 SOCKet Secure (SOCKS) is an Internet protocol that routes network packets between clients and servers through a proxy server. SOCKS5 also provides authentication, so only authorized users can access the server. In fact, the SOCKS server proxies TCP connections to arbitrary IP addresses and provides methods for forwarding UDP packets.

7) Don t Forget to run MacOS in Virtual box Not VMWARE

8) Crdit card combing
9) You need a reliable credit card. You need to buy a Bitcoin-based credit card. Buy any credit card from any website and you will get all your credit card information.

Example :

Tamar

Middle Name Jamsin

Last name Mozes

Billing address 9006 peppertree circle

Wichita

State KS

Zip Code 67226

Country america

Phone3166342050

Card type credit card

Credit card number 5102 4129 0001 1332

import and export. Date 6 / June 2020

Name card Tamar Mozes

Cvv2 474

Social Security Number 515 16 4160

Birthday 18

Birth Month 02

Born in 1999

Account Information example ID tmrmzes@exmaplecom

Password: ProtectionTest1ByUTC


WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Crading Part 2 :

On Android :

1) First download Zenmate apk to your Android phone to hide your IP address.

2) After downloading Shadowsocks Apk use Socks on Android.

3) Now connect Zenmate & Shadowsocks to the same address on your credit card. Must be the same as the victim's address: COUNTRY, STATE, CITY

4) When all is done, create a Gmail with the same name as the credit card holder, but don't confirm with your phone number. Fill in the same address, the same city, and everything. Or better if you have email access.

5) Now go to the website store where you want the card. Search for your product.

6) Adding your products to the card is now logged out of your Amazon account. Log in to your Amazon account again after 2-4 hours. Don't click on process checkout now.

7) Create an account on Amazon with your credit card username now! Then fill in the credit card details.

8) Fill in all checkout information after

9) Then add the shipping address (the location of your order).

10) Now click on the order and I'm sure 100% of them will confirm your order via email or you will track your order on the website after you press the order.

11) (Please note that some websites require phone verification, but you can always buy a phone number on the internet or in real life, confirm your order, and destroy it after delivery)

12) Confirm your order now and wait for the order to reach your shipping address. When they call you, then say the different address you want to pick up the order ..

13) Those are the ones you have already done. Enjoy your grooming products now. Try it for myself I am not responsible for any kind of harm. As I mentioned above, this is illegal in India because they use a VPN to hide location and identity, so there is no risk of carders. Only you will be caught by your shipping address. If anything happens, only you are responsible in the police case.


WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ DEEP WEB CARDING TUTORIAL
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Access to bank account
> This is not an option for you, so you need to use a fake bank information real bank account information, make the transfer.
twitter.com/UndercOdeTC

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

This is a very simple way to inside and out of the United States to get the detailed information of the bank. Let us suppose that you are in the United States, but if you are in the United States, you should pass the first step.

1) Log on to www.myus.com to buy a virtual address of the United States, although you are not the body, in the United States, it will be your residential address in the United States. Sent to the address of any project or product in your country will be transferred back to your real address. Note: you need to this address, so that you connected to the ATM card of bank account.

2) After you have paid for the address, found hackers and buy good fullz, fullz detailed information including card, SSN, DOB. After you bought, login to www.accountnow.com and use the SSN you bought details to open an account, nuclear submarines will be as a way to check the accountnow.com account, it will make them sent a bank account to you in any bank in the United States. Accountnow.com after your validation, connect to them to give you mail address in the United States, the detailed information of the bank ATM card, this means that you must use you bought at myus.com. They will card sent to your address of myus.com will now after 4 working days to ship its real address in your country. You now have a bank account, your debit card is ready.

3) VPN and socks
You can go to www.hidemyass.com to get a good VPN support for all countries. In order to obtain socks 5, 5, and you can just Google socks link will appear you buy and download.
Get the new credit card and debit card details
It is the key to the transfer, the most important part, in order to obtain good credit card details, please check our credit card store www.cardsmarket.su. It's more than 1 million credit card details of the empire, and you can get as low as $5.

4) Set up your merchant account
Note: the merchant account will allow you to buy your event, transferred to your bank account card charge. Since you don't have an online store, you do not sell anything, you will have to site by raising funds, using their own merchant account. Now log on to www.gofundme.com, set up an account with them, and they set up a campaign, if you don't know how to set up sports, go to www.indiegogo.com and copy any activity you choose. Now, your campaign Settings and is ready to receive the funds.

5) To generate and transfer money
Now, you can do this. This step shows how to generate $$. Log on to www.cardsmarket.su to buy any card that you choose to buy your card, please pay attention to the national credit CARDS, city and address. Your VPN connection to the card, after that use your socks 5 card to connect to the city. Let us suppose that you bought the card and the city of rochester in New York, all you need to do is your VPN connection to New York in the United States, then in your socks 5 connection to New York, rochester. Once connected, it will appear on the credit card company, is the true master of the card. Now go to your activity page, click on the donation, it will take you to a secure payment page, enter credit card information and submit. The card will be charged and the money will go directly to your account on gofundme.com.

WRITTEN BY UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ ALL WORKING DEEP WEBSITES :
instagram.com/UndercOdeTestingCompany

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

To browse .onion Deep Web links, install Tor Browser from http://torproject.org/
Hidden Service lists and search engines
http://3g2upl4pq6kufc4m.onion/ – DuckDuckGo Search Engine
http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page – Uncensored Hidden Wiki
http://idnxcnkne4qt76tg.onion/ – Tor Project: Anonymity Online
http://torlinkbgs6aabns.onion/ – TorLinks
http://jh32yv5zgayyyts3.onion/ – Hidden Wiki .Onion Urls
http://wikitjerrta4qgz4.onion/ – Hidden Wiki – Tor Wiki
http://xdagknwjc7aaytzh.onion/ – Anonet Webproxy
http://2vlqpcqpjlhmd5r2.onion/ – Gateway to Freenet
http://nlmymchrmnlmbnii.onion/ – Is It Up?
http://wiki5kauuihowqi5.onion/ – Onion Wiki – 650+ working 05.2017 deep web links
http://j6im4v42ur6dpic3.onion/ – TorProject Archive
http://p3igkncehackjtib.onion/ – TorProject Media
http://kbhpodhnfxl3clb4.onion – Tor Search
http://cipollatnumrrahd.onion/ – Cipolla 2.0 (Italian)
Marketplace Financial
http://torbrokerge7zxgq.onion/ – TorBroker – Trade securities anonymously with bitcoin, currently supports nearly 1000 stocks and ETFs
http://fogcore5n3ov3tui.onion/ – Bitcoin Fog – Bitcoin Laundry
http://2vx63nyktk4kxbxb.onion/ – AUTOMATED PAYPAL AND CREDIT CARD STORE
http://samsgdtwz6hvjyu4.onion – Safe, Anonymous, Fast, Easy escrow service.
http://easycoinsayj7p5l.onion/ – EasyCoin – Bitcoin Wallet with free Bitcoin Mixer
http://jzn5w5pac26sqef4.onion/ – WeBuyBitcoins – Sell your Bitcoins for Cash (USD), ACH, WU/MG, LR, PayPal and more
http://ow24et3tetp6tvmk.onion/ – OnionWallet – Anonymous Bitcoin Wallet and Bitcoin Laundry
http://qc7ilonwpv77qibm.onion/ – Western Union Exploit
http://3dbr5t4pygahedms.onion/ – ccPal Store
http://y3fpieiezy2sin4a.onion/ – HQER – High Quality Euro Replicas
http://qkj4drtgvpm7eecl.onion/ – Counterfeit USD
http://nr6juudpp4as4gjg.onion/pptobtc.html – PayPal to BitCoins
http://nr6juudpp4as4gjg.onion/doublecoins.html – Double Your BitCoins
http://lw4ipk5choakk5ze.onion/raw/4588/ – High Quality Tutorials
Marketplace Commercial Services
http://6w6vcynl6dumn67c.onion/ – Tor Market Board – Anonymous Marketplace Forums
http://wvk32thojln4gpp4.onion/ – Project Evil
http://5mvm7cg6bgklfjtp.onion/ – Discounted electronics goods
http://lw4ipk5choakk5ze.onion/raw/evbLewgkDSVkifzv8zAo/ – Unfriendlysolution – Legit hitman service
http://nr6juudpp4as4gjg.onion/torgirls.html – Tor Girls
http://tuu66yxvrnn3of7l.onion/ – UK Guns and Ammo
http://nr6juudpp4as4gjg.onion/torguns.htm – Used Tor Guns
http://ucx7bkbi2dtia36r.onion/ – Amazon Business
http://nr6juudpp4as4gjg.onion/tor.html – Tor Technology
http://hbetshipq5yhhrsd.onion/ – Hidden BetCoin
http://cstoreav7i44h2lr.onion/ – CStore Carded Store
http://tfwdi3izigxllure.onion/ – Apples 4 Bitcoin
http://e2qizoerj4d6ldif.onion/ – Carded Store
http://jvrnuue4bvbftiby.onion/ – Data-Bay
http://bgkitnugq5ef2cpi.onion/ – Hackintosh
http://vlp4uw5ui22ljlg7.onion/ – EuroArms
http://b4vqxw2j36wf2bqa.onion/ – Advantage Products
http://ybp4oezfhk24hxmb.onion/ – Hitman Network
http://mts7hqqqeogujc5e.onion/ – Marianic Technology Services
http://mobil7rab6nuf7vx.onion/ – Mobile Store
http://54flq67kqr5wvjqf.onion/ – MSR Shop
http://yth5q7zdmqlycbcz.onion/ – Old Man Fixer’s Fixing Services
http://matrixtxri745dfw.onion/neo/uploads/MATRIXtxri745dfwONION_130827231336IPA_pc.png – PC Shop
http://storegsq3o5mfxiz.onion/ – Samsung StorE
http://sheep5u64fi457aw.onion/ – Sheep Marketplace
http://nr6juudpp4as4gjg.onion/betcoin.htm – Tor BetCoin
http://qizriixqwmeq4p5b.onion/ – Tor Web Developer
http://vfqnd6mieccqyiit.onion/ – UK Passports
http://en35tuzqmn4lofbk.onion/ – US Fake ID Store
http://xfnwyig7olypdq5r.onion/ – USA Citizenship
http://uybu3melulmoljnd.onion/ – iLike Help Guy
http://dbmv53j45pcv534x.onion/ – Network Consulting and Software Development
http://lw4ipk5choakk5ze.onion/raw/4585/ – Quick Solution (Hitman)
http://nr6juudpp4as4gjg.onion/tynermsr.htm – Tyner MSR Store
Marketplace Drugs
http://rso4hutlefirefqp.onion/ – EuCanna – Medical Grade Cannabis Buds, Rick Simpson Oil, Ointments and Creams
http://newpdsuslmzqazvr.onion/ – Peoples Drug Store – The Darkweb’s Best Online Drug Supplier!
http://smoker32pk4qt3mx.onion/ – Smokeables – Finest Organic Cannabis shipped from the USA
http://fzqnrlcvhkgbdwx5.onion/ – CannabisUK – UK Wholesale Cannabis Supplier
http://kbvbh4kdddiha2ht.onion/ – DeDope – German Weed and Hash shop. (Bitcoin)
http://s5q54hfww56ov2xc.onion/ – BitPharma – EU vendor for cocaine, speed, mdma, psychedelics and subscriptions
http://ll6lardicrvrljvq.onion/ – Brainmagic – Best psychedelics on the darknet
http://25ffhnaechrbzwf3.onion/ – NLGrowers – Coffee Shop grade Cannabis from the netherlands
http://fec33nz6mhzd54zj.onion/index.php – Black Market Reloaded Forums
http://atlmlxbk2mbupwgr.onion/ – Atlantis Marketplace Forums
http://atlantisrky4es5q.onion/ – Atlantis Marketplace
http://dkn255hz262ypmii.onion/ – Silk Road Forums
http://4yjes6zfucnh7vcj.onion/ – Drug Market
http://k4btcoezc5tlxyaf.onion/ – Kamagra for BitCoins
http://silkroadvb5piz3r.onion/silkroad/home – Silk Road Marketplace
http://5onwnspjvuk7cwvk.onion/ – Black Market Reloaded
Hosting
http://matrixtxri745dfw.onion/ – Image Uploader
http://lw4ipk5choakk5ze.onion/ – PasteThis – Tor based Pastebin
http://wzrtr6gpencksu3d.onion:8080/ – Gittor
http://nr6juudpp4as4gjg.onion/ – Free hosting
http://tklxxs3rdzdjppnl.onion/ – Liberty’s Hackers Hosting Service
http://matrixtxri745dfw.onion/ – Matrix Trilogy
Blogs
http://74ypjqjwf6oejmax.onion/ – Beneath VT – Exploring Virginia Tech’s Steam Tunnels and Beyond
http://76qugh5bey5gum7l.onion/ – Deep Web Radio
http://edramalpl7oq5npk.onion/Main_Page – Encyclopedia Dramatica
http://ih4pgsz3aepacbwl.onion/ – Hushbox
http://ad52wtwp2goynr3a.onion/# – Dark Like My Soul
http://tns7i5gucaaussz4.onion/ – FreeFor
http://gdkez5whqhpthb4d.onion/ – Scientology Archive
http://newsiiwanaduqpre.onion/ – All the latest news for tor
http://5vppavyzjkfs45r4.onion/ – Michael Blizek
http://7ueo7ahq2xlpwx7q.onion/ – AYPSELA News
http://7hk64iz2vn2ewi7h.onion/ – Blog about Stories
http://tigas3l7uusztiqu.onion/ – Mike Tigas
http://mpf3i4k43xc2usxj.onion/ – Sam Whited
http://7w2rtz7rgfwj5zuv.onion/ – An Open Letter to Revolutionaries
http://3c3bdbvhb7j6yab2.onion/ – Totse 2
http://4fvfamdpoulu2nms.onion/ – Lucky Eddie’s Home
http://nwycvryrozllb42g.onion/searchlores/index.htm – Fravia’s Web Searching Lore
http://newsiiwanaduqpre.onion/ – OnionNews – Blog about the onionland
Forums and Chans
http://2gxxzwnj52jutais.onion/phpbb/index.php – Onion Forum 2.0 renewed
http://3fyb44wdhnd2ghhl.onion/ib/ – Onii-Chan
http://bx7zrcsebkma7ids.onion – Jisko
http://npdaaf3s3f2xrmlo.onion/ – Twitter clone
http://jv7aqstbyhd5hqki.onion – HackBB – Hacking & cracking forum
http://xdagknwjc7aaytzh.onion/20/http/1.4.7.9/forummain.htm – Read only access to the Freenet FMS forums via the Anonet Webproxy
http://sbforumaz7v3v6my.onion/ – SciBay Forums
http://kpmp444tubeirwan.onion/ – DeepWeb
http://r5c2ch4h5rogigqi.onion/ – StaTorsNet
http://hbjw7wjeoltskhol.onion – The BEST tor social network! File sharing, messaging and much more. Use a fake email to register.
http://t4is3dhdc2jd4yhw.onion/ – OnionForum 3.0 – New Onionforum for general talk, now with marketplace
http://zw3crggtadila2sg.onion/imageboard/ – TorChan – One of the oldest chans on Tor
Email and Messaging
http://bitmailendavkbec.onion – swiss email
http://365u4txyqfy72nul.onion/ – Anonymous E-mail sevice. You can only communicate with other users currently using this service. So tell all your friends about it!
http://sms4tor3vcr2geip.onion/ – SMS4TOR – Self destructing messages
http://notestjxctkwbk6z.onion/ – NoteBin – Create encrypted self-destructing notes
http://torbox3uiot6wchz.onion/ – [TorBox] The Tor Mail Box
http://u6lyst27lmelm6oy.onion/index.php – Blue matrix chat NOT UP ALL THE TIME so chek often to see when it is
http://wi7qkxyrdpu5cmvr.onion/ – Autistici/Inventati
http://u4uoz3aphqbdc754.onion/ – Hell Online
Political
http://6sgjmi53igmg7fm7.onion/index.php?title=Main_Page – Bugged Planet
http://faerieuaahqvzgby.onion/ – Fairie Underground
http://2r2tz6wzqh7gaji7.onion/ – Kavkaz Center
http://tnysbtbxsf356hiy.onion/ – The New Yorker Strongbox
http://duskgytldkxiuqc6.onion/ – Example rendezvous points page
http://rrcc5uuudhh4oz3c.onion/ – The Intel Exchange Forum :: Information and discussion on various topics, ranging from Illegal Activities and Alternative Energy, to Conspiracy Theories and Hacking. Same people from SnapBBS on a fully secure, moderated and categorized forum.
http://opnju4nyz7wbypme.onion/weblog/index.html – A7B blog :: a blog dedicated to the restoration of a limited constitutional republic in the USA
http://assmkedzgorodn7o.onion/ – Anonymous, safe, secure, crowdfunded assassinations.
http://duskgytldkxiuqc6.onion/comsense.html – Commo Sense by Thomas Paine
http://nwycvryrozllb42g.onion/ – Destination Unknown
http://zbnnr7qzaxlk5tms.onion/ – Wiki Leaks
Hacking
http://salted7fpnlaguiq.onion/ – SALT
http://yj5rbziqttulgidy.onion/ – Itanimulli
http://bbxdfsru7lmmbj32.onion/marketplace/ – Delta Initiative
http://2ogmrlfzdthnwkez.onion/ – Rent-A-Hacker
Warez
http://2gxxzwnj52jutais.onion/ – The Nowhere Server (restored from backup after FH)
http://jntlesnev5o7zysa.onion/ – The Pirate Bay – Torrents
http://am4wuhz3zifexz5u.onion/ – Tor Library – library of books and other media files
http://uj3wazyk5u4hnvtk.onion/ – The Pirate Bay – Torrents (official .onion)
http://doxbindtelxceher.onion/ – DOXBIN
http://wuvdsbmbwyjzsgei.onion/ – Music Downloads
http://lolicore75rq3tm5.onion/ – Lolicore and Speedcore Music
http://xfmro77i3lixucja.onion/ – ebooks
http://vt27twhtksyvjrky.onion/ – lol 20th Century Western Music Recordings and Scores
http://2ygbaoezjdmacnro.onion/ – Pony at Noisebridge
http://xfmro77i3lixucja.onion/ – Imperial Library of Trantor
http://c3jemx2ube5v5zpg.onion/ – Jotunbane’s Reading Club
Drugs Non-commercial
No links found.

Erotic 18+
http://tklxxs3rdzdjppnl.onion/sharepass/ – SharePass – Password sharing community
http://k4jmdeccpnsfe43c.onion/ – Girls Released – Some nice model pics
http://54dgeda4ik6iypui.onion/ – Gallery – Met-Art, FTVX etc sets
http://pinkmethuylnenlz.onion/ – The Pink Meth (mirror)
http://2fqgjzbb2h7yevom.onion/klixen/ – Klixen
http://orsxvca7glswueo7.onion/ – EroDir – Lots and lots of Hentai
http://mmgh3rqeswrlgzdr.onion/ – VOR-COM
Erotic Hard Candy
Hard candy links no longer working and removed.

Erotic Jailbait


Non-English
http://germanyhusicaysx.onion – Deutschland im Deep Web – German forum
http://ffi5v46ttwgx3fby.onion/ – Das ist Deutschland hier 2.0 – German Board
http://paisleli66axejos.onion/ – PAIS
http://hyjmkmb3lfymiprp.onion/hen/papieze/ – DzieciΔ™ca pedofilia
http://runionv62ul3roit.onion/ – Russian Onion Union
http://s6cco2jylmxqcdeh.onion/ – ?ltimos bumps
http://5xki35vc4g5ts6gc.onion – GTF Greek Tor Forum . For greek speaking users
http://cipollatnumrrahd.onion/index.php – Cipolla 2.0 – Italian Community
http://runionv62ul3roit.onion – Russian community: market and anonymous talks about security, guns etc.
http://ptrackcp2noqu5fh.onion/ – PoliceTrack – Ne vous faites plus suivre par la police.
http://amberoadychffmyw.onion – Amberoad – russian anonymous market
http://r2d2akbw3jpt4zbf.onion – R2D2 – russian anonymous market
http://ramp2bombkadwvgz.onion – RAMP – biggest russian market (drugs only)
http://szmyt4v4vjbnxpg3.onion/ – Блавянский
http://o2tu5zjxjlibrary.onion/ – Bibliotheca Alexandrina
http://xzzpowtjlobho6kd.onion/wordpress/ – DeepBlog
http://zqiirytam276uogb.onion/ – Thorlauta
http://ocbh4hoqs37unvv6.onion – French Deep Web

For More
@UndercOdeOfficial
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
ENJOY BY UNDER CODE # ANY DOUBT FEEL FREE TO ASK # ALL FREE
πŸ¦‘ The Carding Tutorials Posted by UnderCode Powered by Trusted DeepWebsites, So don t be a shit Hacker by Cloning Our Tutorials
# Use Only For Learning
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘What is X-Helper Virus ? and why is dangerous ?
twitter.com/UndercOdeTC

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) xHelper is an Android malware that was detected by security vendor Malwarebytes in May 2019. This is a covert malware removal program. Even after the user restores the factory settings, the malware will be re-infected, causing continuous trouble to users around the world.

2) Malwarebytes' security researchers have been studying the threat, and in a recent blog post, the team stated that, although it has not been clear how the malware reinstalls itself, they have indeed found sufficient information about how it operates. Information to permanently delete it and prevent xHelper from reinstalling itself after a factory reset.

3) According to the Malwarebytes team, xHelper found a way to use a process in the Google Play Store app to trigger a reinstall. With a special directory created on the device, xHelper can hide its Android application package (APK) on disk. Unlike apps, their directories and files remain on Android mobile devices even after a factory reset. Therefore, the device will continue to be infected until the directories and files are deleted.

4) Malwarebytes explained in its analysis of the malware, "Google Play is not infected with malware. However, certain events in Google Play triggered a re-infection-it could be something is being stored. In addition, some things may Google Play acts as a smoke screen, disguising itself as a source of malware installation, when it actually comes from elsewhere. "

Written by UndercOde
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Method to remove xHelper Virus :
fb.com/UndercOdeTestingCompany

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

It is worth noting that the following removal steps rely on the user to install the Malwarebytes app for Android, but the app is free to use.

> The specific deletion steps are as follows:

1) Install a file manager from Google PLAY, which can search for files and directories.

2) Amelia uses ASTRO's File Manager.

3) Disable Google PLAY temporarily to stop reinfection.

4) Go to Settings> Apps> Google Play Store

5) Press the disable button to run a scan in Malwarebytes for Android to remove xHelper and other malware.

6) Manual uninstallation can be difficult, but the names to look for in the Application information are fireway, xhelper, and Settings (only if two settings applications are displayed). Open the file manager and search for anything that starts with com.mufc .
If found, note the last modified date.

> Pro tip: Sort by date in file manager
7) In ASTRO's file manager, you can delete everything starting with com.mufc sorted by date under view settings . And anything with the same date (except for core directories such as Download):

8) now Re-enable Google PLAY

9) Go to Settings> Apps> Google Play Store

10) Press the enable button

Written by UndercOde
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁