UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.3K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ SQL-SMALL TIP
What are the transaction isolation levels? What is the default isolation level for MySQL?
t.me/UnderCodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

> The SQL standard defines four isolation levels:

1) READ-UNCOMMITTED: The lowest isolation level that allows reading of uncommitted data changes, which may cause dirty reads, phantom reads, or non-repeatable reads.

2) READ-COMMITTED (read committed): Allows reading of data that has been committed by concurrent transactions, which can prevent dirty reads, but phantom or non-repeatable reads can still occur.

3) REPEATABLE-READ (repeatable read): The results of multiple reads of the same field are consistent, unless the data is modified by the transaction itself, can prevent dirty reads and non-repeatable reads, but phantom reads may still occur.

4) SERIALIZABLE (serializable): the highest isolation level, fully obeys the ACID isolation level. All transactions are executed one by one in order, so there is no possibility of interference between transactions, that is, this level can prevent dirty reads, non-repeatable reads, and phantom reads.

πŸ¦‘ Isolation level Dirty read Non-repeatable Phantom reading
READ-UNCOMMITTED √ √ √
READ-COMMITTED Γ— √ √
REPEATABLE-READ Γ— Γ— √
SERIALIZABLE Γ— Γ— Γ—
The default isolation level supported by the MySQL InnoDB storage engine is REPEATABLE-READ . We can see by SELECT ;command

> mysql> SELECT @@tx_isolation;+-----------------+ @@tx_isolation| |+-----------------+| REPEATABLE-READ |+-----------------+

πŸ¦‘1) It should be noted that the difference from the SQL
2) Therefore, the default isolation level supported by the InnoDB storage engine is REPEATABLE-READ (rereadable), which can completely guarantee the transaction isolation requirements, that is, the SQL standard SERIALIZABLE (serializable) isolation level has been achieved .

3) Because the lower the isolation level, the fewer locks requested by the transaction, so the isolation level of most database systems is READ-COMMITTED (read submission): but you need to know that the InnoDB storage engine uses REPEATABLE-READ (can be (Re-reading) without any performance loss.

4) InnoDB storage engine in distributed transactions under conditions generally used SERIALIZABLE (serialization) isolation level.

Written by UNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘SOME FACEBOOK CVE TYPES
fb.com/UnderCodeTesting :

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) CVE-2019-15841 352 CSRF 2019-08-30 2019-09-03 6.8 None Remote Medium Not required Partial Partial Partial
The facebook-for-woocommerce plugin before 1.9.15 for WordPress has CSRF via ajax_woo_infobanner_post_click, ajax_woo_infobanner_post_xout, or ajax_fb_toggle_visibility.

2) CVE-2019-15840 352 CSRF 2019-08-30 2019-09-03 6.8 None Remote Medium Not required Partial Partial Partial
The facebook-for-woocommerce plugin before 1.9.14 for WordPress has CSRF.

3) CVE-2019-11929 119 Exec Code Overflow 2019-10-02 2019-10-10 7.5 None Remote Low Not required Partial Partial Partial
Insufficient boundary checks when formatting numbers in number_format allows read/write access to out-of-bounds memory, potentially leading to remote code execution. This issue affects HHVM versions prior to 3.30.10, all versions between 4.0.0 and 4.8.5, all versions between 4.9.0 and 4.18.2, and versions 4.19.0, 4.19.1, 4.20.0, 4.20.1, 4.20.2, 4.21.0, 4.22.0, 4.23.0.

4) CVE-2019-11926 125 2019-09-06 2019-10-09 7.5 None Remote Low Not required Partial Partial Partial
Insufficient boundary checks when processing M_SOFx markers from JPEG headers in the GD extension could allow access to out-of-bounds memory via a maliciously constructed invalid JPEG input. This issue affects HHVM versions prior to 3.30.9, all versions between 4.0.0 and 4.8.3, all versions between 4.9.0 and 4.15.2, and versions 4.16.0 to 4.16.3, 4.17.0 to 4.17.2, 4.18.0 to 4.18.1, 4.19.0, 4.20.0 to 4.20.1.

5) CVE-2019-11925 125 2019-09-06 2019-10-09 7.5 None Remote Low Not required Partial Partial Partial
Insufficient boundary checks when processing the JPEG APP12 block marker in the GD extension could allow access to out-of-bounds memory via a maliciously constructed invalid JPEG input. This issue affects HHVM versions prior to 3.30.9, all versions between 4.0.0 and 4.8.3, all versions between 4.9.0 and 4.15.2, and versions 4.16.0 to 4.16.3, 4.17.0 to 4.17.2, 4.18.0 to 4.18.1, 4.19.0, 4.20.0 to 4.20.1.

6) CVE-2019-11924 400 2019-08-20 2019-08-30 7.8 None Remote Low Not required None None Complete
A peer could send empty handshake fragments containing only padding which would be kept in memory until a full handshake was received, resulting in memory exhaustion. This issue affects versions v2019.01.28.00 and above of fizz, until v2019.08.05.00.

7) CVE-2019-11922 362 2019-07-25 2019-08-12 6.8 None Remote Medium Not required Partial Partial Partial
A race condition in the one-pass compression functions of Zstandard prior to version 1.3.8 could allow an attacker to write bytes out of bounds if an output buffer smaller than the recommended size was used.

8) CVE-2019-11921 787 2019-07-25 2019-08-02 7.5 None Remote Low Not required Partial Partial Partial
An out of bounds write is possible via a specially crafted packet in certain configurations of Proxygen due to improper handling of Base64 when parsing malformed binary content in Structured HTTP Headers.

Powered by Wiki
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ New Critical RCE Bug in OpenBSD SMTP Server Threatens Linux Distros
twitter.com/undercodeNews

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Security researchers have discovered a new critical vulnerability in the OpenSMTPD email server. An attacker could exploit it remotely to run shell commands as root on the underlying operating system.

2) OpenSMTPD is present on many Unix-based systems, including FreeBSD, NetBSD, macOS, Linux (Alpine, Arch, Debian, Fedora, CentOS).

3) Bug present since late 2015
Tracked as CVE-2020-8794, the remote code execution bug is present in OpenSMTPD's default installation. Proof-of-concept (PoC) exploit code

4) Server-side exploitation is possible when the attacker connects to the OpenSMTPD server and sends an email that creates a bounce.

When OpenSMTPD connects back to deliver the bounce, the attacker can take advantage of the client-side vulnerability.

5) On OpenBSD, binary patches are available by running the 'syspatch' command and confirming that OpenSMTPD restarted:

$ doas syspatch

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘SSH Secure Shell 3.0.0 Vulnerability Scanner how and why ?
twitter.com/undercodeNews

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) The following tool will scan the network for hosts using the vulnerable SSH version 3.0 that allows attackers to login to accounts without prompting for a user when their password is shorter than two characters.

2) Tool:
#!/usr/bin/perl
#
# A local SSH 3.0.0 vulnerability scanner for the
# SSH Short Password Login Vulnerability
#
# Note: You must have superuser access on the system to scan it.
#
# usage: ./ssh3.pl
# Optional: -e turn off error
# -h specify a different /etc/shadow file
# (Options must come before host name)
#

# This and all of my programs fall under my disclaimer, which
# can be found at: http://hypoclear.cjb.net/hypodisclaim.txt


use IO::Socket; use Getopt::Std;
getopts(''h:e'');

4) die "" usage: $0 Optional: -e turn off error -h specify a different /etc/shadow file "" unless @ARGV > 0;
if (!defined $opt_h)
{ $opt_h = ""/etc/shadow"";
}

$out = &bannerGrab($ARGV[0],22);
sysread $out, $message,100;
close $out;

5) if (($message =~ /3.0.0/) || (defined $opt_e))
{ print ""Running SSH 3.0.0, checking for vulnerabilities... "";
open(SHADOW, ""<$opt_h"") || die ""Cannot open $opt_h! Note: You must have superuser access to run this script. "";
while()
{ $name = $_;
$name =~ s/:.*$//;
$_ =~ s/^.*?://;
$_ =~ s/:.*$//;
$name =~ s/s//g; $_=~s/s//g;
push(@name,$name);
push(@hash,$_);
push(@lnnum,$cnt++); $cnt++;
}
close(SHADOW);

foreach $hash (@hash)
{ @chars = split(//,$hash);
foreach $char (@chars)
{ $count++;
}
if ($count <= 2)
{ print ""$name[$line] (line $lnnum[$line]) may be vulnerable! "";
$vulnFlag = 1;
}
$count=0; $line++;
}
if ($vulnFlag != 1)
{ print ""No accounts appear to be vulnerable. "";
}
}
else
{ if (!defined $opt_e)
{ print ""You are not running SSH 3.0.0. "";
die ""If you feel that this is an error run with the -e option. "";
}
}
print "" "";


6) sub bannerGrab
{ $host = gethostbyname($_[0]) || warn ""cannot connect to $ARGV[0] "";
$port = getservbyport($_[1], ''tcp'');
$haddr = sockaddr_in($_[1], $host);
socket(OUT, PF_INET, SOCK_STREAM, getprotobyname(''tcp'')) || warn ""$! "";
connect(OUT, $haddr) ;
return OUT;
}


Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘HOW TO USE [Turn] PHP as Shell Script ?
fb.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Why PHP is so
popular Recently PHP (Personal Hypertext Preprocessor) seems to have become the most widely used web processing language on Linux / Unix in the past two years. Its convenience, powerful functions and OpenSource features have gradually eroded it. In the traditional CGI and even the MicroSoft ASP (Active Server Page) market, almost every major website recruits people with PHP as its basic condition.

2) PHP does have this qualification and can be so
popular for several reasons: PHP is OpenSource software, completely free and can be distributed freely, so it has attracted a lot of people to use it, and because of this, it has attracted commercial companies to develop it better Engine and optimization software

3) PHP itself is very simple and easy to understand, with a simple instruction syntax, plus some basic object-oriented processing capabilities, so that novices can learn in the shortest time.

4) PHP provides quite a lot of functions, including mathematical processing, string processing, network-related functions, support for various databases, image processing functions, and a large number of developers are developing various new functions for PHP, expanding Excellent sex.

5) PHP is very easy to combine with Apache. It is used as an Apache module, and it is quite simple to set up and install. Because Apache has already occupied 60% of the global Web Server market, PHP naturally becomes the best combination of Apache.

6) However, the topic this time is not the application of PHP in web design, but the application of PHP in Shell Script. Generally known Shell Script is about tcsh, bash, perl or python. I want It's all about using PHP as a shell script.

πŸ¦‘ Installation of PHP executable files

1) Generally, PHP as a web processing language is compiled into Apache modules. Of course, it is not necessary to do this, so it is very easy to compile. As long as the root, perform the following actions:

> Unzip php-3.0.xx. After tar.gz
cd php
configure
make is
compiled, there is an executable file in the php directory named php and you can copy it to / usr / local / bin. Note that if the file is too large, you can use the strip command to remove unnecessary information from PHP, so the file will be much smaller.

2) The first program
starts writing our first PHP Shell Script program. This example prints "Hello world!":
#! / Usr / local / bin / php -q
<?
Echo "Hello, world!";
?>

3) Note that PHP was originally used in web applications, so it will definitely send HTML headers, but here we are using PHP as a shell script, "-q"

4) In this example, / usr / local / bin / php is meant to execute PHP under / usr / local / bin / because we just installed it there. The echo command prints "Hello, world!", where the "" character is a newline character.

5) Note that after saving this program as a file, you must change its chmod to an executable attribute (chmod + x file name) before you can run it.

6) Advanced use of I
Sometimes we need to input some parameters when the program is executed, such as the ls command, followed by the -l parameter. PHP Shell Script also supports this usage. There are two special variables: $ argc keeps track of the number of arguments passed in, and the $ argv [] array argument holds the contents of the argument. For example, I want to design a program that calculates the sum of two numbers:
#! / Usr / local / bin / php -q
<?
$ Sum = 0;
$ sum = $ sum + $ argv [1] + $ argv [2] ;
echo $ sum;
?>

7) Assuming this program is named sum.php3, execute sum.php3 1 2 Press enter and it will print 3.
If you want to calculate an unspecified number of parameters, you need to use the special variable $ argc:
#! / Usr / local / bin / php -q
<?
$ Sum = 0;
for ($ t = 1; $ t <= $ argc; $ t ++)
$ sum = $ sum + $ argv [$ t];
echo $ sum;
?>
8) Assuming this program is named bigsum.php3, then running bigsum.php3 1 2 3 4 5 Pressing enter will print 15; executing bigsum.php3 1 2 3 4 5 6 pressing enter will Print out 21.
Sometimes we need to input data during the execution of the program, but PHP is originally used for web design, and the data input on the webpage is naturally input by FORM, so the problem comes when PHP is used as the shell script. In PHP, the file opening function is provided. Under Linux / Uinx, inputting can be done by opening files. We need to open the device file / dev / stdin (stdin is (Meaning standard input), the program is as follows:
#! / Usr / local / bin / php -q
<?
$ Fp = fopen ("/ dev / stdin", "r");
$ inputstr = fgets ($ fp, 100 );
fclose ($ fp);

echo "\ n ---------------------- \ n";
echo $ inputstr;
?>

9) where fgets ($ fp , 100) refers to the file $ fp (that is, "/ dev / stdin" ) Read 100 bytes of data, the program will stop at this line and wait for our input. After we enter and press enter, the program will print the data we just entered.
Advanced Use II

10) Although it can already handle input, such a function is obviously too simple to cope with larger applications. For example, I need a function to remove the HTML from a data stream. At this time, it needs to be complete. The ability to handle output and input redirection, we can first design the program as follows:
#! / Usr / local / bin / php -q
<?
$ Fp = fopen ("/ dev / stdin", "r");

while (! Feof ( $ fp)) {
$ c = fgetc ($ fp);
$ inputstr = $ inputstr. $ c;
};

fclose ($ fp);

echo $ inputstr;
?>

11) Assuming this program is named filt.php3, if you directly Run this program, it will wait for your input, it will not print your input data until you press Ctrl + D, we can run it like this :
more filt.php3 | filt.php3

12) This way is to filter The .php3 program is shown with more and switched to the program filt.php3. Filt.php3 will continue to accept information (in fact, the code of the filt.php3 program), and finally print it out.
We can add HTML filtering to it:
#! / Usr / local / bin / php -q
<?
$ Fp = fopen ("/ dev / stdin", "

while (! feof ($ fp)) {
$ c = fgetc ($ fp);
$ inputstr = $ inputstr. $ c;
};

fclose ($ fp);

$ inputstr = ereg_replace ("<([^ <>] * )> "," ", $ inputstr);

echo $ inputstr;
?>

13) Suppose this program is named filt2.php3, so that the filtering function is completed. If you do n’t believe me, please try an HTML file:
more xxx.html filt2.php3
You will see that the HTML TAG file has been deleted.
Conclusion

14) PHP is actually quite easy to use as Shell Script, because PHP itself is easy to learn, and it supports various databases. After you have often used PHP to design your website, you definitely do not like to use other Shell Script language to deal with other parts that must not be web pages. At this time, the benefits of using PHP as Shell Script will become apparent. You can develop the entire system in a consistent manner, without having to use PHP and use it again. Perl / Python or C.

15) The domestic PHP atmosphere has been quite prosperous. The LinuxFab on this site is developed entirely with PHP and MySQL. In fact, there are still many wonderful uses of PHP. I have the opportunity to introduce it later. If readers need information about PHP, welcome to this site. Participate in more discussions on the PHP forum.
& nb

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Kernel Technology-Compile and Upgrade Kernel-2.6.0 Kernel as example
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

> the method of compiling the kernel is more convenient. If you are using GRUB boot, it is more convenient to install the new kernel without changing any files.

1) Download the 2.6.0 kernel

wget http://www.kernel.org/pub/linux/kernel/v2.6/linux-2.6.0.tar.gz


2)Decompress the kernel

tar zvxf / download path /linux-2.6.0.tar.gz in the / usr / src directory

3) Configuration

# make mrproper
# make menuconfig


make mrproper is an action to clean up the code tree and ensure that the source code is clean


4) Compile

make

5) Install

make modules_install

make install

It seems that the compilation of 2.6 is much more convenient than before. The previous steps such as make bzImage make modules are all done in the make step. Previously, the cp kernel and System.map were also modified. The steps for modifying Grub.conf , All make install is done, convenient

> If you are assured, you can go to the / boot directory to see if the latest vlinuz-2.6.0 and System.map-2.6.0 and grub.conf are automatically configured for you.

Ok, reboot the machine

Enjoy the charm of the 2.6 kernel, enjoy it

πŸ¦‘attached: (common mistakes)

) After an error message appears after startup, it deadlocks:
kernel panic: no init found, try passing init = option to kernel ....... ......

> solution: Note that if your system is beginning ext3 format, preferably directly to the ext3 file system compiled into the kernel, and not to load the module, otherwise the start will be similar to the reported error

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to connect PHP and Oracle without using OCI8 interface
instagram.com/undercodeTestingCompany

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1)With the expansion of the scale of the site, MySql obviously can not meet the demand, many sites are in
the case of large-scale Oracle database, how to use PHP to access Oracle becomes more and more important.

2) I talk about how I do it from a simple iERP system I wrote, and it is also explained in the official PHP manual.
Under normal circumstances or most people use Oracle8 Call-Interface (OCI8) to connect to the database.

30 Here I introduce the use of PHP's Oracle functions to connect to the database and process data without using the OCI8 interface.

πŸ¦‘ Note:

> Remove the php.ini configuration; the semicolon before
extension = php_oracle.dll is extension = php_oracle.dll

1) connect to the database

Use ora_logon () or ora_plogon () to connect to the database
ora_plogon function ora_logon similar, but ora_plogon open and Oracle's long-term link
up web service stops

$ handle = ora_plogon ("system @ localhost", "manager") or die;
"system @ localhost" where localhost is the oracle SID name, system is the user name, and manager is the user password

2) open the cursor
$ cursor = ora_open ($ handle);


3) Analyze the syntax and execute the instruction $ query = "select count (*) from area where areacode = '$ addcode'";
ora_parse ($ cursor, $ query) or die;
ora_exec ($ cursor);

4) get data
if (ora_fetch ($ cursor))
$ datacount = ora_getcolumn ($ cursor, 0);

5)_ close the cursor
ora_close ($ cursor);

Of course you may do is delete or insert statement the step of acquiring the data does not exist, such as:
INSERT :( insert)

$handle = ora_plogon("system@localhost", "manager") or die;
ora_commiton($handle);
$cursor = ora_open($handle);
$query = "insert into area(areacode,areaname) values('$addcode','$addname')";
ora_parse($cursor, $query) or die;
ora_exec($cursor);
ora_close($cursor);

DELETE: (Delete)

$handle = ora_plogon("system@localhost", "manager") or die;
$cursor = ora_open($handle);
ora_commiton($handle);
$query = "delete from area where areacode in ('222','444')" ;
ora_parse($cursor, $query) or die;
ora_exec($cursor);
ora_close($cursor)

Written by UnderCode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ ALL BANKING TORGANS Types
Worms.
Trojans.
Hybrids and exotic forms.
Fileless malware.
Adware.
Malvertising.


▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Google Hacking 2020 :
fb.com/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) clone or download : https://github.com/octalmage/googlehacks

> download https://web.archive.org/web/20100928034139/http://code.google.com:80/p/googlehacks/downloads/detail?name=GoogleHacksSetup1.6.exe&can=1&q=

2) Google Hacks is a compilation of carefully crafted Google searches that expose novel functionality from Google's search and map services. For example, you can use it to view a timeline of your search results, view a map, search for music, search for books, and perform many other specific kinds of searches.

> This is a rewrite of the very popular cross platform desktop app. Google Hacks has had millions of downloads, been featured on many websites, it's time for an update.

3) run setup, enjoy

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
godsword95@gmail.com:Runescape1
mitchellfrazier16@yahoo.com:Bigmonster7
aboodilatif@gmail.com:aboodi2442
sandyroy9911@gmail.com:violin43
joelsilver@live.com.au:Thomas01
blakeevanhowell@gmail.com:Evan1234
dezzylanham@gmail.com:acft1tm1vb
tobeajufo@icloud.com:Tobe123a
jordanwinslow21@gmail.com:Buzzkill1
granthamlong98@gmail.com:321321gl
colekowalczyk@hotmail.com:Cole123456
sareson91@gmail.com:lauren8769
qhertm@gmail.com:Pokemon111
kernowlokal@yahoo.co.uk:rossi2002
kiki67250@hotmail.fr:69Lyon67
bythebrook42@gmail.com:Maxxer42
kc821guam@gmail.com:2ioijlui
marcustinaza@gmail.com:blahblahblah
tsmckenzie2000@yahoo.com:Pathfinder01
mortisogame@gmail.com:Firefly91
simonmli99@gmail.com:simonli1
sammyblaze@gmail.com:thehotboy1
jruthven@outlook.com:toyota07
mark@rychel.com:jackie10
pjring87@gmail.com:Ducati02
pacobata1973@gmail.com:bata2024
amittpatel@hotmail.com:A156k1s1
slaphappyike@gmail.com:sneaker0201
millerbreadbox@gmail.com:baseball12
livesey.gill@talktalk.net:vanston1402
s.madorski@gmail.com:photo21253
plantalex21@gmail.com:hanner2105
karolvzarinana@hotmail.com:Zarinana123
brian.juan204@yahoo.com:oizanauj95
johngeorgiou1989@hotmail.com:crazyone1
drasia10@yahoo.com:dthvPA123
richard.comicart@gmail.com:donotmove
karlil13@gmail.com:ka131182
Habermancole3@gmail.com:Colesdog1
arsenis.christos@gmail.com:bbf59Fyaz053
snewberry1982@gmail.com:Superman24
hbinmohammed66@gmail.com:hamad5566
irpalmerjr@yahoo.com:matrix22
deson94@gmail.com:boyscout94
th.flavien@hotmail.fr:Bonjourle44
catslack@gmail.com:minesweeper
danes2531@gmail.com:Redwings4
madianne22@outlook.com:Roxybuster09
crarnewc@126.com:wc183007526
mathieu.lebougre@gmail.com:aveyron12
lacknerniklas@hotmail.com:karlmarx1
desman120@gmail.com:danderson123
jrizzly@gmail.com:Rocky1234
wesowens1@gmail.com:Bigblue12
rgrlowe@gmail.com:wireless175
m33msn@aol.com:sean1493
begon123@gmail.com:s0075267
peterat61@gmail.com:bcu5obzx
joehelm@hotmail.co.uk:ploppy11
hari.varma93@gmail.com:Google123
samuelb15@outlook.com:Dodger69
lggeorge@outlook.com:jerome812
oscar2118ortiz@gmail.com:2118hell
catslack@gmail.com:minesweeper
brendonwest@live.co.uk:Rexman007
kajcampbell@sbcglobal.net:kajl1040
viet88tp@gmail.com:Rip2surf
popptaylor23@gmail.com:Oreo2301
gabrielle.thibodeau14@gmail.com:darkl0rd14
aj15444@yahoo.com:ambitious108
nikolas.karatzas@gmail.com:Kasteel24
faganthelee@gmail.com:Strawhat1
eemeli.tampio@gmail.com:8d8swybas
ninjaking574@gmail.com:123kye321
garrett.taggart@yahoo.com:taggart24
ciprianiorga@hotmail.com:cior3652
anastasiasheldon1999@gmail.com:17060007
brazzale@gmail.com:m8q7rwbr
chicagojersey@gmail.com:Q1w2e3R4
tqco@netzero.net:richest3
njdevils99@outlook.com:bagels01
jostorey@live.com:elizabeth
deniseusuka@hotmail.com:cdjuly13
2342w3e4r@gmail.com:1231q2w3e
killerburrito.aj@gmail.com:Awesome01
gs1983@live.com.au:1eighty2
almurar@gmail.com:gzxix1a5
marc-antoine_michaud@outlook.com:crosby87
steven.a.hiller@gmail.com:demonking6
supra_gal@hotmail.com:Sc00bydoo
stegemann@gmail.com:calif0rnia
justin18y@gmail.com:Erindale30
trevor.edwards.04@gmail.com:chester1
zach.kilpack@gmail.com:leapyear44
ven6212@gmail.com:23395589
jacobash91@gmail.com:Shimano65
craig@craigmaguire.net:Stygian01
veronicatracy@me.com:peekaboo23
to.fawaz@gmail.com:vwPassat86
nporikos@gmail.com:hockey21
blackopswmd@gmail.com:Goodbye27
Gladiogaming@gmail.com:Mikemike007
sruthi2801@gmail.com:2801ammu
danielblier@gmail.com:Dblier454
sk_randhawa@hotmail.com:Austin316
elias.fazal@gmail.com:Portland02
ritsblack@hotmail.com:Aa010010
matthieu.dejoue@gmail.com:moutt2k7
serebiisean@gmail.com:Megotgrammar1
fulhamhamster09@googlemail.com:hamster123
benji512512@gmail.com:Brady5126
begon123@gmail.com:s0075267
remy_svardal@hotmail.com:xhevdet222
manicoletta94@gmail.com:Beaser94
pandaboy626@gmail.com:frost626
macha.pavlova@gmail.com:Nikita2004
joenorrie@hotmail.co.uk:Keanu123
mariaL_casino@yahoo.com:loraine12
bigwilsy@gmail.com:imflying123
aes1972@mac.com:Cartman72
peturbjarnason@gmail.com:a1a1a1a2
ashkon28@Hotmail.com:Stpauls12
marinushove@hotmail.com:Kasperkat20
sader8818@gmail.com:marvin8818
slogan6152@gmail.com:Bbranch1
πŸ¦‘only for undercode E N J O Y
πŸ¦‘fifia 08 serial X8MM-RWM9-FIFA-KFLT-FIFA
Adobe Photoshop CS2 v9.0
S/N: 1045-0436-9551-0266-5984-9386
Age Of Empires III: The Warchiefs
RLD12-XTBWA-RLD13-MDFKA-RCTJP
RLD4E-VERAN-DALWA-YS3XA-TPCCR