β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Zee5 Premium Accounts :
t.me/undercodeTesting
sahiltulsiani@gmail.com:kt181213 | Plan Name = All Access Monthly Pack | Exipry Date = 2020-12-31T23:59:59Z | Device = 5 \
aditya.abburi@gmail.com:steelbed43 | Plan Name = All Access Pack | Exipry Date = 2021-03-31T23:59:59Z | Device = 5
aditya.agrawal42@gmail.com:ka8989069164 | Plan Name = All Access (Offer till Oct 31, 2018) | Exipry Date = 2018-10-31T23:59:59Z | Device = 5
aditya.garg@live.in:foreva809 | Plan Name = All Access Pack | Exipry Date = 2021-03-31T23:59:59Z | Device = 5
aditya.gnb@gmail.com:badityajgnb | Plan Name = Migration Zee5 | Exipry Date = 2019-01-01T23:59:59Z | Device = 0 :
aditya.goyal2006@gmail.com:May19th75 | Plan Name = Amazon Free Trial Pack For 7 Days | Exipry Date = 2022-03-31T23:59:59Z | Device = 5
parth0309@gmail.com:p212t1-1 | Plan Name = All Access Pack | Exipry Date = 2021-03-31T23:59:59Z | Device = 5
partha.manjanbail@gmail.com:engineer3027 | Plan Name = All Access Pack | Exipry Date = 2021-03-31T23:59:59Z | Device = 5
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Zee5 Premium Accounts :
t.me/undercodeTesting
sahiltulsiani@gmail.com:kt181213 | Plan Name = All Access Monthly Pack | Exipry Date = 2020-12-31T23:59:59Z | Device = 5 \
aditya.abburi@gmail.com:steelbed43 | Plan Name = All Access Pack | Exipry Date = 2021-03-31T23:59:59Z | Device = 5
aditya.agrawal42@gmail.com:ka8989069164 | Plan Name = All Access (Offer till Oct 31, 2018) | Exipry Date = 2018-10-31T23:59:59Z | Device = 5
aditya.garg@live.in:foreva809 | Plan Name = All Access Pack | Exipry Date = 2021-03-31T23:59:59Z | Device = 5
aditya.gnb@gmail.com:badityajgnb | Plan Name = Migration Zee5 | Exipry Date = 2019-01-01T23:59:59Z | Device = 0 :
aditya.goyal2006@gmail.com:May19th75 | Plan Name = Amazon Free Trial Pack For 7 Days | Exipry Date = 2022-03-31T23:59:59Z | Device = 5
parth0309@gmail.com:p212t1-1 | Plan Name = All Access Pack | Exipry Date = 2021-03-31T23:59:59Z | Device = 5
partha.manjanbail@gmail.com:engineer3027 | Plan Name = All Access Pack | Exipry Date = 2021-03-31T23:59:59Z | Device = 5
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ FRESH PREMIUM PROXIES FROM 1 H :
t.me/UndercodeTesting
197.216.2.14 8080 1 hour ago
1036 ms 51% (65) ao Angola Elite -
201.204.168.106 80 1 hour ago
3190 ms 12% (94) cr Costa Rica - Heredia Elite -
218.204.153.156 443 1 hour ago
2222 ms 11% (74) cn China Elite -
35.220.131.188 80 1 hour ago
848 ms 11% (78) us United States Elite -
35.222.208.56 3128 1 hour ago
1977 ms 60% (59) us United States Elite -
5.79.105.97 8118 1 hour ago
479 ms 5% (113) nl Netherlands Elite -
144.76.214.153 1080 1 hour ago
3361 ms 81% (57) de Germany Elite -
169.57.1.85 80 1 hour ago
263 ms 64% (61) mx Mexico - Mexico City Elite -
175.43.58.23 9999 1 hour ago
0 ms 0% (105) cn China - Quanzhou Elite -
162.223.88.228 8080 1 hour ago
2910 ms 13% (88) us United States - Buffalo Elite -
163.44.153.98 8080 1 hour ago
3947 ms 26% (79) sg Singapore Elite -
115.231.31.130 80 1 hour ago
849 ms 92% (46) cn China Elite -
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ FRESH PREMIUM PROXIES FROM 1 H :
t.me/UndercodeTesting
197.216.2.14 8080 1 hour ago
1036 ms 51% (65) ao Angola Elite -
201.204.168.106 80 1 hour ago
3190 ms 12% (94) cr Costa Rica - Heredia Elite -
218.204.153.156 443 1 hour ago
2222 ms 11% (74) cn China Elite -
35.220.131.188 80 1 hour ago
848 ms 11% (78) us United States Elite -
35.222.208.56 3128 1 hour ago
1977 ms 60% (59) us United States Elite -
5.79.105.97 8118 1 hour ago
479 ms 5% (113) nl Netherlands Elite -
144.76.214.153 1080 1 hour ago
3361 ms 81% (57) de Germany Elite -
169.57.1.85 80 1 hour ago
263 ms 64% (61) mx Mexico - Mexico City Elite -
175.43.58.23 9999 1 hour ago
0 ms 0% (105) cn China - Quanzhou Elite -
162.223.88.228 8080 1 hour ago
2910 ms 13% (88) us United States - Buffalo Elite -
163.44.153.98 8080 1 hour ago
3947 ms 26% (79) sg Singapore Elite -
115.231.31.130 80 1 hour ago
849 ms 92% (46) cn China Elite -
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Website hacking github topic- linux :
pinterest.com/Undercode_Testing
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/koutto/jok3r.git
2) cd jok3r
3) Pull Jok3r Docker Image:
sudo docker pull koutto/jok3r
Run fresh Docker container:
5) sudo docker run -i -t --name jok3r-container -w /root/jok3r -e DISPLAY=$DISPLAY -v /tmp/.X11-unix:/tmp/.X11-unix --shm-size 2g --net=host koutto/jok3r
π¦ Notes:
-e DISPLAY=$DISPLAY -v /tmp/.X11-unix:/tmp/.X11-unix is required in order to be able to start GUI applicationfrom the Docker container (e.g. open web browser to read reports). It requires running xhost +local:root on the host.
--shm-size 2g is used to increase the size of the shared memory, it is required to avoid crashs of web browser when reading reports from the Docker container.
--net=host is required to share host's interface. It is needed for reverse connections (e.g. Ping to container when testing for RCE, Getting a reverse shell)
6) To re-run a stopped container:
sudo docker start -i jok3r-container
7) To open multiple shells inside the container:
sudo docker exec -it jok3r-container bash
8) In order to update, just pull the latest Docker Image from Docker Hub and run a fresh container from this new image:
sudo docker pull koutto/jok3r
sudo docker run -i -t --name jok3r-container-updated -w /root/jok3r -e DISPLAY=$DISPLAY -v /tmp/.X11-unix:/tmp/.X11-unix --shm-size 2g
π¦FEATURES :
Selection of Tools: Compilation of 50+ open-source tools & scripts, from various sources.
Docker-based: Application packaged in a Docker image running Kali OS, available on Docker Hub.
Ready-to-use: All tools and dependencies installed, just pull the Docker image and run a fresh container.
Updates made easy: Easily keep the whole toolbox up-to-date by running only one command.
Easy Customization: Easily add/remove tools from a simple configuration file.
Network Infrastructure Security Assessment
Many supported Services: Target most common TCP/UDP services (HTTP, FTP, SSH, SMB, Oracle, MS-SQL, MySQL, PostgreSQL, VNC, etc.).
Combine Power of Tools: Each security check is performed by a tool from the toolbox. Attacks are performed by chaining security checks.
Context Awareness: Security checks to run are selected and adapted according to the context of the target (i.e. detected technologies, credentials, vulnerabilities, etc.).
Reconnaissance: Automatic fingerprinting (product detection) of targeted services is performed.
CVE Lookup: When product names and their versions are detected, a vulnerability lookup is performed on online CVE databases (using Vulners & CVE Details).
Vulnerability Scanning: Automatically check for common vulnerabilities and attempt to perform some exploitations (auto-pwn).
Brute-force Attack: Automatically check for default/common credentials on the service and perform dictionnary attack if necessary. Wordlists are optimized according to the targeted services.
Post-authentication Testing: Automatically perform some post-exploitation checks when valid credentials have been found.
Web Security Assessment
Large Focus on HTTP: More than 60 different security checks targeting HTTP supported for now.
Web Technologies Detection: Fingerprinting engine based on Wappalyzer is run prior to security checks, allowing to detect: Programming language, Framework, JS library, CMS, Web & Application Server.
Server Exploitation: Automatically scan and/or exploit most critical vulnerabilities (e.g. RCE) on web and application servers (e.g. JBoss, Tomcat, Weblogic, Websphere, Jenkins, etc.).
CMS Vulnerability Scanning: Automatically run vulnerability scanners on most common CMS (Wordpress, Drupal, Joomla, etc.).
Local Database & Reporting
Local Database: Data related to targets is organized by missions (workspaces) into a local Sqlite database that is kept updated during security testings.
Metasploit-like Interactive Shell: Access the database through an interactive shell with several built-in commands.
Import Targets from Nmap: Add targets to a mission either manually or by loading Nmap results.
π¦Website hacking github topic- linux :
pinterest.com/Undercode_Testing
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/koutto/jok3r.git
2) cd jok3r
3) Pull Jok3r Docker Image:
sudo docker pull koutto/jok3r
Run fresh Docker container:
5) sudo docker run -i -t --name jok3r-container -w /root/jok3r -e DISPLAY=$DISPLAY -v /tmp/.X11-unix:/tmp/.X11-unix --shm-size 2g --net=host koutto/jok3r
π¦ Notes:
-e DISPLAY=$DISPLAY -v /tmp/.X11-unix:/tmp/.X11-unix is required in order to be able to start GUI applicationfrom the Docker container (e.g. open web browser to read reports). It requires running xhost +local:root on the host.
--shm-size 2g is used to increase the size of the shared memory, it is required to avoid crashs of web browser when reading reports from the Docker container.
--net=host is required to share host's interface. It is needed for reverse connections (e.g. Ping to container when testing for RCE, Getting a reverse shell)
6) To re-run a stopped container:
sudo docker start -i jok3r-container
7) To open multiple shells inside the container:
sudo docker exec -it jok3r-container bash
8) In order to update, just pull the latest Docker Image from Docker Hub and run a fresh container from this new image:
sudo docker pull koutto/jok3r
sudo docker run -i -t --name jok3r-container-updated -w /root/jok3r -e DISPLAY=$DISPLAY -v /tmp/.X11-unix:/tmp/.X11-unix --shm-size 2g
π¦FEATURES :
Selection of Tools: Compilation of 50+ open-source tools & scripts, from various sources.
Docker-based: Application packaged in a Docker image running Kali OS, available on Docker Hub.
Ready-to-use: All tools and dependencies installed, just pull the Docker image and run a fresh container.
Updates made easy: Easily keep the whole toolbox up-to-date by running only one command.
Easy Customization: Easily add/remove tools from a simple configuration file.
Network Infrastructure Security Assessment
Many supported Services: Target most common TCP/UDP services (HTTP, FTP, SSH, SMB, Oracle, MS-SQL, MySQL, PostgreSQL, VNC, etc.).
Combine Power of Tools: Each security check is performed by a tool from the toolbox. Attacks are performed by chaining security checks.
Context Awareness: Security checks to run are selected and adapted according to the context of the target (i.e. detected technologies, credentials, vulnerabilities, etc.).
Reconnaissance: Automatic fingerprinting (product detection) of targeted services is performed.
CVE Lookup: When product names and their versions are detected, a vulnerability lookup is performed on online CVE databases (using Vulners & CVE Details).
Vulnerability Scanning: Automatically check for common vulnerabilities and attempt to perform some exploitations (auto-pwn).
Brute-force Attack: Automatically check for default/common credentials on the service and perform dictionnary attack if necessary. Wordlists are optimized according to the targeted services.
Post-authentication Testing: Automatically perform some post-exploitation checks when valid credentials have been found.
Web Security Assessment
Large Focus on HTTP: More than 60 different security checks targeting HTTP supported for now.
Web Technologies Detection: Fingerprinting engine based on Wappalyzer is run prior to security checks, allowing to detect: Programming language, Framework, JS library, CMS, Web & Application Server.
Server Exploitation: Automatically scan and/or exploit most critical vulnerabilities (e.g. RCE) on web and application servers (e.g. JBoss, Tomcat, Weblogic, Websphere, Jenkins, etc.).
CMS Vulnerability Scanning: Automatically run vulnerability scanners on most common CMS (Wordpress, Drupal, Joomla, etc.).
Local Database & Reporting
Local Database: Data related to targets is organized by missions (workspaces) into a local Sqlite database that is kept updated during security testings.
Metasploit-like Interactive Shell: Access the database through an interactive shell with several built-in commands.
Import Targets from Nmap: Add targets to a mission either manually or by loading Nmap results.
Pinterest
UnderCode TESTING (UNDERCODE_TESTING) on Pinterest
UnderCode TESTING | πππππ£βπ ππ πππ€π₯πππ βπ ππ‘πππͺ:
Programming, Web & Applications makers, Host, bugs fix, Satellite Reicivers Programming..
Started Since 2011
Programming, Web & Applications makers, Host, bugs fix, Satellite Reicivers Programming..
Started Since 2011
Import Targets from Shodan: Add targets to a mission manually from shodan (need shodan API key).
Access all Results: All outputs from security checks, detected credentials and vulnerabilities are stored into the database and can be accessed easily.
Reporting: Generate full HTML reports with targets summary, web screenshots and all results from security testing.
π¦Tested by Undercode on :
> parrot
> ubuntu
> kali
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Access all Results: All outputs from security checks, detected credentials and vulnerabilities are stored into the database and can be accessed easily.
Reporting: Generate full HTML reports with targets summary, web screenshots and all results from security testing.
π¦Tested by Undercode on :
> parrot
> ubuntu
> kali
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Termux -Linux
> git topic The DumpsterFire Toolset is a modular, menu-driven, cross-platform tool for building repeatable, time-delayed, distributed security events. Easily create custom event chains for Blue Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Turn paper tabletop exercises into controlled "live fire" range events. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
t.me/UndercodeTesting
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/TryCatchHCF/DumpsterFire.git
2) cd DumpsterFire
3) $ ./dumpsterFireFactory.py
dumpsterFireFactory.py - Menu-driven tool for creating, configuring, scheduling, and executing DumpsterFires
FireModules/ - Directory that contains subdirectories of Fires, each subdirectory is a specific Category of Fires to keep your Fire modules organized. Fires are added to a DumpsterFire to create a chain of events and actions.
DumpsterFires/ - Directory containing your collection of DumpsterFires
igniteDumpsterFire.py - Headless script, invoked at command line with the filename of the DumpsterFire you wish to execute. Useful for igniting distributed DumpsterFires.
testFireModule.py - Utility script for unit testing the Class methods of your custom Fire modules, without the hassle of running through the entire DumpsterFire Factory process to debug. Also useful for running a single Fire to check your settings. testFireModule.py will prompt you for configuration settings were applicable.
__init__.py files - Required to make Python treat directories as containing Python packages, allows DumpsterFire toolset to find and load Fire modules.
π¦ TESTED BY UNDERCODE ON :
> kali
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Termux -Linux
> git topic The DumpsterFire Toolset is a modular, menu-driven, cross-platform tool for building repeatable, time-delayed, distributed security events. Easily create custom event chains for Blue Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Turn paper tabletop exercises into controlled "live fire" range events. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
t.me/UndercodeTesting
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/TryCatchHCF/DumpsterFire.git
2) cd DumpsterFire
3) $ ./dumpsterFireFactory.py
dumpsterFireFactory.py - Menu-driven tool for creating, configuring, scheduling, and executing DumpsterFires
FireModules/ - Directory that contains subdirectories of Fires, each subdirectory is a specific Category of Fires to keep your Fire modules organized. Fires are added to a DumpsterFire to create a chain of events and actions.
DumpsterFires/ - Directory containing your collection of DumpsterFires
igniteDumpsterFire.py - Headless script, invoked at command line with the filename of the DumpsterFire you wish to execute. Useful for igniting distributed DumpsterFires.
testFireModule.py - Utility script for unit testing the Class methods of your custom Fire modules, without the hassle of running through the entire DumpsterFire Factory process to debug. Also useful for running a single Fire to check your settings. testFireModule.py will prompt you for configuration settings were applicable.
__init__.py files - Required to make Python treat directories as containing Python packages, allows DumpsterFire toolset to find and load Fire modules.
π¦ TESTED BY UNDERCODE ON :
> kali
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ CARDING FOR LEARN !
Carding tutorial-MONEYGRAM's carding and transmission of stolen credit cards
MONEYGRAM combs and transmits the stolen credit card
οΌAre combed and transmission from a stolen credit card οΌ
How to do bank transfer from credit card
So, have you heard that hackers do bank transfers and you are so eager to be yourself? This is a comprehensive guide on how to get started.
Type of transmission
π¦ There are so many ways to do hacker bank transfer, 1 ST via online banking information of phishing or spam victims. The second method is to cancel the credit card information attacked by a hacker with a bank account. For the purpose of this course, I will teach you how to do stolen / hacked cvvs bank transfer.
Required tools
Β· Bank account (US or UK or Canada)
Β· VPN / Socks
Β· Credit Card Information
Β· Merchant account (CVV for charging)
Get bank account
> This is undesirable to you, so you need a fake bank information to use real bank account information to make this transfer. This is a very simple way to get bank details in and out of the US. Let us assume that you are in the US, but if you are in the US, you should bypass the first step.
1) Log in to www.myus.com to buy a virtual address in the United States. Although you are not physically in the United States, this will become your own address in the United States. Any items or products sent to this address will be transferred back to your real address in your country. Note: You need this address so that you can connect to the ATM card in your bank account.
2) After you have purchased the address, you have found the hacker and bought a good fullz. The fullz includes the card details, SSN, DOB. After you buy it, log in to www.accountnow.com and use the SSN details you bought to open an account. The nuclear submarine will be used as a means of checking the accountnow.com account and it will cause them to issue a bank account to any bank in the US After verifying your accountnow.com, connect to them to send you the address in the United States, bank details, ATM card, which means you have to use the address myus.com you bought. They will send the card to your address within 4 @ undercodetesting working days and myus.com will now reship its real address in your country. You now have a bank account and your debit card is ready.
VPN and socks
3) You can go to www.hidemyass.com to get good VPN support for all countries. In order to get socks 5, you can just Google Socks 5 and a link will appear for you to purchase and download.
Get fresh credit and debit card details
This is the key to transfer and the most important part to get good credit card details, please check our credit card store www.cardsmarket.su. It's an Empire with more than 1 million credit card details and you can buy it for as low as $ 5.
3) Set up your merchant account
Note: The merchant account will enable you to purchase your afterwards, transfer the card to your bank account to charge money. Since you do nβt have an online store and you do nβt sell anything to do, you will have to use their own business account through a website that raises funds. Now log in to www.gofundme.com, set up an account with them, and set up a campaign for them, if you do nβt know how to set up the campaign, go to www.indiegogo.com and copy any activity you choose. Now your campaign is set up and ready to receive funds.
Generate money and make transfers
π¦ CARDING FOR LEARN !
Carding tutorial-MONEYGRAM's carding and transmission of stolen credit cards
MONEYGRAM combs and transmits the stolen credit card
οΌAre combed and transmission from a stolen credit card οΌ
How to do bank transfer from credit card
So, have you heard that hackers do bank transfers and you are so eager to be yourself? This is a comprehensive guide on how to get started.
Type of transmission
π¦ There are so many ways to do hacker bank transfer, 1 ST via online banking information of phishing or spam victims. The second method is to cancel the credit card information attacked by a hacker with a bank account. For the purpose of this course, I will teach you how to do stolen / hacked cvvs bank transfer.
Required tools
Β· Bank account (US or UK or Canada)
Β· VPN / Socks
Β· Credit Card Information
Β· Merchant account (CVV for charging)
Get bank account
> This is undesirable to you, so you need a fake bank information to use real bank account information to make this transfer. This is a very simple way to get bank details in and out of the US. Let us assume that you are in the US, but if you are in the US, you should bypass the first step.
1) Log in to www.myus.com to buy a virtual address in the United States. Although you are not physically in the United States, this will become your own address in the United States. Any items or products sent to this address will be transferred back to your real address in your country. Note: You need this address so that you can connect to the ATM card in your bank account.
2) After you have purchased the address, you have found the hacker and bought a good fullz. The fullz includes the card details, SSN, DOB. After you buy it, log in to www.accountnow.com and use the SSN details you bought to open an account. The nuclear submarine will be used as a means of checking the accountnow.com account and it will cause them to issue a bank account to any bank in the US After verifying your accountnow.com, connect to them to send you the address in the United States, bank details, ATM card, which means you have to use the address myus.com you bought. They will send the card to your address within 4 @ undercodetesting working days and myus.com will now reship its real address in your country. You now have a bank account and your debit card is ready.
VPN and socks
3) You can go to www.hidemyass.com to get good VPN support for all countries. In order to get socks 5, you can just Google Socks 5 and a link will appear for you to purchase and download.
Get fresh credit and debit card details
This is the key to transfer and the most important part to get good credit card details, please check our credit card store www.cardsmarket.su. It's an Empire with more than 1 million credit card details and you can buy it for as low as $ 5.
3) Set up your merchant account
Note: The merchant account will enable you to purchase your afterwards, transfer the card to your bank account to charge money. Since you do nβt have an online store and you do nβt sell anything to do, you will have to use their own business account through a website that raises funds. Now log in to www.gofundme.com, set up an account with them, and set up a campaign for them, if you do nβt know how to set up the campaign, go to www.indiegogo.com and copy any activity you choose. Now your campaign is set up and ready to receive funds.
Generate money and make transfers
4) Now you can do this. This step shows how to generate $$. Log in to www.cardsmarket.su to buy any card of your choice. After purchasing your card, please pay attention to the country, city and address of the credit card. Your VPN is connected to the country of the card, after which use your sock 5 to connect to the city card. Let's assume you bought an American card and the city of Rochester in New York, all you need to do is connect your VPN to New York, USA, and then connect your socks to New York, Rochester at 5. Once connected, it will appear in the credit card company, whose real owner is to do the transaction. Now go to your event page, click donate, it will take you to a secure payment page, enter the credit card information and submit. The card will be charged and the money will go directly to your account on gofundme.com.
5) Note: Do not charge more than $ 200 on the card, let's say you buy ten credit cards and charge $ 200 per card 10 times, you will find that you are taking $ 2000 per day
Withdraw your money to your bank account
6) In the account of the campaign, you will see all the money you have charged from the credit card to live in the account, now your cPanel money, navigate to you to see the exit, click on it. Then it will redirect you to the page that will create an account with wepay. Use your obtained bank account information to set up your wepay account from accountnow.com. Once your wepay account is set up, go back to gofundme.com, click quit, and your $ 2000 will immediately enter your wepay account now.
7) Note: Wepay will process $ 2000 account information, please provide within two or three working days.
8) After you receive the money in the bank account, you can now log in to accountnow.com and transfer money online to any other bank account, you can also use your debit card to withdraw money, or you can send money from your cPanel through Moneygram. You can send nony g to yourself or any institution and ward, go to the store and pick it up.
Now, you can generate as much money as you want for yourself.
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
5) Note: Do not charge more than $ 200 on the card, let's say you buy ten credit cards and charge $ 200 per card 10 times, you will find that you are taking $ 2000 per day
Withdraw your money to your bank account
6) In the account of the campaign, you will see all the money you have charged from the credit card to live in the account, now your cPanel money, navigate to you to see the exit, click on it. Then it will redirect you to the page that will create an account with wepay. Use your obtained bank account information to set up your wepay account from accountnow.com. Once your wepay account is set up, go back to gofundme.com, click quit, and your $ 2000 will immediately enter your wepay account now.
7) Note: Wepay will process $ 2000 account information, please provide within two or three working days.
8) After you receive the money in the bank account, you can now log in to accountnow.com and transfer money online to any other bank account, you can also use your debit card to withdraw money, or you can send money from your cPanel through Moneygram. You can send nony g to yourself or any institution and ward, go to the store and pick it up.
Now, you can generate as much money as you want for yourself.
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β