β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ The whole process of washing materials 2020 latest washing materials cvv-carding tutorial by Undercode-Testing
instagram.com/UndercodeTesting
π¦ ππΌπ'π πππΈβπ :
Now we have cleared the basic concepts and started with the actual process of combing.
Set up SOCKS proxy in Firefox:
> follow these steps to open Firefox, to go to select to advanced options to network to
A pop-up window will come. It will show options
No agent 2. Automatic detection 3. Use system agent 4. Manual agent configuration
Select manual proxy configuration. Enter the socks host: << proxy ip >> and port: << proxy port >> For example: 141.141.141.141:8080. Press ok and restart Firefox. Now you are connected to the secure Socks5 J
Note: When buying socks, always match the address of the credit card holder. If the credit card holder is from California, the United States, try to make SOCKS5 at least match the state, country J
Guys are now starting to sort out the process. Please follow the steps below:
Create an email ID that matches the name of the credit card holder. If his name is John Cena (random name is taken), then the email ID should be johncena92@gmail.com or close to it.
Now run RDP and connect to the credit card holder location system to continue. If you do not have an RDP, please follow the steps below.
Turn on the MAC converter and change the address randomly.
Run CCleaner and clear all unnecessary data (cookies / history / temporary data, etc.).
Set up SOCKS5 proxy in Firefox. "It has already been explained."
Be sure to use SOCK5 to match the location of the credit card holder, and be careful not to use blacklisted IP. Please visit www.check2ip.com to
open the website for shopping. I want to recommend a website store in your country because you do nβt need to wait for many packages.
Registered credit card holder information (John Cena), name, country, city, address and email.
Shop and select your products and add to cart. Note: The first step is to choose a project that does not exceed US $ 500.
Add the address or address where the product will be delivered to the shipping address.
Then go to the payment page and select a payment method such as credit card.
Enter all the details of the credit card manually, because most websites have copy-and-paste detector scripts.
Finally, add the credit card owner βs address information to the billing address and continue the payment process.
If all goes well, then the order will be placed successfully.
After the order arrives at the delivery address, it is received from the delivery person.
(If the delivery person asks for proof, very few people will arrange a fake ID).
Method of combing using mobile phone:
Extra pro carder uses a mobile phone for carding. If you follow the steps carefully, you will do the same.
basic requirements:
Android phone that requires root.
Several applications need to be installed (agent application, CCleaner, IMEI converter, photo and Android ID converter).
You can use any VPN for combing, I suggest using HMA or Zen pairing.
You can use SOCKS5 proxy with proxy robot application.
In addition, continue to use IMEI and Android ID changer and perform this operation.
Now use SOCKS5 proxy to connect the proxy robot and connect it.
Now, follow all the steps explained above J
Reference site:
CC from the store β [The freshest CC store
Buy socks from Γ www.vip72.com
Download CCleaner's software Γ www.piriform.com/ccleaner
Download MAC address translation Γ www.zokali.com/win7-mac-addresschanger
Download SOCKS Check Γ www.socksproxychecker.com
Acronyms:
BIN: Bank Identification Number
CC: Credit Card
CCN: Credit Card Number
CVV / CVV2: Credit Verification Value (Card Security Code)
SSN: Social Security Number
MMN: Mother βs
Last Surname DOB: Date of Birth
COB: Bill Change
VBV: Visa Verification
MCSC: Master Card Security code
POS: Point of sale
VPN: Virtual private network
BTC: Bitcoin
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ The whole process of washing materials 2020 latest washing materials cvv-carding tutorial by Undercode-Testing
instagram.com/UndercodeTesting
π¦ ππΌπ'π πππΈβπ :
Now we have cleared the basic concepts and started with the actual process of combing.
Set up SOCKS proxy in Firefox:
> follow these steps to open Firefox, to go to select to advanced options to network to
A pop-up window will come. It will show options
No agent 2. Automatic detection 3. Use system agent 4. Manual agent configuration
Select manual proxy configuration. Enter the socks host: << proxy ip >> and port: << proxy port >> For example: 141.141.141.141:8080. Press ok and restart Firefox. Now you are connected to the secure Socks5 J
Note: When buying socks, always match the address of the credit card holder. If the credit card holder is from California, the United States, try to make SOCKS5 at least match the state, country J
Guys are now starting to sort out the process. Please follow the steps below:
Create an email ID that matches the name of the credit card holder. If his name is John Cena (random name is taken), then the email ID should be johncena92@gmail.com or close to it.
Now run RDP and connect to the credit card holder location system to continue. If you do not have an RDP, please follow the steps below.
Turn on the MAC converter and change the address randomly.
Run CCleaner and clear all unnecessary data (cookies / history / temporary data, etc.).
Set up SOCKS5 proxy in Firefox. "It has already been explained."
Be sure to use SOCK5 to match the location of the credit card holder, and be careful not to use blacklisted IP. Please visit www.check2ip.com to
open the website for shopping. I want to recommend a website store in your country because you do nβt need to wait for many packages.
Registered credit card holder information (John Cena), name, country, city, address and email.
Shop and select your products and add to cart. Note: The first step is to choose a project that does not exceed US $ 500.
Add the address or address where the product will be delivered to the shipping address.
Then go to the payment page and select a payment method such as credit card.
Enter all the details of the credit card manually, because most websites have copy-and-paste detector scripts.
Finally, add the credit card owner βs address information to the billing address and continue the payment process.
If all goes well, then the order will be placed successfully.
After the order arrives at the delivery address, it is received from the delivery person.
(If the delivery person asks for proof, very few people will arrange a fake ID).
Method of combing using mobile phone:
Extra pro carder uses a mobile phone for carding. If you follow the steps carefully, you will do the same.
basic requirements:
Android phone that requires root.
Several applications need to be installed (agent application, CCleaner, IMEI converter, photo and Android ID converter).
You can use any VPN for combing, I suggest using HMA or Zen pairing.
You can use SOCKS5 proxy with proxy robot application.
In addition, continue to use IMEI and Android ID changer and perform this operation.
Now use SOCKS5 proxy to connect the proxy robot and connect it.
Now, follow all the steps explained above J
Reference site:
CC from the store β [The freshest CC store
Buy socks from Γ www.vip72.com
Download CCleaner's software Γ www.piriform.com/ccleaner
Download MAC address translation Γ www.zokali.com/win7-mac-addresschanger
Download SOCKS Check Γ www.socksproxychecker.com
Acronyms:
BIN: Bank Identification Number
CC: Credit Card
CCN: Credit Card Number
CVV / CVV2: Credit Verification Value (Card Security Code)
SSN: Social Security Number
MMN: Mother βs
Last Surname DOB: Date of Birth
COB: Bill Change
VBV: Visa Verification
MCSC: Master Card Security code
POS: Point of sale
VPN: Virtual private network
BTC: Bitcoin
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ FREE CCAM SERVER FOR EUROP CHANNELS FOR 1 K USERS BY UNDERCODE :
Your Free CCcam line is :
> C: fast1.mycccam24.com 21100 jequue mycccam24
and it will expire=2020-05-02
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Your Free CCcam line is :
> C: fast1.mycccam24.com 21100 jequue mycccam24
and it will expire=2020-05-02
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Network configuration-multiple network cards are bound to an IP address (bonding)
π¦π·π°πΏ'πΎ πΎπΏπ¬π½πΏ
1) Use multiple network cards to virtually become a network card with the same IP address. This technology actually exists in sun and cisco, respectively called Trunking and etherchannel technology, in Linux, this technology is called bonding.
γγ
2) Because bonding is included in the kernel 2.4.x, you only need to select Bonding driver support in the network device options during compilation.
γγ
3) Then, recompile the core, restart the computer, and execute the following command:
γγismod bonding
γγifconfig eth0 down
γγifconfig eth1 down
γγifconfig bond0 ipaddress
γγifenslave bond0 eth0
γγifenslave bond0 eth1
4) Now the two network cards are working like one, which can improve the data between cluster nodes transmission.
γγ
5) You'd better write these sentences into a script, and then call it from /etc/rc.d/rc.local, so that it will take effect as soon as you turn it on.
γγ
6) Bonding is a better choice for the server. When there is no Gigabit network card, using two or three 100-megabit network cards for bonding can greatly increase the bandwidth between the server and the switch.
> However, it is necessary to set the two ports connected to the bonding network card on the switch to be mapped to the same virtual interface.
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Network configuration-multiple network cards are bound to an IP address (bonding)
π¦π·π°πΏ'πΎ πΎπΏπ¬π½πΏ
1) Use multiple network cards to virtually become a network card with the same IP address. This technology actually exists in sun and cisco, respectively called Trunking and etherchannel technology, in Linux, this technology is called bonding.
γγ
2) Because bonding is included in the kernel 2.4.x, you only need to select Bonding driver support in the network device options during compilation.
γγ
3) Then, recompile the core, restart the computer, and execute the following command:
γγismod bonding
γγifconfig eth0 down
γγifconfig eth1 down
γγifconfig bond0 ipaddress
γγifenslave bond0 eth0
γγifenslave bond0 eth1
4) Now the two network cards are working like one, which can improve the data between cluster nodes transmission.
γγ
5) You'd better write these sentences into a script, and then call it from /etc/rc.d/rc.local, so that it will take effect as soon as you turn it on.
γγ
6) Bonding is a better choice for the server. When there is no Gigabit network card, using two or three 100-megabit network cards for bonding can greatly increase the bandwidth between the server and the switch.
> However, it is necessary to set the two ports connected to the bonding network card on the switch to be mapped to the same virtual interface.
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦THIS TUESDAY- GitLab awards $ 20,000 to researchers reporting remote code execution vulnerabilities :
t.me/UndercodeTesting
π¦π·π°πΏ'πΎ πΎπΏπ¬π½πΏ
1) According to the bug bounty hunter, if the vulnerability is exploited by an attacker, it may be used to "read any file on the server, including tokens, private data, and configuration." Both the GitLab instance and the GitLab.com domain are affected by this vulnerability, which was judged as a severe level by HackerOne.
2) Bowling added that by using an arbitrary file reading vulnerability to grab information from GitLab's secret_key_base service, the vulnerability can be turned into a remote code execution (RCE) attack. For example, if an attacker changes the secret_key_base of his instance to match the project, the cookie service can also be manipulated to trigger RCE attacks.
3) Bowling sent the vulnerability to the GitLab security team. The engineers reproduced the problem and pointed out that the attacker must at least become a project member to exploit the vulnerability, but according to GitLab senior engineer Heinrich Lee Yu, the attacker can also "create himself Projects or groups to achieve the same purpose. "
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦THIS TUESDAY- GitLab awards $ 20,000 to researchers reporting remote code execution vulnerabilities :
t.me/UndercodeTesting
π¦π·π°πΏ'πΎ πΎπΏπ¬π½πΏ
1) According to the bug bounty hunter, if the vulnerability is exploited by an attacker, it may be used to "read any file on the server, including tokens, private data, and configuration." Both the GitLab instance and the GitLab.com domain are affected by this vulnerability, which was judged as a severe level by HackerOne.
2) Bowling added that by using an arbitrary file reading vulnerability to grab information from GitLab's secret_key_base service, the vulnerability can be turned into a remote code execution (RCE) attack. For example, if an attacker changes the secret_key_base of his instance to match the project, the cookie service can also be manipulated to trigger RCE attacks.
3) Bowling sent the vulnerability to the GitLab security team. The engineers reproduced the problem and pointed out that the attacker must at least become a project member to exploit the vulnerability, but according to GitLab senior engineer Heinrich Lee Yu, the attacker can also "create himself Projects or groups to achieve the same purpose. "
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
>>> EHTOOLS <<<
itS a best collection of hacking tools and scripts . Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework
is a framework of serious penetration tools that can be explored easily from within it. This
powerful and simple tool can be used for everything from installing new add-ons to grabbing
a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.
π¦ simply open terminal or termux and type:
> cd Desktop
> git clone https://github.com/entynetproject/ehtools.git
>>> Ehtools installation
cd ehtools
chmod +x install.sh
./install.sh
>>> Ehtools uninstallation
cd ehtools
chmod +x uninstall.sh
./uninstall.sh
Now use tool and enjoy its functionality
Stay blesseed && Happy
Powered by SAMI
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
>>> EHTOOLS <<<
itS a best collection of hacking tools and scripts . Wi-Fi tools keep getting more and more accessible to beginners, and the Ehtools Framework
is a framework of serious penetration tools that can be explored easily from within it. This
powerful and simple tool can be used for everything from installing new add-ons to grabbing
a WPA handshake in a matter of seconds. Plus, it's easy to install, set up, and utilize.
π¦ simply open terminal or termux and type:
> cd Desktop
> git clone https://github.com/entynetproject/ehtools.git
>>> Ehtools installation
cd ehtools
chmod +x install.sh
./install.sh
>>> Ehtools uninstallation
cd ehtools
chmod +x uninstall.sh
./uninstall.sh
Now use tool and enjoy its functionality
Stay blesseed && Happy
Powered by SAMI
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ANDROID HACKING
> I got bunch of hacking tools and android hacking apps that can change your perception of android smartphone security and computer privacy as
> github.com tools
1. Kali Linux for Smartphones
Kali Linux on any Android Phone or Tablet. Getting Kali Linux to run on ARM hardware has been a major goal for us since day one. In fact, the developers of Linux Deploy have made it extremely easy to get any number of Linux distributions installed in a chroot environment using a simple GUI builder.
2. Faceniff for Android
FaceNiff is a well-known application in certain circles on the Android OS that allows you to scan and intercept Internet sessions. The functionality of the utilities will provide an opportunity to hack into the accounts even if an encrypted network (WPA2). FaceNiff is used to intercept web sessions. The application works as follows. You connect to a public Wi-fi network. The utility scans the shared access point and determines the sessions available for interception. The user selects the "victim" and, after seconds of waiting, can already send messages on behalf of the "victim" from her account in the social network or forum, make orders on the site, as well as carry out other illegal actions.
3. Androrat
AndroRAT is a tool for Windows that allows us to control remotely any Android device from a PC. With this app, users can connect to a smartphone or tablet and receive information from it. However, it's a program that is based on an old vulnerability of the operating system that has been corrected in modern versions of Android.
This program offers us a user interface developed in Java and allows us to easily connect to any device by entering data such as its IP address or port number to complete the connection. The latter is enabled by sending an SMS or making a call.
4. Droidsheep for Android
DroidSheep is an open-source Android application made by Corsin Camichel that allows you to intercept unprotected web-browser sessions using WiFi. DroidSheep APK is a software developed only for testing security vulnerabilities and it is not made for harming any person. It works on Android platform and in order to use DroidSheep you need to have your device rooted. DroidSheep is bundled as an APK file, but if you want the source code, you can get it from original author's Github repo. This is not managed by Corsin Camichel and the content of this website should be used only as instructions.
5. zAnti for Android
zANTI is a mobile penetration testing toolkit that lets security managers assess the risk level of a network with the push of a button. This easy to use mobile toolkit enables IT Security Administrators to simulate an advanced attacker to identify the malicious techniques they use in the wild to compromise the corporate network
6. DroidJack RAT
DroidJack is an android RAT which gives you the power to establish control over your victim's Android devices with an easy to use GUI and all the features you need to monitor them
7. dSploit for AndroiD
If you're the admin of a WiFi network, you'll be interested in controlling all its different aspects. dSploit is an application that allows you to do so, although it's true that some of its functions go way beyond simple control features and we could even discuss whether they're legal or not.
It's an application that allows us to audit a wireless network carrying out a complete mapping process to search for vulnerabilities capable of detecting all the devices connected to it, being able to intercept their traffic in real time. Therefore, its use is only recommended for those cases in which the user is the owner and admin of the WiFi network in question, and that the app is only going to be used for security and maintenance reasons, not attempting to violate the users' privacy.
π¦ANDROID HACKING
> I got bunch of hacking tools and android hacking apps that can change your perception of android smartphone security and computer privacy as
> github.com tools
1. Kali Linux for Smartphones
Kali Linux on any Android Phone or Tablet. Getting Kali Linux to run on ARM hardware has been a major goal for us since day one. In fact, the developers of Linux Deploy have made it extremely easy to get any number of Linux distributions installed in a chroot environment using a simple GUI builder.
2. Faceniff for Android
FaceNiff is a well-known application in certain circles on the Android OS that allows you to scan and intercept Internet sessions. The functionality of the utilities will provide an opportunity to hack into the accounts even if an encrypted network (WPA2). FaceNiff is used to intercept web sessions. The application works as follows. You connect to a public Wi-fi network. The utility scans the shared access point and determines the sessions available for interception. The user selects the "victim" and, after seconds of waiting, can already send messages on behalf of the "victim" from her account in the social network or forum, make orders on the site, as well as carry out other illegal actions.
3. Androrat
AndroRAT is a tool for Windows that allows us to control remotely any Android device from a PC. With this app, users can connect to a smartphone or tablet and receive information from it. However, it's a program that is based on an old vulnerability of the operating system that has been corrected in modern versions of Android.
This program offers us a user interface developed in Java and allows us to easily connect to any device by entering data such as its IP address or port number to complete the connection. The latter is enabled by sending an SMS or making a call.
4. Droidsheep for Android
DroidSheep is an open-source Android application made by Corsin Camichel that allows you to intercept unprotected web-browser sessions using WiFi. DroidSheep APK is a software developed only for testing security vulnerabilities and it is not made for harming any person. It works on Android platform and in order to use DroidSheep you need to have your device rooted. DroidSheep is bundled as an APK file, but if you want the source code, you can get it from original author's Github repo. This is not managed by Corsin Camichel and the content of this website should be used only as instructions.
5. zAnti for Android
zANTI is a mobile penetration testing toolkit that lets security managers assess the risk level of a network with the push of a button. This easy to use mobile toolkit enables IT Security Administrators to simulate an advanced attacker to identify the malicious techniques they use in the wild to compromise the corporate network
6. DroidJack RAT
DroidJack is an android RAT which gives you the power to establish control over your victim's Android devices with an easy to use GUI and all the features you need to monitor them
7. dSploit for AndroiD
If you're the admin of a WiFi network, you'll be interested in controlling all its different aspects. dSploit is an application that allows you to do so, although it's true that some of its functions go way beyond simple control features and we could even discuss whether they're legal or not.
It's an application that allows us to audit a wireless network carrying out a complete mapping process to search for vulnerabilities capable of detecting all the devices connected to it, being able to intercept their traffic in real time. Therefore, its use is only recommended for those cases in which the user is the owner and admin of the WiFi network in question, and that the app is only going to be used for security and maintenance reasons, not attempting to violate the users' privacy.
8. Spymax RAT
Spy MAX is a remote administration tools allows a user to control the system with a Graphical User Interface (GUI). It is capable of taking complete control of victim's mobile. It has many features which allows a user to access android as an administrator. SpyMax is the upgraded version of Spynote that has the most powerful remote features. Spymax is more powerful then spynote .You can bypass Google play protected easily with SpyMax and can hack android pie (9.0).
9. Spynote RAT
Remote Access Trojans (RATs) for Android devices may pack a lot of features that enable their authors with the ability to carry out a broad range of unsafe operations on the infected device. One of the more popular Android RAT projects is SpyNote, and its full source code can be found on many hacking forums. One of the scary things about the SpyNote RAT is that it is absolutely free to use so that anyone can start distributing their unique version of it. Furthermore, criminals who are experienced with programming can write additional modules to extend the SpyNote RAT's features.
10. Dendroid RAT
Dendroid is malware that affects Android OS and targets the mobile platform. It was first discovered in early of 2014 by Symantec and appeared in the underground for sale for $300. Certain features were noted as being used in Dendroid, such as the ability to hide from emulators at the time.
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Spy MAX is a remote administration tools allows a user to control the system with a Graphical User Interface (GUI). It is capable of taking complete control of victim's mobile. It has many features which allows a user to access android as an administrator. SpyMax is the upgraded version of Spynote that has the most powerful remote features. Spymax is more powerful then spynote .You can bypass Google play protected easily with SpyMax and can hack android pie (9.0).
9. Spynote RAT
Remote Access Trojans (RATs) for Android devices may pack a lot of features that enable their authors with the ability to carry out a broad range of unsafe operations on the infected device. One of the more popular Android RAT projects is SpyNote, and its full source code can be found on many hacking forums. One of the scary things about the SpyNote RAT is that it is absolutely free to use so that anyone can start distributing their unique version of it. Furthermore, criminals who are experienced with programming can write additional modules to extend the SpyNote RAT's features.
10. Dendroid RAT
Dendroid is malware that affects Android OS and targets the mobile platform. It was first discovered in early of 2014 by Symantec and appeared in the underground for sale for $300. Certain features were noted as being used in Dendroid, such as the ability to hide from emulators at the time.
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ FRESH PREMIUM PROXIES FROM 1 MINUTE :
36.67.223.67 57877 ID Indonesia elite proxy no no 1 minute ago
192.140.42.81 39292 BR Brazil elite proxy no no 1 minute ago
5.190.63.55 8080 IR Iran elite proxy no yes 1 minute ago
5.63.165.178 40561 AM Armenia elite proxy no no 1 minute ago
104.148.76.178 3128 US United States elite proxy no no 1 minute ago
103.220.207.242 32227 BD Bangladesh elite proxy no no 1 minute ago
103.78.75.165 8080 ID Indonesia anonymous no yes 1 minute ago
220.247.174.12 54661 ID Indonesia elite proxy no yes 1 minute ago
88.99.10.250 1080 DE Germany elite proxy no yes 1 minute ago
91.209.11.131 80 UA Ukraine transparent no no 1 minute ago
202.165.47.26 8080 ID Indonesia anonymous no no 1 minute ago
186.15.233.218 45999 CR Costa Rica elite proxy no yes 1 minute ago
181.168.206.106 38024 AR Argentina elite proxy no no 1 minute ago
85.10.219.100 1080 DE Germany elite proxy no yes 1 minute ago
119.226.97.170 8080 IN India elite proxy no yes 1 minute ago
103.140.24.21 34925 BD Bangladesh elite proxy no yes 1 minute ago
103.216.82.44 8080 IN India elite proxy no yes 1 minute ago
101.109.255.17 48661 TH Thailand elite proxy no yes 1 minute ago
117.212.194.240 39470 IN India elite proxy no yes 1 minute ago
88.99.10.251 1080 DE Germany elite proxy no yes 1 minute ago
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ FRESH PREMIUM PROXIES FROM 1 MINUTE :
36.67.223.67 57877 ID Indonesia elite proxy no no 1 minute ago
192.140.42.81 39292 BR Brazil elite proxy no no 1 minute ago
5.190.63.55 8080 IR Iran elite proxy no yes 1 minute ago
5.63.165.178 40561 AM Armenia elite proxy no no 1 minute ago
104.148.76.178 3128 US United States elite proxy no no 1 minute ago
103.220.207.242 32227 BD Bangladesh elite proxy no no 1 minute ago
103.78.75.165 8080 ID Indonesia anonymous no yes 1 minute ago
220.247.174.12 54661 ID Indonesia elite proxy no yes 1 minute ago
88.99.10.250 1080 DE Germany elite proxy no yes 1 minute ago
91.209.11.131 80 UA Ukraine transparent no no 1 minute ago
202.165.47.26 8080 ID Indonesia anonymous no no 1 minute ago
186.15.233.218 45999 CR Costa Rica elite proxy no yes 1 minute ago
181.168.206.106 38024 AR Argentina elite proxy no no 1 minute ago
85.10.219.100 1080 DE Germany elite proxy no yes 1 minute ago
119.226.97.170 8080 IN India elite proxy no yes 1 minute ago
103.140.24.21 34925 BD Bangladesh elite proxy no yes 1 minute ago
103.216.82.44 8080 IN India elite proxy no yes 1 minute ago
101.109.255.17 48661 TH Thailand elite proxy no yes 1 minute ago
117.212.194.240 39470 IN India elite proxy no yes 1 minute ago
88.99.10.251 1080 DE Germany elite proxy no yes 1 minute ago
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ 2020 RANSOWARE:
twitter.com/UndercodeNews
π¦FEATURES :
Features
Generate a ransomware payload
With or without GUI payload
FUD (Fully Undetectable by Anti-Virus)
Works on Windows, MacOS and Linux
Super fast encryption with PyCrypto
Compile to EXE, APP or Unix/Linux executable
Custom icon for your EXE payload
Receive keys of victims
Decrypt files
Demo mode (payload won't encrypt anything)
Fullscreen mode (Warning takes over the screen)
Custom warning message for your victim
Custom image in your payload
Ghost mode (Rename by adding .DEMON extention instead of encrypting the files)
Multiple encryption methods
Select file extentions to target
Decide if payload should self-destruct (Console mode feature only)
Decide wich drive to target for encryption (working directory)
Verified server access through port forwarding VPN
π¦πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/leonv024/RAASNet.git
2) pip3 install -r requirements.txt
python3 RAASNet.py
π¦ On Linux, you might need to install these packages:
1) sudo apt install python3-tk python3-pil python3-pil.imagetk
Testing connection with remote server:
2) # Change the host and port in test_socket.py, default is 127.0.0.1 on port 8989
3) python3 test_socket.py
E N J O Y
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ 2020 RANSOWARE:
twitter.com/UndercodeNews
π¦FEATURES :
Features
Generate a ransomware payload
With or without GUI payload
FUD (Fully Undetectable by Anti-Virus)
Works on Windows, MacOS and Linux
Super fast encryption with PyCrypto
Compile to EXE, APP or Unix/Linux executable
Custom icon for your EXE payload
Receive keys of victims
Decrypt files
Demo mode (payload won't encrypt anything)
Fullscreen mode (Warning takes over the screen)
Custom warning message for your victim
Custom image in your payload
Ghost mode (Rename by adding .DEMON extention instead of encrypting the files)
Multiple encryption methods
Select file extentions to target
Decide if payload should self-destruct (Console mode feature only)
Decide wich drive to target for encryption (working directory)
Verified server access through port forwarding VPN
π¦πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/leonv024/RAASNet.git
2) pip3 install -r requirements.txt
python3 RAASNet.py
π¦ On Linux, you might need to install these packages:
1) sudo apt install python3-tk python3-pil python3-pil.imagetk
Testing connection with remote server:
2) # Change the host and port in test_socket.py, default is 127.0.0.1 on port 8989
3) python3 test_socket.py
E N J O Y
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
X (formerly Twitter)
UNDERCODE NEWS (@UndercodeNews) on X
π¦ Latest in Cyber & Tech News with AI-Powered Analysis and Fact Checking.
γjoin us: https://t.co/YVv330UsjQ
More: @DailyCve @UndercodeUpdate
γjoin us: https://t.co/YVv330UsjQ
More: @DailyCve @UndercodeUpdate
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ 2020 RANSOWARE:
twitter.com/UndercodeNews
π¦FEATURES :
Features
Generate a ransomware payload
With or without GUI payload
FUD (Fully Undetectable by Anti-Virus)
Works on Windows, MacOS and Linux
Super fast encryption with PyCrypto
Compile to EXE, APP or Unix/Linux executable
Custom icon for your EXE payload
Receive keys of victims
Decrypt files
Demo mode (payload won't encrypt anything)
Fullscreen mode (Warning takes over the screen)
Custom warning message for your victim
Custom image in your payload
Ghost mode (Rename by adding .DEMON extention instead of encrypting the files)
Multiple encryption methods
Select file extentions to target
Decide if payload should self-destruct (Console mode feature only)
Decide wich drive to target for encryption (working directory)
Verified server access through port forwarding VPN
π¦πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/leonv024/RAASNet.git
2) pip3 install -r requirements.txt
python3 RAASNet.py
π¦ On Linux, you might need to install these packages:
1) sudo apt install python3-tk python3-pil python3-pil.imagetk
Testing connection with remote server:
2) # Change the host and port in test_socket.py, default is 127.0.0.1 on port 8989
3) python3 test_socket.py
E N J O Y
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ 2020 RANSOWARE:
twitter.com/UndercodeNews
π¦FEATURES :
Features
Generate a ransomware payload
With or without GUI payload
FUD (Fully Undetectable by Anti-Virus)
Works on Windows, MacOS and Linux
Super fast encryption with PyCrypto
Compile to EXE, APP or Unix/Linux executable
Custom icon for your EXE payload
Receive keys of victims
Decrypt files
Demo mode (payload won't encrypt anything)
Fullscreen mode (Warning takes over the screen)
Custom warning message for your victim
Custom image in your payload
Ghost mode (Rename by adding .DEMON extention instead of encrypting the files)
Multiple encryption methods
Select file extentions to target
Decide if payload should self-destruct (Console mode feature only)
Decide wich drive to target for encryption (working directory)
Verified server access through port forwarding VPN
π¦πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/leonv024/RAASNet.git
2) pip3 install -r requirements.txt
python3 RAASNet.py
π¦ On Linux, you might need to install these packages:
1) sudo apt install python3-tk python3-pil python3-pil.imagetk
Testing connection with remote server:
2) # Change the host and port in test_socket.py, default is 127.0.0.1 on port 8989
3) python3 test_socket.py
E N J O Y
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
X (formerly Twitter)
UNDERCODE NEWS (@UndercodeNews) on X
π¦ Latest in Cyber & Tech News with AI-Powered Analysis and Fact Checking.
γjoin us: https://t.co/YVv330UsjQ
More: @DailyCve @UndercodeUpdate
γjoin us: https://t.co/YVv330UsjQ
More: @DailyCve @UndercodeUpdate
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ HOW OPEN IMAGES IN TERMUX OR TERMINAL ?
Ubuntu -Debian -
sudo apt-get update && sudo apt-get install imagemagick
CentOS:
sudo yum update && sudo yum install ImageMagick
Fedora:
sudo dnf update && sudo dnf install ImageMagick
OpenSUSE:
sudo zypper refresh && sudo zypper install ImageMagick
Arch Linux:
pacman -Sy imagemagick
π¦ Using ImageMagick to display a file
To display an image file, run display <file name>. For example:
> go to image location then
>display logo.jpg
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ HOW OPEN IMAGES IN TERMUX OR TERMINAL ?
Ubuntu -Debian -
sudo apt-get update && sudo apt-get install imagemagick
CentOS:
sudo yum update && sudo yum install ImageMagick
Fedora:
sudo dnf update && sudo dnf install ImageMagick
OpenSUSE:
sudo zypper refresh && sudo zypper install ImageMagick
Arch Linux:
pacman -Sy imagemagick
π¦ Using ImageMagick to display a file
To display an image file, run display <file name>. For example:
> go to image location then
>display logo.jpg
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β