β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Carding 2020 How to create free .edu email
π¦ Part 1:
> Step 1: Go to this https://www.apply.vccs.edu/Home/Sign_In/Logon.aspx and solve captcha. Then Click on new user and then sign up with email.
> Step 2: To fill the detail you can use your real name and email but if you are not an US citizen then you can use this (https://www.fakeaddressgenerator.com/usa_address_generator) to generate fake user detail. [For temporary email you can go https://emailfake.com/.] For Eg:
π¦Full Name Mary N Morey
Gender female
Title Mrs.
Race Black
Birthday 11/16/1957
Social Security Number 306-90-8491
π¦[Note: Save name, username and password in notepad or somewhere it may need later]
Step 3: After filling all the detail click on submit.
Now that you have created account lets move on to part two of this tutorial.
π¦Part 2:
After creating account and loging into click on Apply Now. Select any college name from the list and click on Apply. A pop-up will open then click on Apply Now (OR CONTINUE APPLICATION) BUTTON. Then you are asked for different questions. You can answer these questions randomly or you can use the detail below to answer these questions.
First name and last name: Put the name that you have entered in part 1. Leave other field empty.
Birthdate, Social Security Number: Enter details which was generated from this https://www.fakeaddressgenerator.com/usa_address_generator .
Gender: Male/Female (as you like)
Racial or ethnic identification: White
Hispanico or Latino : No
Have you ever applied, attended β¦β¦ : No
After that click on Save and Continue.
For Mailing address use the detail generated from this link.
Is this your permanent address: Yes
You can leave telephone number blank.
Then check on I have reviewed the guidelines box and click on save and continue.
Which β¦.. high school education: I donβt have a GED/High β¦β¦.
Last date attended: 01/2017
Highest grade completed: 11th grade.
Have you ever attend β¦. : No
I have planned to earn a degreeβ¦..: No
I plan to start class: Choose any
After that click on Save and Continue.
Have you ever served β¦β¦.. military: No
Are you β¦β¦.. military: No
After that click on Save and Continue.
Parent 1 and 2: Choose any.
What is your current status?: Native USβ¦β¦
Primary spoken language: English
Do you wantβ¦β¦: No
After that click on Submit your completed application.
π¦ Part 3.
> After successfully completing the application put on your signature i.e your full name. Then you will be redirect to with all your detail. Under the student information you will get your username and temporary password. Note down that password, username and other details.
> After that you can go> if link not open try later then works because this anonymously https://bit.ly/38wwKJc and login where you will get your .edu email.
> NOTE: It will take more than 6hours for the login credentials to activate. So you will get error that your username and password is invalid
WRITTEN BY UNDER CODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Carding 2020 How to create free .edu email
π¦ Part 1:
> Step 1: Go to this https://www.apply.vccs.edu/Home/Sign_In/Logon.aspx and solve captcha. Then Click on new user and then sign up with email.
> Step 2: To fill the detail you can use your real name and email but if you are not an US citizen then you can use this (https://www.fakeaddressgenerator.com/usa_address_generator) to generate fake user detail. [For temporary email you can go https://emailfake.com/.] For Eg:
π¦Full Name Mary N Morey
Gender female
Title Mrs.
Race Black
Birthday 11/16/1957
Social Security Number 306-90-8491
π¦[Note: Save name, username and password in notepad or somewhere it may need later]
Step 3: After filling all the detail click on submit.
Now that you have created account lets move on to part two of this tutorial.
π¦Part 2:
After creating account and loging into click on Apply Now. Select any college name from the list and click on Apply. A pop-up will open then click on Apply Now (OR CONTINUE APPLICATION) BUTTON. Then you are asked for different questions. You can answer these questions randomly or you can use the detail below to answer these questions.
First name and last name: Put the name that you have entered in part 1. Leave other field empty.
Birthdate, Social Security Number: Enter details which was generated from this https://www.fakeaddressgenerator.com/usa_address_generator .
Gender: Male/Female (as you like)
Racial or ethnic identification: White
Hispanico or Latino : No
Have you ever applied, attended β¦β¦ : No
After that click on Save and Continue.
For Mailing address use the detail generated from this link.
Is this your permanent address: Yes
You can leave telephone number blank.
Then check on I have reviewed the guidelines box and click on save and continue.
Which β¦.. high school education: I donβt have a GED/High β¦β¦.
Last date attended: 01/2017
Highest grade completed: 11th grade.
Have you ever attend β¦. : No
I have planned to earn a degreeβ¦..: No
I plan to start class: Choose any
After that click on Save and Continue.
Have you ever served β¦β¦.. military: No
Are you β¦β¦.. military: No
After that click on Save and Continue.
Parent 1 and 2: Choose any.
What is your current status?: Native USβ¦β¦
Primary spoken language: English
Do you wantβ¦β¦: No
After that click on Submit your completed application.
π¦ Part 3.
> After successfully completing the application put on your signature i.e your full name. Then you will be redirect to with all your detail. Under the student information you will get your username and temporary password. Note down that password, username and other details.
> After that you can go> if link not open try later then works because this anonymously https://bit.ly/38wwKJc and login where you will get your .edu email.
> NOTE: It will take more than 6hours for the login credentials to activate. So you will get error that your username and password is invalid
WRITTEN BY UNDER CODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
www.apply.vccs.edu
Apply to Virginia's Community Colleges - Sign In
College advice, college admission applications, pay for college, financial aid, scholarships, apply online for admission, online applications at Xap.
π¦ About X100 VERIFIED NORDVPN PREMIUM , send screanshoats to @UNDERCODE_TESTING
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Crack Evernote (Android version)-advanced account features
Refer to the previous article " Cracking Evernote (Android version)-password lock function ".
t.me/UndercodeTesting
π¦ Required tools:
1)java environment, the rationale for changing the apk
2) The rationale for changing the apk (Android decompilation-ApkIDE3.1):
3 ) The cracked apk (Android version)
> get from here https://t.me/UnderCodeTesting/1376
π¦ Two points need to be modified:
β Account type function
β‘Block the prompt of "Premium account has expired" in the notification bar
π¦ Modification process:
β Modify account type function
According to the modification in the previous article:
. \ smali \ com \ evernote \ ui \ EvernotePreferenceActivity.smali
among them,
raa () is equal to 1, that is, "NORMAL", ordinary users
this.h.ah (), the current user permissions,
From the. \ Smali \ com \ evernote \ d \ f \ r.smali file, you can get the permission relationship:
a = 1, "NORMAL"
b = 3, "PREMIUM"
c = 5, "VIP"
d = 7, "MANAGER"
e = 8, "SUPPORT"
f = 9, "ADMIN"
The ah () function exists in the. \ smali \ com \ evernote \ client \ b.smali file,
The ah () function code:
change into
Make the ah () function return value: 3, that is, "PREMIUM"
β‘ Block the prompt of "Premium account has expired" in the notification bar
The process of positioning and modifying the position,
1.
<string name = "premium_downgrade_title"> Premium account has expired </ string>
<string name = "premium_downgrade_text"> Renew premium account </ string>
2.
<public type = "string" name = "premium_downgrade_title" id = "0x7f0703ab" />
<public type = "string" name = "premium_downgrade_text" id = "0x7f0703ac" />
3- final step :
. \ smali \ com \ evernote \ util \ bz.smali
Add a line of code at the beginning of the function, return-void
EVERYNOTE CLICK HERE OFFICIAL SITE
ENJOY
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Crack Evernote (Android version)-advanced account features
Refer to the previous article " Cracking Evernote (Android version)-password lock function ".
t.me/UndercodeTesting
π¦ Required tools:
1)java environment, the rationale for changing the apk
2) The rationale for changing the apk (Android decompilation-ApkIDE3.1):
3 ) The cracked apk (Android version)
> get from here https://t.me/UnderCodeTesting/1376
π¦ Two points need to be modified:
β Account type function
β‘Block the prompt of "Premium account has expired" in the notification bar
π¦ Modification process:
β Modify account type function
According to the modification in the previous article:
. \ smali \ com \ evernote \ ui \ EvernotePreferenceActivity.smali
among them,
raa () is equal to 1, that is, "NORMAL", ordinary users
this.h.ah (), the current user permissions,
From the. \ Smali \ com \ evernote \ d \ f \ r.smali file, you can get the permission relationship:
a = 1, "NORMAL"
b = 3, "PREMIUM"
c = 5, "VIP"
d = 7, "MANAGER"
e = 8, "SUPPORT"
f = 9, "ADMIN"
The ah () function exists in the. \ smali \ com \ evernote \ client \ b.smali file,
The ah () function code:
change into
Make the ah () function return value: 3, that is, "PREMIUM"
β‘ Block the prompt of "Premium account has expired" in the notification bar
The process of positioning and modifying the position,
1.
<string name = "premium_downgrade_title"> Premium account has expired </ string>
<string name = "premium_downgrade_text"> Renew premium account </ string>
2.
<public type = "string" name = "premium_downgrade_title" id = "0x7f0703ab" />
<public type = "string" name = "premium_downgrade_text" id = "0x7f0703ac" />
3- final step :
. \ smali \ com \ evernote \ util \ bz.smali
Add a line of code at the beginning of the function, return-void
EVERYNOTE CLICK HERE OFFICIAL SITE
ENJOY
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Hackers stole 63.2GB of source code from Microsoft's private GitHub repository :
twitter.com/UndercodeNews
1) After announcing the successful invasion of Tokopedia, an Indonesian company, on March 28 this year, the hacker recently released heavy news that he had stolen .dump files with a capacity of more than 63.2GB from Microsoft's private GitHub repository. According to the screenshot of the file's directory listing, the dump file covers Azure, Office and some Windows runtimes.
2) This news was subsequently confirmed by the Twitter account of the data breach monitoring and prevention service organization Under the Breach. It should be noted that despite the large scale of the leaked source code, it does not mean that hackers will obtain Microsoft's core business secrets.
3) The content stored by Microsoft in the GitHub repository is generally public, even if it is stored in a private warehouse. The content is the same, and Microsoft will strictly screen the uploaded code to prevent leakage.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Hackers stole 63.2GB of source code from Microsoft's private GitHub repository :
twitter.com/UndercodeNews
1) After announcing the successful invasion of Tokopedia, an Indonesian company, on March 28 this year, the hacker recently released heavy news that he had stolen .dump files with a capacity of more than 63.2GB from Microsoft's private GitHub repository. According to the screenshot of the file's directory listing, the dump file covers Azure, Office and some Windows runtimes.
2) This news was subsequently confirmed by the Twitter account of the data breach monitoring and prevention service organization Under the Breach. It should be noted that despite the large scale of the leaked source code, it does not mean that hackers will obtain Microsoft's core business secrets.
3) The content stored by Microsoft in the GitHub repository is generally public, even if it is stored in a private warehouse. The content is the same, and Microsoft will strictly screen the uploaded code to prevent leakage.
WRITTEN BY UNDERCODE
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
X (formerly Twitter)
UNDERCODE NEWS (@UndercodeNews) on X
π¦ Latest in Cyber & Tech News with AI-Powered Analysis and Fact Checking.
γjoin us: https://t.co/YVv330UsjQ
More: @DailyCve @UndercodeUpdate
γjoin us: https://t.co/YVv330UsjQ
More: @DailyCve @UndercodeUpdate
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Enumall β Subdomain Discovery Using Recon-ng & AltDNS :
t.me/UndercodeTesting
π¦INSTALLISATION & RUN :
1) Setting up Enumall for Subdomain Discovery
Install recon-ng from Source, clone the Recon-ng repository:
> git clone https://LaNMaSteR53@bitbucket.org/LaNMaSteR53/recon-ng.git
2) Change into the Recon-ng directory:
cd recon-ng
3) Install dependencies:
> pip install -r REQUIREMENTS
4) Link the installation directory to /usr/share/recon-ng
ln -s /$recon-ng_path /usr/share/recon-ng
5) Optionally (highly recommended) download:
β AltDNS
β A good subdomain bruteforce list (example here)
6) Create the config.py file and specify the path to Recon-ng and AltDNS as it showed in config_sample.py.
π¦ Basic Usage for Subdomain Enumeration
./enumall.py domain.com
> Also supports:
-w to run a custom wordlist with recon-ng
-a to use alt-dns
-p to feed a custom permutations list to alt-dns (requires -a flag)
-i to feed a list of domains (can also type extra domains into the original command)
> -i to feed a list of domains (can also type extra domains into the original command)
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Enumall β Subdomain Discovery Using Recon-ng & AltDNS :
t.me/UndercodeTesting
π¦INSTALLISATION & RUN :
1) Setting up Enumall for Subdomain Discovery
Install recon-ng from Source, clone the Recon-ng repository:
> git clone https://LaNMaSteR53@bitbucket.org/LaNMaSteR53/recon-ng.git
2) Change into the Recon-ng directory:
cd recon-ng
3) Install dependencies:
> pip install -r REQUIREMENTS
4) Link the installation directory to /usr/share/recon-ng
ln -s /$recon-ng_path /usr/share/recon-ng
5) Optionally (highly recommended) download:
β AltDNS
β A good subdomain bruteforce list (example here)
6) Create the config.py file and specify the path to Recon-ng and AltDNS as it showed in config_sample.py.
π¦ Basic Usage for Subdomain Enumeration
./enumall.py domain.com
> Also supports:
-w to run a custom wordlist with recon-ng
-a to use alt-dns
-p to feed a custom permutations list to alt-dns (requires -a flag)
-i to feed a list of domains (can also type extra domains into the original command)
> -i to feed a list of domains (can also type extra domains into the original command)
@UndercodeTesting
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Qewe ransomware:
t.me/UndercodeTesting
π¦ This is the detailed information of Qewe ransomware:
1) Ransomware family3 DJVU / STOP4 Ransomware
2) extension .qewe
3) Ransomware considerations _readme.txt
ransom From US $ 490 to US $ 980 (in Bitcoin)
contact helpdatarestore@firemail.cc , helpmanager@mail.ch
Detect5 Generik.CNMFSW , Generik.ETDNQBV , Backdoor: MSIL / Noancooe.A
3) Symptoms Your file (photo, video, document) has .qewe extension and you cannot open it
4) The encryption algorithm used by Qewe is AES-256. Therefore, if your document is encrypted with a specific decryption key, this is completely different and there are no other copies. The sad reality is that without a unique key, it is impossible to recover information.
5) If Qewe works in online mode, you will not be able to access the AES-256 key. It is stored on a remote server owned by a fraudster who promoted Qewe infection.
6) To get the decryption key, you should pay $ 980. To obtain payment details, the message in the message encourages the
π¦ Qewe ransomware:
t.me/UndercodeTesting
π¦ This is the detailed information of Qewe ransomware:
1) Ransomware family3 DJVU / STOP4 Ransomware
2) extension .qewe
3) Ransomware considerations _readme.txt
ransom From US $ 490 to US $ 980 (in Bitcoin)
contact helpdatarestore@firemail.cc , helpmanager@mail.ch
Detect5 Generik.CNMFSW , Generik.ETDNQBV , Backdoor: MSIL / Noancooe.A
3) Symptoms Your file (photo, video, document) has .qewe extension and you cannot open it
4) The encryption algorithm used by Qewe is AES-256. Therefore, if your document is encrypted with a specific decryption key, this is completely different and there are no other copies. The sad reality is that without a unique key, it is impossible to recover information.
5) If Qewe works in online mode, you will not be able to access the AES-256 key. It is stored on a remote server owned by a fraudster who promoted Qewe infection.
6) To get the decryption key, you should pay $ 980. To obtain payment details, the message in the message encourages the
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦CARDING Methods that are used by carders to steal sensitive information :
t.me/UndercodeTesting
1) Malware. Malware that is mostly used for carding includes these categories: Trojan horses, rootkits, backdoors, etc. Each of these viruses can be installed on the system without any permission asked and then used to get the backdoor access to the system.
> These viruses can hide deep in the system as long as they need to collect the required amount of personal data. They can track their victims by recording their keystrokes or taking the screenshots of their desktops while they are using the Internet. After collecting financial information and other sensitive data, they send it to their remote server.
> The latest threat to watch out is βBackoff virusβ, which is set to track PC users and steal their credit card data.
2) Phishing. People engaged in carding sometimes use phishing websites to trick users into revealing their financial information. These sites look like real login websites because they are developed by grabbing images from real websites and using URLs that are very close to the real ones. Also, victims can also receive fake email messages resembling reputable companies. They seek to make the victim reveal his/hers credit card number, expiration date, and similar sensitive information.
3) Carding forums. If the carder is not willing to use malware or if he/she simply does not know how to do that, he/she can use carding forums to receive needed information. Such forums have already become marketplaces used for such illegal activities as exchanging information related to stolen credit or debit card account numbers and similar data. The membership on such sites is usually paid, and only online nicknames can identify each of carders.
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦CARDING Methods that are used by carders to steal sensitive information :
t.me/UndercodeTesting
1) Malware. Malware that is mostly used for carding includes these categories: Trojan horses, rootkits, backdoors, etc. Each of these viruses can be installed on the system without any permission asked and then used to get the backdoor access to the system.
> These viruses can hide deep in the system as long as they need to collect the required amount of personal data. They can track their victims by recording their keystrokes or taking the screenshots of their desktops while they are using the Internet. After collecting financial information and other sensitive data, they send it to their remote server.
> The latest threat to watch out is βBackoff virusβ, which is set to track PC users and steal their credit card data.
2) Phishing. People engaged in carding sometimes use phishing websites to trick users into revealing their financial information. These sites look like real login websites because they are developed by grabbing images from real websites and using URLs that are very close to the real ones. Also, victims can also receive fake email messages resembling reputable companies. They seek to make the victim reveal his/hers credit card number, expiration date, and similar sensitive information.
3) Carding forums. If the carder is not willing to use malware or if he/she simply does not know how to do that, he/she can use carding forums to receive needed information. Such forums have already become marketplaces used for such illegal activities as exchanging information related to stolen credit or debit card account numbers and similar data. The membership on such sites is usually paid, and only online nicknames can identify each of carders.
written by undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β