UNDERCODE COMMUNITY
2.72K subscribers
1.24K photos
31 videos
2.65K files
83.4K links
๐Ÿฆ‘ Undercode World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE


โœจ Youtube.com/Undercode
by Undercode.help
Download Telegram
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘2020 Best Game Hacker Android Apps 2020 (No Root)

https://gamekiller.co/

https://sbgamehacker.net/

https://creehacks.net/

https://www.luckypatchers.com/

http://leoplaycard.info/


โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Advanced dork Search & Mass Exploit Scanner
> rooted termux/linux

๐Ÿฆ‘FEATURES :

Engines: Google apis cache Bing Ask Yandex Sogou Exalead Shodan
โ— Mass Dork Search
โ— Multiple instant scans.
โ— Mass Exploitation
โ— Use proxy.
โ— Random user agent.
โ— Random engine.
โ— Mass Extern commands execution.
โ— Exploits and issues search.
โ— XSS / SQLI / LFI / AFD scanner.
โ— Filter wordpress & Joomla sites.
โ— Wordpress theme and plugin detection.
โ— Find Admin page.
โ— Decode / Encode Base64 / MD5
โ— Ports scan.
โ— Collect IPs
โ— Collect E-mails.
โ— Auto detect errors.
โ— Auto detect forms.
โ— Auto detect Cms.
โ— Post data.
โ— Auto sequence repeater.
โ— Validation.
โ— Post and Get method
โ— IP Localisation
โ— Issues and Exploit search
โ— Interactive and Normal interface.
โ— And more...

๐Ÿฆ‘INSTALLISATION & RUN :

1) git clone https://github.com/AlisamTechnology/ATSCAN

2) cd ATSCAN

3) chmod +x ./atscan.pl

4) chmod +x ./install.sh

5) ./install.sh

6) Portable Execution: perl ./atscan.pl
Installed Tool Execution: atscan
Menu: Applications > Web Application analysis > atscan

โœ…vERIFIED BY uNDERCODE
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Hack News by Undercode

> The report shows that the botnet will use Baidu Tieba and other common services for management


1) Relevant research reports show that the botnet of the double-gun malicious program is managed by domestic commonly used services.

2) The number of botnets exceeds 100,000. The researchers observed that the double-gun malicious program used Baidu Tieba pictures to distribute configuration files and malware, used Alibaba Cloud storage to host configuration files, and used Baidu statistics to manage the activity of infected hosts. Tencent was also found in malware samples many times. URL of Weiyun.

3) For the first time, it integrates the services of the three major manufacturers of BAT into its own programs. Baidu has taken action to block download links for malicious code.

4) From May 14, we contacted the Baidu security team and took joint action to measure the spread of the malicious code and take countermeasures. As of this writing, the related malicious code download links have been blocked.


โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Hack News by Undercode

> The report shows that the botnet will use Baidu Tieba and other common services for management


1) Relevant research reports show that the botnet of the double-gun malicious program is managed by domestic commonly used services.

2) The number of botnets exceeds 100,000. The researchers observed that the double-gun malicious program used Baidu Tieba pictures to distribute configuration files and malware, used Alibaba Cloud storage to host configuration files, and used Baidu statistics to manage the activity of infected hosts. Tencent was also found in malware samples many times. URL of Weiyun.

3) For the first time, it integrates the services of the three major manufacturers of BAT into its own programs. Baidu has taken action to block download links for malicious code.

4) From May 14, we contacted the Baidu security team and took joint action to measure the spread of the malicious code and take countermeasures. As of this writing, the related malicious code download links have been blocked.


โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Exclusive sharing, STM32 series ID number encryption cracking method -For Experts @UndercodeTesting

1) Read the complete program segment, search the keyword section "E8F7FF 1F", because the unique
96-bit (12 byte) ID base address of STM32 is located at 0x1FFF7E8, if the ID
verification is involved in the program segment , the ID index in the chip will be read The address. .

2) Read the 96-bit (12-byte) ID code of the address of this chip with an anal device, find the empty area,

3) write to this address, and change the index address: for example, the chip ID code is "34 FF DA 05 4E50 38
31 19 65 18 43 "select the starting address area 0x80000020, enter" 34
FF 1843 " in the first four bytes , and enter" 34 FF DA 05 4E 50 38 31 19 65 18 43 "in the last 12 bytes
, the index" E8F7FF1F "in the chip All are changed to "20000008"

> This is a common method of removing soft encryption

โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘For Experts-Case analysis DS28E01 typical application and cracking method by undercode > 2 parts

๐Ÿฆ‘Case DS28E01 Typical Application and Cracking Method
๏ปฟ๏ปฟ
The DS28E01 series of chip decryption has always been consulted by customers. For this reason, our company's engineering technology department decrypted the DS28E01 chip as a typical case to explain it to our customers.
At present, our company specializes in providing
1. Various types of software dog cracking such as: parallel port dongle, USB dongle, license cracking;
2. Modify the software function without source code, encrypt the software after cracking, and repackage;
3. Crack the registration code and enjoy it for life for once;
4. Provide encryption lock revision service;
5. One-stop service for PCB copy board, production and processing.


๐Ÿฆ‘DS28E01 is generally used in encryption protection to prevent products from being easily copied and pirated.

1) The first most popular one is disassembly, decompile the code of the main control chip, and then find the code of encryption verification, jump directly over, or force the verification of the modified memory RAM to be legal.

2) This method is very effective but complicated, and requires The cracker's assembly instructions, chip architecture, encryption chip usage, and development tools for various microcontrollers and controllers are well-versed.

3) Another is that it is not operable from a commercial point of view, because no one can complete it until the crack is completed. It is guaranteed that it can be cracked, but the decrypted machine code must be obtained first, and the customer needs to get the cost of cracking the chip to get the machine code.

4) Finally, the decryption cost of the customer is spent regardless of whether it is successful or not. The second method is to simulate the communication waveform at the time of verification. The slow speed can be simulated by the single-chip microcomputer. The high-speed communication protocol can only use CPLD. However, before this method, one task is to make the main control chip The same random number is generated every time.

โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Brief introduction to DS28E01:

1) The DS28E01 communicates with the MCU through a single bus.

Not much to say about the single bus, the time is very strict and accurate to us level.
DS28E01 has four storage areas:

2) Data memory (EEPROM) (4 pages, 32 bytes per page)
Key storage (secret) (8 bytes)
Register page containing specific functions and user bytes
Volatile scratchpad (scratchpad) (8 bytes)

3) The MCU can only read and write temporary registers through a single bus, but cannot directly read and write other storage areas.

4) When writing data to the data memory, loading the initial key, or writing data to the register page, first write the data to the scratchpad, and then use the corresponding command to let the chip copy the data from the scratchpad to the destination address.

5) working principle:
There is a SHA-160 encryption module inside the chip. The 55 bytes of data in a specific format participating in the SHA algorithm,

6) These data include 8 bytes of key, 5 bytes of user-specified random number, 32 bytes of EEPROM content, 7 bytes of ROMID, 2 bytes of fixed data (0xFF) and 1 byte of EEPROM address TA1.
The MCU can read the 20-byte hash value encrypted by the chip through SHA, and compare it with the hash value calculated by the MCU itself through the same algorithm.

7) Since the MCU wants to perform the same encryption operation, or it must generate 55-byte messages that are exactly the same as inside the chip, how can it be obtained?

The 8-byte key is generated and written by itself.-> OK

The 5-byte random number is the value written into the scratchpad before the chip performs SHA.-> OK
The 32-byte EEPROM data, before reading back the 20-byte hash value, the chip will return the 32-byte content. -> OK
7 bytes ROMID, you can read the ROMID of the chip at any time.-> OK
2 bytes fixed value, see the manual to know-> OK
1 byte TA1, write it in yourself.-> OK

๐Ÿฆ‘Typical application process:
Process 1: Initialize the DS28E01 key
The initialization key is only operated at the factory before the product is produced, and only needs to be operated once.
Procedure flow chart:
1. Read the chip ROMID
2. Generate a unique 64-bit key through a certain algorithm to ensure that the key generated by each motherboard is different.
3. Write the key to the chip temporary storage area, and read back to verify whether the writing is correct
4. Execute the chip load key command to let the chip save the 64-bit key in the temporary storage area to the key storage area
5. Finish.

Process 2: verify the DS28E01 key
The verification key is carried out in the product application. Every time the product is started, the DS28E01 key is verified to be correct.
If the verification is passed, it runs normally. If the verification is not correct, the product will not work properly through certain means.
Procedure flow chart:
1. Read the chip ROMID
2. Generate the 64-bit key by the same algorithm as in the initialization process
3. Write an 8-byte random number to the chip temporary storage area (only 5 bytes are used), and read back to verify
4. Send encrypted authentication commands to the chip, you can read back 32 bytes of EEPROM data and 20 bytes of hash value
5. Use the data read above to generate a 55-byte digest message and perform SHA1 operations
6. Compare whether the calculated hash value is consistent with the hash value read back from the chip

.
๐Ÿฆ‘ The Crack method:

1) As can be seen from the above application process, the key algorithm here is SHA1, and there are two copies of the data involved in the SHA calculation. One copy is inside the chip, and we cannot read it.

2) But the other one is generated inside the MCU, so as long as the process of generating the message inside the MCU is obtained, the crack is completed.

3) The key data is an 8-byte key, because the 8-byte key is generally bound to the ROMID and CPUID,
Therefore, as long as the key generation algorithm can be analyzed from the program, the purpose of cracking can be achieved. This process is only a matter of time


written by Undercode -@Experthacking

โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ What to Use Port Forwarding For ?


Since port forwarding fundamentally changes the way that your network interacts with online requests, it offers many benefits and uses. You can utilize port forwarding to:

1) Connect to video game servers.
One of the most common reasons users want to enable port forwarding is so they can play their favorite online video games. Sometimes, routers will block internet traffic from gaming servers, since they see these connections as potentially unsafe. Similarly, if gamers set up their own private servers so they can play with their friends, their routers might not recognize the port numbers these servers are attached to. Port forwarding can help you and your friends connect to your favorite servers and enjoy playing together.

2) Host servers and applications for the world to view and use.
More tech-savvy users may want to set up servers and applications for their friends, family, or even internet users at large to enjoy. However, if these are linked to unfamiliar ports, your hard work might never make it past their protective routers. Port forwarding can teach routers that allowing others to visit these pages and services is safe and should be allowed.
Improve your connection speed.

3) As we described above, your router usually sorts out internet traffic to determine which requests are โ€œsafeโ€ to send on to your deviceโ€™s private IP address. In addition to being potentially error-prone and unnecessarily restrictive, the routerโ€™s methods can take time. By setting up port forwarding, you can immediately direct online traffic to your device, speeding up your connection. This may be especially helpful for heavy bandwidth online activity, such as gaming, streaming, torrenting, or running complex applications.

4) Protect your online privacy.
The forwarding aspect of port forwarding can also be useful if you want to protect your sensitive information online. By requiring online traffic to have the right key before it can be sent to your private IP address, you can make sure that only those with both your public IP address and your port number can access your device. In addition, when paired with other techniques, port forwarding may be able to relay internet requests sent to an IP address and port to a different IP address. Setting up this kind of system could help mask your true IP address online, so you can browse more anonymously.

5) Virtually access your desktop.
If you want to use a virtual machine and host your desktop on the cloud, you may need to set up port forwarding so that you can pull your information up on whatever device you choose to access it from. With port forwarding, you can retrieve your virtual desktop from whatever private IP address stores it without your router interfering.

6) Back up your files.
Itโ€™s a good idea to save copies of your most important files in a few different online locations. Of course, once you have these backups in place, youโ€™ll also need to be able to securely access them, ideally from any device, anywhere. By setting up port forwarding and storing a backup at your private IP address, you can make sure that you can retrieve your most important data from wherever you are, as long as you know your public IP address and the proper port number.

7) Connect with your VPN (Virtual Private Network) from afar.
If you have a VPN installed on your router at home, you may have trouble accessing its features remotely. Port forwarding can help you enjoy all the speed, privacy, and security features of your VPN while youโ€™re out of the house by providing a fast, safe connection to your private IP address.

@UndercodeTesting > powered by wiki
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Port Forwarding with a VPN How it work ?
> Understanding before attack :

While they are notably different from each other, port forwarding and VPNs do have some overlap. In fact, they can even be combined.

1) Firstly, you may be able to use port forwarding, among other strategies, to create and manage your very own VPN.

2) However, this would take great technical skill, time, and effort to accomplish successfully, so we donโ€™t necessarily encourage you to try, especially when there are great VPN providers whoโ€™ve already done the work for you.

3) In addition, if you have a VPN installed directly onto your router, you can use port forwarding to access your VPN while youโ€™re not within your local network.

4) High-performing ExpressVPN provides a guide on how to do so.

5) Finally, and most conveniently, many VPNs include port forwarding as one of their features. Just as with a regular network, port forwarding can help a VPN more easily access certain sites that its routers or firewalls might intercept.

6) VPN providers that utilize port forwarding recognize the speed, accessibility, and other advantages this technique provides, so they integrate it with their other offerings.

7) In many ways, port forwarding is best used as part of a VPN. The VPN provider usually carefully monitors it to ensure that users enjoy everything it has to offer without the security risks it sometimes presents.

@UndercodeTesting > powered by wiki
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ How Port Forwarding with UPnP ?

Setting up port forwarding with the automatic UPnP protocol is simple, but potentially quite unsafe.

1) We would only recommend you use UPnP if you donโ€™t have sensitive information on the device youโ€™re configuring it for, or youโ€™re not concerned about your cybersecurity for whatever reason.

2) To set up port forwarding with UPnP, you can:

Sign in to Google Fiber.
> https://fiber.google.com/

3) Click on the โ€œNetworkโ€ button.

4) Choose โ€œAdvanced,โ€ and click on โ€œPorts.โ€

5) Switch โ€œUniversal Plug and Playโ€ On (it will be set to Off by default).

6) Click โ€œApplyโ€ to save your new preferences.

7) Adjust your manual and automatic port forwarding rules and
settings from the list that follows.

8) You can go back into these settings and disable UPnP at any time.

๐Ÿฆ‘Manual Port Forwarding

1) Setting up port forwarding manually is typically a better option overall than using UPnP, but it requires the most complex setup of our three choices.

2) These steps may vary based on your specific device, router, and preferences, but generally, to manually configure port forwarding, youโ€™ll need to:

3) Make sure your device has a static IP address. If your IP address is dynamic, or changes from time to time, this will mess up your port forwarding configuration.

4) Log in to your router.

5) Find the port forwarding tab. The label for this particular information may be different depending on the make, model, and type of router youโ€™re working with.

6) Input the port(s) you want to forward traffic with, along with the protocol youโ€™d like to use to do so.
Enter your static IP address.

7) If applicable, click the โ€œEnableโ€ button or box, then save your updated settings.

8) Since manual port forwarding is complicated and variable, the above is a very simplified version of the steps needed to implement it.

9) Before starting, we suggest that you look up guides specifically designed to help you implement port forwarding on those particular devices.

@UndercodeTesting
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
For any Suggessions or any missed tutorials plz leave a message @UndercodePosts
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘STM32F417IEH6 chip decryption / SCM decryption / STM32 crack for experts by undercode:

๐Ÿฆ‘ IC chip decryption model:
STM32F405RGT6, STM32F415RGT6, STM32F407VET6, STM32F417VET6
STM32F405OGY6, STM32F415OGY6, STM32F407VGT6, STM32F417VGT6
STM32F405OEY6, STM32F415VGT6, STM32F407ZET6, STM32F417ZET6
STM32F405VGT6, STM32F415ZGT6, STM32F407ZGT6, STM32F417ZGT6
STM32F405ZGT6, STM32F407IET6, STM32F407IGH6, STM32F417IET6
STM32F417IEH6, STM32F417IGT6, STM32F417IGH6 ...

๐Ÿฆ‘ STM32F405 / 415 chip introduction:

1) The STM32F405 / 415 series of MCUs are aimed at medical, industrial and consumer applications that require high integration, high performance, embedded memory and peripherals in packages as small as 4 x 4.2 mm. The STM32F405 / 415 MCU provides the performance of the Cortexยฎ-M4 core (with floating point unit) operating at 168 MHz.

2) STM32F407 / 417 single chip microcomputer introduction:
The STM32F407 / 417 series of MCUs are aimed at medical, industrial, and consumer applications that require high integration, high performance, embedded memory, and peripherals in packages as small as 10 x 10 mm. The STM32F407 / 417 MCU provides the performance of the Cortexยฎ-M4 core (with floating point unit) operating at 168 MHz.


3) In the chip decryption industry, the most accurate decryption method is to take the hardware decryption method, that is, dissolve the chip with a specific fat-dissolving chip to expose its wafers. It is also necessary to have certain skills when operating this step. When performing this step, sometimes, the chip may be dissolved badly, that is, the wire is dissolved, so that the chip is completely useless.

4) When the wafer is exposed, then we will use a high-power microscope and FIB (focused ion beam equipment) to use these two devices to find the encryption position of the chip and change the encryption chip to unencrypted by changing its circuit. State, and then use the programmer to read out the program inside the chip.

@UndercodeTesting
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘NEW NORDVPN PREMIUM :

sk_randhawa@hotmail.com:Austin316 | @undercodeTesting : = 2020-08-20 08:36:33

scarlettisis@hotmail.com:4269minx | @undercodeTesting : = 2022-07-21 02:14:47

slucchesil@hotmail.com:336477188 | @undercodeTesting : = 2024-08-19 11:32:47

soupjr2000@gmail.com:Fritzen2011 | @undercodeTesting : = 2020-06-02 16:39:31

smellycloud815@gmail.com:BereGhost08 | @undercodeTesting : =
2021-08-28 20:42:09
spiked_5000@hotmail.com:Takshila1 | @undercodeTesting : = 2023-02-22 04:42:56
spacecasenc@gmail.com:Pj26632! | @undercodeTesting : = 2021-01-15 19:24:37
sleepycharlie@hotmail.com:chad2423 | @undercodeTesting : = 2022-07-23 04:00:11
smarchetti73@gmail.com:stefaniam73 | @undercodeTesting : = 2020-06-17 16:45:31
sommo_7@hotmail.com:Montymax7 | @undercodeTesting : = 2022-08-28 00:00:00
smario45@hotmail.com:Plycem0102 | @undercodeTesting : = 2020-10-18 04:03:28
spiele_mail@kabelmail.de:obelix123 | @undercodeTesting : = 2022-12-25 21:37:53
stag12349@gmail.com:9868m10a | @undercodeTesting : = 2021-02-02 17:47:22
ssnook629@rocketmail.com:darktime | @undercodeTesting : = 2022-07-11 18:42:19
Sonic_Rocks_007@hotmail.com:Mario009988 | @undercodeTesting : = 2022-05-12 02:48:38
stephan_sante@yahoo.com:sante1124 | @undercodeTesting : = 2020-08-20 11:17:06
soundsbysky@gmail.com:Flight23 | @undercodeTesting : = 2020-06-22 19:32:00
stefanzi@hotmail.com:wilddog93 | @undercodeTesting : = 2021-12-28 14:59:17
splitsoulsemail@gmail.com:Solsikke1 | @undercodeTesting : = 2022-01-18 21:09:32
stegemann@gmail.com:calif0rnia | @undercodeTesting : = 2020-08-05 23:16:57
sonyadroguett@gmail.com:Hester99! | @undercodeTesting : = 2022-06-14 03:06:37
spencer.hale.army@gmail.com:soccerfox77 | @undercodeTesting : = 2023-04-18 03:15:08
srichm1964@gmail.com:nissan87 | @undercodeTesting : = 2020-07-01 03:25:05
songwenlong5496@gmail.com:x1Y2I3ng | @undercodeTesting : = 2020-09-12 23:57:51
spencerbush31@yahoo.com:ginger1971 | @undercodeTesting : = 2020-07-04 02:22:53
stephaniekhoang@gmail.com:Buttsweat308!! | @undercodeTesting : = 2021-06-19 21:30:58
stanbrook23@live.com:Salter123! | @undercodeTesting : = 2022-08-21 20:29:25
starklybeany4life@gmail.com:Ghost4life | @undercodeTesting : = 2023-03-02 09:35:19
sebastianriera@outlook.com:B4n4n4muffin | @undercodeTesting : = 2021-11-12 15:12:44
stephigrace@gmail.com:Zambia13 | @undercodeTesting : = 2022-08-07 15:18:04
samuel.klimas@gmail.com:zeus6710 | @undercodeTesting : = 2022-11-28 01:23:09
stephaneabel@gmail.com:Ingrid4ic | @undercodeTesting : = 2022-07-23 11:58:37
slaphappyike@gmail.com:sneaker0201 | @undercodeTesting : = 2022-01-12 17:52:33
stephen.cousins@gmail.com:sc84437364 | @undercodeTesting : = 2022-10-04 10:56:18
stefan.schwindl@gmx.de:P3294z4h | @undercodeTesting : = 2020-09-03 12:53:11
stepheng88@gmail.com:Hershey1 | @undercodeTesting : = 2020-12-14 01:08:46
stephen.c.dale@gmail.com:carly1972 | @undercodeTesting : = 2020-06-27 12:23:04
stanfordj1@gmail.com:c4dbury5 | @undercodeTesting : = 2022-03-31 15:16:44
ssilfir@hotmail.fr:valval27 | @undercodeTesting : = 2022-06-18 17:12:25
steffenwolf92@hotmail.com:Warhammer1 | @undercodeTesting : = 2022-07-17 20:22:49
stephenarnott797@yahoo.com:Ernie30735 | @undercodeTesting : = 2022-09-28 22:35:43
stephen.shew@gmail.com:Bvsbvs123! | @undercodeTesting : = 2023-01-28 02:25:40
siggihar@hotmail.com:Dragon123 | @undercodeTesting : = 2022-10-05 21:58:21
sashagibney@mail.ru:sasha1996 | @undercodeTesting : = 2020-06-14 06:31:53
Stephennelson731@gmail.com:M@rsh@11 | @undercodeTesting : = 2022-07-03 15:01:04
stephendowning2008@gmail.com:Rebwooky2008 | @undercodeTesting : = 2022-02-12 04:06:04
steven_904_2005@yahoo.com:popcorn11 | @undercodeTesting : = 2020-06-27 16:36:25
statenislandny23@gmail.com:23$Jordan | @undercodeTesting : = 2021-11-26 01:39:57
stewasam@gmail.com:samgabe1 | @undercodeTesting : = 2020-07-28 19:24:44
steve.bouronikos@gmail.com:diamond01 | @undercodeTesting : = 2022-11-24 19:31:46
stevenelbaz1@gmail.com:stevenelbaz1234 | @undercodeTesting : = 2022-08-08 15:45:35
steve.bouronikos@gmail.com:diamond01 | @undercodeTesting : = 2022-11-24 19:31:46
steve@globaltel.com:Steve7625 | @undercodeTesting : = 2020-12-29 19:04:02
stewartacraig@yahoo.co.uk:Ballan03 | @undercodeTesting : = 2022-03-05 02:51:33
stuntgrant@gmail.com:bluetruck | @undercodeTesting : = 2022-07-18 04:29:56
sndergaardmads@gmail.com:cgy66quy | @undercodeTesting : = 2020-07-13 20:27:53
robbie68@hotmail.com:bonethugs | @undercodeTesting : = 2022-01-21 23:39:50
street.josh.js@gmail.com:654312monkey | @undercodeTesting : = 2020-10-03 16:07:46
sunshinestate70@gmail.com:11141970aa | @undercodeTesting : = 2021-12-19 18:17:12
snakeyez311@yahoo.com:Zaq1!@2wsX | @undercodeTesting : = 2021-06-27 14:15:14
sunnykool@altinbas.com.au:renos1987 | @undercodeTesting : = 2023-03-12 09:01:42
supergym.dxb@gmail.com:limon303 | @undercodeTesting : = 2020-12-23 13:44:08
steveman97@hotmail.com:bearer42 | @undercodeTesting : = 2022-05-05 21:57:25
steveward1@icloud.com:sarah2011 | @undercodeTesting : = 2021-08-03 16:33:40
ssull52@yahoo.com.au:Dumb4sss | @undercodeTesting : = 2020-07-10 06:51:24
svsweetie@icloud.com:Alex1Emma9 | @undercodeTesting : = 2020-07-22 00:22:24
srw1412@hotmail.com:Siriwan5 | @undercodeTesting : = 2021-12-27 11:41:44
stianlorenzo@gmail.com:ssa12ssa12 | @undercodeTesting : = 2022-10-05 07:51:56
skasselakis1@gmail.com:Merrill10 | @undercodeTesting : = 2020-09-27 23:15:15
stylerider25@yahoo.com:ducati1098 | @undercodeTesting : = 2020-09-12 20:01:55
suckleyp@yahoo.co.uk:Boughey1 | @undercodeTesting : = 2021-11-24 12:45:43
t.v.tmv@hotmail.com:0918340748Aa | @undercodeTesting : = 2021-08-08 21:24:12
sunxiaofeiabc@163.com:sxf19860125 | @undercodeTesting : = 2023-03-13 00:06:54
szegtibor@gmail.com:Titus1987 | @undercodeTesting : = 2022-09-09 18:48:10
sun-burns@comcast.net:Zero4603 | @undercodeTesting : = 2020-12-12 14:07:03
stevenfts@gmail.com:Nevets29122 | @undercodeTesting : = 2023-04-09 14:56:16
super_roody@hotmail.com:Hedley19 | @undercodeTesting : = 2021-04-04 15:21:10
shilifs23@yahoo.com:Shorts23 | @undercodeTesting : = 2021-03-13 07:27:35
Stranskyjordan789@gmail.com:Grandma123 | @undercodeTesting : = 2022-08-19 00:08:15
supra_gal@hotmail.com:Sc00bydoo | @undercodeTesting : = 2020-11-21 04:46:18
swamijay@gmail.com:swami8837 | @undercodeTesting : = 2022-03-04 00:00:00
szstephen@aol.com:System02@ | @undercodeTesting : = 2022-10-13 23:30:24
superloop@carolina.rr.com:Sidespin8 | @undercodeTesting : = 2020-07-08 03:45:51
t_vano@hotmail.com:trv21390 | @undercodeTesting : = 2020-07-13 01:02:22
t16evd@gmail.com:tritontr19 | @undercodeTesting : = 2020-07-12 00:02:43
sybdu06@gmail.com:metalsonic | @undercodeTesting : = 2022-12-26 13:18:17
surfrpt_7@yahoo.com:di3S3l10 | @undercodeTesting : = 2022-10-30 15:25:16
swwoodard@yahoo.com:ambiance | @undercodeTesting : = 2020-09-08 22:00:49
tarlut@gmail.com:Jeannine10 | @undercodeTesting : = 2020-11-13 19:18:56
TEHankins@aol.com:225Madrone | @undercodeTesting : = 2022-06-18 22:28:48
tannercou@gmail.com:Messier83 | @undercodeTesting : = 2021-03-14 00:41:31
tarocrump@hotmail.com:12monkeys | @undercodeTesting : = 2023-03-01 06:11:49
t.reed71085@gmail.com:id19946549 | @undercodeTesting : = 2020-08-05 03:01:47

โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘ROBLOX PREMIUM ACCOUNTS :โœ…

itzStoj:stoj1998
itzisaac17:vereau17
iustinsingiap:alexandru
ivanthebest1234:ivanthebest
ivemonstre:delovita777
izaya1228:164914abc
jaakkonen123:tiksu123
jackalope62:nick1010
jackfrancis07:shorty19
jackorthewise:gandalf2014
jackwolf128:Griffin21
jacobr233:buddy123
jacobrutledge1:sydney12
jadencolwell:killer123
jaguary12783:bird1234