UNDERCODE SECURITY
226 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Hack into Windows: Reset a local account password using Sticky Keys

> If the System Restore method doesn’t work, there is an alternative that manipulates the Sticky Keys shortcut on the Windows login screen (Sticky Keys lets you use key combinations such as Ctrl+Alt+Delete by pressing one key). This tip only works with local accounts, so skip to the next section if you’re using a Microsoft account.

1) First, restart your computer with the Windows installation media as described above. Click β€˜Repair your computer’ | Troubleshoot | Command Prompt. (You can take some of the following commands from this Pastebin page to save you the hassle of typing everything out).

2) In Command Prompt type β€œcopy c:windowssystem32sethc.exe c:” then press Enter (replace c: with another letter if your Windows installation is on a different drive). This step ensures you can reverse the process once you’re back into Windows.

3) Next, type β€œcopy c:windowssystem32cmd.exe c:windowssystem32sethc.exe” and confirm the copy. This replaces the Sticky Keys program with Command Prompt, but keeps its filename and, therefore, the shortcut to it.

4) Restart your computer and, when the Windows login screen appears, tap the Shift key five times in quick succession. You’ll hear a beep, then a Command Prompt window will appear (if not, try repeating the key taps).

5) In this window, type β€œnet user [username] [password]” – replacing [username] with your Windows account username and [password] with your new password

6) Press Enter. If you can’t remember what your username is, type β€œnet user” and press Enter to display all Windows accounts.

7) Close the Command Prompt window and log into Windows using your new password.

8) Now you’re back into Windows, you can revert the Sticky Keys file back to its previous state. Click Start, type cmd and press Enter, then type β€œcopy c:sethc.exe c:windowssystem32sethc.exe” and confirm the copy.

USE FOR LEARN
-POWERED BY WIKI
E N J O Y β€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How To Find Windows 10 Product Key Using CMD, PowerShell, And Windows Registry?

1) To go ahead with this method, you need to boot into your Windows computer. Now, using a simple VBScript–some of you might have seen it on Microsoft forums–you can read all the binary gibberish written in Windows Registry. This script translates the Registry values into a readable format.

2) So, just copy and paste the following script in a Notepad window and save its as productkey.vbs by choosing the β€œAll Files” option in β€œSave as type.”

Set WshShell = CreateObject("WScript.Shell")
MsgBox ConvertToKey(WshShell.RegRead("HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\DigitalProductId"))

Function ConvertToKey(Key)
Const KeyOffset = 52
i = 28
Chars = "BCDFGHJKMPQRTVWXY2346789"
Do
Cur = 0
x = 14
Do
Cur = Cur * 256
Cur = Key(x + KeyOffset) + Cur
Key(x + KeyOffset) = (Cur \ 24) And 255
Cur = Cur Mod 24
x = x -1
Loop While x >= 0
i = i -1
KeyOutput = Mid(Chars, Cur + 1, 1) & KeyOutput
If (((29 - i) Mod 6) = 0) And (i <> -1) Then
i = i -1
KeyOutput = "-" & KeyOutput
End If
Loop While i >= 0
ConvertToKey = KeyOutput
End Function


3) After saving this file, just click on it and a new popup window will show your Windows product key in the registry. You can copy or note this down somewhere to use it later.


enjoyβ€οΈπŸ‘πŸ»
@UndercodeTesting
(code by wiki)βœ…
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
πŸ¦‘more for py developers 2020 Vim - The improved Editor
β€” 868.18 MB β€”

> https://mega.nz/folder/zYsRnDaD#yiZMTNsl6XQDH0n65PGNLw
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Malware reposity
> theZoo is a project created to make the possibility of malware analysis open and available to the public. Since we have found out that almost all versions of malware are very hard to come by in a way which will allow analysis, we have decided to gather all of them for you in an accessible and safe way. theZoo was born by Yuval tisf Nativ and is now maintained by Shahak Shalev.


Clone
the repository with git clone https://www.github.com/ytisf/theZoo. Go to the directory and run pip install --user -r requirements.txt. This should install all latest requirements needed. In total can be "scripted" like so:

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) git clone https://www.github.com/ytisf/theZoo

2) cd theZoo

3) pip install --user -r requirements.txt

4) Start by running the console:

> python theZoo.py

5)

/conf - The conf folder holds files relevant to the particular running of the program but are not part of the application. You can find the EULA file in the conf and more.

/imports - Contains .py import files used by the rest of the application

/malwares/Binaries - The actual malwares samples - be careful! These are very live.

/malware/Source - Malware source code.

Malware under the folder Original is supposed to be (NO PROMISES!) the original source of the malware that leaked. Malware under the folder Reversed is either reversed, decompiled or partially reconstructed.

πŸ¦‘COMPATIBLE WITH ANY LINUX DISTRO


enjoyβ€οΈπŸ‘πŸ»
@UndercodeTesting
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
πŸ¦‘courses :

1) Git Quick Start for beginers 2019
> https://mega.nz/folder/DdtFSLoC#rsLt_cEhU6hkKV2gNR4reQ

2) Jenkins Quick start 2020

https://mega.nz/folder/rAkGAaQI#Fsc-WXfw13U5Z4r6E40pjA

3) 2019 Bootloading with GRUB

https://mega.nz/folder/rQ90iQ5I#GwtTPEkFfOFyacB9Vo0esA

4) Google Cloud Platform for the AWS User

https://mega.nz/folder/XJty2SgS#xiGzzcwIFXhMVnDtamnUag
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘The Linux Foundation joins forces to establish the Open Source Security Foundation OpenSSF

> The Linux Foundation announced the cooperation with a number of hardware and software vendors to jointly establish the Open Source Security Foundation (OpenSSF), which is a cross-industry cooperation, through the establishment of a broader community of targeted programs and best practices, And gather leaders together to improve the security of open source software.


> OpenSSF members come from the Core Infrastructure Initiative, the GitHub Open Source Security Alliance and other founding board members such as GitHub, Google, IBM, JPMorgan Chase, Microsoft, NCC Group, OWASP Foundation and Red Hat. Other founding members include ElevenPaths, GitLab, HackerOne, Intel, Okta, Purdue, SAFECode, StackHawk, Trail of Bits, Uber and VMware.

> According to the introduction of the OpenSSF official website, the governance of the foundation, the technical community and its decision-making will be transparent, and any specifications and projects developed will have nothing to do with suppliers. OpenSSF is committed to collaboration and cooperation with upstream communities and with existing communities to improve open source security. In other words, they aim to become a transparent organization to promote cooperation between manufacturers and improve security.

#News
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
πŸ¦‘Linux+ and LPIC-1. System Administrator - Exam 102 2019new β€”-2.27 GBβ€”-
#requested

https://mega.nz/folder/jIVETI5J#kahEzA8YVczQMzmyV4S_xg
Forwarded from UNDERCODE HACKING
Reverse_engineering_'Black_Desert_Online'_1_Preface.pdf
264.4 KB
Detect modified of function about time Detect time modified via using time server Detect of game client local time modification Detect of major kernel function modification Detect DLL injection Detect virtual memory code injection Detect illegal control of DHCP Detect call specific function in game Detect game resource modification Reject game process memory accessing Reject game process handle accessing Reject game process message transmission Reject game process keyboard/mouse input transmission
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘How to prohibit downloading server sharing files at will, prohibit β€” sharing files:

shared file management system also has some special functions, such as:

1) Shared file access permission program management.

When a user accesses a shared file on the server, he sets a list of applications that he is allowed to use. Programs that are not in the list cannot be opened to prevent the shared file from leaking. For example, you can disable QQ to send files, disable email to send files, and prohibit opening or editing shared files through special software.

2) It can be hidden if there is no right to visit.

All or part of the shared files (folders) on the local area network server can be hidden for some users who do not have the right to access them. They can’t see the names of the shared files or folders at all, and users can only see the ones they have permission to view. shared documents.

3) Users are prohibited from saving files locally.

The system can implement a file saving mode similar to a diskless workstation. Users are forbidden to create, edit and save files locally. All operations can only be performed on the file server to prevent the risk of leakage caused by files stored on local disks.

4) It is forbidden for users to gain unauthorized access to shared files after local login/remote desktop.

After the user logs in locally or accesses the shared files on the server through the remote desktop, it is prohibited to copy and paste them into the shared folder of their own computer, or they can be prohibited from dragging the shared files to their own computer disk through the disk mode during the remote desktop.

5) Access action black and white lists are added independently.

When a user accesses a shared file on the server, it is forbidden to open certain windows or perform certain actions to prevent the shared file from leaking and being edited. For example, it is forbidden to open the "Output" window, disable the "Print" action of some software, and disable the "Add" action of the right-click menu.

6) Remote user verification function.

In order to prevent some users with advanced permissions from leaving the computer midway when accessing shared files, and others use this computer to operate shared files, or delete, or copy, etc., the system has a remote user verification function, that is, every time a shared file is opened You need to enter an account and password to strengthen the protection of shared files.

7) Intelligent disaster recovery backup.

Dashizhi shared file management system can set automatic backup before deletion, and selectively restore a certain shared file as needed to prevent users from deliberately or unintentionally deleting shared files, causing important data loss and unrecoverable.

8) Binding authentication.

IP, MAC, user name, and machine name are four-fold bound. If you modify any of them, you will not be able to access shared files. Prevent users from modifying IP, MAC or logging in with other people's accounts to access shared files. At the same time, it can also restrict external computers or unauthorized computers from accessing shared files.

enjoyβ€οΈπŸ‘πŸ»
written
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Backup Legal Mega
πŸ¦‘Google Container Engine new
β€”830.72 MBβ€”

https://mega.nz/folder/LRtFGaDC#-H7OweypGx-8JkCWjZ_ALg
Forwarded from UNDERCODE COMMUNITY
πŸ¦‘NORDVPN PREMIUM :

lamira_17@live.com.pt:vIcArIOUs17 Expry: 2022-08-08 07:54:56 19.07.2020 05:37:07
Live derekbonslett4@gmail.com:enolen321 Expry: 2022-08-06 21:12:54 19.07.2020 05:37:11
Live aresous@gmail.com:Aresous12 Expry: 2022-08-06 02:03:05 19.07.2020 05:37:29
Live Jarod.Brouwer361@gmail.com:Sniper690 Expry: 2022-08-03 20:41:30 19.07.2020 05:37:37
Live madumais11@gmail.com:rhinos2007 Expry: 2022-07-27 14:25:34 19.07.2020 05:37:48
Live bpurdy77@gmail.com:Purdyboy77 Expry: 2022-07-23 17:48:08 19.07.2020 05:37:58
Live dwabercrombie@yahoo.com:Bigape12 Expry: 2022-07-21 21:12:06 19.07.2020 05:39:10
Live jasdogie@gmail.com:Thedog119! Expry: 2022-07-18 00:42:43 19.07.2020 05:39:19
Live kamran.chowdhury@hotmail.com:Chowdhury1 Expry: 2022-07-13 19:29:44 19.07.2020 05:39:55
Live chanmouli@gmail.com:halphj2a Expry: 2022-07-11 00:05:36 19.07.2020 05:40:02
Live jlovaglio@gmail.com:mattingly23 Expry: 2022-07-09 02:24:33 19.07.2020 05:40:07
Live dvnwoodd@gmail.com:Qdrop123 Expry: 2022-07-06 13:42:33 19.07.2020 05:40:13
Live svasilev456@gmail.com:bigboom123 Expry: 2022-07-05 13:36:25 19.07.2020 05:40:44
Live pck5038@gmail.com:weare2013 Expry: 2022-07-04 16:48:40 19.07.2020 05:40:53
Live jompis88@gmail.com:johndif88 Expry: 2022-07-04 13:28:47 19.07.2020 05:41:15
Live danycornejo4@gmail.com:dc123456 Expry: 2022-07-03 20:05:13 19.07.2020 05:41:27
Live danyranc@hotmail.com:udcufqpz1 Expry: 2022-07-01 23:44:51 19.07.2020 05:41:40
Live ludovic.lacour@orange.fr:Balrog32 Expry: 2020-07-21 07:39:40 19.07.2020 05:43:46
Live dustyraybaugher@gmail.com:Doomer10 Expry: 2022-06-27 23:16:05 19.07.2020 05:44:27
Live purep3076@gmail.com:cur829tis Expry: 2022-06-27 18:50:11 19.07.2020 05:44:31
Live alex.jeffries.t1@gmail.com:Acjtengu1! Expry: 2022-06-25 20:34:59 19.07.2020 05:44:35
Live k.kimball1030@gmail.com:Kevink103099 Expry: 2022-06-25 06:38:54 19.07.2020 05:45:26
Live hiimgreg87@gmail.com:usyzi011187 Expry: 2022-06-23 10:24:30 19.07.2020 05:45:35
Live marcdemory95@gmail.com:Jrock12345! Expry: 2022-06-21 17:16:22 19.07.2020 05:45:39
Live shinigami685@gmail.com:asgaroth14 Expry: 2022-06-21 06:23:13 19.07.2020 05:45:44
Live ianthomas9891@gmail.com:Pwnperma89 Expry: 2022-06-20 23:46:55 19.07.2020 05:45:48
Live daniel@tabak.ca:tunes112 Expry: 2022-06-19 02:54:23 19.07.2020 05:45:57
Live jeanbe23@msn.com:jeanbapt23! Expry: 2022-06-18 22:19:32 19.07.2020 05:46:01
Live kl7925760@gmail.com:kl7925760 Expry: 2022-06-15 15:49:33 19.07.2020 05:46:05
Live charliemarkcrutcher@gmail.com:Suckyourmum12 Expry: 2022-06-13 20:04:17 19.07.2020 05:48:37
Live seanajy@hotmail.com:sean1300177 Expry: 2022-06-10 08:39:33 19.07.2020 05:48:44
Live 2391660180@qq.com:850210zx Expry: 2022-06-09 11:52:26 19.07.2020 05:48:47
Live matchass91@gmail.com:quebec54 Expry: 2022-06-07 19:40:47 19.07.2020 05:49:53
Live 24raiyan@gmail.com:Burger12* Expry: 2022-04-29 00:00:00 19.07.2020 05:50:09
Live righteousstafford@gmail.com:4768Lilman! Expry: 2022-04-25 04:20:40 19.07.2020 05:51:01
Live esytes@gmail.com:Requiem1607. Expry: 2022-04-03 17:01:06 19.07.2020 05:51:35
Live adew14@hotmail.com:Hayleycostello1 Expry: 2022-04-02 13:12:30 19.07.2020 05:52:03
Live kautsarrayzaman@gmail.com:DoloresHaze98 Expry: 2022-04-01 13:06:47 19.07.2020 05:52:07
Live darylzwfong@gmail.com:arsenalfc14 Expry: 2022-03-26 11:31:54 19.07.2020 05:52:14
Live bobarnoldvifte@gmail.com:ogana1998 Expry: 2022-03-12 18:31:15 19.07.2020 05:53:24
Live dylanrushnell@yahoo.com:truck250 Expry: 2022-03-07 16:53:51 19.07.2020 05:53:28
Live petersson0@hotmail.se:Fillep01 Expry: 2022-03-07 14:39:35 19.07.2020 05:53:32
Live jmschuaquico@gmail.com:c13b1qc012ef Expry: 2022-03-07 03:43:48 19.07.2020 05:53:35
Live andrewwallerstein@gmail.com:@bsoluti0n Expry: 2022-03-06 00:10:58 19.07.2020 05:53:39
Live althtnmore@aol.com:12071941aA! Expry: 2022-03-04 11:24:39 19.07.2020 05:53:44
Live ianharden82@yahoo.com:smudgey1 Expry: 2022-02-24 15:22:15 19.07.2020 05:53:53
Forwarded from UNDERCODE COMMUNITY
Live alexmaier974@gmail.com:1a2b3c4d5 Expry: 2022-02-22 18:50:12 19.07.2020 05:53:58
Live deeptorment@gmail.com:sb127gx35 Expry: 2022-02-08 10:01:02 19.07.2020 05:54:23
Live georgeburton1996@yahoo.co.uk:a7x4rever Expry: 2022-02-02 21:23:35 19.07.2020 05:54:47
Live dmcleod12@gmail.com:Mormodes15 Expry: 2022-01-07 19:53:44 19.07.2020 05:54:58
Live nickwinn12@hotmail.com:Invision1 Expry: 2021-12-31 10:24:28 19.07.2020 05:55:51
Live b.beasley79@yahoo.com:Sc00ter08 Expry: 2021-12-29 05:46:31 19.07.2020 05:55:58
Live poundjared@gmail.com:Blvd2583 Expry: 2021-12-28 07:45:15 19.07.2020 05:56:35
Live k.k.matzke@gmail.com:majken06 Expry: 2021-12-25 15:19:47 19.07.2020 05:56:45
Live alikhodrali@msn.com:123Cooldude Expry: 2021-12-25 03:15:25 19.07.2020 05:57:52
Live seejapan@aim.com:Blink117 Expry: 2021-12-21 06:47:50 19.07.2020 05:57:56
Live andywinn69@gmail.com:Sagawa123 Expry: 2021-12-07 02:58:46 19.07.2020 05:58:49
Live humood710@gmail.com:Humood9909 Expry: 2021-12-06 18:08:11 19.07.2020 05:58:55
Live austinlevesque13@yahoo.com:Danyelle0815!! Expry: 2021-12-03 02:02:08 19.07.2020 05:59:12
Live parker.traikoff@gmail.com:Parker221 Expry: 2021-12-01 16:38:55 19.07.2020 05:59:19
Live theodorepahany@gmail.com:FiuL89ty Expry: 2021-11-30 10:41:38 19.07.2020 05:59:41
Live lukas.bonk@web.de:Maxi3928lbm Expry: 2021-11-29 15:53:11 19.07.2020 05:59:48
Live jgarne13@gmail.com:Sherwood1 Expry: 2021-11-28 22:32:39 19.07.2020 05:59:53
Live bowdenta@yahoo.com:Trkstpl1 Expry: 2021-11-27 03:02:43 19.07.2020 06:01:23
Live gudrunbjork321@gmail.com:sims1997 Expry: 2021-11-11 01:01:39 19.07.2020 06:02:56
Live e_hollands@hotmail.com:Myrtle6740 Expry: 2021-11-10 02:20:19 19.07.2020 06:03:01
Live brianaustin2@gmail.com:W@K@d3k3 Expry: 2021-11-03 00:00:00 19.07.2020 06:04:25
Live rakiciva@msu.edu:Nino29Kica Expry: 2021-09-18 02:37:39 19.07.2020 06:06:46
Live selfbias@gmail.com:Paranoid1 Expry: 2021-09-17 21:12:29 19.07.2020 06:06:51
Live octaviojr619@msn.com:Octavio0! Expry: 2021-08-29 08:39:24 19.07.2020 06:07:24
Live shadowjohnson1985@gmail.com:sh4d0wm4n Expry: 2021-08-27 19:15:41 19.07.2020 06:08:41
Live stmurray5@gmail.com:Kicker15 Expry: 2021-08-26 22:35:15 19.07.2020 06:08:47
Live jjohnson031982@gmail.com:Drafting2! Expry: 2021-08-26 00:00:00 19.07.2020 06:09:27
Live dravenkish@gmail.com:Roo123dog Expry: 2021-08-25 23:35:13 19.07.2020 06:09:31
Live bazarjani.kian@gmail.com:Kiasadrifeb97 Expry: 2021-08-12 03:20:30 19.07.2020 06:09:39
Live cap_thecrazykid@yahoo.com:Shemale97 Expry: 2021-07-29 21:20:41 19.07.2020 06:11:20
Live adrian.richter1@gmx.de:kaktusse8 Expry: 2021-07-29 16:40:27 19.07.2020 06:11:24
Live ZINDEL.ADAM@GMAIL.COM:09Zman-46 Expry: 2021-07-23 21:57:05 19.07.2020 06:12:03
Live mrtoel@gmail.com:Trumpet1! Expry: 2021-07-09 08:38:43 19.07.2020 06:12:07
Live richardsonalex69@yahoo.com:july1973 Expry: 2020-07-16 14:46:07 19.07.2020 06:12:33
Live sandrosurbakti@gmail.com:sandro135 Expry: 2020-07-24 12:08:14 19.07.2020 06:12:37
Live bill.wheeler101@yahoo.com:Kisses69 Expry: 2021-07-06 19:43:08 19.07.2020 06:12:41
Live thephillipta@gmail.com:padamon00 Expry: 2021-07-04 15:44:37 19.07.2020 06:13:15
Live kennyroy02@aol.com:Knight02 Expry: 2021-07-03 22:42:39 19.07.2020 06:13:20
Live twingenicide@gmail.com:wallnut8545 Expry: 2021-06-28 17:23:37 19.07.2020 06:14:06
Live rossspearman68@gmail.com:Blue1216 Expry: 2021-06-25 23:53:14 19.07.2020 06:14:28
Live angel36s@swbell.net:IFi81u812 Expry: 2021-06-25 14:15:22 19.07.2020 06:14:31
Live robertban666@gmail.com:hastur11 Expry: 2021-06-25 12:18:00 19.07.2020 06:14:34
Live ryanragsdale2001@gmail.com:Ryry2001 Expry: 2021-06-24 13:59:35 19.07.2020 06:14:38
Live sbernard608@gmail.com:00bf35137cf4 Expry: 2021-06-24 05:09:41 19.07.2020 06:15:47
Live alexlockwood550@gmail.com:locky1997 Expry: 2021-06-18 02:43:12 19.07.2020 06:15:51
Live Thedrewster357@gmail.com:DrewHudson357 Expry: 2021-06-16 15:14:04 19.07.2020 06:15:55
Forwarded from UNDERCODE COMMUNITY
Live let_your_soulfly@hotmail.com:Incubus311! Expry: 2021-06-15 10:27:24 19.07.2020 06:16:23
Live kernreeves1998@hotmail.com:TryhardTac0 Expry: 2021-06-14 03:42:50 19.07.2020 06:16:49
Live cmhazelton1998@gmail.com:agletzip1998 Expry: 2021-06-13 07:17:45 19.07.2020 06:16:52
Live matclaxton@hotmail.com:r44267171 Expry: 2021-06-10 11:25:23 19.07.2020 06:16:56
Live elseyenrique@yahoo.com:Goldenchild1 Expry: 2021-06-08 05:09:44 19.07.2020 06:16:59
Live johnkomperda@gmail.com:letgoandletgod1 Expry: 2021-06-03 12:28:37 19.07.2020 06:17:28
Live yousefalnajjar8@gmail.com:Yusuf987 Expry: 2021-06-03 05:04:12 19.07.2020 06:18:06


πŸ¦‘NORDVPN PREMIUM (only verified by us)
πŸ¦‘NORDVPN PREMIUM
Forwarded from UNDERCODE COMMUNITY
πŸ¦‘X 2 NETFLIX PREMIUM ACCOUNTS
send screanshoats after logins @Undercode_bot

> akash_chohan@hotmail.com:yas12341

> alexstevenbintley@sky.com:Llivebootyat
Forwarded from Backup Legal Mega
πŸ¦‘2020 Linux Academy Red Hat Certified Systems Administrator Prep Course
β€”2.59 gbβ€”

https://mega.nz/folder/6QkmzIRC#9qMF250M3-assTpK5aL55Q
Forwarded from Backup Legal Mega
πŸ¦‘Deploying Microservices with Puppet and Containers


> https://mega.nz/folder/PdN3iKoS#C0VA6bDFs-Cpt0UdxTazfA