Full BURPSUITE COURSE
https://drive.google.com/uc?id=1wooMCvucNUPzbtZO5pLsQR0jIiV3lGA5&export=download
https://drive.google.com/uc?id=1wooMCvucNUPzbtZO5pLsQR0jIiV3lGA5&export=download
The Complete Web Developer in 2020: Zero to Mastery
https://drive.google.com/drive/folders/1KFyBfBQjvbjl9TfOStC4JQGmLBl1crcE
https://drive.google.com/drive/folders/1KFyBfBQjvbjl9TfOStC4JQGmLBl1crcE
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Control your phone using advantages of the termux-api over ssh from your linux pc.
F E A T U R E S :
arp-scan* - for scanning phone's IP adress from it's MAC
ssh* - core of whole script
sshfs - for mounting folder option
sqlite3 - for sms option, parsing the sms databases
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/KebabLord/teriyaki.git
2) cd teriyaki
3) After you updated script's first line with your phone's mac address, generate ssh keys using:
$ ssh-keygen -t rsa -f ./teriyaki_key -N " " -q
4) copy the public key (the one ending with .pub) to phone and keep the secret key on PC.
After that, on termux:
$ cat teriyaki_key.pub >> ~/.ssh/authorized_keys
5) edit script's 2nd line with the location of your key on PC.
$ mv ./teriyaki_key ~/.ssh/ PHONE_KEY="~/.ssh/teriyaki_key"
6) Detailed answer
First of all start by adding your phone's mac address to script's 2nd line. You can find your phone's mac address in phone settings>system>about phone>status>Wifi mac adress or from your wireless' admin panel, or using nmap like tools. The script needs your phone's MAC in order to find it's current IP address. MAC addresses are static unlike IP.
7) Now you need to exchange secret key in order to use teriyaki script without getting "enter ssh password" prompt every single time.
8) Generate an ssh secret key on your computer, the command below will generate a key with no password named teriyaki_key.
$ ssh-keygen -t rsa -f ./teriyaki_key -N " " -q
9) There will be 2 files generated after the command above. Copy the one ending with .pub to your phone. Keep the other on computer, you may move it to ~/.ssh folder also.
Now on termux, add the public key you generated on computer to ssh's authorized keys file using
$ cat teriyaki_key.pub >> ~/.ssh/authorized_keys
10) Now you can connect to termux ssh from pc using the secret key instead of entering password everytime, it's also more secure.
eg:$ ssh phoneip -p 8022 -i ~/.ssh/teriyaki_key
11) Now update the script (3rd line) with your secret key's location.
PHONE_KEY="~/.ssh/teriyaki_key"
Script is now ready to go. Don't forget to start ssh daemon (sshd) on termux before you use the script. You may want to acquire wake lock for faster response and to avoid timeouts.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Control your phone using advantages of the termux-api over ssh from your linux pc.
F E A T U R E S :
arp-scan* - for scanning phone's IP adress from it's MAC
ssh* - core of whole script
sshfs - for mounting folder option
sqlite3 - for sms option, parsing the sms databases
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) git clone https://github.com/KebabLord/teriyaki.git
2) cd teriyaki
3) After you updated script's first line with your phone's mac address, generate ssh keys using:
$ ssh-keygen -t rsa -f ./teriyaki_key -N " " -q
4) copy the public key (the one ending with .pub) to phone and keep the secret key on PC.
After that, on termux:
$ cat teriyaki_key.pub >> ~/.ssh/authorized_keys
5) edit script's 2nd line with the location of your key on PC.
$ mv ./teriyaki_key ~/.ssh/ PHONE_KEY="~/.ssh/teriyaki_key"
6) Detailed answer
First of all start by adding your phone's mac address to script's 2nd line. You can find your phone's mac address in phone settings>system>about phone>status>Wifi mac adress or from your wireless' admin panel, or using nmap like tools. The script needs your phone's MAC in order to find it's current IP address. MAC addresses are static unlike IP.
7) Now you need to exchange secret key in order to use teriyaki script without getting "enter ssh password" prompt every single time.
8) Generate an ssh secret key on your computer, the command below will generate a key with no password named teriyaki_key.
$ ssh-keygen -t rsa -f ./teriyaki_key -N " " -q
9) There will be 2 files generated after the command above. Copy the one ending with .pub to your phone. Keep the other on computer, you may move it to ~/.ssh folder also.
Now on termux, add the public key you generated on computer to ssh's authorized keys file using
$ cat teriyaki_key.pub >> ~/.ssh/authorized_keys
10) Now you can connect to termux ssh from pc using the secret key instead of entering password everytime, it's also more secure.
eg:$ ssh phoneip -p 8022 -i ~/.ssh/teriyaki_key
11) Now update the script (3rd line) with your secret key's location.
PHONE_KEY="~/.ssh/teriyaki_key"
Script is now ready to go. Don't forget to start ssh daemon (sshd) on termux before you use the script. You may want to acquire wake lock for faster response and to avoid timeouts.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
KebabLord/teriyaki
Control your phone using advantages of the termux-api over ssh from your linux pc. - KebabLord/teriyaki
π¦Bash2Mp4 is a tool to Download Videos.This tool can Download Videos from more than 20 sites.This Tool is created for Educational Purpose only.
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) apt update
2) apt install git -y
3) git clone https://github.com/htr-tech/bash2mp4
4) cd bash2mp4
5) bash setup.sh
6) Type b2mp4 to run the Tool.
Or, Use Single Command
apt update && apt install git -y && git clone https://github.com/htr-tech/bash2mp4 && cd bash2mp4 && bash setup.
β
β β β Uππ»βΊπ«Δπ¬πβ β β β
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) apt update
2) apt install git -y
3) git clone https://github.com/htr-tech/bash2mp4
4) cd bash2mp4
5) bash setup.sh
6) Type b2mp4 to run the Tool.
Or, Use Single Command
apt update && apt install git -y && git clone https://github.com/htr-tech/bash2mp4 && cd bash2mp4 && bash setup.
β
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦how see gmail from youtube:
1) go to the channel page and click on the βAboutβ tab.
2)Many YouTubers leave an email address for inquiries. All you have to do is complete the human verification, and it will show the email address to contact the YouTube user.
3) note that not all YouTube users put their email address in.
4) this all:)
π¦Methode 2 :
1) YouTube will not directly tell users what email address is tied to their channel(s) in the event they forget.
2) The Account Recovery options they provide is all users have to try and recall your channel login. If the options do not successfully regain access to a channel, there is nothing further they can do to assist.
3) If you are able to log into a Google Account, but are unsure if that account has access to the channel, you can visit https://www.youtube.com/channel_switcher while logged in to see if the channel in question is listed.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦how see gmail from youtube:
1) go to the channel page and click on the βAboutβ tab.
2)Many YouTubers leave an email address for inquiries. All you have to do is complete the human verification, and it will show the email address to contact the YouTube user.
3) note that not all YouTube users put their email address in.
4) this all:)
π¦Methode 2 :
1) YouTube will not directly tell users what email address is tied to their channel(s) in the event they forget.
2) The Account Recovery options they provide is all users have to try and recall your channel login. If the options do not successfully regain access to a channel, there is nothing further they can do to assist.
3) If you are able to log into a Google Account, but are unsure if that account has access to the channel, you can visit https://www.youtube.com/channel_switcher while logged in to see if the channel in question is listed.
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Grow a Profitable Affiliate Website with Long Tail Keywords That Ranks in Google. Learn from people with experience, and build a successful online businessβ¦
https://mega.nz/folder/RYxmyIDS#dG6ASQ2bFuqbYMncFrtuZg
https://mega.nz/folder/RYxmyIDS#dG6ASQ2bFuqbYMncFrtuZg
mega.nz
6.67 GB folder on MEGA
146 files and 17 subfolders
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Exploitation of the blind command injection vulnerability
#FastTips
1) A command injection (also known as remote code execution) vulnerability allows commands to be executed at the operating system level. Such vulnerabilities can be found in web applications, routers.
2) A detailed description of this vulnerability and methods of exploitation are described in the article " OS Command Injection : Concept, Operation, Automated Vulnerability Search".
3) mentions the blind command injection vulnerability and shows examples of its exploitation. However, the blind vulnerability is harder to understand and slightly harder to exploit - instead of injecting a payload and watching the results right in a browser window or console, you need to use a third-party web server.
βββββββββββββββββββββββ-
π¦For training we need:
1) machine with web server and vulnerable web application
2) attacker's web server - it could be a second machine on the local network or your hosting
The following script will execute the role of the vulnerable application:
<!DOCTYPE html>
<html>
<head>
<meta charset="UTF-8">
<title>undercode </title>
</head>
<body>
<form>
<input name="message" type="text" />
<input type="submit">
</form>
<?php
if (isset($_GET["message"])) {
exec ('echo ' . $_GET["message"] . ' >> /tmp/messages');
}
?>
</body>
</html>
written
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Exploitation of the blind command injection vulnerability
#FastTips
1) A command injection (also known as remote code execution) vulnerability allows commands to be executed at the operating system level. Such vulnerabilities can be found in web applications, routers.
2) A detailed description of this vulnerability and methods of exploitation are described in the article " OS Command Injection : Concept, Operation, Automated Vulnerability Search".
3) mentions the blind command injection vulnerability and shows examples of its exploitation. However, the blind vulnerability is harder to understand and slightly harder to exploit - instead of injecting a payload and watching the results right in a browser window or console, you need to use a third-party web server.
βββββββββββββββββββββββ-
π¦For training we need:
1) machine with web server and vulnerable web application
2) attacker's web server - it could be a second machine on the local network or your hosting
The following script will execute the role of the vulnerable application:
<!DOCTYPE html>
<html>
<head>
<meta charset="UTF-8">
<title>undercode </title>
</head>
<body>
<form>
<input name="message" type="text" />
<input type="submit">
</form>
<?php
if (isset($_GET["message"])) {
exec ('echo ' . $_GET["message"] . ' >> /tmp/messages');
}
?>
</body>
</html>
written
@UndercodeTesting
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦start hacking for beginers :
1) Penetration Testing of an FTP Server:
https://medium.com/p/19afe538be4b
2) Reverse Engineering of the Anubis Malware Γ’β¬β Part 1:
https://medium.com/p/741e12f5a6bd
3) Privilege Escalation on Linux with Live examples:
https://resources.infosecinstitute.com/privilege-escalation-linux-live-examples/
4) Pentesting Cheatsheets:
https://ired.team/offensive-security-experiments/offensive-security-cheetsheets
5) Powershell Payload Delivery via DNS using Invoke-PowerCloud:
https://ired.team/offensive-security-experiments/payload-delivery-via-dns-using-invoke-powercloud
6) SMART GOOGLE SEARCH QUERIES TO FIND VULNERABLE SITES Γ’β¬β LIST OF 4500+ GOOGLE DORKS:
https://sguru.org/ghdb-download-list-4500-google-dorks-free/
7) SQL Injection Cheat Sheet:
https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/
8) SQLmapΓ’β¬β’s os-shell + Backdooring website with Weevely:
https://medium.com/p/8cb6dcf17fa4
9) SQLMap Tamper Scripts (SQL Injection and WAF bypass) Tips:
https://medium.com/p/c5a3f5764cb3
10 )BugBounty Γ’β¬β How I was able to download the Source Code of IndiaΓ’β¬β’s Largest Telecom Service Provider including dozens of more popular websites!:
https://medium.com/p/52cf5c5640a1
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦start hacking for beginers :
1) Penetration Testing of an FTP Server:
https://medium.com/p/19afe538be4b
2) Reverse Engineering of the Anubis Malware Γ’β¬β Part 1:
https://medium.com/p/741e12f5a6bd
3) Privilege Escalation on Linux with Live examples:
https://resources.infosecinstitute.com/privilege-escalation-linux-live-examples/
4) Pentesting Cheatsheets:
https://ired.team/offensive-security-experiments/offensive-security-cheetsheets
5) Powershell Payload Delivery via DNS using Invoke-PowerCloud:
https://ired.team/offensive-security-experiments/payload-delivery-via-dns-using-invoke-powercloud
6) SMART GOOGLE SEARCH QUERIES TO FIND VULNERABLE SITES Γ’β¬β LIST OF 4500+ GOOGLE DORKS:
https://sguru.org/ghdb-download-list-4500-google-dorks-free/
7) SQL Injection Cheat Sheet:
https://www.netsparker.com/blog/web-security/sql-injection-cheat-sheet/
8) SQLmapΓ’β¬β’s os-shell + Backdooring website with Weevely:
https://medium.com/p/8cb6dcf17fa4
9) SQLMap Tamper Scripts (SQL Injection and WAF bypass) Tips:
https://medium.com/p/c5a3f5764cb3
10 )BugBounty Γ’β¬β How I was able to download the Source Code of IndiaΓ’β¬β’s Largest Telecom Service Provider including dozens of more popular websites!:
https://medium.com/p/52cf5c5640a1
@undercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Medium
Penetration Testing of an FTP Server
Welcome to Internal penetration testing on FTP server where you will learn FTP installation and configuration, enumeration and attackβ¦
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to Remove Docker Image ?
1) To remove the docker image from your system, you will need to list out all available images in your system.
You can list them using the following command:
docker image ls
2) You should see the following output:
REPOSITORY TAG IMAGE ID CREATED SIZE
nginx latest 4bb46517cac3 2 days ago 133MB
wordpress latest f1da35a7ddca 3 days ago 546MB
mariadb latest b95867b52886 4 days ago 407MB
Now, you have a list of all images in your system. Next, locate the ID of the image that you want to remove and run the following command:
> docker image rm 4bb46517cac3
3) You should see the following error:
Error response from daemon: conflict: unable to delete 4bb46517cac3 (cannot be forced)
- image is being used by running container 8f3d538370e5
4) This output indicates any container uses the image you want to remove. So you will need to remove that container before removing the image.
If you want to remove multiple images, you will need to specify the ID of each docker image with βdocker image rmβ command:
> docker image rm ID1 ID2 ID3
Remove Dangling Docker Images
A dangling image is an unused image that is not used by any container. You can remove the dangling image from your system by running the following command:
docker image prune
5) You will be prompt to type y to continue, as shown below:
WARNING! This will remove all dangling images.
Are you sure you want to continue? [y/N] y
Total reclaimed space: 0B
6) Remove All Unused Docker Images
Docker allows you to remove all images that are not used by any containers using a single command, as shown below:
docker image prune -a
7) You will be prompt to type y to continue, as shown below:
WARNING! This will remove all images without at least one container associated with them.
Are you sure you want to continue? [y/N] y
8) Deleted Images:
untagged: ubuntu:latest
untagged: ubuntu@sha256:5d1d5407f353843ecf8b16524bc5565aa332e9e6a1297c73a92d3e754b8a636d
deleted: sha256:1e4467b07108685c38297025797890f0492c4ec509212e2e4b4822d367fe6bc8
Total reclaimed space: 0B
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦How to Remove Docker Image ?
1) To remove the docker image from your system, you will need to list out all available images in your system.
You can list them using the following command:
docker image ls
2) You should see the following output:
REPOSITORY TAG IMAGE ID CREATED SIZE
nginx latest 4bb46517cac3 2 days ago 133MB
wordpress latest f1da35a7ddca 3 days ago 546MB
mariadb latest b95867b52886 4 days ago 407MB
Now, you have a list of all images in your system. Next, locate the ID of the image that you want to remove and run the following command:
> docker image rm 4bb46517cac3
3) You should see the following error:
Error response from daemon: conflict: unable to delete 4bb46517cac3 (cannot be forced)
- image is being used by running container 8f3d538370e5
4) This output indicates any container uses the image you want to remove. So you will need to remove that container before removing the image.
If you want to remove multiple images, you will need to specify the ID of each docker image with βdocker image rmβ command:
> docker image rm ID1 ID2 ID3
Remove Dangling Docker Images
A dangling image is an unused image that is not used by any container. You can remove the dangling image from your system by running the following command:
docker image prune
5) You will be prompt to type y to continue, as shown below:
WARNING! This will remove all dangling images.
Are you sure you want to continue? [y/N] y
Total reclaimed space: 0B
6) Remove All Unused Docker Images
Docker allows you to remove all images that are not used by any containers using a single command, as shown below:
docker image prune -a
7) You will be prompt to type y to continue, as shown below:
WARNING! This will remove all images without at least one container associated with them.
Are you sure you want to continue? [y/N] y
8) Deleted Images:
untagged: ubuntu:latest
untagged: ubuntu@sha256:5d1d5407f353843ecf8b16524bc5565aa332e9e6a1297c73a92d3e754b8a636d
deleted: sha256:1e4467b07108685c38297025797890f0492c4ec509212e2e4b4822d367fe6bc8
Total reclaimed space: 0B
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦speed up any windows recommended by Microsoft :
https://www.microsoft.com/en-us/p/total-pc-cleaner-free-disk-space-clean-up-optimize-memory-windows-system/9nb3xctl0rwd?activetab=pivot:overviewtab#
https://www.microsoft.com/en-us/p/speed-o-meter/9nblggh4n9fs?activetab=pivot:overviewtab
https://www.microsoft.com/en-us/p/360-total-security/9nblggh1np58?activetab=pivot:overviewtab
https://www.microsoft.com/en-us/p/duplicate-cleaner-master/9nblggh52s41?activetab=pivot:overviewtab#
https://www.microsoft.com/en-us/p/comet-disk-cleanup/9n5xkh8shwqv?activetab=pivot:overviewtab
https://www.microsoft.com/en-us/p/smart-disk-cleanup/9pm1sh8s2vqv?activetab=pivot:overviewtab#
https://www.microsoft.com/en-us/p/trend-cleaner-free-your-disk-computer/9nwmt7tmtmn0?activetab=pivot%3Aoverviewtab
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦speed up any windows recommended by Microsoft :
https://www.microsoft.com/en-us/p/total-pc-cleaner-free-disk-space-clean-up-optimize-memory-windows-system/9nb3xctl0rwd?activetab=pivot:overviewtab#
https://www.microsoft.com/en-us/p/speed-o-meter/9nblggh4n9fs?activetab=pivot:overviewtab
https://www.microsoft.com/en-us/p/360-total-security/9nblggh1np58?activetab=pivot:overviewtab
https://www.microsoft.com/en-us/p/duplicate-cleaner-master/9nblggh52s41?activetab=pivot:overviewtab#
https://www.microsoft.com/en-us/p/comet-disk-cleanup/9n5xkh8shwqv?activetab=pivot:overviewtab
https://www.microsoft.com/en-us/p/smart-disk-cleanup/9pm1sh8s2vqv?activetab=pivot:overviewtab#
https://www.microsoft.com/en-us/p/trend-cleaner-free-your-disk-computer/9nwmt7tmtmn0?activetab=pivot%3Aoverviewtab
β β β Uππ»βΊπ«Δπ¬πβ β β β
Microsoft
Get Total PC Cleaner - Clean Disk & Cache from the Microsoft Store
Best FREE PC cleaner in 2021. Free disk space clean up, optimize memory, and speed up Windows system. Optimize and clean my PC.
Cleaner & PC Cleaner for free. CCleaner & Clean master alternative cleaner.
Keep your computer clean and fast with Total PCβ¦
Cleaner & PC Cleaner for free. CCleaner & Clean master alternative cleaner.
Keep your computer clean and fast with Total PCβ¦
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HACKING TOP PDF :
https://mega.nz/#!3Hw0jKrA!CQgjBPlShS8F0I78VtjUSRiVbxgaX3XXI7MwvPKJ5xE
https://mega.nz/#!WWxQxDra!aZXzFU1xmzQ2WA5oREynES09jNrrghlA4nJoMiD2D08
https://mega.nz/#!Pe5EWYYC!-wdbOjgzpqKoP-cIfk53lnJnzZRJu_UsVmQb-yU_-lU
https://mega.nz/#!mKYgGJbS!Uukn-N1UgrrL8H3l782zamAfcRcqdEUYgzZNDRaThFU
https://mega.nz/#!PKx3jQ6R!01pz7962NoK6OO5T2l4cpZ_DfmjblNYCxgdaXFFY1js
https://mega.nz/#!fLAQSaKY!wXcwBlMLtQrAbjSjI3xffdoxqtArpi8LilnNRDiuNkw
https://mega.nz/#!SKQzhCbZ!nq-5UeolLFCNJXAjQaozndbiL2ZZMLhJCzIA6kZHEtk
https://mega.nz/#!mOhEWKhR!C4JmiXrvYrZBMk4K8ez4oa7UKp9awyflQDx1UIayhAU
https://mega.nz/#!jS53wbSa!nQg__qNxQUffbEKk6_dAOAJq8cKzNPEPrFDGsbNgaO0
https://mega.nz/#!3CICFKyK!T5wr-7w8Ua9ZWghOO7zYkDpmZj99EXMNnKEwWXaX17M
https://mega.nz/#!eLQklSTK!X7kbivoPlTI_TAUpYag5qi2AKgqreG_eFADsqNURibk
https://mega.nz/#!HfQ2lSQR!LBrGdhRENQUpuGO3ud_6eG438JG-2FK8Yekrm175pcM
https://mega.nz/#!HfQ2lSQR!LBrGdhRENQUpuGO3ud_6eG438JG-2FK8Yekrm175pcM
https://mega.nz/#!2G4ynDRY!x9BWn6AQnT2yqusi3UU_wctymGQ09T7HcmQnRlnOC0Q
https://mega.nz/#!WGRlVJyQ!ojxMbOZOlki3bH_ZwwPNMTrGvkjfS9Yf3lanxuiFp4I
https://mega.nz/#!zWgGlR7Q!4SeJkHrVoB1H4lTNmR2w8bypAWTQSAyRwXFufxyajDI
https://mega.nz/#!nP5lnCzL!NBZxeTM14sAd-Zar9ObrSxICTSSP9t4l9VjTA5OxSl0
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦HACKING TOP PDF :
https://mega.nz/#!3Hw0jKrA!CQgjBPlShS8F0I78VtjUSRiVbxgaX3XXI7MwvPKJ5xE
https://mega.nz/#!WWxQxDra!aZXzFU1xmzQ2WA5oREynES09jNrrghlA4nJoMiD2D08
https://mega.nz/#!Pe5EWYYC!-wdbOjgzpqKoP-cIfk53lnJnzZRJu_UsVmQb-yU_-lU
https://mega.nz/#!mKYgGJbS!Uukn-N1UgrrL8H3l782zamAfcRcqdEUYgzZNDRaThFU
https://mega.nz/#!PKx3jQ6R!01pz7962NoK6OO5T2l4cpZ_DfmjblNYCxgdaXFFY1js
https://mega.nz/#!fLAQSaKY!wXcwBlMLtQrAbjSjI3xffdoxqtArpi8LilnNRDiuNkw
https://mega.nz/#!SKQzhCbZ!nq-5UeolLFCNJXAjQaozndbiL2ZZMLhJCzIA6kZHEtk
https://mega.nz/#!mOhEWKhR!C4JmiXrvYrZBMk4K8ez4oa7UKp9awyflQDx1UIayhAU
https://mega.nz/#!jS53wbSa!nQg__qNxQUffbEKk6_dAOAJq8cKzNPEPrFDGsbNgaO0
https://mega.nz/#!3CICFKyK!T5wr-7w8Ua9ZWghOO7zYkDpmZj99EXMNnKEwWXaX17M
https://mega.nz/#!eLQklSTK!X7kbivoPlTI_TAUpYag5qi2AKgqreG_eFADsqNURibk
https://mega.nz/#!HfQ2lSQR!LBrGdhRENQUpuGO3ud_6eG438JG-2FK8Yekrm175pcM
https://mega.nz/#!HfQ2lSQR!LBrGdhRENQUpuGO3ud_6eG438JG-2FK8Yekrm175pcM
https://mega.nz/#!2G4ynDRY!x9BWn6AQnT2yqusi3UU_wctymGQ09T7HcmQnRlnOC0Q
https://mega.nz/#!WGRlVJyQ!ojxMbOZOlki3bH_ZwwPNMTrGvkjfS9Yf3lanxuiFp4I
https://mega.nz/#!zWgGlR7Q!4SeJkHrVoB1H4lTNmR2w8bypAWTQSAyRwXFufxyajDI
https://mega.nz/#!nP5lnCzL!NBZxeTM14sAd-Zar9ObrSxICTSSP9t4l9VjTA5OxSl0
@UndercodeTesting
@UndercodeHacking
@UndercodeSecurity
β β β Uππ»βΊπ«Δπ¬πβ β β β
mega.nz
MEGA provides free cloud storage with convenient and powerful always-on privacy. Claim your free 20GB now