UNDERCODE SECURITY
226 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

New bins & LIVE CC βœ…:

πŸ¦‘Bins For Amazon Prime Video

Bin : 442756103622xxxxβœ…
442756161628xxxxβœ…

Date: 01/24
CVV : 067
IP : USA πŸ‡ΊπŸ‡Έ
Zip Code : 11213

πŸ¦‘LIVE CC


1DUMP ITEMS:
bin | track1 | track2 | country | bank | state | city | zip | brand | card_level | card_type
414720 | 41472023035993b 67^BLUM/ELLIOT ^2204201100001100000000960000000 | 4147202303599367=220420110000960 | United States | Chase Bank Usa, N.a. | FL | Jacksonville | 32216 | Visa | Signature | credit

2DUMP ITEMS:
bin | track1 | track2 | country | bank | state | city | zip | brand | card_level | card_type
414720 | 4147202303413353^WINDNESS/CHRISTINE ^2204201100001100000000349000000 | 4147202303413353=220420110000349 | United States | Chase Bank Usa, N.a. | FL | Jacksonville | 32216 | Visa | Signature | credit

DUMPED:

bin | track1 | track2 | country | bank | state | city | zip | brand | card_level | card_type
414720 | 4147202293734057^TAORMINA/MIK ^2201201101841100000000596000000 | 4147202293734057=220120110184596 | United States | Chase Bank Usa, N.a. | FL | Jacksonville | 32216 | Visa | Signature | credit

6DUMP ITEMS:
bin | track1 | track2 | country | bank | state | city | zip | brand | card_level | card_type
414720 | 4147202155469628^APTER/JANICE ^2205201164151100000000454000000 | 4147202155469628=220520116415454 | United States | Chase Bank Usa, N.a. | FL | Jacksonville | 32216 | Visa | Signature | credit

8DUMP ITEMS:
bin | track1 | track2 | country | bank | state | city | zip | brand | card_level | card_type
414720 | 4147202306712702^GAVRIC/IGOR ^2205201100001100000000992000000 | 4147202306712702=220520110000992 | United States | Chase Bank Usa, N.a. | FL | Jacksonville | 32216 | Visa | Signature | credit
9DUMP ITEMS:
bin | track1 | track2 | country | bank | state | city | zip | brand | card_level | card_type
414720 | 4147202315339372^PARK/SANGHA ^2207201100001100000000394000000 | 4147202315339372=220720110000394 | United States | Chase Bank Usa, N.a. | FL | Jacksonville | 32216 | Visa | Signature | credit

1DUMP ITEMS:
bin | track1 | track2 | country | bank | state | city | zip | brand | card_level | card_type
414720 | 4147202307761518^FLEMING/JOHN ^2205201100001100000000011000000 | 4147202307761518=220520110000011 | United States | Chase Bank Usa, N.a. | FL | Jacksonville | 32216 | Visa | Signature | credit

2DUMP ITEMS:
bin | track1 | track2 | country | bank | state | city | zip | brand | card_level | card_type
414720 | 4147202299437564^LANE/SHALIMAR ^2203201100001100000000678000000 | 4147202299437564=220320110000678 | United States | Chase Bank Usa, N.a. | FL | Jacksonville | 32216 | Visa | Signature | credit

3DUMP ITEMS:
bin | track1 | track2 | country | bank | state | city | zip | brand | card_level | card_type
414720 | 4147202314408160^BEICH/JAMES ^2207201150351100000000500000000 | 4147202314408160=220720115035500 | United States | Chase Bank Usa, N.a. | FL | Jacksonville | 32216 | Visa | Signature | credit



4DUMP ITEMS:
bin | track1 | track2 | country | bank | state | city | zip | brand | card_level | card_type
414720 | 4147202313506980^SUTO/AMANDA ^2206201100001100000000263000000 | 4147202313506980=220620110000263 | United States | Chase Bank Usa, N.a. | FL | Jacksonville | 32216 | Visa | Signature | credit


5DUMP ITEMS:
bin | track1 | track2 | country | bank | state | city | zip | brand | card_level | card_type
414720 | 4147202317133450^FRANCIS/EUGENE ^2207201100001100000000325000000 | 4147202317133450=220720110000325 | United States | Chase Bank Usa, N.a. | FL | Jacksonville | 32216 | Visa | Signature | credit


(ONLY VERIFIED βœ… BY UNDERCODE/NOT CREATED)

ENJOY β€οΈπŸ‘πŸ»
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘Spoofing (spoofing) MAC addresses in NetworkManager
NetworkManager can reassign MAC installed by other programs

Starting with NetworkManager 1.4.0, this program supports MAC spoofing, and has many different options.

So that we can understand them, we need to understand some concepts.

First, network adapters are:

1) wired ( ethernet );

2) wireless ( wifi )

each group, MAC rules are configured separately

πŸ¦‘Secondly, a wireless adapter can be in two states:

1) scan (search, not connected to the network) - set using the wifi.scan-rand-mac-address property , set to yes by default , which means that it sets an arbitrary MAC address during the scan. Another valid value is no ;

2) connected to the network - set using the wifi.cloned-mac-address property , the default value is preserve

πŸ¦‘The following values ​​(modes) are available for the wired interface (set by the ethernet.cloned-mac-address property ) and the wireless interface in the connected state (set by the wifi.cloned-mac-address property ):

1) explicit MAC address (i.e., you can write down the desired value that will be assigned to the network interface)

2) permanent : use the device’s embedded MAC address
preserve : do not change the MAC address of the device after activation (for example, if the MAC was changed by another program, the current address will be used)

3) random : generate a random value for each connection
stable : similar to random - i.e. generate a random value for each connection, BUT when connecting to the same network the same value will be generated

4) NULL / not set : this is the default value that allows you to roll back to the global default settings. If global settings are not set, then NetworkManager rolls back to preserve .


ENJOY β€οΈπŸ‘πŸ»
Written by
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘HACK CCTV VIA LINUX TERMUX 2020 UPDATE
#Requested
fastest way

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1️⃣apt-get install python3

2️⃣apt-get install git

3️⃣git clone
https://github.com/AngelSecurityTeam/Cam-Hackers

4️⃣pip3 install requests

5️⃣cd Cam-Hackers

6️⃣python3
cam-hackers.py

7️⃣choose options via numbers

ENJOYβ€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘NETWORK HACKING #TERMS :

Key terms:

1️⃣Feeder - Source of IP addresses for scanning. Angry IP Scanner provides various scanning sources: IP Range, IP List File or Random. You can select a source from the drop-down list next to the "Start" button

2️⃣Data collector - collects specific information about the host, such as ping time, host name, open ports. Collectors are usually columns as a result of a scan. They can be selected in the menu "Tools-> Data Collectors".

3️⃣Active host - the host responding to ping. The results sheet is marked in blue.

4️⃣Inactive host - a host that does not respond to ping (red). However, it may have open ports (if the firewall blocks ping). In order to fully scan such hosts, check the "Scan inactive" checkbox in Tools-> Preferences.

5️⃣Open port - TCP port that responded to the connection attempt. Greens on the list.

6️⃣Filtered port - TCP port, does not respond to the fact that it is closed (there is no RST packet). Probably these ports are specifically blocked by firewalls.

7️⃣ICMP echo is the standard method used by the 'ping' program. On most platforms, requires administrator privileges. Some firewalls prohibit response packets to an ICMP request, making active hosts look inactive.

8️⃣UDP - sends UDP packets (datagrams) to one of the host ports and monitors the response (whether or not). Not standard, but does not require privileges.

9️⃣TCP - trying to connect to the 80 (http) port. UDP may work better for some networks, usually not.

ENJOYβ€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘#News WastedLocker: Symantec identified a wave of attacks against US organizations😱

>Symantec, a Broadcom subsidiary, discovered and warned users that the attackers attempted to deploy the WastedLocker ransomware and carried out a series of attacks on American companies. The ultimate goal of these attacks is to weaken the victim's IT infrastructure by encrypting most of the victim's computers and servers to demand a ransom of millions of dollars. At least 31 organizations are currently under attack, which means The attacker has compromised the target organization's network and is laying the foundation for a ransomware attack.

> It is a relatively new directional ransomware that was recorded before the NCC Group was released , and Symantec is expanding the affected network. WastedLocker was attributed to the infamous "Evil Corp" cybercrime organization, Evil Corp has been associated with Dridex Bank Trojan and BitPaymer ransomware, the amount of ransom is up to tens of millions of dollars. Two Russian men suspected of participating in the organization have prosecuted them publicly in the United States .

> These attacks started with a malicious JavaScript-based framework called SocGholish, which was tracked to update more than 150 threatened websites disguised as software. Once the attacker enters the victim's network, they will use Cobalt Strike malware and some non-native tools to steal identity documents, upgrade privileges, and then move around the network to deploy WastedLocker ransomware on multiple computers.

@UndercodeNews
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘Cardable sites for games :


www.instant-gaming.com
www.kinguin.net -> Skrill
www.getgamesgo.com
www.bundlestars.com -> It's a very very good site
www.dlgamer.us
www.yuplay.com
www.elitekeys.com
www.gog.com
www.offgamers.com
www.gamersgate.com
www. bundlestars . com - > It ' s a very very good site
www. dlgamer . us
www. yuplay. com
www. elitekeys . com
www. gog . com
www. offgamers . com
www. gamersgate . com
www. go2 arena . com
www.gamecards.com

for learn only !
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
Forwarded from Backup Legal Mega
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘HOW TO GET 2020 CC CARD-CARDING METH :

HOW
TO TAKE A Special VALID CREDIT CARD

1️⃣ GO to http:/www.e-coin.io/ and Account formation. False INFORMATIONS may be used


2️⃣get WireX Software On The SmartPhone (Playstore / Appstore) lastest version

3️⃣ Login to The E-Coin.io Mobile Program

(When doing this stuff I used all the false information)

4️⃣ Build a new WireX Mobile USD coin. Consider it a VCC US Dollar (virtual credit card)

5️⃣Go back to E-Coin.io or the device WireX;

Submit CVV (CC #, Exp Date and CVV Numbers will be submitted to you)



You now have a Virtual Credit Card which you can use or add to BITCOINS or any service requiring one.

#deepwebTip
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘ CC 2020 popular SHOP SITES :

1) unicc.cm
(btc donation)

2) fe-acc18.ru
(Activation Require 20$ Btc )

3) vclub.shop
(Activation Require 10$ Btc.)

4) https://jstash.bazar
(Activation require 20$ Btc & this site link open in Blockchain Dns)

5) Validcc.tw
(Activation Fees is 50$ & 200$ btc for premium)

6) https://validccshop.online/

7) http://store-cc.ru/

8) https://cc-shop.su/

9) https://centralshop.cn/

▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘Web Application Firewall Fingerprinting Tool
-termux-linux

> Sends a normal HTTP request and analyses the response; this identifies a number of WAF solutions.

> If that is not successful, it sends a number of (potentially malicious) HTTP requests and uses simple logic to deduce which WAF it is.

> If that is also not successful, it analyses the responses previously returned and uses another simple algorithm to guess if a WAF or security solution is actively responding to our attacks.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1️⃣git clone https://github.com/EnableSecurity/wafw00f.git

2️⃣cd wafw00f

3️⃣python setup.py install

4️⃣EXAMPLES:

1) Testing a Single URL

The URL can be directly supplied to the script after WAFW00F has been built and installed on the system.

> wafw00f
http://example.com

2) Testing Multiple URLs

Multiple URLs can be supplied one after another using spaces.

> wafw00f
http://example.com http://host.com http://site.tld

3) Listing All Supported WAFs

> Option: -l or --list

4) This option lists all the available supported WAF products by WAFW00F. With this option the companies manufacturing the WAF product can also be viewed alongside the WAF name.

> wafw00f --list

5) Adding Custom Headers

> Option: -H or --headers

6) WAFW00F has its own set of default headers by which it makes the requests. The headers are specifically suited for emulating a Chrome browser running on a Windows platform. This option enables you to supply a comma separated list of custom headers which you might want WAFW00F to use during all requests.

> wafw00f
http://example.com -H headers.txt

NOTE: The headers which you will supply will overwrite the list of default headers.

7) Using Proxies

> Option: -p or --proxy

8) With this option, you can use proxies to route the requests through. The scheme should be in the normal URL format <scheme>://<username:password>@<hostname>:<port>, where the username and password can be used in cases where the proxy server supports authentication.

> wafw00f
http://example.com -p http://user:pass@127.0.0.1:8080

9) Testing For A Single WAF Instance

> Option: -t or --test

10) This option helps you set WAFW00F to test for a single instance of a WAF. When this argument is supplied, WAFW00F will test and try to match the fingerprint for the given WAF only. The supplied WAF name should be equal to at least one of the names within
wafprio.py. You can use the --list argument to list the products supported by the WAF.

> wafw00f
http://example.com -t 'Edgecast (Verizon Digital Media)'

ENJOY β€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
Forwarded from Free Premium Accounts Telegram Channel - Netflix - Spotify
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Free Premium Accounts Telegram Channel - Netflix - Spotify
Please open Telegram to view this post
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘57 New cc generator list


1) https://namso-gen.com

2) http://namso.ezyro.com/?i=1

3) http://archive.li/gvfdN

4) https://ia1000.com

6) http://sourcebinccgen.ml/CCGENSBC1/

7) http://sourcebinccgen.ml/CCGENSBC2/

8) https://obtain-link.com/checker2/Index.php

9) http://namsocc.net

10) https://ccgen.srijo.tech

11) http://www.b7k-checker.club

12) https://tnb-generator.000webhostapp.com

13) http://profetaschek.xyz/gen/

14) https://holk.xyz

15) https://www.ondroid.ga

16) https://cccardgen.es.tl

17) http://x-secret.net/ccgen/

18) http://ad365.me/

19) https://www.ccgen.mx

20)https://web.archive.org/web/20160726182003/https://cc.namsoelite.com/

21) http://www.b7k-checker.club/

22) http://hitlerccgen.com

23) http://blckcardgen.xyz/~blckcard/

24) https://cc.ajpro.ml/

25) https://www.ccgen.mx/

26) http://namsodebit.co/

27) http://vpnclub.ml/cg/

28) http://educapro.mx

29) http://namsopirates.xyz

30) http://www.bv1.tech

31) https://namso.gdn/gen/

32) http://www.beshoycc.com

33) http://safra.000webhostapp.com/cassa/

34) https://bin.isecurity.pw

35) http://virusteamdlg.com/gen/

36) https://namso5.com/

37) http://sourcebinccgen.ml/CCGENSBC3/

38) https://www.bestccgen.com/

39) https://creditcardgenerator.com/

40) https://creditcardgenerator.com/visa-credit-card-generator/

41) https://www.gleanster.com/credit-card-generator-with-cvv-and-expiration-date/history/

42) https://saijogeorge.com/dummy-credit-card-generator/

43) https://generator-credit-card.com/

44) https://www.vccgenerator.com/

45) https://www.creditcardrush.com/credit-card-generator-with-money/

46) https://fake-card-generator.com/

47) https://namso-gen.com/

48) https://www.elfqrin.com/discard_credit_card_generator.php

49) https://dzmohaipa.com/Bin/Dz/

50) https://xuls.to/gen/

51) https://databusterz.com/ccgen/

52) https://sieuthuthuat.com/bin

53) https://namso5.com/

54) http://geekhackerzccgen.tk

55) http://Primebox.ml

56) Anonymouspal.me

57) http://ccteam17.xyz/card/ccg/
bv1.tech

58) http://dark-h-zone.cf

ENJOY β€οΈπŸ‘πŸ»
written by
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁