UNDERCODE SECURITY
225 subscribers
295 photos
1.03K files
1.73K links
๐Ÿฆ‘WELCOME IN UNDERCODE TESTING FOR LEARN HACKING | PROGRAMMING | SECURITY & more..

THIS CHANNEL BY :

@UndercodeTesting
UndercodeTesting.com (official)

@iUndercode
iUndercode.com (iOs)

@Dailycve
DailyCve.com


@UndercodeNews
UndercodeNews.com
Download Telegram
Random Pdfs secret tricks & methodes ..tutorials :)
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซ6๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Android malware named FakeSpy "reappears" after three years is more dangerous than before :
#News

> According to foreign media BGR reports, an Android malware called FakeSpy reproduces Jianghu, the current main target is users in the United States and Western Europe. The application can steal user text messages, bank information and application data. The malware was spread via a text message that appeared to come from a local post office, and instructed users to download an application disguised as a legitimate post office application.


> According to a new report from Cybereason, a dangerous Android malware called FakeSpy has reappeared. FakeSpy was first discovered by security researchers nearly three years ago. It is a particularly malicious malware designed to steal user text messages, financial data, bank login information, application data, contact lists, etc.

>In its initial incarnation, the app targets users in South Korea and Japan. Recently, however, this application has become more ambitious, and is now targeting users around the world. Currently, some countries targeted by the malware include China, France, Germany, the United Kingdom and the United States. It is reported that the current iteration of FakeSpy is also more powerful and complicated than the original version, which means that Android users should be particularly vigilant to avoid receiving suspicious information.

> FakeSpy's way of spreading is quite clever. The first is a text message claiming to be from a local post office. The text message claimed that the post office tried to deliver a package, but the user could not deliver it because the user was not at home. Then, it provides a link that the user can click, which leads the user to download an application disguised as a legitimate postal service application. Once installed on the device, the app will send fake text messages and malicious links to the user's entire contact list.

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซ6๐”ฌ๐““โ“” โ–„ โ–‚ โ–
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซ6๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Top 2020 Rated paid-free virtual number services for business only :

1๏ธโƒฃNextiva

https://www.nextiva.com/x20/aff44/?utm_source=CJ&utm_medium=ctable&utm_campaign=CJ&AID=10932738&PID=100126123&cjevent=c3adc3b9bf5e11ea82f102060a18050f

2๏ธโƒฃfor usa
https://voice.google.com/u/0/signup
(free)& great

3๏ธโƒฃgrass hopper

https://grasshopper.com/?clickid=VsRW1MwKexyOTg%3AwUx0Mo3EWUkiUrOVGeUFATg0&irgwc=1&utm_source=Impact&utm_medium=Affiliate&utm_campaign=503375

4๏ธโƒฃcallhopper

https://callhippo.com/?fp_ref=smallbizgenius

there is many more but those are top rated

@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซ6๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from UNDERCODE COMMUNITY
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ BEST FREE 2020 VIRTUAL NUMBERS SERVICES 2020-2019 :FOR SOCIAL APPS:
t.me/undercodeTesting

๐Ÿฆ‘ ๐•ƒ๐”ผ๐•‹๐•Š ๐•Š๐•‹๐”ธโ„๐•‹ :

1) https://www.2ndline.co/

2) https://www.numeroesim.com/

3) https://www.openphone.co/

4) https://talkroute.com/mobile-apps-ios-android/

5) https://www.vonage.com/personal/vonage-mobile-app?

6) https://sonetel.com/en/

7) https://www.virtualphone.com/

8) https://www.worldsim.com/virtual-phone-number?___store=usa

9) http://www.telosapp.com/

10) https://www.cloudsimapp.com/

11) https://www.line2.com/

12) https://www.burnerapp.com/

written by undercode
โ– โ–‚ โ–„ ๏ฝ•๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Backup Legal Mega
๐Ÿฆ‘SOC Analyst Cyber Security Intrusion Training for beginer & advanced New

https://mega.nz/folder/ExV3mITb#7eCbqf1Fzrf6x5TyVea9Hw/folder/Rw9lRYxB
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซ6๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Random Key terms:

>Feeder - Source of IP addresses for scanning. Angry IP Scanner provides various scanning sources: IP Range, IP List File or Random. You can select a source from the drop-down list next to the "Start" button

>Data collector - collects specific information about the host, for example, ping time, host name, open ports. Collectors are usually columns as a result of a scan. They can be selected in the menu "Tools-> Data Collectors".

>Active host - the host responding to ping. The results sheet is marked in blue.

>Inactive host - a host that does not respond to ping (red). However, it may have open ports (if the firewall blocks ping). In order to fully scan such hosts, check the "Scan inactive" checkbox in Tools-> Preferences.

>Pinging (host check):

>ICMP echo is the standard method used by the 'ping' program. On most platforms, requires administrator privileges. Some firewalls prohibit response packets to an ICMP request, making active hosts look inactive.

>UDP - sends UDP packets (datagrams) to one of the host ports and monitors the response (whether or not). Not standard, but does not require privileges.

>TCP - trying to connect to the 80 (http) port. UDP may work better for some networks, usually not.

>Scanning UDP and TCP most often does not detect routers or other network equipment properly

> Open port - TCP port that responded to the connection attempt. Greens on the list.


@UndercodeTesting
@UndercodeSecurity
@UndercodeHacking
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซ6๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘Some Verified Binsโœ…

BIN SPOTIFY PREMIUM

BIN: 5227147432xxxxxx
FECHA: Generado
CVV: Generado

IP ITALIA ๐Ÿ‡ฎ๐Ÿ‡น
ZIP CODE: 10080

๐Ÿฆ‘NEW BIN CRUNCHYROLL

BIN: 437507010xxxxxxx
FECHA: 03/24
CVV: Generado
IP: USA ๐Ÿ‡บ๐Ÿ‡ธ
ZIP CODE: 10080

> only verified by us

๐Ÿงœโ€โ™€๏ธBest Cc generator https://t.me/UNDERCODEHACKING/2150
Forwarded from Backup Legal Mega
Udacity - Data Science Complet ! โ€”54.05 GBโ€”
after 10 Tb courses this good to learn & earn ๐Ÿ˜‚


>Learn data science from industry experts.

>youโ€™ll learn to solve data-rich problems and apply this knowledge to your big data needs.

> Whether youโ€™re new to the field or looking for additional training, we have introductory, advanced, and industry-specific courses to meet your learning goals.

https://mega.nz/#F!qrpxSIRD!PClG5ZMHdd5FroIFTT_Z5Q
Forwarded from UNDERCODE COMMUNITY
sfk_setup.exe
23.3 MB
Spyrix free windows -spy-keylogger