Ad End 1 February 2024
Ad Ends 13 January 2025
ad End 25 April 2025
Ad Ends 20 January 2025
Ad expire at 5 August 2024
banner Expire 25 April 2025
What's new
banner Expire 15 January 2025
banner Expire 20 October 2024
Western union transfer
UniCvv
adv exp at 23 August 2024
casino
swipe store
Carding.pw carding forum
BidenCash Shop
Kfc CLub

Search results

  1. Dark_Code_x

    Transparent Tribe attacking diplomats and military in 27 countries

    Attackers use a tool designed to infect USB devices in their attacks. The Transparent Tribe cybercriminal group (also known as PROJECTM and MYTHIC LEOPARD) has launched malicious campaigns against diplomats and military personnel in 27 countries. Most of the victims were located in...
  2. Dark_Code_x

    Open Microsoft 2007 file in Microsoft 2003 -Computer Tricks

    This post is not about hacking. It just windows tweak or trick. Just change your localhost name and enjoy it. You have to well know about this: How to use wamp/xamp server. What is localhost. It is very simple to follow. This is for windows users only. Steps to follow: 1.Go to...
  3. Dark_Code_x

    How to use Index of google search for finding ftp

    For finding ftp sites you can use this trick. This is simple trick using google search engine. If you know google searching tactics,then you can whatever faster. How to Use index of for ftp? Search in google as index of ftp/ +file_extension replace the file_extension with file extension which...
  4. Dark_Code_x

    How to find invisible users in gtalk?

    This is very simple trick. This is for basic users who started use gtalk newly. Login to your gtalk. double click on the user(which you want to check whether he is in offline or not). Now type and “hi” and hit enter. If alert message come in red means,then the user is offline. If you didn’t get...
  5. Dark_Code_x

    The Future: Seeing The Value in Digital Production Based Economies

    There exists an ecosystem of technological development geared towards translating human-centric value between the physical and the digital realms. Virtual Reality, Blockchain, and Social Media have created the foundations of a relatively new school of thought being explored in many modernized...
  6. Dark_Code_x

    How to hide folders in Nokia /Java Phones?No software needed

    Hi friends this is cool trick to hide the folders in Nokia or any Java supported mobiles. The special about this trick is that no softwares needed to hide the folder. Hide the Folder: Step 1: Did you decide which folder you want to hide ? If you say yes,then rename that folder and add “.jad”...
  7. Dark_Code_x

    FRESH AND VALID HIGH QUALITY DUMPS TRACK 1&2 WITH PIN AND FULL BANK ACCESS AND ATM PINS BUYING GOOD RATE

    FOR DEALS AND DETAILS CONTACT ICQ:754158717 TELEGRAM: @carders_12
  8. Dark_Code_x

    FRESH STOCK AVAILABLE FOR SALE CC CVV & DUMPS FULLZ 99% VALID

    FOR DEALS AND DETAILS CONTACT ICQ:754158717 TELEGRAM: @carders_12
  9. Dark_Code_x

    LOIC 1.0.8 - A network stress testing application

    Low Orbit Ion Cannon (LOIC) is an open source network stress testing and denial-of-service attack application, written in C#. LOIC was initially developed by Praetox Technologies, but was later released into the public domain, and now is hosted on several open source platforms. LOIC performs a...
  10. Dark_Code_x

    Unknown hackers stole confidential information about the transportation of Bundestag deputies

    ackers, by analyzing this information, can establish the residences of members of parliament. Unknown persons carried out a hacker attack on the data processing center of the BwFuhrparkService GmBH company. The company is 75.1% owned by the Bundeswehr and 24.9% by Deutsche Bahn AG, it also...
  11. Dark_Code_x

    Hacking Remote Pc by Exploiting Java Applet Field Bytecode Verifier Cache Remote Code Execution

    CVE-2012-1723: This is a vulnerability in the HotSpot bytecode verifier where an invalid optimization of GETFIELD/PUTFIELD/GETSTATIC/PUTSTATIC instructions leads to insufficient type checking. A specially-crafted class file could possibly use this flaw to bypass Java sandbox restrictions, and...
  12. Dark_Code_x

    [Metasploit Tutorial] Hacking Windows XP using IP Address

    Do you think it is possible to hack some one computer with just an ip address?! The answer is yes, if you are using unpatched(vulnerable) OS. If you don’t believe me, then read the full article. In this article i am going to demonstrate how to hack a remote computer by exploiting the parsing...
  13. Dark_Code_x

    DOM Based Cross Site Scripting(XSS) vulnerability Tutorial

    So far i have explained about the Traditional Cross site scripting that occurs because of insecure server-side code. In this post , i am going to explain the DOM Based Cross Site Scripting vulnerability. if you don’t what cross site scripting is, then i recommend you to read the basics from...
Ad End 1 February 2024
Top