Ad End 1 February 2024
Ad Ends 13 January 2025
Ad End 26 February 2025
ad End 25 April 2025
Ad Ends 20 January 2025
Ad expire at 5 August 2024
banner Expire 25 April 2025
What's new
banner Expire 15 January 2025
banner Expire 20 October 2024
UniCvv
casino
swipe store
adv exp at 23 August 2024
Carding.pw carding forum
BidenCash Shop
Kfc CLub

Search results

  1. File_closed07

    116 Nord VPN Accounts

    116 Nord VPN Accounts https://throwbin.io/vJSivSM https://pastebin.com/Gki06XJu
  2. File_closed07

    Bitcoin Skeptic Mark Cuban Torches ‘Useless’ SEC in Withering Takedown

    By CCN: Billionaire bitcoin skeptic Mark Cuban torched the Securities and Exchange Commission as “useless” bureaucrats who bring “ridiculous” lawsuits against investors to justify their worthless existence. “I’m obviously not a fan of the SEC,” Cuban told CCN. “I think they prefer regulation...
  3. File_closed07

    Bitcoin SV Re-Listed on Binance? Chinese Fake News Kindles 67% Pump

    By CCN: Bitcoin SV (BSV) gained 67% in value in just a few hours on Wednesday, coinciding with the spread of fake news regarding its imminent re-listing on Binance. Chinese investors may have been hit hard after a doctored WeChat screenshot was circulated around the country’s “crypto media.”...
  4. File_closed07

    Keeper group hacked 570 online stores in three years

    Cybercriminals also accidentally left in the public domain more than 184 thousand stolen payment card data. Over the past three years, the Keeper cybercrime group has carried out about 570 hacking e-commerce sites. Attackers cracked the backends of online stores, changed their source code...
  5. File_closed07

    US prosecutors accuse a citizen of Kazakhstan of cybercrime.

    Seattle’s authorities have issued an indictment against a Kazakh citizen who is accused of a series of cybercrimes. According to the document, the 37-year-old Andrei Turchin participated in attacks on government agencies, schools, banks and hotels. Turchin is known in a cybercrime environment...
  6. File_closed07

    Hacked user accounts employee Yahoo! escaped prison

    The man penetrated the accounts of young women, girlfriends and work colleagues in search of candid photos. Former Yahoo! employee Reyes File_closed07 Ruiz, who previously pleaded guilty to hacking thousands of user accounts, received five years in prison on probation. Recall that in September...
  7. File_closed07

    In Spain, eliminated the group of SIM-sweepers of one hundred people

    In total, the group stole 504.8 thousand euros, of which 240 thousand euros - from one victim. As a result of a law enforcement operation, Spanish National Police officers arrested 94 people suspected of fraud with SIM cards (the so-called SIM swap). According to the press service of the...
  8. File_closed07

    About 15 billion stolen credentials found on clandestine trading floors

    The highest cost are financial accounts and accounts with high privileges. Specialists from Digital Shadows found 15 billion credentials on various underground trading floors on the darknet. Compromised credentials were stolen as a result of more than 100 thousand hacks and provide access to...
  9. File_closed07

    Cyber police exposed a man in the sale of information with limited access

    The report says: "During the events, the Kiev police cyberpolice, together with the investigators of the Pechersk police department of Kiev, under the procedural leadership of the capital’s prosecutor’s office, exposed the man who sold information with limited access in the messenger. The...
  10. File_closed07

    The base of passports of Russians laid out in the public domain

    On the evening of July 9, the database of passports of participants in the blockchain voting on amendments to the Constitution of the Russian Federation became available at one of the forums. The archive is also distributed via Telegram channels. According to the Telegram channel “Information...
  11. File_closed07

    Joker malware spreads again through Google Play Store

    The new version of Joker is able to download additional malware to the device. Security researchers at Check Point discovered a new version of the Joker malware (also known as Bread) that spreads as legitimate Android mobile apps and subscribes to paid services without the knowledge of...
  12. File_closed07

    FSB officer convicted of selling data from mobile subscribers

    The FSB captain was charged with the disclosure of information constituting a state secret entrusted to her by service, which became the property of an unauthorized person (part 1 of article 283 of the Criminal Code of the Russian Federation). The first western district military court found...
  13. File_closed07

    The organizer of a hacker group that stole money from Ukrainian bank accounts was detained

    Hackers using malicious software unauthorized interfered in the work of banks and appropriated several million hryvnia. After the announcement of suspicion of a series of cybercrimes, the organizer was hiding from law enforcement, then he was put on the wanted list. Cyberpolice found that the...
  14. File_closed07

    FBI: a fraudster who stole millions of dollars from US companies transferred funds to the MTC

    Algerian alleged attacker from Nigeria, Jacob Ponle, also known as Woodberry, who is accused of organizing a fraudulent phishing scheme, converted part of the stolen funds into Bitcoin. Now access to them may be lost, reports DailyPost with reference to the Federal Bureau of Investigation (FBI)...
  15. File_closed07

    Internet Society has opposed backdoors in encryption

    About a hundred organizations and experts signed an open letter in which they opposed the adoption of the LAEDA law in the United States. The draft Law on Lawful Access to Encrypted Data Act (LAEDA) introduced by the US Congress could be the strongest in a series of attacks on encryption, a...
  16. File_closed07

    WhatsApp Phishing Over QR

    Download Whatsapp Phishing QR Tools. What does it do It will extract the QR code from Whatsapp Web and display it on a new page. If someone scans the code using Whatsapp it will grab the credentials from the web client and save them in a file. You can use these credentials to log yourself in...
  17. File_closed07

    Hacking WordPress WebSite

    Welcome back today we will talk about how we could compromise a WordPress website for a reverse meterpreter shell though use of malicious WordPress addons. This will allow us to create a malicious WordPress plugin to use as a payload and achieve a reverse shell back to the attacking machine...
  18. File_closed07

    zAnti [Android]

    Mobile application for pentest from Zimperium. More modern, stable and visual analogue of dSploit. The zAnti interface is divided into two parts: scanning and MITM. In the first section, he, like dSploit and the original cSploit, maps the network, identifies all hosts, their parameters and...
  19. File_closed07

    Findsploit

    Find exploits in local and online databases instantly Finsploit is a simple bash script to quickly and easily search both local and online exploit databases. This repository also includes “copysploit” to copy any exploit-db exploit to the current directory and “compilesploit” to automatically...
  20. File_closed07

    Microsploit

    Simple tool and not very special but this tool fast and easy create backdoor office exploitation using module metasploit packet. Like Microsoft Office in windows or mac , Open Office in linux , Macro attack , Buffer Overflow in word . Work in kali rolling , Parrot , Backbox . Install...
Ad End 1 February 2024
Top