Ad End 1 November 2025
Ad End 4 April 2026
Ad Ends 13 July 2025
ad End 25 October 2025
banner Expire 3 February 2026
banner Expire 25 November 2025
What's new
banner Expire 23 August 2025
Wizard's shop 2.0
Money Club cc shop
banner Expire 15 January 2025
banner Expire 20 October 2024
UniCvv
best shop
Yale Lodge
Kfc CLub
adv exp at 30 July 2025
Carding.pw carding forum
BidenCash Shop

Search results

  1. Dark_Code_x

    Create a Memory Space Eater Trojan Horse with simple c program

    Most of us (as a hacker) like to create a Trojan Horse . Today in this post i am going to explain you how to create a virus which eats the Memory space in your victim Hard Disk Drive. Characteristics of this Trojan: This trojan eats 1GB of memory for every 1 minutes. As a result the the disk...
  2. Dark_Code_x

    WorldRemit Quick Guide

    THINGS NEEDED: REMOTE DESKTOP CONNECTION (RDP) CREDIT CARD (CC) CORRECT PHONE NUMBER METHOD: Buy A World Remit Old Account with few transactions 1.You Buy A CC With Details (ESPECIALLY PHONE NUMBER & SSN, DOB. LOCAL BANKS DEBIT CARDS ARE WORK BETTER LIKE RBS CITIZENS, CREDIT UNIONS etc. NON...
  3. Dark_Code_x

    HOW TO INSERT A VIRUS IN MICROSOFT OFFICE USING POWERSHELL

    Mailing this shit infects thousands of computers for personal use, be it for mining or something better (creating a botnet network for example)! We will work through one harmless thing, which is not always detected with the help of antiviruses! Theory You can insert malicious code using DDE -...
  4. Dark_Code_x

    DoJ: SolarWinds Attackers Hit Thousands of O365 Inboxes

    Thousands of Department of Justice (DoJ) email accounts were accessed by SolarWinds attackers last year, the department has confirmed. The DoJ issued a brief statement yesterday to shed more light on the impact of the attacks, which the government has so far acknowledged and blamed on Russia...
  5. Dark_Code_x

    How to become a hacker

    Hacking is an engaging field but it is surely not easy. To become a hacker one has to have an attitude and curiosity of learning and adapting new skills. You must have a deep knowledge of computer systems, programming languages, operating systems and the journey of learning goes on and on...
  6. Dark_Code_x

    How to get access to blocked websites.

    Let us discuss all the methods i.e., from easier methods to harder ones. 1. Recast the URL This trick works for the sites which are hosted on VPN and on Dedicated server Environment and have an unverified SSL installed for that domain name. To get access to such websites you have to implement...
  7. Dark_Code_x

    how to turn your mobile phone into hacking device

    Top 10 Android Apps That Turn Your Phone into a Hacking Device 1.#SpoofApp SpoofApp is a Caller ID Spoofing, Voice Changing and Call Recording mobile app for your iPhone, BlackBerry and Android phone. It’s a decent mobile app to help protect your privacy on the phone. However, it has been...
  8. Dark_Code_x

    Hack Facebook Gmail Yahoo using KeyLogger

    Intro KeyLogger: After finding and searching many website for keylogger, i got some well known easy to use keylogger.Some keylogger are paid but some are free use. KeyLogger,hmm if you don't know any thing about keylogger then let me explain, keylogger are some software or application program...
  9. Dark_Code_x

    Carding softwares for real cards

    The Jerm Software for encoding ID, DL and Credit Cards for all type of Encoders. You can easy write tracks on magnetic stripe Cards with any encoders like Msr-206 or any other. download link: https://www.sendspace.com/file/lu1fxg Escan.Exeba-COMM.v9.0 Exeba®-COMM™ magnetic stripe encoder /...
  10. Dark_Code_x

    How to delete the recent file list from windows?

    Windows Media Player (WMP) is a built-in application that allows you to play multimedia files. Like many other applications, WMP remembers the most recently played files and displays them in the Recent File List under the File menu. This feature is useful if you regularly play certain files, but...
  11. Dark_Code_x

    Hydra 9.0 - Fast and Flexible Network Login Hacker

    Number one of the biggest security holes are passwords, as every password security study shows. This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system. There are already...
  12. Dark_Code_x

    FritzFrog botnet infected at least 500 government and corporate servers

    The main goal of FritzFrog is cryptocurrency mining. Guardicore Labs has published a report on the activity of the relatively new P2P botnet FritzFrog, which in 2020 managed to infect at least 500 government and corporate SSH servers. The botnet was first spotted in January this year...
Ad End 1 November 2024
Top