Ad End 1 November 2025
Ad End 4 April 2026
Ad Ends 13 July 2025
ad End 25 October 2025
banner Expire 3 February 2026
adv exp at 30 July 2025
banner Expire 25 October 2025
What's new
banner Expire 23 August 2025
Wizard's shop 2.0
Money Club cc shop
banner Expire 15 January 2025
banner Expire 20 October 2024
UniCvv
best shop
Yale Lodge
Kfc CLub
Carding.pw carding forum
BidenCash Shop

Search results

  1. Dark_Code_x

    Full guide to SQL Injections for database hacking

    This article is about a technique that is used to cut the sites and the technique is very popular among hackers. The technique is known as SQL injections. What is SQL Injection ? SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer...
  2. Dark_Code_x

    SysWhispers - AV/EDR Evasion Via Direct System Calls

    SysWhispers helps with evasion by generating header/ASM files implants can use to make direct system calls. All core syscalls are supported from Windows XP to 10. Example generated files available in example-output/. Introduction Various security products place hooks in user-mode APIs which...
  3. Dark_Code_x

    SUDO_KILLER - A Tool To Identify And Exploit Sudo Rules

    SUDO_KILLER - A Tool To Identify And Exploit Sudo Rules' Misconfigurations And Vulnerabilities Within Sudo. Overview SUDO_KILLER is a tool that can be used for privilege escalation on linux environment by abusing SUDO in several ways. The tool helps to identify misconfiguration within sudo...
  4. Dark_Code_x

    Evil SSDP - Spoof SSDP Replies

    This tool responds to SSDP multicast discover requests, posing as a generic UPNP device. Your spoofed device will magically appear in Windows Explorer on machines in your local network. Users who are tempted to open the device are shown a configurable phishing page. This page can load a hidden...
  5. Dark_Code_x

    Scanqli - scanner to detect sql injection vulnerabilities

    ScanQLi is a simple SQL injection scanner with somes additionals features. This tool can't exploit the SQLi, it just detect them. Tested on Debian 9 Features Classic Blind Time based GBK (soon) Recursive scan (follow all hrefs of the scanned web site) Cookies integration Adjustable wait delay...
  6. Dark_Code_x

    Parrot security 4.6

    After 3 months of heavy development Parrot 4.6 is officially released. How to update Update your existing Parrot system with the following command: Code: sudo parrot-upgrade System Changes (Appearance) The desktop-base and parrot-wallpapers also received some love and are updated to reflect...
  7. Dark_Code_x

    BTC Wallet Stealer Info + Source Code

    Bitcoin Wallet Stealer Info + Source Code Author: JuryBen The process is easy, this tiny C program look inside your computer appdata folder, if it finds the wallet.dat file, it uploads it into the hacker server using FTP, or file transfer protocol, the stealer it self is a virus, a hacking...
  8. Dark_Code_x

    [Tutorial] Search Engine Optimization (SEO) Techniques

    Introduction: > The optimization for search engines (SEO) is the way your page or website as a whole is being indexed by the different search engines in the world. The 'visibility', the ranking and everything related to moving your website to a more decent position when a specific keyword or...
  9. Dark_Code_x

    How to hack someones Wifi Password Working

    Hey Everyone, today i will be showing you how to Crack a WPA2 password, this is for educational purposes only and i'm in no way responsible for how you use this information. Well to start i'm going to show you how i Crack my own WiFi password and ill show you the soft ware and tools i use i...
  10. Dark_Code_x

    [Tutorial-Sharing]Wordpress BrutForce tool [Tutorial-Saring]

    introduction : what is brutforce Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force) rather than employing...
  11. Dark_Code_x

    Hacking Wifi - 6 Methods [Hacking Handbooks]

    Setup BackTrack 5 This guide will show you how to download and setup BackTrack 5 to either boot off of USB, DVD, or dual-boot. Backtrack 5 is a linux build filled with a bunch of useful penetration testing tools, and will be used in the WiFi hacking tutorials as well as hacking PC tutorials...
  12. Dark_Code_x

    Carding Bestbuy [Tutorial]

    >>Carding Bestbuy [Tutorial] >> >>* RDP matching cc state not precisely the city but same city will be okay. >>* GOOD MasterCard BIN >>* Buy cc same state your drop is. >>* Place a store pick up order with BESTBUY and remember to choose the store with the pick up option >>* Select “I WILL PICK...
  13. Dark_Code_x

    Thunderbolt PCs Can Be Hacked In Less Than 5 Minutes

    The Thunderspy attack affects millions of PCs released before 2021 A specialist at Eindhoven University of Technology in the Netherlands has demonstrated a new attack method on Windows or Linux computers with support for the Thunderbolt port, which allows hacking devices in less than five...
  14. Dark_Code_x

    Dr Cleans PayPal Methods

    Just beware plenty of fake vendor trying to sell you guide that never works and attempt to create fake impression that his/her method is actually working. in fact, after i carefully studied his post.. there are big flaws and never can achieve what the vendor claims usually the first thing you...
  15. Dark_Code_x

    What is Carding and How to Prevent it in Your Online Store

    Fraud is a nightmare for customers and merchants alike. With constant news of data breaches, shoppers are rightfully concerned about the safety of their payment data. The thought of a stranger racking up thousands of dollars in debt keeps many customers up at night — and causes them to have...
  16. Dark_Code_x

    Keyboard Shortcuts, Microsoft Word

    Keyboard Shortcuts Result in Microsoft Word CTRL and A Selects all in the current document. CTRL and B Bold text. CTRL and C Copies the item or text to the Clipboard and can be pasted using CTRL and V. CTRL and D Displays the Font dialogue box. CTRL and E Centre Alignment. CTRL and F Displays...
  17. Dark_Code_x

    Gaming Plug-In Effected Millions of PCs Vulnerable

    A gaming plugin installed in over 200 million computers contains a critical flaw that enables attackers to steal user data directly from the websites they’re logged into, according to a security researcher. This affects websites which offer web mail as well as social media and networking...
  18. Dark_Code_x

    How to Secure your Wi-Fi in Home

    We have written about the dangers that public Wi-Fi hotspots pose to users time and time again, but today we are talking about threats that come specifically from home wireless networks. Many wireless router users do not consider them to be threatening, but we are here to shed some light on this...
  19. Dark_Code_x

    Dynamic Malware Analysis Tools

    Dynamics Malware Analysis Risks Please be aware of the fact that Dynamic Malware Analysis can put your system and network at risk, you will be executing real malware to analyse it’s behaviour. We advise you to only execute malware on virtual machines or dedicated systems in isolated networks...
  20. Dark_Code_x

    Vulnerability Scanning with OpenVAS 9 part 3: Scanning the Network

    In the previous parts of the Vulnerability Scanning with OpenVAS 9 tutorials we have covered the installation process and how to run vulnerability scans using OpenVAS and the Greenbone Security Assistant (GSA) web application. In part 3 of Vulnerability Scanning with OpenVAS 9 we will have a...
Ad End 1 November 2024
Top