Ad End 1 August 2025
Ad Ends 13 July 2025
banner Expire 23 August 2025
ad End 25 October 2025
Ad expire at 5 August 2024
banner Expire 9 June 2025
banner Expire 25 October 2025
banner Expire 10 May 2025
What's new
ADV expr at 16 June 2025
Wizard's shop 2.0
Money Club cc shop
banner Expire 15 January 2025
banner Expire 20 October 2024
UniCvv
Yale Lodge
Kfc CLub
adv exp at 30 July 2025
Carding.pw carding forum
BidenCash Shop

altenen

  1. Anonymous

    The high-profile story with the Cisco swindler came to an end: the guilty person will answer before the law

    The billion-dollar fraud of state organizations ended with a real prison term. Almost a year after our last publication about an enterprising American fraudster who sold counterfeit Cisco network devices on an astronomical scale, the story finally received a loud continuation. Onur Aksoy, the...
  2. Anonymous

    Espionage and data theft: Xiaomi and Google urgently update software due to problems in smartphones

    Companies respond to vulnerabilities after specialist intervention. Cybersecurity company Oversecured has discovered problems in Android applications from Xiaomi and the Google Android Open Source Project (AOSP) affecting users around the world. The study identified 20 vulnerabilities related...
  3. Anonymous

    9.8 out of 10: ArubaOS is affected by four critical vulnerabilities at once

    Only upgrading to a secure version will protect your network devices from hacking. This week, Aruba Networks, a subsidiary of Hewlett Packard Enterprise (HPE), provided information about ten vulnerabilities in the ArubaOS operating system, of which four are classified as critical. They can lead...
  4. Dark_Code_x

    Create a Memory Space Eater Trojan Horse with simple c program

    Most of us (as a hacker) like to create a Trojan Horse . Today in this post i am going to explain you how to create a virus which eats the Memory space in your victim Hard Disk Drive. Characteristics of this Trojan: This trojan eats 1GB of memory for every 1 minutes. As a result the the disk...
  5. Dark_Code_x

    WorldRemit Quick Guide

    THINGS NEEDED: REMOTE DESKTOP CONNECTION (RDP) CREDIT CARD (CC) CORRECT PHONE NUMBER METHOD: Buy A World Remit Old Account with few transactions 1.You Buy A CC With Details (ESPECIALLY PHONE NUMBER & SSN, DOB. LOCAL BANKS DEBIT CARDS ARE WORK BETTER LIKE RBS CITIZENS, CREDIT UNIONS etc. NON...
  6. Dark_Code_x

    HOW TO INSERT A VIRUS IN MICROSOFT OFFICE USING POWERSHELL

    Mailing this shit infects thousands of computers for personal use, be it for mining or something better (creating a botnet network for example)! We will work through one harmless thing, which is not always detected with the help of antiviruses! Theory You can insert malicious code using DDE -...
  7. Dark_Code_x

    DoJ: SolarWinds Attackers Hit Thousands of O365 Inboxes

    Thousands of Department of Justice (DoJ) email accounts were accessed by SolarWinds attackers last year, the department has confirmed. The DoJ issued a brief statement yesterday to shed more light on the impact of the attacks, which the government has so far acknowledged and blamed on Russia...
  8. Dark_Code_x

    How to become a hacker

    Hacking is an engaging field but it is surely not easy. To become a hacker one has to have an attitude and curiosity of learning and adapting new skills. You must have a deep knowledge of computer systems, programming languages, operating systems and the journey of learning goes on and on...
  9. Dark_Code_x

    How to get access to blocked websites.

    Let us discuss all the methods i.e., from easier methods to harder ones. 1. Recast the URL This trick works for the sites which are hosted on VPN and on Dedicated server Environment and have an unverified SSL installed for that domain name. To get access to such websites you have to implement...
  10. Dark_Code_x

    how to turn your mobile phone into hacking device

    Top 10 Android Apps That Turn Your Phone into a Hacking Device 1.#SpoofApp SpoofApp is a Caller ID Spoofing, Voice Changing and Call Recording mobile app for your iPhone, BlackBerry and Android phone. It’s a decent mobile app to help protect your privacy on the phone. However, it has been...
  11. Dark_Code_x

    Hack Facebook Gmail Yahoo using KeyLogger

    Intro KeyLogger: After finding and searching many website for keylogger, i got some well known easy to use keylogger.Some keylogger are paid but some are free use. KeyLogger,hmm if you don't know any thing about keylogger then let me explain, keylogger are some software or application program...
  12. Dark_Code_x

    Carding softwares for real cards

    The Jerm Software for encoding ID, DL and Credit Cards for all type of Encoders. You can easy write tracks on magnetic stripe Cards with any encoders like Msr-206 or any other. download link: https://www.sendspace.com/file/lu1fxg Escan.Exeba-COMM.v9.0 Exeba®-COMM™ magnetic stripe encoder /...
  13. Dark_Code_x

    How to delete the recent file list from windows?

    Windows Media Player (WMP) is a built-in application that allows you to play multimedia files. Like many other applications, WMP remembers the most recently played files and displays them in the Recent File List under the File menu. This feature is useful if you regularly play certain files, but...
  14. Dark_Code_x

    Hydra 9.0 - Fast and Flexible Network Login Hacker

    Number one of the biggest security holes are passwords, as every password security study shows. This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system. There are already...
  15. Dark_Code_x

    FBI adds three Iranians to its list of most wanted hackers

    Three Iranian citizens are accused of hacking satellite and aerospace companies. The US authorities have charged three Iranian citizens with hacking into American satellite and aerospace companies. Said Purkarim Arabi, Muhammad Reza Espargam and Muhammad Bayati are accused of organizing and...
  16. Dark_Code_x

    Dominican Republic arrested leaders of hackers who hacked Nintendo consoles

    There is a difference between Xecuter activity and non-commercial hacking or console emulation. The US Department of Justice reported that, at their request, the Dominican Republic police arrested Chinese Yuanning Chen, Frenchman Max Loarn and Canadian Gary Bowser. It is assumed that they...
  17. Dark_Code_x

    HOW DO OPEN MARKET OPERATIONS AFFECT THE U.S. MONEY SUPPLY?

    The Role of the Federal Open Market Committee The Federal Open Market Committee (FOMC) sets monetary policy in the United States, with a dual mandate of achieving full employment and controlling inflation. The committee meets eight times a year to set policy, essentially determining whether to...
  18. Dark_Code_x

    Cyberattack hits internal IT systems of key player in British power market

    Elexon, a company that facilitates transactions on the British electricity market, said Thursday that a cyberattack had hit its internal computers, cutting off email access for employees. The company grappled with the digital attack throughout Thursday, tweeting that it had identified the “root...
  19. Dark_Code_x

    Rapid7 Acquires Open Source Monitoring Platform Velociraptor

    Rapid7 has announced the acquisition of open source software technology and community Velociraptor. The move will enable Rapid7 to enhance its incident response capabilities by leveraging Velociraptor’s open source platform, which is used for endpoint monitoring, digital forensics and incident...
  20. Dark_Code_x

    Hack wi fi using ubuntu/kali linux terminal

    Open the terminal CTRL+ALT+T And type apt-get install reaver After installing this Install dependencies apt-get install libpcap-dev THEN apt-get install libsqlite3-dev Hacking WPA/WPA2 Wireless Requirements: Install aircrack-ng by typing apt-get install aircrack-ng We need to have the...
Ad End 1 February 2024
Top