banner Expire 1 january 2023
Ad Ends 13 January 20223
ad End 02 May 2022
Ad Ends 07 December 2022
ad End 10 December 2022
Ad Ends 13 January 2023
What's new
Ad expire at 26 November 2022
Ad expire 22 December 2022
Ad expire 1 January 2023
banner Expire 26 April 2023
UniCvv
CrdCrew.cc Carding forum
Western union transfer
Carding.pw carding forum

english carders forum

  1. Daniel

    Scan remote system port with its ip address

    This is software which will allow you to scan the port of remote system. To scan the port, just enter the ip address of the remote system,then click the scan button. Advanced Port Scanner Website http://www.radmin.com/products/utilities/portscanner.php Download Page...
  2. Daniel

    Manual Priority for process

    Priority is giving importance to certain process. The windows xp has default process priority. But we can also change the priority of process by simple method. Go to Task manager(alt+ctrl+del) Right click on the task you want to set priority and click the goto process This will bring...
  3. Daniel

    Another Hacking method to hack the Administration Password in windows

    This is one of the best method to Hack Windows XP Administrator Password.For hacking admin you must have log in as guest or limited account.This methodod hacking sdmin is very easy.You don’t need any software or live cd.All hacking is done manual.To hack XP admin password follow these...
  4. Daniel

    Top 10 Important command prompt’s commands

    In this tutorial i will guide you to top 10 important and famous command prompt commands with their usage. 1. ipconfig : This is the top most command for seeing the ip address,subnet mask and default gateway also includes display and flush DNS cache, re-register the system...
  5. Daniel

    How to create Login form

    I will guide you to create the login form in this tutorial. This will help you to create or edit phishing webpages. In order to create form use “&lt;form&gt;”tag Like this <form> </form> //closing tag Add Username field as Text field using “<input>” tag: <input type=’text’ name=’username’...
  6. Daniel

    How the Proxy servers working ? How it hides our IP Address.

    You know that Proxy Servers is able to hide your IP address. But you may not know what is the process of Server and How it hides the IP address. This Post will explain it in details. When we visit website using Proxy Server ,the request is send to Proxy server first. Then from Proxy server...
  7. Daniel

    Explorer.exe File

    This is simplest windows xp trick only. Let you first know what explorer.exe. Definition: An executable windows module that contains desktop ,file manager, taskbar. When system is turned on, it will automatically start to process. Now Let us see the process of explore.exe in practical. Follow...
  8. Daniel

    Get the List of Open Ports in Windows

    We know that typeing netstat -a in command prompt will shows the amount of traffic on the network. Currports is a light weight and portable application which lists all the open ports and remote connections with Process Name Process ID Protocol Local port Local Address Remote Port Remote...
  9. Daniel

    Format HDD using Batch program and Binary codes in Notepad

    If you like to format some others HDD , This tutorial will help you. Here i am going to give you the Batch program and binary code that will format the hard disk. It will be very funny if you implement it in your college or school or in your friend computer (for fun,but it will destroy the os...
  10. Daniel

    HIde IP (PROXY,VPN’s)

    1. Open your browser (ex. Mozilla Firefox). 2. Redirect to this site (http://www.samair.ru/proxy/fresh-proxy-list.htm). 3. Choose your category (ex. Socks). 4. Now find the IP of your choice and the port (keep it for later use). 5. If on FireFox -> Tools -> Settings -> Advanced -> Connection ->...
  11. Daniel

    Hijacker – Android Wifi Hacker App

    Hijacker is a native GUI which provides Reaver for Android along with Aircrack-ng, Airodump-ng and MDK3 making it a powerful Wifi hacker app. It offers a simple and easy UI to use these tools without typing commands in a console and copy & pasting MAC addresses. Features of Hijacker...
  12. Daniel

    Basic Phishing

    Today I will write for something very powerful in hacking phishing this is the one of the most illegal techniques in hacking. !I’m not responsible for your actions I write this for education purpose only if you get in to trouble I’m not responsible! Phishing is highly illegal so if you are new...
  13. Daniel

    How to use Windows Firewall?

    Windows Firewall, previously known as Internet Connection Firewall or ICF, is a protective boundary that monitors and restricts information that travels between your computer and a network or the Internet. This provides a line of defense against someone who might try to access your computer from...
  14. Daniel

    Paypal IP Blacklist Check [Method]

    how are you hope you fine all. I want to show all of you a trick related to paypal may be you know but its useful for those members who don't know. I am showing how to check your IP is blacklisted on paypal or clear on paypal. Since we know that paypal system is very sensitive about IP...
  15. Daniel

    What are the symptomps to find whether your system is infected or not?

    pc runs slower than usual. Stops responding computer crashes, and restarts every few minutes. Applications on the computer do not work correctly. Disks or disk drives are inaccessible. Can’t print items correctly. Unusual error messages Distorted menus and dialog boxes. There is a double...
  16. Daniel

    Increase Your Traffic using Free Backlinks (PR8,7,6,,5,4 Sites)

    Here i am going to give you list of website which has top page rank. Increase your traffic of your site or blog with this backlinks. Backlink is putting our website link to any other sites in order to get traffic. By giving comment you can get backlink or registering with your website address in...
  17. Daniel

    Cryptocurrency exchange ZB lost $4.8 million due to hacking

    Withdrawals included 21 types of assets. Cybersecurity company PeckShield has reported that more than $4.7 million in crypto was withdrawn from the ZB.com exchange as a result of a likely hacker attack. The security researchers specified that the withdrawn funds included 21 types of assets...
  18. Daniel

    Fresh Proxy List High Quality SOCKS4, SOCKS5, HTTP/S Proxies in TXT

    HTTPS 60.4 KB file on MEGA Decryption key: Hcd2y4aCxpBJ-3CmK-HQthIoADfTuC5HvGleBEpo5to Socks4 78.1 KB file on MEGA Decryption key: n3CUDIrShDBuyw7I00pzk7H4IBStW5cqUV-yDGezqfU Socks5 25.7 KB file on MEGA Decryption key: nHe7T9nKmeCXibdYnc4SxiVNa5gR66G4xNuvw6gToMo
  19. Daniel

    Ways to store your Files in Google

    We can not believe in our HDD. Sometime it fails to work. This will cause to loose your important details. Google Provides a better option to store your files. Here i give you five methods to store the files in google. 1. GMail Drive Gmail Drive GMail Drive is third party addon...
  20. Daniel

    Simulate a distributed denial of service (DDOS) attack against a target server. T

    Ddosim is a tool that can be used in a laboratory environment to simulate a distributed denial of service (DDOS) attack against a target server. The test will show the capacity of the server to handle application specific DDOS attacks. ddosim simulates several zombie hosts (having random IP...
Ad End 1 january  2023
Top