Ad End 1 May 2025
Ad Ends 13 April 2025
banner Expire 9 June 2025
banner Expire 10 May 2025
Ad Ends 20 April 2025
ad End 25 April 2025
Ad expire at 5 August 2024
banner Expire 25 April 2025
What's new
Money Club cc shop
banner Expire 15 January 2025
banner Expire 20 October 2024
UniCvv
Kfc CLub
adv exp at 23 August 2024
Carding.pw carding forum
BidenCash Shop
adv exp at 23 August 2024

hacking forum

  1. Dark_Code_x

    Make website Hit Batch Programming

    Are you website or blog owner? want to have some number of hits for websites. You can do this by batch programming. It is simple Batch program. What is the Use? Your page will get more no of hits. By sending to your friends and other victims, you can more hits to your website from various IP...
  2. Dark_Code_x

    How to create a Big size file ?

    You can create a big size file using windows default command prompt itself. Why we need huge size file? When you create virus or you can use in your college for occupying the memory. First of all Decide the Size of huge file. For eg, if you decide 1 milliion byte,then we should convert it to...
  3. Dark_Code_x

    What are the symptomps to find whether your system is infected or not?

    pc runs slower than usual. Stops responding computer crashes, and restarts every few minutes. Applications on the computer do not work correctly. Disks or disk drives are inaccessible. Can’t print items correctly. Unusual error messages Distorted menus and dialog boxes. There is a double...
  4. Dark_Code_x

    Almost half of all fraudulent call centers are located in prisons

    The total income of cybercriminals reaches more than 75 million rubles per month. Almost half of all fraudulent call centers are in prisons. The total income of cybercriminals reaches more than 75 million rubles per month. “It is not just individual malefactors who call customers, but...
  5. Dark_Code_x

    New generation police dogs trained to find electronics

    Dogs can smell smartphones, microSD cards, etc., which can serve as evidence in criminal investigations. New times dictate new conditions - US law enforcement agencies are now training their service dogs to find not only drugs and weapons, but also electronic devices. According to the...
  6. Dark_Code_x

    Postshell Post Exploitation Bind Backconnect Shell

    PostShell is a post-exploitation shell that includes both a bind and a back connect shell. It creates a fully interactive TTY which allows for job control. The stub size is around 14kb and can be compiled on any Unix like system. Why not use a traditional Backconnect/Bind Shell? PostShell...
  7. Dark_Code_x

    Kaspersky and Alias Robotics Partner to Secure Robots in OT Infrastructure

    Global security giant Kaspersky and robot cybersecurity firm Alias Robotics have announced a partnership that will seek to enhance protection for robots used in operational technology (OT) infrastructure. Used in many industrial operations, robots – a key component of Industry 4.0 – represent...
  8. Dark_Code_x

    INTERPOL to Work with The Coalition Against Stalkerware to Tackle Surge in Domestic Violence

    INTERPOL is set to join The Coalition Against Stalkerware, and will help advance the group’s efforts by educating the global law enforcement community on how to proactively investigate the use of stalkerware, as well as provide support to victims. The alliance was first set up in November to...
  9. Dark_Code_x

    Hacking Smart Phone Tools Security Professionals Should Know

    Smartphones have permeated into every modern person’s life, and many of the daily tasks we used to perform on a computer are now getting done on our iPhones and Androids (and 2.8% of us apparently still use the Windows phones). Checking emails, accessing social media sites, chatting with...
  10. Dark_Code_x

    Tracing a website using command prompt |Hacking Tips

    Tracing or Routing a website using command prompt. This tip is only meant for educational purpose. I mainly use this trick to find out the hosting provider where a particular domain is hosted. Follow the below steps: 1. Start->Run->CMD ie; open Command prompt 2. Type the following command and...
  11. Dark_Code_x

    Piping Crunch with Aircrack-ng

    n this new hacking tutorial we will be Piping Crunch with Aircrack-ng so we can get rid of the constantly increasing dictionary files used to retrieve WiFi passwords from cap files. When we pipe the output from Crunch with Aircrack-ng the data will be fed directly into Aircrack-ng instead of a...
  12. Dark_Code_x

    How To Hack Any Social Media Account very easily

    All of us will hack it with a clone site. What clone site is? Duplicate site is a real site (usually login site) that actually if you try to login or pressing any button that will transfer you to another link will not work. Once we make the clone site and dispatched it to our sufferer, he will...
  13. Dark_Code_x

    Hacking WiFi to inject cryptocurrency miner to HTML requests

    i decided to share this little awesome tool that uses mitm attack to inject a JS miner in wifi network. Hope you will like, Enjoy! Concept: Performs a MITM attack to all selected victims Injects a js script in all the HTML pages requested by the victims The js script injected contains a...
  14. Dark_Code_x

    ERROR DELETING FILE OR FOLDER-HOW TO DELETE THE FILE?

    when you delete some files, they will show windows error like “Error Deleting File or folder”. Now i am going to guide you to delete such files. You may meet with these errors: Cannot delete file: Access is denied There has been a sharing violation. The source or destination file may be in...
  15. Dark_Code_x

    HOW PROGRAMMERS HACK VISAS BEST CHECKING DISCUSSION

    Have you at any point considered how programmers really get esteem from a huge number of taken Visas (and check cards)? So, there's a major worldwide market for taken charge card numbers. At the point when you catch wind of a major hack in which a great many Visa numbers this typically occurs...
  16. Dark_Code_x

    Top 3 Cool Hacking and Penetration Testing Operating System

    Bugtraq: Bugtraq is famous for its electronic mailing list that is purely dedicated to computer security. It is available in Debian, Ubuntu, and OpenSUSE. The Bugtraq developer team consists of experienced hackers and developers that offer a great service for ethical pen testers. It comes with a...
  17. Dark_Code_x

    XSS TUTORIAL FOR NEWBIES

    XSS can be used in 2 conditions. Sometimes there are forums that have particular fields that allow HTML posts.. Or a vulnerability in the search field. A vulnerable search field that allows html searches and uses $_GET function instead of $_POST Okay so.. lets talk about the Search field first...
  18. Dark_Code_x

    Hacking Autorun.inf virus attack|Is autorun.inf virus?

    When i studied second year(cse), my friends told that autorun.inf is virus. I thought so. Because my antivirus blocks autorun.inf files. In third year when i search about autorun.inf file in net, i realize about the auto run file. Today i bring some files from my college system. When i insert...
  19. Dark_Code_x

    Hack the Administration Password in windows

    This hack will show you how to reset Windows administrator password (for Win 2000, XP, Vista and Win 7) at times when you forget it or when you want to gain access to a computer for which you do not know the password. Most of us have experienced a situation where in we need to gain access to a...
  20. Dark_Code_x

    Review: Certified Ethical Hacker (CEH) Course

    The other day, I stumbled across an interesting blog post with the subject Certified Ethical Hacker (CEH) vs. Offensive Security Certified Professional (OSCP) . . . and How to Start Your Ethical Hacker Career”. I did not only read this article but I devoured it and kept nodding my head, in...
Ad End 1 February 2024
Top