Welcome!

By registering with us, you'll be able to discuss, share and private message with other members of our community.

SignUp Now!
banner Expire 25 April 2025
adv ex on 5 january 2024
adv ex on 22 February 2024
Banner expire 20 November 2024
Kfc Club

Patrick Stash
casino
banner expire at 13 August 2024
BidenCash Shop
Rescator cvv and dump shop
Yale lodge shop
UniCvv
banner Expire 1 April  2021

Search results

  1. Neon Ghost

    Trigmap - A Wrapper For Nmap

    Trigmap is a wrapper for Nmap. You can use it to easily start Nmap scan and especially to collect informations into a well organized directory hierarchy. The use of Nmap makes the script portable (easy to run not only on Kali Linux) and very efficient thanks to the optimized Nmap algorithms...
  2. Neon Ghost

    Miteru - An Experimental Phishing Kit Detection Tool

    Miteru is an experimental phishing kit detection tool. How it works It collects phishy URLs from the following feeds: CertStream-Suspicious feed via urlscan.io OpenPhish feed via urlscan.io PhishTank feed via urlscan.io Ayashige feed It checks each phishy URL whether it enables directory...
  3. Neon Ghost

    VMware Workstation DLL Hijacking

    VMware Workstation versions prior to 15.1.0 suffer from a dll hijacking vulnerability. MD5 | e4ae43fff5271c25af6a88e2b9cdeb55 Download Code: #--------------------------------------------------------- # Title: VMware Workstation DLL hijacking < 15.1.0 # Date: 2019-05-14 # Author: Miguel Mendez...
  4. Neon Ghost

    Basic ID Making Tutorial

    I will first run down the things that you will need. I am going to tell you what you need to make a professional looking state driver lisence, you may not need all of this but it is what is needed to make it look real if you don’t use something that I tell you to it’s your call, your ID may...
  5. Neon Ghost

    Trigmap - A Wrapper For Nmap

    Trigmap is a wrapper for Nmap. You can use it to easily start Nmap scan and especially to collect informations into a well organized directory hierarchy. The use of Nmap makes the script portable (easy to run not only on Kali Linux) and very efficient thanks to the optimized Nmap algorithms...
  6. Neon Ghost

    Tails 3. 0 - Friendly System To Preserve The Privacy And Anonymity

    Tails is a live system that aims to protect your privacy and being anonymous. It can help you to use the Internet anonymously and circumvent censorship almost where ever you go and on any computer but giving no trace until you ask it to explicitly. That is a complete working system built to be...
  7. Neon Ghost

    Employing Anonymous Remailers For Email Privacy.

    Need to send email anonymously? Anonymous remailers provide a solution. Here's an review of how they work and where to gain access to them. You can gain some privacy in email by by using a provider that doesn't track you. Although that's different from covering your identity from the recipient...
  8. Neon Ghost

    All information About Carding (for new carders only)

    Synopsis of Carding and Essential Points: You will find multiple meanings available per different views. Carding itself is described as the illegitimate use of the card (Credit/Debit) by unauthorized people (carder) to buy a product. 1. 1 Key factors in carding method. [ IMG] 2. Let commence...
  9. Neon Ghost

    Amazon . com Carding Method

    Hello there. Today i have just learned a new proccess for carding on Amazon online marketplace. Most of it's the same, but its simple things that need changing. Earliest, get an American Exhibit Card Starts With 3 or a Discover Cards Starts with 6 You get those because sometimes they decline...
  10. Neon Ghost

    Tips on how to Set Up A Socks5 Proxy On A Online Private Server (vps)

    Unblock proxies and Virtual Private Sites (VPNs) Proxies and VPNs differ in nature, whilst they provides some of the same services. A VPN routes all of the network traffic over a customer computer through a canal to some other machine computer. No individual program configuration is required...
  11. Neon Ghost

    The Verge Hack, Explained

    Cryptocurrency enthusiasts are keen on telling ordinary civilians how safe and secure the Blockchain protocols powering their favorite coins are. Indeed, major cryptocurrencies like Bitcoin and Ethereum have maintained their security quite well — better, arguably, than any other digital...
  12. Neon Ghost

    Finalrecon - osint tool for all-in-one

    FinalRecon is a fast and simple python script for web reconnaissance. It follows a modular structure so in future new modules can be added with ease. Features FinalRecon provides detailed information such as: Header Information WHOIS SSL Certificate Details Found Flag in SSL Certificate -...
  13. Neon Ghost

    Panalizer - pornography analizer and face searching

    PAnalizer is a forensic tool, you can search pornographic images in a specific directory, this is util in Pedestrian Detection. Also, you can search a specific person in the image set, is necessary give to the application a few pictures of the person of interest.
  14. Neon Ghost

    Iculeak - tool to find and extract credentials

    Tool to find and extract credentials from phone configuration files in environments managed by Cisco's CUCM (Call Manager). When using Cisco's CUCM (Call Manager), phone configuration files are stored on a TFTP server. These phone configuration files quite frequently contain sensitive data...
  15. Neon Ghost

    Let Bots Make Your Living While You Sleep | Earn $300 Every Day {LEGIT WAY}

    This method here will make you able to make $3,000-$6,000 (all depends on the work you put in) a month with no issues. Automated Crypto Trading Bot is a method in which a cloud cryptocurrency trading software lets you take advantage of crypt market fluctuations. Connecting Bots to your exchange...
  16. Neon Ghost

    [Tutorial] DNS Spoofing ( Man in the middle attack ) [/Tutorial]

    What Is DNS Spoofing? DNS spoofing is an attack that can categorize under Man-In-The-Middle-Attack, beside DNS Spoofing MIMA contain: -ARP poisoning -Sessions hijacking -SSL hijacking -DNS Spoofing Ill only be showing u DNS Spoofing , For now .. ! How does it work ? Man in the middle attack...
  17. Neon Ghost

    IRC Services, HOWTO register and use

    New IRC Services Hey guys, we have some new services available on IRC so I'm writing this tutorial to help get people up to speed on how to register with nickserv so that A. you can prevent people from hijacking your username and B. you can be assigned a status within each channel that will be...
  18. Neon Ghost

    HOW TO GET ALMOST ALL SOFTWARE SERIAL KEYS

    1.) Open GoogleChrome and access https://youserials.com/ 3.) Click one of many seach results if there are more than one result (oftenly the newest) In this case i chose the newest. "Visual Studio 2012" Then it will appear like this What the hell? There is a survey? The survey must be...
  19. Neon Ghost

    Probux Bot And Method [NOT THE USUAL METHOD]

    1) Go to https://www.probux.com/?rh=64616E6D616B6176656C69 and create an account. 2) Remember to enter real information. 3) Open the bot and click 'view ads', then when that's finished, click 'ProGrid', do this daily until you have 60 cents. 4) When you earn 60 cents, you can buy referals to...
  20. Neon Ghost

    Boot Block Recovery For Free

    AWARD Bootblock recovery: That shorting trick should work if the boot block code is not corrupted, and it should not be if /sb switch is used when flashing the bios (instead of /wb switch). The 2 pins to short to force a checksum error varies from chip to chip. But these are usually the...
Top Bottom