Welcome!

By registering with us, you'll be able to discuss, share and private message with other members of our community.

SignUp Now!
banner Expire 25 April 2025
adv ex on 5 january 2024
adv ex on 22 February 2024
Banner expire 20 November 2024
Kfc Club

Patrick Stash
casino
banner expire at 13 August 2024
BidenCash Shop
Rescator cvv and dump shop
Yale lodge shop
UniCvv
banner Expire 1 April  2021

Search results

  1. Neon Ghost

    YouPHPTube 7.7 SQL Injection Vulnerability

    YouPHPTube <= 7.7 (getChat.json.php) SQL Injection Vulnerability ---------------------------------------------------------------- [-] Software Link: https://www.youphptube.com [-] Affected Versions: Version 7.7 and prior versions. [-] Vulnerability Description: User input passed through the...
  2. Neon Ghost

    VERIFIED CARDER SELLING WU,BANK,PAYPAL,CASHAPP,SKRILL TRANSFER BANK LOGS,DUMPS+PIN,CLONED CARDS

    Hello, I specialist in carding and transferring funds from hacked / stolen worldwide bank accounts & credit card data to you and placing order on western union, money gram website. I can also transfer to any bank account worldwide. Please note this is ILLEGAL and FRAUD. It is your responsibility...
  3. Neon Ghost

    How to Hack Facebook Multi Product Ads

    Creating great content is the first half of success in content marketing. Getting quality content read by, and amplified to, a relevant audience is the oft overlooked second half of success. Facebook can be a content marketer's best friend for this challenge. For reach, relevance and...
  4. Neon Ghost

    Flerken - obfuscated command detection too

    Command line obfuscation has been proved to be a non-negligible factor in fileless malware or malicious actors that are "living off the land". To bypass signature-based detection, dedicated obfuscation techniques are shown to be used by red-team penetrations and even APT activities. Meanwhile...
  5. Neon Ghost

    How Much Damage Hackers Can Do With a Million Fingerprints

    The Office of Personnel Management announced last week that the personal data for 21.5 million people had been stolen. But for national security professionals and cybersecurity experts, the more troubling issue is the theft of 1.1 million fingerprints. Much of their concern rests with the...
  6. Neon Ghost

    Prometei: A Cryptomining Botnet that Attacks Microsoft's Vulnerabilities

    An unknown Botnet called "Prometei" is attacking windows and Microsoft devices (vulnerable) using brute force SMb exploits. According to Cisco Talos, these SMB vulnerabilities help in mining cryptocurrency. The botnet has affected around a thousand devices. It came in March; however, according...
  7. Neon Ghost

    Scanning Webservers with Nikto for vulnerabilities

    Nikto is a very popular and easy to use webserver assessment tool to find potential problems and vulnerabilities very quickly. This tutorial shows you how to scan webservers for vulnerabilities using Nikto in Kali Linux. Nikto comes standard as a tool with Kali Linux and should be your first...
  8. Neon Ghost

    Metasploitable 2 vulnerability assessment

    As mentioned before there are many ways to perform vulnerability analysis, from manually searching through exploit database to fully automatic testing with tools like Open-Vas and Nessus vulnerability scanner. Vulnerability scanning with automated tools is a very aggressive way of vulnerability...
  9. Neon Ghost

    Credmap – the credential mapper

    Credmap is an open source credential mapper tool that was created to bring awareness to the dangers of credential reuse. It is capable of testing supplied user credentials on several known websites to test if the password has been reused on any of these. It is not uncommon for people who...
  10. Neon Ghost

    Basic Malware Analysis Tools

    In the upcoming 6 hacking tutorials we will be talking about basic malware analysis and we will start with discussing the many different Basic Malware Analysis Tools which are available. A Malware Analyst is someone highly skilled in reverse engineering malware to get a deep understanding about...
  11. Neon Ghost

    Advance and undetectable facebook & instagram hacking course

    This course is originally uploaded by DedSec and It explains 5 different techniques through which you can hack Facebook and Instagram Account … It Includes:- –Advance Phishing Pages –Hacking Facebook On Local Networks –Facebook Latest Bruteforce –Hacking Instagram Using Fake Page –Hacking...
  12. Neon Ghost

    Carding tutorial: the definitive guide [updated 2021]

    I understand the fact that many people are ready to learn, but the available resource for them is the internet, but many of them get scammed and ripped in the journey, that’s why I have decided to drop The Definitive New(2019) Latest Carding Tutorial Guide. If you follow this tutorial...
  13. Neon Ghost

    For Real Windows Newbie's here you go...

    CTRL+C (Copy) CTRL+X (Cut) CTRL+V (Paste) CTRL+Z (Undo) DELETE (Delete) SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin) CTRL while dragging an item (Copy the selected item) CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)...
  14. Neon Ghost

    Scavenger - crawler searching

    Just the code of my OSINT bot searching for sensitive data leaks on different paste sites. Search terms: credentials private RSA keys Wordpress configuration files MySQL connect strings onion links links to files hosted inside the onion network (PDF, DOC, DOCX, XLS, XLSX) Keep in mind: This...
  15. Neon Ghost

    Best IP & Network Scanning Tools in 2021 (Free/Paid)

    IP and Network scanning tools are software that identify various loopholes of network and safeguard from unprecedented and abnormal behavior that poses a threat to the system. It provides a convenient way to secure your computer network. Following is a handpicked list of Top IP Scanners, with...
  16. Neon Ghost

    Tutorial: How to start your own stresser or booter (NOOB)

    This tutorial will teach you how to maintain and create your own stresser, otherwise known as a booter. I have another tutorial on this. This tutorial is updated, more detailed, and gives an even better source. Please leave feedback, or questions, or even if you think I should add something in...
  17. Neon Ghost

    CREDIT/CARD/SSN/DL EXTRACTOR AND FINDER

    log,ssn/SIN,DOB,dl,passport,password,email adrs extractor and finder this tool can extract credit card,bank log,ssn/SIN,DOB,dl,passport,password,email adrs from bank accounts,email accounts,ftp accounts,database logs,hosting access etc u can also search for the...
  18. Neon Ghost

    installing Slackware Linux

    The Slackware Philosophy Since its first release in April of 1993, the Slackware Linux Project has aimed at producing the most "UNIX-like" Linux distribution out there. Slackware complies with the published Linux standards, such as the Linux File System Standard. We have always considered...
  19. Neon Ghost

    Web Attack Vector

    This attack vector provides us with more interesting, sophisticated and diverse ways of attacking users than the first. Speaking about the way through the web, you can select a common feature (with the only exception) that goes through attacks of this type - using a fake web page on an...
  20. Neon Ghost

    Convert SMS to WMZ in 3 steps [CVV Cashout Method]

    A good stock of CVV2’s Plenty of SIM cards Internet Access Mobile phone – Iphone 2G recommended Step 1: How to find a sms-wmz exchanger Google is your best friend! Keep repeating that phrase. You will be using it extensively so make sure you treat it well. Use obvious phrases such as...
Top Bottom