Welcome!

By registering with us, you'll be able to discuss, share and private message with other members of our community.

SignUp Now!
banner Expire 25 April 2025
adv ex on 5 january 2024
adv ex on 22 February 2024
Banner expire 20 November 2024
Kfc Club

Patrick Stash
casino
banner expire at 13 August 2024
BidenCash Shop
Rescator cvv and dump shop
Yale lodge shop
UniCvv
banner Expire 1 April  2021

Search results

  1. Neon Ghost

    Installing Router Scan in BlackArch From legitcarders

    To install Wine, you need to enable the Multilib repository . Then you can install the wine packages (stable version) or wine-staging (test version). To enable the Multilib repository, open the /etc/pacman.conf file: sudo gedit /etc/pacman.conf And uncomment the following lines: [multilib]...
  2. Neon Ghost

    Piping Netcat output to files from legitcarders

    First we will be piping the output from a simple netcat port scan to a file named output.txt. In general command line output can be outputted to a file by using the > operator followed by a file name. For Netcat this won’t work because we need to direct both stderr and stdout into the file. We...
  3. Neon Ghost

    Use Tor TO INCLUDE An Extra Level Of Security For Your..... activities

    Certainly. TOR is a very useful software. Okay I actually get it. But that doesn't mean you can do ANYTHING with PORTAL. While I was searching through the forum, We saw many posts regarding anonymity and talking about (wrong) use of TREFFER for carding. Let me personally tell you something...
  4. Neon Ghost

    Tors Menace Model, Or HOW EXACTLY TO Deanonimize Someone.

    Because so many here know, tor uses onion routing. The idea is simple however the devil is the facts. Here I am going to outline some hazard models that Tor will not cover. To be able to understand the implications, enables backtrack somewhat and appearance at the process. Once Tor boots its...
  5. Neon Ghost

    RapidScan - The Multi-Tool Web Vulnerability Scanner

    Evolution: It is quite a fuss for a pentester to perform binge-tool-scanning (running security scanning tools one after the other) sans automation. Unless you are a pro at automating stuff, it is a herculean task to perform binge-scan for each and every engagement. The ultimate goal of this...
  6. Neon Ghost

    Faraday v3.8 - Collaborative Penetration Test and Vulnerability Management Platform

    Here are the main new features and improvements in Faraday v3.8: Set up Faraday with a double click! We are committed to facilitate your work processes. With that in mind, we enhanced our installation phases, so now it’s easier to have Faraday on your devices: You can download our platform with...
  7. Neon Ghost

    Information / Intelligence Gathering

    Information / Intelligence Gathering. This post is going to be about information gathering. Its one of the important things. You want to know what you are going up against. Information about location, building, and etc... Google Maps and Google streets.(1) Local government office might have...
  8. Neon Ghost

    Learn How To Debug JavaScript with Chrome DevTools

    As a new developer, finding and fixing bugs can be difficult. You may be tempted to randomly use console.log() in an attempt to get your code working correctly. Not Anymore! This article is all about debugging the correct way! You’ll learn how to use the Chrome Developer Tools to set up...
  9. Neon Ghost

    How to build a double slider sign-in and sign-up

    Some of you might already know but for those who don’t, I’m starting a Weekly Coding Challenge with all you! This challenge is meant to help improve our coding skills by practicing on real-life projects. You can read more about this challenge and how you can join it by reading The Complete...
  10. Neon Ghost

    6 Ways To Hack Someone’s Instagram Account

    With more than 1 billion active users, Instagram is the second most used social networking website next to Facebook. So it is not a wonder to know that “hack instagram” is a widely searched keyword across the internet. There are tons of online websites and Android / iPhone apps that claims to...
  11. Neon Ghost

    How To Hack Gmail Account Password In Minutes And Its Prevention

    Hacking Gmail or Google is the second most searched account hacking. Hacking into a Google account gives access not only to Gmail but also to their prominent counterparts such as Android (since one can control a android device using Google account), YouTube, Drive, Hangouts, etc. People think...
  12. Neon Ghost

    VPN-Service/Double VPN/Best OPENVPN GUI From legitcarders

    The Company In-Disguise . Com In-Disguise . Com - Anonymous Internet Surfing, Anonymous Downloading-Uploading Torrent-P2P, Amonymous WiFI. Fully Automatic and Anonymous VPN Service , you dont have to waste time on: 1 - Search Supports if disconnected from a server, search for a standard...
  13. Neon Ghost

    [SCANS Service] Documents, IDs, CCs and etc From legitcarders

    I can make any scan with your information. Scans comes in perfect condition and even the best software can't catch them that it was edited. Proofs of my work: [Mastercard] http://privatepaste.com/download/43b902b695/telegram [Visa - Both sides]...
  14. Neon Ghost

    Redrawing documents from legitcarders

    The service offers redrawing and selling scans of various documents: Redrawing: + Passports / ID Cards (Russia, CIS, Europe and others, specify availability) + Driver's license / Driving license (Russia, CIS, Europe and others, specify availability) + Bank cards / Credit Card (VISA...
  15. Neon Ghost

    Hydra 9.0 - Fast and Flexible Network Login Hacker

    Number one of the biggest security holes are passwords, as every password security study shows. This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system. There are already...
  16. Neon Ghost

    Scavenger - crawler searching

    Just the code of my OSINT bot searching for sensitive data leaks on different paste sites. Search terms: credentials private RSA keys Wordpress configuration files MySQL connect strings onion links links to files hosted inside the onion network (PDF, DOC, DOCX, XLS, XLSX) Keep in mind: This...
  17. Neon Ghost

    Bandit - tool designed to find common security

    Bandit is a tool designed to find common security issues in Python code. To do this Bandit processes each file, builds an AST from it, and runs appropriate plugins against the AST nodes. Once Bandit has finished scanning all the files it generates a report. Bandit was originally developed within...
  18. Neon Ghost

    Credmap – the credential mapper

    Credmap is an open source credential mapper tool that was created to bring awareness to the dangers of credential reuse. It is capable of testing supplied user credentials on several known websites to test if the password has been reused on any of these. It is not uncommon for people who...
  19. Neon Ghost

    Termshark - a terminal ui for tshark, inspired by wireshark

    A terminal user-interface for tshark, inspired by Wireshark. If you're debugging on a remote machine with a large pcap and no desire to scp it back to your desktop, termshark can help! Features Read pcap files or sniff live interfaces (where tshark is permitted). Inspect each packet using...
  20. Neon Ghost

    Dox tutorial by legitcarders.ws

    The Basics What is doxing? Doxing is basically finding out information about a person. The vast majority of people on the internet are anonymous and with anonymity comes power because you cannot hurt the physical person behind the username. Doxing takes away this power, that is why people will...
Top Bottom