Welcome!

By registering with us, you'll be able to discuss, share and private message with other members of our community.

SignUp Now!
adv ex on 5 january 2024
adv ex on 22 February 2024
banner Expire 26 October 2024
Rescator cvv and dump shop
banner expire at 13 May

Yale lodge shop
UniCvv
banner Expire 1 April  2021

carders forum 2020

  1. Premiums

    Today working anonymous and high anonymous proxy IP server list

    Here is list of anonymous and high anonymous proxy server. There proxy ip address are manually checked by me. 58.254.134.201 :8080 46.160.145.29 :8090 96.255.68.19 :8080 46.181.201.214 :808 69.163.96.2 :8080 195.145.22.46 :80 210.48.147.82 :80 217.172.179.50 :80 89.188.141.51 :80
  2. Premiums

    How to log IP of Victim using Web page? Ip Logger[Method 1]

    So far, i have give some third party websites to track ip address of victim. Today we are going to create our own website or webpage to track victim IP address. I have written this PHP code for you. Let me explain in two different methods Method 1: Log ip and redirect to some other...
  3. Premiums

    cyber cafe security [Guest Post]

    Now days people are always talking about system security even our government also amend many cyber laws but can we say that everything is safe does we know everything about our security. According to me “NO” usually we are not aware that we left behind us our Important Information. if someone...
  4. Premiums

    How to Clear/Flush DNS cache in Linux/Windows/Mac Os?

    If a website newly registered in internet world, it may not be loaded in your computer. For example, you register for example.com yesterday, still you may not see your web page. This is problem of DNS cache. Your local DNS cache is old one so it won’t know the newely available domain names...
  5. Premiums

    [Fixed]No init found try passing init= bootarg | Ubuntu Inside Windows Booting Problem

    I installed in ubuntu inside Windows XP. It works perfectly for 2 months. Recently I met with this problem: mount: mounting /sys on /root/sys failed: no such file or directory mount: mounting /dev on /root/sys failed: no such file or directory mount: mounting /sys on /root/sys failed: no such...
  6. Premiums

    Banner Text Effect in Linux using Terminal? Ubuntu Tricks

    Hi , this is funny Linux trick. if you give string, it will give banner text effect depending on the string. For example: if your string value is hackers, then it will generate the following : Requirements: Linux Internet How to Create this banner effect using Terminal? Open the...
  7. Premiums

    Microsoft offering $250,000 reward for Rustock Botnet’s info

    Microsoft is offering reward of $250,000 for providing identification, arrest and criminal conviction of the individual(s) responsible for controlling the Rustock bot net This Rustock bot net enslaves around 1 million computers and force them to generate billion of spam mails. It is able to...
  8. Premiums

    How to Crack password protected RAR files like a hacker (Brute Force attack)?

    Install the RAR password remover software as said in my last post. Let me show how to crack the password protected RAR files using Brute Force attack method. Step 1: Run the application start->Allprograms->RAR password Recovery->RAR password Recovery Step 2: Now the Password Recovery windows...
  9. Premiums

    Google Search Detects malware

    Some particular malwares infect the user computer and try to send traffic to Google through a small number of intermediary servers called “proxies.” Google found some unusual traffic while performing routine maintenance on one of their data centers. After Google is collaborating with...
  10. Premiums

    What is Cross Site Scripting/XSS? Web Application Vulnerability

    What is XSS? XSS is Known as Cross Site Scripting. XSS is one of Web Application Vulnerability. Using this vulnerability , an Attacker can inject their own Malicious Client side Codes(Javascript,…) into website. This XSS Infected web page can carry malicious codes to other users. The...
  11. Premiums

    How to Hack the remote system using Remote Administration Tools?

    Today let us start our article with conversation. What is RATs (Remote Administration Tools)? N00b: Hello BreakTheSec, i heard a new Keyword RATs in hacking world? what is it? I know only about this rats. BreakTheSec: RATs are known as Remote Administration Tools. I hope you understand what it...
  12. Premiums

    Increasing the speed of your dial up net connection

    I have a dial up connection and it improve my speeds about 25% in surfing the internet. give it a try. Im IT , only do it if you feel comfortable with changing registry. Increasing network browsing speed Does your computer slow down when you browse your local area network and connect to other...
  13. Premiums

    Non-vbv Bins - Just Italy !!! Visa

    416027 [ INTESA SANPAOLO S.P.A. VISA CREDIT BUSINESS ITALY ] 416028 [ INTESA SANPAOLO S.P.A. VISA CREDIT PREMIER ITALY ] 416029 [ INTESA SANPAOLO S.P.A. VISA CREDIT BUSINESS ITALY ] 426389 [ INTESA SANPAOLO S.P.A. VISA CREDIT CLASSIC ITALY ] 434994 [ INTESA SANPAOLO S.P.A. VISA CREDIT CLASSIC...
  14. Premiums

    992 Netflix.com Hits | High Quality Checked |

    992 Netflix.com Hits | High Quality Checked | https://anonfiles.com/V2QaO4p5y3/netflix.com_txt
  15. Premiums

    Call to your Friend From their number itself

    Want to make your friend shock? Call your friend from their number and make them shocked. Now i will explain you how to do that Steps to Follow: 1. Go to http://www.mobivox.com and register there for free account. 2. During registration, remember to insert Victim mobile number in “Phone...
  16. Premiums

    No more waiting for downloading the deposit files

    Time is priceless. We should not waste our time with these deposit files. Waiting to get the download link will make us vexed. So Now we skip the waiting time in deposit files.com . It is easy to hack the deposit files website. If you like to download the files from depositfiles.com without...
  17. Premiums

    How to delete an undeletable file

    Can’t you delete any un wanted files? Then this hack will help you to delete those type of files. Open a Command Prompt window and leave it open. Close all open programs. Click Start, Run and enter TASKMGR.EXE Go to the Processes tab and End Process on Explorer.exe. Leave Task Manager open...
  18. Premiums

    Create a Memory Space Eater Trojan Horse with simple c program

    Most of us (as a hacker) like to create a Trojan Horse . Today in this post i am going to explain you how to create a virus which eats the Memory space in your victim Hard Disk Drive. Characteristics of this Trojan: This trojan eats 1GB of memory for every 1 minutes. As a result the the disk...
  19. Premiums

    15 most needed Network security/Hacking tools

    1. Nmap I think everyone has heard of this one, recently evolved into the 4.x series. Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP...
  20. Premiums

    How to Customize the Login Wallpaper in Windows 7

    In windows 7 ,it is easy to change the Login Screen Wallpaper. This trick will look very cool. Don’t worry no problem will arise. You can simply change it by editing Registry. Steps to Follow: Step 1: 1. The image you need to set as the background should be a .jpg file and it’s size should...
Top Bottom