Welcome!

By registering with us, you'll be able to discuss, share and private message with other members of our community.

SignUp Now!
adv ex on 5 january 2024
adv ex on 22 February 2024
banner Expire 26 October 2024
Rescator cvv and dump shop
banner expire at 13 May

Yale lodge shop
UniCvv
banner Expire 1 April  2021

cardersforum mexico

  1. ALBERT

    How to create a new European SSN and/or ID

    After reading alot of posts regarding creating a new SSN and/or a new identity, this is my ¨how to¨ First of all! This is only for educational purposes for my Bitshacking community and i never tested this myself ;-) There are 2 ways the hard way and the easy way. THE HARD WAY STEP 1...
  2. ALBERT

    Yaazhini - Free Android APK & API Vulnerability

    Yaazhini is a free vulnerability scanner for android APK and API. It is a user-friendly tool that you can easily scan any APK and API of android application and find the vulnerabilities. Yaazhini includes vulnerability scan of API, the vulnerability of APK and reporting section to generate a...
  3. ALBERT

    Piping Netcat output to files from legitcarders

    First we will be piping the output from a simple netcat port scan to a file named output.txt. In general command line output can be outputted to a file by using the > operator followed by a file name. For Netcat this won’t work because we need to direct both stderr and stdout into the file. We...
  4. ALBERT

    Information / Intelligence Gathering

    Information / Intelligence Gathering. This post is going to be about information gathering. Its one of the important things. You want to know what you are going up against. Information about location, building, and etc... Google Maps and Google streets.(1) Local government office might have...
  5. ALBERT

    How To Hack Gmail Account Password In Minutes And Its Prevention

    Hacking Gmail or Google is the second most searched account hacking. Hacking into a Google account gives access not only to Gmail but also to their prominent counterparts such as Android (since one can control a android device using Google account), YouTube, Drive, Hangouts, etc. People think...
  6. ALBERT

    Scavenger - crawler searching

    Just the code of my OSINT bot searching for sensitive data leaks on different paste sites. Search terms: credentials private RSA keys Wordpress configuration files MySQL connect strings onion links links to files hosted inside the onion network (PDF, DOC, DOCX, XLS, XLSX) Keep in mind: This...
  7. ALBERT

    Dox tutorial by legitcarders.ws

    The Basics What is doxing? Doxing is basically finding out information about a person. The vast majority of people on the internet are anonymous and with anonymity comes power because you cannot hurt the physical person behind the username. Doxing takes away this power, that is why people will...
  8. ALBERT

    Exploiting VSFTPD v2.3.4 on Metasploitable 2

    The end goal of exploiting vulnerabilities is ultimately to gain a root or administrator shell on the target host and perform post exploitation on the machine. The gained privilege level of a shell is usually in the context of the exploited application. For example if VSFTPD v2.3.4 is running in...
  9. ALBERT

    Userrecon-Py - Find Usernames In Social Networks

    Find usernames in social networks. Installation Install dependencies (Debian/Ubuntu): Code: sudo apt install python3 python3-pip Install with pip3: Code: sudo -H pip3 install git+https://github.com/decoxviii/userrecon-py.git userrecon-py --help Building from Source Clone this repository, and...
  10. ALBERT

    Linux Kernel 2.6.17 2.6.24.1

    * Dovalim z knajpy a cumim ze Wojta zas nema co robit, kura. * Gizdi, tutaj mate cosyk na hrani, kym aj totok vykeca. * Stejnak je to stare jak cyp a aj jakesyk rozbite. * * Linux vmsplice Local Root Exploit * By qaaz * * Linux 2.6.17 - 2.6.24.1 * * This is quite old code and I had to rewrite it...
  11. ALBERT

    Web Application Penetration Testing for Ethical Hacking

    You want to learn web application penetration testing freely from beginners to advanced?? Then you are up with the right post. Here we go: A penetration test is an authorized attack on a web app or computer system, mainly done to check and evaluate the security of a web app or systems. So if...
  12. ALBERT

    Three Methods to Cashout on Credit Card

    METHOD 1: CC > SLL > BTC What you need? Valid CVV (any country will do) Clean Socks5 proxy as close as possible to cardholder’s address Good DNS setup Ok lets get started. You’ll need an email account. Go create a new one at yahoo/ gmail /whatever ….. doesn’t matter which (i wouldn’t use...
  13. ALBERT

    How to start learning Kali Linux

    Speaking about learning Kali Linux usually mean working with programs. Although the Kali Linux operating system also has many questions to study (creating a custom ISO, installing on removable media, encrypting permanent partitions and much more), it is also possible to use the system without...
  14. ALBERT

    Wibr+ and wifi hacking tool for android

    WIBR+ - WiFi Hacking Tool For Android WIBR+ is an android app that is capable of cracking WiFi passwords. It was designed to test the security of the WPA/WPA2 PSK WiFi networks, but now it is widely being used to crack weak WiFi passwords. It supports two types of attacks -- Dictionary...
  15. ALBERT

    Principles of work and methods of protection against skimmers for bank cards

    yber fraudsters use various methods of stealing payment card data during a transaction. This article discusses the most typical ways, as well as protective measures, so that you do not become a victim of fraud of this kind. What is a payment card skimmer In the security sector, a skimmer is any...
  16. ALBERT

    Three Methods to Cashout on Credit Card

    Editor Note: VirWox wised up to this method and started forcing users to validate their SL avatars .. Thought I’d tidy this up a bit with a noob-friendly tutorial on how to buy bitcoins with a CVV through VirWox. METHOD 1: CC > SLL > BTC What you need? Valid CVV (any country will do) Clean...
  17. ALBERT

    How To Do Unlinkable Bitcoin Transactions

    Cryptocurrency usage is growing everyday and, with it, people’s awareness about them is growing too. One of the greatest advantage of using Bitcoins or other cryptocurrencies, is the protection of your anonymity during and after the transaction; anyway, it’s crucial to point out that the word...
  18. ALBERT

    5 Common Mistakes That Fresh Hackers Make

    Starting out as a beginner in hacking can be a lot of fun, but there are some common mistakes that most make. If you’re reading this, then you have the unique advantage of avoiding these mistakes when you’re still news. The following five points will tell you what not to do in your journey...
  19. ALBERT

    Follow this path for 100% successful Bank transfers

    Doesn’t read write or speak native English so I have decided that I will write a guide and hopefully it will be able to help you guys out a little more than the other guide. Okay so lets get started, The first thing you are going to need is banking credentials of some sort. The information you...
  20. ALBERT

    Cyberstalking Suspect Arrested After VPN Providers Shared Logs With the FBI

    VPN providers often advertise their products as a method of surfing the web anonymously, claiming they never store logs of user activity, but a recent criminal case shows that at least some, do store user activity logs. The case in question is of Ryan Lin, a 24-year-old man from Newton...
Top Bottom