Welcome!

By registering with us, you'll be able to discuss, share and private message with other members of our community.

SignUp Now!
adv ex on 5 january 2024
adv ex on 22 February 2024
banner Expire 26 October 2024
Rescator cvv and dump shop
banner expire at 13 May

Yale lodge shop
UniCvv
banner Expire 1 April  2021

new carders forum

  1. ALBERT

    How to create a new European SSN and/or ID

    After reading alot of posts regarding creating a new SSN and/or a new identity, this is my ¨how to¨ First of all! This is only for educational purposes for my Bitshacking community and i never tested this myself ;-) There are 2 ways the hard way and the easy way. THE HARD WAY STEP 1...
  2. ALBERT

    Yaazhini - Free Android APK & API Vulnerability

    Yaazhini is a free vulnerability scanner for android APK and API. It is a user-friendly tool that you can easily scan any APK and API of android application and find the vulnerabilities. Yaazhini includes vulnerability scan of API, the vulnerability of APK and reporting section to generate a...
  3. ALBERT

    Piping Netcat output to files from legitcarders

    First we will be piping the output from a simple netcat port scan to a file named output.txt. In general command line output can be outputted to a file by using the > operator followed by a file name. For Netcat this won’t work because we need to direct both stderr and stdout into the file. We...
  4. ALBERT

    Faraday v3.8 - Collaborative Penetration Test and Vulnerability Management Platform

    Here are the main new features and improvements in Faraday v3.8: Set up Faraday with a double click! We are committed to facilitate your work processes. With that in mind, we enhanced our installation phases, so now it’s easier to have Faraday on your devices: You can download our platform with...
  5. ALBERT

    How To Hack Gmail Account Password In Minutes And Its Prevention

    Hacking Gmail or Google is the second most searched account hacking. Hacking into a Google account gives access not only to Gmail but also to their prominent counterparts such as Android (since one can control a android device using Google account), YouTube, Drive, Hangouts, etc. People think...
  6. ALBERT

    Scavenger - crawler searching

    Just the code of my OSINT bot searching for sensitive data leaks on different paste sites. Search terms: credentials private RSA keys Wordpress configuration files MySQL connect strings onion links links to files hosted inside the onion network (PDF, DOC, DOCX, XLS, XLSX) Keep in mind: This...
  7. ALBERT

    Dox tutorial by legitcarders.ws

    The Basics What is doxing? Doxing is basically finding out information about a person. The vast majority of people on the internet are anonymous and with anonymity comes power because you cannot hurt the physical person behind the username. Doxing takes away this power, that is why people will...
  8. ALBERT

    Exploiting VSFTPD v2.3.4 on Metasploitable 2

    The end goal of exploiting vulnerabilities is ultimately to gain a root or administrator shell on the target host and perform post exploitation on the machine. The gained privilege level of a shell is usually in the context of the exploited application. For example if VSFTPD v2.3.4 is running in...
  9. ALBERT

    Userrecon-Py - Find Usernames In Social Networks

    Find usernames in social networks. Installation Install dependencies (Debian/Ubuntu): Code: sudo apt install python3 python3-pip Install with pip3: Code: sudo -H pip3 install git+https://github.com/decoxviii/userrecon-py.git userrecon-py --help Building from Source Clone this repository, and...
  10. ALBERT

    Web Application Penetration Testing for Ethical Hacking

    You want to learn web application penetration testing freely from beginners to advanced?? Then you are up with the right post. Here we go: A penetration test is an authorized attack on a web app or computer system, mainly done to check and evaluate the security of a web app or systems. So if...
  11. ALBERT

    Three Methods to Cashout on Credit Card

    METHOD 1: CC > SLL > BTC What you need? Valid CVV (any country will do) Clean Socks5 proxy as close as possible to cardholder’s address Good DNS setup Ok lets get started. You’ll need an email account. Go create a new one at yahoo/ gmail /whatever ….. doesn’t matter which (i wouldn’t use...
  12. ALBERT

    Wapiti Penetration Testing Tool

    Wapiti is another famous penetration testing tool. It allows auditing the security of the web applications. It supports both GET and POST HTTP methods for the vulnerability check. Features: Generates vulnerability reports in various formats It can suspend and resume a scan or an attack Fast...
  13. ALBERT

    Wibr+ and wifi hacking tool for android

    WIBR+ - WiFi Hacking Tool For Android WIBR+ is an android app that is capable of cracking WiFi passwords. It was designed to test the security of the WPA/WPA2 PSK WiFi networks, but now it is widely being used to crack weak WiFi passwords. It supports two types of attacks -- Dictionary...
  14. ALBERT

    Principles of work and methods of protection against skimmers for bank cards

    yber fraudsters use various methods of stealing payment card data during a transaction. This article discusses the most typical ways, as well as protective measures, so that you do not become a victim of fraud of this kind. What is a payment card skimmer In the security sector, a skimmer is any...
  15. ALBERT

    Three Methods to Cashout on Credit Card

    Editor Note: VirWox wised up to this method and started forcing users to validate their SL avatars .. Thought I’d tidy this up a bit with a noob-friendly tutorial on how to buy bitcoins with a CVV through VirWox. METHOD 1: CC > SLL > BTC What you need? Valid CVV (any country will do) Clean...
  16. ALBERT

    How To Do Unlinkable Bitcoin Transactions

    Cryptocurrency usage is growing everyday and, with it, people’s awareness about them is growing too. One of the greatest advantage of using Bitcoins or other cryptocurrencies, is the protection of your anonymity during and after the transaction; anyway, it’s crucial to point out that the word...
  17. ALBERT

    5 Common Mistakes That Fresh Hackers Make

    Starting out as a beginner in hacking can be a lot of fun, but there are some common mistakes that most make. If you’re reading this, then you have the unique advantage of avoiding these mistakes when you’re still news. The following five points will tell you what not to do in your journey...
  18. ALBERT

    Follow this path for 100% successful Bank transfers

    Doesn’t read write or speak native English so I have decided that I will write a guide and hopefully it will be able to help you guys out a little more than the other guide. Okay so lets get started, The first thing you are going to need is banking credentials of some sort. The information you...
  19. ALBERT

    EVERYTHING you need to know to become a PRO HACKER

    LEAVE A POST SAYING THANK YOU IF IT HELPS In response to a user's question asking "what do I need to know to become a hacker ?". In this post I am regrouping what ethical, black hat and grey hat hackers think are the essential skills and knowledge any pen tester should know: At the top you will...
  20. ALBERT

    Cyberstalking Suspect Arrested After VPN Providers Shared Logs With the FBI

    VPN providers often advertise their products as a method of surfing the web anonymously, claiming they never store logs of user activity, but a recent criminal case shows that at least some, do store user activity logs. The case in question is of Ryan Lin, a 24-year-old man from Newton...
Top Bottom