Search results

  1. Mutt

    Carding for beginners 2024

    The article is for informational purposes only and does not call for actions that violate the law! Information in this article is exclusively for beginners Carding is a highly intelligent gop-stop. The method of taking money from users of colored plastic. In the vastness of the Internet...
  2. Mutt

    Lock the camera on your phone

    Your Android device has 15 to 30 applications that have permission to use the camera and can use it at any time to spy on and spy on you. Each of 15 to 30 apps can take photos or record videos anytime, anytime. Most applications have internet access and can transfer photos or videos over the...
  3. Mutt

    Glueing viruses through winrar

    The article was created for informational purposes only and does not call for action! Let's start with what gluing is. Glueing is combining several files into one. It is often used when creating viruses. Typical example: we have two exe. One is a regular word installer, and the other is a virus...
  4. Mutt

    Creation of fake correspondence and posts

    I think that in many areas of earning (whether it is arbitrage, scam or other "creativity") will come in handy. A selection of simple and intuitive services for creating fake correspondence. ScreenChat - regular SMS Fake WhatsApp Chat Generator - WhatsApp IOS WhatsFalse - a similar...
  5. Mutt

    Virus safety

    Virus testing safety 2021 When working in virology, there is a frequent need to run viruses on your machine. Before using a payload, you need to check it so that there is no situation when bots are lost due to incorrect initial settings. When scanning a virus, there are two iron rules to keep in...
  6. Mutt

    Full disk encryption

    Today we need the VeraCrypt utility. If you haven't downloaded it yet, download it from the download page on the official website. We put the regular version (not portable) Launch VeraCrypt, in the main program window go to the "System" tab and select the first menu item "Encrypt system...
  7. Mutt

    Virus safety

    This article is for informational purposes only! The basis of security can be called work through virtual machines. Since we work with viruses, there is a chance, inadvertently, to launch it. The worst thing here is not that the data will get to the server after the virus has been processed...
  8. Mutt

    Anonymous search engines

    Search engine security A secure search first of all begins with an encrypted transmission of a request between the user and the server. There is an excellent tool, SSL Server Test, for testing encryption. A search engine that claims to be anonymous and secure should first of all forcefully...
  9. Mutt

    Fake screenshots of various payments without Photoshop

    The article was created for informational purposes only! Good day, friends, I want to share the suitability. Let's analyze the topic of how to fake screenshots of various payments without using Photoshop. DealAcc dealacc.ru - A site where you can fake screenshots of the main payment systems in...
  10. Mutt

    Keyloggers and stealers

    The article is presented for informational purposes only and does not call for action! In this article, we will raise the issue of keyloggers and stealers. This is a fairly simple way to get data if you have access to the device or to the location of the computer. It is also possible to carry...
  11. Mutt

    Email spammer

    This article is for informational purposes only! With the help of this html file, you can shit mail to your foe. It is possible that some messages will end up in spam. Link to the file: https://anonfile.com/faiaK312o1/_html Instructions Open the file and see the form for entering email...
  12. Mutt

    Safety in gray carding matters

    All information provided is for informational purposes only and does not call you to take actions that violate the law! In this article, we will talk about network security when conducting any gray cases. I will not leave links, specific schemes, etc. because I want you to develop yourself...
  13. Mutt

    Keylogger in C ++

    All information provided is for informational purposes only and does not call you to take actions that violate the law! Today we will analyze writing a simple KeyLogger for Windows in C ++. Include the libraries and include the std namespace: #include <iostream> #include <Windows.h> using...
  14. Mutt

    Toxic notes. How to use XSS to execute arbitrary code in Evernote.

    XSS in 2021 For informational purposes only! Cross-Site Scripting (XSS for short) is a widespread vulnerability affecting many web applications. It allows an attacker to inject malicious code into a website in such a way that the browser of the user visiting the site will execute the code...
  15. Mutt

    A selection of free forensic utilities

    This article provides free tools for conducting information security incident investigation. Disk tools and data collection Arsenal Image Mounter is a utility for working with disk images in Windows, accessing partitions, volumes, etc. DumpIt utility for creating a physical memory dump of...
  16. Mutt

    CTF for hacking practice

    What is CTF? CTF (Capture the flag) is a team game, the main goal of which is to capture the "flag" from the opponent. Capture the flag format can be used in paintball, roleplaying, and computer games. In information security, this is a term that once migrated from the terminology of shooters...
  17. Mutt

    List of programs for hacking Wi-Fi

    All information provided is for informational purposes only and does not call you to take actions that violate the law! Wireless networks are used literally everywhere these days. It is fast, convenient, reliable, does not require placing many cables around the house and gives freedom of...
  18. Mutt

    Trape

    For informational purposes only! Trape is a reconnaissance tool that allows you to track people and get very detailed information. Several attack vectors are available. Some possibilities: Remote session recognition. You can find out where the victim is logged in Logging requests in real time...
  19. Mutt

    Disappearing from the web

    Deleting your social media accounts The first thing that will be bombed is the search results for your surname or nickname in a search engine. As a rule, these are accounts on Facebook, Vkontakte, Twitter, Youtube, Google+, and also wherever you use your real name. We delete our profiles...
  20. Mutt

    Forensics as the Science of Cybercrime Investigation

    In general, "forensics" is a tracing paper from the English word forensics, which, in turn, is an abbreviated form of forensic science, "forensic science", that is, the science of the study of evidence. In Russian, this concept is often called forensics, and the word "forensics" was assigned to...
Top