Search results

  1. Mutt

    Spammer / Ddoser for VK conversations

    This material is provided for educational purposes only and was created as part of the study of information security. The author did not publish material for malicious purposes. If someone uses the information for personal gain, then the author is not responsible for any harm or damage caused...
  2. Mutt

    Stealing BTC checks

    This material is provided for educational purposes only and was created as part of the study of information security. The author did not publish material for malicious purposes. If someone uses the information for personal gain, then the author is not responsible for any harm or damage caused...
  3. Mutt

    Dojo is a sandbox for hackers

    Web Security Dojo is a free, self-contained open source framework for security training and penetration testing of web applications. Homepage: https://www.mavensecurity.com/resources/web-security-dojo/ Installing Web Security Dojo You must have VirtualBox installed. Then download the container...
  4. Mutt

    Dealing with viruses for beginners

    The first steps So, let's imagine for a start that we have an infected machine on our hands. The first step is to perform three main steps: isolate the computer from others on the network, take a memory dump, and take a disk image. When disconnecting an infected computer from the network, it is...
  5. Mutt

    Carding websites with 2-D Secure merchants

    Not a large websites list with merchants for carding, we have 2DS merchant data. www.styleon.de/ - electronics store www.focalprice.com/ - electronics, household appliances, accessories /www.extremepie.com/ - clothing, sports equipment www.jbox.com/ - Japanese food to clothing store...
  6. Mutt

    Cash out CC through your own merchant

    Content: 1. What is merch and what is it for (briefly) 2. Preparation for registration in the merchant. Necessary information 3. Actually the registration itself, some nuances 4. Secrets of Carding for Lifetime of Merchant 5. The withdrawal and payment of the merchant itself 6. Afterword 1...
  7. Mutt

    Working with logs in the Linken Sphere or any antidetect

    To work with the log, we first need to find out address from log, as soon as we find out this information, we select the socks / tunnel, when we have everything in our hands, we open the sphere, we log in, this window opens up for us: (there should be no black, the first two panels should look...
  8. Mutt

    WORKING WITH LOGS [DETAILED COURSE FOR BEGINNERS]

    The article was written solely for informational purposes, for decent and law-abiding citizens who do not want to be a victim of heinous fraud. We ourselves do not do this. In this manual I will try to explain: 1. What are these your Logs. 2. Where to farm them. 3.How to buy a high-quality mat...
  9. Mutt

    OpenLog - Automatic Sphere Configuration | cookie checker

    Good time everyone! We are pleased to announce the launch of the program OpenLog v1.0 Beta[/B] OpenLog is an updated version of the “RebootCG” pilot project developed by the team Now it is not just a fingerprint generator, but a full-fledged combine for working with logs, which currently...
  10. Mutt

    Setting up real configs from scratch. Working with logs [Liken Sphere].

    Manual: Setting up real configs from scratch. Working with logs: Tips and tricks when working with logs and using antidetect. Getting basic information from the system log. In the log, the most basic information about the system is contained in the System.txt file, or Information.log...
  11. Mutt

    Работа с логами + настройка антидетекта

    Настройка реальных конфигов с нуля. Работа с логами [Линкен Сфера] Мануал: Настройка реальных конфигов с нуля. Работа с логами: Советы и фишки при работе с логами и использованию антидетекта. Получение базовой информации с лога о системе. В логе самая базовая информация о системе содержится в...
  12. Mutt

    Configuring antidetect browser profiles

    If you are new to arbitrage and are just learning the basics of working with rent, autoregs, logs or other purchased accounts, this is a memo for you. In this article, we will show you how to configure profiles in three different antidetect browsers. Let's go ! Before proceeding to the setup...
  13. Mutt

    Обучение по созданию и ведению (вбиву) своего шопа. Часть 1

    Очень напоминает тему: https://carder.market/threads/obuchenie-kardingu-po-sozdaniju-i-vbivu-svoego-shopa.99058/
  14. Mutt

    Breaking through information about a person (look up)

    A little introduction: All services for punching are in the public domain, I myself once came across such a topic, and thus I learned. But it’s not only about the services, but also about the ability to use them. I will tell you about all the intricacies that I know. Many "punchers" find...
  15. Mutt

    Automated look up (punching)

    What can and how does it work? EagleEye is a tool to punch through all possible user profiles on the web using just one photo! For face recognition, AI from Facebook is used, which is accessed by the tool through the corresponding API. The tool then runs the photo through Google and...
  16. Mutt

    Disposable mailboxes

    Everyone in life sometimes has situations when disposable mailboxes are required, so catch a selection of rare disposable mailboxes so as not to dirty your permanent mail address in the future. https://www.guerrillamail.com/en/ https://10minutemail.com https://www.trash-mail.com/inbox/...
  17. Mutt

    Hacking VK (not phishing!)

    This material is provided for educational purposes only and was created as part of the study of information security. The author did not publish material for malicious purposes. If someone uses the information for personal gain, then the author is not responsible for any harm or damage caused...
  18. Mutt

    We hide the fact of using TOR

    It happens that some clearnet sites do not allow access to the site using the Tor anonymous network. This is done using blacklists, in which the Tor IP addresses are entered. Therefore, a situation may arise when it is necessary to hide the fact of using Tor. Before we start setting up, I would...
  19. Mutt

    Huge list of onion sites

    All information provided is for informational purposes only and does not call you to take actions that violate the law! Search Engines (uncensored): 1.not Evil http://hss3uro2hsxfogfq.onion 2. Torch http://xmh57jrzrnw6insl.onion/ 3. Candle http://gjobqjj7wyczbqie.onion/ 4. Ahmia...
  20. Mutt

    Connecting to the i2p network

    I2P (IIP) is a project started with the aim of creating an anonymous computer network that runs over the Internet. The creators of the project have developed free software that makes it possible to implement a network operating over the Internet. So how do you connect to the i2p network? JVM -...
Top