Search results

  1. Hacker

    We flash the router from scratch

    LET'S GO Setting up a router well is an important task, but sometimes this is not enough and you have to solve problems already during operation. We will talk about what they are and how to deal with them, if you or your client has a MikroTik router, in this article. The most common complaint...
  2. Hacker

    Fraud attacks and voice credit

    This article was written for educational purposes only. We do not call anyone to anything, only for information purposes! The author is not responsible for your actions. The collection of biometric data is now actively developing. Banks collect and transmit biometric data of their clients to the...
  3. Hacker

    What is a botnet, its architecture, and how does it work?

    LET'S GO Cyberattacks often make headlines in today's digital environment. At any time, anyone who uses a computer can become a victim of a cyber attack. There are various types, from phishing to DDoS and password attacks. There are many dangers to network security on the Internet. Many of...
  4. Hacker

    A selection of neural networks for photo processing!

    Good day! Today we have prepared for you a selection of useful services for working with visual content. Often, services can even replace heavy photo editors in some tasks. Let's go! 1. Clipdrop → https://clipdrop.co/ ← service will allow you to "copy" an object from real life. We photograph...
  5. Hacker

    How to run a virtual machine on a smartphone?

    Good day! Today we are going to talk with you about virtual machines that can be run on Android. This is necessary, first of all, for those who want to check a suspicious file, site or application on a smartphone. For such operations, you can use VMOS → http://vmos.com/ ←. VMOS will allow you...
  6. Hacker

    Что за форумы такие мега приватные кто знает

    ICA - кидальный форум, основан на взломанной БД cpro (т.е. нашего форума) LPC - уже давно не существует ДЦ - давно закрылся Маза - 2 поручителя КСУ - 3 поручителя ВН - 3 поручителя Вер - 50 баксов рега Коровка - рега бесплатная, для доступа к мануалам 50 баксов Эксплоит - рега 100 баксов Ссылки...
  7. Hacker

    Заливы БА (нужна консультация)

    Я сразу же покупаю крипту на криптобирже с БА. Вериф там сделать очень просто, но на всякий случай, сразу же вывожу криптовалюту на другой кошелек, либо продаю крипту там же на левую дебетовую карту, с которой вывожу через АТМ. Чаржи приходят, но аккаунты лочат редко. Пока придёт чарж у вас...
  8. Hacker

    Scientifically proven ways to manipulate people

    How to manipulate the other person Salute to those who like to live at someone else's expense, in complex negotiations, in everyday work, in relations with superiors, subordinates, colleagues, customers, suppliers, we are constantly faced with speech manipulation. This is not surprising, because...
  9. Hacker

    Earn money on the jealous

    As a basis, I took hacking vk. Yes, the method is still more or less alive, and I often see similar attempts to make money like this, but I came up with something more ambitious. What if we "hack" not the vk, but the entire phone? How much can attract jealous people! After a little Googling, I...
  10. Hacker

    AVITO 6.0 Manual

    Salute to fans of living at someone else's expense, today we have a drain on avito 6.0, personally I think this topic is complete shit, but it will be quite useful for beginners to read. First, let's talk about bypassing avito 1. Go to the acc. with a verified phone number. 2. We offer the...
  11. Hacker

    Заливы БА (нужна консультация)

    БА можно слить следующими способами: 1. Купить криптовалюту на любой криптобирже, например, Paxful 2. Трансфер на реквизиты обнальщика 3. Покупки товаров в интернет-магазинах 4. Вывод на любую платежную систему, инвест-конторы, различные прокладки, поддерживающих БА, но при этом, требуется...
  12. Hacker

    Own VPN server without logging and with the tunnel disabled

    Getting started Take a VPS from msk. host ($ 2 per month) Regress and take a VPS You can choose any OS, but I will configure it on Debian and I advise you to repeat everything after me(DON'T FORGET TO CHANGE THE DOMAIN NAME!) Go to the main page: We connect to the server via...
  13. Hacker

    Deanonymous knowing Instagram account!

    We provide you with a useful package of tools necessary for intelligence based on open data knowing the target's Instagram account. SearchMy (http://searchmy.bio/)— Here you can find the profile you are looking for by searching the site. Instadp (http://instadp.com/) - The service is necessary...
  14. Hacker

    Interview with scammer olx and kufar

    I found here for you one quite interesting interview with a scammer. Let's start with the origins.Where did you start, what led you to the activity? 5 years ago, I moved to one of the EU countries for permanent residence, and I realized that there is not much work there, except for cleaning and...
  15. Hacker

    What a person says and actually does

    Salute, fans of fucking up someone else's account, today we have a very interesting article about what a person does and what he says. DECLARED INTENTIONS Let's start with the definitions. Here are some examples: "It's better for me to be a loser" "I wish you well" "I want everyone to be...
  16. Hacker

    What we leave behind

    When we visit a website, we leave a lot of data about ourselves, starting with our IP address and ending with digital fingerprints, which are formed from all available data about the system, browser, and plugins. These prints are called “fingerprints". They are unique identifiers of 32...
  17. Hacker

    How to pay a bribe correctly

    Let's start with the law: article 291 of the Criminal Code (CC) of the Russian Federation states that handing over a "lamb in a piece of paper" is a criminal offense, for which a penalty is imposed depending on the severity of the crime at the choice of the court. What will happen for this type...
  18. Hacker

    Fun black scheme

    The essence of the scheme is to bypass apartment buildings by apartment and inform residents about the replacement/renewal of access equipment. The scheme will live for an ultra long time. The color is gray. The yield is high. In performance, everything is very simple, just do 1 cycle yourself...
  19. Hacker

    Why develop SE?

    1.) With the help of SE, you can get what you want from a person, of course, if your skill in this matter is much higher. You can divorce any girl for sex, or an oligarch for a Rolls Royce and a house in the Maldives, who will not even guess that you have divorced him. 2.) With the help of SE...
  20. Hacker

    Your WI-FI will tell you where you live, where you work, and where you travel

    Of course, we are not talking about your conversations, but it is quite possible to find out about your place of residence, work, and travel, since mobile devices are able to report their previous connections. You probably didn't know about this. How does this happen ? To connect to existing...
Top