Search results

  1. Man

    С какого направления начать новичку???

    Начать вбивать лучше всего с вещевого кардинга. Подробности в этой теме: Обучение кардингу новичков 2024 (основные аспекты) Пожалуйста, уважаемые кардеры высказывайте своё мнение.
  2. Man

    MAKING YOUR OWN BITCOIN VERIFIED CASHAPP

    ACTUAL CASH APP METHOD You will need: email address $20+/- (optional) - Go on craigslist - If you have $5 to spare, post a gig ad seeking help with an online project, quick turnaround (optional) - You can browse the community board and resume boards if you don't want to pay for a gig ad -...
  3. Man

    ULTIMATE OPSEC MACHINE BUILD - BECOME A GHOST IN THE MATRIX

    [THE CIA HATES THIS TRICK] OPSEC is a forgotten art. Really, some people in these communities act like what they're doing isn't illegal. The cockiness of getting away with a few things may make you think you're untouchable, but don't forget, there exists an entire security industry that exists...
  4. Man

    DARK BRANDON METHOD

    “It’s not illegal when the president does it.” In the world of financial skullduggery, shell corporations are the unsung heroes. Imagine you're a high-ranking official, say, the head of state of a major global power, and you want to engage in some creative accounting. Here's a look at how you...
  5. Man

    Fraud Bible 2024: Non Cornabll Edition

    Thank you very much. The link still works.
  6. Man

    Anonymous Phone Numbers for Telegram With Toncoin

    Telegram, a widely used messaging platform, has introduced a novel concept - the auctioning of anonymous numbers on its TON blockchain. Following the success of unique username auctions, Telegram now allows users to bid on distinct virtual numbers. These numbers can revolutionize the way...
  7. Man

    BEC / DATING SCAMS

    BEC stands for Business Email Compromise With my previous posts showing a single explanation of BEC many chose to try only that. - I thought I’d elaborate. With BEC the aim is to gain access to the victim’s emails. The victim should ideally be a business. You can do this by social engineering...
  8. Man

    Managaing Yourself on Telegram and in the World of Fraud

    Rule 1: Do not get caught. • Never reveal your true identity to anyone on Telegram, no matter who they are. Too many left themselves naked for later. • Never use your real telegram phone number. • Use VPN to keep your identity anonymous. • Do not do the stupid things that will catch you. “I see...
  9. Man

    Business Check PSD

    https://mega.nz/file/t68CHSaY#fOGIc7DRNJ0y4gMIbhJ7jc4SSa26tqA2H9FKP-ZN1aw
  10. Man

    INCORPORATING DEDICATED SERVERS INTO YOUR SELF HOSTED VPN

    If you are running a VPN service for your business or personal use, you may want to consider incorporating dedicated servers into your setup. A dedicated server is a physical server that is solely dedicated to your use, providing greater control and flexibility over your VPN service. Each step...
  11. Man

    Reverse Engineering a Check/Cheque in GIMP V 2.0

    https://anonfiles.com/17sfAf41z7/reverse_engineer_check_mp4 <--- if ur not in the US
  12. Man

    GEOLOCATION SPOOFING AND ISPs | STOP UP DROPS AND LOGS

    This guide refers to my previous post, Through the Eyes of the Merchant. Understanding its contents will help you in everything going forward, not just carding.
  13. Man

    Through the Eyes of the Merchant

    This is made to clear up a lot of common misconceptions, rumors and misinformation that gets passed around as fact. Your setup probably sucks and this will explain exactly what youre doing wrong.
  14. Man

    Zelle to Crypto

    If you have a log with zelle enabled, or a personal drop you’re looking to cash out on, here’s a way to get crypto without having to jump through the hurdles of getting your card or someone else’s card, to allow large purchases on crypto. You also need not link for ach transactions, saving time...
  15. Man

    Decentralized Fraud (method) free btc method

    Some Bitcoin wallets allow you to cancel a transaction that gets stuck on pending or 0 confirmations for excessive amounts of time. This happens when the fee you choose to pay is lower than the average fee being paid. The fee is the incentive to confirm the transaction on the blockchain, so a...
  16. Man

    Cookie Stealer

    How to build a basic Cookie Stealer. A cookie stealer is used to steal the SESSION data or cookie information such as login details of any unsuspecting victim. Once the link is visited, the cookie data of the user is taken and stored externally. They are then redirected to another page without...
  17. Man

    Cross Site Scripting (XSS)

    Cross Site Scripting (XSS) Simply put, cross site scripting (XSS) involves the injection of malicious code into a website. It is one of the most common methods of attack, as most large sites will contain at least one XSS vulnerability. However, there is more than one type of XSS. The most...
  18. Man

    HOW TO BUY NON-KYC MONERO

  19. Man

    Encryption Methods

    Locate the Encrypted Data Your first task is to find the encrypted data. It might be cleverly concealed within a webpage, masquerading as something else, or it could be plainly visible but with the key or reference alphabet hidden. Understand the Nature of the Crypt Knowing what the crypt is...
  20. Man

    Phishing Pages

    REAL VILLAIN TIME Phishing involves tricking someone into clicking on a link that leads to a counterfeit login page, which you have created. The aim is to deceive them into submitting their login credentials. Below is a fundamental outline of how this process is typically executed. 1. Decide...
Top