Search results

  1. Mutt

    Дампы+пин - что это такое и в чем их важность

    Если вы любите часто посещать кардинг форумы, вы знаете, что легко найти объявления, предлагающие пакеты дампов с пинами из разных стран по разумным ценам, как если бы это был аукцион. В этом посте мы объясним, что многие интернет-сайты называют этими типами рекламы и какие сюрпризы они...
  2. Mutt

    FREE Methods Bible 2021 Plus 40+ Other Updated Sauces

    Some of what is included: ✅ SBA Method with tips for Guranteed Cashout - updated march 2021 ✅ Easy Bitcoin Stealer + Address Generator +31 pages tutorial!! ✅ Apple Carding Method 2021 ✅ Cashapp Method 1K Daily! 2020 ✅ 40+ Cashout Sauce ?✅ ✅ IPhone 11 Method 2021 ✅ SMS Spamming Video Guide ✅...
  3. Mutt

    About carding for beginners

    Drops Drop - the person to whose address you make a shipp. Personally, I advise you to resort to the services of a drop, in the event that the shop does not send to your country, now there are few shops that send, for example, to your country, in which case carders are looking for drops, for...
  4. Mutt

    Telegram stealer in C #

    This material is provided for educational purposes only and was created as part of the study of information security. The author did not publish material for malicious purposes. If someone uses the information for personal gain, then the author is not responsible for any harm or damage caused...
  5. Mutt

    Disassembling 2021

    In this article, we will talk about disassemblers, what they are and consider the principles of their work. What is a Disassembler? A disassembler is a translator that converts machine code, object file or library modules into program text in assembly language. Disassembling is the opposite of...
  6. Mutt

    Computer control through a bot

    This material is provided for educational purposes only and was created as part of the study of information security. The author did not publish material for malicious purposes. If someone uses the information for personal gain, then the author is not responsible for any harm or damage caused...
  7. Mutt

    DevilClipper

    This material is provided for educational purposes only and was created as part of the study of information security. The author did not publish material for malicious purposes. If someone uses the information for personal gain, then the author is not responsible for any harm or damage caused...
  8. Mutt

    Hacking Windows 10

    This material is provided for educational purposes only and was created as part of the study of information security. The author did not publish material for malicious purposes. If someone uses the information for personal gain, then the author is not responsible for any harm or damage caused...
  9. Mutt

    Dropping sites using xerxes

    This article will focus on how to drop unpretentious sites on your shoulder blades. Of course, you will not overturn VK, but you can put the site of a school or sharaga safely. And as always, I remind you that this material is provided only for educational purposes and was created as part of...
  10. Mutt

    Installing wireshark in termux

    This material is provided for educational purposes only and was created as part of the study of information security. The author did not publish material for malicious purposes. If someone uses the information for personal gain, then the author is not responsible for any harm or damage caused...
  11. Mutt

    Capture and modify TCP / IP traffic on the fly with Trudy

    There are several excellent tools for capturing network traffic. So, Scapy and Wireshark are excellent solutions for organizing passive sniffing, and Scapy, moreover, is capable of sending additional packets. In case you need to intercept traffic in the Man-in-the-Middle position, you can use...
  12. Mutt

    Firefox setup 2021

    In this article, we will continue the topic of the previous article, who have not read it, I advise you to read it. Why Firefox? Anyway, this is the most flexible and user-friendly browser I've tried. In addition, the browser itself is ideal in terms of anonymity. I confess that I didn't get...
  13. Mutt

    The basics of Whonix - based security

    The methods written in this article will help you achieve some peace of mind for your skin. In other words, what you need for a restful sleep at night. The implementation of this miracle will happen with the help of: Virtualbox + Whonix gateway + Windows + vpn. You will need: Iron of medium...
  14. Mutt

    TOR VPN router based on Raspberry

    With this device you can connect any pc / smartphones, wrap traffic first in VPN, then in Tor, obfuscate it using obfs-proxy and send it to a remote VPN server. What we need? 1) Any single board computer. In my case, this is a Raspberry Pi model B +. 2) Raspbian OS. 3) Micro SD. 4) Card reader...
  15. Mutt

    [Udemy] Kali Linux for beginners. All parts with translation.

    Description Do you want to learn how to hack systems using Kali Linux, but don't know where to start? Are you intimidated by the command line and you don't know what to do with it? If so, then this course is perfect for you. In this tutorial, you will start from scratch, assuming you don’t know...
  16. Mutt

    Linux with Windows 10 interface

    Today I would like to talk about the Linuxfx 10 distribution, which looks like Windows 10. This distribution is developed in Brazil, and is based on Ubuntu 20.04. So those who plan to switch to Linux from Windows and do not want to get used to the new interface may like Linuxfx 10. The creators...
  17. Mutt

    Hiding the smartphone from the all-seeing eyes of corporations

    The content of the article Start Getting ready The first way. We use the drain The second way. Install CyanogenMod We put an alternative market We put microG Bringing up your personal Dropbox Synchronizing contacts and calendar Restricting applications in permissions Tor, untracked browser and...
  18. Mutt

    We kill WiFi neighbor in 5 minutes

    This material is provided for educational purposes only and was created as part of the study of information security. The author did not publish material for malicious purposes. If someone uses the information for personal gain, then the author is not responsible for any harm or damage caused...
  19. Mutt

    Clean up VirtualBox logs

    VirtualBox (Oracle VM VirtualBox) is a virtualization software product for Microsoft Windows, Linux, FreeBSD, macOS, Solaris / OpenSolaris, ReactOS, DOS and others The virtualization system of operating systems VirtualBox retains a strong leadership among ordinary users due to its...
  20. Mutt

    Running programs in an isolated shell

    Let's say you downloaded a pirated program, blindly trusting the "purity" of which is very naive. To check how the program behaves in the system, let's use Sandboxie. Sandboxie is probably the most popular sandbox that allows you to isolate programs running in Windows 10, 8.1 and Windows 7 so...
Top