how do i start getting into cc reselling

Please note, if you want to make a deal with this user, that it is blocked.
Hello bro, from your post I can see you are new to the carding and fraud game and interested in making fast and easy money since your first choice is buying cc. Why not get into hacked crypto logs since they are easy to cashout? It is easy money since I use live logs with active session cookies which helps bypass 2fa easily during cashout. I transfer the balance to my drop and use cake wallet to exchange the coins to xmr for OPSEC reasons since anonymity is key. You just need to follow the right steps and master the tricks in the game to avoid burning the logs and you will easily make big money in less time. I make averagely $80k/week from sauce. All you need to get started is a pc,stable internet and onetime initial capital to cater for your first live log and cashout tools as you will be reinvesting back only a small percentage from your profits DM on telegram and I will easily guide you from there since communication is much faster. Proofs available and I also accept escrow deals to build trust.
 
Methods for mining valid CC+CVV databases in 2026:
1. Install a stealer on the victim's devices, which will transmit all data. The file must be encrypted and downloaded (installed) to the devices. Then, sort the resulting logs.
2. Install a web skimmer on the CC payment page, which will collect all transmitted data.
3. Install a sniffer on the payment page before transmitting data to the merchant or the payment gateway itself.
4. Order a professional team of hackers to hack and obtain the database of the desired website/online store/service/crypto exchange/merchant. Subsequent decryption of the database is required.
5. Create a phishing website with a CC data entry page for collection. You can obtain an OTP and successfully cash out CC by linking payment processing through a working merchant when paying for services or goods on a phishing website. The amount of data obtained will depend on the quantity and quality of targeted traffic from potential cardholder victims to the website.
6. Use specialized dorks to find vulnerable, poorly hidden, or exposed CC databases through search engines.
7. Purchase CC databases from trusted vendors on hacking forums (exploit.in, xss.ac) at wholesale prices for subsequent use or resale.
 
Top