• image01

    Creative

  • image02

    Friendly

    Motivated

  • image03

    Tranquilent

    Tips

  • image04

    Tech

    Secured

  • image05

    Update

    News

Monday, 27 May 2019

How to create Track 1 from Track 2

As an example, take Track 2:

Example: 4888603170607238 = 15051011203191805191 PATACSIL / DAVID Bank
of America, N.A. (USA) CREDIT PLATINUM United States of America

4888603170607238 = 15051011203191805191 - This is Track 2 (we want to make Track 1 from Track 2)
Smith / John - the name of the cardholder (LASTNAME / FIRSTNAME)

Bank of America, N.A. - Name of the bank ak.a bank issuer

(USA) - Bank Country

CREDIT - Credit or Debit (in our case, Credit)

PLATINUM - card type, i.e. Classic, Gold, Platinum

United States of America is a country
When you see an equal sign (=) in a track, it always means that it is Track 2

When you see the letter "B" at the beginning of the track, it always means that it is Track 1

How to create track 1 of track 2:

We take the number of our map from our track 2, in our case it is:

4888603170607238

Add the letter "B" at the beginning of the card number like this:

B4888603170607238

Then add the name of the holder that you want to specify to display, that is: B4888603170607238 ^ Smith / John ^ (Last name first / First Name)

Next we add expiry date and service code (expired date in YYMM format in our case, 1505, in our case, the 3-digit service code is 101, so we add 1505101) we get:

B4888603170607238 ^ Smith / John ^ 1505101

Now add 10 zeros: D after the service code:

B4888603170607238 ^ Smith / John ^ 15051010000000000

Next, add the remaining numbers from our Track2 (after the service code):

B4888603170607238 ^ Smith / John ^ 150510100000000001203191805191

Then add 6 more zeros: D:

B4888603170607238 ^ Smith / John ^ 150510100000000001203191805191000000

Track 1 is ready!

But this is only for VISA and MASTERCARD (16-digit), AMEX has 15 digits, and it will not work with Amex.

Sunday, 26 May 2019

100% FREE PHONE NUMBER SPOOFER!

This is a very quick and easy way to spoof your phone number on your phone, tablet or computer!

This program detects contacts as well!
(Say your calling someones phone with a spoofed number & that person you're calling has the number you're spoofing in there contacts as the original persons number, it will pop up on there phone as the contact!)

100% FREE & SUPER EASY TO USE!

Messing around doing prank calls, or using it to SE, no matter what you do, please hit that like button for this HQ SH*T! IF THIS HELPED YOU IN ANY WAY, SHAPE, OR FORM, YOU KNOW WHAT TO DO!!

https://www.firertc.com

Make a account, doesn't have to be real information
Done

How To Finding hidden directories Using Termux


A directory is called a directory of folders and files. We want to find the directories of a site to get the information we want
Work with the CrawlBox tool (scan the directory)

First, enter the command in your terminal to install the tool

git clone https://github.com/abaykan/CrawlBox.git

Go to the downloaded folder
cd crawlbox

Install the tool prefix with the following command

pip install -r requirements.txt

To run the main file using Python, enter the following command

python crawlbox.py

To view the help, you can click the following command

python crawlbox.py

-h
To scan, enter the following command

python crawlbox.py site.com -w list.txt

How To Reset Trial Period of Any Software and Use Them Lifetime in PC

Follow the steps for running this Software in your Computer.

① Download "Runasdate" Software

② Install Runasdate Software in your Computer PC.

③ Now run any trial software on your computer and write down the date of installation on your PC.

④ When your trial version gets over. Just Right Click on your software and select Runasdate.

Now Runasdate software extend the trial period of your software by increasing trial period. With the help of this software, you can use any software on your PC for a lifetime, without spending money.

Saturday, 18 May 2019

HOW TO OPEN PORTS IN ANY NETWORK( OPEN PORTS SOLUTION 100%


25% of people or maybe more have a problem in port forwarding either in linux or vm machine or His primary machine
So  In this tutorial I will explain my experience in opening ports and I hope that it is useful for all of you guys

1- ᴀ ᴘᴏʀᴛ ᴡɪʟʟ ɴᴏᴛ ʙᴇ ғᴏʀᴡᴀʀᴅᴇᴅ ᴜɴᴛɪʟ ᴛʜᴇʀᴇ ɪs ᴀ ᴘʀᴏɢʀᴀᴍ ɪs ʟɪsᴛᴇɴɪɴɢ ᴏɴ ɪᴛ [ ᴇx : ᴍᴇᴛᴀsᴘʟᴏɪᴛ , ᴘᴏʀᴛ ʟɪsᴛᴇɴᴇʀ ]

ᴀ ᴘᴏʀᴛ ʟɪsᴛᴇɴᴇʀ ᴛᴏ ᴄʜᴇᴄᴋ ʏᴏᴜʀ ᴘᴏʀᴛs ---->  http://www.rjlsoftware.com/software/util...load.shtml
2- ᴅᴏɴ'ᴛ ᴜsᴇ ᴠᴍ ᴍᴀᴄʜɪɴᴇs ғᴏʀ ʜᴀᴄᴋɪɴɢ ᴀs ɪᴛ ʜᴀs ᴀʟᴏᴛ ᴏғ ᴘʀᴏʙʟᴇᴍs ᴀɴᴅ ᴏɴᴇ ᴏғ ᴛʜᴇᴍ ɪs ᴘᴏʀᴛ ғᴏʀᴡᴀʀᴅɪɴɢ ᴀs ɪᴛ ᴜsᴇs ᴀɴᴏᴛʜᴇʀ ɪᴘ ᴛʜᴀɴ ʏᴏᴜ ᴏɴ ʏᴏᴜʀ ᴘʀɪᴍᴀʀʏ ᴍᴀᴄʜɪɴᴇ
3- ʙᴇ ᴘᴀᴛɪᴇɴᴛ ᴀɴᴅ ᴅᴏɴ'ᴛ ɢᴇᴛ ᴅᴇᴘʀᴇssᴇᴅ ᴀs ɪᴛ ᴛᴀᴋᴇs sᴏᴍᴇᴛɪᴍᴇ ᴛᴏ ᴋɴᴏᴡ ʏᴏᴜʀ ᴍᴏᴅᴇᴍ ᴄᴏɴғɪɢᴜʀᴀᴛɪᴏɴ

=================
sᴏʟᴜᴛɪᴏɴ 1 :
Sᴇᴀʀᴄʜ ғᴏʀ ʏᴏᴜʀ ᴍᴏᴅᴇᴍ [ʀᴏᴜᴛᴇʀ] ᴛʏᴘᴇ ᴏɴ ᴛʜᴇ ʏᴏᴜᴛᴜʙᴇ ᴀɴᴅ sᴇᴇ ʜᴏᴡ ɪᴛ ɪs ᴏᴘᴇɴɪɴɢ ᴀ ᴘᴏʀᴛ ɪɴ ɪᴛ  ᴇx : ᴍᴏᴅᴇ ʜɢ231 ʜᴏᴡ ᴛᴏ ᴏᴘᴇɴ ᴘᴏʀᴛs
2-  ᴛᴏ ᴋɴᴏᴡ ʏᴏᴜʀ ʟᴏᴄᴀʟ ɪᴘ ᴀᴅᴅʀᴇss [ ᴜsᴇᴅ ғᴏʀ ᴏᴘᴇɴɪɴɢ ᴘᴏʀᴛs ]ɪɴ ᴡɪɴᴅᴏᴡs : ᴏᴘᴇɴ ᴄᴍᴅ ᴀɴᴅ ᴛʏᴘᴇ ɪᴘᴄᴏɴғɪɢ
ʟɪɴᴜx : ɪғᴄᴏɴғɪɢ ɪɴ ᴛᴇʀᴍɪɴᴀʟ
3-  ᴏᴘᴇɴ ᴘᴏʀᴛ ʟɪsᴛᴇɴᴇʀ ᴀɴᴅ ᴛʏᴘᴇ ᴛʜᴇ ʏᴏᴜʀ ᴘᴏʀᴛ ɴᴜᴍʙᴇʀ ᴀɴᴅ ᴄʟɪᴄᴋ ᴏɴ ʟɪsᴛᴇɴ
4- ɢᴏ ᴛᴏ CanYouseeme.com ɪᴛ ɪs ᴀ ᴡᴇʙsɪᴛᴇ ғᴏʀ sᴇᴇɪɴɢ ɪғ ᴛʜᴇ ᴘᴏʀᴛs ɪs ᴏᴘᴇɴ ᴏʀ ɴᴏᴛ
5- ʏᴏᴜ ᴡɪʟʟ sᴇᴇ ᴀ sᴜᴄᴄᴇss ᴍᴇssᴀɢᴇ ɪғ ɪᴛ ɪs ᴏᴘᴇɴᴇᴅ [ ᴄᴏɴɢʀᴀᴛᴜʟᴀᴛɪᴏɴ]
------------------
sᴏʟᴜᴛɪᴏɴ 2 :
 ʏᴏᴜ ᴄᴀɴ ᴅᴏᴡɴʟᴏᴀᴅ ᴀ ᴘʀᴏɢʀᴀᴍ ᴡʜɪᴄʜ ᴏᴘᴇɴs ᴘᴏʀᴛs ᴀᴜᴛᴏᴍᴀᴛɪᴄᴀʟʟʏ ʙʏ ɢɪᴠɪɴɢ ʏᴏᴜ ᴀɴᴏᴛʜᴇʀ ʟᴏᴄᴀʟ ɪᴘ [ ʟᴏᴄᴀʟ ʜᴏsᴛ]
ʟɪᴋᴇ ɴɢʀᴏᴋ ʙᴜᴛ ɪᴛ ɪsɴ'ᴛ ᴘᴇʀsɪsᴛᴇɴᴄᴇ ᴄᴀᴜsᴇ ᴏɴᴄᴇ ʏᴏᴜ ᴄʟᴏsᴇ ᴛʜᴇ ᴘʀᴏɢʀᴀᴍ ɪᴛ ᴡɪʟʟ ɢɪᴠᴇ ʏᴏᴜ ᴀɴᴏᴛʜᴇʀ ʟᴏᴄᴀʟ ɪᴘ ɪɴ ᴄᴀsᴇ ʏᴏᴜ ᴀʀᴇ ʜᴀᴄᴋɪɴɢ sᴏᴍᴇᴏɴᴇ
ʀᴇᴍᴏᴛᴇʟʏ sᴏ ɪ ᴘʀᴇғᴇʀᴇ ᴛʜᴇ ғɪʀsᴛ sᴏʟᴜᴛɪᴏɴ

Saturday, 11 May 2019

How To Bypass Gmail Mobile Verification Tutorial


Go K7 and Sign up.

Create an account with gmail, use United States as location (Use VPN).

After Creating The e-mail account,it will ask you to verify yourself

Select the Voice call and fill in your number( You got from k7.net)

You will recieve a mail that have verification code as voice mail(voice Format) in k9.net

Download the attachment  and listen to it and input the code aand click OK.



Saturday, 4 May 2019

Authorities Shut Down the World’s Largest Dark Web Marketplace and Arrested its Operators

German Federal police with the help of Europol
and FBI taken down the world’s second largest
illegal online dark web market Wall Street Market
and also arrested two of the leading suppliers.
The Wall Street market was the second largest dark
web market that has over 1 150 000 and 5 400
vendors. The dark web market is reachable via the
Tor network.
Most recently, more than 63 000 sales offers were
placed on the online marketplace and the payments
handled in the marketplace via cryptocurrencies
Bitcoin and Monero to maintain anonymity.
The administrators of the marketplace have received
commission payments of 2 to 6 percent of the
illegal sales value, Europol says in press release .
Three suspects were arrested by German authorities
and they have “seized over €550 000 in cash,
alongside cryptocurrencies Bitcoin and Monero in
6-digit amounts, several vehicles and other
evidence, such as computers and data storage.”
Another dark web market was shut down by
Silkkitie, also known as Valhalla Marketplace shut
down earlier this year, some of the vendors from
Silkkitie moved to Wall Street Market and German
authorities brought their illegal activities to an end.
The Silkkitie is one of the oldest site known for
trading illicit goods, it has been active from since
2013. Earlier this year Finnish authorities seized
entire web server and contents of the market place.
“These two investigations show the importance of
law enforcement cooperation at an international
level and demonstrate that illegal activity on the
dark web is not as anonymous as criminals may
think,” said Europol’s Executive Director,
Catherine De Bolle.
“Europol has established a dedicated Dark Web
Team to work together with EU partners and law
enforcement across the globe to reduce the size of
this underground illegal economy.”

How to run Brutal On Termux



Brutal is a toolkit to quickly create various payload, powershell attack, virus attack.and launch listener for a human interface devices. This is extremely useful for executing scripts on a target machine. For using this tool you must install sudo in your termux that means this will work only on rooted devices.

How to install just copy below command and paste in termux

pt update && apt upgrade
$ apt install git
$ git clone https://github.com/Screetsec/Brutal.git
$ cd Brutal
$ chmod +x *
How to use

Run:
sudo ./Brutal.sh
or
sudo su ./Brutal.sh

Xerosploit – Pentesting Toolkit To Perform MITM, Spoofing, DOS, Images Sniffing, WD Attacks

Xerosploit is a penetration testing toolbox whose objective is to perform the man in the middle attacks. It brings different modules that permit to acknowledge proficient assault and furthermore permits to do DOS attacks and port filtering.
We can use this tool to perform DOS, MITM attacks, also the tool hasdriftnet modules which capture images and also it will be used in performing Injection attacks. It was Committed by LionSec1, it is a powerful and simple to use the tool.
Tool Features
Port scanningNetwork mappingDos attackHtml code injectionJavascript code injectionDownload interception and replacementSniffingDNS spoofingBackground audio reproductionImages replacementDrifnetWebpage defacement and more.
Kali Linux Tutorial – Xerosploit
To clone Xerosploit
 git clonehttps://github.com/LionSec/xerosploitand
 to run installation 
sudo python install.py

Wednesday, 1 May 2019

How To Finding hidden directories Using Termux/kali


In this tutorial, I want to find the hidden directories of a site. Maybe tell me the directory.I'll explain to you

What is a directory?

A directory is called a directory of folders and files. We want to find the directories of a site to get the information we want
Work with the CrawlBox tool (scan the directory)

First, enter the command in your terminal to install the tool

git clone https://github.com/abaykan/CrawlBox.git

Go to the downloaded folder
cd crawlbox

Install the tool prefix with the following command

pip install -r requirements.txt

To run the main file using Python, enter the following command

python crawlbox.py

To view the help, you can click the following command

python crawlbox.py

-h
To scan, enter the following command

python crawlbox.py site.com -w list.txt

Blog Archive

Popular Posts

Powered by Blogger.

Contact Form

Name

Email *

Message *

Labels

Carding (16) Cracking (2) Education (40) Hacking (35) News (39) technology (23) Tips & Tricks (11) Tips N Tricks (85)

Recent Post

Pages

Comments

Popular Posts

Tags

Carding (16) Cracking (2) Education (40) Hacking (35) News (39) technology (23) Tips & Tricks (11) Tips N Tricks (85)