Ad End 1 August 2025
Ad Ends 13 July 2025
ad End 25 October 2025
Ad Ends 20 April 2025
Ad expire at 5 August 2024
banner Expire 9 June 2025
banner Expire 25 October 2025
banner Expire 10 May 2025
What's new
Wizard's shop 2.0
Money Club cc shop
banner Expire 15 January 2025
banner Expire 20 October 2024
UniCvv
Yale Lodge
Kfc CLub
adv exp at 30 July 2025
Carding.pw carding forum
BidenCash Shop

Search results

  1. Dark_Code_x

    Setting up a Metasploit Multi Handler

    In this hacking tutorial we are going to upgrade a Netcat shell to a Meterpreter shell in 3 simple steps. First we will use the multi handler module in Metasploit to intercept the reverse shell using a Linux x86 payload. Then we will issue the reverse shell on a Linux host with a Bash reverse...
  2. Dark_Code_x

    How to insert a virus in Microsoft Office using PowerShell

    Mailing this shit infects thousands of computers for personal use, be it for mining or something better (creating a botnet network for example)! We will work through one harmless thing, which is not always detected with the help of antiviruses! Theory You can insert malicious code using DDE -...
  3. Dark_Code_x

    How to Hack Web Browsers 2

    In this tutorial we will be using BeEF inside of our home network using localhost if you intend for users outside the network to connect back to BeEF you will need to open ports within your routers configuration. www.portforwarding.com Hooking a Browser The BeEF hook is a JavaScript file it...
  4. Dark_Code_x

    How to Hack Web Browsers

    What is BeEF? BeEF is short for The Browser Exploitation Framework. It is a penetration testing tool that focuses on the web browser. Amid growing concerns about web-borne attacks against clients, including mobile clients, BeEF allows the professional penetration tester to assess the actual...
  5. Dark_Code_x

    Recognize the name of the hidden Wi Fi network

    The owners of some wireless access points configure them so that they do not broadcast their name (ESSID). This is considered, in their opinion, additional protection (along with the password) TD. Simply put, a hidden Wi-Fi network (hidden) is a network that is not visible in the list of...
  6. Dark_Code_x

    BlobRunner - Quickly Debug Shellcode Extracted During Malware Analysis

    BlobRunner is a simple tool to quickly debug shellcode extracted during malware analysis. BlobRunner allocates memory for the target file and jumps to the base (or offset) of the allocated memory. This allows an analyst to quickly debug into extracted artifacts with minimal overhead and effort...
  7. Dark_Code_x

    AUTORDPWN V4.5 - THE SHADOW ATTACK FRAMEWORK

    AutoRDPwn is a script created in Powershell and designed to automate the Shadow attack on Microsoft Windows computers. This vulnerability allows a remote attacker to view his victim's desktop without his consent, and even control it on request. For its correct operation, it is necessary to...
  8. Dark_Code_x

    Hacking POS codes Lis

    00 Approved authorization/transaction 01 Call 02 Refer card to issuer 03 Invalid division code 04 Pickup 05 Do not honor 06 Other error 08 Approved, honor with ID 10 Default call 11 Approved VIP approval 12 Invalid Transaction Type 13 Bad amount 14 Invalid credit card number 15 Default call Low...
  9. Dark_Code_x

    HOW TO GET TRAFFIC FROM PINTEREST

    Table of Contents Introduction To Pinterest Traffic Secrets … Quick & Easy Setup … Creating an Optimized Profile… The About Section … Adding Value to your Profile … Social Connect … Pinning Content … Uploading an Image or Pinning from a URL … Pinning with a Browser Add-On … Re-Pinning Content...
  10. Dark_Code_x

    ATM Hack - Get Much More Money Than You Withdraw

    Hacking an ATM machine is something that has been there for a very long time, currently many of the developed countries do have an idea of how it is done so have taken security measure to prevent that from happening changing the default configurations and customizing the device. From the PDF...
  11. Dark_Code_x

    Getting setup with Tails

    IMPORTANT NOTE: Tails is not a get out of jail free card, and it can't ensure against compromised equipment, compromised software, or user _error_. These steps may appear to be straightforward, yet for Tails to give legitimate assurance it's fundamental you follow the most up to date...
  12. Dark_Code_x

    virtual Carding XBOX / PSN / Steam wallet

    now step 1 : look for potential buyer ask them what payment method they can do ? if they say paypal btc or any . tell them hmm i don't have those payment method ,can you buy me something online for 5$ ? if they agree. tell then you need him to buy you something in offgamers so ask them from what...
  13. Dark_Code_x

    INSTASLAYER V0.1 (GAIN INSTAGRAM FOLLOWERS & MORE FEATURES)

    **************Tool Features****************** ▶ Get Top liked posts by hashtag ▶ Send auto likes & comments ▶ Get people to follow from a specific post ▶ Filter people by 50% that will follow you back ▶ See who unfollowed you ▶ See pending follow request ▶ unfollow multiple people at once ▶ set...
  14. Dark_Code_x

    Hacking Exposed Wireless, Second Edition Released-Hacking Ebooks

    Build and configure your Wi-Fi attack arsenal with the best hardware and software tools Explore common weaknesses in WPA2 networks through the eyes of an attacker Leverage post-compromise remote client attacks on Windows 7 and Mac OS X Master attack tools to exploit wireless systems, including...
  15. Dark_Code_x

    Introduction to Telnet Hacking tutorials

    What is Telnet? Telnet is a network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communications facility using a virtual terminal connection. Using telnet , we can connect to remote System(to test the host). It can be used for...
  16. Dark_Code_x

    What is Virtual and Physical Ports?-Hackers tutorials

    There two different ports are there. First one is Physical Ports that are used to connect two different hardwares. It will available behind your CPU. The different types of physical ports : Ethernet ports USB ports Serial/Parallel ports Using the physical ports only, we connect the...
  17. Dark_Code_x

    How to Use Proxy IP address ?-Change the Ip address

    Hi friends, i give a list of proxy servers about 100. But i forget to tell how it will be useful ,how to use it. In this post, i will explain how to use the proxy server. What is the Use of The Proxy? Hide your IP. Browse the Internet anonymously. Get the List of Proxy from here...
  18. Dark_Code_x

    How to Hack the My space account

    If you like to hack some one’s my space account ,then you came to right place. There are two easy methods for you. Keylogger Phishing Keylogger: Keylogger is spyware . Keylogger will monitor the every keystroke of your victim and send the keystrokes to you. So whenever your victim login in my...
  19. Dark_Code_x

    How to Create your own FTP Server in your system using Serv-U 10.0 FTP Server

    In this post i will guide you to how to create a FTP server in your home. Though there is lot of steps to folow, but it is very simple to do that. So i just follow my steps . What you need? Serv-U 10.0 or other versions No-IP.com Website Step 1: How to get the static address in NO-IP.COM...
  20. Dark_Code_x

    Create a Memory Space Eater Trojan Horse with simple c program

    Most of us (as a hacker) like to create a Trojan Horse . Today in this post i am going to explain you how to create a virus which eats the Memory space in your victim Hard Disk Drive. Characteristics of this Trojan: This trojan eats 1GB of memory for every 1 minutes. As a result the the disk...
Ad End 1 February 2024
Top