Leaderboard


Popular Content

Showing content with the highest reputation on 01/26/2025 in all areas

  1. 2 points

    Time Left: 3 months and 6 days

    • FOR SALE
    • NEW

    BMO SCAMPAGE .ZIP FILES UPLOAD AND UNZIP EDIT NECESSARY FILES WITH SOFTWARE OR ON SERVER UNDETECTABLE TO MANY SERVER INSTAT DELIVERY PLEASE CONTACT ME IF MORE HELP IS REQUIRED FOR ANY PRODUCT. DO NOT DISPUTE AN ORDER THE ADMIN IS VERY BUSY AND THEY WILL TAKE FOREVER TO SOLVE YOUR EMOTION ISSUES

    $200.00

  2. 2 points

    Time Left: 3 months and 5 days

    • FOR SALE
    • NEW

    ⚠️ WARNING! ALL ITEMS ARE STRICTLY FOR EDUCATIONAL PURPOSES ONLY 😉 AT YOUR OWN RISK! INSTANT DELIVERY! ⚠️ 💎 CARDINGS 💎 FRAUDS 💎 EXPLOITS 💎 LEAKS 💎 MALWARES 💎 MEGA AND GIGA PACKS 💎 AND OTHER GOODS! 💎 CHECK MY OTHER LISTINGS! GIVE POSITIVE FEEDBACK TO GET YOUR GIFT! WRITE DM IF FIND ANY ISSUE! Can mine all the following algorithms and thus all the cryptocurrencies that use them, so not only for XMR: cn/upx2, argon2/chukwav2, cn/ccx, kawpow, rx/keva, astrobwt, cn-pico/tlo, rx/sfx, rx/arq, rx/0, argon2/chukwa, argon2/wrkz, rx/wow, cn/fast, cn/rwz, cn/zls, cn/double, cn/r, cn-pico, cn/half, cn/2, cn/xao, cn/rto, cn-heavy/tube, cn-heavy/xhv, cn-heavy/0, cn/1, cn-lite/1, cn-lite/0 and cn/0. 2021 Software! Fast, secure, amazing! Make your own mining network and earn insane money, what you thought impossible! Main Features: - .NET - Coded in Visual Basic .NET, requires .NET Framework 4.5. - Codedom - No need for external libraries to compile - Injection (Silent) - Hide payload behind another process - CPU & GPU Mining - Can mine on Both CPU and GPU (Nvidia & AMD) - Idle Mining - Can be configured to mine with a different Max CPU when computer is idle - Stealth - Pauses the miner while Task Manager, Process Hacker or Process Explorer is open - Watchdog - Replaces the miner if removed and starts it if closed down - Remote Configuration - Can get the connection settings remotely from a URL at each startup - Bypass Windows Defender - Adds exclusions into Windows Defender for the general folders the miner uses - Online Downloader

    $599.00

  3. 2 points

    Time Left: 3 months and 5 days

    • FOR SALE
    • NEW

    Development Notes: Functioning with over 20 Different EMV Writers Used with 1 Encryption code for functionality. Updated frequently to combat Patches from Banks. When banks and other financial institutions introduced chip-based cards, or to be more specific EMV cards, they claimed they were safer. These cards encoded payment information on a microchip. The generation of a one-time use cryptogram further enhanced security of these cards. EMVs were regarded as an upgrade from magstripe cards. And while the world breathed a sigh of relief, believing that their financial transactions were secure, DeepTeam have been busy devising methods to break the barriers of EMV cards. Modern EMV card reader software developed by DeepTeam not only skim data from POS and ATM machines, software can also clone cards. These fake EMV cards are further used to complete cash withdrawals and buy products off the market. The EMV software is one of such EMV reader writer software solutions available on the market. Here’s more on the features of EMV reader-writer software’s and how they work. POS (Point of Sale Machines Compromised) EMV cloning software is designed to read, write, erase, encode and duplicate EMV. In order to complete any of these processes, it requires credit and debit card information that it can copy onto these cards. Thus, the first step is to collect payment card data, often done through using shady means. Scammers compromise point-of-sale systems or ATMs using shimmers. These are unlike the card slot or keypad look-alike fixtures fitted to a sales terminal or ATM. The ‘shimmers’ are paper-thin inserts that fit into the card slot on a point-of-sale terminal. They have an embedded microchip of their own, that steals and stores credit and debit card data every time a person uses their card to make a payment or withdraw cash. The purloined chip data is stored in the device. Again, the skimmers have been updated. While earlier the data skimmer would have to be physically retrieved, modern day skimmer dispenses with it. They are designed to be remotely controlled and transmit data directly via SMS. Dumps The data thus stolen is either used to clone cards or further packaged and sold as dumps to customers. These dumps are used to burn and write cloned cards. Data is stored in the form of tracks on a payment card. The patch helps gather crucial track data needed to complete a transaction such as cardholder name, account number and expiration date. Cloning Cards An EMV reader writer software allows one to clone and create their own cards that work at almost all point of sale systems. Once connected to the hardware, the EMV card reader software enables multiple functionalities. There are templates for different credit card structures. You can choose from a range of card formats – Visa, MasterCard, Maestro, American Express, Discover and Diners Club. One can also choose between a credit and debit card. The software runs the necessary tests after which the information is transferred to the new card by means of an EMV writer software. The transfer takes place via GPShell script. The new card created is as good as the original. A well-designed user interface makes credit card cloning a breeze. EMV reader writer software is a complete malware suite and makes cloning a hassle free task.

    $199.00

  4. 2 points

    Time Left: 3 months and 5 days

    • FOR SALE
    • NEW

    DAPHNE Latest software Because the latest Daphne version 2.0 is rarely supported due to the recent updates in the Security Industry, we come up with a new version of the most known and sophisticated EMV Chip Writer. This time, we gonna be selective with the persons we gonna sell the world’s most up-to-date EMV Chip Software. Anonymity is key here, there must be no leaks to the authorities so only the gentlemen that have the experience needed to operate such powerful software in a quiet manner and that can keep the discretion on theirs and our business will be able to receive Daphne What’s NEW with Daphne EMV Software ? • New improvements to the reclassify ARQC Algorithm. • New improvements to the Java Install on Smart Cards. • New writing methods for SDA & DDA and CDA Chips. • Added new compatibility of EMV Readers / Writers. • Optimized connection with GPShell DB. • The software is faster than ever and can handle multiple tasks. • New bypasser improvements for security level of ATMs & POS Terminals. • Added UpdateSys, that means the software receive automatically updates by our servers, a new version will be no longer neccesary in the future. • We also release new user’s manual with explicit content how to proper use Daphne EMV Software

    $199.00

  5. 2 points

    Time Left: 10 months and 4 days

    • FOR SALE
    • NEW

    Hello everybody! Welcome to my WOLOW MONEY TRANSFER service. Paypal is one of the destinations. The minimum transfer amount is 1000$ 1000$ - 400$ (my share) 2000$ -700$ (my share) 3000$ - 900$ (my share) 4000$ - 1000$ (my share) 5000$ -1200$ (my share) https://t.me/wolowmoneytransfer

    $400.00

  6. 1 point

    Time Left: 2 months and 19 days

    • FOR SALE
    • NEW

    HOW IT WORKS ‼️ Everyone asks me in PM how the software works, what it finds, etc. In this post, I will try to explain how it all works for you guys. 1️⃣ Each cryptocurrency wallet has a mnemonic phrase that consists of 12 words, which gives access to your wallet on any device and from any crypto wallet app, such as Trust Wallet, Exodus, etc. 2️⃣ Behind those 12 words is a code that forms your Private Key which like the 12 words gives you access to your wallet. So, you're getting these 12 words when you create a wallet in any crypto wallet app and it's created automatically by a special algorithm. 3️⃣ In fact, we generate these 12 words according to a specific algorithm and check the presence of сoins on the wallets we find. 4️⃣ Then we check the balance of the wallets and give the result, which could be dozens of bitcoins that someone forgot on the wallets. In the end, after the software found the wallets with a balance, we enter the Private Key to the wallet with any application, Trust Wallet or Exodus for example, and just withdraw all coins found by the software to your wallet. Then CASH IT OUT! 💵 Any questions https://t.me/stealerbitcoin

    $400.00

  7. 1 point

    Time Left: 3 months and 28 days

    • FOR SALE
    • NEW

    The business has been operating for more than 8 years and brings regular profits. Business is 100% online. You can work from anywhere where there is Internet. Employment 2-3 hours a day. There are many options for customer traffic, everyone will find their own, not to the detriment of my business. At the moment, several dozen franchises have been launched, working regularly for profit. The payback period of the business is 1 month. The first client will arrive 7-10 days after the launch. The average check is $800 Max check 12000$ Business is the management of a trading platform - an exchange, and the sale of goods and services on it, the subject of business is specific, I will not specify what kind of goods, otherwise the topic will become public. And now about the most interesting thing, We have learned how to competently pull money out of the client's accounts, while he does not even understand how this happened and it is not possible to convict the organizers of anything. I give you a fishing rod, bring you to a fishing place and teach you how to fish. But you have to catch it, according to my methodology, letting everything take its course means losing. I won't say more about the specifics of the business. Many people have a question about the police? When they hear about illegal business. The police are not interested in this topic at all. Your clients won't even think of going there. Franchise price: The global version has 6 billion customers worldwide. Unlimited traffic flow. with 3 months of work, the profit is $ 10000+ Price 2500$ Next, you can scale (create copies) of your business yourself without asking me anything. Who do I want to see among the franchise buyers: Adequate people with substantive questions. He is polite and friendly with such people. People asking for alms are immediately blacklisted. Required Skills: - Confident use of the computer and the Internet. - The experience of communicating with people (all communication takes place online) And once again for everyone! You are buying a path to a stable online income, not the income itself. You should follow the instructions clearly, and not think that everything will come by itself. I will teach you how to run this business properly, with maximum income. It takes 2-3 days to deploy the project and transfer it to your hands. Then you study my instructions, ask questions and start working. I am always in touch, I will help with advice and business. There is also an option of joint cooperation of our businesses in the future, but only after the purchase.

    $2,500.00

  8. 1 point

    Time Left: 3 months and 25 days

    • FOR SALE
    • NEW

    I will order gold bullions, coins, jewelry products from the website www.perthmint.com to your address Gold bullion prices 20g - 305$ 50g - 650$ 100g -1150$ Prices include shipping. Prices for coins and jewelry presented on the site are discussed separately. At least 30% of the cost of the site. Also see my other proposal for teaching the carding method of the site perthmint.com

    $305.00

  9. 1 point

    Time Left: 3 months and 7 days

    • FOR SALE
    • NEW

    the product contains: CASHOUT METHODS100% WORKING HOW TO CASHOUT PAYPAL VIDEO $ 200 IN 8 MIN CC BALANCE CHECKER CC TO BTC TUTORIALS: (AMAZON MASTER GUIDE + VIDEO) CASHOUT HOLLY GRAY CREDIT CARD FRAUD FOR BEGINNERS BANK DROP GUIDE v. 2.0 LOHIN TO PAYPAL WITH COOKIES SOCK5 VIDEO VIRTUAL CARDING HANDBOOK 2.0

    $399.00

  10. 1 point

    Time Left: 3 months and 6 days

    • FOR SALE
    • NEW

    BARCLAYS SCAMPAGE .ZIP FILES UPLOAD AND UNZIP EDIT NECESSARY FILES WITH SOFTWARE OR ON SERVER UNDETECTABLE TO MANY SERVER INSTAT DELIVERY PLEASE CONTACT ME IF MORE HELP IS REQUIRED FOR ANY PRODUCT. DO NOT DISPUTE AN ORDER THE ADMIN IS VERY BUSY AND THEY WILL TAKE FOREVER TO SOLVE YOUR EMOTION ISSUES

    $200.00

  11. 1 point

    Time Left: 3 months and 6 days

    • FOR SALE
    • NEW

    UBER SCAMPAGE .ZIP FILES UPLOAD AND UNZIP EDIT NECESSARY FILES WITH SOFTWARE OR ON SERVER UNDETECTABLE TO MANY SERVER INSTAT DELIVERY PLEASE CONTACT ME IF MORE HELP IS REQUIRED FOR ANY PRODUCT. DO NOT DISPUTE AN ORDER THE ADMIN IS VERY BUSY AND THEY WILL TAKE FOREVER TO SOLVE YOUR EMOTION ISSUES.

    $200.00

  12. 1 point

    Time Left: 3 months and 5 days

    • FOR SALE
    • NEW

    DeusEx ATM Jackpot How does it work? The DeusEx works on the Diebold Nixdorf and NCR ATMs world wide with big wall ATMs and the small ones. You will need to access the ATMs usb ports but they are easy to access, inserts a knife into the faceplate at the top of the ATM, it will flicks out, and exposes the ATMs USB port or drill a hole. There will be manuals included, instructions how it works in detail . Insert the USB stick and press CTRL+ENTER (more in manuals) and a normal Windows Explorer will popup from there browse to the USB stick and open the DeusEx or open cmd and enter the command (E):DeusExATM.exe You will need the following: – Knife or flat screwdriver for small ATMs – Drill with a hole saw/cutter for wall ATMs/(small ATMs) – USB hub (4x ports recommended) – Flashlight – Keyboard with inbuild touchpad or with a separate mouse (wired recommended) – USB Stick with LED (4GB recommended) – The DeusEx malware .exe (SDK just in case) DeusEx ATM Malware [latest] + Full source code – Manuals/Instructions included What is in the manuals? The tools you need, Extra Instructions, Tricks and AV bypass (just in case) How long does the ATM attack take? Depending on small or wall ATM but usually around a Minimum of 3 minutes max 10. Does it work world-wide with all ATM manufacturers? It works world-wide but it does only work with the Wincor Nixdorf and NCR ATMs. Does it bypass the AV? Yes it does, most of the ATMs doesn’t have AVs but there will be a manual include to bypass just in case.

    $1,000.00

  13. 1 point

    Time Left: 10 months and 4 days

    • FOR SALE
    • NEW

    Hello everybody! Welcome to my WOLOW MONEY TRANSFER service. Bank transfers is one of the destinations. The minimum transfer amount is 2000$ 2000$ - 800$ (my share) 3000$ -1100$ (my share) 4000$ - 1400$ (my share) 5000$ - 1600$ (my share) https://t.me/wolowmoneytransfer

    $800.00

  14. 1 point

    Time Left: 8 months and 2 days

    • FOR SALE
    • NEW

    I will make a custom skimmer for any ATM with a video camera or pinpad. I can also offer skimmers with GSM fart technology. From$800

    $800.00

  15. 1 point

    Time Left: 7 months and 28 days

    • FOR SALE
    • NEW

    To infect the device, it is enough for the user to click on the link or open the image. Up to $ 1000 per year with 1 connected device. The number of connected devices depends on you, there may be 10 or even 10,000. Antivirus programs do not react to infection in any way. Additional questions in telegram or PM

    $999.00

  16. 1 point

    Time Left: 7 months and 26 days

    • FOR SALE
    • NEW

    EMV SKIMMER IS A DEVICE THAT’S PLACED INSIDE THE ATM OR POS. EMV SKIMMER INTERCEPT COMMUNICATIONS BETWEEN THE CHIP CARD AND THE CHIP CARD READER FROM ATM OR POS. EMV SKIMMER WILL RECORD THE CREDIT CARD INFORMATION, IN THAT WAY THE CREDIT CARD INFORMATION WILL BE STOLEN. EMV SKIMMER IS A DEVICE THAT’S PLACED INSIDE THE ATM OR POS TO INTERCEPT COMMUNICATIONS BETWEEN THE CHIP CARD AND THE CHIP CARD READER FROM ATM OR POS AND RECORD THE CREDIT CARD INFORMATION, IN THAT WAY THE CREDIT CARD INFORMATION WILL BE STOLEN. Emv Skimmer is a device that’s placed inside the ATM or POS to intercept communications and record the credit card between the the chip card and the chip reader from ATM or POS, in that way all the credit card information are stolen. You will have fast and easy track 1, track 2 and the pin from all the credit card’s that use those ATM or POS. You can download the information from the Emv Skimmer by connecting your phone or laptop by bluetooth to the Emv Skimmer. EMV SKIMMER DEVICE like this can not only read the cardholder data from the chip, but it can also intercept the PIN. EMV SKIMMER DEVICE creates a copy of the original card, including all standard authentication SDA-Static Data Authentication, DDA- Dynamic Data Authentication, the CDA-Combined Data Authentication. With our EMV SKIMMER DEVICE you can get all credit card information very easy from any ATM or POS. With EMV SKIMMER DEVICE you can get track 1 + 2 + Pin.

    $1,600.00

  17. 1 point
    LEAVE A LIKE AND DON'T LEECH :smart: :pepegun: HOPE YOU LEARN FROM IT: [hide] https://mega.nz/#F!7jIyBShb!5uQgMY-3UjZNCMrISP6ufQ [/hide]
  18. 1 point
    HOPE YOU LEARN SOMETHING FROM IT IT TOOK TIME TO MAKE THIS , SOME SORT OF A FEEDBACK & A LIKE WILL BE NICE
  19. 1 point
    Aight, fellas. It was about time I drop a new high quality method for you to enjoy. Please show your appreciation by just clicking the Like Button, I've put time into putting this together; The least you can do is PRESS like. Especially you, Upgraded members who ghost leech. [hide] [align=center]Part 1 - Setup Go to TCPVPN.com Select the are closest region to you. In my example, Europe; Now, again, select the closest country to you. In my example, Germany. Now select a server by clicking on "Create Username and Password" on the bottom. In the fields enter Username and Password as you like ( Save them somewhere them as they're important). Photo Click "Create Premium Best VPN account". Now note the Account data somewhere. Go to tcpvpn.com/squid-proxy for a proxy Search for the IP you just got. If it isnt present just pick a Proxy in the same country. Remember the ports. Part 2 - Applying on your phone Download the app "HTTP Injector" from the Play Store.[/url] Open On the left there is a 3 - Line menu. Click it. Click on "SSH Settings" In these settings use the info you got in Part 1 - Step 7. SSH Host: The IP. In my case, 51.38.113.73. SSH Port: 22 Usename: Your username. In my case, de.tcpvpn.com. Password: Your password. In my case, hunter2. [*]Go back to the main page. [*]Click the menu again. [*]Go to "Payload Generator" [*]This is the part where you need to try what works for you. The basic configuration will follow, in case it doesnt work just google or contact me on Discord. [*]Basic configuration: URL/HOST: m.facebook.com Extra Header (Tick): Online Host, Forward Host, Keep Alive [*]Click "Generate Payload" [*]Now you should be on the main page again and the payload should be generated. [*]Below the payload there should be a line "Remote Proxy". Click it. Photo [*]Fill in the details from Part 1 - Step 9. In my example, Photo [*]Click Save [*]Click Start on the main page. [*]Go to log on the top to see if your connected or whats going on. [*] Full Credits to our friend from Nulled Muckie#8605 for he had wrote this method and I only edited it and published it and fixed the grammar and english flaws.[/hide]Please just hit the like button, I've spent good 30 minutes getting the images done right and picking the correct BBCodes [/align]
  20. 1 point
    [hide]https://anonfile.com/M970e6yanc/Wi-Fi_zip[/hide]
  21. 1 point
    [hide]Step 1 : Make Sure You Have Everything To prepare our evil twin access point attack, we'll need to be using Kali Linux or another supported distro. Quite a few distributions are supported, and you can check out the Airgeddon GitHub page for more about which Airgeddon will work with. You can use a Raspberry Pi running Kali Linux for this with a wireless network adapter, Finally, you'll need a good wireless network adapter for this. In our tests, I found that the TP-Link WN722N v1 and Panda Wireless PAU07 cards performed well with these attacks. You can find more information On Google [ Search for best EXT Wifi Adapter for Hacking]. Step 2 - Install Airgeddon To start using the Airgeddon wireless attack framework, we'll need to download Airgeddon and any needed programs. The developer also recommends downloading and installing a tool called CCZE to make the output easier to understand. You can do so by typing apt-get install ccze a terminal window. Next, we'll install Airgeddon, change directories, and start Airgeddon with the following commands. If you see the alien spaceship, you know you're ready to hack. Step 3 - Configure Airgeddon Press enter to check the various tools the Airgeddon framework relies on. If you're missing any, you can open a new terminal window and type apt-get install tool, substituting "tool" for the name of the missing tool. If that doesn't work, you can also try sudo pip install tool. When you have all of the tools, proceed to the next step by pressing return. Otherwise, you may experience problems during your attack, especially if you are missing dnsspoof. Next, the script will check for internet access so it can update itself if a newer version exists. When this is done, press enter to select the network adapter to use. After we select our wireless network adapter, we'll proceed to the main attack menu. Press 2 to put your wireless card into monitor mode. Next, select option 7 for the "Evil Twin attacks" menu, and you'll see the submenu for this attack module appear. Step 4 - Select Target Now that we're in our attack module, select option 9 for the "Evil Twin AP attack with a captive portal." We'll need to explore for targets, so press enter, and you'll see a window appear that shows a list of all detected networks. You'll need to wait for a little to populate a list of all the nearby networks. Step 5 -Gather the Handshake Now, we'll select the type of de-authentication attack we want to use to kick the user off their trusted network. I recommend the second option, "Deauth aireplay attack," but different attacks will work better depending on the network. Press enter once you've made your selection, and you'll be asked if you'd like to enable DoS pursuit mode, which allows you to follow the AP if it moves to another channel. You can select yes (Y) or no (N) depending on your preference, and then press enter. Finally, you'll select N for using an interface with internet access. We won't need to for this attack, and it will make our attack more portable to not need an internet source. Next, it will ask you if you want to spoof your MAC address during this attack. In this case, I chose N for "no." Now, if we don't already have a handshake for this network, we'll have to capture one now. Be VERY careful not to accidentally select Y for "Do you already have a captured Handshake file?" if you do not actually have a handshake. There is no clear way to go back in the script without restarting if you make this mistake. Since we don't yet have a handshake, type N for no, and press enter to begin capturing. Once the capture process has started, a window with red text sending deauth packets and a window with white text listening for handshakes will open. You'll need to wait until you see "WPA Handshake:" and then the BSSID address of your targeted network. In the example below, we're still waiting for a handshake. Once you see that you've got the handshake, you can exit out of the Capturing Handshakewindow. When the script asks you if you got the handshake, select Y, and save the handshake file. Next, select the location for you to write the stolen password to, and you're ready to go to the final step of configuring the phishing page. Step 6 - Set the Phishing Page In the last step before launching the attack, we'll set the language of the phishing page. The page provided by Airgeddon is pretty decent for testing out this style of attack. In this example, we'll select 1 for English. When you've made your selection, press enter, and the attack will begin with six windows opening to perform various functions of the attack simultaneously. Step 7 - Capture Network Credentials With the attack underway, the victim should be kicked off of their network and see our fake one as the only seemingly familiar option. Be patient, and pay attention to the network status in the top right window. This will tell you when a device joins the network, allowing you to see any password attempts they make when they're routed to the captive portal. When the victim joins your network, you'll see a flurry of activity like in the picture below. In the top-right corner, you'll be able to see any failed password attempts, which are checked against the handshake we gathered. This will continue until the victim inputs the correct password, and all of their internet requests (seen in the green text box) will fail until they do so. When the victim caves and finally enters the correct password, the windows will close except for the top-right window. The fake network will vanish, and the victim will be free to connect back to their trusted wireless network. The credentials should be displayed in the top-right screen, and you should copy and paste the password into a file to save, in case the script doesn't save the file correctly. This sometimes happens, so make sure not to forget this step or you might lose the password you just captured. After this, you can close the window, and close down the tool by pressing Ctrl + C. If we get a valid credential in this step, then our attack has worked, and we've got the Wi-Fi password by tricking the user into submitting it to our fake AP's phishing page![/hide] I appreciate a like! Leechers will get reported and banned!
  22. 1 point
    [hide] LIKE OR GET AUOTBANNED LIKE OR GET AUTOBANNED [/hide]
  23. 1 point
    HOPE YOU LEARN SOMETHING FROM IT IT TOOK TIME TO MAKE THIS , SOME SORT OF A FEEDBACK & A LIKE WILL BE NICE [hide] Download link: https://anonfile.com/52C1KbXdm6/1000_Hacking_Tutorials_rar[/hide] Virus Scan: HERE
  24. 1 point
  25. 1 point
    ..............................................
  26. 1 point
    I have a payout from may, waiting on one hopefully to come on Monday.
  27. 1 point
  28. 1 point
  29. 1 point
    Thank you so much for your share
  30. 1 point
    Are you still in need of one?
  31. 1 point
  32. 1 point
  33. 1 point
    thanks for sharing , great work
  34. 1 point
  35. 1 point
  36. 1 point
  37. 1 point
  38. 1 point
    tnx :fiesta: :pogchamp: :hype: :kek: :pepe:
  39. 1 point
  40. 1 point
  41. 1 point
    Hi all, I want to request a good NordVPN config for STORM. As I want to give back to the community but can't get hits that are worth sharing. I hope one of you can help me out :smart: :smart:
  42. 1 point
  43. 1 point
  44. 1 point
  45. 1 point
  46. 1 point
  47. 1 point
  48. 1 point
  49. 1 point
    wow awesome very good
  50. 1 point