Leaderboard


Popular Content

Showing content with the highest reputation on 01/26/2025 in Posts

  1. 1 point
    LEAVE A LIKE AND DON'T LEECH :smart: :pepegun: HOPE YOU LEARN FROM IT: [hide] https://mega.nz/#F!7jIyBShb!5uQgMY-3UjZNCMrISP6ufQ [/hide]
  2. 1 point
    HOPE YOU LEARN SOMETHING FROM IT IT TOOK TIME TO MAKE THIS , SOME SORT OF A FEEDBACK & A LIKE WILL BE NICE
  3. 1 point
    Aight, fellas. It was about time I drop a new high quality method for you to enjoy. Please show your appreciation by just clicking the Like Button, I've put time into putting this together; The least you can do is PRESS like. Especially you, Upgraded members who ghost leech. [hide] [align=center]Part 1 - Setup Go to TCPVPN.com Select the are closest region to you. In my example, Europe; Now, again, select the closest country to you. In my example, Germany. Now select a server by clicking on "Create Username and Password" on the bottom. In the fields enter Username and Password as you like ( Save them somewhere them as they're important). Photo Click "Create Premium Best VPN account". Now note the Account data somewhere. Go to tcpvpn.com/squid-proxy for a proxy Search for the IP you just got. If it isnt present just pick a Proxy in the same country. Remember the ports. Part 2 - Applying on your phone Download the app "HTTP Injector" from the Play Store.[/url] Open On the left there is a 3 - Line menu. Click it. Click on "SSH Settings" In these settings use the info you got in Part 1 - Step 7. SSH Host: The IP. In my case, 51.38.113.73. SSH Port: 22 Usename: Your username. In my case, de.tcpvpn.com. Password: Your password. In my case, hunter2. [*]Go back to the main page. [*]Click the menu again. [*]Go to "Payload Generator" [*]This is the part where you need to try what works for you. The basic configuration will follow, in case it doesnt work just google or contact me on Discord. [*]Basic configuration: URL/HOST: m.facebook.com Extra Header (Tick): Online Host, Forward Host, Keep Alive [*]Click "Generate Payload" [*]Now you should be on the main page again and the payload should be generated. [*]Below the payload there should be a line "Remote Proxy". Click it. Photo [*]Fill in the details from Part 1 - Step 9. In my example, Photo [*]Click Save [*]Click Start on the main page. [*]Go to log on the top to see if your connected or whats going on. [*] Full Credits to our friend from Nulled Muckie#8605 for he had wrote this method and I only edited it and published it and fixed the grammar and english flaws.[/hide]Please just hit the like button, I've spent good 30 minutes getting the images done right and picking the correct BBCodes [/align]
  4. 1 point
    [hide]https://anonfile.com/M970e6yanc/Wi-Fi_zip[/hide]
  5. 1 point
    [hide]Step 1 : Make Sure You Have Everything To prepare our evil twin access point attack, we'll need to be using Kali Linux or another supported distro. Quite a few distributions are supported, and you can check out the Airgeddon GitHub page for more about which Airgeddon will work with. You can use a Raspberry Pi running Kali Linux for this with a wireless network adapter, Finally, you'll need a good wireless network adapter for this. In our tests, I found that the TP-Link WN722N v1 and Panda Wireless PAU07 cards performed well with these attacks. You can find more information On Google [ Search for best EXT Wifi Adapter for Hacking]. Step 2 - Install Airgeddon To start using the Airgeddon wireless attack framework, we'll need to download Airgeddon and any needed programs. The developer also recommends downloading and installing a tool called CCZE to make the output easier to understand. You can do so by typing apt-get install ccze a terminal window. Next, we'll install Airgeddon, change directories, and start Airgeddon with the following commands. If you see the alien spaceship, you know you're ready to hack. Step 3 - Configure Airgeddon Press enter to check the various tools the Airgeddon framework relies on. If you're missing any, you can open a new terminal window and type apt-get install tool, substituting "tool" for the name of the missing tool. If that doesn't work, you can also try sudo pip install tool. When you have all of the tools, proceed to the next step by pressing return. Otherwise, you may experience problems during your attack, especially if you are missing dnsspoof. Next, the script will check for internet access so it can update itself if a newer version exists. When this is done, press enter to select the network adapter to use. After we select our wireless network adapter, we'll proceed to the main attack menu. Press 2 to put your wireless card into monitor mode. Next, select option 7 for the "Evil Twin attacks" menu, and you'll see the submenu for this attack module appear. Step 4 - Select Target Now that we're in our attack module, select option 9 for the "Evil Twin AP attack with a captive portal." We'll need to explore for targets, so press enter, and you'll see a window appear that shows a list of all detected networks. You'll need to wait for a little to populate a list of all the nearby networks. Step 5 -Gather the Handshake Now, we'll select the type of de-authentication attack we want to use to kick the user off their trusted network. I recommend the second option, "Deauth aireplay attack," but different attacks will work better depending on the network. Press enter once you've made your selection, and you'll be asked if you'd like to enable DoS pursuit mode, which allows you to follow the AP if it moves to another channel. You can select yes (Y) or no (N) depending on your preference, and then press enter. Finally, you'll select N for using an interface with internet access. We won't need to for this attack, and it will make our attack more portable to not need an internet source. Next, it will ask you if you want to spoof your MAC address during this attack. In this case, I chose N for "no." Now, if we don't already have a handshake for this network, we'll have to capture one now. Be VERY careful not to accidentally select Y for "Do you already have a captured Handshake file?" if you do not actually have a handshake. There is no clear way to go back in the script without restarting if you make this mistake. Since we don't yet have a handshake, type N for no, and press enter to begin capturing. Once the capture process has started, a window with red text sending deauth packets and a window with white text listening for handshakes will open. You'll need to wait until you see "WPA Handshake:" and then the BSSID address of your targeted network. In the example below, we're still waiting for a handshake. Once you see that you've got the handshake, you can exit out of the Capturing Handshakewindow. When the script asks you if you got the handshake, select Y, and save the handshake file. Next, select the location for you to write the stolen password to, and you're ready to go to the final step of configuring the phishing page. Step 6 - Set the Phishing Page In the last step before launching the attack, we'll set the language of the phishing page. The page provided by Airgeddon is pretty decent for testing out this style of attack. In this example, we'll select 1 for English. When you've made your selection, press enter, and the attack will begin with six windows opening to perform various functions of the attack simultaneously. Step 7 - Capture Network Credentials With the attack underway, the victim should be kicked off of their network and see our fake one as the only seemingly familiar option. Be patient, and pay attention to the network status in the top right window. This will tell you when a device joins the network, allowing you to see any password attempts they make when they're routed to the captive portal. When the victim joins your network, you'll see a flurry of activity like in the picture below. In the top-right corner, you'll be able to see any failed password attempts, which are checked against the handshake we gathered. This will continue until the victim inputs the correct password, and all of their internet requests (seen in the green text box) will fail until they do so. When the victim caves and finally enters the correct password, the windows will close except for the top-right window. The fake network will vanish, and the victim will be free to connect back to their trusted wireless network. The credentials should be displayed in the top-right screen, and you should copy and paste the password into a file to save, in case the script doesn't save the file correctly. This sometimes happens, so make sure not to forget this step or you might lose the password you just captured. After this, you can close the window, and close down the tool by pressing Ctrl + C. If we get a valid credential in this step, then our attack has worked, and we've got the Wi-Fi password by tricking the user into submitting it to our fake AP's phishing page![/hide] I appreciate a like! Leechers will get reported and banned!
  6. 1 point
    [hide] LIKE OR GET AUOTBANNED LIKE OR GET AUTOBANNED [/hide]
  7. 1 point
    HOPE YOU LEARN SOMETHING FROM IT IT TOOK TIME TO MAKE THIS , SOME SORT OF A FEEDBACK & A LIKE WILL BE NICE [hide] Download link: https://anonfile.com/52C1KbXdm6/1000_Hacking_Tutorials_rar[/hide] Virus Scan: HERE
  8. 1 point
  9. 1 point
    ..............................................
  10. 1 point
    I have a payout from may, waiting on one hopefully to come on Monday.
  11. 1 point
  12. 1 point
  13. 1 point
    Thank you so much for your share
  14. 1 point
    Are you still in need of one?
  15. 1 point
  16. 1 point
  17. 1 point
    thanks for sharing , great work
  18. 1 point
    thanks for sharinbroooooo
  19. 1 point
  20. 1 point
  21. 1 point
  22. 1 point
  23. 1 point
    tnx :fiesta: :pogchamp: :hype: :kek: :pepe:
  24. 1 point
  25. 1 point
  26. 1 point
    Hi all, I want to request a good NordVPN config for STORM. As I want to give back to the community but can't get hits that are worth sharing. I hope one of you can help me out :smart: :smart:
  27. 1 point
  28. 1 point
  29. 1 point
  30. 1 point
  31. 1 point
  32. 1 point
  33. 1 point
  34. 1 point
    wow awesome very good
  35. 1 point