ilisovoy 0 Welcome to the third part of articles on creating combolist. Let's start the method right away. For this method we need a private software for checking the combolist on the valid or used EMAIL ACCESS CHECKER | BY SPACEMAN & EDWARD and soon will be my assembly imap brut It will also be good to have a Dedicated Server later understand why. At the expense of proxies, if you have large volumes of combolist, then of course you'd better buy yourself proxy files, elites, etc. Rent can not take, but again depends on the number of rows in your combolist. Next we need to decide what we will work MYR, ZABUGOR The best is obtained with MYR You can take such bases from the hands, merge, etc. But the main thing is that the combolist was a valid. You can also buy these bases, the main thing is that the spam block was at a minimum. [hide] Let's start the most interesting: We take invalid mail, assign to the end of each password characters: 1, 2, q, a, z, 123. (or your symbols) The best standard characters, letters. That is, the base will be 6 times larger than the one that was. You can experiment with your symbols, for example qwe, qwer, s, w, 3, 4, 5 and so on. But the standard ones written above go best. Who does not know how to assign a symbol - it does not matter, download the software by reference [DOWNLOAD: MEGA (CLICK) | VT [CLICK] ] [align=center]A small guide: 1 - Insert your base 2 - Load the config, which I also attach: [DOWNLOAD: MEGA (CLICK) ] SPECIAL FOR C.TO [/align] [align=center] 3 - We change for ourselves and check that the checkboxes have been ticked[/align] [align=center] [/align] [align=center] PS: The main program guide can be viewed by this link (CLICK) The combolist was received, after reception it is desirable to randomize it. go to brute. If there are 1 valid account for 1k to 2k mail, then the combolsit is really a valid one and is suitable for us. If the 50k = 1 Valid, of course, do not take. brute, determined. !! If we buy the base, then we repeat the actions that were performed on the test base. We put brut at night. It is best to Dedicated Server. Since it will work round the clock[/align] 77 VALID FROM 15K LINES But I also remind you that there will not necessarily be a full combolist valid at the output, since there are many services where you do not need valid when checking / brute. !! example: FORTNITE [/hide] Thank you for reading this article. Most likely this is the final part, who knows? :pepo: :hype: go help me reach 50 likes? :hype: Quote Share this post Link to post Share on other sites
almightymarri 0 Welcome to the third part of articles on creating combolist. Let's start the method right away. For this method we need a private software for checking the combolist on the valid or used EMAIL ACCESS CHECKER | BY SPACEMAN & EDWARD and soon will be my assembly imap brut It will also be good to have a Dedicated Server later understand why. At the expense of proxies, if you have large volumes of combolist, then of course you'd better buy yourself proxy files, elites, etc. Rent can not take, but again depends on the number of rows in your combolist. Next we need to decide what we will work MYR, ZABUGOR The best is obtained with MYR You can take such bases from the hands, merge, etc. But the main thing is that the combolist was a valid. You can also buy these bases, the main thing is that the spam block was at a minimum. Thank you for reading this article. Most likely this is the final part, who knows? :pepo: :hype: go help me reach 50 likes? :hype: Quote Share this post Link to post Share on other sites
ilisovoy 0 LIKE TOPIC LEECHERS !!!!!!!!!! :@@@@@@@ Quote Share this post Link to post Share on other sites
EliteEmper0r 41 Thanks dude hope this will help me Quote Share this post Link to post Share on other sites