banner Expire 10 May 2025
adv exp at 20 January 2025
Rescator cvv and dump shop
Money Club cc shop
Patrick Stash
banner expire at 13 August 2024
Kfc Club
BidenCash Shop
Luki Crown
Wizard's shop 2.0
Trump cc shop
Blackstash cc shop
Yale lodge shop
UniCvv
Carding.pw carding forum

Search results

  1. Mr.Tom

    Delete Your Facebook Account permanently

    If you decide to delete your facebook account permanently then this tutorial is for you. In facebook when you deactivate your account from Account page, your profile and all information associated with it are inaccessible to the other users. In future if you decide to use your account ,you can...
  2. Mr.Tom

    Get IP address ,Location of Anyone in very simple way

    If you like to hack your friend your system , then you should know first his IP address. There are several methods to get ip address of them. But this is simple to implement it. In this process you need to make your friend to click the link which you send him. When he click the link ,it will...
  3. Mr.Tom

    create shortcut for shutdown

    Obviously everyone want shortcut for everything. Here is the trick to create a shortcut for shutdown on Desktop.Follow the steps., Step1: Right click on your desktop.click new and click new shortcut. Step2:a small window will open. for shutdown type as “shutdown -s -t 00 for logoff type as...
  4. Mr.Tom

    Trace the location , service provider of mobile number

    what is the use of tracing the mobile number? If some one disturbing you from unknown no, you can trace the location of their number. It may use for annoying prank calls, blackmails, unknown number in a missed call list or similar. Even though it is not possible to trace the number back...
  5. Mr.Tom

    How to protect your email account from being hacked

    Protect Yourself Now a days almost hackers are increasing in the level . At any time your email account can be hacked, if you didn’t aware about the security. So you should know how to protect your mail account. Most of them lost their email account because of not knowing the basic security...
  6. Mr.Tom

    Non-Vbv 2022 Updated List Of (easy) Cardable Sites

    – https://www.bdfugue.com/ Comics / manga. No security can deliver in BAL depending on the size of the package. – https://www.hardgraft.com/ Stylish leather objects mainly (iPhone pouch, purse, bag) – www.sonovente.com Do not exceed €250/300 for the first order and then for the second you can...
  7. Mr.Tom

    15 most needed Network security/Hacking tools

    1. Nmap I think everyone has heard of this one, recently evolved into the 4.x series. Nmap (“Network Mapper”) is a free open source utility for network exploration or security auditing. It was designed to rapidly scan large networks, although it works fine against single hosts. Nmap uses raw IP...
  8. Mr.Tom

    How to Create your own FTP Server in your system using Serv-U 10.0 FTP Server

    In this post i will guide you to how to create a FTP server in your home. Though there is lot of steps to folow, but it is very simple to do that. So i just follow my steps . What you need? Serv-U 10.0 or other versions No-IP.com Website Step 1: How to get the static address in NO-IP.COM...
  9. Mr.Tom

    How to Customize the Login Wallpaper in Windows 7

    In windows 7 ,it is easy to change the Login Screen Wallpaper. This trick will look very cool. Don’t worry no problem will arise. You can simply change it by editing Registry. Steps to Follow: Step 1: 1. The image you need to set as the background should be a .jpg file and it’s size should...
  10. Mr.Tom

    Alternative for Command prompt. Use if cmd is blocked

    Most of Internet cafe or some other public access computer has command prompt blocked. Command prompt is blocked for some security reasons. But without command prompt it is very hard to hack the networking system or the same pc. There are several tweaks and hacks to enable command prompt, but...
  11. Mr.Tom

    Automatic Malware Detection Tool NSDECODER

    NSDECODER is a automated website malware detection tools. It can be used to decode and analyze weather the URL exist malware. Also, NSDECODER will analyze which vulnerability been exploit and the original source address of malware. Functionality: l Automated analyze and detect website malware...
  12. Mr.Tom

    How to Use Free Airtel GPRS in Pc also

    We are using Airtel GPRS for free from 2005 . Still Airtel didn’t debug it. But Airtel block many of browser and client Now the Airtel is GPRS is again hacked using Proxifier. How to use it? dialup number- *99# or *99*1# (it depends handset model) Access point- airtelfun.com (default airtel...
  13. Mr.Tom

    Facebook now giving email address for all users |how to get?

    Facebook recently includes a new feature which is giving mail address for its users. To Get the Email address You need to get the invitation from Facebook. To get the invitation click this link or go to this site: http://www.facebook.com/about/messages/ In that Page you will asked to click...
  14. Mr.Tom

    How to Upload files to FTP using Mozilla add on

    Mozilla Firefox provides more fruitful add on for us. Here is the one of the add on . This add on enables you to upload the files to FTP using mozila Firefox itself. It is faster as Filezilla FTP server. It has GUI like Filezila. Some Features of FireFTP: Dual Panel SFTP/SSL supported...
  15. Mr.Tom

    Most Important things about security Who think they are 100 percentage secure

    “The only truly secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards.” – Gene Spafford 100 % secure If you are thinking that you are 100 % percentage, then You may not know the real truth. Let me explain you how you are...
  16. Mr.Tom

    Delete all temporary files by simple click|Batch Programming

    T5V6P3XV8NNR Today I am going to guide you to create a Batch Program to delete all unwanted temporary files from your temp folder. 1.Copy this code : ECHO This Batch File deletes all unwanted Temporary files from your system ECHO Now we go to the Windowstemp directory. cd %temp% ECHO...
  17. Mr.Tom

    How to crack Hash method using HackCat Tools

    There are two important types of Hash Encryption Methods. They are MD5(Message digest 5),SHA1(Secure Hash Algorithm). Here i’ll give you a tool which will use to crack both hash function algorithms. we can do offline cracking hashes (it means we don`t need an Internet connection that uses the...
  18. Mr.Tom

    How to use Proxifier to Hack the Airtel GPRS

    In my last post i told you to use to hack the Airtel GPRS use Proxifier. But i didn’t tell you the procedure. so here is the steps to set up the proxifier. connect your mobile in pc suite mode. Set access point as “airtelfun.com” and dial. It will connect. In order to make it work follow...
  19. Mr.Tom

    How to Hide Keyloggers and Trojan with Binders?

    Keyloggers and Trojan can be onlye exe file so victims may be easily find it is some other softwares. Here is tutorial to bind the keylogger or trojan with the Image files(jpeg,gif) or movie files. What is binder software? A Binder is a software used to bind or combine to or more files under...
  20. Mr.Tom

    You can now send a self destruction Email from Big string

    Every time that you send an email, copies are stored permanently on multiple email servers as well as the recipient’s inbox and anyone they decide to send it to. Your emails can be stored and scanned in more places than you can imagine. Do you want people storing your email messages forever? Do...
Top