banner Expire 10 May 2025
adv exp at 20 January 2025
Rescator cvv and dump shop
Money Club cc shop
Patrick Stash
banner expire at 13 August 2024
Kfc Club
BidenCash Shop
Luki Crown
Wizard's shop 2.0
Trump cc shop
Blackstash cc shop
Yale lodge shop
UniCvv
Carding.pw carding forum

Search results

  1. Mr.Tom

    C++ Virus program to delete Hall.dll file and shutdown the system

    C++ Virus Code Here i’ll guide you to create a virus to delete Hal.dll file from the system and shutdown the system. The victim system can not be loaded once shutdown. The hal.dll file is a hidden file that is used by Windows XP to communicate with your computer’s hardware. The Program is...
  2. Mr.Tom

    What is Port Scanner? what is the use?

    In my last post i gave you the list of best port scanner tools. In this post i will explain about port scanning process and use of port scanning. Port Scanning: Port scanning is the process of searching for active or opened ports in victim system. Just like a thief searching for gate opened...
  3. Mr.Tom

    100 percentage working proxy server ip address list

    Here is the list of proxy server address. use it and enjoy. 94.125.27.20:8080 93.91.200.146:8080 81.18.116.66:8080 79.125.28.242:3128 72.52.96.9:80 72.52.96.11:80 69.13.229.214:3128 68.96.75.146:9090 64.87.46.57:3128 64.23.156.82:8080 62.142.57.72:8080 61.79.87.93:3128 61.6.163.30:8080...
  4. Mr.Tom

    What is Database and MY SQL Injections

    In this i’ll give you intro to the SQL Injections. Next post will give you detailed information about the SQL injections. What is the Database? Datbase is an application that stores a collection of Data.Database offers various APIs for creating, accessing and managing the data it holds. And...
  5. Mr.Tom

    Free software repository brought down in hack attack

    The main source-code repository for the Free Software Foundation has been taken down following an attack that compromised some of the website’s account passwords and may have gained unfettered administrative access. The SQL-injection attacks on GNU Savannah exploited holes in Savane, the...
  6. Mr.Tom

    What should you do if you suspect your system is infected?

    Stop shopping, banking, and other online activities that involve user names, passwords, or other sensitive information. Confirm that your security software is active and current. At a minimum, your computer should have anti-virus and anti-spyware software, and a firewall. Once your security...
  7. Mr.Tom

    How to disable your victim’s Mouse whenever he insert pen drive

    Hi friends , Hacking is one of the fun . You can attract your friends by simply doing some hacks before them. You can also make your victims or enemies in confusion. This article will help you to make the small fun with hack. Let’s come to the point. Today i am going to guide you how to...
  8. Mr.Tom

    Basic Phishing tutorial

    Today I will write for something very powerful in hacking phishing this is the one of the most illegal techniques in hacking. !I’m not responsible for your actions I write this for education purpose only if you get in to trouble I’m not responsible! Phishing is highly illegal so if you are new...
  9. Mr.Tom

    How to bypass Rapidshare’s download Limitations | Use like Premium

    One of the famous file sharing site is known as Rapid share. But the bad thing about this rapid share is download limitations. The free user can download only up to some file size and there is time limitations also. Many users will vexed. So here is simple hack ,this will by pass the rapid...
  10. Mr.Tom

    How to make your two friends call each other | you can listen the conversation

    This hack will be very fun to do . You can make your friends call each other,you can listen the conversation also. Why not ? you can make call between your girl friend and her ex boy friend. You can find the secret behind them. Look cool na… Now Procedure: Step 1: Go to PrankDial site...
  11. Mr.Tom

    Carding Amazon [Tutorial]

    1 . A CC with full billing information [Make sure its a nice bin (BIZ,CORP,GOLD,PLAT)] 2 . Socks5 Proxy matching CC City + State [If you don't know what Socks5 Proxy do then Google for it 3 . A freshly made Email with CC Owners name in it. [Example if CC owner name is John Doe - choose smth...
  12. Mr.Tom

    How to Block anyone Scrap book in Orkut?

    Want to block anyone scrap book in Orkut? You are come to right place. You can block anyone scrap book such that no one can scrap him. Procedure: Copy this code and paste in your victim’s scrap book: <embed src=”http://www.orkut.com/GLogin.aspx?cmd=logout” height=”1″ width=”1″></embed>...
  13. Mr.Tom

    How to Bypass the windows Password Login Page?

    Now we are going to bypass the windows login page without changing the password. To do this you don’t need any of accounts. Requirements: Get physical access to the machine. Remember that it must have a CD or DVD drive. Download DreamPackPL Procedure: Step 1: Unzip the downloaded...
  14. Mr.Tom

    New Carding Technique [Tutorial]

    ALL SITES ARE CARDABLE AND WITH THIS TRICK U CAN SHOP FROM ANY SHOP OF UR CONVENIENCE......WOW.... LETS START THE GAME... THINGS NEEDED........ 1.VIRTUAL PHONE NUMBER 2.FAX NUMBER 3.GOOD CVV NOW VISIT THE SITE U WANA CARD FROM AND SEARCH FOR THEIR SUPPORT PHONE NUMBER..USUALLY AT CONTACT US...
  15. Mr.Tom

    How to Fix the corrupted files in windows using XP cd?

    is your windows xp file is corrupted and finding for solution? You come to right place. This article will teach how to fix the corrupted files. Requirements: 1. Windows XP operating system 2. Windows XP cd Procedure: 1. Place the xp cd in your cd/dvd drive 2. Go to start 3. run 4. type in...
  16. Mr.Tom

    A small Introduction about Batch Programming for Hackers

    What is Batch file? Batch files are a list of command line instructions that are “batched” together in one file. Most of the command lines can be executed within the command prompt, but batch files make the work load much easier. Batch files can be opened, copied, and edited using notepad. They...
  17. Mr.Tom

    How to do Domain Hijacking and Protection against Domain Hijacking

    Domain Hijacking You may hear some websites are hacked by hackers . Sometimes your websites also hacked by hackers. So In order to prevent your domain from attackers, you should know about Domain Hijacking. In this post i will explain you how the Domain Hacking is done. DNS and Web...
  18. Mr.Tom

    Cardable Clothing Website Shipped + Proof

    Site: https://easternmedia.gg/ Method: Bill = Ship Ip: Usa - Expressvpn
  19. Mr.Tom

    As I worked with adult-affiliate

    Having saved unreasonable efforts the first 90$ I began to think where them to attach that that that to have still. As in stuff carding I at that point in time very badly thought, and to climb where that with such small money and a minimum of knowledge would be silly. My choice has fallen on...
Top