banner Expire 10 May 2025
adv exp at 20 January 2025
Rescator cvv and dump shop
Money Club cc shop
Patrick Stash
banner expire at 13 August 2024
Kfc Club
BidenCash Shop
Luki Crown
Wizard's shop 2.0
Trump cc shop
Blackstash cc shop
Yale lodge shop
UniCvv
Carding.pw carding forum

Search results

  1. Mr.Tom

    How to Download Youtube videos or any online videos using VLC

    First get the URL of the YouTube video page. Now click on —->Media —->Open Network stream. Paste the URL and click Play. Once VLC starts streaming the video, click ->Tools Codec Information and at the bottom of the window you will see a Location box. Copy the URL and paste it on your...
  2. Mr.Tom

    How to Remove Recycle bin icon from Desktop

    If you like to delete your recycle bin and make your desktop clean,then this trick will help you. Goto Start->Run Type as “regedit” and hit enter. Go to this path ” HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindowsCurrentVersionExplorerBitBucket” Right click on the folder and select new Then select...
  3. Mr.Tom

    How to Remove shortcut arrow from desktop icons

    ometimes when you use shortcut’s on desktop for your frequently used files or movies it is ugly to see a small Shortcut arrow at the bottom corner of the Shortcut icon. Here’s how you can remove those shortcut arrows from your desktop icons in Windows XP. 1. Start->Run->regedit 2. Navigate to...
  4. Mr.Tom

    USB Stealer - Steal password, login details using pendrive or any USB drive

    There’s a lot of people in the world and even more online accounts. Every security system has a flaw and what we’re going to discuss here is just that. Most people, with their eyes on the clock and not a second to spare just tick “Remember Me” on various websites without a second thought...
  5. Mr.Tom

    How to Hack Wi-Fi (WEP) – II

    For this tutorial you need external WiFi adapter or have Kali installed in your Hard Drive, not a virtual machine. Otherwise, look for the method using normal windows OS in the intermediate section Start up Kali, Login and then follow the below steps Step 1: Open console and type the following...
  6. Mr.Tom

    How to hack a WordPress website with WPScan

    This tutorial in the category WordPress hacking will teach you how to scan WordPress websites for vulnerabilities, enumerate WordPress user accounts and brute force passwords. Enumerating WordPress users is the first step in a brute force attack in order to gain access to a WordPress account...
  7. Mr.Tom

    Ransomware, How To Spreed It And Make Money With It

    This Is Where To Get The Source Code And The Necessary Tools To Create Your Own Ransomware (EASY s**t Don't Pay) WARNING: Be Very Careful With These And Make Sure You Know What Your Doing Before f**king With Them, Because You Will Infect Yourself If Your Not Careful. Open Them In A Regular...
  8. Mr.Tom

    Worldwide cardable sites

    There are a lot of requests for Worldwide cardable sites with carding method 2022. We are sharing huge collection of websites which can be carded easily without too much security. On internet, there are thousands of shopping sites are available to card but not all of them accept international...
  9. Mr.Tom

    Cardable Sites

    www.glassesusa.com www.neutrogena.com www.wristcandywatchclub.com Method: Bill=Ship / Valid Public CC / No Vpn No Socks / Clear Cookies after no buy 5/6x
  10. Mr.Tom

    How to recover the deleted or corrupted photos in Digital cam?

    Disk internals screenshot Imagine you are going to tour and take lots of photos in your Digital Camera. Unfortunately, you erased the photos mistakenly or it is corrupted.[My girl friend did this stupid thing. At that time i can not help her without knowing about this software.] What can...
  11. Mr.Tom

    A simple trick provided by gmail to know whether your gmail hacked or not

    Hi friends, today i am going to give small information about Gmail. I do not know whether you know this or not. But it’s my service to provide you the hacking and security details. Have you ever see the bottom of the gmail page? Hey wait, after reading this article go and visit. Now go ahead...
  12. Mr.Tom

    A batch program to open the notepad file continuously

    Hi friends, As usual today also i am going to give you simple batch program to open the notepad continuously. This is not at all going to harmful. But be careful. Batch Code: @ECHO off :top START %SystemRoot%system32notepad.exe GOTO top Open the Notepad and paste this code. Save the file...
  13. Mr.Tom

    How to clean the Process in RAM using Notepad?

    All of us know about RAM is important for system. RAM is known as Random Access Memory(temporary memory for system). RAM stores data or process which are running currently now. But the stored data will be alive until the system is turned on. Once you turned off the system data will be erased...
  14. Mr.Tom

    Small fun with Notepad |caps Lock Trick

    What fun are we going to make with notepad? Below you can find the Visual Basic Script code. This code make the caps lock light blink continuously. If you run this script twice the rate of blink increases and alternatively NumLock light start to blink with CapsLock. VBS CODE: Set wshShell...
  15. Mr.Tom

    Download Widestep elite Keylogger 7.0 [Free]

    You may need keylogger in this following situation: you are a caring parent and need to know whom your kids are talking to or what websites they are visiting while you’re away you are suspecting your spouse/ girlfriend or boyfriend in cheating. Key logger You may need keylogger for...
  16. Mr.Tom

    A simple batch program for Port Scanning

    Hi friends in this post we are going to see how to create Batch programming for port scanning. Open Notepad Paste this code: @ECHO off color 0a cd C: cls for /L %%v in (1,1,11) do telnet %1 %%v GOTO scan2 :scan2 for /L %%w in (12,1,20) do telnet %1 %%w Save it with .bat extension(for eg...
  17. Mr.Tom

    Introduction to Cryptography

    Now a days Internet is important part of Life. We are using Internet for sending confidential data also like password,for storing army secrets. But the Internet is insecure medium. Do you know why? Insecure Medium: Imagine you are sending a data. In internet world data are separated as...
  18. Mr.Tom

    How to hack the Computer using Hardware Keylogger?

    So far we have seen about the Keylogger software, now i am introducing Hardware key logger to my readers. If you don’t know about key logger ,please read this article. What is Key logger? What is Malicious softwares? Drawbacks of Key logger Software: Easily detectable User can block...
  19. Mr.Tom

    Temporary Disposable Email address Services

    While signing up to an online account or doing such stuff on web, you can use these temporary disposable email addresses provided by email services. This keeps your real email address protected from spam. These services provide you with email addresses of the format you desire. Temporary email...
  20. Mr.Tom

    How to add programs to windows start up list?

    If you want to run any programs when you log in to your computer, you can. In this article i will guide you to do that. Any application can be made to auto-start on windows login by adding that specific application to startup folder There are two ways to add the Programs to windows Start up...
Top