β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Hacking Tools β‘οΈ:)
fb.com/undercodeTesting
+] MD5 Hash Cracker
[+] Zone-h Poster
[+] Zone-h Url Grabber
[+] Sqli Finder [With ip Address]
[+] Whois Tools
[+] Dorker
[+] Reverse ip
[+] zip/rar password Cracker
[+] telegram/instagram username checker
[+] ICG wordpress Scanner
[+] Email Crawler
[+] Base64 encode/Decode
[+] Wordpress Hash BruteForce
[+] pyc decompiler
[+] CMs Checker
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/04x/ToolB0x
2) cd ToolB0x
3) run as pthon ToolB0x.py
color.py
E N J O Y
π¦ Works for Termux-win-any linux
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Hacking Tools β‘οΈ:)
fb.com/undercodeTesting
+] MD5 Hash Cracker
[+] Zone-h Poster
[+] Zone-h Url Grabber
[+] Sqli Finder [With ip Address]
[+] Whois Tools
[+] Dorker
[+] Reverse ip
[+] zip/rar password Cracker
[+] telegram/instagram username checker
[+] ICG wordpress Scanner
[+] Email Crawler
[+] Base64 encode/Decode
[+] Wordpress Hash BruteForce
[+] pyc decompiler
[+] CMs Checker
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/04x/ToolB0x
2) cd ToolB0x
3) run as pthon ToolB0x.py
color.py
E N J O Y
π¦ Works for Termux-win-any linux
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Hakku Framework penetration testing
>Hakku is simple framework that has been made for penetration testing tools. Hakku framework offers simple structure, basic CLI, and useful features for penetration testing tools developing. Hakku is on early stages and may be unstable, so please download the released versions from github or sourceforge, don't just clone github repository except you don't want stability, you want to try out latest features, or you just want to develop Hakku. Hakku is under MIT license, in other words you can do what you ever want with the source code
π¦FEATURES :
apache_users
arp_dos
arp_monitor
arp_spoof
bluetooth_pod
cloudflare_resolver
dhcp_dos
dir_scanner
dns_spoof
email_bomber
hostname_resolver
mac_spoof
mitm
network_kill
pma_scanner
port_scanner
proxy_scout
whois
web_killer
web_scout
wifi_jammer
zip_cracker
rar_cracker
wordlist_gen
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/4shadoww/hakkuframework
2) cd hakkuframework
3) Hakku doesn't require installation, but if want to do it for some reason you can do it using installation script. That same script will be used to uninstall Hakku
> Installation can be done by simple running command: sudo ./install -i
> use for learn not for harm :(
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Hakku Framework penetration testing
>Hakku is simple framework that has been made for penetration testing tools. Hakku framework offers simple structure, basic CLI, and useful features for penetration testing tools developing. Hakku is on early stages and may be unstable, so please download the released versions from github or sourceforge, don't just clone github repository except you don't want stability, you want to try out latest features, or you just want to develop Hakku. Hakku is under MIT license, in other words you can do what you ever want with the source code
π¦FEATURES :
apache_users
arp_dos
arp_monitor
arp_spoof
bluetooth_pod
cloudflare_resolver
dhcp_dos
dir_scanner
dns_spoof
email_bomber
hostname_resolver
mac_spoof
mitm
network_kill
pma_scanner
port_scanner
proxy_scout
whois
web_killer
web_scout
wifi_jammer
zip_cracker
rar_cracker
wordlist_gen
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/4shadoww/hakkuframework
2) cd hakkuframework
3) Hakku doesn't require installation, but if want to do it for some reason you can do it using installation script. That same script will be used to uninstall Hakku
> Installation can be done by simple running command: sudo ./install -i
> use for learn not for harm :(
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
GitHub
GitHub - 4shadoww/hakkuframework: Hakku Framework penetration testing
Hakku Framework penetration testing. Contribute to 4shadoww/hakkuframework development by creating an account on GitHub.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦updated Contains Spammers Tools With Various Types With High Limit Even Unlimited indonisian script ππ»
π¦ πβπππΈπππππΈπππβ & βπβ :
$ pkg update upgrade
$ pkg install git python2 toilet figlet php
$ git clone https://github.com/4L13199/LITESPAM
$ cd LITESPAM
> termux-linux
π¦updated Contains Spammers Tools With Various Types With High Limit Even Unlimited indonisian script ππ»
π¦ πβπππΈπππππΈπππβ & βπβ :
$ pkg update upgrade
$ pkg install git python2 toilet figlet php
$ git clone https://github.com/4L13199/LITESPAM
$ cd LITESPAM
> termux-linux
GitHub
GitHub - 4L13199/LITESPAM: Berisi Tools Spammer Dengan Berbagai Macam jenis Dengan Limit Tinggi Bahkan Unlimited
Berisi Tools Spammer Dengan Berbagai Macam jenis Dengan Limit Tinggi Bahkan Unlimited - 4L13199/LITESPAM
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How to recover A DISABLED INSTAGRAM ACCOUNT ? from official instagram team
t.me/UndercodeTesting
π¦ ππΌππ πππΈβπ :
1) If your Instagram account was disabled, youβll see a message telling you when you try to log in. Accounts that don't follow Community Guidelines
> https://help.instagram.com/477434105621119
or Terms of Use may be disabled without warning. We suggest that you review the Community Guidelines carefully along with the posts on all accounts you've created. Keep in mind, we may permanently remove an account that repeatedly violates the Community Guidelines or Terms of Use.
2) If you think your account was disabled by mistake, you may be able to appeal the decision by opening the app, entering your username and password and following the on-screen instructions.
3) If you donβt see a disabled message, you may be experiencing a login issue. If your account was deleted by you or someone with your password, there's no way to restore it. You can create a new account with the same email address you used before, but you may not be able to get the same username.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How to recover A DISABLED INSTAGRAM ACCOUNT ? from official instagram team
t.me/UndercodeTesting
π¦ ππΌππ πππΈβπ :
1) If your Instagram account was disabled, youβll see a message telling you when you try to log in. Accounts that don't follow Community Guidelines
> https://help.instagram.com/477434105621119
or Terms of Use may be disabled without warning. We suggest that you review the Community Guidelines carefully along with the posts on all accounts you've created. Keep in mind, we may permanently remove an account that repeatedly violates the Community Guidelines or Terms of Use.
2) If you think your account was disabled by mistake, you may be able to appeal the decision by opening the app, entering your username and password and following the on-screen instructions.
3) If you donβt see a disabled message, you may be experiencing a login issue. If your account was deleted by you or someone with your password, there's no way to restore it. You can create a new account with the same email address you used before, but you may not be able to get the same username.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Generate Gmail Emailing Keyloggers to Windows :)
fb.com/undercodeTesting
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/4w4k3/BeeLogger.git
Running:
2) cd BeeLogger
3) sudo su
4) chmod +x install.sh
5) ./install.sh
6) python bee.py
π¦Features :
> Send logs each 120 seconds.
> Send logs when chars > 50.
> Send logs with GMAIL.
> Some Phishing methods are included.
> Multiple Session disabled.
> Auto Persistence.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Generate Gmail Emailing Keyloggers to Windows :)
fb.com/undercodeTesting
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/4w4k3/BeeLogger.git
Running:
2) cd BeeLogger
3) sudo su
4) chmod +x install.sh
5) ./install.sh
6) python bee.py
π¦Features :
> Send logs each 120 seconds.
> Send logs when chars > 50.
> Send logs with GMAIL.
> Some Phishing methods are included.
> Multiple Session disabled.
> Auto Persistence.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Facebook
Log in or sign up to view
See posts, photos and more on Facebook.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Is the phone hacked? How to find out and what to do if fears are confirmed ? by Undercode :
t.me/undercodeTesting
π¦ ππΌππ πππΈβπ :
Hacking signs
1) battery charge. If the smartphoneβs battery began to run down quickly, reducing the deviceβs operating time by several hours under normal use, then this most likely indicates the operation of malicious background applications;
2) applications. The appearance in the general list of new application icons that were not installed by you may indicate that the device was hacked;
notifications. Displaying strange messages on the screen with unreadable characters, links or notifications about the execution of the request, if you did not put your hand to this, also does not bode well - for sure, hackers already have your data;
3) balance. If your mobile account incurs losses, although you are convinced that you did not call toll numbers, did not order additional services and were not involved in any financial transactions, then you can say with accuracy that your gadget is hacked;
4) malfunctions. Strange signals during a conversation, extraneous noise, or even disconnection with a good signal level can also talk about using the deviceβs microphone or even listening to conversations;
Written by Undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Is the phone hacked? How to find out and what to do if fears are confirmed ? by Undercode :
t.me/undercodeTesting
π¦ ππΌππ πππΈβπ :
Hacking signs
1) battery charge. If the smartphoneβs battery began to run down quickly, reducing the deviceβs operating time by several hours under normal use, then this most likely indicates the operation of malicious background applications;
2) applications. The appearance in the general list of new application icons that were not installed by you may indicate that the device was hacked;
notifications. Displaying strange messages on the screen with unreadable characters, links or notifications about the execution of the request, if you did not put your hand to this, also does not bode well - for sure, hackers already have your data;
3) balance. If your mobile account incurs losses, although you are convinced that you did not call toll numbers, did not order additional services and were not involved in any financial transactions, then you can say with accuracy that your gadget is hacked;
4) malfunctions. Strange signals during a conversation, extraneous noise, or even disconnection with a good signal level can also talk about using the deviceβs microphone or even listening to conversations;
Written by Undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
Forwarded from iUNDERCODE - iOs JAILBREAK & MODS
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Best Jailbreak :
iOS 12.4
Jailbreak using unc0ver
Semi-Untethered Only. Follow the Cydia Impactor method of installing the Jailbreak.
iOS 12.1.3 β 12.2
Jailbreak using Chimera
Semi-Untethered Only. Follow the Cydia Impactor method of installing the Jailbreak. A12 devices are not supported. Sileo installed by default (not Cydia).
iOS 12.0 β 12.1.2
Jailbreak using Chimera
Semi-Untethered Only. Follow the Cydia Impactor method of installing the Jailbreak. Sileo installed by default (not Cydia).
iOS 11.0 β 12.2
Jailbreak using unc0ver
Semi-Untethered Only. Follow the Cydia Impactor method of installing the Jailbreak.
iOS 10.0 β 10.3.3
Jailbreak using Meridian
Semi-Untethered Only. Follow the Cydia Impactor method of installing the Jailbreak.
iOS 10.0 β 10.3.4
Jailbreak using doubleH3lix
64-bit devices with a headphone jack supported. Semi-untethered only. Follow the Cydia Impactor method of installing the Jailbreak.
iOS 10.0 β 10.3.4
Jailbreak using H3lix
32-bit devices only. Semi-untethered only. Follow the Cydia Impactor method of installing the Jailbreak.
iOS 9.3.5 β 9.3.6
Jailbreak using PhΕnix
32-bit devices only. Semi-untethered only. Follow the Cydia Impactor method of installing the Jailbreak.
iOS 9.1 β 9.3.4
Jailbreak using Jailbreak.me
32-bit devices only. Visit jailbreak.me in Safari on the iOS device itself.
iOS 9.1 β 9.3.4
Jailbreak using Home Depot
32-bit devices only. Semi-untethered, but can be untethered by installing UntetherHomeDepot via tihmstar's Cydia repo. Follow the Cydia Impactor method of installing the Jailbreak.
iOS 9.2 β 9.3.3
Jailbreak using Pangu
64-bit devices only. Semi-untethered only. Follow the Cydia Impactor method of installing the Jailbreak.
iOS 9.0 β 9.1
Jailbreak using Pangu
iOS 9.1 Jailbreak is for 64-bit devices only.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Best Jailbreak :
iOS 12.4
Jailbreak using unc0ver
Semi-Untethered Only. Follow the Cydia Impactor method of installing the Jailbreak.
iOS 12.1.3 β 12.2
Jailbreak using Chimera
Semi-Untethered Only. Follow the Cydia Impactor method of installing the Jailbreak. A12 devices are not supported. Sileo installed by default (not Cydia).
iOS 12.0 β 12.1.2
Jailbreak using Chimera
Semi-Untethered Only. Follow the Cydia Impactor method of installing the Jailbreak. Sileo installed by default (not Cydia).
iOS 11.0 β 12.2
Jailbreak using unc0ver
Semi-Untethered Only. Follow the Cydia Impactor method of installing the Jailbreak.
iOS 10.0 β 10.3.3
Jailbreak using Meridian
Semi-Untethered Only. Follow the Cydia Impactor method of installing the Jailbreak.
iOS 10.0 β 10.3.4
Jailbreak using doubleH3lix
64-bit devices with a headphone jack supported. Semi-untethered only. Follow the Cydia Impactor method of installing the Jailbreak.
iOS 10.0 β 10.3.4
Jailbreak using H3lix
32-bit devices only. Semi-untethered only. Follow the Cydia Impactor method of installing the Jailbreak.
iOS 9.3.5 β 9.3.6
Jailbreak using PhΕnix
32-bit devices only. Semi-untethered only. Follow the Cydia Impactor method of installing the Jailbreak.
iOS 9.1 β 9.3.4
Jailbreak using Jailbreak.me
32-bit devices only. Visit jailbreak.me in Safari on the iOS device itself.
iOS 9.1 β 9.3.4
Jailbreak using Home Depot
32-bit devices only. Semi-untethered, but can be untethered by installing UntetherHomeDepot via tihmstar's Cydia repo. Follow the Cydia Impactor method of installing the Jailbreak.
iOS 9.2 β 9.3.3
Jailbreak using Pangu
64-bit devices only. Semi-untethered only. Follow the Cydia Impactor method of installing the Jailbreak.
iOS 9.0 β 9.1
Jailbreak using Pangu
iOS 9.1 Jailbreak is for 64-bit devices only.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How to quickly help a hacked phone by Undercode :
t.me/undercodeTesting
π¦ ππΌππ πππΈβπ :
1) Check for viruses. More often than not, data from mobile devices falls into the hands of hackers through malware, and simply put, viruses that transmit information from a device directly to an attacker. "Infection" most often occurs when downloading applications from unreliable sources.
2) The easiest way to find out if there are viruses on your smartphone is to check it with an antivirus , i.e. a program that detects and removes viruses.
3) Check battery usage statistics. The battery charge should be consumed in direct proportion to the use of the smartphone. You can track which applications consume a charge (including in the background) in the βEnergy consumptionβ section of the device.
4) On Samsung Galaxy, you can check the battery consumption statistics through the "Device Maintenance> Battery" section. Android will offer to transfer energy-consuming applications to sleep mode.
5) We remove suspicious and hidden applications . The presence of a large number of applications cannot be called useful for any gadget, and the presence of malicious ones is definitely harmful. Therefore, remove suspicious applications from your smartphone, and then install them from official markets and pay attention to what permissions you provide for work.
6) Check the statistics of the use of mobile traffic on the phone: (Settings> Connections> Data Usage). If you have the habit of not disconnecting the mobile Internet, check the data transfer statistics to track the suspicious activity of the device.
7) We use only reliable Wi-Fi access points. Do not use public Wi-Fi points to enter payment customers, make bank transfers and any other financial transactions. Public networks are poorly protected, and there is a risk of connecting to a hacker network, through which your data will fall into the hands of attackers. It will not be superfluous to completely disable automatic connection.
8)we update the phone to the latest version (Settings> Software update> Download and installation> Download). Do not ignore system alerts about a new version of the operating system. This is to increase security and combat updated threats. Believe me, itβs better to spend half an hour installing the new version of Android and rebooting the gadget, than to eliminate the consequences of hacking.
9) We check the credit card account - are there any suspicious charges. Using mobile payment systems is very convenient, but tying the card to a smartphone is very risky. If you donβt want to give up comfort, and security is compromised, then contact your bank and request a transaction history. If there are suspicious transactions - take measures up to blocking the old account and opening a new one.
10) The last method is to make a Hard Reset on the phone, after making a backup copy of important data. If the methods used are ineffective or you fear that you could not completely eliminate the threat, then it is worth returning the device to its factory state by making a Hard Reset of the smartphone. Resetting all settings affects all data, including user data, so it is better to save important contacts, photos, notes and other information in advance to third-party media. After resetting the settings, you will receive the gadget βout of the boxβ, which means you will have to re-configure it for yourself.
11) This method is the most radical, because it allows you to completely remove all third-party applications, but it can also be useless if you do not take care of protecting your accounts in advance by changing passwords to new ones.
Written by Undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ How to quickly help a hacked phone by Undercode :
t.me/undercodeTesting
π¦ ππΌππ πππΈβπ :
1) Check for viruses. More often than not, data from mobile devices falls into the hands of hackers through malware, and simply put, viruses that transmit information from a device directly to an attacker. "Infection" most often occurs when downloading applications from unreliable sources.
2) The easiest way to find out if there are viruses on your smartphone is to check it with an antivirus , i.e. a program that detects and removes viruses.
3) Check battery usage statistics. The battery charge should be consumed in direct proportion to the use of the smartphone. You can track which applications consume a charge (including in the background) in the βEnergy consumptionβ section of the device.
4) On Samsung Galaxy, you can check the battery consumption statistics through the "Device Maintenance> Battery" section. Android will offer to transfer energy-consuming applications to sleep mode.
5) We remove suspicious and hidden applications . The presence of a large number of applications cannot be called useful for any gadget, and the presence of malicious ones is definitely harmful. Therefore, remove suspicious applications from your smartphone, and then install them from official markets and pay attention to what permissions you provide for work.
6) Check the statistics of the use of mobile traffic on the phone: (Settings> Connections> Data Usage). If you have the habit of not disconnecting the mobile Internet, check the data transfer statistics to track the suspicious activity of the device.
7) We use only reliable Wi-Fi access points. Do not use public Wi-Fi points to enter payment customers, make bank transfers and any other financial transactions. Public networks are poorly protected, and there is a risk of connecting to a hacker network, through which your data will fall into the hands of attackers. It will not be superfluous to completely disable automatic connection.
8)we update the phone to the latest version (Settings> Software update> Download and installation> Download). Do not ignore system alerts about a new version of the operating system. This is to increase security and combat updated threats. Believe me, itβs better to spend half an hour installing the new version of Android and rebooting the gadget, than to eliminate the consequences of hacking.
9) We check the credit card account - are there any suspicious charges. Using mobile payment systems is very convenient, but tying the card to a smartphone is very risky. If you donβt want to give up comfort, and security is compromised, then contact your bank and request a transaction history. If there are suspicious transactions - take measures up to blocking the old account and opening a new one.
10) The last method is to make a Hard Reset on the phone, after making a backup copy of important data. If the methods used are ineffective or you fear that you could not completely eliminate the threat, then it is worth returning the device to its factory state by making a Hard Reset of the smartphone. Resetting all settings affects all data, including user data, so it is better to save important contacts, photos, notes and other information in advance to third-party media. After resetting the settings, you will receive the gadget βout of the boxβ, which means you will have to re-configure it for yourself.
11) This method is the most radical, because it allows you to completely remove all third-party applications, but it can also be useless if you do not take care of protecting your accounts in advance by changing passwords to new ones.
Written by Undercode
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦CARDING TUTORIALS :
t.me/undercodeTesting
π¦ Types of Credit Cards:
1) After getting the CC, I recommend checking whether the CC is live or dead with this tool: Credit Card Verifier
Regular Credit Card :
Β· NAME:
Β· ADDRESS:
Β· CITY:
Β· STATE:
Β· ZIP CODE:
Β· TEL. BILLING NUMBER:
Β· CARD NUMBER:
Β· CARD EXP DATE:
Β· CVV CODE:
2) Well, this is the minimum information youβll get from a CC whenever youβll buy it. If you donβt get any of these details, then you canβt do anything with that CC. You are out of luck this time. With this CC you can card simple sites.
π¦ Partial Full-Info CC
In these Cards, you will get some additional information with the details mentioned above. This Information is:
Β· Social Security Number (SSN):
Β· Date Of Birth (DOB):
Β· ******βs Maiden Name (MMN):
4) with the help of this info, you can even card C2IT and even PayPal. So this is Great if youβll get these Details too.
Full-Info Credit Card
π¦ This Card provides you full Details in it. These details are below
Β· BANK ACCOUNT NUMBER:
Β· ROUTING NUMBER:
Β· BANK NAME:
Β· BANK NUMBER:
Β· DRIVERS LICENSE NUMBER:
Β· PIN NUMBER (For CC or ATM card)
5) If youβll have this info, you can card anything. Yes, I said anything.
Below are some of the Companies, which provide credit cards. I must suggest you use AMEX Premium, as it has mainly usage by many of the carders.
These companies are
Β· AMEX
Β· VISA
Β· DISCOVER
Β· MasterCard
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦CARDING TUTORIALS :
t.me/undercodeTesting
π¦ Types of Credit Cards:
1) After getting the CC, I recommend checking whether the CC is live or dead with this tool: Credit Card Verifier
Regular Credit Card :
Β· NAME:
Β· ADDRESS:
Β· CITY:
Β· STATE:
Β· ZIP CODE:
Β· TEL. BILLING NUMBER:
Β· CARD NUMBER:
Β· CARD EXP DATE:
Β· CVV CODE:
2) Well, this is the minimum information youβll get from a CC whenever youβll buy it. If you donβt get any of these details, then you canβt do anything with that CC. You are out of luck this time. With this CC you can card simple sites.
π¦ Partial Full-Info CC
In these Cards, you will get some additional information with the details mentioned above. This Information is:
Β· Social Security Number (SSN):
Β· Date Of Birth (DOB):
Β· ******βs Maiden Name (MMN):
4) with the help of this info, you can even card C2IT and even PayPal. So this is Great if youβll get these Details too.
Full-Info Credit Card
π¦ This Card provides you full Details in it. These details are below
Β· BANK ACCOUNT NUMBER:
Β· ROUTING NUMBER:
Β· BANK NAME:
Β· BANK NUMBER:
Β· DRIVERS LICENSE NUMBER:
Β· PIN NUMBER (For CC or ATM card)
5) If youβll have this info, you can card anything. Yes, I said anything.
Below are some of the Companies, which provide credit cards. I must suggest you use AMEX Premium, as it has mainly usage by many of the carders.
These companies are
Β· AMEX
Β· VISA
Β· DISCOVER
Β· MasterCard
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Carding for beginers :
BIN - What is It?
π¦ BIN Stands for Bank Identification Number, Itβs the first 6 digits of your credit card, suppose your Credit card number is 4305873969346315, then your BIN will be 430587. I will suggest you collect some information related to BIN, this may help you in learning carding easily. For BINβs BinsBase, Bins.su and BinLists are the best. This will help you in learning almost everything about Bins.
1) Well, before starting make sure you have gathered all the required things I earlier mentioned in the post. For the links of software download and purchase see the end of post.
Set Up Socks in Mozilla
2) Just open Firefox, then go to Options and Click on General on the left pane of the browser. Then scroll down to the Network Settings section and click on Settings. A Pop-Up will appear. Select the fourth option of Manual Proxy Configuration. Now type the proxy and port below, thatβs it!
3) After adding the Proxy there, Just Hit OK and restart Firefox and now youβll be connected with secure socks.
> Note: Make Sure to Buy Socks with the Matching Location of the Address in credit card. Suppose that the credit card holder is from South Africa, your socks are also supposed to be for South Africa.
π¦ SO HOW TO USE BINS :
1) Create a new Email account with the matching name of CC holder. If CC holderβs name is Smith Parker then make something like Smithparker78@***.com
Note: Never use disposable Emails for carding.
2) Run RDP and connect with your Host, in case you are not using RDP, follow the steps below-
3)Change all the MAC addresses using MAC Address Changer.
4) Clear all the history of your PC including Cache, Temp Files using CC Cleaner.
5)Set up sock5 in Mozilla Firefox, check above I have explained how to setup socks in Mozilla.
6) Now, restart your browser and visit This link to check if your IP has changed with the location of CC holder or not.
7) Open any local online market store, I will suggest you use anyone which is from your own country.
8)Register a new account with the name of CC holder and Email you made for carding.
9) Try to add an item to your cart, the item should below USD $500, never use big orders for the first transaction.
10) In shipping address, add the address where you want to deliver the product.
11) Now, go for the payment option, choose credit card for payment.
12) Enter all the credit card details you received when you bought the credit card.
13) For the Billing address, use the address of CC Holder.
POWERED BY wiki
@UNDERCODETESTING
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Carding for beginers :
BIN - What is It?
π¦ BIN Stands for Bank Identification Number, Itβs the first 6 digits of your credit card, suppose your Credit card number is 4305873969346315, then your BIN will be 430587. I will suggest you collect some information related to BIN, this may help you in learning carding easily. For BINβs BinsBase, Bins.su and BinLists are the best. This will help you in learning almost everything about Bins.
1) Well, before starting make sure you have gathered all the required things I earlier mentioned in the post. For the links of software download and purchase see the end of post.
Set Up Socks in Mozilla
2) Just open Firefox, then go to Options and Click on General on the left pane of the browser. Then scroll down to the Network Settings section and click on Settings. A Pop-Up will appear. Select the fourth option of Manual Proxy Configuration. Now type the proxy and port below, thatβs it!
3) After adding the Proxy there, Just Hit OK and restart Firefox and now youβll be connected with secure socks.
> Note: Make Sure to Buy Socks with the Matching Location of the Address in credit card. Suppose that the credit card holder is from South Africa, your socks are also supposed to be for South Africa.
π¦ SO HOW TO USE BINS :
1) Create a new Email account with the matching name of CC holder. If CC holderβs name is Smith Parker then make something like Smithparker78@***.com
Note: Never use disposable Emails for carding.
2) Run RDP and connect with your Host, in case you are not using RDP, follow the steps below-
3)Change all the MAC addresses using MAC Address Changer.
4) Clear all the history of your PC including Cache, Temp Files using CC Cleaner.
5)Set up sock5 in Mozilla Firefox, check above I have explained how to setup socks in Mozilla.
6) Now, restart your browser and visit This link to check if your IP has changed with the location of CC holder or not.
7) Open any local online market store, I will suggest you use anyone which is from your own country.
8)Register a new account with the name of CC holder and Email you made for carding.
9) Try to add an item to your cart, the item should below USD $500, never use big orders for the first transaction.
10) In shipping address, add the address where you want to deliver the product.
11) Now, go for the payment option, choose credit card for payment.
12) Enter all the credit card details you received when you bought the credit card.
13) For the Billing address, use the address of CC Holder.
POWERED BY wiki
@UNDERCODETESTING
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Types of Attacks against Web Servers :
t.me/undercodeTesting
1) Directory traversal attacksβ This type of attacks exploits bugs in the web server to gain unauthorized access to files and folders that are not in the public domain. Once the attacker has gained access, they can download sensitive information, execute commands on the server or install malicious software.
2) Denial of Service Attacksβ With this type of attack, the web server may crash or become unavailable to the legitimate users.
Domain Name System Hijacking β With this type of attacker, the DNS setting are changed to point to the attackerβs web server. All traffic that was supposed to be sent to the web server is redirected to the wrong one.
3) Sniffingβ Unencrypted data sent over the network may be intercepted and used to gain unauthorized access to the web server.
4) Phishingβ With this type of attack, the attack impersonates the websites and directs traffic to the fake website. Unsuspecting users may be tricked into submitting sensitive data such as login details, credit card numbers, etc.
5) Pharmingβ With this type of attack, the attacker compromises the Domain Name System (DNS) servers or on the user computer so that traffic is directed to a malicious site.
6) Defacementβ With this type of attack, the attacker replaces the organizationβs website with a different page that contains the hackerβs name, images and may include background music and messages.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦Types of Attacks against Web Servers :
t.me/undercodeTesting
1) Directory traversal attacksβ This type of attacks exploits bugs in the web server to gain unauthorized access to files and folders that are not in the public domain. Once the attacker has gained access, they can download sensitive information, execute commands on the server or install malicious software.
2) Denial of Service Attacksβ With this type of attack, the web server may crash or become unavailable to the legitimate users.
Domain Name System Hijacking β With this type of attacker, the DNS setting are changed to point to the attackerβs web server. All traffic that was supposed to be sent to the web server is redirected to the wrong one.
3) Sniffingβ Unencrypted data sent over the network may be intercepted and used to gain unauthorized access to the web server.
4) Phishingβ With this type of attack, the attack impersonates the websites and directs traffic to the fake website. Unsuspecting users may be tricked into submitting sensitive data such as login details, credit card numbers, etc.
5) Pharmingβ With this type of attack, the attacker compromises the Domain Name System (DNS) servers or on the user computer so that traffic is directed to a malicious site.
6) Defacementβ With this type of attack, the attacker replaces the organizationβs website with a different page that contains the hackerβs name, images and may include background music and messages.
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Tool designed to help identify incorrectly configured Django applications that are exposing sensitive information.
t.me/undercodeTesting
π¦ ππΌππ πππΈβπ :
> Requirements
Shodan
Pyfiglet
Requests
BeautifulSou
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/hackatnow/djangohunter
2) cd djangohunter
3) Usage: python3 djangohunter.py --key {shodan}
Dorks: 'DisallowedHost',
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ Tool designed to help identify incorrectly configured Django applications that are exposing sensitive information.
t.me/undercodeTesting
π¦ ππΌππ πππΈβπ :
> Requirements
Shodan
Pyfiglet
Requests
BeautifulSou
π¦ πβπππΈπππππΈπππβ & βπβ :
1) git clone https://github.com/hackatnow/djangohunter
2) cd djangohunter
3) Usage: python3 djangohunter.py --key {shodan}
Dorks: 'DisallowedHost',
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦How to Use with stand-alone player on your website
Download asciinema player from player's releases page (you only need .js and .css file), then use it like this:
<html>
<head>
<link rel="stylesheet" type="text/css" href="/asciinema-player.css" />
</head>
<body>
<asciinema-player src="/210648.cast" cols="80" rows="24"></asciinema-player>
...
<script src="/asciinema-player.js"></script>
</body>
</html>
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦How to Use with stand-alone player on your website
Download asciinema player from player's releases page (you only need .js and .css file), then use it like this:
<html>
<head>
<link rel="stylesheet" type="text/css" href="/asciinema-player.css" />
</head>
<body>
<asciinema-player src="/210648.cast" cols="80" rows="24"></asciinema-player>
...
<script src="/asciinema-player.js"></script>
</body>
</html>
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
β β β ο½ππ»βΊπ«Δπ¬πβ β β β
π¦ 2020 DEEPWEBSITES ONLINE > 7/24
24/24
To browse .onion Deep Web links, install Tor Browser from http://torproject.org/
Hidden Service lists and search engines
http://3g2upl4pq6kufc4m.onion/ β DuckDuckGo Search Engine
http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page β Uncensored Hidden Wiki
http://idnxcnkne4qt76tg.onion/ β Tor Project: Anonymity Online
http://torlinkbgs6aabns.onion/ β TorLinks
http://jh32yv5zgayyyts3.onion/ β Hidden Wiki .Onion Urls
http://wikitjerrta4qgz4.onion/ β Hidden Wiki β Tor Wiki
http://xdagknwjc7aaytzh.onion/ β Anonet Webproxy
http://2vlqpcqpjlhmd5r2.onion/ β Gateway to Freenet
http://nlmymchrmnlmbnii.onion/ β Is It Up?
http://wiki5kauuihowqi5.onion/ β Onion Wiki β 650+ working 05.2017 deep web links
http://j6im4v42ur6dpic3.onion/ β TorProject Archive
http://p3igkncehackjtib.onion/ β TorProject Media
http://kbhpodhnfxl3clb4.onion β Tor Search
http://cipollatnumrrahd.onion/ β Cipolla 2.0 (Italian)
Marketplace Financial
http://torbrokerge7zxgq.onion/ β TorBroker β Trade securities anonymously with bitcoin, currently supports nearly 1000 stocks and ETFs
http://fogcore5n3ov3tui.onion/ β Bitcoin Fog β Bitcoin Laundry
http://2vx63nyktk4kxbxb.onion/ β AUTOMATED PAYPAL AND CREDIT CARD STORE
http://samsgdtwz6hvjyu4.onion β Safe, Anonymous, Fast, Easy escrow service.
http://easycoinsayj7p5l.onion/ β EasyCoin β Bitcoin Wallet with free Bitcoin Mixer
http://jzn5w5pac26sqef4.onion/ β WeBuyBitcoins β Sell your Bitcoins for Cash (USD), ACH, WU/MG, LR, PayPal and more
http://ow24et3tetp6tvmk.onion/ β OnionWallet β Anonymous Bitcoin Wallet and Bitcoin Laundry
http://qc7ilonwpv77qibm.onion/ β Western Union Exploit
http://3dbr5t4pygahedms.onion/ β ccPal Store
http://y3fpieiezy2sin4a.onion/ β HQER β High Quality Euro Replicas
http://qkj4drtgvpm7eecl.onion/ β Counterfeit USD
http://nr6juudpp4as4gjg.onion/pptobtc.html β PayPal to BitCoins
http://nr6juudpp4as4gjg.onion/doublecoins.html β Double Your BitCoins
http://lw4ipk5choakk5ze.onion/raw/4588/ β High Quality Tutorials
Marketplace Commercial Services
http://6w6vcynl6dumn67c.onion/ β Tor Market Board β Anonymous Marketplace Forums
http://wvk32thojln4gpp4.onion/ β Project Evil
http://5mvm7cg6bgklfjtp.onion/ β Discounted electronics goods
http://lw4ipk5choakk5ze.onion/raw/evbLewgkDSVkifzv8zAo/ β Unfriendlysolution β Legit hitman service
http://nr6juudpp4as4gjg.onion/torgirls.html β Tor Girls
http://tuu66yxvrnn3of7l.onion/ β UK Guns and Ammo
http://nr6juudpp4as4gjg.onion/torguns.htm β Used Tor Guns
http://ucx7bkbi2dtia36r.onion/ β Amazon Business
http://nr6juudpp4as4gjg.onion/tor.html β Tor Technology
http://hbetshipq5yhhrsd.onion/ β Hidden BetCoin
http://cstoreav7i44h2lr.onion/ β CStore Carded Store
http://tfwdi3izigxllure.onion/ β Apples 4 Bitcoin
http://e2qizoerj4d6ldif.onion/ β Carded Store
http://jvrnuue4bvbftiby.onion/ β Data-Bay
http://bgkitnugq5ef2cpi.onion/ β Hackintosh
http://vlp4uw5ui22ljlg7.onion/ β EuroArms
http://b4vqxw2j36wf2bqa.onion/ β Advantage Products
http://ybp4oezfhk24hxmb.onion/ β Hitman Network
http://mts7hqqqeogujc5e.onion/ β Marianic Technology Services
http://mobil7rab6nuf7vx.onion/ β Mobile Store
http://54flq67kqr5wvjqf.onion/ β MSR Shop
http://yth5q7zdmqlycbcz.onion/ β Old Man Fixerβs Fixing Services
http://matrixtxri745dfw.onion/neo/uploads/MATRIXtxri745dfwONION_130827231336IPA_pc.png β PC Shop
http://storegsq3o5mfxiz.onion/ β Samsung StorE
http://sheep5u64fi457aw.onion/ β Sheep Marketplace
http://nr6juudpp4as4gjg.onion/betcoin.htm β Tor BetCoin
http://qizriixqwmeq4p5b.onion/ β Tor Web Developer
http://vfqnd6mieccqyiit.onion/ β UK Passports
http://en35tuzqmn4lofbk.onion/ β US Fake ID Store
http://xfnwyig7olypdq5r.onion/ β USA Citizenship
http://uybu3melulmoljnd.onion/ β iLike Help Guy
http://dbmv53j45pcv534x.onion/ β Network Consulting and Software Development
http://lw4ipk5choakk5ze.onion/raw/4585/ β Quick Solution (Hitman)
http://nr6juudpp4as4gjg.onion/tynermsr.htm β Tyner MSR Store
Marketplace Drugs
π¦ 2020 DEEPWEBSITES ONLINE > 7/24
24/24
To browse .onion Deep Web links, install Tor Browser from http://torproject.org/
Hidden Service lists and search engines
http://3g2upl4pq6kufc4m.onion/ β DuckDuckGo Search Engine
http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page β Uncensored Hidden Wiki
http://idnxcnkne4qt76tg.onion/ β Tor Project: Anonymity Online
http://torlinkbgs6aabns.onion/ β TorLinks
http://jh32yv5zgayyyts3.onion/ β Hidden Wiki .Onion Urls
http://wikitjerrta4qgz4.onion/ β Hidden Wiki β Tor Wiki
http://xdagknwjc7aaytzh.onion/ β Anonet Webproxy
http://2vlqpcqpjlhmd5r2.onion/ β Gateway to Freenet
http://nlmymchrmnlmbnii.onion/ β Is It Up?
http://wiki5kauuihowqi5.onion/ β Onion Wiki β 650+ working 05.2017 deep web links
http://j6im4v42ur6dpic3.onion/ β TorProject Archive
http://p3igkncehackjtib.onion/ β TorProject Media
http://kbhpodhnfxl3clb4.onion β Tor Search
http://cipollatnumrrahd.onion/ β Cipolla 2.0 (Italian)
Marketplace Financial
http://torbrokerge7zxgq.onion/ β TorBroker β Trade securities anonymously with bitcoin, currently supports nearly 1000 stocks and ETFs
http://fogcore5n3ov3tui.onion/ β Bitcoin Fog β Bitcoin Laundry
http://2vx63nyktk4kxbxb.onion/ β AUTOMATED PAYPAL AND CREDIT CARD STORE
http://samsgdtwz6hvjyu4.onion β Safe, Anonymous, Fast, Easy escrow service.
http://easycoinsayj7p5l.onion/ β EasyCoin β Bitcoin Wallet with free Bitcoin Mixer
http://jzn5w5pac26sqef4.onion/ β WeBuyBitcoins β Sell your Bitcoins for Cash (USD), ACH, WU/MG, LR, PayPal and more
http://ow24et3tetp6tvmk.onion/ β OnionWallet β Anonymous Bitcoin Wallet and Bitcoin Laundry
http://qc7ilonwpv77qibm.onion/ β Western Union Exploit
http://3dbr5t4pygahedms.onion/ β ccPal Store
http://y3fpieiezy2sin4a.onion/ β HQER β High Quality Euro Replicas
http://qkj4drtgvpm7eecl.onion/ β Counterfeit USD
http://nr6juudpp4as4gjg.onion/pptobtc.html β PayPal to BitCoins
http://nr6juudpp4as4gjg.onion/doublecoins.html β Double Your BitCoins
http://lw4ipk5choakk5ze.onion/raw/4588/ β High Quality Tutorials
Marketplace Commercial Services
http://6w6vcynl6dumn67c.onion/ β Tor Market Board β Anonymous Marketplace Forums
http://wvk32thojln4gpp4.onion/ β Project Evil
http://5mvm7cg6bgklfjtp.onion/ β Discounted electronics goods
http://lw4ipk5choakk5ze.onion/raw/evbLewgkDSVkifzv8zAo/ β Unfriendlysolution β Legit hitman service
http://nr6juudpp4as4gjg.onion/torgirls.html β Tor Girls
http://tuu66yxvrnn3of7l.onion/ β UK Guns and Ammo
http://nr6juudpp4as4gjg.onion/torguns.htm β Used Tor Guns
http://ucx7bkbi2dtia36r.onion/ β Amazon Business
http://nr6juudpp4as4gjg.onion/tor.html β Tor Technology
http://hbetshipq5yhhrsd.onion/ β Hidden BetCoin
http://cstoreav7i44h2lr.onion/ β CStore Carded Store
http://tfwdi3izigxllure.onion/ β Apples 4 Bitcoin
http://e2qizoerj4d6ldif.onion/ β Carded Store
http://jvrnuue4bvbftiby.onion/ β Data-Bay
http://bgkitnugq5ef2cpi.onion/ β Hackintosh
http://vlp4uw5ui22ljlg7.onion/ β EuroArms
http://b4vqxw2j36wf2bqa.onion/ β Advantage Products
http://ybp4oezfhk24hxmb.onion/ β Hitman Network
http://mts7hqqqeogujc5e.onion/ β Marianic Technology Services
http://mobil7rab6nuf7vx.onion/ β Mobile Store
http://54flq67kqr5wvjqf.onion/ β MSR Shop
http://yth5q7zdmqlycbcz.onion/ β Old Man Fixerβs Fixing Services
http://matrixtxri745dfw.onion/neo/uploads/MATRIXtxri745dfwONION_130827231336IPA_pc.png β PC Shop
http://storegsq3o5mfxiz.onion/ β Samsung StorE
http://sheep5u64fi457aw.onion/ β Sheep Marketplace
http://nr6juudpp4as4gjg.onion/betcoin.htm β Tor BetCoin
http://qizriixqwmeq4p5b.onion/ β Tor Web Developer
http://vfqnd6mieccqyiit.onion/ β UK Passports
http://en35tuzqmn4lofbk.onion/ β US Fake ID Store
http://xfnwyig7olypdq5r.onion/ β USA Citizenship
http://uybu3melulmoljnd.onion/ β iLike Help Guy
http://dbmv53j45pcv534x.onion/ β Network Consulting and Software Development
http://lw4ipk5choakk5ze.onion/raw/4585/ β Quick Solution (Hitman)
http://nr6juudpp4as4gjg.onion/tynermsr.htm β Tyner MSR Store
Marketplace Drugs
www.torproject.org
The Tor Project | Privacy & Freedom Online
Defend yourself against tracking and surveillance. Circumvent censorship.
http://rso4hutlefirefqp.onion/ β EuCanna β Medical Grade Cannabis Buds, Rick Simpson Oil, Ointments and Creams
http://newpdsuslmzqazvr.onion/ β Peoples Drug Store β The Darkwebβs Best Online Drug Supplier!
http://smoker32pk4qt3mx.onion/ β Smokeables β Finest Organic Cannabis shipped from the USA
http://fzqnrlcvhkgbdwx5.onion/ β CannabisUK β UK Wholesale Cannabis Supplier
http://kbvbh4kdddiha2ht.onion/ β DeDope β German Weed and Hash shop. (Bitcoin)
http://s5q54hfww56ov2xc.onion/ β BitPharma β EU vendor for cocaine, speed, mdma, psychedelics and subscriptions
http://ll6lardicrvrljvq.onion/ β Brainmagic β Best psychedelics on the darknet
http://25ffhnaechrbzwf3.onion/ β NLGrowers β Coffee Shop grade Cannabis from the netherlands
http://fec33nz6mhzd54zj.onion/index.php β Black Market Reloaded Forums
http://atlmlxbk2mbupwgr.onion/ β Atlantis Marketplace Forums
http://atlantisrky4es5q.onion/ β Atlantis Marketplace
http://dkn255hz262ypmii.onion/ β Silk Road Forums
http://4yjes6zfucnh7vcj.onion/ β Drug Market
http://k4btcoezc5tlxyaf.onion/ β Kamagra for BitCoins
http://silkroadvb5piz3r.onion/silkroad/home β Silk Road Marketplace
http://5onwnspjvuk7cwvk.onion/ β Black Market Reloaded
Hosting
http://matrixtxri745dfw.onion/ β Image Uploader
http://lw4ipk5choakk5ze.onion/ β PasteThis β Tor based Pastebin
http://wzrtr6gpencksu3d.onion:8080/ β Gittor
http://nr6juudpp4as4gjg.onion/ β Free hosting
http://tklxxs3rdzdjppnl.onion/ β Libertyβs Hackers Hosting Service
http://matrixtxri745dfw.onion/ β Matrix Trilogy
Blogs
http://74ypjqjwf6oejmax.onion/ β Beneath VT β Exploring Virginia Techβs Steam Tunnels and Beyond
http://76qugh5bey5gum7l.onion/ β Deep Web Radio
http://edramalpl7oq5npk.onion/Main_Page β Encyclopedia Dramatica
http://ih4pgsz3aepacbwl.onion/ β Hushbox
http://ad52wtwp2goynr3a.onion/# β Dark Like My Soul
http://tns7i5gucaaussz4.onion/ β FreeFor
http://gdkez5whqhpthb4d.onion/ β Scientology Archive
http://newsiiwanaduqpre.onion/ β All the latest news for tor
http://5vppavyzjkfs45r4.onion/ β Michael Blizek
http://7ueo7ahq2xlpwx7q.onion/ β AYPSELA News
http://7hk64iz2vn2ewi7h.onion/ β Blog about Stories
http://tigas3l7uusztiqu.onion/ β Mike Tigas
http://mpf3i4k43xc2usxj.onion/ β Sam Whited
http://7w2rtz7rgfwj5zuv.onion/ β An Open Letter to Revolutionaries
http://3c3bdbvhb7j6yab2.onion/ β Totse 2
http://4fvfamdpoulu2nms.onion/ β Lucky Eddieβs Home
http://nwycvryrozllb42g.onion/searchlores/index.htm β Fraviaβs Web Searching Lore
http://newsiiwanaduqpre.onion/ β OnionNews β Blog about the onionland
Forums and Chans
http://2gxxzwnj52jutais.onion/phpbb/index.php β Onion Forum 2.0 renewed
http://3fyb44wdhnd2ghhl.onion/ib/ β Onii-Chan
http://bx7zrcsebkma7ids.onion β Jisko
http://npdaaf3s3f2xrmlo.onion/ β Twitter clone
http://jv7aqstbyhd5hqki.onion β HackBB β Hacking & cracking forum
http://xdagknwjc7aaytzh.onion/20/http/1.4.7.9/forummain.htm β Read only access to the Freenet FMS forums via the Anonet Webproxy
http://sbforumaz7v3v6my.onion/ β SciBay Forums
http://kpmp444tubeirwan.onion/ β DeepWeb
http://r5c2ch4h5rogigqi.onion/ β StaTorsNet
http://hbjw7wjeoltskhol.onion β The BEST tor social network! File sharing, messaging and much more. Use a fake email to register.
http://t4is3dhdc2jd4yhw.onion/ β OnionForum 3.0 β New Onionforum for general talk, now with marketplace
http://zw3crggtadila2sg.onion/imageboard/ β TorChan β One of the oldest chans on Tor
Email and Messaging
http://bitmailendavkbec.onion β swiss email
http://365u4txyqfy72nul.onion/ β Anonymous E-mail sevice. You can only communicate with other users currently using this service. So tell all your friends about it!
http://sms4tor3vcr2geip.onion/ β SMS4TOR β Self destructing messages
http://notestjxctkwbk6z.onion/ β NoteBin β Create encrypted self-destructing notes
http://torbox3uiot6wchz.onion/ β [TorBox] The Tor Mail Box
http://u6lyst27lmelm6oy.onion/index.php β Blue matrix chat NOT UP ALL THE TIME so chek often to see when it is
http://wi7qkxyrdpu5cmvr.onion/ β Autistici/Inventati
http://u4uoz3aphqbdc754.onion/ β Hell Online
Political
http://newpdsuslmzqazvr.onion/ β Peoples Drug Store β The Darkwebβs Best Online Drug Supplier!
http://smoker32pk4qt3mx.onion/ β Smokeables β Finest Organic Cannabis shipped from the USA
http://fzqnrlcvhkgbdwx5.onion/ β CannabisUK β UK Wholesale Cannabis Supplier
http://kbvbh4kdddiha2ht.onion/ β DeDope β German Weed and Hash shop. (Bitcoin)
http://s5q54hfww56ov2xc.onion/ β BitPharma β EU vendor for cocaine, speed, mdma, psychedelics and subscriptions
http://ll6lardicrvrljvq.onion/ β Brainmagic β Best psychedelics on the darknet
http://25ffhnaechrbzwf3.onion/ β NLGrowers β Coffee Shop grade Cannabis from the netherlands
http://fec33nz6mhzd54zj.onion/index.php β Black Market Reloaded Forums
http://atlmlxbk2mbupwgr.onion/ β Atlantis Marketplace Forums
http://atlantisrky4es5q.onion/ β Atlantis Marketplace
http://dkn255hz262ypmii.onion/ β Silk Road Forums
http://4yjes6zfucnh7vcj.onion/ β Drug Market
http://k4btcoezc5tlxyaf.onion/ β Kamagra for BitCoins
http://silkroadvb5piz3r.onion/silkroad/home β Silk Road Marketplace
http://5onwnspjvuk7cwvk.onion/ β Black Market Reloaded
Hosting
http://matrixtxri745dfw.onion/ β Image Uploader
http://lw4ipk5choakk5ze.onion/ β PasteThis β Tor based Pastebin
http://wzrtr6gpencksu3d.onion:8080/ β Gittor
http://nr6juudpp4as4gjg.onion/ β Free hosting
http://tklxxs3rdzdjppnl.onion/ β Libertyβs Hackers Hosting Service
http://matrixtxri745dfw.onion/ β Matrix Trilogy
Blogs
http://74ypjqjwf6oejmax.onion/ β Beneath VT β Exploring Virginia Techβs Steam Tunnels and Beyond
http://76qugh5bey5gum7l.onion/ β Deep Web Radio
http://edramalpl7oq5npk.onion/Main_Page β Encyclopedia Dramatica
http://ih4pgsz3aepacbwl.onion/ β Hushbox
http://ad52wtwp2goynr3a.onion/# β Dark Like My Soul
http://tns7i5gucaaussz4.onion/ β FreeFor
http://gdkez5whqhpthb4d.onion/ β Scientology Archive
http://newsiiwanaduqpre.onion/ β All the latest news for tor
http://5vppavyzjkfs45r4.onion/ β Michael Blizek
http://7ueo7ahq2xlpwx7q.onion/ β AYPSELA News
http://7hk64iz2vn2ewi7h.onion/ β Blog about Stories
http://tigas3l7uusztiqu.onion/ β Mike Tigas
http://mpf3i4k43xc2usxj.onion/ β Sam Whited
http://7w2rtz7rgfwj5zuv.onion/ β An Open Letter to Revolutionaries
http://3c3bdbvhb7j6yab2.onion/ β Totse 2
http://4fvfamdpoulu2nms.onion/ β Lucky Eddieβs Home
http://nwycvryrozllb42g.onion/searchlores/index.htm β Fraviaβs Web Searching Lore
http://newsiiwanaduqpre.onion/ β OnionNews β Blog about the onionland
Forums and Chans
http://2gxxzwnj52jutais.onion/phpbb/index.php β Onion Forum 2.0 renewed
http://3fyb44wdhnd2ghhl.onion/ib/ β Onii-Chan
http://bx7zrcsebkma7ids.onion β Jisko
http://npdaaf3s3f2xrmlo.onion/ β Twitter clone
http://jv7aqstbyhd5hqki.onion β HackBB β Hacking & cracking forum
http://xdagknwjc7aaytzh.onion/20/http/1.4.7.9/forummain.htm β Read only access to the Freenet FMS forums via the Anonet Webproxy
http://sbforumaz7v3v6my.onion/ β SciBay Forums
http://kpmp444tubeirwan.onion/ β DeepWeb
http://r5c2ch4h5rogigqi.onion/ β StaTorsNet
http://hbjw7wjeoltskhol.onion β The BEST tor social network! File sharing, messaging and much more. Use a fake email to register.
http://t4is3dhdc2jd4yhw.onion/ β OnionForum 3.0 β New Onionforum for general talk, now with marketplace
http://zw3crggtadila2sg.onion/imageboard/ β TorChan β One of the oldest chans on Tor
Email and Messaging
http://bitmailendavkbec.onion β swiss email
http://365u4txyqfy72nul.onion/ β Anonymous E-mail sevice. You can only communicate with other users currently using this service. So tell all your friends about it!
http://sms4tor3vcr2geip.onion/ β SMS4TOR β Self destructing messages
http://notestjxctkwbk6z.onion/ β NoteBin β Create encrypted self-destructing notes
http://torbox3uiot6wchz.onion/ β [TorBox] The Tor Mail Box
http://u6lyst27lmelm6oy.onion/index.php β Blue matrix chat NOT UP ALL THE TIME so chek often to see when it is
http://wi7qkxyrdpu5cmvr.onion/ β Autistici/Inventati
http://u4uoz3aphqbdc754.onion/ β Hell Online
Political