Search results

  1. Ghosthunter

    How to create your website on the Darknet (.onion)

    Firstly, even on the site of the TOP project itself, you can find instructions for creating a site in the onion zone. Here is the link https://www.torproject.org/docs/tor-hidden-service.html.en Step-by-step guidelines are everywhere on the web At the moment, there are no hosting sites that...
  2. Ghosthunter

    Stealers, installations for the little ones

    Peace to all, the topic is quite relevant and at the same time long forgotten by many, but it needs to be discussed. Let's talk about stealers, their relevance and which ones are better to buy, the question is pretty strange, since all stealers are similar, they are all sold in the public domain...
  3. Ghosthunter

    Virus detection and removal

    Fighting and eliminating viruses on your computer Many people say that an antivirus is not needed on a computer, especially if you download only official programs and games. But no one is immune from any unforeseen situation, so you shouldn't take it carelessly, because now technologies are...
  4. Ghosthunter

    Carding Method Traffic

    Enter the data. Ready. That's all, the money will come within 10-15 minutes. With the rest of the file hosting services, everything is the same. CONCLUSION Now you have completely read my scheme and you can start raising money. It is important to follow the sequence of actions described...
  5. Ghosthunter

    Carding Method Traffic

    This is the purchase of goods in online stores with these cards. They are obtained by hackers by breaking into shops. There is a direction of offline carding, there is an online one. Online is the most common, real is already dying. In online there is driving in things and driving in info goods...
  6. Ghosthunter

    What is a botnet, its architecture, and how does it work?

    LET'S GO Cyberattacks often make headlines in today's digital environment. At any time, anyone who uses a computer can become a victim of a cyber attack. There are various types, from phishing to DDoS and password attacks. There are many dangers to network security on the Internet. Many of...
  7. Ghosthunter

    Top selection of hosting services for projects

    The process of creating a website is always accompanied by various technical nuances, and this does not depend on the purpose of the created Internet platform, the developer's experience and professionalism. The most frequent questions include choosing a hosting provider that provides hosting...
  8. Ghosthunter

    DDOS Attack using Google Spreadsheet

    Google uses its "spider" FeedFetcher to cache any content in Google Spreadsheet inserted using the formula =image("link"). https://docs.google.com/spreadsheet/ For example, if you insert a formula in one of the table cells Code: =image("http://example.com/image.jpg") Google will send the...
  9. Ghosthunter

    DDOS Attacks and Hackers

    Somehow in 2012, it took them into their heads to put the entire world Internet to hell. They were going to do this by hacking root DNS servers of which there are 13 pieces mainly in the USA, and they are responsible for them large organizations. The entire DNS system is based on them, and DNS...
  10. Ghosthunter

    DDOS Attacks and Hackers

    Well, usually a few men gather in a dark room that is illuminated only by the light from the screens, or a cheap neon. Mandatory attributes: everyone in the room must wear a Guy Fawkes mask, because we are for complete anonymity. The dress code is dark jeans and a plain hoodie. And for the...
  11. Ghosthunter

    Top selection of project hosting

    Wrench in touch! The process of creating a website is always accompanied by the emergence of all sorts of technical nuances, and this does not depend on the purpose of the created Internet site, the experience and professionalism of the developer. Choosing a hosting provider is one of the most...
  12. Ghosthunter

    Stealer Logs PayPal / CC Ebay

    As for Ebay - on this site we will be able to buy / carding the same thing or equipment (we will immediately clarify - liquidity comes in less often than illiquid stock, for example - we tried to drive in an iPhone 7+ for $ 750 - it did not give us, but trying to carding an illiquid asset "...
  13. Ghosthunter

    What is CORS and how does it help you avoid having your money stolen?

    The " * " character tells the browser to allow access to the resource from any source, effectively disabling the Same-Origin Policy. This means that the browser will not filter sources. Any code on any site can make a request to the resource (including malicious domains). In addition, the "*"...
  14. Ghosthunter

    What is CORS and how does it help you avoid having your money stolen?

    In this article, we will explain what the CORS policy is and what CORS is in general, as well as how it is useful for developers. For modern web applications, downloading resources from multiple domains is a common practice. These resources are accessed using CORS technology. For example, if...
  15. Ghosthunter

    Carding training: working with a stealer.

    Example of a decorated stealer archive Archive. In the archive .txt file with instructions. Archive with stealer and .bat file to kill windows defender. Files with a password. The icon and description correspond to the file name. At startup, the user receives a fake window with...
  16. Ghosthunter

    Carding training: working with a stealer.

    All information provided is for informational purposes only and does not encourage you to take actions that violate the law! We help you protect your confidential data. In order for you to succeed, you should definitely subscribe to our projects in order to keep up to date with all the events...
  17. Ghosthunter

    What is a stealer and how to work with it

    1) Install Exchanges (or PPI Affiliate Programs) What do these screenshots tell you? These are the prices of intermediaries for installations. Personally, what tells me and my team is that they inflate the price several times from the initial costs. That's what I'm going to tell you now An...
  18. Ghosthunter

    What is a stealer and how to work with it

    You can briefly describe the functionality of the code as follows: we create a new exception handler and place it at 13147C62. Code emulators that are unable to properly determine the program execution logic assume that after infinite recursion at address 13147C58, control will be transferred to...
  19. Ghosthunter

    What is a stealer and how to work with it

    And now we will proceed directly to decryption. The Chrome database is encrypted by the Data Protection Application Programming Interface (DPAPI) mechanism. The essence of this mechanism is that data can only be decrypted under the account under which it was encrypted. In other words, you can't...
  20. Ghosthunter

    What is a stealer and how to work with it

    Code: int status = CopyFile(browser_db, TEXT(".\\db_tmp"), FALSE); if (!status) { // return 0; } Now we connect to the database with the sqlite3_open_v2 command. Its prototype: Code: int sqlite3_open_v2( const char *filename, /* Database filename (UTF-8) */ sqlite3 **ppDb, /* OUT...
Top