Search results

  1. Ghosthunter

    What is a stealer and how to work with it

    1. What is stealer? Stealer - software that steals the personal data of the person who launched stealer itself on their computer / laptop. 2. How is the stilling process going? Initially, you will have to take into account the fact that there are stealers that cannot be calculated due to...
  2. Ghosthunter

    One of the ways to extract traffic in 2023

    - Disable alerts in the settings Let's go through the rest of the sites. Tick tok also gives a good boost. Fill in the videos. By the type I hacked this account. People click through, download, and install, but mostly tier 2 and tier 3. But if the video flies in some magical way in the...
  3. Ghosthunter

    One of the ways to extract traffic in 2023

    Flood of torrents I left this area a long time ago, although it brought some income, but due to the fact that the admins got fat and started asking for many times more than I received from logs that fell from torrents. The point is simple. How to create a torrent file: It is advisable to...
  4. Ghosthunter

    One of the ways to extract traffic in 2023

    Stock market At the moment, there are not many relevant exchanges. BoostAds - Pay Per Install Network Boostads is the highest paying pay per install network. Our company gives best affiliate rates for desktop and mobile advertisement. boostads.net sterkly Performance-based affiliate and...
  5. Ghosthunter

    One of the ways to extract traffic in 2023

    I always chose premium delivery, but this time I limited myself to simple delivery. So see for yourself. On the next page, there is such an item as forwarding the token to another address. It is best to use the address of USA, preferably in the same state or city!!! If you want to send it to...
  6. Ghosthunter

    One of the ways to extract traffic in 2023

    You get these launchers with the downloadandexecute function, of course this is better than inflating the file to hell knows how many MB, so the best option. Because of the scarcity, I decided to open it, see how it works and make it for myself, it turned out in the end: Of course, we...
  7. Ghosthunter

    One of the ways to extract traffic in 2023

    You get these launchers with the downloadandexecute function, of course this is better than inflating the file to hell knows how many MB, so the best option. Because of the scarcity, I decided to open it, see how it works and make it for myself, it turned out in the end: Of course, we...
  8. Ghosthunter

    One of the ways to extract traffic in 2023

    Let's start, I think, with the basics and the very beginning. Current file types for infection at the moment: Name.exe A regular encrypted file, usually disguised as a token. Personally, I use a dropper and inflate the file itself to 20-50 MB. I put the launch in 20-30 seconds, since some...
  9. Ghosthunter

    Working with a stealer from A to Z

    Promoting your site: This bundle works quite well, but requires time and financial costs. 1. Your own site of any fake software that may not even exist. I advise you to consider the topic of "Windows boosters". 2. YouTube channel where we publish videos. 3. Social networks-ideally cover this...
  10. Ghosthunter

    Working with a stealer from A to Z

    7) Go to yandex. Mail. Immediately open the tabs - gmail.com, yahoo.com, outlook.live.com and we'll see if it's been sent to our email address. If it doesn't work, you might want to try downloading other cookies and deleting the previous ones. Or use the password file.txt from the log and try...
  11. Ghosthunter

    Working with a stealer from A to Z

    The list of links may be useful to someone...
  12. Ghosthunter

    Working with a stealer from A to Z

    Working with a stealer from A to Z. We earn money on cryptocurrency. Review. The project itself and the opinion. Choosing a Stealer Ideal option for the price/quality ratio - RedLine The price is from$ 100 per month and up to $ 500 for a perpetual license. If there is not so much money, then...
  13. Ghosthunter

    Stories about logs

    Today we will talk about logs, and more precisely, about how they earn money. For example, in electronics stores and various perfume salons, you can not give a gift, but let the person choose it personally. Only here you give not a physical card carrier, but an electronic one. You send such a...
  14. Ghosthunter

    Crypt logs, how to work?

    https://minergate.com Welcome to FaucetHub.io | FaucetHub - Bitcoin Micropayment Service https://www.eobot.com HashFlare - Maintenance You should also look at the following exchanges: Exmo, Binance, Bittrex, Cryptopia, Yobit, Livecoin, StocksExchange. You should always keep your email...
  15. Ghosthunter

    Crypt logs, how to work?

    Let's go in order. The first thing we see in this example is 12 words for restoring a blockchain wallet. There is also a username above, but no password. The password, by the way, is most likely suitable from the file with logs/passes. But that's not the point right now. If there are 12...
  16. Ghosthunter

    Crypt logs, how to work?

    To the point: Go to the log, then to the "wallets" folder, then to "Exodus". Download the Exodus client. All you need to do is replace the files in the %AppData%\Roaming\Exodus\exodus.wallet \ folder with the files from the log and launch the client. Electrum: Download the Electrum...
  17. Ghosthunter

    How do I collect logs? How to stay hidden and safe from stealers?

    Many of those who read this at least once heard about "logs", first let's figure out what it is in general: Log - a unit of user data, roughly speaking your log is your entire life on the Internet, all your passwords, logins, cookies, browser history(in some cases including incognito) is...
  18. Ghosthunter

    CC Mining (FULL INFO)

    I can show you another fake profit variant: Sends ext. CC. log and pass from aka skril . As you understand, there are just a lot of options for making money using this scheme. It is also worth considering that in addition to the pros, there will also be cons . The main disadvantage is that...
  19. Ghosthunter

    CC Mining (FULL INFO)

    Screen (the screen shows the link replacement ) Next, we check everything for performance. To do this, open the fake file in the browser, enter the data and see if the report was sent to the email address. Screen (the screen shows a fake check. After successfully sending the data, the client...
  20. Ghosthunter

    CC Mining (FULL INFO)

    Goals and objectives: Using phishing emails to get CC (fullz) Equipment: shells. Domain + hosting. fake pp page. GUI application. Script for sending emails. Script for sending a report to an email address. Mail base. MOVE ROBOTS: 1) Preface: Today we will learn an effective method of mining...
Top