Home
Forums
New posts
Search forums
What's new
New posts
New profile posts
Latest activity
Members
Current visitors
New profile posts
Search profile posts
Log in
Register
What's new
Search
Search
Search titles only
By:
New posts
Search forums
Menu
Log in
Register
Install the app
Install
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Reply to thread
Home
Forums
CARDING & HACKING
HOSTING & BOTNET
Working with a stealer from A to Z
Message
<blockquote data-quote="Ghosthunter" data-source="post: 538" data-attributes="member: 6"><p>7) Go to yandex. Mail. Immediately open the tabs - gmail.com, yahoo.com, outlook.live.com and we'll see if it's been sent to our email address. If it doesn't work, you might want to try downloading other cookies and deleting the previous ones. Or use the password file.txt from the log and try logging in yourself.</p><p></p><p>First of all, we need to find profitable links, a small list is in the channel with manuals and you can add them to your stiller so that the log is marked if it has the right link.</p><p></p><p>We decided on the links, for example this binance.com and blockchain.com:</p><p></p><p>In your file passwords.txt there must be a username/password, we look at it and use it. We try to log in to binance by using cookies, just by opening the site. Sometimes it lets you in.</p><p></p><p><strong>Do you have a balance</strong>? Great, if the account does not have 2FA, then we just make a withdrawal to your wallet, confirming the withdrawal by email.</p><p></p><p><strong>Is it worth 2FA?</strong> A problem of course, but not a big one. If you are sure that there is a good amount on your balance - this can be determined by the letters about depositing/withdrawing funds in the mail, that is, people who withdraw 2FA for a percentage and bypass any verifications.</p><p></p><p>With blockchain.com everything is much simpler. Log in using your username / password->you will receive an email message to confirm your login->confirm and log in. 2FA is very rare here, less than 10% of people have it. If we only know that an account is registered for this email address and nothing else, then go to blockchain.com->Login and restore your username, it will be sent to your email address. Knowing your username, you can already try to choose a password.</p><p></p><p>I recommend that you immediately delete your emails from the log owner's email address or send them to spam.</p><p></p><p>We will also work with other crypto exchanges for similar actions.</p><p></p><h4>We get free and high-quality videos for our YouTube channel:</h4><p>The scheme is simple, proven and works.</p><p></p><p><strong>We publish a Video Editor vacancy.</strong></p><p></p><p>We describe it within reason, do not bend the salary or promise something exorbitant. People start emailing us and asking about our work. We wait 15-20 hours and tell them that the vacancy is still available and you are ready to hire a person. But you will not take just anyone, and this requires you to complete a small test task, namely, to make a video.</p><p></p><p>The pros are that you can spam everywhere en masse, the vacancy does not belong to something forbidden, and moderators always skip it and do not delete it. And if you also hire a person for spam and make an autoresponder to the email....)</p><p></p><p>This scheme can be customized.</p><p></p><h4>Example of a decorated stiller archive</h4><p>Archive.</p><p></p><p><img src="https://telegra.ph/file/542a88d3f070ed8831d09.jpg" alt="542a88d3f070ed8831d09.jpg" class="fr-fic fr-dii fr-draggable " style="" /></p><p></p><p></p><p>In the archive .txt file with instructions</p><p></p><p><img src="https://telegra.ph/file/8c0bd83b0b3c6a1168088.jpg" alt="8c0bd83b0b3c6a1168088.jpg" class="fr-fic fr-dii fr-draggable " style="" /></p><p></p><p></p><p>Archive with stiller and .bat file to kill windows defender. Files with a password.</p><p></p><p>The icon and description correspond to the file name.</p><p></p><p><img src="https://telegra.ph/file/29b6328ff36c3a0e611ba.jpg" alt="29b6328ff36c3a0e611ba.jpg" class="fr-fic fr-dii fr-draggable " style="" /></p><p></p><p></p><p>At startup, the user receives a fake window with an error.</p><p></p><p><img src="https://telegra.ph/file/c6ae7b90574bcaafc1eac.jpg" alt="c6ae7b90574bcaafc1eac.jpg" class="fr-fic fr-dii fr-draggable " style="" /></p><p></p><p></p><p>Almost any crypter has a fake error function and can add an icon\description.</p><p></p><h4>Getting the logs of the countries we need:</h4><p>Installs are installations of your file on the user's computer. If the user is asleep and the computer is turned off, the file will not start accordingly.</p><p></p><p>Selecting night time for countries that you don't want to see in your logs. Or vice versa - we select daytime/evening time for the countries we need.</p><p></p><h4>Manual for working with install services</h4><p>The first thing to know is that the logs go into several hands and you need to work them out in the very near future. Or another person will do it for you. So everywhere and there are no exceptions.</p><p></p><p>If you buy two streams of 1000 installs at the same time, you get an intersection in your logs. As a result, logs will be received only from one thread, and the money for the second one will be wasted.</p><p></p><p>Buying 1000 installations and immediately after completing another 1000-you risk getting the same intersections, in the second stream there will be duplicate logs from the first stream. Buy 2000 or any desired amount in one stream at once. Or take a break between streams for at least a day.</p><p></p><p>You can always take fewer installs. 100, 250, or any other number. The price tag is indicated for 1000, respectively, for 100 you will pay 10 times less.</p><p></p><p>Don't forget that you can pause the stream or replace the file at any time(if there are detections). Do not wait until 1000 installs are spilled, if you see that you have received the desired log, then immediately pause it. Or maybe you need to leave on your own business, we also put a pause. This will help you avoid wasting your logs.</p></blockquote><p></p>
[QUOTE="Ghosthunter, post: 538, member: 6"] 7) Go to yandex. Mail. Immediately open the tabs - gmail.com, yahoo.com, outlook.live.com and we'll see if it's been sent to our email address. If it doesn't work, you might want to try downloading other cookies and deleting the previous ones. Or use the password file.txt from the log and try logging in yourself. First of all, we need to find profitable links, a small list is in the channel with manuals and you can add them to your stiller so that the log is marked if it has the right link. We decided on the links, for example this binance.com and blockchain.com: In your file passwords.txt there must be a username/password, we look at it and use it. We try to log in to binance by using cookies, just by opening the site. Sometimes it lets you in. [B]Do you have a balance[/B]? Great, if the account does not have 2FA, then we just make a withdrawal to your wallet, confirming the withdrawal by email. [B]Is it worth 2FA?[/B] A problem of course, but not a big one. If you are sure that there is a good amount on your balance - this can be determined by the letters about depositing/withdrawing funds in the mail, that is, people who withdraw 2FA for a percentage and bypass any verifications. With blockchain.com everything is much simpler. Log in using your username / password->you will receive an email message to confirm your login->confirm and log in. 2FA is very rare here, less than 10% of people have it. If we only know that an account is registered for this email address and nothing else, then go to blockchain.com->Login and restore your username, it will be sent to your email address. Knowing your username, you can already try to choose a password. I recommend that you immediately delete your emails from the log owner's email address or send them to spam. We will also work with other crypto exchanges for similar actions. [HEADING=3]We get free and high-quality videos for our YouTube channel:[/HEADING] The scheme is simple, proven and works. [B]We publish a Video Editor vacancy.[/B] We describe it within reason, do not bend the salary or promise something exorbitant. People start emailing us and asking about our work. We wait 15-20 hours and tell them that the vacancy is still available and you are ready to hire a person. But you will not take just anyone, and this requires you to complete a small test task, namely, to make a video. The pros are that you can spam everywhere en masse, the vacancy does not belong to something forbidden, and moderators always skip it and do not delete it. And if you also hire a person for spam and make an autoresponder to the email....) This scheme can be customized. [HEADING=3]Example of a decorated stiller archive[/HEADING] Archive. [IMG alt="542a88d3f070ed8831d09.jpg"]https://telegra.ph/file/542a88d3f070ed8831d09.jpg[/IMG] In the archive .txt file with instructions [IMG alt="8c0bd83b0b3c6a1168088.jpg"]https://telegra.ph/file/8c0bd83b0b3c6a1168088.jpg[/IMG] Archive with stiller and .bat file to kill windows defender. Files with a password. The icon and description correspond to the file name. [IMG alt="29b6328ff36c3a0e611ba.jpg"]https://telegra.ph/file/29b6328ff36c3a0e611ba.jpg[/IMG] At startup, the user receives a fake window with an error. [IMG alt="c6ae7b90574bcaafc1eac.jpg"]https://telegra.ph/file/c6ae7b90574bcaafc1eac.jpg[/IMG] Almost any crypter has a fake error function and can add an icon\description. [HEADING=3]Getting the logs of the countries we need:[/HEADING] Installs are installations of your file on the user's computer. If the user is asleep and the computer is turned off, the file will not start accordingly. Selecting night time for countries that you don't want to see in your logs. Or vice versa - we select daytime/evening time for the countries we need. [HEADING=3]Manual for working with install services[/HEADING] The first thing to know is that the logs go into several hands and you need to work them out in the very near future. Or another person will do it for you. So everywhere and there are no exceptions. If you buy two streams of 1000 installs at the same time, you get an intersection in your logs. As a result, logs will be received only from one thread, and the money for the second one will be wasted. Buying 1000 installations and immediately after completing another 1000-you risk getting the same intersections, in the second stream there will be duplicate logs from the first stream. Buy 2000 or any desired amount in one stream at once. Or take a break between streams for at least a day. You can always take fewer installs. 100, 250, or any other number. The price tag is indicated for 1000, respectively, for 100 you will pay 10 times less. Don't forget that you can pause the stream or replace the file at any time(if there are detections). Do not wait until 1000 installs are spilled, if you see that you have received the desired log, then immediately pause it. Or maybe you need to leave on your own business, we also put a pause. This will help you avoid wasting your logs. [/QUOTE]
Name
Verification
Post reply
Home
Forums
CARDING & HACKING
HOSTING & BOTNET
Working with a stealer from A to Z
Top