banner Expire 10 May 2025
adv exp at 20 January 2025
Rescator cvv and dump shop
Money Club cc shop
Patrick Stash
banner expire at 13 August 2024
Kfc Club
BidenCash Shop
Yale lodge shop
UniCvv
Carding.pw carding forum

Search results

  1. Mr.Tom

    Hacking packs

    4gb https://megaup.net/1RNz/CEH_stuff.part01.rar 4gb https://megaup.net/1RNk/CEH_stuff.part02.rar 4gb https://megaup.net/1RS4/CEH_stuff.part03.rar 4gb https://megaup.net/1rRu/CEH_stuff.part04.rar 4gb https://megaup.net/2hTu/CEH_stuff.part05.rar 4gb...
  2. Mr.Tom

    Most demanded video tutorials in market.

    Lynda Complete WordPress Tutorial http://www.fwebooks.xyz/2017/12/01/lynda-wordpress-tutorial-full-course-full-wordpress-tutorial/ Basic HTML and CSS Tutorial For Beginners http://www.fwebooks.xyz/2017/12/01/...utorial-for-beginner-designers-free-download/ Udemy JQuery Tutorial...
  3. Mr.Tom

    Complete azure web developer course.

    This course is designed for web developers who wants to learn about clouds and how to use cloud as a host for their websites. we will be talking about how to develop projects in azure and make them live, also how to use virtual machines just like our computer and make them host for our websites...
  4. Mr.Tom

    How to recieve all your android messages on pc

    Many of you works on your PC for a long and at that it looks quite difficult to pickup android and read out every SMS received on it. Mostly when you device is on charging and you working at distance from it Steps To Get All Your Android SMS On PC:- 1. First of all download and install app...
  5. Mr.Tom

    Want to play Pacman Game at google ?

    Hi friends , This is very cool trick ever . You know you can play pacman game in google search engine. Google provides this facilities for you. Now i used to spent the time with this pacman game. The fun is there is sound for this game. Want to play the game? Then visit www.google.com/pacman
  6. Mr.Tom

    How to Protect Microsoft 2003 documents using password?

    Sometime we need to protect our Microsoft document like word,powerpoint. It may have confidential data. ,so we have to protect using password. In this article will guide you to create the password protected document. Open the Microsoft document or create New Microsoft document(whatever...
  7. Mr.Tom

    Axcrypt Software-an encrypting software tool

    Hi friends now you know about encryptions right ? if you don’t know about encryption ,please read this article Introduction to cryptography Now you know the importance of encryption. If you like to protect your documents using encryption, then here is the tool for you. This is open source...
  8. Mr.Tom

    How to use the Axcrypt for encryption?

    In my last i gave you details about Axcrypt. In this post i am going to guide you how to encrypt the file using Axcrypt software. Download the Axcrypt from here: http://space.dl.sourceforge.net/project/axcrypt/AxCrypt/1.6.4.4/AxCrypt-Setup.exe If the above link is not working then try this...
  9. Mr.Tom

    C program Memory Space Eater virus

    Hi friends this is BreakTheSec. I am going to give you C program to eat the memory in Hard drive. This virus is able to eat the memory space 1 GB per minute. So Becareful with this virus. #include<stdio.h> #include<conio.h> #include<dos.h> #include<stdlib.h> FILE *a,*t,*b; int...
  10. Mr.Tom

    Trick To Play hidden Snake Game In Youtube

    Hi friends, this is simple trick to play hidden snake game in youtube. Follow my steps to know how to play. 1.Goto youtube and open any video for streaming 2.When the video is streaming Hold “left button of mouse + Left arrow on keyboard + Top arrow on keyboard”. 3.Now you will see that the...
  11. Mr.Tom

    Error Deleting File or Folder-How to delete the file?

    when you delete some files, they will show windows error like “Error Deleting File or folder”. Now i am going to guide you to delete such files. You may meet with these errors: Cannot delete file: Access is denied There has been a sharing violation. The source or destination file may be in...
  12. Mr.Tom

    Safe3 Scanner

    Safe3WVS is one of the most powerful web vulnerability testing tool. It comes with web spider crawling technology, especially web portals. It is the fastest tool to find issues like SQL injection, upload vulnerability, and more. Features: Full support for Basic, Digest and HTTP authentications...
  13. Mr.Tom

    Zenmap

    Zenmap is the official Nmap Security Scanner software. It is a multi-platform free and open source application. It is easy to use for beginners but also offers advanced features for experienced users. Features: Interactive and graphical results viewing It summarizes details about a single host...
  14. Mr.Tom

    Password Reset in Linux

    To interrupt the GRUB boot (first step) while starting the computer, press and hold the SHIFT key - it always works, even on Linux Mint, where the GRUB menu is turned off by default. Stop the download by holding down the SHIFT key while starting the computer, you will see: Press the " e "...
  15. Mr.Tom

    CloudFlare

    CloudFlare is CDN with robust security features. Online threats range from comment spam and excessive bot crawling to malicious attacks like SQL injection. It provides protection against comment spam, excessive bot crawling, and malicious attacks. Feature: It is an enterprise-class DDoS...
  16. Mr.Tom

    Hacking With Cromos

    Cromos is a utility for modifying Chrome extensions and embedding your code in them. Allows you to create your own executable files and place files in Dropbox. Thus, we can embed our code in any extension that is in Google. How can this be used? We can take any extension that is in public, we...
  17. Mr.Tom

    Backbox

    BackBox is an Open Source Community project with the objective of enhancing the culture of security in IT environment. It is available in two different variations like Backbox Linux and Backbox Cloud. It includes some of the most commonly known/used security and analysis tools. Features: It is...
  18. Mr.Tom

    MSFVenom Kali Linux

    In this tutorial you will learn how to Hack any Android mobile phone using MSFVenom. Requirements Linux Based Operating System (In this tutorial we are using Kali Linux 2017.2) Metasploit Framework MSFVenom is a hacking tool that targets the Android operating system. The tool is a combination of...
  19. Mr.Tom

    Arpspoofing-Arppoisoning

    Welcome back today we will talk about Man-in-the-middle attacks. In computer security, a man-in-the-middle attack (often abbreviated mitm, or the same using all capital letters) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe...
  20. Mr.Tom

    Music Instruments And DJ Equipment Cardable Site

    Methid: Bill=Ship method for expensive dj equipments and instruments, Has lights and stuff too! Proof: https://ibb.co/3CGQmPC Site: Fullcompass.com
Top