banner Expire 10 May 2025
adv exp at 20 January 2025
Rescator cvv and dump shop
Money Club cc shop
Patrick Stash
banner expire at 13 August 2024
Kfc Club
BidenCash Shop
Yale lodge shop
UniCvv
Carding.pw carding forum

Search results

  1. Mr.Tom

    ReconT - Reconnaisance / Footprinting / Information Disclosure

    Recon-Tool made for reconnaissance and information gathering with an emphasis on simplicity. It will do everything from. Features Information Security Headers WAF Detector Banner Grabbing Phone Number Credit Card Number Email US Social Security Number Url Crawl Dom Paramter Url Internal...
  2. Mr.Tom

    CQTools - The New Ultimate Windows Hacking Toolkit

    CQURE Team has prepared tools used during penetration testing and packed those in a toolkit named CQTools. This toolkit allows to deliver complete attacks within the infrastructure, starting with sniffing and spoofing activities, going through information extraction, password extraction, custom...
  3. Mr.Tom

    BruteDum - Brute Force Attacks SSH, FTP, Telnet etc.

    BruteDum is a SSH, FTP, Telnet, PostgreSQL, RDP, VNC brute forcing tool with Hydra, Medusa and Ncrack. BruteDum can work with aany Linux distros if they have Python 3. Features of BruteDum SSH, FTP, Telnet, PostgreSQL, RDP, VNC with Hydra (recommended) SSH, FTP, Telnet, PostgreSQL, RDP, VNC...
  4. Mr.Tom

    Termshark - A Terminal UI For Tshark, Inspired By Wireshark

    A terminal user-interface for tshark, inspired by Wireshark. If you're debugging on a remote machine with a large pcap and no desire to scp it back to your desktop, termshark can help! Features Read pcap files or sniff live interfaces (where tshark is permitted). Inspect each packet using...
  5. Mr.Tom

    Chrome 72.0.3626.119 FileReader Use-After-Free

    This exploit takes advantage of a use after free vulnerability in Google Chrome 72.0.3626.119 running on Windows 7 x86. The FileReader.readAsArrayBuffer function can return multiple references to the same ArrayBuffer object, which can be freed and overwritten with sprayed objects. The dangling...
  6. Mr.Tom

    How to HACK and Access Someone PC's How to hack computer

    first of all, you need them IP Address IP Address: Generate a Link which you send to your victim. If he clicks it, his IP will be sent to your email inbox. http://getthierip.com http://whatstheirip.com http://IPlogger.com - then, open up notepad and write this commands: Bash: cd\ cls REM...
  7. Mr.Tom

    Blackeye Phishing Tool

    Description BLACKEYE is an upgrade from original ShellPhish Tool (https://github.com/thelinuxchoice/shellphish) by thelinuxchoice under GNU LICENSE. It is the most complete Phishing Tool, with 32 templates +1 customizable. WARNING: IT ONLY WORKS ON LAN! This tool was made for educational...
  8. Mr.Tom

    Bandit - Tool Designed To Find Common Security

    Bandit is a tool designed to find common security issues in Python code. To do this Bandit processes each file, builds an AST from it, and runs appropriate plugins against the AST nodes. Once Bandit has finished scanning all the files it generates a report. Bandit was originally developed within...
  9. Mr.Tom

    Scavenger - Crawler Searching

    Just the code of my OSINT bot searching for sensitive data leaks on different paste sites. Search terms: credentials private RSA keys Wordpress configuration files MySQL connect strings onion links links to files hosted inside the onion network (PDF, DOC, DOCX, XLS, XLSX) Keep in mind: This...
  10. Mr.Tom

    Trigmap - A Wrapper For Nmap

    Trigmap is a wrapper for Nmap. You can use it to easily start Nmap scan and especially to collect informations into a well organized directory hierarchy. The use of Nmap makes the script portable (easy to run not only on Kali Linux) and very efficient thanks to the optimized Nmap algorithms...
  11. Mr.Tom

    Brutemap - Tool That Automates Testing Accounts

    Brutemap is an open source penetration testing tool that automates testing accounts to the site's login page, based on Dictionary Attack. With this, you no longer need to search for other bruteforce tools and you also no longer need to ask CMS What is this? only to find parameter forms, because...
  12. Mr.Tom

    Miteru - An Experimental Phishing Kit Detection Tool

    Miteru is an experimental phishing kit detection tool. How it works It collects phishy URLs from the following feeds: CertStream-Suspicious feed via urlscan.io OpenPhish feed via urlscan.io PhishTank feed via urlscan.io Ayashige feed It checks each phishy URL whether it enables directory...
  13. Mr.Tom

    VMware Workstation DLL Hijacking

    VMware Workstation versions prior to 15.1.0 suffer from a dll hijacking vulnerability. MD5 | e4ae43fff5271c25af6a88e2b9cdeb55 Download https://www.vmware.com/security/advisories/VMSA-2019-0007.html
  14. Mr.Tom

    PasteShr 1.6 SQL Injection

    PasteShr version 1.6 suffers from multiple remote SQL injection vulnerabilities. MD5 | 7a51baa5eca6c04a0eb42f1e84db549c Download
  15. Mr.Tom

    HOT 23 Express VPN Accounts | Freshly Checked

    xpress VPN accounts with activation codes, user/pass and subscription ID.
  16. Mr.Tom

    1600 Webmail/SMTP - Cracked Logins - Private

    1600 Webmail/SMTP - Cracked Logins - Private https://pastebin.com/cPrtWdQX
  17. Mr.Tom

    Searching For Vulnerability Flaws Using GoLismero

    What is GoLismero? GoLismero is a pure python written Web Knife. This vulnerability assessment tool can easily be expanded to other kind of scans since it can run it's own security tests and manage lots' of well known security tools e.g SQLMap,robot analyzer,OpenVas ad a lot more like the one...
  18. Mr.Tom

    Carding Course Free Download in 2022 Beginner to Pro

    Carding Tutorial 4 Beginners Carding tutorial for Noobs Carding Tutorial with Sites and Bins Carding Ukash To Perfect Money Tutorial Carding Vocabulary&understanding terms CC Balance Checking Method 7 Drop Methods 7 Reasons a Credit Card is blocked 10 Step Cashout CVVs to E-GiftCards Be 100%...
  19. Mr.Tom

    The only real way to check credit cards

    So as we all know most sites, verifiedcarder.net, Vault Market, even Feshop, etc. all have nifty little card checkers to check the card before, or after we buy it so that it is 'live' or has balance and will not be declined at the order payment for whatever site you are using. If you plan to use...
  20. Mr.Tom

    7 Drop Methods for carded product

    I've been collecting methods for many things for years. Here is my collection of methods I've found free online over the years. None of these have been leaked from paid ebooks. I will include links to the source where possible. All these are pretty standard, they are just to provide a good into...
Top