CPM
Check Per Minute, how many accounts has been checked in the minute
Combolist | Wordlist
Combination of Email:Pass, User:Pass (Can be another type but still calling ComboList / WordList)
Proxy (Proxies in plural)
A web proxy server, also known as a proxy is an application-level gateway, a server sits between you and the Internet. The proxy server is replacing that data and that way hiding you in a web.
Protocols:
HTTP, HTTP/S, SOCKS4, SOCKS5
(The best are HTTP and HTTP/S)
Header Fomats:
IPV4
(Good for normal targets)
IPV6
(Good for mail targets like: Aol, Yahoo, Coinbase, etc..)
Type of proxies:
Datacenter
Datacenter Proxies are proxies that are not affiliated with an Internet Service Provider (ISP). They come from a secondary corporation and provide you with completely private IP authentication and anonymity.
Residential
Residential proxies allow you to choose a specific location (country, city, or mobile carrier) and surf the web as a real user in that area. Proxies can be defined as intermediaries that protect users from general web traffic. They act as buffers while also concealing your IP address.
(These are the best type of proxies)
Rotative
Changes the ip's every "x" time or per request
The ip's come from a IP pool with millons of IP's
Static / Sticky
Don't change the IP
Config
Openbullet configuration, works with the "Loliscript (The code with the API, instructions and etc..)
Checker
Same as configs for openbullet but in .exe format
Dumper
SQL injection tool that scans web applications for SQL injection vulnerabilities that scans the vulns and exploit them
(You can get combos from this way, and SQL exploit isn't the only option, you have another type of injections like LFI or RFI)
Dorks
Google Dorking or Google hacking refers to using Google search techniques to hack into vulnerable sites or search for information that is not available in public search results.
Parser
A parser is a compiler or interpreter component that breaks data into smaller elements for easy translation into another language. A parser takes input in the form of a sequence of tokens, interactive commands, or program instructions and breaks them up into parts that can be used by other components in programming.
A parser usually checks all data provided to ensure it is sufficient to build a data structure in the form of a parse tree or an abstract syntax tree.
(You can get urls from this using dorks)
Vuln Scanner
Vulnerability Scanner, check the vulnerabilty of a website.
you need URL's for this and can get vulns like:
MySQL
MsSQL
PostgreSQL
Access
Oracle
SQLite
HSQLdb
Informix
Frontbase
Derby
Firebird
WAF