This is a full cracking guide, i will teach you all the basics of cracking / pentesting.
Are you gonna give the tools? Yes, i'm gonna post all the tool links.
This guide was helpful, how i can help you? Just leave a like and comment something positive.
Terms/Concepts
Show ContentSpoiler:
CPM Check Per Minute, how many accounts has been checked in the minute
Combos | Wordlist | Combolist
Combination of Email:Pass, User:Pass (Can be another type but still calling ComboList / WordList)
Proxy (Proxies in plural)
A web proxy server, also known as a proxy is an application-level gateway, a server sits between you and the Internet. The proxy server is replacing that data and that way hiding you in a web.
Protocols:
HTTP, HTTP/S, SOCKS4, SOCKS5 (The best are HTTP and HTTP/S but depends on the supplier)
Header Fomats: IPV4
(Good for normal targets)
IPV6
(Good for mail targets but the most of pages do not support this protocol)
Type of proxies: Datacenter Datacenter Proxies are proxies that are not affiliated with an Internet Service Provider (ISP). They come from a secondary corporation and provide you with completely private IP authentication and anonymity.
Residential Residential proxies allow you to choose a specific location (country, city, or mobile carrier) and surf the web as a real user in that area. Proxies can be defined as intermediaries that protect users from general web traffic. They act as buffers while also concealing your IP address.
(These are the best type of proxies)
Rotative Changes the ip's every "x" time or per request
The ip's come from a IP pool with millons of IP's
Static Don't change the IP
Sticky
DataCenter proxies that changes per session / time
Config Openbullet configuration, works with the "Loliscript (The code with the API, instructions and etc..)
Checker Same as configs for openbullet but in .exe format
Dumper (SQL) SQL injection tool that scans web applications for SQL injection vulnerabilities that scans the vulns and exploit them (You can get combos from this way, and SQL exploit isn't the only option, you have another type of injections like LFI or RFI)
Google Dorking Google Dorking or Google hacking refers to using Google search techniques to hack into vulnerable sites or search for information that is not available in public search results.
Dork Parser Tool that uses Google Dorks to get URL's using the google query
Vuln Scanner Vulnerability Scanner, check the vulnerabilty of a website.
you need URL's for this
Some databases that could be vulnerable can be:
First of all you need to get a checker or OpenBullet.
You can get OpenBullet in github or just click here I like more "SilverBullet" than Openbullet, but is my opinion.
You can get OpenBullet configs in Config Section or buy configs in Sellers Marketplace Remember:
Most of OpenBullet Mods (Like SilverBullet) have their own extension
Default extension for OpenBullet config is ".Loli", Extension for SilverBullet is ".SVB", Extension for Anomaly is ".Anom", Extension for CyberBullet is ".CYB"
After you get some configs, drag all of them to the Configs Folder (Follow the video) Rescan to get your configs
Make a runner and start checking!
The bots are the threads, more threads = More PC usage (RAM and CPU) but gives more CPM Follow the video
Howdoimakemyowncombolist
Show ContentSpoiler:
You have two options for this
1.- Leaching
2.- Dorking
The first way is easy and everybody can do it
Leaching Tutorial You will need: Leaching keywords:
Something like
Minecraft combos
Combos 2022
Best combos
@email.com
Keywords related to combos / accounts of your target Leaching keywords target COMBOLISTS on pastesites. search engines index these pages based on their text content so searching words commonly found In combolists is ideal
With your Leaching Keywords you will need a Leecher (Leacher Combolist) Add the keywords to your leecher and start scrapping, it's all to get your combolist
This isn't even the half of all, if you want to contribute just left a like.
This is a full cracking guide, i will teach you all the basics of cracking / pentesting.
Are you gonna give the tools? Yes, i'm gonna post all the tool links.
This guide was helpful, how i can help you? Just leave a like and comment something positive.
Terms/Concepts
Show ContentSpoiler:
CPM Check Per Minute, how many accounts has been checked in the minute
Combos | Wordlist | Combolist
Combination of Email:Pass, User:Pass (Can be another type but still calling ComboList / WordList)
Proxy (Proxies in plural)
A web proxy server, also known as a proxy is an application-level gateway, a server sits between you and the Internet. The proxy server is replacing that data and that way hiding you in a web.
Protocols:
HTTP, HTTP/S, SOCKS4, SOCKS5 (The best are HTTP and HTTP/S but depends on the supplier)
Header Fomats: IPV4
(Good for normal targets)
IPV6
(Good for mail targets but the most of pages do not support this protocol)
Type of proxies: Datacenter Datacenter Proxies are proxies that are not affiliated with an Internet Service Provider (ISP). They come from a secondary corporation and provide you with completely private IP authentication and anonymity.
Residential Residential proxies allow you to choose a specific location (country, city, or mobile carrier) and surf the web as a real user in that area. Proxies can be defined as intermediaries that protect users from general web traffic. They act as buffers while also concealing your IP address.
(These are the best type of proxies)
Rotative Changes the ip's every "x" time or per request
The ip's come from a IP pool with millons of IP's
Static Don't change the IP
Sticky
DataCenter proxies that changes per session / time
Config Openbullet configuration, works with the "Loliscript (The code with the API, instructions and etc..)
Checker Same as configs for openbullet but in .exe format
Dumper (SQL) SQL injection tool that scans web applications for SQL injection vulnerabilities that scans the vulns and exploit them (You can get combos from this way, and SQL exploit isn't the only option, you have another type of injections like LFI or RFI)
Google Dorking Google Dorking or Google hacking refers to using Google search techniques to hack into vulnerable sites or search for information that is not available in public search results.
Dork Parser Tool that uses Google Dorks to get URL's using the google query
Vuln Scanner Vulnerability Scanner, check the vulnerabilty of a website.
you need URL's for this
Some databases that could be vulnerable can be:
First of all you need to get a checker or OpenBullet.
You can get OpenBullet in github or just click here I like more "SilverBullet" than Openbullet, but is my opinion.
You can get OpenBullet configs in Config Section or buy configs in Sellers Marketplace Remember:
Most of OpenBullet Mods (Like SilverBullet) have their own extension
Default extension for OpenBullet config is ".Loli", Extension for SilverBullet is ".SVB", Extension for Anomaly is ".Anom", Extension for CyberBullet is ".CYB"
After you get some configs, drag all of them to the Configs Folder (Follow the video) Rescan to get your configs
Make a runner and start checking!
The bots are the threads, more threads = More PC usage (RAM and CPU) but gives more CPM Follow the video
Howdoimakemyowncombolist
Show ContentSpoiler:
You have two options for this
1.- Leaching
2.- Dorking
The first way is easy and everybody can do it
Leaching Tutorial You will need: Leaching keywords:
Something like
Minecraft combos
Combos 2022
Best combos
@email.com
Keywords related to combos / accounts of your target Leaching keywords target COMBOLISTS on pastesites. search engines index these pages based on their text content so searching words commonly found In combolists is ideal
With your Leaching Keywords you will need a Leecher (Leacher Combolist) Add the keywords to your leecher and start scrapping, it's all to get your combolist
This isn't even the half of all, if you want to contribute just left a like.
30 July, 2022 - 08:17 PM(This post was last modified: 30 July, 2022 - 08:18 PM by Madjid032005.)
Reply
Quote:o
Introduction
Show ContentSpoiler:
What is this?
This is a full cracking guide, i will teach you all the basics of cracking / pentesting.
:weebsout: :weebsout: :weebsout: Are you gonna give the tools? Yes, i'm gonna post all the tool links.
This guide was helpful, how i can help you? Just leave a like and comment something positive.
Terms/Concepts
Show ContentSpoiler:
CPM Check Per Minute, how many accounts has been checked in the minute
Combos | Wordlist | Combolist
Combination of Email:Pass, User:Pass (Can be another type but still calling ComboList / WordList)
Proxy (Proxies in plural)
A web proxy server, also known as a proxy is an application-level gateway, a server sits between you and the Internet. The proxy server is replacing that data and that way hiding you in a web.
Protocols:
HTTP, HTTP/S, SOCKS4, SOCKS5 (The best are HTTP and HTTP/S but depends on the supplier)
Header Fomats: IPV4
(Good for normal targets)
IPV6
(Good for mail targets but the most of pages do not support this protocol)
Type of proxies: Datacenter Datacenter Proxies are proxies that are not affiliated with an Internet Service Provider (ISP). They come from a secondary corporation and provide you with completely private IP authentication and anonymity.
Residential Residential proxies allow you to choose a specific location (country, city, or mobile carrier) and surf the web as a real user in that area. Proxies can be defined as intermediaries that protect users from general web traffic. They act as buffers while also concealing your IP address.
(These are the best type of proxies)
Rotative Changes the ip's every "x" time or per request
The ip's come from a IP pool with millons of IP's
Static Don't change the IP
Sticky
DataCenter proxies that changes per session / time
Config Openbullet configuration, works with the "Loliscript (The code with the API, instructions and etc..)
Checker Same as configs for openbullet but in .exe format
Dumper (SQL) SQL injection tool that scans web applications for SQL injection vulnerabilities that scans the vulns and exploit them (You can get combos from this way, and SQL exploit isn't the only option, you have another type of injections like LFI or RFI)
Google Dorking Google Dorking or Google hacking refers to using Google search techniques to hack into vulnerable sites or search for information that is not available in public search results.
Dork Parser Tool that uses Google Dorks to get URL's using the google query
Vuln Scanner Vulnerability Scanner, check the vulnerabilty of a website.
you need URL's for this
Some databases that could be vulnerable can be:
First of all you need to get a checker or OpenBullet.
You can get OpenBullet in github or just click here I like more "SilverBullet" than Openbullet, but is my opinion.
You can get OpenBullet configs in Config Section or buy configs in Sellers Marketplace Remember:
Most of OpenBullet Mods (Like SilverBullet) have their own extension
Default extension for OpenBullet config is ".Loli", Extension for SilverBullet is ".SVB", Extension for Anomaly is ".Anom", Extension for CyberBullet is ".CYB"
After you get some configs, drag all of them to the Configs Folder (Follow the video) Rescan to get your configs
Make a runner and start checking!
The bots are the threads, more threads = More PC usage (RAM and CPU) but gives more CPM Follow the video
Howdoimakemyowncombolist
Show ContentSpoiler:
You have two options for this
1.- Leaching
2.- Dorking
The first way is easy and everybody can do it
Leaching Tutorial You will need: Leaching keywords:
Something like
Minecraft combos
Combos 2022
Best combos
@email.com
Keywords related to combos / accounts of your target Leaching keywords target COMBOLISTS on pastesites. search engines index these pages based on their text content so searching words commonly found In combolists is ideal
With your Leaching Keywords you will need a Leecher (Leacher Combolist) Add the keywords to your leecher and start scrapping, it's all to get your combolist
This isn't even the half of all, if you want to contribute just left a like.
This is a full cracking guide, i will teach you all the basics of cracking / pentesting.
Are you gonna give the tools? Yes, i'm gonna post all the tool links.
This guide was helpful, how i can help you? Just leave a like and comment something positive.
Terms/Concepts
Show ContentSpoiler:
CPM Check Per Minute, how many accounts has been checked in the minute
Combos | Wordlist | Combolist
Combination of Email:Pass, User:Pass (Can be another type but still calling ComboList / WordList)
Proxy (Proxies in plural)
A web proxy server, also known as a proxy is an application-level gateway, a server sits between you and the Internet. The proxy server is replacing that data and that way hiding you in a web.
Protocols:
HTTP, HTTP/S, SOCKS4, SOCKS5 (The best are HTTP and HTTP/S but depends on the supplier)
Header Fomats: IPV4
(Good for normal targets)
IPV6
(Good for mail targets but the most of pages do not support this protocol)
Type of proxies: Datacenter Datacenter Proxies are proxies that are not affiliated with an Internet Service Provider (ISP). They come from a secondary corporation and provide you with completely private IP authentication and anonymity.
Residential Residential proxies allow you to choose a specific location (country, city, or mobile carrier) and surf the web as a real user in that area. Proxies can be defined as intermediaries that protect users from general web traffic. They act as buffers while also concealing your IP address.
(These are the best type of proxies)
Rotative Changes the ip's every "x" time or per request
The ip's come from a IP pool with millons of IP's
Static Don't change the IP
Sticky
DataCenter proxies that changes per session / time
Config Openbullet configuration, works with the "Loliscript (The code with the API, instructions and etc..)
Checker Same as configs for openbullet but in .exe format
Dumper (SQL) SQL injection tool that scans web applications for SQL injection vulnerabilities that scans the vulns and exploit them (You can get combos from this way, and SQL exploit isn't the only option, you have another type of injections like LFI or RFI)
Google Dorking Google Dorking or Google hacking refers to using Google search techniques to hack into vulnerable sites or search for information that is not available in public search results.
Dork Parser Tool that uses Google Dorks to get URL's using the google query
Vuln Scanner Vulnerability Scanner, check the vulnerabilty of a website.
you need URL's for this
Some databases that could be vulnerable can be:
First of all you need to get a checker or OpenBullet.
You can get OpenBullet in github or just click here I like more "SilverBullet" than Openbullet, but is my opinion.
You can get OpenBullet configs in Config Section or buy configs in Sellers Marketplace Remember:
Most of OpenBullet Mods (Like SilverBullet) have their own extension
Default extension for OpenBullet config is ".Loli", Extension for SilverBullet is ".SVB", Extension for Anomaly is ".Anom", Extension for CyberBullet is ".CYB"
After you get some configs, drag all of them to the Configs Folder (Follow the video) Rescan to get your configs
Make a runner and start checking!
The bots are the threads, more threads = More PC usage (RAM and CPU) but gives more CPM Follow the video
Howdoimakemyowncombolist
Show ContentSpoiler:
You have two options for this
1.- Leaching
2.- Dorking
The first way is easy and everybody can do it
Leaching Tutorial You will need: Leaching keywords:
Something like
Minecraft combos
Combos 2022
Best combos
@email.com
Keywords related to combos / accounts of your target Leaching keywords target COMBOLISTS on pastesites. search engines index these pages based on their text content so searching words commonly found In combolists is ideal
With your Leaching Keywords you will need a Leecher (Leacher Combolist) Add the keywords to your leecher and start scrapping, it's all to get your combolist
This isn't even the half of all, if you want to contribute just left a like.