DarkStash Support and Advertisement Telegram: @DarkStashMaster
Jabber : [email protected]




accounts and database dumps

  1. TheVcarder

    INSTALLING CAINE 8.0 ON A VIRTUAL MACHINE

    CAINE stands for Computer Aided Investigative Environment and is a live Linux distribution that offers a complete forensic environment. Caine 8.0 has a nice graphical user interface and contains a lot of digital forensic tools to aid in the process of digital investigation. Including some tools...
  2. TheVcarder

    HOW TO USE RAVAN FOR PASSWORD CRACKING?

    How to use Ravan? Step1: Go to http://www.andlabs.org/tools/ravan.html Enter the value of the hash that must be cracked Enter the value of the salt, if it is not a salted hash then leave it blank Enter the charset. Only these characters will be use in the brute force attack Select the hashing...
  3. TheVcarder

    HOW TO REMOVE PASSWORDS FROM ADOBE PDF FILES

    Today while working in computer world you might get through PDF files and also today many important files get converted into PDF file and protected using password. And sometime you don’t have access to this password protected PDF file like in India e-Aadhar services had protected all its files...
  4. TheVcarder

    HOW TO REMOVE PASSWORDS FROM ADOBE PDF FILES

    Today while working in computer world you might get through PDF files and also today many important files get converted into PDF file and protected using password. And sometime you don’t have access to this password protected PDF file like in India e-Aadhar services had protected all its files...
  5. Joker

    Cain & Abe

    Cain & Abel v4.9.32 released - Added Abel64.exe and Abel64.dll to support hashes extraction on x64 operating systems. - Added x64 operating systems support in NTLM hashes Dumper, MS-CACHE hashes Dumper, LSA Secrets Dumper, Wireless Password Decoder, Credential Manager Password Decoder, DialUp...
  6. Joker

    A fraudster disguised as a police officer extorted money from Astrakhan residents on the Internet

    As a result of criminal actions, the fraudster received over 100 thousand rubles. A resident of the Astrakhan region Valery A. is accused of committing 38 crimes under Part 2 of Art. 159.6 of the Criminal Code of the Russian Federation (fraud and attempted fraud in the field of computer...
  7. Joker

    Cyberattacks hit millions of WordPress sites

    Cyber-criminals have discovered a zero-day vulnerability in the popular File Manager plugin. Defiant has documented a spike in cyber attacks on WordPress sites last week . According to them, cybercriminals tried to attack millions of sites in search of a vulnerable File Manager plugin...
  8. Joker

    The data of millions of American voters are published on the darkstash.com

    Forum users have already found a way to monetize information about American voters. On one of the Russian hacker forums, a user using the pseudonym Gorka9 published the databases of millions of voters in the states of Michigan, Connecticut, Arkansas, Florida and North Carolina, the...
  9. Joker

    Flerken - obfuscated command detection

    Command line obfuscation has been proved to be a non-negligible factor in fileless malware or malicious actors that are "living off the land". To bypass signature-based detection, dedicated obfuscation techniques are shown to be used by red-team penetrations and even APT activities. Meanwhile...
  10. Joker

    Experimenting with Physical Carding forums

    Getting Data I’ll show you how to do some basic carding, to do so I’m using a small Android application that I build, called NFC EMV Track reader. Using this software, you can extract Track 1 and track 2 from any NFC enabled credit card just by bringing it close to your phone. Depending on the...
  11. Joker

    TUT hack yahoo account by stealing cookies

    Hi Guys today am going to talk on cookies, though you might have see many cookies tut all is for education purpose not for illegal activities what will be needed ===>>> Free hosting account i recommend: ===>>> Cookies stealer code Download link here cookiestealer.zip What are cookies? A...
  12. Joker

    Free Gucci method with cc 2020

    Make an account with the Credit Card info Use the shipping address as the billing address but don’t panic, feds can’t come to your house as it acts as private / confidential info and Gucci are not allowed to give that info out. Use Socks5, RDP and VPN Make sure you clean cookies before in...
  13. Joker

    Unknown persons hacked the official website of the Ministry of Internal Affairs of Ukraine

    unknown people spread a false message about radiation emissions at the Rivne nuclear power plant near the city. 1e12fe2bfc57c75fb9215e5fa55e1f16.jpg The Ministry of Internal Affairs of Ukraine in social networks disseminated information that at about noon unknown persons hacked the main...
  14. TheVcarder

    CARDING METHOD AND BIN 1000% WORKING!!!

    Today I am sharing how to card AliExpress. AliExpress known for its Chinese stuff but you also get some good stuff at low price. Sell them if you find them useless. I got a lot of messages regarding Aliexpress Carding Tutorial. So, I am posting it now. Lets jump into the tutorial Basic...
  15. TheVcarder

    CARDING METHOD AND BIN 1000% WORKING!!!

    Today I am sharing how to card AliExpress. AliExpress known for its Chinese stuff but you also get some good stuff at low price. Sell them if you find them useless. I got a lot of messages regarding Aliexpress Carding Tutorial. So, I am posting it now. Lets jump into the tutorial Basic...
  16. TheVcarder

    HOW TO CARD YOURSELF OWN MERCHANT

    For this article I was inspired by a thought that for a long time did not let me sleep quiet. Not so long ago I was acquainted with a person whose contact was lost after I got to the hospital. This person bought from me debit cards and sometimes asked for small bills under the exposure with a...
  17. TheVcarder

    TOP TEN WEB HACKING TECHNIQUES

    Top Ten Web Hacking Techniques of (Official) We searched far and wide collecting as many Web Hacking Techniques published in as possible -- ~70 in all. These new and innovative techniques were analyzed and ranked based upon their novelty, impact, and pervasiveness. The competition was...
  18. TheVcarder

    TWO RESIDENTS OF DNEPROPETROVSK REGION "HACKED" SITES AND SOLD USER DATA

    The attackers used malicious software to steal bank card details, logins and passwords from Internet user accounts. For this, the defendants face up to six years behind bars. Employees of the Dnepropetrovsk Cybercrime Department, together with investigators from the Cathedral Department of the...
  19. TheVcarder

    KREBSONSECURITY WHY PHONE NUMBERS STINK AS IDENTITY PROOF

    Phone numbers stink for security and authentication. They stink because most of us have so much invested in these digits that they’ve become de facto identities. At the same time, when you lose control over a phone number — maybe it’s hijacked by fraudsters, you got separated or divorced, or you...
  20. TheVcarder

    INSTALLING SLACKWARE LINUX

    installing Slackware Linux Slackware Linux is one of the oldest Linux distributions remaining. Over the years, it has stayed true to its roots and form. Here's what the author, Patrick Volkerding has to say about it. The Slackware Philosophy Since its first release in April of 1993, the...
Back
Top