nice
[2023][Nulled.to exclusive] AIO Cracking guide : Dorks / Dumps / Dehash / Checks - You will know all
#402
Posted 05 January 2020 - 12:09 PM
thx oneey
Discord: https://discord.gg/tx2Yhkh Shoppy: https://shoppy.gg/@DojoxDojo
#403
Posted 06 January 2020 - 06:58 PM
This tutorial is a written one of this video, I strongly recommend you to check it.
It explains all.
https://www.nulled.t...endly/-
Hello everyone and welcome on my new Nulled.to guide.In this guide, you will clearly learn ALL the things you need to crack accounts.
That guide took me a long long time to write and so many more times to understand all the things I’ll try to explain you now.
Don’t forget to support all the guys I will refer to during the guide, for their hard work and their quality.
So, let’s start with a summary:
Spoiler
1. What will we do ?
In this tutorial, we will learn how to recover combos from databases. We will use a method to have private combos, so that nobody uses them and that they are of good quality. To do this,
we're not going to use crappy programs like Slayer Leecheror things like that, which get public combos from shared lists.
Here we will build our own dorks, to inject interesting databases (where 'targeted' users are located for what we are looking for).
It's a long process but it pays.
It also requires investment, in money and time.
I am on mac for example and it is impossible for me to crack anything from my mac. So I have to invest in a rdp to crack.
Now that we have seen the basics of what we are going to do, let's learn how to do it!
2. How to do it?
a. DLL programs
Spoiler
b. Dorks: What are they? How to make good ones?
This is one the most important part of the tutorial.
If you have good dorks then you will have good injectables.
If you have the injectables you have the dbs and in the dbs you have the combos.
You have three big different ways to have dorks:
• Generate ones from generators
• Handwritten (those are the bests)
• Bought one
The problem with generated dorks is that they will give you a lot of urls, but a lot of them will be shit ones. So your results will not be as much HQ as you attempt to.
If you do handwritten dorks then you will have exactly what you’re looking too.
I will not explain all the methods because other members did it before me and they explain it very well.
Spoiler
For handmade dorks, I will recommend you some tutorials too.
Follow them carefully and you will have awesome results, really.
Spoiler
c. Dumping: SQLi Dumper / Sqlmap
First let’s start with SQLi Dumper.
SQLi Dumper is a nice program because it’s really easy to use.
The problem is that it’s quite slow (compared to map).
Here are the steps to have urls from the dorks you made :
Spoiler
Now you are done, let’s just go to d.
(If you use SQLi Dumper don’t check this part)
Spoiler
So guys, now we have our combos, let’s just dehash them !
d. Dehashing
As always you have three methods to dehash :
- Use shitty programs like OCRHT
- Use Hashcat
- Pay a dehasher
Basically, what you will need to do is to put you hashes in a file, run the program you want, and let it dehash.
That’s really a simple part but it’s as always, a long process (depends on your comboslist size).
Here are tutorials on how to dehash :
Spoiler
e. Checking privacy
First of all, why are we checking the privacy of our combos ?
That’s simple, people will buy from you because no one (exepct the owner) will use the account they bought with them.
If your combos are public ones, you will sell them but you will have to replace / refund your customers a lot of times.
Moreover, you’re in obligation to set low prices, because your accounts are not safe.
See: Is it better to open a multi accounts shop 1$, where you pass 24/7 to refund guys, or to open a professional Spotify / Netflix store, where you can sell your accounts for 5$ ?? Choose the good one
SO, to check the privacy of your accounts (and the quality of your previous process so ), let’s use Anti-Public programs.
Spoiler
Upload your base and run it.
Now we have our combos, and now we know our combos are private, we are ready to open a checker and put them in.
f. Checking
Choose behind those 3 checkers:
Spoiler
For beginners, I strongly recommend to use Snipr.
It’s an easy program where you can grab your proxies, make combolists and run your checkers.
I personally used it but now I’m over with this tools, which has, as all others, so cons.
If you want to use Snipr, let’s follow my tutorial :
If you want to use Storm, follow @AntiLeechtutorial :
For Sentry MBA : @mo0pleT did a simple and clear tutorial, check it out there :
You can also use simple checker for only one module, but most of the time they are not really optimized for multi threads and they eat most of CPU.
So guys we are done? You have now combos you can resell or post on nulled.to to reach legendary
3. Hall of fame
I need to thanks all those guys for their work and most of them for they sympathy.
As I always say, it’s really rare to find skilled guys who are cool.
And they are.
Big shoutout to this HQ pleb
@AntiLeech@sds@DonXirus @NotThiplol@Diamond @throwchanceGF @PlusUltra @Zaida@H4ppY @GODkostrikoV @Polaron @Nylor @AZATEJ @TheN3RoX @Office @PRAGMA @General @ThePunisher @PuppyLover101 @Bogdan @Crackerz@TopAccGen @ZIZ@bleach @Atlas @Simon@Zaida@JuniorCally @pruned_39067@rond @StOn3d @Jocker @JellyFish@searching @Doge and so many more… !
4. Conclusion
I hope this tutorial, or this generalization of tutorials will help you to finally stop asking every time ‘how to crack’ and ‘how to have accounts’ because YOU CAN DO IT and everyone can do it.
What you need is to be organized and ‘clear’ in your head to firstly know what you want to do, and after do it well.
I will continue this tutorial with time, and if I see that people are happy to see that kind of shit here.
thnx duddee
#405
Posted 13 January 2020 - 12:53 PM
This tutorial is a written one of this video, I strongly recommend you to check it.
It explains all.
https://www.nulled.t...endly/-
Hello everyone and welcome on my new Nulled.to guide.In this guide, you will clearly learn ALL the things you need to crack accounts.
That guide took me a long long time to write and so many more times to understand all the things I’ll try to explain you now.
Don’t forget to support all the guys I will refer to during the guide, for their hard work and their quality.
So, let’s start with a summary:
Spoiler
1. What will we do ?
In this tutorial, we will learn how to recover combos from databases. We will use a method to have private combos, so that nobody uses them and that they are of good quality. To do this,
we're not going to use crappy programs like Slayer Leecheror things like that, which get public combos from shared lists.
Here we will build our own dorks, to inject interesting databases (where 'targeted' users are located for what we are looking for).
It's a long process but it pays.
It also requires investment, in money and time.
I am on mac for example and it is impossible for me to crack anything from my mac. So I have to invest in a rdp to crack.
Now that we have seen the basics of what we are going to do, let's learn how to do it!
2. How to do it?
a. DLL programs
Spoiler
b. Dorks: What are they? How to make good ones?
This is one the most important part of the tutorial.
If you have good dorks then you will have good injectables.
If you have the injectables you have the dbs and in the dbs you have the combos.
You have three big different ways to have dorks:
• Generate ones from generators
• Handwritten (those are the bests)
• Bought one
The problem with generated dorks is that they will give you a lot of urls, but a lot of them will be shit ones. So your results will not be as much HQ as you attempt to.
If you do handwritten dorks then you will have exactly what you’re looking too.
I will not explain all the methods because other members did it before me and they explain it very well.
Spoiler
For handmade dorks, I will recommend you some tutorials too.
Follow them carefully and you will have awesome results, really.
Spoiler
c. Dumping: SQLi Dumper / Sqlmap
First let’s start with SQLi Dumper.
SQLi Dumper is a nice program because it’s really easy to use.
The problem is that it’s quite slow (compared to map).
Here are the steps to have urls from the dorks you made :
Spoiler
Now you are done, let’s just go to d.
(If you use SQLi Dumper don’t check this part)
Spoiler
So guys, now we have our combos, let’s just dehash them !
d. Dehashing
As always you have three methods to dehash :
- Use shitty programs like OCRHT
- Use Hashcat
- Pay a dehasher
Basically, what you will need to do is to put you hashes in a file, run the program you want, and let it dehash.
That’s really a simple part but it’s as always, a long process (depends on your comboslist size).
Here are tutorials on how to dehash :
Spoiler
e. Checking privacy
First of all, why are we checking the privacy of our combos ?
That’s simple, people will buy from you because no one (exepct the owner) will use the account they bought with them.
If your combos are public ones, you will sell them but you will have to replace / refund your customers a lot of times.
Moreover, you’re in obligation to set low prices, because your accounts are not safe.
See: Is it better to open a multi accounts shop 1$, where you pass 24/7 to refund guys, or to open a professional Spotify / Netflix store, where you can sell your accounts for 5$ ?? Choose the good one
SO, to check the privacy of your accounts (and the quality of your previous process so ), let’s use Anti-Public programs.
Spoiler
Upload your base and run it.
Now we have our combos, and now we know our combos are private, we are ready to open a checker and put them in.
f. Checking
Choose behind those 3 checkers:
Spoiler
For beginners, I strongly recommend to use Snipr.
It’s an easy program where you can grab your proxies, make combolists and run your checkers.
I personally used it but now I’m over with this tools, which has, as all others, so cons.
If you want to use Snipr, let’s follow my tutorial :
If you want to use Storm, follow @AntiLeechtutorial :
For Sentry MBA : @mo0pleT did a simple and clear tutorial, check it out there :
You can also use simple checker for only one module, but most of the time they are not really optimized for multi threads and they eat most of CPU.
So guys we are done? You have now combos you can resell or post on nulled.to to reach legendary
3. Hall of fame
I need to thanks all those guys for their work and most of them for they sympathy.
As I always say, it’s really rare to find skilled guys who are cool.
And they are.
Big shoutout to this HQ pleb
@AntiLeech@sds@DonXirus @NotThiplol@Diamond @throwchanceGF @PlusUltra @Zaida@H4ppY @GODkostrikoV @Polaron @Nylor @AZATEJ @TheN3RoX @Office @PRAGMA @General @ThePunisher @PuppyLover101 @Bogdan @Crackerz@TopAccGen @ZIZ@bleach @Atlas @Simon@Zaida@JuniorCally @pruned_39067@rond @StOn3d @Jocker @JellyFish@searching @Doge and so many more… !
4. Conclusion
I hope this tutorial, or this generalization of tutorials will help you to finally stop asking every time ‘how to crack’ and ‘how to have accounts’ because YOU CAN DO IT and everyone can do it.
What you need is to be organized and ‘clear’ in your head to firstly know what you want to do, and after do it well.
I will continue this tutorial with time, and if I see that people are happy to see that kind of shit here.
ijjjjjjjjjjjj
#407
Posted 25 January 2020 - 01:28 AM
This tutorial is a written one of this video, I strongly recommend you to check it.
It explains all.
https://www.nulled.t...endly/-
Hello everyone and welcome on my new Nulled.to guide.In this guide, you will clearly learn ALL the things you need to crack accounts.
That guide took me a long long time to write and so many more times to understand all the things I’ll try to explain you now.
Don’t forget to support all the guys I will refer to during the guide, for their hard work and their quality.
So, let’s start with a summary:
Spoiler
1. What will we do ?
In this tutorial, we will learn how to recover combos from databases. We will use a method to have private combos, so that nobody uses them and that they are of good quality. To do this,
we're not going to use crappy programs like Slayer Leecheror things like that, which get public combos from shared lists.
Here we will build our own dorks, to inject interesting databases (where 'targeted' users are located for what we are looking for).
It's a long process but it pays.
It also requires investment, in money and time.
I am on mac for example and it is impossible for me to crack anything from my mac. So I have to invest in a rdp to crack.
Now that we have seen the basics of what we are going to do, let's learn how to do it!
2. How to do it?
a. DLL programs
Spoiler
b. Dorks: What are they? How to make good ones?
This is one the most important part of the tutorial.
If you have good dorks then you will have good injectables.
If you have the injectables you have the dbs and in the dbs you have the combos.
You have three big different ways to have dorks:
• Generate ones from generators
• Handwritten (those are the bests)
• Bought one
The problem with generated dorks is that they will give you a lot of urls, but a lot of them will be shit ones. So your results will not be as much HQ as you attempt to.
If you do handwritten dorks then you will have exactly what you’re looking too.
I will not explain all the methods because other members did it before me and they explain it very well.
Spoiler
For handmade dorks, I will recommend you some tutorials too.
Follow them carefully and you will have awesome results, really.
Spoiler
c. Dumping: SQLi Dumper / Sqlmap
First let’s start with SQLi Dumper.
SQLi Dumper is a nice program because it’s really easy to use.
The problem is that it’s quite slow (compared to map).
Here are the steps to have urls from the dorks you made :
Spoiler
Now you are done, let’s just go to d.
(If you use SQLi Dumper don’t check this part)
Spoiler
So guys, now we have our combos, let’s just dehash them !
d. Dehashing
As always you have three methods to dehash :
- Use shitty programs like OCRHT
- Use Hashcat
- Pay a dehasher
Basically, what you will need to do is to put you hashes in a file, run the program you want, and let it dehash.
That’s really a simple part but it’s as always, a long process (depends on your comboslist size).
Here are tutorials on how to dehash :
Spoiler
e. Checking privacy
First of all, why are we checking the privacy of our combos ?
That’s simple, people will buy from you because no one (exepct the owner) will use the account they bought with them.
If your combos are public ones, you will sell them but you will have to replace / refund your customers a lot of times.
Moreover, you’re in obligation to set low prices, because your accounts are not safe.
See: Is it better to open a multi accounts shop 1$, where you pass 24/7 to refund guys, or to open a professional Spotify / Netflix store, where you can sell your accounts for 5$ ?? Choose the good one
SO, to check the privacy of your accounts (and the quality of your previous process so ), let’s use Anti-Public programs.
Spoiler
Upload your base and run it.
Now we have our combos, and now we know our combos are private, we are ready to open a checker and put them in.
f. Checking
Choose behind those 3 checkers:
Spoiler
For beginners, I strongly recommend to use Snipr.
It’s an easy program where you can grab your proxies, make combolists and run your checkers.
I personally used it but now I’m over with this tools, which has, as all others, so cons.
If you want to use Snipr, let’s follow my tutorial :
If you want to use Storm, follow @AntiLeechtutorial :
For Sentry MBA : @mo0pleT did a simple and clear tutorial, check it out there :
You can also use simple checker for only one module, but most of the time they are not really optimized for multi threads and they eat most of CPU.
So guys we are done? You have now combos you can resell or post on nulled.to to reach legendary
3. Hall of fame
I need to thanks all those guys for their work and most of them for they sympathy.
As I always say, it’s really rare to find skilled guys who are cool.
And they are.
Big shoutout to this HQ pleb
@AntiLeech@sds@DonXirus @NotThiplol@Diamond @throwchanceGF @PlusUltra @Zaida@H4ppY @GODkostrikoV @Polaron @Nylor @AZATEJ @TheN3RoX @Office @PRAGMA @General @ThePunisher @PuppyLover101 @Bogdan @Crackerz@TopAccGen @ZIZ@bleach @Atlas @Simon@Zaida@JuniorCally @pruned_39067@rond @StOn3d @Jocker @JellyFish@searching @Doge and so many more… !
4. Conclusion
I hope this tutorial, or this generalization of tutorials will help you to finally stop asking every time ‘how to crack’ and ‘how to have accounts’ because YOU CAN DO IT and everyone can do it.
What you need is to be organized and ‘clear’ in your head to firstly know what you want to do, and after do it well.
I will continue this tutorial with time, and if I see that people are happy to see that kind of shit here.
good read !
#408
Posted 26 January 2020 - 05:07 PM
#409
Posted 27 January 2020 - 08:00 PM
#410
Posted 27 January 2020 - 10:29 PM
Users browsing this thread: