Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      F[C]racker

      Twitter Openbullet Config [Auto Sent Message , Auto Post , Cookies Grabber]

      Recommended Posts

      I created openbullet config for twitter, its checking lines of data and if is it hit then create a post and share it to all follower with your message or ads, then sent to 100 followers as a direct message, and its saving the cookies its means you can log in into account without 2fa or sth like that and you have access to account till you logout the account

      The config use (USERNAME or EMAIL) password combo

      OP: Save Hits - Save count of followers,.....

      EXP :


      <USERNAME>:<PASSWORD>: Followers:788:auth_token: d02231f096aa743f886cdf7e6e87a20946adce2d:

      Hidden Content

        Give reaction to this post to see the hidden content.


      and the this will be saved in txt


      contact me :

      Discord : F[C]racker#5543
      Telegram : @xDedic_DarKneT
      Telegram Link : 

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post


      Link to post
      Share on other sites

      Join the conversation

      You can post now and register later. If you have an account, sign in now to post with your account.
      Note: Your post will require moderator approval before it will be visible.

      Guest
      Reply to this topic...

      ×   Pasted as rich text.   Paste as plain text instead

      ×   Your link has been automatically embedded.   Display as a link instead

      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. WordPress Auto Spinner rewrites WordPress posts automatically converting it to fresh new content by replacing words and phrases by its synonyms on autopilot using its built-in synonyms database or optionally using one of the best spinning services APIs including:-
              SpinRewriter API
              WordAi.com API
              TheBestSpinner.com API
              SpinBot.com API
              ChimpRewriter API
              ContentProfessor.com API
              SpinnerChief.com API
              Espinner.net API


          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. SHAD0W is a modular C2 framework designed to successfully operate in mature environments.
          It will use a range of methods to evade EDR and AV while allowing the operator to continue using tooling tradecraft they are familiar with. It’s powered by Python 3.8 and C, using Donut for payload generation. By using Donut alongside the process injection capabilities of SHAD0W it gives the operator the ability to execute .NET assemblies, EXEs, DLLs, VBS, JS, or XSLs fully inside the memory. Dynamically resolved syscalls are heavily used to avoid userland API hooking, anti-DLL injection to make it harder for EDR to load code into the beacons, and official Microsoft mitigation methods to protect spawn processes.
          The main features of the SHAD0W C2 are:
              Built For Docker – It runs fully inside docker allowing cross-platform usage
              Live Proxy & Mirror – The C2 server is able to mirror any website in real-time, relaying all non C2 traffic to that site making it look less subject when viewed in a web browser
              HTTPS C2 Communication – All traffic between beacons and the C2 will be encrypted and transmitted over HTTPS
              Modern CLI – The CLI is built on prompt-toolkit
              JSON Based Protocol – Custom beacons are able to built and used easily with an easy to implement the protocol
              Extremely Modular – Easy to create new modules to interact and task beacons
          The main features of SHAD0W beacons are:
              Shellcode, EXE, Powershell & More – Beacons can be generated and used in many different formats
              Process Injection – Allowing you to migrate, shinject, dllinject and more
              Bypass AV – Payloads are frequently updated to evade common Anti-Virus products
              Highly configurable – Custom jitters, user agents and more
              Proxy Aware – All callbacks will use the current system proxy
              HTTPS C2 Communication – Traffic to and from the C2 is encrypted via HTTPS
          Current Modules:
              GhostPack – With the binary compiled nightly via an Azure pipeline. Thanks to @Flangvik
              Unmanaged Powershell – With built-in AMSI bypass
              Ghost In The Logs – Disable ETW & Sysmon, more info can be found here
              Elevate – Built-in PrivEsc exploits
              SharpSocks – Reverse socks proxy over HTTPS
              SharpCollection – A ton of .NET offensive tools, more info can be found here
              Mimikatz – For all your credential theft needs
              Upload & Download – Easy data exfiltration
              StdAPI – Common commands to interact with the file system


          Hidden Content
          Give reaction to this post to see the hidden content.  
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content. Introduction
          Bashark aids pentesters and security researchers during the post-exploitation phase of security audits.

          Hidden Content
          Give reaction to this post to see the hidden content.