Activity
Mon
Wed
Fri
Sun
Dec
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
What is this?
Less
More

Memberships

Anonymous

Public • 2k • Free

19 contributions to Anonymous
Regarding ip loggers
hey i am facing some issues regarding iplogger i have a bunch of iploggers but the location they show is of the servers and not of the actual device can you pls help me also how can i extract most of the information from an ip address like i tried grabify and iplogger but they do not give much info i want every single detail about that ip address
1
8
New comment Aug 22
0 likes • Aug 22
@Steve Balboni why is bro so angry 😭 he just asked a question
IP pulling
Bro there's this annoying ass kid and I'm tryna troll him by pulling his IP, anyone know how I can do that?
1
8
New comment Sep 10
mal lekture #1
What is malware ? Malware is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user’s computer security and privacy. What is malware development? This is the development process of malicious software or scripts with intent to stealing target information, spying, espionage purpose and others What programming languages are best for malware development? My own opinion 1.Assembly reason faster and next to machine code con hard to learn C and c++ python for server end Rust Lua Golang What is computer programming? Computer programming or coding is the composition of sequences of instructions, called programs, that computers can follow to perform tasks what are the types of malware 1. Ransomware This is software that uses encryption to disable a target’s access to its data until a ransom is paid. The victim organization is rendered partially or totally unable to operate until it pays, but there is no guarantee that payment will result in the necessary decryption key or that the decryption key provided will function properly. 2. Spyware Spyware collects information about users’ activities without their knowledge or consent. This can include passwords, pins, payment information and unstructured messages. 3 Trojan This disguises itself as desirable code or software. Once downloaded by unsuspecting users, the Trojan can take control of victims’ systems for malicious purposes. Trojans may hide in games, apps, or even software patches. 4. Worms Worms target vulnerabilities in operating systems to install themselves into networks. They may gain access in several ways: through backdoors built into software, through unintentional software vulnerabilities, or through flash drives. Once in place, worms can be used by malicious actors to launch Dos or Ddos attacks, steal sensitive data, or conduct ransomware attacks.
20
22
New comment Mar 26
0 likes • Mar 26
Helped a lot man. Where can I learn C++ for free and it's beginner friendly?
0 likes • Mar 26
@Steve Balboni What's guidedhacking?
Phishing
How can I create phising sites for discord, roblox, epicgames etc.
0
33
New comment Jul 12
0 likes • Mar 25
@Twohundred Hz nope
0 likes • Mar 26
@Siddhant Bhardwaj Rather than creating it for me, could you teach me how to create it?
Grab anyone's IP with resedential Address
https://iplogger.org/
1
4
New comment Mar 26
Grab anyone's IP with resedential Address
0 likes • Mar 26
@Nothing Here Most messaging apps don't let you send grabify addresses do it's pretty good
1-10 of 19
Ryan Sood
3
44points to level up
@ryan-sood-5010
E

Active 84d ago
Joined Feb 24, 2024
powered by