0x22
Members-
Content Count
19 -
Joined
-
Last visited
-
Days Won
1
0x22 last won the day on January 22
0x22 had the most liked content!
Community Reputation
152 ExcellentRecent Profile Visitors
The recent visitors block is disabled and is not being shown to other users.
-
-
You will get banned for Identity theft and blasphemy. That's considered Haram!!!!!!
- 2 replies
-
- 10
-
thanks for the quick reply very helpful lets see how HQ I can get because everytime I do generator or what not I get shit Dorks I believe it is due to my crappy keywords for keywords.io or keywordtool.io So do I just keep using inurl allinurl etc... and repeat it with different keywords from what i am trying to attack Ummmm no mate not at all....there's not just inurl as a dork. Now hear me out...go download alot of .txt files with dorks in it and check out how to make yours. there are others line inurl or intext or it depends file format like php, asp, ajax, aspx,jsp and so on!!!
-
VONMHEL'S CHEAP AUTOBUY PREMIUM ACCOUNT SHOP [LIFETIME WARRANTY]
0x22 replied to vonmhel1995's topic in Shop Archive
Hi there! Please post some screenshot and give vouches. Thank you!- 1 reply
-
- 8
-
[WTS] HOTELS.COM CHECKER / CONFIG - 1 COPY AVAILABLE
0x22 replied to kostrikov's topic in Shop Archive
Please sir post some screenshots(GIFs if possible) or video of it running THank you! -
In approximately 2011, an alleged breach of the dating website Zoosk began circulating. Comprised of almost 53 million records, the data contained email addresses and plain text passwords. Compromised data: Email addresses, Passwords [hide]https://drive.google.com/file/d/1Y8sQXOw7v0pbLWATpI69RrxRtf32BJmM/view?usp=sharing[/hide]
- 1 reply
-
- 5
-
DateOfHackLL 2011 Contains: Data of 2 million businesses in Canada (duh) Compromised data: Business Names, Business Address, Web Address, Phone Number, Fax Number, Owner's Information(Contact|Gender|Title), Employees, SIC Codes and Descriptions. [hide]LINK TO DOWNLOAD[/hide]
-
DateOfLeak: 2003 Entries: 8 Million records of business data, investor emails e.t.c Compromised data: Employee Email Addresses, Company Name, Address, City, State, ZIP Code, Telephone Numbers, Company Website, Employee Numbers, Sale Volumes, Company Vocation, Fax Numbers, SIC [hide]LINK TO DOWNLOAD[/hide]
-
Compromised Data: Username , Hash(MD5) , Email DateofHack: 1 February 2013 Entries: 531k There are 2 files (3 if you consider INFO) , one in this format username:password(MD5):email and the other one email:password(plaintext) [hide]LINK TO DOWNLOAD[/hide]
- 1 reply
-
- 13
-
Compromised data: Business Names, Business Address, Web Address, Phone Number, Fax Number, Owner's Information(Contact|Gender|Title), Employees, SIC Codes and Descriptions. DateOfHack: 2011 [hide]LINK[/hide]
- 1 reply
-
- 7
-
This data is pretty sick for SE if you ask me. Although it DOESN'T have passwords, it has username,email and sometimes phone numbers connected to that account. The accounts here are the hottest one that have OG usernames (will post an example) Number of accounts: 2.7M Contains: username | email | phone number Format: username: phone number OR username: email Sample: DateOfHack: August 2017 (i think it's part of DOXAGRAM) [hide]https://anonfile.com/n8k1H1h9b1/insta_txt[/hide]
- 1 reply
-
- 8
-
Number of accounts: 126k Contans: email | password (plaintext) Format: email:password Description: booking site (shopping) [hide]https://anonfile.com/Ndj1H3h5bf/www.hkbookcity.com_126k_txt[/hide]
-
Unfortunately I don't have the full version but still I guess it's better than nothing Size: 160MB compressed; 865MB extracted Date: 2018 Contains: First Name","Last Name","Email","Active","Marketing Campaign Subscription","Can receive emails","Billing Address 1","Address 2","City","State/Province","Zip Code","Phone Number","Shipping Address 1","Address 2","City","State/Province","Zip Code","Phone Number","Role [hide]https://anonfile.com/N3ucGch2b6/ticketfly.com_incomplete_2_rar[/hide]
- 1 reply
-
- 8
-
Accounts: 27 Million (over 17.5 million do have emails and the rest, just username and password) Contains: email | username | password (salted SHA1) DateOfHack: July 2012 Description: Blogging chat (socials) Notation: The dehashed version has [hide] https://anonfile.com/7ds9Gdhbb2/Disqus_7z [/hide]