🔥 Burn Fat Fast. Discover How! 💪

Hacker's Tools Store

Logo of telegram channel hackers_tools_store — Hacker's Tools Store H
Logo of telegram channel hackers_tools_store — Hacker's Tools Store
Channel address: @hackers_tools_store
Categories: Technologies
Language: English
Subscribers: 5.80K
Description from channel

🔸Hacking & Cracking Tools
🔸Hacking Courses
🔸Hacking Tricks & Tips
🔸Giveaways
And many more...
Shop - https://hackingrealm.cc | https://unicornshop.cc
Contact - @tools_store_admin

Ratings & Reviews

3.00

2 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

0

4 stars

0

3 stars

2

2 stars

0

1 stars

0


The latest Messages 33

2021-06-02 11:34:49 Mubi Giftcards ×10

FV7KFY | Type: Prepaid
7QR2CH | Type: Prepaid
QFCPQK | Type: Prepaid
HD3ET4 | Type: Prepaid
UPXQDY | Type: Prepaid
X4HAZP | Type: Prepaid
R97FHF | Type: Prepaid
Q7ZF33 | Type: Prepaid
ZAEN3W | Type: Prepaid
TKTC3D | Type: Prepaid

No CC needed just reedem and enjoy

Must Send Screenshots To Comment Box Itself

*I found these gift cards today but I'm not sure whether they have already redeemed so don't forget to leave a comment about it.
29 views08:34
Open / Comment
2021-06-01 08:09:21 HOW TO GET FREE PHONE NUMBER & TEMPORARY EMAILS

1. ɢᴏ ᴛᴏ http://getairmail.com/ ᴏɴ ʏᴏᴜʀ ᴡᴇʙ ʙʀᴏᴡsᴇʀ.

2. ɢʀᴀʙ ᴀ ғʀᴇᴇ ᴛᴇᴍᴘᴏʀᴀʀʏ ᴇ-ᴍᴀɪʟ ( ʙᴏᴏᴋᴍᴀʀᴋ ᴛʜᴇ ᴘᴀɢᴇ ᴛᴏ ᴋᴇᴇᴘ ᴛʜᴇ ᴇ-ᴍᴀɪʟ)

3. ᴅᴏᴡɴʟᴏᴀᴅ "ᴛᴇxᴛᴍᴇ" ᴀᴘᴘ ғʀᴏᴍ ᴀᴘᴘsᴛᴏʀᴇ ᴡɪᴛʜ ᴀɴʏ sᴍᴀʀᴛᴘʜᴏɴᴇ/ɪᴘᴏᴅ/ᴛᴀʙʟᴇᴛ ᴏʀ ɢᴏᴏɢʟᴇ ᴘʟᴀʏ.

4. ᴏᴘᴇɴ ᴛᴇxᴛᴍᴇ ᴀᴘᴘ ᴀɴᴅ ᴄʀᴇᴀᴛᴇ ᴀ ᴀᴄᴄᴏᴜɴᴛ ᴡɪᴛʜ ʏᴏᴜʀ ᴛᴇᴍᴘᴏʀᴀʀʏ ᴇ-ᴍᴀɪʟ.

5. ᴏɴᴄᴇ ʟᴏɢɢᴇᴅ ɪɴᴛᴏ ᴛᴇxᴛᴍᴇ ᴀᴘᴘ ɢᴇᴛ ᴀ ғʀᴇᴇ ᴘʜᴏɴᴇ ɴᴜᴍʙᴇʀ ʙʏ ᴇɴᴛᴇʀɪɴɢ ᴀɴʏ ᴀʀᴇᴀ ᴄᴏᴅᴇ ( ғᴜʟʟ ᴄᴀʟʟɪɴɢ/ᴛᴇxᴛɪɴɢ ᴄᴀᴘᴀʙɪʟɪᴛʏ)

ɢᴏᴏɢʟᴇ ᴘʟᴀʏ ʟɪɴᴋ ғᴏʀ ᴛᴇxᴛᴍᴇ : ʜᴛᴛᴘs://https://play.google.com/store/apps/details?id=com.textmeinc.textme&hl=en ( ᴘᴄ )

ᴅᴏɴᴇ (: ɴᴏᴡ ʏᴏᴜ ʜᴀᴠᴇ ᴀ ғʀᴇᴇ ᴘʜᴏɴᴇ ɴᴜᴍʙᴇʀ ᴀɴᴅ ғʀᴇᴇ ᴛᴇᴍᴘᴏʀᴀʀʏ ᴇ-ᴍᴀɪʟ 

@hackers_tools_store
39 views05:09
Open / Comment
2021-05-31 11:18:09 UDEMY COUPONS 100% FREE FOR LIMITED TIME | by safron4e

Python y Flask. Desarrollo web y APIS tipo REST con Flask

https://www.udemy.com/course/curso-python-y-flask-desarrollo-web-y-apis-tipo-rest/?couponCode=GRATIS-FLASK

Selenium in C# - Setup Simple Test Automation Framework

https://www.udemy.com/course/selenium-in-c-sharp-taf-for-beginners-learnit/?couponCode=SEL_C_MAY_FREE_3

Building Recommender Systems with Machine Learning and AI

https://www.udemy.com/course/building-recommender-systems-with-machine-learning-and-ai/?couponCode=6E432B15E3A7F5B35820

Practical MySQL for Data Analysis

https://www.udemy.com/course/mysql-data-analysis/?couponCode=LIGENCYGA

Data Structures in Python

https://www.udemy.com/course/mysql-data-analysis/?couponCode=LIGENCYGA

English Course - Learn English with Animations and Dialogues

https://www.udemy.com/course/english-course-with-animations-and-dialogues/?couponCode=FREECORPUS

Adobe Photoshop CC Crash Course Learn Photoshop In Two Hour

https://www.udemy.com/course/essential-adobe-photoshop-free-photoshop-crash-course/?couponCode=PHOTOSHOPSHORTOURSE
81 views08:18
Open / Comment
2021-05-31 05:08:59 Missing line of code leads to $7.2 million exploit of DEX BurgerSwap

https://www.theblockcrypto.com/post/106457/missing-line-of-code-leads-to-7-2-million-exploit-of-dex-burgerswap
86 views02:08
Open / Comment
2021-05-30 12:46:42 Ransomwares Pack

1. Encoder Builder v2.4
2. RansomWare Builder v2.1
3. Arsium Ransomware Builder
4. Hidden Tear
5. Infected Monitor 1.2
6. Petya and GoldenEye BUILDER
7. Sauron Android Locker
8. Tinycrypt Ransomware
9. ShellLocker Ransomware
10. Winlocker builder 0.5
11. Atom
12. CryptoLocker
13. Goransomware
14. MyLittleRansomware
15. NxRansomware
16. ShellLocker Ransomware
17. Ghost Ransomware
18. Verci Spy System
19. Lime RAT + Ransomware


This is my collection of ransomwares and some ransomwares in this collection are very valuble. It took few years to collect them all, if you need my collection you can purchase it right away for $20.

Some Ransomwares are working offline but some has to be controlled using a panel. Some of ransomwares contains the source code and you have edit it as your need.

To buy or for more info PM @tools_store_admin

Payment Methods - Bitcoin, Ehereum, Litecoin, Monero, Zcash, Bitcoin Cash

Disclaimer - I do not promote any malicious activity and use these tools at your own risk.

If you have any other Ransomware which is not included in this list you can offer it to me and in return you can have a copy of this collection for free.
98 views09:46
Open / Comment
2021-05-30 12:45:18 Lionsgate ×8 Hits
https://ghostbin.co/paste/a8b7hta

Hbo Max ×6 Hits
https://ghostbin.co/paste/b72kb

Scribd ×4 Hits
https://ghostbin.co/paste/etnys

Note: Im not responsible of any actions done with the accounts, these are shared for educational purposes.
The paste links only valid for a day.
90 views09:45
Open / Comment
2021-05-30 07:24:43 365 Stealer

365-Stealer is a tool written in Python3 which can be used in illicit consent grant attacks. When the victim grant his consent we get their Refresh Token which can be used to request multiple Tokens that can help us in accessing data like Mails, Notes, Files from OneDrive etc.
Features
Steals Refresh Token which can be used to grant new Access Tokens for at least 90 days.
Can send mails with attachments from the victim user to another user.
Creates Outlook Rules like forwarding any mail that the victim receives.
Upload any file in victims OneDrive.
Steal's files from OneDrive, OneNote and dump all the Mails including the attachments.
365-Stealer Management portal allows us to manage all the data of the victims.
Can backdoor .docx file located in OneDrive by injecting macros and replace the file extension with .doc.
All the data like Refresh Token, Mails, Files, Attachments, list of all the users in the victim's tenant and our Configuration are stored in database.
Delay the request by specifying time in seconds while stealing the data
Tool also helps in hosting the dummy application for performing illicit consent grant attack by using --run-app in the terminal or by using 365-Stealer Management.
By using --no-stealing flag 365-Stealer will only steal token's that can be leverage to steal data.
We can also request New Access Tokens for all the user’s or for specific user.
We can easily get a new access token using --refresh-token, --client-id, --client-secret flag.
Configuration can be done from 365-Stealer CLI or Management portal.
The 365-Stealer CLI gives an option to use it in our own way and set up our own Phishing pages.
Allow us to steal particular data eg, OneDrive, Outlook etc. by passing a --custom-steal flag.
All the stolen data are saved in database.db file which we can share with our team to leverage the existing data, tokens etc.
We can search emails with specific keyword, subject, user's email address or by filtering the emails containing attachments from the 365-Stealer Management portal.
We can dump the user info from the target tenant and export the same to CSV.

https://github.com/AlteredSecurity/365-Stealer
94 views04:24
Open / Comment