text
stringlengths 6
631
⌀ | labels
int64 0
8
| texts
stringlengths 18
222
⌀ | label_name
stringclasses 9
values |
---|---|---|---|
Password is selected! Now let's try to hack the account password using the dictionary: | 0 | null | Cybercrime |
NUMBER. A new algorithm for re-initializing accounts has been added - initialization with generation of unique mobile devices for each account. We recommend choosing this option for initializing accounts when working in bulk. | 0 | null | Cybercrime |
Generates passport scans, templates, seals and everything. | 0 | null | Cybercrime |
used the company's services - this is a program for mass mailings! Very convenient! Saves time and guarantees excellent results at an affordable price!! NUMBER I recommend! | 0 | null | Cybercrime |
DOWNLOAD Manual on hacking VK and Yandex disk installations. Password for the archive in the Comments. | 0 | null | Cybercrime |
NUMBER. MEGASHAR dg.tv/ - Large torrent tracker. Everything you need: music, movies, videos, games absolutely free! | 0 | null | Cybercrime |
All accounts were alive at the time of distribution. There are quite a lot of accounts, a lot of fat ones! | 0 | null | Cybercrime |
Similar schemes are being spread in Tg. Be vigilant. | 0 | null | Cybercrime |
In addition, many well-known anonymity checkers are directly related to the companies that develop AF systems, which makes it possible to compromise the addresses and configurations from which such resources were visited. | 0 | null | Cybercrime |
- F is spreading false schemes for earning money, allegedly using TN network tokens | 0 | null | Cybercrime |
- Korean hackers steal cryptocurrency via Tg | 0 | null | Cybercrime |
For such hacking of VK you will not get anything, since the selection of the password is done through our xy servers.:d: | 0 | null | Cybercrime |
In the domestic F, fake offers of earnings up to NUMBER’ rubles appeared on the still non-working Tg Ntw TN platform. The scammers published a link to a site on the social network, imitating the page of the domestic media RBC. | 0 | null | Cybercrime |
NUMBER% of BTC trading volume is fake, and Korean hackers are stealing cryptocurrency via Tg | 0 | null | Cybercrime |
Hello everyone, I need someone who can extract the user base from the site. There is information on how to enter the admin panel, as well as an example of a login and password. In PM. | 0 | null | Cybercrime |
Attackers create fake crypto company websites and Tg groups, distributing malware through them. The virus is launched directly from the messenger folder and gains access to the computer. | 0 | null | Cybercrime |
The fake page contains information about an “investigation” with attached links to a third-party portal with a video about a “unique scheme” for enrichment and a fraudulent offer to register on Tg Ntw. | 0 | null | Cybercrime |
According to Kssy L, users from Russia, China, Poland and the UK were attacked. Not only individual investors suffered, but also companies related to cryptocurrency. | 0 | null | Cybercrime |
- A resident of Cheboksary suffered from crypto scammers | 0 | null | Cybercrime |
If your work involves changing browser parameters and fingerprints, then the probability of whether the Antifraud of a website or service will notice these changes is fundamental to success. | 0 | null | Cybercrime |
North Korean hackers are believed to have used phishing attacks and computer viruses to steal digital currency, which was then laundered and cashed out at Singapore banks. The commission did not disclose the total amount stolen. | 0 | null | Cybercrime |
- North Korea Accused of Money Laundering Using Cryptocurrencies | 0 | null | Cybercrime |
A resident of Cheboksary became a victim of a fraudulent scheme by cryptocriminals. He received a call from a woman who told him that she knew how to earn a large sum. | 0 | null | Cybercrime |
VK H is an authorized program for hacking a page in All that remains is to copy the required ID into the VK H program, press the Bt button and go boldly drink tea and walk. | 0 | null | Cybercrime |
VK H NUMBER.NUMBER — VKontakte hacking programHow often have you wanted to hack someone else's VK page? Read messages, delete friends and other necessary things? And have you ever wondered how to do this? | 0 | null | Cybercrime |
The hacker group Lzs, which is linked to the DPRK, has modified its cryptocurrency theft scheme. Previously, only MS users were at risk, now Wdws owners are also at risk, Kssy L reports. | 0 | null | Cybercrime |
A resident of Cheboksary suffered because of crypto scammers. Bitcoin is recovering, and illegal schemes for earning money with the help of TN have appeared in F. | 0 | null | Cybercrime |
Friends, as you know, perform a lot of tasks that require you to quickly switch between a large number of accounts including social networks, and at the same time, it is extremely important to move away from fingerprints and other tracking mechanisms. | 0 | null | Cybercrime |
At least wherever there is internet there is wiretapping. I personally encountered this, I will tell you later. | 0 | null | Cybercrime |
Lyudmila, this topic is for the Apple People kids or whoever they are - who read about encryption keys, installed the program and are bankrupting left and right. | 0 | null | Cybercrime |
And you won’t have to worry about wiretaps and surveillance. | 0 | null | Cybercrime |
Maybe in the room. Hang up a webcam, you'll find out. | 0 | null | Cybercrime |
Forgive me, it sounds a bit wild. For basic computer security reasons, it's stupid to open such letters. So even if he sends them, there's no guarantee they'll receive them. | 0 | null | Cybercrime |
He wants to get into your personal messages and consult on your behalf | 0 | null | Cybercrime |
And by the way. I see I went into my contact an hour ago. The Internet is disconnected at home and on my phone. That means I connected from the neighbors or something else. I looked for access from the neighbors - everything is password-protected. | 0 | null | Cybercrime |
How will the collectors go to court with a monitor? Do you understand what I'm getting at? No paper - no evidence. Or maybe I'm a miracle hacker and hacked your computer? Then how can I prove that YOU took it and not Sidorov-Petrov? I lost my passport. Forgive me, Lord - what am I teaching you? | 0 | null | Cybercrime |
"Good" comrade Of course he liked that you were giving him a cut of your winnings. But if he behaves so meanly, you can call the office and tell everything. According to the rules, another person has no right to bet from someone else's account. They will block him | 0 | null | Cybercrime |
I suggest that we ban the author of this topic and send him off to have fun. | 0 | null | Cybercrime |
And MTS and ANUMBER at one time dialed the phones, sold them and the money.... | 0 | null | Cybercrime |
Konga - hysterics, they call constantly from the first day trying to write off money from the card right away! There were no overdue payments in Pay PS and Mig | 0 | null | Cybercrime |
I read the topic for the first time and caught myself thinking that I agree with you on everything... I reread it and came to my senses. I remember the joke about the Chinese hacking a computer... so who is zombifying whom here? | 0 | null | Cybercrime |
In addition, we want to inform you that cracked versions of the software stop working. We offer everyone who used the crack to come over to our side - we have cookies | 0 | null | Cybercrime |
The promotion is valid for new users of the tracker. | 0 | null | Cybercrime |
Get cashback on your L S balance: NUMBER% for sf-std tracker and NUMBER% for cloud tracker | 0 | null | Cybercrime |
For a quick start with the tracker, we recommend reading the manual: NUMBER. Adding a source, PP and creating a campaign - … -NUMBER. Integrating the tracker with the pre-landing, setting up both TDS and generating the final link - … --tds | 0 | null | Cybercrime |
- We will find out the original login and password THE VICTIM WILL NOT KNOW ABOUT THE HACKING - You can always ORDER THIS hacking service, it is enough to know the URL or pages; | 0 | null | Cybercrime |
We can select for you a password for the following email accounts: . st. x. . . ydx. g. .t y. t. q-t . vt. etc. We also hack social networks: dss. vtt.Istg. etc. | 0 | null | Cybercrime |
We will also return your mailbox if it was hacked and the password was changed. | 0 | null | Cybercrime |
Although the program assigns different s gt to all accounts, for some reason, when the TR address is changed again, it is assigned to all accounts the same. Here are screenshots of two accounts, here is ... NUMBER.g and here is ... dd.g | 0 | null | Cybercrime |
As you can see, they have different s gt, one account has Wdws and browser C, and the other has Lx and browser FFx, but for some reason TR assigns them the same address ...NUMBER | 0 | null | Cybercrime |
This shouldn't happen. In theory, the TR browser should assign two different accounts completely different I addresses. Since these are essentially completely different computers. One account has Wdws and the C browser, and the other has Lx and the FFx browser. | 0 | null | Cybercrime |
Please, dear hackers, tell me how to make it so that when TR browser assigns new ones, they are assigned to all accounts differently, and not the same one. I can pay within rubles for solving the problem. | 0 | null | Cybercrime |
and TR browser starts to give out addresses of a specific country. In this example, osii | 0 | null | Cybercrime |
Ydx M base for brute St Zabugor Mail, the base was valid at the time of distribution % I advise checking the base on: g, Mft, WZ, Sy. | 0 | null | Cybercrime |
* Hacking websites. Draining website database. | 0 | null | Cybercrime |
* Hacking online games, cheating resources. Draining someone else's account. | 0 | null | Cybercrime |
* Password cracking v, , f. | 0 | null | Cybercrime |
I will help with hacking:Contacts: s..ySocial networks: vtt.ds.f.ys.vt.twtt. E addresses:.ydx.*Hacking accounts from dating sites: checkOther information can be found by contacting us via -- s..y | 0 | null | Cybercrime |
..f.. - these are professional services of hacking, dds attacks and much more. | 0 | null | Cybercrime |
Dear customers, I am writing to you again. Where it says Hacking All orders through my personal account, this is a fraudster and swindler, he is deceiving people! And then complaints to me from people he is deceiving. Do not write D or you will simply lose money. | 0 | null | Cybercrime |
I provide hacking services: Vkontakte, Odnoklassniki, FB. For all questions - by email. Payment accepted - Yandex Money, phone bill or Qw - I accept orders by mail vz.t. Everything is anonymous! I am waiting for your orders! | 0 | null | Cybercrime |
I will teach grandfathers brute force and much more. Not expensive. | 0 | null | Cybercrime |
Hacking: - WtsA - V - Tg - VKontakte - Istg - Odnoklassniki - F And any other social networks, we also work with foreign ones. | 0 | null | Cybercrime |
Your privacy is guaranteed. No prepayments. We work through a proven guarantor service, real evidence of hacking, quote your message, deletion/addition to the black list, change of personal information, etc. | 0 | null | Cybercrime |
Social Media and Email Hacking Services from FCs | 0 | null | Cybercrime |
A new Trojan virus d is being distributed via the social network VKontakte, the purpose of which is to steal money from owners of devices on the Ad platform. This was reported by Kaspersky Lab. | 0 | null | Cybercrime |
The new virus is notable for its functionality: it can send messages to short numbers, while correctly responding to requests to confirm payment for the service, and is also capable of subscribing the gadget owner to paid services. | 0 | null | Cybercrime |
Give me a program to hack ICQ/mailTeach me how to hackHelp me hack the game | 0 | null | Cybercrime |
Those who decided that being a hacker is cool, that all roads are open to a hacker, that you can find out in five minutes whether your girlfriend is cheating on you, hack some bank, and always be elusive - can immediately throw this crazy idea out of your head. | 0 | null | Cybercrime |
Hi guys, can you tell me how to hack WIFI, or with the help of some software? | 0 | null | Cybercrime |
Selling Yandex Direct accounts. Price NUMBER% of balance. Bargaining is possible. Accounts are not brute and not coupons. With full access to mail, secret word. | 0 | null | Cybercrime |
* R.., Tg: and WtsA Hacking Services * : | 0 | null | Cybercrime |
Hello Forum Members and Forum Guests! I provide services in the field of hacking! | 0 | null | Cybercrime |
-- Working with numbers wiretapping, tracking SMS in real time, restoring archives-- Remote access to the device based on Ad/S/Wdws-- Hacking Sy-- Possible complete cleaning of the BKI bank credit history, increasing the scoring score | 0 | null | Cybercrime |
The password does not change at the client's request I provide any evidence of hacking Price negotiable Complete anonymity Accepted for payment = Yandex money - Qw - Bt - Wy - MstCd | 0 | null | Cybercrime |
Hacking the intercom - The archive provides information with which you can freely enter the entrance | 0 | null | Cybercrime |
Download from torrent here Hidden text: To view hidden text - log in or register. Well, you know, links are only visible to registered users hahahaha | 0 | null | Cybercrime |
Is it really possible to find a person who can hack a page? | 0 | null | Cybercrime |
Is it really possible to find a person who can hack a page? Well, actually, yes. | 0 | null | Cybercrime |
Ku all! Can someone help to hack or show and explain how to hack a page in the social network VKontakte. I will be very grateful to anyone who helps! | 0 | null | Cybercrime |
Training in hacking social networksGood day. Need to break a page with its further use. I'd like to. Voice the amount. Thanks in advance. | 0 | null | Cybercrime |
Hacking of mail and social networks from the hacker team dd.g.t. | 0 | null | Cybercrime |
NUMBER. Hacking messengers messages: WtsA, V, Tg | 0 | null | Cybercrime |
NUMBER. Hacking social networks: VKontakte, Istg, Odnoklassniki, F, Twtt | 0 | null | Cybercrime |
NUMBER. Hacking the website database:NUMBER.NUMBER Draining the website databaseNUMBER.NUMBER Remote access to the website panel | 0 | null | Cybercrime |
NUMBER. Hacking mail:NUMBER.NUMBER Hacking . ., st., x., ydx., . and others.NUMBER.NUMBER Hacking g., y., t., v. and others.NUMBER.NUMBER Hacking corporate mail is discussed individually | 0 | null | Cybercrime |
The databases are great for brute force, for mass testing for various sq\xss\t vulnerabilities. DtLf Eg databases are also suitable for crummer. The methods of using and monetizing these databases are limited only by your imagination. | 0 | null | Cybercrime |
The project administration is conducting an internal investigation into the causes and consequences of the hack. | 0 | null | Cybercrime |
How effective is using mobile proxies to bypass blocks on popular social networks? | 0 | null | Cybercrime |
Hacking mail: . and substitutions - р g. - рHacking accounts v. - рWe work without prepaymentfor communication:j: sy.jmail: vz.ty.. | 0 | null | Cybercrime |
Looking for someone who can help a newbie figure out how to hack emails, accounts, etc. Please write to tNUMBER. | 0 | null | Cybercrime |
The task of the contest participants is to bypass T At Fw — the application-level firewall of the company stv Tgs. This year, the vulnerabilities were introduced into a specially prepared website. | 0 | null | Cybercrime |
A successful bypass will be counted upon handing in special flags. Not only forum participants, but all Internet users will be able to try their hand. | 0 | null | Cybercrime |
I have never used hackers before, but now I simply need their help. I need to hack the dating site Badu. I found this working site. Has anyone contacted them before? | 0 | null | Cybercrime |
Selling stg brut accounts with ru and sng aging with unique cookies Prices depend on the number of subscribers on the account FREE TESTS ANY VOLUMES WRITE IN TELEGRAM | 0 | null | Cybercrime |
The Department "K" of the Ministry of Internal Affairs of the Russian Federation detained two young people on suspicion of illegal activity. According to law enforcement officials, they had been hacking email accounts and social media pages for NUMBER years. | 0 | null | Cybercrime |
Individuals and legal entities contacted the hackers. The purpose of most orders was to obtain information related to the victim's personal life and commercial secrets of a number of organizations. Clients who used the criminals' services received discounts. | 0 | null | Cybercrime |
**NUMBER Hacking Dating sites we will consider any hosting | 0 | null | Cybercrime |
**NUMBER Hack friend around, V, WtsA | 0 | null | Cybercrime |
The virus itself does not harm the computer. Note: do not change the name of the virus, it may not work correctly. To disguise the Trojan, you can use joiners or archivers and your own ideas. | 0 | null | Cybercrime |