Jump to content

Registrations are Open Only for Limited Period !

After Registration's Clossed Only invite system will work

Registration of this forum is open for limited time to collect the Great Team for Cracking.

Don't be late to be the part of this community Soon the registration will be closed and invite system will work for registration

Only staff will get invite access to invite more peoples
and only users who buy Vip or Super user rank will get invite code for registration.

Staff Required

Staff Required

If you are  a Cracker Config maker Developer's or Exploiter show your Cracking Skills and get chance to be the staff team of CrackingCrew.

Complete the formalities and then submit your application for staff.

Read all the rules and follow the rules 

Good News LetsBruteit 2018 V. Updated By HNB


- Bug on in

version (11/06/2018)

- 'no user agent' added in user agent list. If you do not have it, just add it. Useful in some configs
  where you don't need to send user agent in request.

valid chars corrected (some filters were not accurate)
- Parsing function added to additionals redirect stage <<RS1VAR>> <<RS2VAR>>...<<RS7VAR>>
  These vars can be used in all successive stages.
- [ADV][empty] function added in SOURCE keys to intercept an Empty Source (with good header)
- When exporting config, Source FK on Login Stage were not exported! Corrected!
- Thanks to @klean from crackingcrew.com for the new Logo! ^^
- Protected config function added! You can now send a config as tool. The config can not be edited!
  When Bruteit loads it you can just add combo and/or proxies and bruteforce.

Search the Community

Showing results for tags 'how'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • CrackingCrew Information
    • Rules & Announcements
    • Feedback & Suggestion
    • Staff Applications
  • General LOBBY
    • Introductions
    • General Discussion
    • VIP Private Testimonials
  • Free Premium Zone
    • Free Premium Accounts
    • Serials & Keys & Codes
    • Premium Tosses And Give Away for Free, VIP
    • Premium Link Generators
  • Public Cracking Zone
    • Cracking Tools
    • RDP Tools & IPS User/Pass
    • Cracking Configs
    • Public Combos/Wordlists/Dumps/Database
    • Public Proxies/Sock's
    • Cracking Tutorials & Information
    • Crackerz Show Off
    • Cracking Requests
    • VIP Preview Section
    • VIP HQ Premium Accounts
    • VIP HQ Private Configs
    • VIP HQ Private Dorks
    • VIP HQ Private Combos
    • VIP HQ Private Proxies
    • VIP Private Leak's Tools
    • VIP HQ Private Tutorials
    • VIP Member's Requests
    • Super Preview Section
    • Super HQ Premium Accounts
    • Super HQ Private Configs
    • Private Database , Combos & tools
    • Private Leak's Methods , tools
    • Super User's Requests
    • Arena Preview Section
    • Arena Premium Accounts
    • Arena Private Configs
    • Arena Private Combos/Wordlists
    • Arena Private Leak's Tools Dorks
    • Arena Member's Requests
  • Hacking Exploiting Zone
    • Tools & Equipment
    • Exploits & Vulnerabilities
    • CC Special Dork List
    • Hacking & Security Tutorials
    • Hacking Showoff
  • Market Place
    • Trusted Sellers Section
    • Member Sellers Section
    • Buying
    • Traders Market
    • Scam Report
  • Trash
    • Trash Can

Product Groups

There are no results to display.


  • Crackingtools
    • BlackBullet Configs

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start








Website URL




  1. This guide will briefly explain how to use SQLMap to dump databases at a much quicker pace than SQLi Dumper. [Hidden Content]
  2. HOW TO MAKE COMBO WITH SQLI DUMPER (tutorial to how to make dorks) Step 1) Open SQLi Dumper, remove all dorks in "main" tab, go to "Proxies List" and copy your proxies, click on the clipboard paste sybmol "append" select your proxy type, and import. Click test proxies, do threads 250 timeout 5. After check do right click -> select all then we can start with main part. Step 2) Open Dork list, paste dorks into main. Click "Start Scanner" - Wait until checker has been completed. (You can stop the scanner after 1k links, but for best result let it r
  3. [Hidden Content]
  4. [Hidden Content]
  5. [Hidden Content]
  6. This tutorial in the category WordPress hacking will teach you how to scan WordPress websites for vulnerabilities, enumerate WordPress user accounts and brute force passwords. Enumerating WordPress users is the first step in a brute force attack in order to gain access to a WordPress account. WPScan has the option to scan a target website to retrieve a list of account names. IN this tutorial we will also look at how to hide usernames from WPScan so you can avoid the enumeration of user accounts and limit the effectiveness of brute force attempts. We will conclude this tutorial with a demonstra
  7. What is a Virtual credit card? A virtual credit card or Virtual online card is an auto-generated card created to serve for the purpose of making payments online. They are used to pay for services/transactions done on the internet and in most cases are not physically issued by a financial organization. While it is not as anonymous as paying via Bitcoin, it is far more convenient. Virtual cards are not handy, it doesn’t involve a physical plastic card, It is created with an e-number via web and it looks/acts so much like your normal cards (Visa, MasterCard, etc). The introduction of virtu
  8. HOW TO GAIN INSTAGRAM FOLLOWERS, LIKES FOR FREE 20K/Month This post will include : - Known methods to gain real followers - Private methods to gain real followers - Instagram likes & followers shop with refferals to gain some subscribers for free - Pro tips to bypass instagram ip verification - Link to some instagram bots with cracks ADDED SOME WEBSITES - JULY 2020 BTW : I do not endorse using my tools for cracking nor bruteforcing. I am posting here for EDUCATIONAL PURPOSES only. Use only on sites you own or that are OK with this.
  9. HOW TO USE SQLI DUMPER & CRACK HASHED PASSWORDS Okay im going to try and explain how to get combos using SQLi dumper and crack the hashed passwords after with steps ( recommend using SQLi dumper on a RDP or VPS or using a VPN ) FORGOT TO MENTION SQLI DUMPER HAS A PRETTY DECENT PROXY CHECKER IN "TOOLS & SETTINGS" USE IT Step 1: Download SQLi Dumper Step 2: Find Dorks, use a dork generator, use dork generator, u can find it here in Hacking Tools ez dork gen - or Combo# Step 3: Use the program Comb
  10. Hey guys! Today i'm gonna show ya how to get the Password from any account! Its very Simple! So lets Start First go to https://haveibeenpwned.com/ and put in the Email from your victim: Now select one of the services from down there (If it is Green and not Red this methode isn't working fore this email) If you have selected one, search on Google fore the Database Now download the Database and search fore your victims Email (Search fore a dehashed Database)
  11. methhead687

    `[Hidden Content] ANYWAY there are also some alternatives to snipr like sentry,BLACK BULLET, ACC REAPER, .. but while sentry is free and a great tool, i would not recommend this to a beginner because SNIPR is a tool which automatically updates its configs so you don't need to, while the others need you to constantly search the web for updated configs to replace the dead ones. So with that let's get started you with the basics: WHAT YOU NEED: [Hidden Content] AND I WOULD REALLY LIKE TO THANK PEOPLE OF THIS FORUM
  12. rumpel22

    What is to do on this side?
  • Create New...

Important Information