BTC $43545.2564
ETH $2255.0389
XMR $174.4643
BNB $230.0315
DASH $32.3300
LTC $73.3668
TRX $0.1052
TRC $6.2000
ZEC $31.6597
XRP $0.6379
DOGE $0.0955
ADA $0.4434
USDT $1.0110
BTC $43545.2564
ETH $2255.0389
XMR $174.4643
BNB $230.0315
DASH $32.3300
LTC $73.3668
TRX $0.1052
TRC $6.2000
ZEC $31.6597
XRP $0.6379
DOGE $0.0955
ADA $0.4434
USDT $1.0110
  • Catalog
  • Blog
  • Tor Relay
  • Jabber
  • One-Time notes
  • Temp Email
  • What is TOR?
  • We are in tor
    • Other

      Hackers from Iran's MuddyWater group use cutting-edge cyberweaponry to escape Israeli defenses

      Iran's MuddyWater group, affiliated with the Iranian Ministry of Intelligence, is using a new command and control system called MuddyC2Go to launch cyber attacks against Israel. The Go programming language was used to create the MuddyC2Go web component, which was replaced by their other development,...

    • Other

      Woman from Nevada Arrested After Hiring a Hitman on the Dark Web

      What could you do with $5,000 in 2016? Quite a few things, maybe buy a secondhand car or perhaps go on a fancy holiday along with your family. But Kristy Lynn Felkings from Nevada had a different plan and decided to spend the money to hire a hitman on the dar​k web. She pleaded guilty in front of a...

    • Other

      Inside the Dark Web Economy: The Shocking Value of Your Personal Information

      There’s nothing more traumatic than having your passwords stolen. Imagine your email or banking information in someone else’s hands and what they can do with your card. It’s not just traumatic, but it can also cause immeasurable damage. And despite all these, a quick look over the...

    • Other

      Upgrading your crypto protection from TrueCrypt to VeraCrypt 1.26

      Smart cards and new technologies increase security. VeraCrypt 1.26 was released after an 18-month period of development. The initiative is a continuation of the defunct TrueCrypt disk partition encryption system. The RIPEMD-160 algorithm used by TrueCrypt has been replaced by SHA-512 and SHA-256 in...

    • Other

      Millions of Exim mail servers are vulnerable to RCE zero-day attacks

      Vulnerabilities in Exim require immediate action. Due to serious vulnerabilities, many servers that use the Exim mail transfer agent are now potential targets for attacks. These flaws enable remote execution of malicious code without user interaction. The Zero Day Initiative (ZDI) first alerted th...

    • Other

      Hacker Group Clop Strikes Again & Holds Private Data to Ransom

      Names, private details, company profiles, and confidential information regarding dozens or even hundreds of victims have been published by the popular hacker group Clop, holding all this data for ransom. Such headlines are quite common these days, especially since everyone can access the dark web w...