Jump to content

[Guide]How To make an l2 Account stealing program (With visual basic)


Recommended Posts

Posted

:o

Well done my friend :)

 

But I have not understand smth.

How I send it? By msn or what?

and when I send it, how it pops up?

Posted

:o

Well done my friend :)

 

But I have not understand smth.

How I send it? By msn or what?

and when I send it, how it pops up?

when you save it as exe you can upload it to rapidshare,4shared etc and spam the download link in game or hunt msn's from forum etc.

When you send it the victim simply open this ( like any other window) and he is giving he's id and pass to you :P

Posted

when you save it as exe you can upload it to rapidshare,4shared etc and spam the download link in game or hunt msn's from forum etc.

When you send it the victim simply open this ( like any other window) and he is giving he's id and pass to you :P

 

Ok.

But he will see only this window, not the full - screen (the bg), right? So he will not writhe his ID etc.

 

Also, you should hide it for 150-200 posts.

Posted

did somebody already do this program?

indeed he is acting? well I don't know whether it is paying to waste time to it.

 

 

Salot thanks for doing guide

Posted

Ok.

But he will see only this window, not the full - screen (the bg), right? So he will not writhe his ID etc.

 

Also, you should hide it for 150-200 posts.

nah i dont want to hide it it is very simple

did somebody already do this program?

indeed he is acting? well I don't know whether it is paying to waste time to it.

 

 

Salot thanks for doing guide

Yes they have made the program by my guide  if you have trouble pm me to help you but

if you read the guide it will take you 15 min to make the program

Posted

I have 1 problem!

when i debug it

and when write fake id kai password

i press log in button and appear me this error

in code of program

 

smtpServer.Send(mail)

 

can you tell me how to fix it?

sry for my bad english

Posted

yes you should take a better look at  6 step and the notes  in red text

if that wont help you tell me

 

 

 

 

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now



  • Posts

    • https://web.archive.org/web/20260306183214/https://maxcheaters.com/topic/241828-l2j-l2damage/page/3/ https://l2topzone.com/forum/l2-server-support-problems/9/l2damage-stopped/30514 Also we will try to push longer seasons ever ! (1135-100)/9 = 115 online
    • ONE SIDE – AND EVERYTHING BREAKS ▪ Looks like a simple case: Florida DL, back side, barcode – “clean and minimal”. ▪ In reality, these are exactly the tasks that fail most often. – data provided as plain text – request only for the back side – focus on the barcode (PDF417) ▪ And here’s the key point: ▪ A barcode is not just a “picture on the back”. It’s compressed logic of the entire document. ▪ If it doesn’t match the front, format, and data structure – the system flags it instantly. ▪ Many create a “similar-looking” code. But systems don’t read “similar” – they read by specification. ▪ In cases like this, it’s not about design. It’s about correct data assembly and how it behaves inside the format. ▪ Today only – 15% off for verification cases. ▪ Want it to pass, not just look right? Describe your case – we’ll show where even clean files break. › TG: @mustang_service ( https:// t.me/ mustang_service ) › Channel: Mustang Service ( https:// t.me/ +JPpJCETg-xM1NjNl ) #editing #photoshop #documents #verification #case
    • Your anonymity is a corpse. Blockchain forgets nothing. Your transactions are direct footprints in the hands of anyone who takes an interest. [✘] Still believe in "mixing"? Forget it. Classic Bitcoin mixers are an illusion of security. For Chainalysis and Elliptic algorithms, any attempt to hide tracks in the ledger is transparent. Your "mixing" is an artifact that gets filtered out in seconds. Every transaction leaves a trail that leads to frozen assets or unwanted questions from exchanges.  We don't mix. We break the link. [-] Input: Your "dirty" coins (Dirty BTC/ETH) with all their history and digital markers stay with us. [+] Output: You receive absolutely clean assets (Clean Crypto) from our reserves, which have never intersected with your past. This isn't a game of hide and seek. This is the surgical removal of your financial history from the system.   ------------------------------------------------------------------- Technical indexing: Bitcoin Mixer, Crypto Mixer, Clean BTC, Clean ETH, Anti-Chainalysis, Best Bitcoin Mixer, Anonymous Crypto Exchange, NoLog Mixing Service.
    • Here you are: https://l2crypt.com/l2-tools/l2editor-source/
  • Topics

×
×
  • Create New...

Important Information

This community uses essential cookies to function properly. Non-essential cookies and third-party services are used only with your consent. Read our Privacy Policy and We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue..