• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

Stupid E-mails – Carding, Coins, Bombs & More!

October 21, 2009

Views: 35,261

[ad]

Ah it’s that time of the year again when all the back to skoolers have some mad l33t knowledge and wanna h4x0r the planet or something.

Hmmm website hacking, sounds simple eh?

thriller wrote:
hai i would like to know website hacking how?……… sedn to my mail

Ok I’m following up up to the exploding part? Not quite sure about that one.

kesarjahs wrote:
hi 2 all, i just want to ask if you have program for hacking of yahoomail /gmail account? If you don’t mind can you send it to my gmail account coz i want to hack and try to explode. I’m looking forward to the end such a long time.

sincerely,
Kesar Jahs

Ok this one is really bizarre, what kind of question does he expect actually?

Jason Davis wrote:
What is this site. I’m a lil lost
J

WTF, does this look like Security Focus? Oh right copy and paste, at least have the decency to change the e-mail you lazy fuck.

Rudra wrote:
Hello,
I’m the senior product manager and a founder employee of Wank Security – the industry’s leading on demand penetration testing company. Previously I’ve written articles in Hakin9, infosec magazine and CISSP training materials for renowned authors. I would also like to contribute to Security focus on a wide variety of topics including penetration testing. Please let me know if you are accepting articles at this point. Offline, I’ve been working on a article on security threats for online gaming. I can contribute this one if it fits your requirement to start with.

Hope to hear from you soon!

Thanks!
Rudra

Ah back to the normal cheating spouse/erase my debt thing going on.

Aliana wrote:
Quick background – I would like to start a new life, my x husband ran my credit to the ground. I am a 28 year old mother and am seeking someone who can help me erase my debt. If you know of anyone please pass on my email address, if not I am sorry to have wasted your time. Thank you!

What’s the bet this guy is Indian, all their e-mails start with ‘Sir’. BTW if you find the magic undetectable hacking tool Fadi, I want a copy too – thanks.

Fadi wrote:
Dear Sir,
i m looking for undetectable hacking tool to purchase is there any so please tell mei didn’t found any yet :( please sir i shall be highly thankfull to u .

I’m not exactly sure what kind of site people think this is, but since when did we do identity searches? She didn’t even mention what country she’s in or how I’m supposed to locate this mysterious person.

Nia wrote:
Do u need the permission of the individual to be able to give me their location?
And how much will it cost for one search?

Website: Hotmail

Credit cards? I have plenty, you can have them all if you want..I keep buying stuff I don’t really need.

noname wrote:
I want to buy credit card what to do to buy?

mig22 or mig33? Make up your mind..

ahmad wrote:
dear friend,
i just wanted to request you something. there is a software used for chating via mobile. its name is mig22. i want to request you to find some way or make some software for that , for hacking or cracking mig33 password. i will be very thankful to you.
waiting for your reply

Oh wow, poor you Louis. I swear people seem to think every ‘hacker’ runs some kind of hack on demand password recovery scheme.

Louis wrote:
Hi,

My ex stole my email accounts and changed all the details so I cant access them or recover them, can you please help me get the passwords so I can recover the email accounts?

Thanks in advance,

Louis

This one sounds like a 419er.

collins masango wrote:
i would need a good creditcard dealer to be suppling me with numbers,this for long time deal,preferably russian,german,canadian,uk or american

This one is a little bit scary..and disjointed, coins and bombs? What a combination.

Alana wrote:
I looking for imfo on atm and coin machines and how to crack into them and on bombs

Keep an eye on the retards here:

https://www.darknet.org.uk/category/retards/

Related Posts:

  • Deloitte Hacked - Client Emails, Usernames &…
  • An Introduction To Web Application Security Systems
  • nbtscan Download - NetBIOS Scanner For Windows & Linux
  • MyEtherWallet DNS Hack Causes 17 Million USD User Loss
  • Powershell-RAT - Gmail Exfiltration RAT
  • Ethereum Parity Bug Destroys Over $250 Million In Tokens
Share
Tweet
Share
Buffer
WhatsApp
Email

Filed Under: Stupid E-mails Tagged With: brute-force, carding, cracking, credit card numbers, hack facebook, hack hotmail, hacking-gmail, idiots, Phishing, Retards, spam, spammers



Reader Interactions

Comments

  1. L1GhtY0Ru1ch1 says

    October 21, 2009 at 8:45 am

    Wank Security – LOL Epic

    This should be on 4chan, seriously.

  2. netinfinity says

    October 21, 2009 at 8:47 am

    Laughed my ass off :D
    Rudra rules! He uses send to everyone button. Let us all be Security Focus. :D

  3. KY says

    October 21, 2009 at 8:55 am

    HAHAHAH hilarious. lol

  4. Alemany says

    October 21, 2009 at 11:03 am

    LoL :D

  5. fuzion says

    October 21, 2009 at 11:12 am

    just wait until you get something on milw0rm… now those are interesting emails

  6. Rishabh Dangwal says

    October 21, 2009 at 12:36 pm

    ROFLMAO…. :D

  7. embe says

    October 21, 2009 at 1:53 pm

    he needs the coins to make the bombs obviously. lmao

  8. embed says

    October 21, 2009 at 2:03 pm

    Fadi has got a big problem!
    He’s searching for the “undetectable” hacking l33t tool, but it’s undetectable – so he won’t be able to find it :D

  9. Marco Ramilli says

    October 21, 2009 at 4:24 pm

    Yea, that’s funny but in my opinion this is a good alert on what is happening on security. People think that hacking means download programs and run then, don’t understanding what’s real happening. People don’t understand the true importance of security, joking with it (hopefully last message from Alana), and again, these messages (mails, comments or whatever) show the negligence of people.
    I mean.. under this point of view, it’s quite scary. Where’s security going ?

  10. droope says

    October 21, 2009 at 6:49 pm

    “Retard” is a very strong word, IMO. Stupid would be most fitted :D

    Naaaah, jokes aside, I am sure these people are very smart, in some aspect (obviously not hacking). :P

    Cheers!
    Droope

  11. arkizzle says

    October 21, 2009 at 9:42 pm

    Wank == on-demand penetration-testing

    so true!

  12. David says

    October 22, 2009 at 11:52 am

    haha this is great. i love how everyone thinks hacking is so easy.

  13. John says

    October 22, 2009 at 12:20 pm

    Coins are obviously shrapnel

  14. Ronald says

    October 22, 2009 at 1:58 pm

    is this indicative of the next generation of script kiddies?

  15. Marco Ramilli says

    October 22, 2009 at 2:16 pm

    That’s why I’m afraid about that.
    Maybe some time ago, the “new security people” were interested on what will happen to the system by changing the normal behavior, now new security kiddies are just interested on the consequences, and to the fastest way to break systems. I dunno but it’s weird for me.
    Finally, yes Ronald, in my opinion that’s indicative of next gen. sk.

  16. netinfinity says

    October 22, 2009 at 9:07 pm

    But havent it always been like this?
    There were always skiddies, and there will always be skiddies. It’s human nature – not everyone is a hacker. But there are alot wanna be’s :D

  17. bi0os says

    October 24, 2009 at 4:13 pm

    kkkkkkkkkkkkkkkkkkkk =D

  18. cbrp1r8 says

    October 26, 2009 at 3:35 pm

    LMAO….Security Focus….Classic…. :-)

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Systemic Ransomware Events in 2025 - How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Views: 1,834

Jaguar Land Rover’s prolonged cyber outage in 2025 turned what would once have been a “single … ...More about Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

SmbCrawler - SMB Share Discovery and Secret-Hunting

SmbCrawler – SMB Share Discovery and Secret-Hunting

Views: 1,740

SmbCrawler is a credentialed SMB spider that takes domain credentials and a list of hosts, then … ...More about SmbCrawler – SMB Share Discovery and Secret-Hunting

Heisenberg Dependency Health Check - GitHub Action for Supply Chain Risk

Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Views: 1,119

Heisenberg Dependency Health Check is a GitHub Action that inspects only the new or modified … ...More about Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Dark Web Search Engines in 2025 - Enterprise Monitoring, APIs and IOC Hunting

Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

Views: 2,835

Dark web search engines have become essential for enterprise security teams that need early … ...More about Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

mcp-scan - Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Views: 1,042

mcp-scan is a security tool from Invariant Labs that can run as a static scanner or as a dynamic … ...More about mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Initial Access Brokers (IAB) in 2025 - From Dark Web Listings to Supply Chain Ransomware Events

Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Views: 922

Initial Access Brokers (IABs) have moved from niche forum actors to central wholesalers in the … ...More about Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (8)
  • Countermeasures (232)
  • Cryptography (85)
  • Dark Web (6)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (433)
  • Forensics (64)
  • GenAI (13)
  • Hacker Culture (10)
  • Hacking News (237)
  • Hacking Tools (709)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (241)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (107)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (171)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,424,638)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,174,078)
  • Top 15 Security Utilities & Download Hacking Tools (2,097,505)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,200,311)
  • Password List Download Best Word List – Most Common Passwords (934,597)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (777,333)
  • Hack Tools/Exploits (674,283)
  • Wep0ff – Wireless WEP Key Cracker Tool (531,367)

Search

Recent Posts

  • Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like November 26, 2025
  • SmbCrawler – SMB Share Discovery and Secret-Hunting November 24, 2025
  • Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk November 21, 2025
  • Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting November 19, 2025
  • mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers November 17, 2025
  • Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events November 12, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2026 Darknet All Rights Reserved · Privacy Policy