In 2024 we changed the methods...(this tutorial and a translated version so be cool) and that I am currently...I am waiting for your feedback and question because I and also, worked together MP me account netflix, amazon baker ect....
1-a VPN that does not keep any logs and the one I use is MULLVAD and MULLVAD works using a key to authenticate, which means that what you do on the VPN is not registered under your name but under this key to which everyone can have access. Cryptostorm is another key authentication VPN.
2-A program:
-OPENBULLET is the easiest to use cracking tool and the program with the most free public configurations. Configurations must be in .loli format
-OPENBULLET ANOMALY is a mod for openbullet that allows it to execute .anom/.loli configurations
-SILVERBULLET is a new version of openbullet allowing you to run .svb/.anom/.loli and has additional plugins
-SENTRYMBA is obsolete, but some people still use it.
-SNIPR is a paid tool provided with many built-in configurations and a proxy scraper.
-In my opinion, BLACKBULLET is basically identical to openbullet.
-STORM, another free verifier with many public configurations.
-WOXY 3.0 for mail access
-AIO verifiers are ALL-IN-ONE verification programs, for example mailify or monarchy for mail access, SLICEAIO/Bazooka for Minecraft streaming, etc. AIO is normally pre-installed with configurations and configurations are updated with the tool. Use an AIO for easy use. NOTE most AIO controllers and configurations can be created in openbullet
3- connfig:
-Configurations can be created in openbullet much more easily than other verification tools, this means that there are many configuration creators. If you want a configuration for a specific site, you will have to create it yourself or pay someone to do it for you.
The configurations section is a great place to find configurations and most sites should be here.
If you need HQ configurations, you will probably have to pay someone to create a configuration/verifier or access a combined cloud.
If the configurations are unproxyed, it means that you are using the current IP address of your PC or RDP, which means that it will probably be faster, but you could be banned from the IP address. This also puts you at risk because each request comes from the same source IP address.
4-the combo:
-The combolist section is a great place to get SEMIHQ combos, they should be suitable for personal use, but if you sell accounts, you will want to buy combos or create your own.
Making your own combos consists of emptying site databases with sqlmap/sqlidumper or another tool.
For combos, you will use dorks to analyze search engines for vulnerable sites in order to use sqlmap or a similar tool to empty databases.
The way SQLI Dumper works is to use Google Dorks, which is essentially what the program searches for on Google.
5-proxies:
Https://luminati.io/ -better/not free
StackPath
Https://proxyscrape.com/free-proxy-list - FREE
Proxies are a server application or device that acts as an intermediary for customer requests. This means that when the robots make the connection request, they will use the proxy server and hide your IP address behind it. This is useful for anonymity and when you are banned for sending too many connection requests, you can change your proxy and try again.
I have included some links to proxy sites and if you do not want to pay, use a free proxy. You can use API rotating proxies in openbullet using these remote sources.
If this link doesn't work use githublink:
Or
Or
TYPES of PROXIES
HTTP
SOCKS4 - ONLY TCP
SOCKS5 - TCP/UDP
1-a VPN that does not keep any logs and the one I use is MULLVAD and MULLVAD works using a key to authenticate, which means that what you do on the VPN is not registered under your name but under this key to which everyone can have access. Cryptostorm is another key authentication VPN.
2-A program:
-OPENBULLET is the easiest to use cracking tool and the program with the most free public configurations. Configurations must be in .loli format
-OPENBULLET ANOMALY is a mod for openbullet that allows it to execute .anom/.loli configurations
-SILVERBULLET is a new version of openbullet allowing you to run .svb/.anom/.loli and has additional plugins
-SENTRYMBA is obsolete, but some people still use it.
-SNIPR is a paid tool provided with many built-in configurations and a proxy scraper.
-In my opinion, BLACKBULLET is basically identical to openbullet.
-STORM, another free verifier with many public configurations.
-WOXY 3.0 for mail access
-AIO verifiers are ALL-IN-ONE verification programs, for example mailify or monarchy for mail access, SLICEAIO/Bazooka for Minecraft streaming, etc. AIO is normally pre-installed with configurations and configurations are updated with the tool. Use an AIO for easy use. NOTE most AIO controllers and configurations can be created in openbullet
3- connfig:
-Configurations can be created in openbullet much more easily than other verification tools, this means that there are many configuration creators. If you want a configuration for a specific site, you will have to create it yourself or pay someone to do it for you.
The configurations section is a great place to find configurations and most sites should be here.
If you need HQ configurations, you will probably have to pay someone to create a configuration/verifier or access a combined cloud.
If the configurations are unproxyed, it means that you are using the current IP address of your PC or RDP, which means that it will probably be faster, but you could be banned from the IP address. This also puts you at risk because each request comes from the same source IP address.
4-the combo:
-The combolist section is a great place to get SEMIHQ combos, they should be suitable for personal use, but if you sell accounts, you will want to buy combos or create your own.
Making your own combos consists of emptying site databases with sqlmap/sqlidumper or another tool.
For combos, you will use dorks to analyze search engines for vulnerable sites in order to use sqlmap or a similar tool to empty databases.
The way SQLI Dumper works is to use Google Dorks, which is essentially what the program searches for on Google.
5-proxies:
Https://luminati.io/ -better/not free
StackPath
Https://proxyscrape.com/free-proxy-list - FREE
Proxies are a server application or device that acts as an intermediary for customer requests. This means that when the robots make the connection request, they will use the proxy server and hide your IP address behind it. This is useful for anonymity and when you are banned for sending too many connection requests, you can change your proxy and try again.
I have included some links to proxy sites and if you do not want to pay, use a free proxy. You can use API rotating proxies in openbullet using these remote sources.
If this link doesn't work use githublink:
GitHub - Chainski/CHINO-PROXY-SCRAPER: A python script that scrape proxies from frequently updated proxy sources.
A python script that scrape proxies from frequently updated proxy sources. - Chainski/CHINO-PROXY-SCRAPER
github.com
Or
GitHub - MarwanHNF/ProxyScraper: ProxyScraper is a Python tool to retrieve and test free proxies (HTTP, HTTPS, SOCKS4, SOCKS5) and save a list in a .txt file by using the ProxyScrape API.
ProxyScraper is a Python tool to retrieve and test free proxies (HTTP, HTTPS, SOCKS4, SOCKS5) and save a list in a .txt file by using the ProxyScrape API. - MarwanHNF/ProxyScraper
github.com
Or
TYPES of PROXIES
HTTP
SOCKS4 - ONLY TCP
SOCKS5 - TCP/UDP