|
Last Activity: 02/07/2020 08:33
Quotes
| 02/07/2020 |
| 03:09 - list comprehension quoted I sent you the beginning of the code where the user data theft begins. I will not prescribe detailed instructions on how to do this, because attackers will see this method and start usin... |
| 02/06/2020 |
| 13:10 - Boostachu quoted I sent you the beginning of the code where the user data theft begins. I will not prescribe detailed instructions on how to do this, because attackers will see this method and start usin... |
| 12:36 - Deleted Posts |
| 12:25 - Deleted Posts |
| 11:59 - Boostachu quoted lines 4400 and 4401
I have compared both the old GWA2 and the updated one, and those lines are almost identical. I also used Virustotal on the file, zero detections. Please stop trollin... |
| 11:56 - Deleted Posts |
| 11:35 - mrljs quoted WARNING
Don't use it ... malware inside!
Hi Teq. |
| 10:54 - Boostachu quoted WARNING
Don't use it ... malware inside!
Since it is open source, can you tell me which lines include malware? Otherwise I will report your post as spam |
| 10:46 - oneshout quoted WARNING
Don't use it ... malware inside!
Same troll with new account... :rolleyes: don't you have other thing to do ??? |





