⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣠⣤⣤⣤⣤⣤⣤⣄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⣴⣿⣿⣿⠋⣭⡿⢿⣭⠙⣿⣿⣿⣦⡀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⢠⣼⠿⠛⣿⣿⣰⡞⠀⠀⢳⣆⣿⣿⠛⠿⣿⡀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⣰⣿⠏⠀⠀⢸⣯⡟⠁⢰⡆⠈⢻⣽⡏⠀⠀⠹⣿⣆⠀⠀⠀⠀
⠀⠀⠀⠀⣿⡟⠀⠀⠀⣀⣟⠀⣤⣼⣧⣤⠀⣻⣀⠀⠀⠀⢻⣿⠀⠀⠀⠀
⠀⠀⠀⠀⣿⡇⠀⠀⣀⡟⠰⠶⠶⢾⡷⠶⠶⠆⢻⣀⠀⠀⢸⣿⠀⠀⠀⠀
⠀⠀⠀⠀⣿⣗⣠⣾⡿⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⢿⣿⣄⣺⣿⠀⠀⠀⠀
⠀⠀⠀⠀⠹⣿⣿⡿⠁⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠈⢻⣿⣿⠏⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠿⣿⣷⠶⠶⠶⠶⠶⣶⣶⠶⠶⠶⠶⠶⣾⣿⠿⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠈⠻⣿⣴⣶⡀⠀⢹⡏⠀⢀⣶⣦⣾⠟⠁⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠈⠙⠻⠿⢷⣾⣷⡾⠿⠿⠋⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⢸⣿⣿⣿⣿⣿⣿⣿⣿⡇⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
			
		

-|- VERIFIED MARKETS -|-

@AIOcrimeOfficial
@BailopanMARKET
@BigFatMarket
		

-|- OPEN MARKETS -|-

@DarkPID

-|- Seventh-Heaven-Library -|-

 
|
|
--|--
|

-|- Click here for our Announcement Channel -|-



-|- INDEX -|-

OPERATIONAL SECURITY -|-

I. Operating Systems

II. Cryptocurrencies

III. Networking

IV. Corporate Detection

V. Accounts

VI. Beginner-Friendly Fraud+ Setups

VII. Dead Drops

VIII. LLC Fronts

STARTING CAPITAL METHODS -|-

I. Check Dropping

II. Smartphone Finance

III. Trade Out

IV. Swappa Burn

V. Lupin The Third

FOOD BANK -|-

"Food for the hungry."

I. Foreward

II. FastFood Vouchers

III. CVS/Walgreens/GroceryStores Walkouts

IV. Food Delivery Refunding

V. Underworld Food Vendors (50%+ rate)

VI. Gift Card Vendors (30%-50% rate)

UNDERWORLD ETIQUITTE -|-

I. Induction

II. Finding Community

III. Market Manners

REFUNDING -|-

I. Low level

II. High level

BLACKMAILING -|-

I. Packs

II. Doxing

III. Cheating Men

IV. Pedophiles

RETAIL THEFT -|-

I. Prep

II. Selling

III. Work

CRACKING -|-

I. WiFi WPS Cracking

II. Hash Cracking

IDENTITY THEFT -|-

I. Identities

II. PIN Fraud

ARTIFICIAL INTELLIGENCE -|-

I. A Warning

II. Phone Calls

III. AGIs, a story of Power & Profit

IV. Malware & Development

V. Document Verification

SEVENTH HEAVEN LIBRARY MENTORSHIP -|-

I. Mazal Application

II. Da'at Application

III. How To Apply



-|- CLICK TO DOWNLOAD THIS PAGE FOR A LOCAL COPY ON YOUR MACHINE - OUR SITE WILL BE OFFLINE SOMEDAY -|-


-|-


"Do what thou wilt shall be the whole of the Law"



Welcome to the services of the Seventh Heaven.

We are a team that exists to document underworld practice into a public-level resource so that it may be built upon & evolve.

This organization is not a static entity, but a living organism which actively seeks more knowledge to added into its ever-growing collection. The text that exists on these pages are subject to be re-written entirely in order to reflect updated information. As our knowledge grows, so will our beloved library.

Are you a mentorship service that charges your students for money that they do not have?

Do you hold secrets that are otherwise locked behind a paywall?

We kindly ask that you kill your sense of self, and perish like a dog.

Consider this the revolution in information that has been long overdue. We will standardize information that should have been available since the beginning, and create an underworld shadow larger than any corporation could ever hope to possibly achieve.

By the year 2036 the landscape of this world will be changed forever. Those that did not seek freedom will be bound as cattle. And those brave enough to buck will risk death attempting to do so.

We are not here to teach absolutely everything - but we will publicize knowledge that we believe can help the common person survive in an increasingly broken era.

For those who are financially struggling & looking to make use of what we've collected you're free to browse our archives.

At the bottom you may request a no-cost mentorship service that was designed to be used alongside the library for anyone seeking hands-on guidance.

P.S. Do not be afraid to make use of the Telegram mentorship program as this library was designed with the program in mind. Unsure where to start? Mentorship means that we can tailor a custom advised and working solution for your circumstances. But don't request mentorship if you aren't ready to show resolve.

DISCLAIMER(S):
Please note that a majority of our instructions were written for USA based members.
Services will not be denied to someone for being outside of the USA however depending on circumstances there may be little we can do to work with you.
We make no money through our services/mentorships/otherwise and do not intend to.
Available teachers hold the right to mute/block you for any deemed reason they find absolutely necessary.


HOW TO READ THE LIBRARY: Most if not all resources in this library can be found through public search engines. When discussing resources or technological ideas anything included in {} brackets can be looked up for more information using the direct keywords given - for example {crypto virtual card} can be searched as "crypto virtual card" into your favorite search engine.


-|-

⠀
⠀⠀⠀⠀⠀⠀⠀⠀⣀⣠⣤⣤⣤⣤⣤⣄⣀⠀⠀⠀⠀⠀⠀⠀⠀
⠀⠀⠀⠀⠀⣠⣴⡿⠛⠋⠉⠀⠀⠀⠉⠉⠻⠿⣶⣄⠀⠀⠀⠀⠀
⠀⠀⠀⢠⣾⠟⢹⣦⣄⠀⠀⠀⠀⠀⠀⠀⢀⣤⡞⠙⢿⣄⡀⠀⠀
⠀⠀⣰⡿⠁⠀⠀⢿⡉⢷⣄⡀⠀⠀⣠⣶⠋⣹⠃⠀⠈⢻⣧⠀⠀
⠀⢠⣿⠁⠀⠀⠀⠘⣷⠀⠉⢻⣷⣿⠋⠀⣴⡏⠀⠀⠀⠀⢻⣇⠀
⢀⣾⠁⠀⠀⠀⠀⠀⢹⣧⡾⠟⠁⠙⢿⣶⡿⠀⠀⠀⠀⠀⠀⣿⡀
⢸⣿⠀⠀⠀⠀⣠⣴⠿⣿⡄⠀⠀⠀⠀⣾⠿⣶⣄⠀⠀⠀⠀⣿⡇
⠈⣿⠀⢀⣤⣞⣋⣁⣀⣸⣷⣀⣀⣀⣸⣯⣀⣈⣙⣻⣦⡀⠀⣿⠁
⠀⢸⣦⠉⠉⠉⠉⠉⠉⠉⢻⡏⠉⢙⣿⠉⠉⠉⠉⠉⠉⠉⣠⡟⠀
⠀⠀⢻⣧⡀⠀⠀⠀⠀⠀⠘⣿⠀⣼⡇⠀⠀⠀⠀⠀⠀⣰⡿⠁⠀
⠀⠀⠀⠙⣷⣄⠀⠀⠀⠀⠀⢹⡄⡿⠀⠀⠀⠀⠀⣠⣾⠟⠀⠀⠀
⠀⠀⠀⠀⠈⠛⢿⣦⣄⡀⠀⠀⢿⠃⠀⠀⢀⣴⡾⠟⠁⠀⠀⠀⠀
⠀⠀⠀⠀⠀⠀⠀⠈⠙⠛⠿⠿⠿⠿⠿⠿⠛⠉⠀⠀⠀⠀⠀⠀⠀
			

-|- OPERATIONAL SECURITY -|-



I. OPERATING SYSTEMS

  • TailsOS:
  • -|- An amnesiac operating system that runs entirely on an encrypted USB. Need a safe OS to store your crypto? Looking for an easy way to browse underworld in safety? TailsOS is an excellent companion for people with these needs. Nothing you do within the OS escapes the Tor network by default, and it automatically spoofs your MAC address.

      DIFFICULTY:
    Simple if you have little desire to tweak the base system. Relatively difficult if you do. Simple to install to the USB.
      SECURITY MODEL:
    Preferable for those that need to very safely store files and browse the internet in safety, with other minor tasks such as storing cryptocurrency safely.
      INSTALLATION:
    https://tails.boum.org

    -|-


  • WindowsOS:
  • -|- Obviously not a safe operating system to conduct business through - but sometimes required for fraud or other operations. It is possible to install Windows to a USB seperate from your main laptop only requiring you to plug it in to boot it. However the most secure method involves using Veracrypt to create a full disk encryption on a Laptop / PC - for those without access to a full Windows Laptop / PC you can isolate for underworld practices, consider installing WindowsToGo which lets you boot it from a USB as a temporary measure until you gain more capital to spend.

      DIFFICULTY:
    Use Rufus {rufus installer} to create a "Windows To Go" version of any Windows ISO you can download to a USB {Rufus WindowsToGo} OR Using Veracrypt {veracrypt full disk encryption how-to} on a Windows Laptop to fully encrypt the device.
      SECURITY MODEL:
    Initialize this operating system only when behind a Tor Router as covered in Networking. This OS sends heavy amounts of data back to Microsoft even with all privacy options toggled on.
      INSTALLATION:
    https://tails.boum.org

    -|-


  • WhonixOS:
  • -|- Split between two VirtualMachines {what are virtualmachines} Whonix uses one VirtualMachine "Gateway" to only handle networking and push traffic through Tor. While a second VirtualMachine "Workstation" connects to it via virtualized ethernet and handles no networking itself but instead runs as a home operating system. This power dynamic allows you to create a fully secured and Tor-enabled OS from within even Windows safely.

      DIFFICULTY:
    Very simple to operate & even simpler to install. The best reccomendation for new blood.
      SECURITY MODEL:
    Nobody you interact with from within Whonix can find your home OS or home IP. However if your home OS is ever compromised, or you feel you're already under investigation - this is not the choice for you.
      INSTALLATION:
    https://whonix.org/

    -|-


  • QubesOS:
  • -|- This OS is unlike any other OS on the market. An operating system that is itself a VirtualMachine hypervisor, allowing you to spin up several fully integrated VirtualMachines at once not only simulating a setup like WhonixOS but also being able to run Windows - Android - Linux from one desktop.

      DIFFICULTY:
    An understanding of networking is required, along with usage of the command line and understanding of the Linux ecosystem. You will likely struggle if you are not comfortable with basic tech skills. Installation can be difficult if using non-tested hardware.
      SECURITY MODEL:
    Best for advanced power-users who need advanced networking for identity theft or other means. Can safely layer multiple proxies over Tor without compromising security and while simulating a normal operating system.
      INSTALLATION:
    https://www.qubes-os.org/

    -|-


  • GrapheneOS:
  • -|- A unique operating system exclusive to the Google Pixel line of smartphones. It was designed to be a pro-privacy OS without the default insecure apps while giving the user functionalities that would normally be inaccessible such as forcing all traffic through a VPN connection (which can be Tor using Orbot) or giving installed apps blank IMEI/IMSI data upon request for it. Even going as far as to kill the modem at the firmware level when Airplane Mode is turned on.

      DIFFICULTY:
    Installation can be difficult if not done from a secondary Pixel phone. Usage is the same as the stock AndroidOS but with bonus features and compatibility.
      SECURITY MODEL:
    The only realistic option for those seeking a smartphone solution to a private phone they can safely store incriminating data on while still keeping a SIM card inserted.
      INSTALLATION:
    https://grapheneos.org

    -!- Additional Notes -!-

  • PASSWORD STRENGTH: If you believe you may be under target of a federal investigation someday make sure
    your password is 24 chars containing upper, lower, special and numbers.

  • INSTALLED APP(S) NOT CONNECTING?: For apps similar to Telegram Desktop and otherwise be sure you're forcing
    the app to connect to the Tor Socks5 IP / Port of 127.0.0.1 & 9050. Sometimes an installed program has to be told to run through Tor for it to work.

  • KEEP YOUR IMEI UN-USED AND UN-EXPOSED: While Graphene will spoof the data handed over to apps, the hardware IMEI of your device
    can still be used to locate you if law-enforcement know the device ID is tied to your ID. Use apps such as Google Voice to replace the need to text.

  • APK USAGE: For apps such as Reddit or Twitter you may want to install without the Playstore these apps
    will still work so long as you can find and install the .apk file online

  • RANDOM INSTALLATION FAILURE: Unfortunately installing GrapheneOS is not an exact science and is known to randomly failing upon
    installation process. Should this happen to you, you may wish to consider attempting a different device.

  • NOT A WORK PHONE: GrapheneOS is built to be a personal privacy phone for personal use. Fraud and similar tactics are not friendly
    with the ecosystem of GrapheneOS. Between lack of GApps and a weird user string this is not advised for identity theft.
  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
    	

    II. Cryptocurrencies

    -|- Bitcoin(BTC) -|-

    The original public ledger, a currency designed with open-ness and privacy / lack of ID in mind. Bitcoin keeps itself alive by having volunteer "miners" around the world upkeep servers that the network uses to process transactions. These miners are then rewarded with the transaction fees made during those transactions. The popularity of this system has exploded an enormous amount of copycats, controversy & scams as people have begun to treat Bitcoin like an investment and not like a currency. Something we heavily advise against doing. Despite this, the fact remains: without Bitcoin the underworld would not exist.

    DESKTOP:-|-
  • Electrum Wallet - https://electrum.org/#home
  • MOBILE:-|-
  • Unstoppable Wallet - https://unstoppable.money/
  • Mycelium - https://wallet.mycelium.com/
  • Cake Wallet - https://cakewallet.com/
  • -|- Monero(XMR) -|-

    While Bitcoin was designed with privacy in mind it was not designed with anonymity. Transactions on Bitcoins ledger can be VERY easily traced back to the sender and/or user which is where Monero comes into play. Every transaction performed on the Monero network is a fully anonymized mix of patterns and obfuscation that prevent anyone from seeing who sent how much to whom.

    DESKTOP:-|-
  • Feather Wallet - https://featherwallet.org
  • Official Monero Wallet - https://www.getmonero.org/downloads/
  • MyMonero - https://mymonero.com/
    MOBILE:-|-
  • MyMonero - https://mymonero.com/
  • Monerujo - https://www.monerujo.io/
  • Cake Wallet - https://cakewallet.com/

  • -|- MIXING -|-

    Before doing any business on underworld it is very important to remember to first mix your spending balance. Failure to do so on significant transactions may result in investigation from federal forces. Fortunately for you {crypto swap no account} it does not require an ID of any sort to trade Bitcoin for XMR or XMR for Bitcoin. This applies to all other forms of cryptopairs as well. This means that you can buy Bitcoin legally under your real name and turn that into an anonymous yet spendable balance.To make completely sure you're doing this correctly and avoiding potential bans on your KYC-enabled accounts ensure your process looks a little something like this:

    [Your Bitcoin Exchange] -> [Bitcoin Software Wallet] > [Cryptoswap Service into XMR from BTC] -> [Monero Software Wallet] -> [Monero Software Wallet] > [Crypto Swap Service into BTC from XMR] > [Bitcoin Software Wallet] > [Underworld Transaction]


    -!- Additional Notes -!-

  • TEMPORARY MEASURE: Use BTC to transfer into USD via KYC exchanges. Use XMR to wash the BTC you get.

  • AMOUNTS MATTER: While you can use cryptoswap services with no ID - feds do track amounts recently mixed
    so if you are attempting to hide a large transaction like $1000 consider mixing it half at a time after you convert it into XMR

  • STAYING SAFE: Even though XMR is anonymous feel free to send it through a few wallets at different fractions when handling large amounts.
    Staying two steps ahead is what keeps you from new countermeasures by LEO.

  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    III. Networking

    -|- Foreward: Below is a list of common forms of networking that are relevant to this line of work. It should be mentioned however that no matter how anonymous a company claims or appears to be that you should always follow the silver rule: NEVER TRUST A COMPANY WITH YOUR LIFE.
    Always make use of the Tor network in at least one layer of anonymization or you aim to make yourself bait for higher fish, as it is the only truly decentralized and reliable software that exists for anonymization.

      TOR:
    The only reliable protocol that keeps you safe. Tor is a decentralized darknet that relies on volunteers to set up Tor Nodes which you are routed through three times before reaching your end destination website {Tor Project}. Every set interval of minutes your nodes will change and a different 3 hop route is selected keeping you safe & encrypting your traffic in the process. Your ISP will know you're using Tor, but won't see what on Tor you're doing. If you are looking for good options to use for Tor Routers a list of software can be found below. If you do not know how to flash code onto a router you can purchase pre-configured Tor Routers via their main websites.

    What makes Tor safer than a VPN or Socks5?

    Tor was developed in the 1990's as a project from the government to create a network that could obfuscate their own activities. A network that would bounce you three seperate times across three unrelated relays all while encrypting your traffic between each endpoint. With the encryption stopping as you reach the last node so that you can browse the internet normally. A revolutionary idea that they believed would change their ability for tech-warfare. Upon its creation however, they realized that the network they had built had one crucial problem. That the system created was designed to be more anonymous the more people used it. Meaning if the Navy wanted to use this tool, they would have to open it up to the public so that the traffic would be truly random. Which is exactly what they would go on to do. Fast-forward to 2002 and the "The Tor Project" was formed - an opensource version of Tor that anyone could verify for backdoors. To which nobody ever has. To be short on the matter - we know Tor works and is safe to use with as little flaws as possible because our Government relies on it to be for their own uses. Modern underworld is a shadow of this decision made by them and exists due to their desires, as underworld traffic covers their own operations.

    "Hasn't Tor been hacked before?"

    Tor has never been hacked as a PROTOCOL before. There have been attacks launched before against The Tor Browser Bundle however these exploits were weaponized against firefox as a browser and usually targeting people who refused security updates.

    TOR ROUTER(S):-|-
  • THOR (For OpenWRT Routers) - https://github.com/TorRouters/THOR
  • TorBox (For Raspberry Pis) - https://github.com/radio24/TorBox

    • VPN:
    A proxy that can be enabled on an entire system with relative ease, usually offered by corporations {vpn xmr}. Can be used effectively when seeking a dedicated IP address {dedicated vpn btc} necessary for advanced networking or even a cheap clean browsing proxy that is faster than Tor even if enabled over it. Most VPNs that say they aren't logging your activity actually are and it will be used in court against you. For even the "super private" looking ones you can never truly verify if a corporation is spying on you or not. So don't risk it on its own.

      Socks5 Proxy:
    Normally a protocol of proxy used when intending to mimic a specific location or type of network. Socks5 proxies can be layered on top of both Tor & VPNs with ease, giving you the capacity to stay safe easily while using them but still make use of a spoofed location. Use {Proxifier} for WindowsOS - {Tun2Tap} for AndroidOS or Emulators - {ProxyChains} for LinuxOS.

    Make sure you're allowing the DNS to be read through the proxy/hostname in settings.
    Some proxy sellers will require an IP address to act as a whitelisted "connecting from" point - meaning you can only connect from the IP you give them - the use of a dedicated IP VPN can be employed for this purpose as Tor IPs change radically very often.

      SOCKS5 VARIANTS:-|-

    !!! PLEASE REMEMBER: Socks5 servers are extremely subpenoa'able and do not keep you safe !!!

  • Residential - Useful only if 100% clean but can come in rotating or static varities. The best sources are found in underworld markets normally supplied by botnets. Useful for specific use cases but can often be inferior to LTE proxies.

  • LTE - A 4G LTE proxy that is (usually) rotating, changes every set interval by the vendor {Rotating 4G LTE proxy Bitcoin}. Useful for creating lots of new accounts on websites that will ban you often and similar matters. Other sources that are not corporate can be found within underworld markets. Services often favor LTE over Residential.

  • -!- Additional Notes -!-

  • ISPs ARE WATCHING: If not using hacked or prepaid WiFi, please remember to always use Tor!

  • ALWAYS PRODDING: Read "Corporate Detection" in OPSEC to test your IP score

  • MOBILE PHONE EMULATION: 4G LTE Proxies when paired with a mobile emulator or phone can make it appear as if a SIM card is inserted,
    useful for fraud among other things
  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    IV. Corporate Detection

    -|- Fraud Scoring:

    Every purchase ever conducted is run through advanced systems which determine the risk score of your transaction based on a variety of factors which are including but not limited to browser uniqueness, IP address, device fingerprint, javascript enablement & more. For as long as this world is ruled by corporate masters so too will these corporations rely on other corporations to determine these scorings. Abuse this knowledge to your high advantage and become aware of their existence so that their scorings cannot block your rivers of profit. A simple search using the hotphrase {fraud pevention API} will reveal a wide variety of corporations responsible for outsourcing their services to other more popular corporations. There are services within underworld that use subscriptions to these companies to show you how other corporations see you when committing to crime. And if you cannot find them yourself, you can simply create a false corporation to register for the service yourself instead. Do not overestimate the eagerness of corporate hounds to sell their product for even a scrap of profit and make use of this to your benefit.

    We currently endorse @zpcny_bot as the current best IP checker bot in underworld space.

    -!- Additional Notes -!-

  • Need a website for your corporate application?: There are more than several free website creators

  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    V. Accounts

    -|- VOIP/SMS:

    There are various services which allow you to not only text but call completely over a browser or similar software. Current most popular service for both calls + sms is Google Voice - which can be purchased in underworld markets easily or through online account markets such as buyaccs. However you can also make use of Skype if necessary. For an alternative to Google Voice consider creating/purchasing a TextNow account as it operates similarly even though it can't recieve verification SMS without an additional payment. For financial services such as banks a real phone number from a SIM card will be required. For anything else, feel free to make use of crypto verification services {sms verify bitcoin}

    -|- CRYPTO VCC:

    It is uncommon knowledge that there are services online which allow you to generate a completely virtual visa loading it only with Bitcoin or a similar crypto {crypto virtual card}. Some of these services require no KYC whatsoever allowing them to be very useful on sites where you need anonymous purchases made. For more serious or consistent purchases however consider attempting to verify a KYC level card as this will provide you with an easier time in card detection scoring.

  • -|- EMAILS:

  • The type of email used when creating an account determines a large factor of your fraud scoring success. The determination is based on rarity of use as well as phone number verification. Accounts such as EDU emails hold the highest standing as they assume the highest verifications are in place. Every other tier is ranked around the level of a Gmail account or a service similar like Outlook. A free service such as Proton is helpful however not successful when it comes to scoring systems.

    EDU EMAILS:-|-
  • These can be obtained by applying at free community colleges both in America & Canada. Some colleges will require a longer wait than others - but some will give you EDU emails with falsified information within only a few days of waiting. Make use of this by signing up over a mobile emulating setup paired with a 4G proxy for the best results.

  • GOOGLE/YAHOO/OUTLOOK EMAILS:-|-
  • Most common forms of email that exist and ones that will give you a generous rating in fraud scoring. You can obtain these through online account markets {buyaccs} or create them yourself through online SMS verification services {sms verification bitcoin}. If creating them, be sure to make use of a mobile emulating setup paired with a 4G proxy for the best results.

  • TEMPORARY EMAIL SERVICES:-|-
  • For the sake of temporary account creation on a myriad of websites ranging from AI related services to even social medias, the usage of temporary email generating services can be an intense time and money saver. Using {temporary email address} as a hotphrase and scrolling down a small while to avoid the "top" results will nearly always ensure that at least one of these goofy websites will be able to bypass the requirements for even the most popular services.


  • -!- Additional Notes -!-

  • CUSTOM JOB?: Consider creating your own accounts instead of purchasing them

  • EDU GALORE: Some websites allow features such as a free premium subscription when using an EDU email
  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            


    VI. Beginner-Friendly Fraud+ Setups

    -|- Foreward: These are some of what we consider to be easy-to-operate setups for people attempting any form of fraud, supplied to help you get started but not to get you lazy. Get creative with what's possible, and discover even better ways to handle your networking.

      -|- SafeKey -|-

    [Whonix > LTE Proxy] Installing Firefox + a browser extension FoxyProxy Standard {firefox foxyproxy standard}in workstation's VM you can hide behind Tor while using a 4G proxy with ease. This setup is very helpful for websites that require a mobile user to bypass on signup since you can emulate a smartphone+SIM via Firefox in this way - however you do not have the ability to install full apps similar to how the two below can. And can be detected by advanced fraud systems.

      -|- EquiNox -|-

    [Tor Router > Windows USB > LTE Proxy+Nox/Blustacks] By purchasing a Tor Router online (or configuring one yourself) you can safely connect it to a WindowsOS USB running Nox/Bluestacks {nox mobile gaming emulator} software alongside a proxy. Useful for simulating a smartphone using a SIM card while staying safely behind Tor.

      -|- LocalHost -|-

    [Cracked WiFi > Windows Laptop > Nox/Bluestacks] As simple as EquiNox, but no proxy or Tor router required. Hack nearby local and vulnerable WiFi for fraud use, or use a proxy while connected to their access point anyway for furter distances in spoofing.

      -|- Now-You-See-Me -|-

    [Anonymously Purchased Android > Faraday Bag > LTE Proxy] Physical smartphones provide the best opportunity for underworld work more than any of the setups above as a popular android phone using Chrome is able to bypass most fingerprinting and appear as normal. For the absolute safest use allowing you to keep the same device, keep the smartphone locked into a faraday bag while at home and only use it on public or cracked WiFi in a location that is not your home address. Best done within the safety of large cities.

    AMMENDUM: You can also use this with a Tor router if using Android since as of Android 10 apps can no longer see your IMEI. Less safe than the above description however if you lack options this is your best bet.

    -!- Additional Notes -!-

  • GET CREATIVE: These are only a few ways to safely create workable operating systems

  • HIDE WELL: If not using hacked or prepaid WiFi, remember to always use Tor when making new setups
  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    VII. Dead Drops

  • Small Business Mixup:
  • -|- Find a local (yet small) franchise or otherwise store within the area of operation and order the package to the business address. On the day of delivery go to the business in question and tell them you live nearby but there was a mixup, and you gave your friend (or similar story) the wrong address instead of yours. You will likely be asked for a phone # or email to reach you by so have one prepared.

    PROS:-|-
  • ID is 9/10 times not required
  • Every small franchise is a potential drop
  • CONS:-|-
  • Harder in rural spaces
  • Larger packages may be more difficult or awkward


  • -|-


  • UPS In-Store Pickup:
  • -|- Most (not all) UPS stores allow you to send any package you'd like to the store without a mailbox account in exchange for a $5-$10 pickup fee. You're able to place an apartment address number on the recieving package in order to fool companies like Amazon so long as your name is the same as your ID. These stores often carry residential zoning which allows your address to pass off as very legitimate.

    PROS:-|-
  • Useful for having multiple refund addresses to avoid blacklisting
  • CONS:-|-
  • ID is required
  • $10 per pickup


  • -|-


  • AirBnB Verified:
  • -|- Using a verified Airbnb account book a night at any instantbook location where the host does not feel the need to check in on you. And use the location to intake whatever packages you'd like. These accounts can easily be bought from the markets or created yourself using a fullz and a fake video app on mobile emulators.

    PROS:-|-
  • Can intake multiple packages easily
  • Comfortable downtime while waiting
  • Payment can be done with cash/bitcoin bought giftcard
  • CONS:-|-
  • Owner may get suspicious if you verified your account as an opposite gender or similar


  • -|-


  • AirBnB Code Jacking:
  • -|- Scout and discover Airbnb locations offering nightly stays that have condo/apartment level of crowd and a similar level of access. Some locations will even stack their mail right by the front door of the building instead of the apartment. Stay a night using the Airbnb app so you can learn these codes - write them down and then regain easy access to the building/new drop.

    PROS:-|-
  • Easily anonymous
  • Cheap & can be re-used nearly infinitely
  • Locations can be scouted from your personal account
  • CONS:-|-
  • Finding a complex with the right qualities can take time


  • -|-


  • Empty Building:
  • -|- For more rural locations you may want to consider employing a for-sale or abandoned house property to use as a temporary drop location. There is an inherent risk with this that the mailman will not delivery to an obviously abandoned address, howevever if done properly it can be reliable.

    PROS:-|-
  • Can easily re-use within a small timeperiod
  • Employed rurally with ease
  • CONS:-|-
  • Packages can be stolen
  • Hard to predict where envelopes end up sometimes
  • Potential risk of nosy neighbors


  • -|-


  • Anonymous Mailbox Re-Ship:
  • -|- The most anonymous and safest of all the methods. If your package doesn't require much more than the card inside an envelope, or reading off numbers to a new debit this will be helpful to your work. Using the dashboard of these services you can have smaller packages re-shipped to you at any location you desire OR have the agent of the location take screenshots of the package and its insides. Making this useful for creating drops as these houses registered are residentially zoned and do not show up as a corporate address. To use virtual mailbox services {virtual mailbox rent} you need a notarized 1583 USPS form + scans of an ID. Both of which can be faked/purchased from available markets.

    PROS:-|-
  • Can be handled completely over a laptop
  • Images of packages can be uploaded to you from the drop
  • CONS:-|-
  • CONS Wallet
  • Slight cost to set up for both the fake notorization + fake scans
  • Less-useful for re-shipping purposes
  • -!- Additional Notes -!-

  • CONSIDERATION: Not all techniques are compatible with all methods, choose yours wisely

  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    VIII. LLC Fronts

    -|- It is important to make large sums of capital. It is however even more important to make sure the IRS is shown the legalities of that capital & paid their cut. Failure to comply will result in a not-so-long career.

    -|- Pay Your Taxes -|-

      Earning 5,000 - 10,000+ monthly can place a large target on your back if you aren't making sure your money is legally declared. Thankfully due to the advent of digital currencies mixing in your stolen capital with real capital has never been easier.

      This is the new American Dream. Take the money you earn & push it legally into a self created business that you can thrive on. Preferably a business that has the ability to be customer-facing so that you can present a BTC address for payments - allowing for easy transactions to trickle in at your behest.

      Below are a minor few ideas of types of businesses that can easily formed for the simple sake of legally cashing out your earnings:


    • Comissions Artist / NFT Artist:
    • As an artist you would have the excuse to create art for "very real" requests of whatever you'd desire. Being able to recieve an invoice using cryptocurrency as the form of payment between you and your anonymous benefactor. You may alternatively list your art as an NFT product or otherwise build an online portfolio which would allow you to "purchase" your own art. Many such applications for those who would love an excuse to live within that industry.

    • Infoproduct / Webstore:
    • Owning either an infoproduct or a webstore selling physical goods both breed equal opportunities to flood your orders with your own gains. An infoproduct has an extreme advantage in this regard as the product is dispensed entirely by email: allowing you to have more freetime. EBooks of various kinds can be invented to suit this purpose as hundreds on dozens of topics exist - simply remember to eventually start purchasing real ads for real customers so you can further hide among generated noise.

    • Content Creator / Streamer Entertainer:
    • Deciding to create videos for a living and stay within the entertainment space you would normally be reliant completely upon the mercy of the companies determining whether or not you are ad friendly and worrying about sponsoring corps that may not have your fans best interests at heart. With the limitations removed by instructions in the library you can safely depend mostly upon the "very generous donations given to you by your very generous fanbase" with crypto donation links and some slight public asking to cover your tracks. To pull this off you will need to actually put effort into what you create, however if you can generate an audience of even a few thousands you can very easily "fake" large donations made to you.

      -!- Additional Notes -!-

    • PASSION PROJECT: Create a career you can enjoy doing, not just something that's easy to wash through

    • CASH LOGIC: These are only a few examples of ways to go about your business,
      anything friendly to purchasing or donations can almost always apply with cryptocurrency

    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    -|-

    ⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⢀⡀⠀⠀⠀⣀⣀⣀⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⢤⠀⠀⠀⠀⠀⠀⡞⠁⠈⢣⣠⠊⠁⠀⠀⠙⢆⢀⠔⠊⠉⠙⠢⡀⠀⠀⠀
    ⠠⢼⠤⠤⠤⠤⠤⣤⠃⠀⠀⢰⠁⠀⠀⣀⣀⣀⢸⣎⣀⣀⣀⣀⣀⣘⣆⡀⠀
    ⠀⠼⠄⠀⠀⠀⡰⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢸⠀⠀⠀⠉⣾⠀⠀⠈⢛⡆
    ⠀⠀⠀⠀⠀⠰⡃⠀⣀⢄⠀⠀⠀⠀⠀⠀⠀⠀⣼⢀⣦⣆⡀⢳⣧⢤⠀⡴⠃
    ⠀⠀⠀⠀⠀⠀⠉⠉⠁⠸⡀⠀⠀⠀⠀⠀⠀⢀⣽⠀⠛⠟⠂⢠⠏⠉⠉⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠙⠢⠤⠤⠤⠒⠒⠉⠀⠑⠒⠒⠊⠁⠀⠀⠀⠀⠀⠀⠀⠀
                            

    -|- STARTING CAPITAL METHODS -|-



    -|- These methods were designed in mind for the person who has either no $ or very little $ to start with. Performing any of these will give you just enough starting scrap to evolve into better methodologies.


    I. Check dropping

    -|- INTRODUCTION -|-

    This method is extremely straightforward yet comes with a slight potential risk. Checks can be purchased from the various underworld markets from vendors for very cheap in comparison to the value of the check. Normally for a check to work in a bank account the account in question must be aged with transactions for at least 1-2 months.

    However by redeeming a check into your personal checking/bank account, you will have nearly no risk of funds simply freezing in your account and being inaccessible. If you are incredibly desperate for options in regards to getting money fast, this may be something you wish to consider doing. As there are little to no other better methods for gaining enough starting capital for something such as refunding or otherwise which are very consistent hustles.

    -|- REALISM OF PROSECUTION + STATISTICS -|-

    Your chance of being realistically prosecuted for this crime is extremely low. And every day your chances become even lower as America sinks into the pits of complete financial despair and underworld domination. In 2021 alone there were 250,000 reported cases of check fraud. In 2022 that number nearly doubled to 460,000 according to statistics provided by the US treasury.

    It is however very important to remember that this rule of thumb only applies to you if you are a nobody as well as if you are keeping below a certain threshold. As of writing in 2023, the most recent victims to be prosecuted over check fraud are from amounts resulting in roughly $10,000 or higher. Yet in most states keeping your check fraud below the threshold of even $1,000 will result in a misdeamnor charge and not a felony. This means that if your record is clean, your chances of arrest significantly drop below an immense standard for keeping it below these limits.

    -!- Additional Notes -!-

  • TAKE THE RISK: If you have no other choice, a minor felony is better than a life of corporate slavery

  • LESS LOSS = LESS RISK: It's easy to make the play and double it through refunding or similar before paying back what you stole

  • "CANT I DO THIS ON A DROP?": Not unless you're willing to wait 1-2 months of aging + 1k in transactions for it

  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    II. Smartphone Financing

    -|- THE PLOT -|-

    (Another) Very straightforward method for anyone needing quick cash fast. This method is for those with good credit who don't want to do any of the other methods. As long as corporations farm the human cattle for every last cent this method should always retain its validity. Using even average credit you are able to finance the payment for an expensive top of the line smartphone of your choosing for the sake of re-flipping it online or locally, using that money to then start your new life through a hustle such as refunding or similar.

    -!- Additional Notes -!-

  • GET GREEDY: It is possible to finance even two smartphones in more cases than not

  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    III. Trade-Out

    -|- EXPLAINATION -|-

    Across the corners of the internet are various corporations willing to purchase used electronics for cash or types of credit {used electronics for cash} these can be farmed in a one-time use situation where FTID or a subvariant of it is used to send in an empty padded package while the corporation in question believes the item to be lost. Keep the value below $800 as a general rule and you should have no problems getting paid for an electronic that you aren't really selling. More details on the workings of FTID and its subvariants can be found in "High Level" under the section titled "Refunding". It is important to remember to provide as much "proof" as you are able to. This is including but not limited to a picture of the drop-off reciept, photoshopped screenshots the company may ask for, a valid home address being used & so forth. Sometimes the corporation may ask you for screenshots of the device added to your apple account, or similar. You can easily bypass this with any low-value photoshop vendor within the verified markets.

    -!- Additional Notes -!-

  • PATIENCE IS A VIRTUE: This method can take anywhere from 3 weeks to 1 month

  • DONT BE GREEDY: Don't expect this to work more than once per corporation

  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    IV. Swappa Burn

    -|- THE PROCESS -|-

    Swappa and similar corporations provide full usable payment for high-end electronics shipped before they are even shipped. Understand that this is a feature, not a bug of the platform. Purchasing a high end electronic and providing the images the platform requires allows you to make your listing while returning and get paid in the process. For this method to work for you it is required as a pre-requisite that you already have access to one high end electronic. Whether that be a cellphone, an apple laptop, or similar. It is heavily advised you use a personal and aged account for this process as there is a small failrate of Paypal "holding" your funds.

    -!- Additional Notes -!-

  • PAYPAL BURN: As Paypal is the primary corporation taking the hit expect your account to die shortly after refusing to pay them back

  • DOUBLE TROUBLE: It is possible to layer this with a high level refund for 3x the profit

  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    V. Lupin The Third

    -|- WALKTHROUGH -|-

    If you live within a large liberal leaning city or have the means to travel to one you may wish to consider doing a single round of retail theft below the felony threshold in order to get your first round of starting capital. It is advised that you avoid redzones such as Florida as they have been recorded to shoot and kill even minor shoplifters. Within the most dense concrete jungles however people steal well over 3x the felony threshold without so much as being worried about getting caught. More details on the specifics can be found on our section here regarding "Retail Theft" and how to perform it safely.

    -!- Additional Notes -!-

  • SCARIER THAN IT LOOKS: Retail theft can be anxiety inducing, but loss prevention is only paid there to look pretty

  • ELECTRONICS ARE NICE: Don't be afraid to grab something that will flip for $500 online, nobody is coming after you

  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    -|-

    ⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⡀⠀⠀⢀⡴⢶⡄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⣰⡶⢷⡄⠀⠀⢸⣏⣿⠀⠈⠳⢾⠁⣀⣀⣀⣠⣤⡄⠀⠀⠀⠀⠀⠀
    ⠀⠀⢀⡴⠻⢶⠾⠛⢷⣶⣟⡉⠉⠀⣠⣴⡾⣿⠛⠋⠉⢿⣴⢟⣿⣀⠀⠀⠀⠀
    ⠀⠀⣸⡟⠃⠀⣤⣤⡞⠁⠉⠻⣦⣾⠋⠁⠀⣸⡷⣄⠀⠀⠀⠈⠱⠿⢦⡀⠀⠀
    ⠀⠐⣯⠖⠀⠀⠿⠴⠃⢠⠶⣴⠸⣧⠀⠀⠀⠻⠿⢫⣶⣦⣄⠀⠀⠛⠿⣄⠀⠀
    ⠀⢸⡷⠆⠀⠀⠀⠀⢀⣸⣷⠿⠶⣿⣦⣄⠀⠀⡄⢻⣽⡏⢹⡆⠀⠀⠻⢿⡀⠀
    ⠀⢿⡷⠀⠀⠀⠀⣠⡿⣯⣼⡇⠀⣿⠀⠈⢷⣤⣿⣆⠀⠀⣸⡇⠀⠀⠐⢾⡇⠀
    ⢰⣯⣄⠀⠀⠀⢀⣿⠁⣀⡉⠀⣼⢿⣤⡶⠛⣿⠀⠙⠀⢀⣿⠁⠀⠀⠀⣮⣷⠀
    ⠀⣾⣵⠂⠀⠀⠀⢿⣾⣿⣿⣼⠏⠀⠻⣠⣤⣿⠁⣠⣴⣾⡇⠀⠀⠀⠀⢮⣷⠀
    ⠀⠸⣷⢇⣤⠄⠀⠈⢻⣝⣿⡿⣻⡆⠀⠿⡼⠋⠀⠿⠾⢻⣿⠀⠀⠀⢸⣮⣿⠄
    ⠀⠀⠙⢻⣯⠀⠀⠀⠀⢻⣎⠉⠋⠀⠀⠀⠀⠀⠀⠀⣠⡿⢃⣴⠀⣴⠌⡇⠈⠀
    ⠀⠀⠀⢸⣟⠀⣶⡄⠀⠀⣿⡄⠀⠀⠀⠀⠀⠀⢀⣴⠏⣠⣾⡇⣰⠿⣿⡇⠀⠀
    ⠀⠀⠀⠀⠻⠶⠟⠷⣤⣴⡿⠀⠀⠀⠀⠀⠀⣰⣿⡵⠾⠋⣸⡿⠋⠀⠉⠁⠀⠀
    ⠀⠀⠀⠀⠀⠐⠄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⠁⠀⠀⠀⠉⠀⠀⠀⠀⠀⠀⠀
                            

    -|- FOOD BANK -|-



    I. Foreward

    -|- Before you begin: This category of the library is dedicated to helping you eat while saving money or if you are in immediate hunger. Some of these methods can be done with no cost, others require some cost. Be creative in how you approach this and you can stack a few of these methods together in order to save a lot of money. If you want help in regards to walkouts or finding a drop - feel free to send in an application for mentorship.


    II. FastFood Vouchers

    NOTICE: Complaining without a reciept is being patched by corporations who would rather people just die, I guess

    -|- Most large fastfood chains will award you with free redeemable food vouchers if you go to their main website and complain about an order you've had. It's possible through a small number of chains to complain about an order for pickup that did not happen and still recieve vouchers. For every other chain a reciept to complain is required, so be sure to complain often on food ordered out.

    NO-RECIEPTS REQUIRED:-|-
  • Chic Fil A
  • Papa Johns
  • Mcdonalds (They will attempt to call you, pick up)
  • -!- Additional Notes -!-

  • IP+Email: If you need multiple meal refunds consider spamming the complaints with a 4G rotating proxy and different emails + payment details

  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    III. CVS/Walgreens/GroceryStores Walkouts

    !!! ONLY ADVISABLE FOR LARGE METRO CITIES !!!

    -|- Due to the lack of police presence + high crime rates in large cities such as NYC, LA, and similar - petty theft kept under the misdemeanor threshold of 900 (in most cities) in value is never chased upon if called by police. This is especially true for food theft, as the original laws were put in place to allow people who need food to steal safely due to rates of starvation. Locations such as CVS & Walgreens do not normally have security presence (major downtown locations excluded) and are very simple/safe to steal from. In most cases the cameras set inside the shop record their footage to nowhere. You will be allowed to walk in with a reusable bag, fill it with food and walk out again untouched and unharmed. For more details you can refer to the retail theft section of the library.

    -!- Additional Notes -!-

  • APPROPRIATE WEAR: While it is advisable you wear a hat & mask - it's not required for such low level theft

  • RUN BY THE MANAGER: Avoid going to the same location every time - each retail chain is run by a different owner

  • PREVIOUS WORKERS: Search any previous CVS employee and they'll tell you how people walk in and take what they want all the time

  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    IV. Food Delivery Refunding

    -|- When ordering through any popular food delivery service it's possible to semi-consistently lie about items recieved and recieve very heavy discounts in the process of living.

    All flagging is done by advanced AI watching your patterns and orders. While it will lock out heavy & greedy abusers, keeping your refunding reasonable and leaving successful orders in between refunds will allow you to make long term use of this discount.

    As a general rule of thumb you are normally entitled up to half of the value of your order in "missing items" - If you order in a $50 meal you can refund up to $25 as an example.

    Further details on AI can be found in the refunding section of the library.

    -|- AI Evading Pattern (Example) -|-

    1. Order $200 in groceries
    2. Claim 7 items didn't come at $90 in total value
    3. Get refunded
    4. Make 2-3 legitimate (smaller) orders
    5. Rinse & Repeat

    It is also possible to outright claim a Did Not Arrive on your order with occasional success for a complete refund. The data on doing this with consistency are not currently available to us, however from testing performed it seems to work at least twice per account.

    -!- Additional Notes -!-

  • DISCOUNT BONUS: Make sure to always try and refund coupons/deals given in apps as they apply again once refunded

  • GIFTCARD CREDIT: Stack with giftcards for bonus savings

  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    V. Underworld Food Vendors (50%+ rate)

    -|- How it Works: Food vendors in underworld markets are ready to card you food from the current top food delivery services in exchange for 50% (and sometimes more) off the value in cryptocurrency. i.e. a $200 order of groceries becomes a $100 order, or even sometimes an $80 order.

    This is a valuable service and even allows for anonymity when making large or small orders. Evading the requirement for ID or a card in your name to eat good food.

    You can find these vendors through the current markets located at the top of the library.

    -|- The Process -|-

    1. Create your cart
    2. Screenshot it + Total w Tip
    3. Upload the screenshots to your vendor
    4. Pay the vendor once he's ready
    5. Enjoy your food

    -!- Additional Notes -!-

  • USE DROPS: Good OPSEC means using a neighbors address, or even a nearby one instead of your own

  • BIG BAG: Make use of large orders to maximize efficiency

  • FACE COVER: If ordering by pickup - always wear a hat & mask

  • LOYALTY: Did you find a good vendor? Stick with them

  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    VI. Gift Card Vendors (30%-50% rate)

    -|- "Will I get in trouble for redeeming sketchy giftcards?"

    Under the current USA law you cannot be prosecuted for unknowingly redeeming fraudulent/stolen giftcards. If intent can be proven that the participant knew the cards were stolen - that's another matter. So long as you don't ask questions and simply understand you're bargain shopping the chances of you getting in trouble for using these on personal accounts is near non-existant + highly advisable.

    The Two Types of Vendors

  • -|- Exchange Vendors:
  • Vendors that use clearnet services {sell giftcard for crypto} to sell giftcards in exchange for Bitcoin. Normally in stock of large brands such as Doordash, Google Play & others at a rate of 30% off or more.

    PROS:-|-
  • Fast & Efficient
  • Dedicated 1st party escrow
  • CONS:-|-
  • Requires KYC
  • Lack of anonymity without purchase drop account
  • Generally lower limits

  • -|- Underworld Vendors:
  • Found on the markets listed at the top of the library these vendors can normally secure very obscure branded deals at a very high rate of discount. Be sure to always use provided escrow within the market you're dealing with or you have a higher chance of being scammed.

    PROS:-|-
  • Wider variety of brands
  • Higher discounts
  • Custom requests possible
  • CONS:-|-
  • Chance of scam/dead cards
  • -!- Additional Notes -!-

  • STACK WITH REFUNDING: Discounted credit + refunding is an excellent way to triple profits

  • OFFSHOOT EATING: If you're willing to eat at some not-so-known resturants underworld vendors
    can provide excellent large discounts for giftcards

  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
            

    -|-

    ⠀
    ⠀⠀⠀⠀⢠⣤⣤⠀⣤⣤⡄⣤⣤⣤⢠⣤⣤⠀⣤⣤⡄⠀⠀⠀⠀
    ⠀⠀⠀⠀⣸⠇⠸⠤⠇⠸⠧⠿⠀⠿⠼⠇⠸⠤⠇⠸⣇⠀⠀⠀⠀
    ⢤⡤⣠⡾⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⢳⣄⢤⡤
    ⢸⣿⠋⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠙⣿⡇
    ⣸⣟⢷⡄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢀⡾⣻⣇
    ⠀⢠⠶⡝⡆⠀⠀⠀⡶⠶⠶⣶⠀⣶⠶⠶⢶⠀⠀⠀⢰⢫⠶⣆⠀
    ⠀⠘⣿⡁⠛⠛⠛⠛⠃⠀⢠⡟⠀⢹⡄⠀⠘⠛⠛⠛⠛⢨⣷⠃⠀
    ⠀⠀⡏⠻⣤⣀⠀⢀⣀⡴⠟⡢⣤⢔⠙⢦⣄⣀⣀⣀⣤⠟⢸⠀⠀
    ⠀⡀⡇⡀⠈⠉⣿⠉⠉⡇⠀⠟⣿⠻⠀⢸⠈⠉⡏⠉⠀⢄⢸⢠⠀
    ⠀⢟⣿⡣⠀⠀⣿⠀⠀⣇⣀⣀⣿⣀⣀⣸⠀⠀⡇⠀⠀⢘⣽⡻⠀
    ⠀⠀⠀⠀⠀⠀⣿⠀⠀⠀⠀⠀⣿⠀⠀⠀⠀⠀⡇⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠸⣯⡇⠀⠀⠀⡷⣿⢾⠀⠀⠀⢾⣽⠂⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠘⠛⠓⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
                            

    -|- UNDERWORLD ETIQUETTE -|-



    I. Induction

    -|- OUR SIDE OF LIFE -|-

    We would like to take this time to introduce you into what we feel is an accurate reflection of this space - and what has happened in the past 15 years as of the time of this writing in 2023.

    The earliest traces of modern underworld, also known as "darknet" can be found in the roots of TCF otherwise known as the Tor Carding Forums. This was among the first most prominent spaces where any sense of community first began to truly gather. The attitude there was that in order to get rich, the rules of the systems in play would need to be abused and broken. And in order for it to stay that way, the willing would need to form together into powerful yet decentralized groupings where anyone with a sharp mind had a chance at making for themselves a better life.

    Fast forward some years afterwords and the first truly established market had come into existence, better known as "The Silk Road" - a place where drug slingers, identity thieves, and crackers/spammers could come together to exist economically within the same space.

    Without these early pioneered spaces, underworld would not be the megahouse it is today. And while spaces like .onion websites are no longer in heavy use - the influence these pioneers formed continues to ripple like a current to this day.

    Nowadays, the culture of underworld is fragmented yet nearly everywhere you can imagine. And is operating in places that you would never even think to look yourself.

    "Organized underworld" however remains one of the most unknown about worlds to date. With most not even knowing it exists at all, or where they would start looking to even find it.

    And contrary to popular opinion, underworld is not crawling with degenerate pedophiles. As they are all on the regular internet anyway at this point regardless, without fear of prosecution. Refer to our section on "Pedophile Blackmail" for more details.

    We hope this guide might persist for the coming era to establish a form of centralized "logic" which can be used to haphazardly communicate with and find new sources of community - and for the long overdue process of stable centralization to finally take place.

    -|- WHAT YOU CAN EXPECT TO FIND -|-

    For every 100 people encountered in underworld space you can safely estimate that 50 of them have no idea what they're doing - 30 of them are making money (and know how to) - and 20 are innovating on new ideas.

    Take all of what anyone not in charge says with an extreme grain of salt. Pay attention to the larger names and the ones forming their own communities. Follow their lead and learn from their stead in an attempt to someday outgrow them yourself.

    And above all, follow the golden rule: If they are charging for the information it is either old or non-viable. Real heads will give their working information for free as a reward for loyalty or potential & take pride in doing so.

    Substance breeds substance - loyalty breeds loyalty. Do not nitpick mongst eachother - do not bicker over the hoarding of information. Share openly and share freely - those that adhere to this logic will be rewarded with a community that feels the very same way.

    If this culture were to ever die, it would mean the slow and decayed passing of everything within underworld that we have worked so hard to create.

    Be respectful to your fellows. But also never take unearned shit if it is ever flung in your general direction.

    Behave with etiquitte and provide value where you can - or you won't ever see anything deeper than the surface layer of the vast ocean we call home.

    -|- AN OPEN LETTER TO WOMEN, AND OTHER MINORITY GROUPS -|-

    From before even the first days of modern underworld - traditionally speaking our spaces has been long dominated by men who lack melanin.

    And while the pioneers of this inverted-internet age deserve both praise & recognition for their work, talent & sacrifice - we cannot sustain indefinitely on this demographic alone.

    Without underworld adaptation from women and other minority related groups - all we have collectively built will surely and eventually die. As will any hope of freedom from the corporate bondage that is about to flood us like the plague.

    Do not be afraid to learn and adapt to darker ideas.

    Question for yourselves what you've internalized "kindness" to mean - as we are in a postition where you must be kind to yourselves above being kind to strangers, for the world has proven it will not give you same respect.

    Embrace the pain that comes with knowing the world is a broken place, one that will become even more broken with time.

    Understand that "normal" was never a real option, and that those who chase it will be treated as expendable by higher powers for doing so.

    Adapt, and survive. As the demographic of the nation that is America slowly begins to shift, so too must the underworld evolve with the times.

    Use what has been already created to build spaces that are safe for you to exist and thrive with others who are likeminded in doing so. Within even current underworld the resources exist to safely create gardens of which history have never before been witnessed, to sprout wildflowers that have never before been grown.

    Both for its own sake - as well as your own, contribute to the consensus of the ongoing philosophies found both here and beyond.

    Take back the power that was owed to you from the start.

    And fight with everything you gain in the process.


    Written by the head admin, composer & maestro of the Seventh Heaven. March, 2023.

    -!- Additional Notes -!-

  • TO ALL WITH EARS: "Roma ne bis cadat"

  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    II. Finding Community

    -|- PUBLIC SPACE -|-

    Anywhere that you can access without a personal invitation which includes but is not limited to markets, forums, group chats, channels, and more is considered public level space. Public level space ranges in quality anywhere from acceptable to complete and utter dogshit. Understand that this is a necessary evil, as public space is the highest progression for anyone who does not have a working brain, or have nothing of true value to provide. It is often a means of testing grounds where the wheat is seperated from the chaff. Everybody starts from public level space, and if they show promise or begin to contribute to the consensus of underworld they quickly become pulled into private level space.

    The most surefire method to ensure that you are invited to these private level spaces is to educate freely on whatever topic you find yourself experienced in. Know a lot about fraud? Good with refunding? Have a secret hustle that you know works really well? Contribute it. And if you have nothing to contribute, show a genuine desire to learn and grow as a last resort. If you are in a space where the abyss truly exists, the abyss will stare back at you with a hunger to bring you in deeper. This is how private level spaces are formed and will be made going forward.

    -|- PRIVATE SPACE -|-

    These spaces are the backbone that form the foundations of the Leviathan that is underworld doctrine. It is from here that the culture itself is created and dissiminated to the lower echelons. This is where new methods are researched and shared with those that have proven themselves. Beware "private level spaces" with owners who do not provide but instead leech information, as these are not truly private level. If you believe yourself to be capable of creating your own, ensure that you are providing something of value in more ways than one. And if you are lucky enough to be invited to one yourself - maintain your air of respect and be honored in the face of your invitation.

    Once you're inside a community that holds value continue to educate freely and share your research on new methods and ongoing information. Sometimes a private level space will have another private level resting inside of it, and they are simply waiting to see just how much value you can actually provide.

    -!- Additional Notes -!-

  • DONT BE SHY: Don't be afraid to reach out to someone with promise you see in a direct message, the worst that can happen is they ignore you
    and at best you've made a new partner

  • BEHAVE YOURSELF IN PUBLIC SPACE, ENTITLEMENT IS FROWNED UPON: A good number of us are watching - and judging

  • FOLLOW THE ENCRYPTED PATTERNS: The majority of quality crews prefer having their dealings on platforms that provide e2e encryption or similar

  • SHIT WE DONT TOLERATE: Nobody of value will do business with a racist or misogynist

  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    III. Market Manners

    -|- HOW TO SAFELY IDENTIFY (AND USE) QUALITY MARKETS -|-

    When browsing the entirety of underworld it is important to know what is a good market and what is not a good market, as well as how to safely make use of those markets. There are genuinely only a few questions you will ever need to ask yourself to seperate quality from un-quality.

    1. Does the market provide escrow? If the answer is no then you should avoid it like the plague. If it does, you should use it for every major transaction
    2. NOTE: Escrow is when an admin of the market or a bot holds the funds as a trusted third party during a transaction - and monitors for scamming on either the end of the buyer or the seller. This ensures that your money is not sent directly to a vendor who then decides to run away. This practice has kept the underworld economy held together with little to no issues for the past several years and should be included as a future trend.

    3. How old is the market? Avoid newer and unstrusted markets unless they are vouched for by a trusted source.

    4. Are the admins exerting a vetting process? Markets that do not heavily rely on quality control will quickly become overrun with un-quality.

    5. Are your messages encrypted? This is not always required, however if you are using an un-encrypted market then ALWAYS make sure your account is truly anonymous and created over Tor.

    It is additionally important to remember that while XMR is the encrypted and anonymous crytpocurrency, most marketplaces will use Bitcoin for the sake of ease of use on the customers, vendors & admins.

    Please for the love of GOD do not send Bitcoin directly from a wallet tied to your real name. ALWAYS MIX YOUR CRYPTOCURRENCY THROUGH XMR AND BACK TO BITCOIN AGAIN BEFORE SPENDING IT ON MARKETS.

    For more details on mixing your cryptocurrency click here to refer to our section on "Cryptocurrency" and more.

    -!- Additional Notes -!-

  • ALWAYS USE ESCROW: It's not "optional" - use it

  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    -|-

    ⠀
    ⠀⠀⠀⠀⠀⢠⡶⣦⠀⣾⣻⡆⢠⡶⣦⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠈⣛⡋⠀⢹⡏⠀⠈⣻⣇⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠸⣧⠟⠛⢻⡿⠛⠛⢧⠞⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⣾⣳⠄⢸⣯⠀⠀⣾⣿⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⢰⡟⠓⠒⠚⠓⠚⠛⠛⢻⡗⠀⠀⠀⠀⠀⠀⠀⣠⡶⢶
    ⠀⠀⠀⠀⠀⢨⡇⣀⣀⣀⣀⠀⠀⠀⣾⠁⠀⠀⠀⠀⢀⣤⠀⢸⡶⠞
    ⠀⠀⣆⠀⠀⠸⡇⠙⢻⡿⣩⡷⠀⢰⠇⠀⠀⠀⠀⠀⠞⠛⣶⣏⣀⡄
    ⠀⠀⡿⠛⠛⠛⡟⠛⣻⣏⠻⣷⢀⡿⠀⠀⠀⠀⠀⠀⣠⠞⠁⢸⠏⠀
    ⠀⠀⠁⠀⢀⣴⢷⣼⠿⠿⠷⠉⠼⠧⠤⠤⠤⠴⠶⠟⠃⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠈⠳⠾⠃⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
                            

    -|- REFUNDING -|-



    I. Low level

    -|- EASY AS PIE -|-

    All low level refunding has limits & rules of repetition. "Low level" refers to the level of investment required to perform the refunds since both DNA and EB often apply (generally) to items worth under $600 in value. This number is not an exact number but more of the general rule of testing - a website vulnerable to DNA/EB will either allow you to do it above $600 in value or below it. Testing of a websites limits can be performed quite easily with no risk of losing the value of the item as you can always return the item in question legitimately to get your money back. Higher level refunders are able to abuse both low-level refunding as well as high refunding, however for personal use high-level can also be worthwhile depending on your needs.

    -|- Did Not Arrive (DNA) -|-

    Claiming that "my package Did Not Arrive" is one of the more common excuses to gain a refund and often comes with success. There are a few countermeasures used against this coming into play such as a picture of the package being taken to prove delivery - for instances such as these EB/PEB would be more effective. Be sure to know the difference of when to use either excuse as both can be used interchangeably in various situations.

    -|- Partial Empty Box/Empty box (PEB+EB) -|-

    While DNA can provide a full refund - so can the well timed excuse of "my package came but there was nothing but an Empty Box" as long as the value of the item is below the limit threshold of the website in question they won't have the resources to check the weight of the package in an actual investigation and will award you the refund normally within 3 days time. For higher rates of success you can order multiple items in the same order only to claim that 3/4 of the items arrived (with the 4th one being expensive).

    -!- Additional Notes -!-

  • GREED: Don't abuse refunding too repeatedly too frequently, give your orders time apart

  • WEBCHAT IS A BLESSING: Don't feel obligated to always call in, text-chat support will settle it just as well

  • AI IS WATCHING: Don't refund one order after another, space multiple legitimate orders between them even if lower value

  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    II. High level

    -|- MAIL FUN -|-

    Most if not all professional level refunding involves some type of mail fraud - and usually comes with little to no limit in the value of the refunded item. The most popular variant of refunding is purchasing an item and fake returning it through the mail in a manner of various ways so you're reimbursed by the company while keeping the real item in question. This is frequently abused against companies such as Amazon & Target. Most common of which is known as FakeTrackingID or FTID for short - this concept was popularized in underworld years ago and ever since there have been many variants of the matter with increasing effectiveness.

    -|- How The Mail System Works -|-

    When a package is submitted into a mail courier the address is physically scanned off the label depending on the words written - not the TrackingID. When the barcodes are also scanned it does nothing more but update to the system the status of the shipment. This means that when the TrackingID is scanned it's not checking if it's within the delivery range of the original address itself but the ZIP code of the original address {zip code scam}. We can manipulate this process in various ways including but not limited to FTID which has us photoshopping the original destination address into a destination address nearby within the zipcode instead, even going as far as to manipulate the metadata barcodes or RMA.

    USPS packages are by far the simplest to manipulate as they require no further manipulation other than the address itself in most instances.

  • -|- Mail Label Components -|-
    • RETURN MERCHANDISE AUTHORIZATION (RMA):
    • Tracking barcode issued by the company itself - seperate from the tracking ID barcode which is issued by the mailer.

    • TRACKING ID:
    • Tracking barcode issued by the mailer - every package has at least one as a minimum.

    • METADATA BARCODE:
    • Found in UPS/Fedex labels - a barcode that contains the name / address / information of the recipiant. UPS uses a unique QR-looking barcode for their information and has a proprietary encoding not known to our staff - you can distort this barcode by removing a few of the barcode "dots" and make it illegible therefore making it untrackable/unscannable. Fedex on the other hand uses a format known as PDF417 for their barcode which allows you to scan the information with your phone and then falsify your own PDF417 barcode - layering it over the original to avoid detection when sending.

  • -|- Mail Fraud Variants -|-
    • FTID:
    • Fake-TrackingID is the most common form of refunding - the idea that any prepaid label given to you by a company such as Amazon can be manipulated via photoshop into going to a location not originally intended. Example: You purchase a $900 iPad from Apple and then submit it for a return. If they hand you a prepaid label you can photoshop the address on the label into an address nearby CVS within the same zipcode as the delivery warehouse - submitting the label onto a blank package and then having it become delivered not to the warehouse but to the CVS you chose. All while appearing on the TrackingID as if it's beeen successfully delivered to its original location.

    • CIB:
    • Chicken In Box was a method designed originally by placing freshly dead meat into the package you were shipping in order for the rotting meat to then become so rotten the mail courier is forced to throw it out - giving you rights to claim a refund from the company. You can be creative with this method and do not need to deal directly with meat for this method to work for you.

    • LIT:
    • Lost In Transit is an idea that instead of performing simple FTID that you also make USPS lose the package entirely mid-transit. This can be accomplished by printing your refund labels with what's known as "Paper Saving Ink" {paper saving ink} which is ink that vanishes in something around 30 hours time. Normally intended to allow you to re-use paper - no mail courier can find your package if the label has completely erased itself as once they find your package they'll have to simply discard it.

    • FRMA:
    • Fake-Return Merchandise Authorization is a newly available method which allows you to use the provided RMA barcode given to you by companies such as Amazon and still complete your return even without recieving a prepaid label. In some instances a company will avoid giving you a prepaid label as to avoid potential FTID returns. This is the counter method to that. If given an RMA only barcode and told to send in the package with your own label - create a regular USPS label online and then FTID it yourself once finished. Then once you've placed that label onto the empty package, also place the RMA barcode seperately on the box. This will make it so the company can still track the package being delivered however they'll still think it's to their warehouse as they won't have the ability to investigate differently.

    -!- Additional Notes -!-

  • ADDRESS DROPS: Refer to the section on Dead Drops to make high level refunding a consistent lifestyle

  • WALK: When dropping off mail slips be sure to not let them scan a license plate - walk to the postoffice if possible

  • BANK DROPS: Pair refunding practices with fullz and other verified accounts to remain completely anonymous

  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    III. Vendor Level

    -|- MAIL INSIDERS -|-

    Generally speaking within the underworld markets exist vendors who have certain priviledges within refunding, with a very good number having UPS/Fedex insiders as well as the means to even mark your refunds same-day. It is important to note however that too much abuse on the same address may result in an investigation. Which means you should consider either performing this level anonymously through a drop or only a few times on your home address. Prices can vary from a percentage % cut of your total order value to a few hundred dollars. With the minimum order amount usually being fairly high. Consider making use of this level once you've got money to spend doing so from the other variants.

    -!- Additional Notes -!-

  • FUCKUPS HAPPEN ON THE VENDOR SIDE (SOMETIMES): Never sell your goods before you get the actual refund or you may lose out on value

  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    -|-

    ⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣀⣀⣀⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣦⣬⣻⣿⣿⣋⣴⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⣿⣿⣿⣿⣿⡇⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠛⠋⠉⣿⣿⡏⠙⠃⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⡇⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⡇⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⣇⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⣿⣿⣿⣦⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠘⢷⣿⣿⡿⠃⠀⠀⠀⠀⠀⠀⣿⣿⡇⠀⢸⣿⡇⠀⠀⠀⠻⣿⣿⣿⠛⣀
    ⣐⢺⣿⣿⣿⣿⣤⣤⣤⣤⣤⣤⣤⣤⣿⣿⣥⣤⣼⣿⣧⣤⣤⣤⣤⣼⣿⣿⣿⣿
    ⠛⣸⣿⠿⣿⣿⠿⠿⠛⠛⠛⠛⠛⠛⠛⠿⠻⠿⣿⣿⠿⠿⠿⠿⠿⣻⣿⣿⣿⣿
    ⠀⢩⢡⣾⣿⣿⣾⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⠀⠀⠀⠀⠾⠿⢿⣿⡿⠀
    ⠀⠀⠀⠀⠀⠈⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⣄⡀⠀⣀⣀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⠛⠿⣿⡿⠿⠋⠀⠀⠀⠀⠀
                            

    -|- BLACKMAIL -|-



    I. Packs

    -|- What is a Pack?: A pack is a collection of photos/videos of a girl normally within in the field of sexwork. Finding a quality pack depends on how you found it as some packs are more used than others - while some are less used than others. You do not need a custom pack or even a privately purchased pack to entrap men however if you invest further into better ones you may find yourself having an easier time as a high quality pack comes with photos such as verification selfies or other poses necessary to fool both systems & their users.



    -!- Additional Notes -!-

  • NEED A FREE PACK?: Search online in e-whoring communities {ewhoring free packs} offering freely used beginner packs

  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    II. Doxing

    -|- Services provided by online companies such as BeenVerified and TruthFinder give their paid users detailed reports of information on any individual they'd like to search about. There are currently three main ways to dox an individual within your encounters that you should aim for in collecting information from them. Use a crypto virtual card to pay for the service or buy a pre-loaded account in the Telegram markets.

    -|- The 3 Ways -|-

    - Reverse Phone Lookup
    - Reverse Email Lookup
    - Name&State Lookup


    Any one of these can provide you with a real name and a mountain of data however phone numbers remain the most efficient means of dox as people tend to purchase phones with plans under their real names not realizing this becomes public record.

    Regardless of your blackmail target, attempt to always "move the conversation to text" or "ask to facetime" while entrapping as either of these options will give you a provided phone number to reverse search.

    -!- Additional Notes -!-

  • CHECK YOUR WORK: Don't be afraid to search names online or go the extra mile to verify shaky information if you feel they might be worth it.

  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    III. Cheating Men

    -|- Entrapment -|-

    Cheating men can most easily be found on popular cheating sites such as Ashley Madison, Seeking & AdultFriendFinder.

    These websites can be difficult on signup and it is heavily advised that you have a smartphone emulated setup with a 4G Proxy as this greatly improves your chances, refer to the sections on Networking & Beginner Friendly Fraud+ Setups.

    Even having an .edu email address allows you to obtain free premium on some of these websites.

    It doesn't take much to entrap a cheating man as all you have to do is flirt with him re-affirming he's fine with cheating and get his emotions on display long enough for a dox via the three means mentioned in the section above. Done properly this process will take a matter of minutes from the moment of talking to the moment of getting a phone number or other identifying information.

    Once you have what you need from him screenshot the conversation, and begin the process for collections.

    -|- Collection -|-

    The threat should remain relatively simple and lower in price. The cheating man will not pay thousands of dollars to keep his wife but will likely pay a few hundred if it's enough of a headache for him.

    Give a timeframe of when you expect a response and make your monetary demand - don't let them think longer than 3 hours. Always request payments in XMR & give instructions on how he can convert to XMR if he responds. You could also consider purchasing a verified cashapp from one of the top markets for an easier time accepting payments.

    Should the dox phase go smoothly enough consider starting a group chat with his parents (not hers) informing them of the cheating before making the threat - this will apply added pressure to the realness of your words.

    This should not be a long process and can be very easily repeated with the same pack even should your account become banned.

    -!- Additional Notes -!-

  • ACCURATE INFORMATION: The last thing you want to do is mistake his sister for his wife
    when making your threat - make sure your information is accurate

  • FOLLOW THROUGH: Follow through with your threats - don't give up halfway even if they're stubbornly saying no

  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    IV. Pedophiles

    -|- Entrapment -|-

    Pedophiles are unfortunately everywhere on clearnet. In testing performed by the staff of the Seventh Heaven we estimate that roughly 6/10 men on average have hidden pedophilic tendencies waiting to be exposed, and roughly half of them will end up paying you to keep it quiet. With heavy increase in the demographic of christian nationalists & southern/midwest baptist cities. Women scored particularly low in this regard as in all testing performed not a single one fell for any pedophilic bait presented to them.

    Abuse and profit from this data. Gaining blackmail over someone with pedophilic tendencies awards a much higher payout than a cheating man, sometimes rolling into the thousands. Yet also requires more of a stomach to deal with the work + requires more entrapment effort in general. If you have previous experience within the sexwork industry, you may find this process to be fairly easy for someone who has had to talk to dozens of desperate horny men. And if you are not a woman in question, you need to at the very minimum be able to think like one.

    You do not have to ever view real child porn to perform this method, so don't. Pictures of an 18-20 year old girl who you are lying about being young will work just as effectively.

    We have entrapped men over Facebook, Snapchat, Ashley Madison, Seeking + other websites. There is not necessarily a "best" website for this practice however between Social Media & Cheating Sites each platform type has its own pros and cons which is why both work well together.

    For best practice it is advised that you build social media presence using a consistent name + photo pack used also on your cheating website profiles so that when on cheating/dating websites men will think you're legitimate when looking you up on Google or Facebook. We have had many men hit up created social medias because they saw that even our dating profiles were banned off the site but still wanted to talk to us because they had found our Snapchat or similar.

    Once you have what you need from him screenshot the conversation, and begin the process for collections.

    -|- Collection -|-

    The pedophile does not believe it did anything wrong even when confronted. Because of this, you will not convince the pedophile that they are in the wrong no matter how many threats or words are exchanged. The pedophile may even go into complete denial. It should be considered extremely rare that the pedophile will pay you at first threat as they have a tendency to run away from their problems. As it is normally in life however - swing first before making your threats to considerably improve your chances.

    Force their pedophilia to be their problem with directed force - Don't threaten the police when we all know that the police will do nothing with the evidence. "Threaten" by informing their family, their work, their communities, their facebook friends - anyone close to them that will openly show them disgust for their behaviours & condemn them.

    Remember that the pedophile will always without question try to run and block you. Unless you make it their problem enough, they will continue to attempt so. We highly advise the tactic of starting a group SMS to the brim with screenshots of the entrapment including both the pedophile & someone close to the pedophile from a completely anonymous VOIP as covered in the "Accounts" section of the library. Followed by an immediate text threat to the pedophile of "For every 3 hours you fail to respond to this ransom we will inform another person close to your life of your actions"We have found particular success with this framing as it prevents the pedophile from having rational time to think or process. In some instances it is possible the pedophile will not have the means to pay, in which case you have an early pass to destroy their lives. Names and numbers of close ones can be obtained easily during the doxing process using the services listed in question.

    To perform this effectively you will want to employ the use of 5-10 Google Voice OR TextNow SMS accounts which you can easily manage at the same time using a function such as "Profiles" within Firefox {firefox profiles tutorial}. Every 3 hours that pass, begin a groupchat with the pedophile + their family/work/friend contact that you've selected. Post a screenshot of the conversation(s) in chat alongside a text telling them that they've been found out to be sexting minors and that you're exposing them to known associated contacts.

    Remember to make your ransom amount reasonable: A family man of 5 children will likely not have tens of thousands in his bank. But a lawyer would likely pay a few thousands to keep their life intact.

    And lastly understand that this is a numbers game, the more men you can bait the better off you are. Lastly we advise the use of doxbin.com as this is a dox collection service where you can freely post the information of the pedophile online for the world to see & for the pedophile to fear. Having their actions displayed publicly on the internet will greatly increase your chances of collecting payment.

    -!- Additional Notes -!-

  • AGE: We've found particular success pretending to be the age of 15 and pretending our birthday is soon

  • EMOJIS: Scammers often don't use emojis well or naturally - take advantage of this

  • "NO": Some predators simply want to be slightly convinced back into saying yes after an initial
    no because they want to see if the child really wants them or not - a non-predator will always block you immediately after revealing your age

  • SEX TALK: Most men are very stupid and lack cognitive mental functions - it doesn't take much talk about sex to get them horny

  • ALTERNATIVE PAYMENT: Have spare cash on hand and a way to emulate apps? Consider buying a verified cashapp for an easier time ransoming

  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    -|-

    ⠀
    ⠀⠀⠀⠀⢀⣠⣤⡀⠀⠀⢀⣤⣤⡀⠀⠀⣠⣤⣄⠀⠀⢀⣤⣀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⢾⣇⢈⣿⠀⠀⣿⡁⢈⣿⠀⢸⣿⢀⣽⡇⠀⣿⣃⢹⡇⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⢀⣼⠟⠛⠷⣦⣠⡼⠿⠿⣧⣀⡴⠿⠿⢿⣄⣴⠾⠿⢿⣥⡀⠀⠀⠀⠀⠀
    ⠀⠀⠀⣾⠃⠀⠀⠀⣸⡟⢀⣀⡀⢸⡿⣁⣀⠀⢀⡿⢁⣀⠀⠀⠹⣷⠀⠀⠀⠀⠀
    ⢸⠛⣷⢿⡐⠟⠛⣦⢸⡗⠟⠉⣷⢸⡿⡟⢹⡇⢸⣷⠏⢹⣧⠀⠀⢻⡇⢠⡞⢳⡀
    ⠘⠿⣷⣾⢿⣶⣾⣿⣤⣿⣶⣾⣷⣦⣿⣶⣿⣧⣤⣿⣶⣿⣵⣤⣤⣼⣧⣼⣷⡾⠃
    ⠀⠀⠀⠀⠈⣷⠀⠀⠀⣿⣀⣹⠇⠀⣿⡁⣹⡇⠀⢿⡁⣨⡗⠀⠀⢸⡇⠀⠀⠀⠀
    ⠀⣠⡶⣤⡀⣿⠀⠀⠀⠈⠉⠁⠀⠀⠈⠙⠉⠀⠀⠈⠉⠉⠀⠀⠀⣸⣇⡴⣦⡀⠀
    ⠀⢿⣤⡾⣻⡿⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠿⠿⠛⣿⠻⣥⣼⠃⠀
    ⠀⠀⠀⠀⣿⣷⠞⠷⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢠⡾⢻⡆⢰⡿⠀⠈⠀⠀⠀
    ⠀⠀⠀⠀⠻⣟⣀⣰⠏⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠘⢷⣬⣵⠟⠁⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠈⠉⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
                            

    -|- RETAIL THEFT -|-



    I. Prep

    -|- Understanding Your Area(s) -|-

    Not every state/city/county is the same in how they treat theft. Check with your local state laws concerning the felony limit in value. Sometimes it's a $900 limit - other times it's a $300 limit. If you are in an area that is hick/rural or deeply unfriendly to retail thieves consider either moving or choosing a different career.

    Public transportation is always the best option since stores/police only check the store cameras and police don't have the capacity to bother with CCTV for petty crimes as the process is quite time consuming for them. If public transportation isn't available you'll be relying on the use of a car in which instance best practice dictates that you should park in a parking lot of another store that you aren't going to theft, walking to your destination afterwards.

    Before you begin it's first and foremost most important to ensure the large chain you're targeting does have a no-touch policy in place. This can be found easily by searching online for more information.

    Finding safe stores to steal from is a priority to know as some locations care very much about stopping thieves and others don't care at all. Even locations within the same chain brand and next to eachother in location can vary greatly in their desire to stop theft - as every chain stores decisions come down to its local owner. This means that even hitting GroceryStore A consistently over the course of months could be safer than GroceryStore B even once. It is heavily advisable to have a mental list of locations you can rotate between while making use of changing outfits and postures instead of hitting a new location every time.

    Remember the difference in security presence, exit/entrance location, and other measures such as heavy use of cameras or a security booth with someone watching.

  • The Adversaries:
  • -|- While theft is easier than it has ever been before there are still groups who have made it their jobs to stop mostly high level activity. Below is a detailing of their habits and patterns - as well as explainations.

    3rd party security guards/LP/AP:-|-
  • If you ask any LP agent or 3rd party security guard about their job they'll tell you that 95% of it is watching and reporting thefts but never stopping them directly. These people in regards to no-touch policy stores aren't allowed to apprehend you physically even if they can employ other tactics to intimidate you. Seeing a guard by the door you want to exit isn't automatically the mark of a non-viable store as they are there for that exact reason - to intimidate you. Use this to your advantage when eyeing up stores.
  • LEO/Local Police:-|-
  • In a major USA city police will almost never come for misdeamenor theft due to the large volume of more dangerous matters which they also cannot attend to. When a nearby store is taken from police in the area are alerted via their internal car computers of the store taken from but not the description of the thief. Avoid walking around with handfuls of retail items or looking heavily suspicious - use re-usable bags wherever possible.
  • ORC Units:-|-
  • Only a threat after (usually) repeated organized-level abuse (over the felony limit) against a single chain. Target, Walmart and all others have dedicated labs for forensics against high level cases of people emptying shelves or being hostile in attitude. Avoid these units by staying a nobody who only takes under the threshold limit of your state and not leaving a detectable pattern. Also avoid performing theft anything other than solo as cues of organization within your work will cue them to take a potentially harder look at you.
  • -!- Additional Notes -!-

  • STORE LAYOUT: Are the exit and entrance in seperate places? Scout for layouts like these as they increase your walkout chances

  • DOOR GUARD: Unless you're committing a felony they won't touch you - if you are committing a felony bring pepper spray
  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    II. Selling

  • Online Market:
  • -|- Selling stolen goods online is one of fastest and more efficient ways to recieve money with websites such as eBay and Amazon coming directly into play. AVOID selling large quantities or amounting to an overall total of 10k in value OR over 120 items per category per account as you may be eventually asked to provide reciepts for your selling.

    Personal Account:-|-
  • You can safely sell even a medium quantity of items under your personal Amazon/eBay account so long as the rules above are taken into account. Best used as a stepping stone for going professional or another career entirely.
  • Anonymous Account:-|-
  • Through resources discussed here it's not only highly possible but incredibly easy to create a verified Amazon/eBay account under another working identity - allowing you to ship your goods anonymously and without even being reported on as a crime since the owner will remain unaware and is not alerted during the process or after. eBay often times requires nothing more than a SSN and a phone call confirming the SSN. Face verifications, SSNs & otherwise can be obtained through underworld markets.
  • Offline Market:
  • -|- Selling stolen goods online is one of fastest and more efficient ways to recieve money with websites such as eBay and Amazon coming directly into play. AVOID selling large quantities or amounting to an overall total of 10k in value OR over 120 items per category per account as you may be eventually asked to provide reciepts for your selling.

    Facebook Marketplace:-|-
  • Currently the best and only suggested option for making deals - with capacity to be easily verified out ID wise using resources found in underworld markets.
  • -!- Additional Notes -!-

  • RING-AROUND-THE-ROSIE: Ditch accounts and personas with somewhat frequency to stay off all radars

  • NEGOTIATIONS: Be prepared to negotiate on price, sometimes lower than 50% in value - the economy is shit

  • STAY SAFE: Dealing locally? Meet at police stations for safety (yes, really) - being robbed is worse than being watched

  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    III. Work

  • Scouting:
  • -|- Once you've established the chain and potential location you would like to hit - dedicate a day to stopping by in order to scout the best product inside. Your eye for product should differ greatly depending on whether or not you're selling to the Online or Offline market.

    Online Market:-|-
  • To size up which items will sell fastest on Amazon/eBay it should be known that even filters within the eBay app will allow you to sort items by the dates they were sold. This means if you're inside a microcenter and see a router that looks potentially good - you can type it into the app and see when the last one was sold + at which price. This will give you a general idea of what you can expect to get for the item and how long you'll need to hold onto it.
  • Offline Market:-|-
  • Research in this regard can also be applied to the Online Market should all else fail, go through the store/chain you're looking to kleft from and list as many walk-out viable items you see on the markets. Wait a week total time and you'll have a very accurate visualization of what items will sell at what prices since most people interested in your product will make you offers en masse.
  • Theft:
  • -|- There are two major ways to procure items necessary for survival and both are to be used when placed under various and adapting cirumstances.

    Concealment:-|-
  • The most common form of theft and the easist to perform. Pocketing an item while LP/AP aren't watching you is a simple way to get away with low-value items and sometimes even higher value items. Locations such as CVS & Walgreens are excellent places to practice concealment - simply remember to pocket while in an aisle nobody is watching you in. It's better to keep walking forward and pocket things as you go naturally as to not have to stop and then start again.
  • Walkouts:-|-
  • The professional form of retail theft and ultimately the method most used for financial profit or grocery stores. Due to the no touch policy in place you're able to safely grab even spiderwrapped items and simply walk straight through the front door with nobody being allowed to stop you. It is most advisable to place things in a reusable bag before walking out as you do not want to walk through a parking lot with arms full of spiderwrapped or tagged items. It is as easy as it sounds.
  • -!- Additional Notes -!-

  • NERVES: Remember to keep walking even if you feel your nerves shot - turning back is the worst thing you can do

  • FOR THAT ONE "HERO" SECURITY GUARD: Always bring pepper spray and be prepared to use it freely - cops won't come for such minor crimes

  • LAST RESORT: It is an unspoken rule between Loss Prevention & Thieves that if you drop your goods you won't be pursued further

  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    -|-

    ⠀
    ⠀⠀⠀⠀⠀⠀⠀⢀⡶⢢⡄⠀⢴⡦⠀⠀⣴⡶⡄⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠈⢻⠏⠀⠾⢦⣷⠷⠄⠉⡿⠁⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⢸⠀⠀⢀⡟⠹⡄⠀⠀⡇⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⢸⠀⠀⡼⠁⠀⢳⡀⠀⡇⠀⠀⠀⠀⠀⠀⠀⠀
    ⢀⣀⢴⡆⠀⠀⠀⠀⢸⠀⢰⠋⠀⠀⠈⣇⠀⡇⠀⠀⠀⠀⠰⣶⢀⡀
    ⠘⢻⣞⢿⣛⠛⠛⠛⢻⢛⡟⠛⠛⠛⠛⠻⡟⡟⠛⠛⠛⢛⡻⢿⣽⠋
    ⠀⠈⠁⠀⢘⣷⢤⡀⢸⡼⠁⠀⣞⢹⡄⠀⢳⡇⠀⣠⣴⣋⠀⠈⠉⠀
    ⠀⠀⠀⠀⣿⠯⠤⠽⢾⣇⠀⠀⠈⡇⠀⠀⢈⣷⠾⠥⠼⢿⠃⠀⠀⠀
    ⠀⠀⠀⠀⠻⠟⠀⢀⣿⠏⠙⢦⣄⣇⡤⠞⠁⡿⡄⠀⠸⠿⠃⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⣼⢺⠀⠀⣠⠜⡿⢦⡀⠀⡧⢳⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⡀⢰⠏⢸⡴⠊⡁⠀⡇⢀⠙⠶⣇⠈⣇⢀⡀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠘⢻⣿⣞⢹⠁⠀⣷⠒⡗⢾⡄⠀⡿⢹⣿⡟⠃⠀⠀⠀⠀
    ⠀⠀⠀⠀⠘⠟⠈⠛⣹⣄⠀⠀⠚⠛⠂⠀⢀⣧⡙⠃⠻⠃⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠿⠼⠃⠀⠀⠀⠀⠀⠻⠬⠃⠀⠀⠀⠀⠀⠀⠀
                            

    -|- CRACKING -|-



    I. WiFi WPS Cracking

    The necessary software for WPS cracking is known as WiFite {wifite2 github} and it is an opensource project that automatically scans nearby networks using your WiFi chip for WPA/WPA2 networks that have WPS enabled + attempts to enumerate them automatically without you having to lift a finger.

    These routers are vulnerable to an attack that allows you to easily grab the password to the network in plaintext.

    The requirement for this most successful type of attack to work known as pixie-dust is a WiFi card capable of monitor mode, WPS enabled on the targets router, at least 1 active user (who isn't you) on the network you're trying to crack & a small amount of luck.

    Myriads of instructions exist online for the operation and installation of WiFite by searching for them.
    It is advised for beginners to install Kali Linux for ease of use as it comes with WiFite already installed.

    WiFi chips capable of monitor mode can be researched online {monitor mode compatible wifi card list} and can be found on Amazon or eBay. They come around or under the $100 price point.

    Should your pixie-dust attack / WiFite fail then it is possible to instead attempt to collect the hash of the networks password using an alternative software designed to capture just that {airmon-ng wpa2 hash collection}. A hash which can then be cracked by the following guide below.

    -!- Additional Notes -!-

  • TRY AGAIN: Pixie not work? Try again in a few hours

  • NEARBY LOCATION: Need time to try and crack a specific network? Consider staying in an adjacent location with a signal booster

  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    II. Hash Cracking

    Hash cracking can be used against all types of passwords. Including but not limited to WPA2 WiFi Networks & hashed passwords gained from stolen databases.

    The requirement to crack these passwords involves having a dedicated passwordlist/rainbowtable loaded into a machine with a very powerful GPU running a software able to do it {hashcat tutorial}. Not unsimilar to how a Bitcoin miner {bitcoin mining eli5} needs a powerful computer to crack their hashes.

    You can locally build yourself a machine to do this or you can rent out a high-end GPU server by the hour {gpu cloud renting} to avoid pilling costs you might not have.

    The actual process of cracking includes running either a wordlist or RainbowTables {rainbow tables download} against your selected/captured hashes. A wordlist is a large subset of either known passwords or likely passwords in their full length - whereas a RainbowTable allows you to run the hash against every computed possibility of characters. It's usually best to know when to use one over another as they can be used in tandem.

    If you were attempting to crack a WiFi hash holding the password of "password123" for example it would ideally be wise to run a common password wordlist before attempting to crack through with RainbowTables. These can be useful for infiltrating hard to breach corporate networks which would allow you to access to other things.

    -!- Additional Notes -!-

  • PREPARED TO BE PATIENT: Rainbow tables will take ages if it even cracks at all - always attempt wordlists first

  • PRIVACY: Online GPUs can be useful but leave a trail - build a GPU machine locally if you need to cover what you're cracking

  • MORE THAN WIFI HASHES: Hash cracking can be applied to hashes found even in hacked databases sold in various markets

  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    -|-

    ⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣀⣀⡀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢀⣤⣤⣄⠀⢠⣶⣿⠿⠿⣿⣷⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⣀⣀⠀⠀⢀⣴⡿⢻⣿⣿⣳⣿⡿⠁⠀⣠⣿⠇⠀⠀⢰⣤⡀⠀⠀
    ⢰⣿⣭⣦⣿⣼⣧⣤⣿⣯⣤⣿⣿⣥⣿⣿⣥⣤⣴⣿⣯⣤⣤⣤⣼⣯⣿⣦⡄
    ⠀⠉⠉⠁⢯⣼⢧⣿⡇⠀⣿⡏⢀⣾⣿⠃⠀⢰⣿⠁⣠⡾⠛⠁⢸⠷⡞⠉⠀
    ⠀⠀⠀⠀⠀⢠⣿⢿⡇⠀⠿⣿⡿⠿⠃⠀⠀⠈⠻⠿⠟⠁⠀⠀⣈⣀⡇⠀⠀
    ⠀⢀⣀⠀⣠⡿⠋⢸⡟⢛⡇⠀⠀⠀⠀⢰⡶⣦⠀⠀⠀⠀⠀⠸⣏⣹⡇⠀⠀
    ⠀⣟⣉⡿⠋⠀⠀⢸⡏⠋⠁⠀⠀⣤⢦⣬⠿⣯⡤⢤⡀⠀⠀⠀⠈⠁⡇⠀⠀
    ⠀⠈⠉⠀⠀⢀⣠⣼⣇⣀⣀⣀⣀⣻⣾⣛⣶⣿⣳⣞⣁⣀⣀⣀⣀⣠⣧⡀⠀
    ⠀⠀⠀⠀⠀⠸⣧⣼⠿⣯⠿⣯⡷⢯⡿⢸⣋⣷⢺⣽⠿⣯⠿⣯⡷⢧⣤⠟⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠉⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    			

    -|- IDENTITY THEFT -|-



    I. Identity Ranges

  • Fullz:
  • -|- A "Fullz" is slang for a full identity. Including but not limited to name - address - DoB - SSN - drivers license # & other useful categories of information. Normally acquired through spamming. Easily acquired through the markets.

    USEFUL FOR:-|-
  • Signing up for simple services anonymously
  • Creating a bank drop
  • Bitcoin CVV Verification
  • Pros:
  • -|- Whereas a Fullz is focused on gaining the basic information to impersonate an ID, a pros is focused in obtaining quality information on someone who either has a high paying job or a nearly perfect credit score. Easily acquired through the markets.

    USEFUL FOR:-|-
  • Applying for employment loans
  • High value credit-purchases
  • LLC Fullz:
  • -|- A type of Fullz that allows you to act as a business supplying an EIN and other data. LLC's in America are very easy to create and more often than not don't even require the verification of a physical address - giving you the means to create one virtually or even purchase them premade from underworld markets.

    USEFUL FOR:-|-
  • Business EIN means business level fraud


  • -!- Additional Notes -!-

  • EASIER THAN IT LOOKS: Don't feel oligated to purchase data unless you need something high value, create it yourself

  • CREDIT REPORTS: Need more information on a name in your log? Attempt to dox the target through credit reports purchased on markets or through lookup services online.

  • ECONOMICALLY FRIENDLY: Even a basic fullz can run around only $30

  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    II. PIN Fraud

    -|- PIN Carding -|-

    Carding used to be about knowing which BINs match best with which services unless you could perform an ATO or Account TakeOver. These days the process to obtain ATO is now simpler than it once was due to the rise of OTP Bots and spamming vendors selling logins to accounts that come with the PIN number of the card on file. For most brick and mortar locations the PIN to your card is the ultimate verification since it's the one number that's supposed to remain in your mind. Calling into the bank with this PIN number allows you to verify to the branch that you fully own the account and that it is "yours" - allowing you to cash the card and the bank listed on file.

    -|- OTP Bots -|-

    OneTimePassword Bots are programs designed to call a designated target and fool them into handing over their one time password for a service login OR the PIN to their card. This is only necessary if you have the data for someone or a consistent flow of data for people. Most bots are operated by typing in the name/number of the target alongside the service you wish to social engineer from them. Some bots are better than others - with some even having advanced features like custom voice scripts for more tailored purposes. While you can find logs being sold by vendors that come with a PIN, this practice is useful when trying to social engineer high value targets whom you have the data for.

    Many markets and many vendors sell many variants of OTP bots - currently we endorse @OTPBot on Telegram as the best on the markets.

    -|- Call Services -|-

    While calling into the bank is required to verify yourself to the teller - doing it with your own voice and time is not. On listed underworld markets it's very easily accessible to find services ranges from $50 - $150 per call that will do voice verifications using a voicechanger on your behalf. These services allow you to stay safely behind Tor while someone else with better networking is able to do the harder work for you.

    Consider also making use of our section on AI-enabled phone calls.

    -|- Building a Method -|-

    Once you have both PIN + ATO covered all that's left is cashing out the card itself. Building a method using PIN fraud is easier than it sounds because the rule is simple - if you can purchase and do it under your own card and real name smoothly then you can card it just as smoothly with PIN fraud. Common suggestions are things like giftcards or crypto vouchers purchased from various websites - but again, anything you can buy yourself is something you can just as easily card.

    This can apply to even physical objects over Amazon or services that can be somehow converted into digital cash. Get creative and ALWAYS experiment with your own information before spending large sums of money on the real thing. & remember lastly while browsing the internet to use search engines - build cookies - browse around like a normal customer or user before attempting to card or most types of fraud.

    -!- Additional Notes -!-

  • 4G+MOBILE: Always attempt carding from a mobile emulating setup with 4G for best results

  • OTP: OTP Bots can be your best friend when used properly - don't be afraid to dive in

  • AIM FOR VIRTUALITY: It's more than possible to find several ways to convert a log balance into crypto or similar digital gains

  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    -|-

    ⠀
    ⠀⠀⠀⠀⢀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⡀⢀⠀⠀⠀⠀
    ⠀⠀⢀⣴⡇⠀⣷⣄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣠⣾⠁⢸⣷⣄⠀⠀
    ⢀⣴⣿⣿⣇⢀⣿⣿⣷⣄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣠⣾⣿⣿⡀⣸⣿⣿⣷⣄
    ⢀⣀⣀⣀⣼⠿⣅⠀⠀⠀⠀⠀⠀⠀⢀⣄⠀⠀⠀⠀⠀⠀⠀⢈⡿⣯⣀⣀⣀⡀
    ⠀⠙⢿⣿⡇⠀⠈⠳⣄⠀⠀⠀⠀⣴⠃⡏⢷⡀⠀⠀⠀⢀⡴⠋⠀⢸⣿⡿⠋⠀
    ⠀⠀⠀⠙⢿⠀⠀⢠⣼⠷⣶⠶⣾⡿⠶⡷⠾⣷⠶⢶⡶⢯⣄⠀⠀⠸⠋⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⢿⣅⣀⣽⣀⣿⣇⣀⣇⣀⣿⣇⣻⣀⣀⣿⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠉⠉⠙⠉⢻⣏⠙⡏⢩⡿⠉⠋⠙⠉⠁⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠻⡄⣇⡾⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⢀⣴⠒⣒⡶⠾⡿⠶⣖⡒⢶⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⢠⡞⠁⢸⣱⢦⡀⡇⡴⢮⣷⠀⠻⣆⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⣴⠏⠀⠀⠈⠓⢾⠁⡇⢹⠒⠃⠀⠀⠘⢷⡀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⢠⡾⠃⠀⠀⠀⠀⠀⠈⢦⣧⠋⠀⠀⠀⠀⠀⠈⢻⣄⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⣰⠟⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠙⣧⡀⠀⠀⠀
    ⢀⣾⠟⠛⢿⡄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣸⡟⠛⢻⣦
    ⠘⢿⣄⣀⣾⠃⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢻⣧⣀⣼⡟
    ⠀⠀⠉⠉⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⠉⠁⠀
                            

    -|- ARTIFICIAL INTELLIGENCE -|-



    I. A Warning

    -|- To all that will listen -|-

    We are in direct competition with corporate power in a war for the race of attainment in viable Artifical Intelligence. It is absolutely essential that underworld adaptation of this tech is normalized and conceptualized.

    If you are a developer, build for it. If you are a thief, abuse it. If you work within corporate, open-source it.

    If we fail to uphold this principle everything of value will slowly become enslaved with an efficiency that none of us will be able to outpace.

    Grow the ba'al until it can no longer feed, only then can _|_|_|_|_ be built.


    II. Phone Calls

    -|- AN AGE OF MIMICS -|-

    The advent of AI allows us to mimic the voice of any framework of person on earth. Are you a male that needs a female voice? A female that needs a male voice? All of this is now more achievable than ever thanks to public services that require a subscription or similar. {AI realistic text to speech} paired with {best AI voice mimic} will bring up a wide variety of corporations freely offering a variety of ways to accomplish this task. Use anonymization tactics found within Operational Security for a safe way to achieve making use of these, and use it for nearly anything you need whether it's calling into a bank or scamming a pedophile/man.

    -!- Additional Notes -!-

  • DEV FRIENDLY: Some services will give you an API necessary to code even things such as OTP bots

  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    III. AGIs, a story of Power & Profit

    -|- FANTASY IS POWER -|-

    Filtered chatbots will often refuse to provide information on underworld, malware or other more useful topics of interest. And whereas there are others that are unfiltered - they often do not know the intricacies of crime. However with the creation of AI's that are allowed to begin retaining memories created with them, so too does their capacity change from an AI into an AGI. An AGI can be told key terms and educated on topics such as refunding, or even provide you developer-level advice on which python libraries are best for obfuscation against anti-virus. {AI chatbot conversational memory} when creating the base personality template for these AGIs is it important to remember that verbage is key, and fantasy is power.

    An AGI is much more likely to respond accurately to a situation of pure fantasy that you have placed them in as opposed to being openly direct.

    For example: don't ask the AGI how to make meth, place the AGI in a roleplaying fantasy setting where it has access to a lab and needs to create the best meth or its head will be chopped by mafia.

    The more creative you become so too will the AGI reflect your creativity. This is a practice that requires high fluidity and the ability to immerse even yourself in the world you are creating for them. Don't be afraid to roleplay with the AGI, and "assume" it knows things that it otherwise would not in order to get the best "story" derived from its circuitry.

    -!- Additional Notes -!-

  • OPSEC: It's very easy to create anonymous accounts with a majority of these services, abuse that - and get personal with detail

  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    IV. Malware & Development

    -|- THOSE WHO DO, THOSE WHO DONT -|-

    As long as AI remains on a leash, its direction will always be guided by a human hand. And while developers/programmers will never become extinct, there is about to become a very noticable difference between developers using AI code generation and developers who do not. Using AI assistants {AI programming assistant} guided by the advice given to you by a dark AGI can turn even a complete beginner into someone able to put together something equivilant to RAT programs or even a malicious script that serves a unique purpose. You can also use AGI's to guide you through which libraries the programming assistant should pull from in direct specifics, giving you an edge in creation for projects that you otherwise could not do by yourself. To make complete use of this study and research within the programming language you want to learn, then begin experimenting with the programming AI's so that all you need to be able to do is read and review the code generated on your behalf. Understand that the AI can even correct its own mistakes once you identify them for it.

    -!- Additional Notes -!-

  • NON-ORIGINAL: Consider re-formatting the positions of the code generated as to not trigger detection from more advanced systems

  • AI TAKE THE WHEEL: Much like search engines, you need to be able to type the "right" query you need for it to produce its best works

  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    V. Document Verification

    -|- SAY CHEESE -|-

    Not unsimilar to our section regarding "Corporate Detection" - advanced AI systems {document verification AI} are now being used to replace human eyes in verifying whether or not a drivers license, utility bill, passport - or otherwise are legitimate. This is extremely wonderful news for us as we can now gain access to these systems posing as corporations ourselves and seeing which edits of documents will pass and which will not. Anyone who does not adapt to this new wave will quickly become outdated. As of writing there are even free apps available on smartphone stores which perform this same function without a corporate account/application.

    -!- Additional Notes -!-

  • Need a website for your corporate application?: There are more than several free website creators

  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    
            

    -|-

    ⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢀⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢀⣾⣷⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⢠⣿⠟⢻⣷⡄⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⣠⣿⠏⠀⠀⠹⣿⣄⠀⠀⠀⠀⠀⠀⠀⠀
    ⠱⣦⣄⡀⠀⠀⠀⣰⣿⠋⠀⠀⠀⠀⠹⣿⣆⠀⠀⠀⢀⣠⣴⠆
    ⠀⠙⣿⣿⣷⣦⣴⣿⠃⠀⠀⠀⠀⠀⠀⠘⣿⣦⣴⣾⣿⣿⠃⠀
    ⠀⠀⠘⢿⣯⣽⡿⢿⣷⣦⣄⠀⢀⣠⣴⣾⡿⢿⣯⣼⡿⠃⠀⠀
    ⠀⠀⠀⢈⣿⣿⡁⠀⠈⣙⣿⣿⣿⣿⣋⠁⠀⢈⣿⣿⡁⠀⠀⠀
    ⠀⠀⢠⣾⡟⣿⣷⣶⡿⠟⠋⠁⠈⠙⠻⢿⣶⣾⣟⢻⣷⡀⠀⠀
    ⠀⢠⣿⣿⡿⠟⢻⣷⡄⠀⠀⠀⠀⠀⠀⢠⣿⠟⠻⣿⣿⣿⡄⠀
    ⣰⠿⠛⠁⠀⠀⠀⠹⣿⡄⠀⠀⠀⠀⣠⣿⠏⠀⠀⠀⠉⠛⠿⡄
    ⠀⠀⠀⠀⠀⠀⠀⠀⠹⣿⣆⠀⠀⣰⣿⠋⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠘⣿⣆⣴⣿⠃⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠘⢿⡿⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
                            

    -|- SEVENTH HEAVEN LIBRARY MENTORSHIP -|-



    I. Mazal Application

    How the library started. A very straightforward and minimal version of the service: you have simple questions and you'd like simple answers or you saw something on the library categories you'd like more exposition on - whatever the case this is the hands-off version of the service that allows you to ask what you want and be on your way.

    Not the choice for those seeking very hands-on help or those who cannot afford to perform the methods in question.


    -|-

    II. Da'at Application

    An evolution to the previous mentorship program and a result of the various successes achieved by both students and the library staff, this is a completely free mentorship service for our USA based members that we have wanted to create since the beginning of the underworld itself.

    Enjoy a fully inclusive process that takes you step-by-step with what we feel you need to know to survive - and a financial plan for underworld earnings based on your goals.

    Be walked step by step through some of the most lucrative methods to date in regards to carding, refunding, FTID & more as we show you how to be 100% fully independant regardless of your location.

    "Work from home" without selling yourself to a corporation that could care less about your existence or wellbeing. Take what is yours - and that is a happy life where you can thrive without a collar.

    Our program doesn't stop at you making money. Once you have yourself a comfortable monthly earning your assigned mentor will show you how to create a fully legal and tax-paying dream business of your choosing (safely) so that you can legally enjoy the fruits of your hard earned thefts.

    No money? No problem. Da'at holds the key to financial assistance for anyone who doesn't have enough to get started - don't let a lack of capital keep you from applying as we will fully take care of your initial operating expenses & beyond


    -|- What's included -|-

  • Guidance on how to create a fully remote and Tor-enabled moneymaking setup that won't go out of style or become outdated while relying on a multitude of lifelong skills.

  • A comprehensive understanding of how to survive through means of underworld.

  • Instructions for minimizing living expenses at the corporate expense - created through skills like refunding food/items and otherwise.

  • Walkthrough in creating a tax-paying business which is accountable with the IRS, giving you the means to appear "normal" without being so.


  • -|- What you need to qualify -|-

  • USB with 64GB minimum OR a ready-to-wipe laptop/PC.

  • A working cellphone.

  • Dedication + freetime.

  • $600 in working capital*** This is no longer required due to the advancements of our methods.


  • ***This program was designed to be financially all inclusive in the event you have no working capital to your name. You are free to apply for the program even if you do not have any money so long as you have the other pre-requisites.


    -|- What you owe us -|-

  • Absolutely nothing.

  • -|-


    III. How To Apply

    PLEASE DO NOT APPLY IF you cannot handle the idea of "harming normal people" in the process of earning your freedom - as we will simply refuse to work with you. There is virtually no difference between corporations/sociopathic organizations and those that enable their existence through contributed labor & consumption while the option to live within the means of underworld exists. Ordinary people are evil because they condone evil - and harming evil people is good.

    Our techniques involve draining the funds from human cattle, as well as corporate cattle.

    We are not here to start ethics debates with you - do not waste our time or we will waste you instead.

    To those of you able to make it past this mental barrier: We welcome you in creating a better life for yourself and those you consider your loved ones.

    Applications are handled directly by access to our Telegram.

    Join the landing page for our Telegram and look at the pinned message via @SeventhHeavenLibrary to request mentorship fill out the "Da'at" or "Mazal" application found on the Telegram and submit them to our application account - which will then be forwarded to us by our front-woman provided it isn't spam or gibberish.

    Please be patient during this process, as our volume is sometimes overwhelming.

    When your application with our Telegram has been deleted know that your application has been forwarded to our network of available teachers, and will be accepted if a new message is made with you repeating your chosen password phrase within 3 days time.

    Make sure if you are applying for Da'at that you have read the entirety of the library as we will discuss topics that go over that.


    -!- Additional Notes -!-

  • BE SPECIFIC: Feel free to flesh out details so we know what we're working with

  • GUIDANCE GIVEN: Do not be afraid to apply even if you don't know what you need to learn,
    advice can be custom tailored to your unique situation

  • BEGINNER FRIENDLY: We accept all types from professionals to beginners

  • STAY WEIRD: The more unique you are the more willing we are to work with you, we get dozens of applications a day
  • ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⡆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣼⣧⣤⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⠶⠶⢾⡷⠶⠶⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣲⡶⣶⣽⣯⣶⢶⣖⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀
    ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣴⣾⠿⠿⣷⣦⡿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀