Login | Register

Here you can suggest anything you want.
If you you have some ideas that we can implement to make this service better, don't be shy ;)
If you think some information is wrong or could be better, please point us.
Design, content, functionality improvement - suggest something and we'll implement it.

Add suggestion

Suggestions

Add Suggestion
Pages: 1 2 3 4 5 6 7 8 9 10 > from 16
  • tiana

    Suggested on Aug 10, 19:30

    Status: New

    I cannot over emphasize the professionalism of PRIVATEJOSH3@GMAIL.COM I have spent several hours monitoring my husband and his co-worker flirting literally and there has not been any technical malfunctions. I have been able to monitor all his communications with his girlfriend and I can see clearly that he has alot of them, he must be a devil, because I dont understand how he still comes home to tell me he loves me.. I have never been this dissapointed and sad in my life before. I really want to thank my stars I took courage to contact him and for all his tender kindness towards assisting me and giving me exactly what I requested for in the hack. You can also take a bold step contact him and findout about your cheating spouse: PRIVATEJOSH3@GMAIL.COM

  • JOHNSON COOPER

    Suggested on Aug 3, 09:46

    Status: New

    `help me thank hackintechnology after being scammed of $1500 he helped me find my cheating husband he helped hack his whatsapp gmail and kik and i got to know that he was cheating on me , in less than 24 hours he helped me out with everything HACKINTECHNOLOGY is trust worthy and affordable contact hackintechnology@gmail.com +1305 771 2040IF U Need Any Help ? *University grades changing *Bank accounts hack *Twitters hack *email accounts hack *Grade Changes hack * load bank account any amounts *Website crashed hack *server crashed hack *Retrieval of lost file/documents *Erase criminal records hack *Databases hack *Sales of Dumps cards of all kinds *Untraceable Ip *Individual computers hack *Websites hack *Facebook hack *Control devices remotely hack *Burner Numbers hack *Verified Paypal Accounts hack *Any social media account hack *Android & iPhone Hack *Word Press Blogs hack *Text message interception hack *email interception hack - See more at hackintechnology@gmail.com +13057712040

  • sarah

    Suggested on Jul 29, 18:06

    Status: New

    My name is Sarah Cambell, i was able to spy on my cheating ex-Husband phone without him finding out…..it really helped my lawyer during my divorce i have been scammed so many times but cyberhacklove is the best hacker i have met he helped me regain my freedom and lost money by scammers …you can contact cyberhacklove@gmail.com for spying and hacking phones,computer,email,Facebook and other social networks account,his services are cheap …cyberhacklove@gmail.com # +16066579237,please tell him Sarah referred you

  • johnny bradson

    Suggested on Jul 27, 19:52

    Status: New

    Confront your cheating spouse with evidence, i was able to spy on my cheating ex phone without finding out.....it really helped me during my divorce ...you can contact (HACKINTECHNOLOGY@GMAIL.COM) call and text (305) 771-2040 for spying and hacking social networks, school servers, icloud and much more, viber chats hack, Facebook messages and yahoo messenger, calls log and spy call recording, monitoring SMS text messages remotely, cell phone GPS location tracking, spy on Whats app Messages, his services are AFFORDABLE .................................... ONLY GOD CAN THANK HIM FOR ME

  • Nicholas Shields

    Suggested on Jul 26, 10:14

    Status: New

    COMPOSITE HACKS -Do you need the service of a competent HACKER? - Are you faced with delays and unnecessary excuses from fake hackers on your job? - We are special hackers with Special hacking Skills, Hacking Softwares and Tools, that will render swift response and solutions to your problems. -We provide proofs before receiving payment. - With Our Technical Eficiency, We Cn Provide 100% solution to the following Services as we have been doing for years: ==>> PENETRATION TESTING OR PENTESTING If you set up a security system for your home, or office, you'd want to be sure it was safe from attackers, right? One way to test a system's security is to hire—pentesters (hackers)—to purposely hack it in order to identify weak points ==>> JAIL BREAK Circumventing the security of any electronic device, like an iPhone or a PlayStation, smartphones, etc to remove a manufacturer's restrictions, generally with the goal to make it run software from a non-official source ==>>OTR What do you do if you want to have an encrypted conversation, but it needs to happen fast? OTR, or Off-the-Record, is a protocol for encrypting instant messages end-is to-end. ==>> UNLOCKIN AN IPHONE/iCLOUD ACCOUNT You don’t need to crack or hack into the iPhone iCloud system and change the DNS settings. You don’t even need any type of iCloud Password, All we Need is Your iPhone IMEI, which you can obtain with *#06# and send to us for us to get the job done!! ==>>OTHER HACKING SERVICES INCLUDES: - Basic Web Hacking: - Application Cracking/hacking. - Javascript Hacking: • such as: recollecting deleted files, and messages - Admin Hack: • Such As: Bank accounts Hacks - Hire website hacker - Hire database hacker • Such As: Delete unwanted online Pictures and Videos on any website, Removal Of Criminal Records, Password sniffing - University hacking: • Such as: Upgrading of University Grades, Changing, SAT/GRE/TOEFL Score upgrade - Social account hacking: • Such as: Hacking a Facebook, Instagram, Twitter, Whatsapp, Line, Skype Account: Or you want to get a famous social media account/page. or you want to get unnoticeable access to your spouse messages and social media account - Electronic hacking: • Such As: Smartphone Hack and any kind of electronic device. - Sales of Spyware and keylogger soft wares ==>> ALL YOU NEED TO DO IS:Contact==> compositehacks@gmail.com

  • Nicholas Shields

    Suggested on Jul 26, 10:14

    Status: New

    COMPOSITE HACKS -Do you need the service of a competent HACKER? - Are you faced with delays and unnecessary excuses from fake hackers on your job? - We are special hackers with Special hacking Skills, Hacking Softwares and Tools, that will render swift response and solutions to your problems. -We provide proofs before receiving payment. - With Our Technical Eficiency, We Cn Provide 100% solution to the following Services as we have been doing for years: ==>> PENETRATION TESTING OR PENTESTING If you set up a security system for your home, or office, you'd want to be sure it was safe from attackers, right? One way to test a system's security is to hire—pentesters (hackers)—to purposely hack it in order to identify weak points ==>> JAIL BREAK Circumventing the security of any electronic device, like an iPhone or a PlayStation, smartphones, etc to remove a manufacturer's restrictions, generally with the goal to make it run software from a non-official source ==>>OTR What do you do if you want to have an encrypted conversation, but it needs to happen fast? OTR, or Off-the-Record, is a protocol for encrypting instant messages end-is to-end. ==>> UNLOCKIN AN IPHONE/iCLOUD ACCOUNT You don’t need to crack or hack into the iPhone iCloud system and change the DNS settings. You don’t even need any type of iCloud Password, All we Need is Your iPhone IMEI, which you can obtain with *#06# and send to us for us to get the job done!! ==>>OTHER HACKING SERVICES INCLUDES: - Basic Web Hacking: - Application Cracking/hacking. - Javascript Hacking: • such as: recollecting deleted files, and messages - Admin Hack: • Such As: Bank accounts Hacks - Hire website hacker - Hire database hacker • Such As: Delete unwanted online Pictures and Videos on any website, Removal Of Criminal Records, Password sniffing - University hacking: • Such as: Upgrading of University Grades, Changing, SAT/GRE/TOEFL Score upgrade - Social account hacking: • Such as: Hacking a Facebook, Instagram, Twitter, Whatsapp, Line, Skype Account: Or you want to get a famous social media account/page. or you want to get unnoticeable access to your spouse messages and social media account - Electronic hacking: • Such As: Smartphone Hack and any kind of electronic device. - Sales of Spyware and keylogger soft wares ==>> ALL YOU NEED TO DO IS:Contact==> compositehacks@gmail.com

  • David Scott

    Suggested on Jul 22, 16:44

    Status: New

    ARE YOU INTERESTED IN THE WORLD OF FAME?? GETTING RICH. POWERFUL AND FAMOUS? JOIN THE ILLUMINATI TODAY AND BECOME RICH.ILLUMINATI BRINGS YOU INTO THE LIMELIGHT OF THE WORLD IN WHICH YOU LIVE IN TODAY. YOUR FINANCIAL DIFFICULTIES ARE BROUGHT TO AN END IF YOU JOIN. WE SUPPORT YOU BOTH FINANCIALLY AND MATERIALLY TO ENSURE YOU LIVE A COMFORTABLE LIFE.JOIN ILLUMINATI AND GET YOUR SELF A HOUSE AND A CAR AND ALSO WITH THE SUM OF (ONE MILLION DOLLARS) BENEFITS GIVEN TO NEW MEMBERS WHO JOIN ILLUMINATI. Monthly payment of $500,000.00 USD into your bank account every month as a member If you are interested of joining us in the great brotherhood kindly connect with us on Gmail via Davidscottilluminati666@gmail.com or join us for more information

  • Bridon

    Suggested on Jul 17, 07:03

    Status: New

    In theory, people who try to breach computer security should be called crackers rather than hackers. But the popular press has lost the distinction between the two, and I'm not going to make life difficult by trying to resurrect it. So, hackers, as popularly defined, are computer experts who spend enormous amounts of time trying to breach the security of networks, Web servers and email servers. Usually they use a selection of specialist software to identify weaknesses, which are then exploited. The majority do it for fun and as a challenge. The problem is that serious hackers, need to protect our anonymity. This means they can't mount their attacks on organisations like the FBI directly through their own computers and telephone lines. They need first to create an intermediary, like a kind of base camp for a mountain expedition. To get their intermediate base they use purpose built programs called Trojans and backdoors and other self created softwares. A trojan is a program that looks innocent but carries a dangerous payload, like the Trojan Horse of Greek mythology. It may be disguised as a game or some other kind of executable program, in the same way that viruses are often disguised. The payload it carries is a backdoor program (or maybe just a few lines of code that create a security hole so a backdoor program to be installed later). A backdoor program allows the hacker access to your computer whenever it's on the Internet. It's a remote control, and usually a very thorough one with full access to every facility and file on your computer. Again, in the popular press the distinction between a trojan and a backdoor (or more specifically the client element of a backdoor program) has been lost and the two are often used interchangeably. Don't rely on secure procedures as a method of stopping hackers. They sometimes fire programs over the Internet at a random IP addresses to see if they stick. You could be happily surfing Disneyland, and from nowhere (certainly not the Web site server) a hacking program can turn up at your machine trying to get in. Once it's inside, it will send a message back to the hacker to say it's colonized your computer. It may also send a message each time you log on to the Internet, because it's likely you'll be given a different IP address by your ISP each time you log on.... it is not all illegal. If you wish to contact a 'black hat' hacker,😊 contracthacks@gmail.com

  • CARLOS MORGAN

    Suggested on Jul 12, 19:46

    Status: New

    Hello there We are professional carding team with a large rang around the globe we sell blank ATM cards which has been specially programmed to withdraw free cash from any ATM machine worldwide it may sound crazy but it is true, with our newly designed super intelligent blank atm card you can withdraw free cash from any ATM Machine worldwide we have hacked the sum of one million dollars into each of our cards using the track 1 and track 2 data retrievers. we sell the original cards with documents to validate our transactions we guarantee the security of our customers while using this card as the card has been programmed to by pass all security protocols thereby making it 100% safe to use. We deliver this cards to all our customers and interested buyers worldwide and it has changed the life of many people including me and the payment for the card comes after the card has been delivered to you and you have tested it and confirmed that it is working,we have various cards and various prices for them and the cards has various daily withdrawal limits, bellow is our price lists and the daily withdrawal limits for the BLANK ATM CARDS; limit of $1000 perday cost $150 limit of $2000 perday cost $250 limit of $3000 perday cost $350 limit of $4000 perday cost $450 limit of $5000 perday cost $550 limit of $10,000 perday cost $1100 to get your card please Contact us stating the particular card you want Email Address: atmhacker6@gmail.com ><@><.> ONLY SERIOUS PERSON'S SHOULD APPLY ONLY......

  • tommy grey

    Suggested on Jul 11, 22:44

    Status: New

    I sincerely didn’t like the idea, but this is my way of saying thank you to the Quora user that recommended a hacker ( QUICKSOLUTION040@GMAIL.COM ) I hired him for a very private and difficult matter of helping me hack a my spouse’s phone and social networks and some other personal stuffs and he far exceeded my expectations. which Jeremie, helped me get the info(whatsapp, facebook, text messages, call logs etc) faster and cheaper than I had imagined. The first time we spoke, we had a very long phone consultation in he gave me all my options that he could think of to resolve my case, and he even recommended I try other options before hiring him, which shows that he is honest. I decided to hire him and I am glad I did. he is a fantastic investigator and a great person. If you need a professional, reliable and efficient hacker, then you should contact this guy ; QUICKSOLUTION040@GMAIL.COM